tgiby3 0 Posted ... (edited) Just Loops Auth Failed, Check Client area to find out why.\ Logs make no sense to me. . 2021.10.04 17:34:42 - Eddie version: 2.20.0 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.19043.0, Mono/.Net: v4.0.30319 . 2021.10.04 17:34:42 - Command line arguments (1): path="home" . 2021.10.04 17:34:44 - Profile path: C:\Users\ggiby\AppData\Local\Eddie\default.profile . 2021.10.04 17:34:44 - Reading options from C:\Users\ggiby\AppData\Local\Eddie\default.profile . 2021.10.04 17:34:46 - Tun Driver - 0901: 9.24.2; wintun: Not found . 2021.10.04 17:34:46 - OpenVPN - Version: 2.5.1 - OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2021.10.04 17:34:46 - SSH - Version: plink 0.73 . 2021.10.04 17:34:46 - Build platform: 64-bit x86 Windows . 2021.10.04 17:34:46 - Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800 . 2021.10.04 17:34:46 - Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe) . 2021.10.04 17:34:46 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2021.10.04 17:34:47 - Ready . 2021.10.04 17:34:48 - Collect information about AirVPN completed I 2021.10.04 17:34:51 - Session starting. I 2021.10.04 17:34:51 - Checking authorization ... ! 2021.10.04 17:34:52 - Connecting to Saiph (Canada, Toronto, Ontario) . 2021.10.04 17:34:52 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:34:52 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:34:52 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:34:52 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:34:52 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:34:52 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:34:52 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:34:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.229:443 . 2021.10.04 17:34:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:34:52 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.229:443 [nonblock] . 2021.10.04 17:34:52 - OpenVPN > TCP connection established with [AF_INET]184.75.223.229:443 . 2021.10.04 17:34:52 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:34:52 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.229:443 . 2021.10.04 17:34:52 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.229:443, sid=aea5c842 bc740cfb . 2021.10.04 17:34:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:34:52 - OpenVPN > VERIFY KU OK . 2021.10.04 17:34:52 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:34:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:34:52 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:34:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2021.10.04 17:34:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:34:53 - OpenVPN > [Saiph] Peer Connection Initiated with [AF_INET]184.75.223.229:443 . 2021.10.04 17:34:54 - OpenVPN > SENT CONTROL [Saiph]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:34:54 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:34:54 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:34:54 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:34:54 - Disconnecting . 2021.10.04 17:34:54 - Connection terminated. I 2021.10.04 17:34:57 - Checking authorization ... ! 2021.10.04 17:34:57 - Connecting to Agena (Canada, Toronto, Ontario) . 2021.10.04 17:34:57 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:34:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:34:57 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:34:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:34:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:34:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:34:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:34:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.213:443 . 2021.10.04 17:34:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:34:57 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.213:443 [nonblock] . 2021.10.04 17:34:57 - OpenVPN > TCP connection established with [AF_INET]184.75.223.213:443 . 2021.10.04 17:34:57 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:34:57 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.213:443 . 2021.10.04 17:34:58 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.213:443, sid=511cb4f4 bb16c622 . 2021.10.04 17:34:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:34:58 - OpenVPN > VERIFY KU OK . 2021.10.04 17:34:58 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:34:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:34:58 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:34:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Agena, emailAddress=info@airvpn.org . 2021.10.04 17:34:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:34:58 - OpenVPN > [Agena] Peer Connection Initiated with [AF_INET]184.75.223.213:443 ! 2021.10.04 17:34:59 - Disconnecting . 2021.10.04 17:34:59 - Sending soft termination signal . 2021.10.04 17:35:02 - Connection terminated. . 2021.10.04 17:35:02 - OpenVPN > SIGTERM[hard,] received, process exiting I 2021.10.04 17:35:02 - Cancel requested. ! 2021.10.04 17:35:02 - Session terminated. I 2021.10.04 17:35:33 - Session starting. I 2021.10.04 17:35:33 - Checking authorization ... ! 2021.10.04 17:35:34 - Connecting to Agena (Canada, Toronto, Ontario) . 2021.10.04 17:35:34 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:35:34 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:35:34 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:35:34 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:35:34 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:35:34 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:35:34 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:35:34 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.213:443 . 2021.10.04 17:35:34 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:35:34 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.213:443 [nonblock] . 2021.10.04 17:35:34 - OpenVPN > TCP connection established with [AF_INET]184.75.223.213:443 . 2021.10.04 17:35:34 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:35:34 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.213:443 . 2021.10.04 17:35:34 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.213:443, sid=96de6638 b674f479 . 2021.10.04 17:35:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:35:34 - OpenVPN > VERIFY KU OK . 2021.10.04 17:35:34 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:35:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:35:34 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:35:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Agena, emailAddress=info@airvpn.org . 2021.10.04 17:35:34 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:35:34 - OpenVPN > [Agena] Peer Connection Initiated with [AF_INET]184.75.223.213:443 . 2021.10.04 17:35:35 - OpenVPN > SENT CONTROL [Agena]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:35:35 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:35:35 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:35:35 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:35:35 - Disconnecting . 2021.10.04 17:35:35 - Connection terminated. I 2021.10.04 17:35:38 - Checking authorization ... ! 2021.10.04 17:35:39 - Connecting to Sharatan (Canada, Toronto, Ontario) . 2021.10.04 17:35:39 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:35:39 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:35:39 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:35:39 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:35:39 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:35:39 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:35:39 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:35:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.197:443 . 2021.10.04 17:35:39 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:35:39 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.197:443 [nonblock] . 2021.10.04 17:35:39 - OpenVPN > TCP connection established with [AF_INET]104.254.90.197:443 . 2021.10.04 17:35:39 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:35:39 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.254.90.197:443 . 2021.10.04 17:35:39 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.197:443, sid=a95acbd8 aae09afb . 2021.10.04 17:35:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:35:39 - OpenVPN > VERIFY KU OK . 2021.10.04 17:35:39 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:35:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:35:39 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:35:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2021.10.04 17:35:40 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:35:40 - OpenVPN > [Sharatan] Peer Connection Initiated with [AF_INET]104.254.90.197:443 . 2021.10.04 17:35:41 - OpenVPN > SENT CONTROL [Sharatan]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:35:41 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:35:41 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:35:41 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:35:41 - Disconnecting . 2021.10.04 17:35:41 - Connection terminated. I 2021.10.04 17:35:44 - Checking authorization ... ! 2021.10.04 17:35:44 - Connecting to Sadalbari (Canada, Toronto, Ontario) . 2021.10.04 17:35:45 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:35:45 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:35:45 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:35:45 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:35:45 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:35:45 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:35:45 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:35:45 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.181:443 . 2021.10.04 17:35:45 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:35:45 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.181:443 [nonblock] . 2021.10.04 17:35:45 - OpenVPN > TCP connection established with [AF_INET]184.75.221.181:443 . 2021.10.04 17:35:45 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:35:45 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.181:443 . 2021.10.04 17:35:45 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.181:443, sid=40c6922c 60dc3457 . 2021.10.04 17:35:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:35:45 - OpenVPN > VERIFY KU OK . 2021.10.04 17:35:45 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:35:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:35:45 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:35:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sadalbari, emailAddress=info@airvpn.org . 2021.10.04 17:35:45 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:35:45 - OpenVPN > [Sadalbari] Peer Connection Initiated with [AF_INET]184.75.221.181:443 . 2021.10.04 17:35:46 - OpenVPN > SENT CONTROL [Sadalbari]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:35:46 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:35:46 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:35:46 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:35:46 - Disconnecting . 2021.10.04 17:35:46 - Connection terminated. I 2021.10.04 17:35:49 - Checking authorization ... ! 2021.10.04 17:35:50 - Connecting to Angetenar (Canada, Toronto, Ontario) . 2021.10.04 17:35:50 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:35:50 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:35:50 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:35:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:35:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:35:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:35:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:35:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.165:443 . 2021.10.04 17:35:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:35:50 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.165:443 [nonblock] . 2021.10.04 17:35:50 - OpenVPN > TCP connection established with [AF_INET]184.75.221.165:443 . 2021.10.04 17:35:50 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:35:50 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.165:443 . 2021.10.04 17:35:50 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.165:443, sid=e18a8b26 3d78446b . 2021.10.04 17:35:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:35:50 - OpenVPN > VERIFY KU OK . 2021.10.04 17:35:50 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:35:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:35:50 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:35:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Angetenar, emailAddress=info@airvpn.org . 2021.10.04 17:35:50 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:35:50 - OpenVPN > [Angetenar] Peer Connection Initiated with [AF_INET]184.75.221.165:443 . 2021.10.04 17:35:51 - OpenVPN > SENT CONTROL [Angetenar]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:35:51 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:35:51 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:35:51 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:35:51 - Disconnecting . 2021.10.04 17:35:51 - Connection terminated. I 2021.10.04 17:35:54 - Checking authorization ... ! 2021.10.04 17:35:55 - Connecting to Sargas (Canada, Toronto, Ontario) . 2021.10.04 17:35:55 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:35:55 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:35:55 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:35:55 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:35:55 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:35:55 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:35:55 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:35:55 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.197:443 . 2021.10.04 17:35:55 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:35:55 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.197:443 [nonblock] . 2021.10.04 17:35:55 - OpenVPN > TCP connection established with [AF_INET]184.75.223.197:443 . 2021.10.04 17:35:55 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:35:55 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.197:443 . 2021.10.04 17:35:55 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.197:443, sid=a1796c24 135627fa . 2021.10.04 17:35:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:35:56 - OpenVPN > VERIFY KU OK . 2021.10.04 17:35:56 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:35:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:35:56 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:35:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sargas, emailAddress=info@airvpn.org . 2021.10.04 17:35:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:35:56 - OpenVPN > [Sargas] Peer Connection Initiated with [AF_INET]184.75.223.197:443 . 2021.10.04 17:35:57 - OpenVPN > SENT CONTROL [Sargas]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:35:57 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:35:57 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:35:57 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:35:57 - Disconnecting . 2021.10.04 17:35:57 - Connection terminated. I 2021.10.04 17:36:00 - Checking authorization ... ! 2021.10.04 17:36:01 - Connecting to Chort (Canada, Toronto, Ontario) . 2021.10.04 17:36:01 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:36:01 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:36:01 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:36:01 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:01 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:01 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:01 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:01 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.237:443 . 2021.10.04 17:36:01 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:36:01 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.237:443 [nonblock] . 2021.10.04 17:36:01 - OpenVPN > TCP connection established with [AF_INET]104.254.90.237:443 . 2021.10.04 17:36:01 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:36:01 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.254.90.237:443 . 2021.10.04 17:36:01 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.237:443, sid=d786d239 1ea1561f . 2021.10.04 17:36:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:36:01 - OpenVPN > VERIFY KU OK . 2021.10.04 17:36:01 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:36:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:36:01 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:36:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chort, emailAddress=info@airvpn.org . 2021.10.04 17:36:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:36:01 - OpenVPN > [Chort] Peer Connection Initiated with [AF_INET]104.254.90.237:443 . 2021.10.04 17:36:02 - OpenVPN > SENT CONTROL [Chort]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:36:03 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:36:03 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:36:03 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:36:03 - Disconnecting . 2021.10.04 17:36:03 - Connection terminated. I 2021.10.04 17:36:06 - Checking authorization ... ! 2021.10.04 17:36:06 - Connecting to Arkab (Canada, Toronto, Ontario) . 2021.10.04 17:36:06 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:36:06 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:36:06 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:36:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.213:443 . 2021.10.04 17:36:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:36:06 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.213:443 [nonblock] . 2021.10.04 17:36:06 - OpenVPN > TCP connection established with [AF_INET]184.75.221.213:443 . 2021.10.04 17:36:06 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:36:06 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.213:443 . 2021.10.04 17:36:06 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.213:443, sid=b8242ed5 0ddb8fb0 . 2021.10.04 17:36:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:36:07 - OpenVPN > VERIFY KU OK . 2021.10.04 17:36:07 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:36:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:36:07 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:36:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Arkab, emailAddress=info@airvpn.org . 2021.10.04 17:36:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:36:07 - OpenVPN > [Arkab] Peer Connection Initiated with [AF_INET]184.75.221.213:443 . 2021.10.04 17:36:08 - OpenVPN > SENT CONTROL [Arkab]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:36:08 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:36:08 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:36:08 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:36:08 - Disconnecting . 2021.10.04 17:36:08 - Connection terminated. I 2021.10.04 17:36:11 - Checking authorization ... ! 2021.10.04 17:36:13 - Connecting to Avior (Canada, Toronto, Ontario) . 2021.10.04 17:36:13 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:36:13 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:36:13 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:36:13 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:13 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:13 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:13 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.237:443 . 2021.10.04 17:36:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:36:13 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.237:443 [nonblock] . 2021.10.04 17:36:13 - OpenVPN > TCP connection established with [AF_INET]184.75.223.237:443 . 2021.10.04 17:36:13 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:36:13 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.237:443 . 2021.10.04 17:36:13 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.237:443, sid=f04069c8 525d9cbf . 2021.10.04 17:36:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:36:13 - OpenVPN > VERIFY KU OK . 2021.10.04 17:36:13 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:36:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:36:13 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:36:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org . 2021.10.04 17:36:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:36:13 - OpenVPN > [Avior] Peer Connection Initiated with [AF_INET]184.75.223.237:443 . 2021.10.04 17:36:14 - OpenVPN > SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:36:14 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:36:14 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:36:14 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:36:14 - Disconnecting . 2021.10.04 17:36:14 - Connection terminated. I 2021.10.04 17:36:17 - Checking authorization ... ! 2021.10.04 17:36:18 - Connecting to Enif (Canada, Toronto, Ontario) . 2021.10.04 17:36:18 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:36:18 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:36:18 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:36:18 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:18 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:18 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:18 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.245:443 . 2021.10.04 17:36:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:36:18 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.245:443 [nonblock] . 2021.10.04 17:36:18 - OpenVPN > TCP connection established with [AF_INET]104.254.90.245:443 . 2021.10.04 17:36:18 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:36:18 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.254.90.245:443 . 2021.10.04 17:36:18 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.245:443, sid=75cfbcc4 4c5fed0b . 2021.10.04 17:36:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:36:18 - OpenVPN > VERIFY KU OK . 2021.10.04 17:36:18 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:36:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:36:18 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:36:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2021.10.04 17:36:18 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:36:18 - OpenVPN > [Enif] Peer Connection Initiated with [AF_INET]104.254.90.245:443 . 2021.10.04 17:36:19 - OpenVPN > SENT CONTROL [Enif]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:36:20 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:36:20 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:36:20 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:36:20 - Disconnecting . 2021.10.04 17:36:20 - Connection terminated. I 2021.10.04 17:36:23 - Checking authorization ... ! 2021.10.04 17:36:23 - Connecting to Alkurhah (Canada, Toronto, Ontario) . 2021.10.04 17:36:23 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:36:23 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:36:23 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:36:23 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:23 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:23 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:23 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.205:443 . 2021.10.04 17:36:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:36:23 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.205:443 [nonblock] . 2021.10.04 17:36:23 - OpenVPN > TCP connection established with [AF_INET]184.75.221.205:443 . 2021.10.04 17:36:23 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:36:23 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.205:443 . 2021.10.04 17:36:23 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.205:443, sid=af5e508e 4b32d3d5 . 2021.10.04 17:36:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:36:24 - OpenVPN > VERIFY KU OK . 2021.10.04 17:36:24 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:36:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:36:24 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:36:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org . 2021.10.04 17:36:24 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:36:24 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.205:443 . 2021.10.04 17:36:25 - OpenVPN > SENT CONTROL [Alkurhah]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:36:25 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:36:25 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:36:25 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:36:25 - Disconnecting . 2021.10.04 17:36:25 - Connection terminated. I 2021.10.04 17:36:28 - Checking authorization ... ! 2021.10.04 17:36:29 - Connecting to Mintaka (Canada, Toronto, Ontario) . 2021.10.04 17:36:29 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:36:29 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:36:29 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:36:29 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:29 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:29 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:29 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.221:443 . 2021.10.04 17:36:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:36:29 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.221:443 [nonblock] . 2021.10.04 17:36:29 - OpenVPN > TCP connection established with [AF_INET]184.75.223.221:443 . 2021.10.04 17:36:29 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:36:29 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.221:443 . 2021.10.04 17:36:29 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.221:443, sid=036ad811 14e52d9d . 2021.10.04 17:36:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:36:29 - OpenVPN > VERIFY KU OK . 2021.10.04 17:36:29 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:36:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:36:29 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:36:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2021.10.04 17:36:29 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:36:29 - OpenVPN > [Mintaka] Peer Connection Initiated with [AF_INET]184.75.223.221:443 . 2021.10.04 17:36:30 - OpenVPN > SENT CONTROL [Mintaka]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:36:31 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:36:31 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:36:31 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:36:31 - Disconnecting . 2021.10.04 17:36:31 - Connection terminated. I 2021.10.04 17:36:34 - Checking authorization ... ! 2021.10.04 17:36:34 - Connecting to Lesath (Canada, Toronto, Ontario) . 2021.10.04 17:36:34 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:36:34 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:36:34 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:36:34 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:34 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:34 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:34 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:34 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.5:443 . 2021.10.04 17:36:34 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:36:34 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.5:443 [nonblock] . 2021.10.04 17:36:34 - OpenVPN > TCP connection established with [AF_INET]184.75.221.5:443 . 2021.10.04 17:36:34 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:36:34 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.5:443 . 2021.10.04 17:36:34 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.5:443, sid=8f1b7dc3 97b4a729 . 2021.10.04 17:36:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:36:35 - OpenVPN > VERIFY KU OK . 2021.10.04 17:36:35 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:36:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:36:35 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:36:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org . 2021.10.04 17:36:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:36:35 - OpenVPN > [Lesath] Peer Connection Initiated with [AF_INET]184.75.221.5:443 . 2021.10.04 17:36:36 - OpenVPN > SENT CONTROL [Lesath]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:36:36 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:36:36 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:36:36 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:36:36 - Disconnecting . 2021.10.04 17:36:36 - Connection terminated. I 2021.10.04 17:36:39 - Checking authorization ... ! 2021.10.04 17:36:40 - Connecting to Alya (Canada, Toronto, Ontario) . 2021.10.04 17:36:40 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:36:40 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:36:40 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:36:40 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:40 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:40 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:40 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.173:443 . 2021.10.04 17:36:40 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:36:40 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.173:443 [nonblock] . 2021.10.04 17:36:40 - OpenVPN > TCP connection established with [AF_INET]184.75.221.173:443 . 2021.10.04 17:36:40 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:36:40 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.173:443 . 2021.10.04 17:36:40 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.173:443, sid=5d6378a2 109d2808 . 2021.10.04 17:36:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:36:40 - OpenVPN > VERIFY KU OK . 2021.10.04 17:36:40 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:36:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:36:40 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:36:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alya, emailAddress=info@airvpn.org . 2021.10.04 17:36:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:36:41 - OpenVPN > [Alya] Peer Connection Initiated with [AF_INET]184.75.221.173:443 . 2021.10.04 17:36:42 - OpenVPN > SENT CONTROL [Alya]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:36:42 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:36:42 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:36:42 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:36:42 - Disconnecting . 2021.10.04 17:36:42 - Connection terminated. I 2021.10.04 17:36:45 - Checking authorization ... ! 2021.10.04 17:36:45 - Connecting to Tegmen (Canada, Toronto, Ontario) . 2021.10.04 17:36:46 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:36:46 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:36:46 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:36:46 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:46 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:46 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:46 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:46 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]137.63.71.53:443 . 2021.10.04 17:36:46 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:36:46 - OpenVPN > Attempting to establish TCP connection with [AF_INET]137.63.71.53:443 [nonblock] . 2021.10.04 17:36:46 - OpenVPN > TCP connection established with [AF_INET]137.63.71.53:443 . 2021.10.04 17:36:46 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:36:46 - OpenVPN > TCP_CLIENT link remote: [AF_INET]137.63.71.53:443 . 2021.10.04 17:36:46 - OpenVPN > TLS: Initial packet from [AF_INET]137.63.71.53:443, sid=290466f8 70d9ea05 . 2021.10.04 17:36:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:36:46 - OpenVPN > VERIFY KU OK . 2021.10.04 17:36:46 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:36:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:36:46 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:36:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org . 2021.10.04 17:36:46 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:36:46 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]137.63.71.53:443 . 2021.10.04 17:36:47 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:36:47 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:36:47 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:36:47 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:36:47 - Disconnecting . 2021.10.04 17:36:47 - Connection terminated. I 2021.10.04 17:36:50 - Checking authorization ... ! 2021.10.04 17:36:51 - Connecting to Alwaid (Canada, Toronto, Ontario) . 2021.10.04 17:36:51 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:36:51 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:36:51 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:36:51 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:51 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:51 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:51 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.117:443 . 2021.10.04 17:36:51 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:36:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.117:443 [nonblock] . 2021.10.04 17:36:51 - OpenVPN > TCP connection established with [AF_INET]184.75.221.117:443 . 2021.10.04 17:36:51 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:36:51 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.117:443 . 2021.10.04 17:36:51 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.117:443, sid=dced678e f6138adf . 2021.10.04 17:36:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:36:51 - OpenVPN > VERIFY KU OK . 2021.10.04 17:36:51 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:36:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:36:51 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:36:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org . 2021.10.04 17:36:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:36:52 - OpenVPN > [Alwaid] Peer Connection Initiated with [AF_INET]184.75.221.117:443 . 2021.10.04 17:36:53 - OpenVPN > SENT CONTROL [Alwaid]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:36:53 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:36:53 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:36:53 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:36:53 - Disconnecting . 2021.10.04 17:36:53 - Connection terminated. I 2021.10.04 17:36:56 - Checking authorization ... ! 2021.10.04 17:36:57 - Connecting to Gorgonea (Canada, Toronto, Ontario) . 2021.10.04 17:36:57 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:36:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:36:57 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:36:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:36:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:36:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.253:443 . 2021.10.04 17:36:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:36:57 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.253:443 [nonblock] . 2021.10.04 17:36:57 - OpenVPN > TCP connection established with [AF_INET]104.254.90.253:443 . 2021.10.04 17:36:57 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:36:57 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.254.90.253:443 . 2021.10.04 17:36:57 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.253:443, sid=ccc42ed2 4b1b6ecd . 2021.10.04 17:36:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:36:57 - OpenVPN > VERIFY KU OK . 2021.10.04 17:36:57 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:36:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:36:57 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:36:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Gorgonea, emailAddress=info@airvpn.org . 2021.10.04 17:36:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:36:57 - OpenVPN > [Gorgonea] Peer Connection Initiated with [AF_INET]104.254.90.253:443 . 2021.10.04 17:36:58 - OpenVPN > SENT CONTROL [Gorgonea]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:36:58 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:36:58 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:36:58 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:36:58 - Disconnecting . 2021.10.04 17:36:58 - Connection terminated. I 2021.10.04 17:37:01 - Checking authorization ... ! 2021.10.04 17:37:02 - Connecting to Sualocin (Canada, Toronto, Ontario) . 2021.10.04 17:37:02 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:37:02 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:37:02 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:37:02 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:37:02 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:37:02 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:37:02 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:37:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.45:443 . 2021.10.04 17:37:02 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:37:02 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.45:443 [nonblock] . 2021.10.04 17:37:02 - OpenVPN > TCP connection established with [AF_INET]184.75.221.45:443 . 2021.10.04 17:37:02 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:37:02 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.45:443 . 2021.10.04 17:37:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.45:443, sid=b5ef10af 9e87d73f . 2021.10.04 17:37:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:37:02 - OpenVPN > VERIFY KU OK . 2021.10.04 17:37:02 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:37:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:37:02 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:37:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sualocin, emailAddress=info@airvpn.org . 2021.10.04 17:37:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:37:03 - OpenVPN > [Sualocin] Peer Connection Initiated with [AF_INET]184.75.221.45:443 . 2021.10.04 17:37:04 - OpenVPN > SENT CONTROL [Sualocin]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:37:04 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:37:04 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:37:04 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:37:04 - Disconnecting . 2021.10.04 17:37:04 - Connection terminated. I 2021.10.04 17:37:07 - Checking authorization ... ! 2021.10.04 17:37:07 - Connecting to Alhena (Canada, Toronto, Ontario) . 2021.10.04 17:37:08 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:37:08 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:37:08 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:37:08 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:37:08 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:37:08 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:37:08 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:37:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.5:443 . 2021.10.04 17:37:08 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:37:08 - OpenVPN > Attempting to establish TCP connection with [AF_INET]162.219.176.5:443 [nonblock] . 2021.10.04 17:37:08 - OpenVPN > TCP connection established with [AF_INET]162.219.176.5:443 . 2021.10.04 17:37:08 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:37:08 - OpenVPN > TCP_CLIENT link remote: [AF_INET]162.219.176.5:443 . 2021.10.04 17:37:08 - OpenVPN > TLS: Initial packet from [AF_INET]162.219.176.5:443, sid=c7a6835a 14afbfae . 2021.10.04 17:37:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:37:08 - OpenVPN > VERIFY KU OK . 2021.10.04 17:37:08 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:37:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:37:08 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:37:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alhena, emailAddress=info@airvpn.org . 2021.10.04 17:37:08 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:37:08 - OpenVPN > [Alhena] Peer Connection Initiated with [AF_INET]162.219.176.5:443 . 2021.10.04 17:37:09 - OpenVPN > SENT CONTROL [Alhena]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:37:09 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:37:09 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:37:09 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:37:09 - Disconnecting . 2021.10.04 17:37:09 - Connection terminated. I 2021.10.04 17:37:12 - Checking authorization ... ! 2021.10.04 17:37:13 - Connecting to Rotanev (Canada, Toronto, Ontario) . 2021.10.04 17:37:13 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:37:13 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:37:13 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:37:13 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:37:13 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:37:13 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:37:13 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:37:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.189:443 . 2021.10.04 17:37:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:37:13 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.189:443 [nonblock] . 2021.10.04 17:37:13 - OpenVPN > TCP connection established with [AF_INET]104.254.90.189:443 . 2021.10.04 17:37:13 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:37:13 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.254.90.189:443 . 2021.10.04 17:37:13 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.189:443, sid=c5ae2b51 d8d6ce46 . 2021.10.04 17:37:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:37:13 - OpenVPN > VERIFY KU OK . 2021.10.04 17:37:13 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:37:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:37:13 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:37:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Rotanev, emailAddress=info@airvpn.org . 2021.10.04 17:37:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:37:14 - OpenVPN > [Rotanev] Peer Connection Initiated with [AF_INET]104.254.90.189:443 . 2021.10.04 17:37:15 - OpenVPN > SENT CONTROL [Rotanev]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:37:15 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:37:15 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:37:15 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:37:15 - Disconnecting . 2021.10.04 17:37:15 - Connection terminated. I 2021.10.04 17:37:18 - Checking authorization ... ! 2021.10.04 17:37:19 - Connecting to Regulus (Canada, Toronto, Ontario) . 2021.10.04 17:37:19 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.10.04 17:37:19 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.10.04 17:37:19 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.10.04 17:37:19 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:37:19 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:37:19 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.10.04 17:37:19 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.10.04 17:37:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.37:443 . 2021.10.04 17:37:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.10.04 17:37:19 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.37:443 [nonblock] . 2021.10.04 17:37:19 - OpenVPN > TCP connection established with [AF_INET]184.75.221.37:443 . 2021.10.04 17:37:19 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.10.04 17:37:19 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.37:443 . 2021.10.04 17:37:19 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.37:443, sid=cbd5fd8c 2f7b4c11 . 2021.10.04 17:37:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.10.04 17:37:19 - OpenVPN > VERIFY KU OK . 2021.10.04 17:37:19 - OpenVPN > Validating certificate extended key usage . 2021.10.04 17:37:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.10.04 17:37:19 - OpenVPN > VERIFY EKU OK . 2021.10.04 17:37:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2021.10.04 17:37:19 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.10.04 17:37:19 - OpenVPN > [Regulus] Peer Connection Initiated with [AF_INET]184.75.221.37:443 . 2021.10.04 17:37:20 - OpenVPN > SENT CONTROL [Regulus]: 'PUSH_REQUEST' (status=1) W 2021.10.04 17:37:21 - Authorization failed. Look at the client area to discover the reason. . 2021.10.04 17:37:21 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.10.04 17:37:21 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting ! 2021.10.04 17:37:21 - Disconnecting . 2021.10.04 17:37:21 - Connection terminated. I 2021.10.04 17:37:24 - Cancel requested. ! 2021.10.04 17:37:24 - Session terminated. Edited ... by OpenSourcerer Apply LOG format to logs Quote Share this post Link to post
OpenSourcerer 1435 Posted ... Just now, tgiby3 said: Check Client area to find out why.\ And have you? 1 tgiby3 reacted to this Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
tgiby3 0 Posted ... What am I checking for? There are no listed error or anything to suggest the service IS OR ISNT working Quote Share this post Link to post
OpenSourcerer 1435 Posted ... The error message suggests that the error is with your account, not with a server or even AirVPN itself. Possible reasons include usage of a certificate that is not there and your account having no access to the service itself because it's unpaid or something. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
tgiby3 0 Posted ... It's paid, and the Client Page suggests everything should be working. A redditor just figured it out on my post from months ago. Despite un-installing and re-installing Eddie after it deleted my Ethernet drivers, Eddie was not re-installing with what ever a "TAP driver" is. I re-installed Eddie as system admin and now it works. The Client page was worthless Quote Share this post Link to post
OpenSourcerer 1435 Posted ... Just now, tgiby3 said: The Client page was worthless No, the error message was misleading. Though, another problem was insufficient information. You only posted the logs, but the support file (Logs tab > lifebelt icon) would've been a dead giveaway. Besides, now that you mention it, the OpenVPN process halts right before the TAP interface is to be opened, but you don't see that right away. In any case, I'm glad it works now. Enjoy! Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
PortlyNinja 17 Posted ... It's paid, and the Client Page suggests everything should be working. A redditor just figured it out on my post from months ago. Despite un-installing and re-installing Eddie after it deleted my Ethernet drivers, Eddie was not re-installing with what ever a "TAP driver" is. I re-installed Eddie as system admin and now it works. The Client page was worthless THanks for this mate. exact same issue out of no where, subcription paid also, one day it says Auth Failed blah blah and some crap about certificates. Your reinstall as Admin worked for me too, which is odd. Why normal reinstall didnt work is wierd too. anyway. Ta! Quote Share this post Link to post
Staff 9968 Posted ... @PortlyNinja@tgiby3 Hello! Each time you renew your client key and certificate in your account "Devices" panel you need to log your account out and in again from Eddie main window, as you might have read in the instructions. In this way you force Eddie to download the new pairs. If Eddie sends an expired certificate you will get AUTH_FAILED from the VPN server, and not from the infrastructure, so no message is visible in the Client Area, in spite of the wrong suggestion by Eddie, we're sorry. The TAP driver is the driver which handles the virtual network interface used by OpenVPN. Only administrators, according to system default settings and ordinary practice in the last decades, can install system drivers. Windows lacks any such driver so it needs this additional installation of some third-party tun/tap driver for the tun/tap interfaces .The wintun driver, which is supported by OpenVPN 2.5 and higher versions, and by Eddie, is a more modern driver to drive the tun/tap interfaces. If you have issues caused by the TAP driver, including poor performance, try the wintun driver. You can activate it from Eddie's "Preferences" > "Advanced" window: check "Use wintun driver", click "Save" and re-start Eddie. Kind regards 5 gl0562, Reissgrant, Bertie_W and 2 others reacted to this Quote Share this post Link to post
mecdeva 11 Posted ... I am so glad I found this discussion; it saved me from tearing my hair out. I was having a similar issue; I seemed to be stuck in a loop trying to connect to a server no matter what I did. . So rather than go through all sorts of lengthy troubleshooting from scratch, I came here and found this discussion. I started by doing what was suggested above. I first uninstalled Eddie. Then I downloaded a fresh copy from AirVPN and ran the setup file with elevated privileges. After the setup was completed I also opened Eddie with administrative privileges. And boom! That immediately solved my issue. 😁 Thanks everyone. Quote Share this post Link to post
Reissgrant 0 Posted ... On 1/12/2022 at 4:29 AM, Staff said: @PortlyNinja@tgiby3 Hello! Each time you renew your client key and certificate in your account "Devices" panel you need to log your account out and in again from Eddie main window, as you might have read in the instructions. In this way you force Eddie to download the new pairs. If Eddie sends an expired certificate you will get AUTH_FAILED from the VPN server, and not from the infrastructure, so no message is visible in the Client Area, in spite of the wrong suggestion by Eddie, we're sorry. The TAP driver is the driver which handles the virtual network interface used by OpenVPN. Only administrators, according to system default settings and ordinary practice in the last decades, can install system drivers. Windows lacks any such driver so it needs this additional installation of some third-party tun/tap driver for the tun/tap interfaces .The wintun driver, which is supported by OpenVPN 2.5 and higher versions, and by Eddie, is a more modern driver to drive the tun/tap interfaces. If you have issues caused by the TAP driver, including poor performance, try the wintun driver. You can activate it from Eddie's "Preferences" > "Advanced" window: check "Use wintun driver", click "Save" and re-start Eddie. Kind regards This just fixed my "Auth Failed" issue. Thank you! Quote Share this post Link to post
saint_david 0 Posted ... If it helps anyone else, downloading and installing the tap driver from the following link resolved the same issue for me:https://swupdate.openvpn.org/community/releases/tap-windows-9.21.2.exe Quote Share this post Link to post
Blasio 0 Posted ... (edited) On 1/12/2022 at 1:29 AM, Staff said: @PortlyNinja@tgiby3 Hello! Each time you renew your client key and certificate in your account "Devices" panel you need to log your account out and in again from Eddie main window, as you might have read in the instructions. In this way you force Eddie to download the new pairs. If Eddie sends an expired certificate you will get AUTH_FAILED from the VPN server, and not from the infrastructure, so no message is visible in the Client Area, in spite of the wrong suggestion by Eddie, we're sorry. The TAP driver is the driver which handles the virtual network interface used by OpenVPN. Only administrators, according to system default settings and ordinary practice in the last decades, can install system drivers. Windows lacks any such driver so it needs this additional installation of some third-party tun/tap driver for the tun/tap interfaces .The wintun driver, which is supported by OpenVPN 2.5 and higher versions, and by Eddie, is a more modern driver to drive the tun/tap interfaces. If you have issues caused by the TAP driver, including poor performance, try the wintun driver. You can activate it from Eddie's "Preferences" > "Advanced" window: check "Use wintun driver", click "Save" and re-start Eddie. Kind regards I'm also having the same problem. The "Use wintun driver" option is not available on my advanced page. Tried installing new Eddie client via admin privilege but still no luck. Tried installing tap driver linked. No dice. Edited ... by Blasio Quote Share this post Link to post
Tanchingis 0 Posted ... On 10/10/2022 at 5:31 AM, Blasio said: I'm also having the same problem. The "Use wintun driver" option is not available on my advanced page. Tried installing new Eddie client via admin privilege but still no luck. Tried installing tap driver linked. No dice. Same problem here. However, I'm on ubuntu, so needless to say that wintun and this tap driver can't work. I uninstalled and installed eddie but the error message comes back again. I renewed my subscription a couple of days ago. Nothing unusual in my client area. I would appreciate if you could help me.🤗 Quote Share this post Link to post
Staff 9968 Posted ... @Blasio@Tanchingis Hello! You have both renewed your client certificate recently. Each time you renew your client key and certificate in your account "Devices" panel you need to log your account out and in again from Eddie main window (uncheck "Remember me" to be sure that Eddie really resets the credentials), as you might have read in the instructions. In this way you force Eddie to download the new pairs. If Eddie via OpenVPN sends an expired certificate you will get AUTH_FAILED from the VPN server, and not from the infrastructure, so no message is visible in the Client Area, in spite of the wrong suggestion by Eddie, we're sorry. Kind regards 1 Tanchingis reacted to this Quote Share this post Link to post
Tanchingis 0 Posted ... On 10/31/2022 at 9:16 AM, Staff said: @Blasio@Tanchingis Hello! You have both renewed your client certificate recently. Each time you renew your client key and certificate in your account "Devices" panel you need to log your account out and in again from Eddie main window (uncheck "Remember me" to be sure that Eddie really resets the credentials), as you might have read in the instructions. In this way you force Eddie to download the new pairs. If Eddie via OpenVPN sends an expired certificate you will get AUTH_FAILED from the VPN server, and not from the infrastructure, so no message is visible in the Client Area, in spite of the wrong suggestion by Eddie, we're sorry. Kind regards Thanks so much for your explanation and advice, it worked. 😀 Just to warn everybody else, the latency test may last for more than half an hour, but in the end, it pays off. Quote Share this post Link to post
Staff 9968 Posted ... 53 minutes ago, Tanchingis said: Thanks so much for your explanation and advice, it worked. 😀 Just to warn everybody else, the latency test may last for more than half an hour, but in the end, it pays off. Thank you, we're glad to know that the problem is resolved! About the "latency tests", half an hour is not normal. The long time is probably caused by a bug affecting various Eddie versions. The problem has been addressed in latest Eddie 2.22.2, feel free to test it and check whether the problem has been sorted out or not. To download it, in the usual download page for your system click "Other version", select "Experimental" and you will be brought back to the download page, pointing this time to 2.22.2. Download and install as usual. Kind regards Quote Share this post Link to post