Jump to content
Not connected, Your IP: 52.203.18.65

Recommended Posts

Posted ... (edited)

Just Loops Auth Failed, Check Client area to find out why.\

Logs make no sense to me.

. 2021.10.04 17:34:42 - Eddie version: 2.20.0 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.19043.0, Mono/.Net: v4.0.30319
. 2021.10.04 17:34:42 - Command line arguments (1): path="home"
. 2021.10.04 17:34:44 - Profile path: C:\Users\ggiby\AppData\Local\Eddie\default.profile
. 2021.10.04 17:34:44 - Reading options from C:\Users\ggiby\AppData\Local\Eddie\default.profile
. 2021.10.04 17:34:46 - Tun Driver - 0901: 9.24.2; wintun: Not found
. 2021.10.04 17:34:46 - OpenVPN - Version: 2.5.1 - OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2021.10.04 17:34:46 - SSH - Version: plink 0.73
. 2021.10.04 17:34:46 -     Build platform: 64-bit x86 Windows
. 2021.10.04 17:34:46 -     Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800
. 2021.10.04 17:34:46 -     Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe)
. 2021.10.04 17:34:46 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe)
I 2021.10.04 17:34:47 - Ready
. 2021.10.04 17:34:48 - Collect information about AirVPN completed
I 2021.10.04 17:34:51 - Session starting.
I 2021.10.04 17:34:51 - Checking authorization ...
! 2021.10.04 17:34:52 - Connecting to Saiph (Canada, Toronto, Ontario)
. 2021.10.04 17:34:52 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:34:52 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:34:52 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:34:52 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:34:52 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:34:52 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:34:52 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:34:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.229:443
. 2021.10.04 17:34:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:34:52 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.229:443 [nonblock]
. 2021.10.04 17:34:52 - OpenVPN > TCP connection established with [AF_INET]184.75.223.229:443
. 2021.10.04 17:34:52 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:34:52 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.229:443
. 2021.10.04 17:34:52 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.229:443, sid=aea5c842 bc740cfb
. 2021.10.04 17:34:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:34:52 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:34:52 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:34:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:34:52 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:34:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2021.10.04 17:34:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:34:53 - OpenVPN > [Saiph] Peer Connection Initiated with [AF_INET]184.75.223.229:443
. 2021.10.04 17:34:54 - OpenVPN > SENT CONTROL [Saiph]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:34:54 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:34:54 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:34:54 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:34:54 - Disconnecting
. 2021.10.04 17:34:54 - Connection terminated.
I 2021.10.04 17:34:57 - Checking authorization ...
! 2021.10.04 17:34:57 - Connecting to Agena (Canada, Toronto, Ontario)
. 2021.10.04 17:34:57 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:34:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:34:57 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:34:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:34:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:34:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:34:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:34:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.213:443
. 2021.10.04 17:34:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:34:57 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.213:443 [nonblock]
. 2021.10.04 17:34:57 - OpenVPN > TCP connection established with [AF_INET]184.75.223.213:443
. 2021.10.04 17:34:57 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:34:57 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.213:443
. 2021.10.04 17:34:58 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.213:443, sid=511cb4f4 bb16c622
. 2021.10.04 17:34:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:34:58 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:34:58 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:34:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:34:58 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:34:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Agena, emailAddress=info@airvpn.org
. 2021.10.04 17:34:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:34:58 - OpenVPN > [Agena] Peer Connection Initiated with [AF_INET]184.75.223.213:443
! 2021.10.04 17:34:59 - Disconnecting
. 2021.10.04 17:34:59 - Sending soft termination signal
. 2021.10.04 17:35:02 - Connection terminated.
. 2021.10.04 17:35:02 - OpenVPN > SIGTERM[hard,] received, process exiting
I 2021.10.04 17:35:02 - Cancel requested.
! 2021.10.04 17:35:02 - Session terminated.
I 2021.10.04 17:35:33 - Session starting.
I 2021.10.04 17:35:33 - Checking authorization ...
! 2021.10.04 17:35:34 - Connecting to Agena (Canada, Toronto, Ontario)
. 2021.10.04 17:35:34 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:35:34 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:35:34 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:35:34 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:34 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:34 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:34 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:34 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.213:443
. 2021.10.04 17:35:34 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:35:34 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.213:443 [nonblock]
. 2021.10.04 17:35:34 - OpenVPN > TCP connection established with [AF_INET]184.75.223.213:443
. 2021.10.04 17:35:34 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:35:34 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.213:443
. 2021.10.04 17:35:34 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.213:443, sid=96de6638 b674f479
. 2021.10.04 17:35:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:35:34 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:35:34 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:35:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:35:34 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:35:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Agena, emailAddress=info@airvpn.org
. 2021.10.04 17:35:34 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:35:34 - OpenVPN > [Agena] Peer Connection Initiated with [AF_INET]184.75.223.213:443
. 2021.10.04 17:35:35 - OpenVPN > SENT CONTROL [Agena]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:35:35 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:35:35 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:35:35 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:35:35 - Disconnecting
. 2021.10.04 17:35:35 - Connection terminated.
I 2021.10.04 17:35:38 - Checking authorization ...
! 2021.10.04 17:35:39 - Connecting to Sharatan (Canada, Toronto, Ontario)
. 2021.10.04 17:35:39 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:35:39 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:35:39 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:35:39 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:39 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:39 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:39 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.197:443
. 2021.10.04 17:35:39 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:35:39 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.197:443 [nonblock]
. 2021.10.04 17:35:39 - OpenVPN > TCP connection established with [AF_INET]104.254.90.197:443
. 2021.10.04 17:35:39 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:35:39 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.254.90.197:443
. 2021.10.04 17:35:39 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.197:443, sid=a95acbd8 aae09afb
. 2021.10.04 17:35:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:35:39 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:35:39 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:35:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:35:39 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:35:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org
. 2021.10.04 17:35:40 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:35:40 - OpenVPN > [Sharatan] Peer Connection Initiated with [AF_INET]104.254.90.197:443
. 2021.10.04 17:35:41 - OpenVPN > SENT CONTROL [Sharatan]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:35:41 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:35:41 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:35:41 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:35:41 - Disconnecting
. 2021.10.04 17:35:41 - Connection terminated.
I 2021.10.04 17:35:44 - Checking authorization ...
! 2021.10.04 17:35:44 - Connecting to Sadalbari (Canada, Toronto, Ontario)
. 2021.10.04 17:35:45 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:35:45 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:35:45 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:35:45 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:45 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:45 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:45 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:45 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.181:443
. 2021.10.04 17:35:45 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:35:45 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.181:443 [nonblock]
. 2021.10.04 17:35:45 - OpenVPN > TCP connection established with [AF_INET]184.75.221.181:443
. 2021.10.04 17:35:45 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:35:45 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.181:443
. 2021.10.04 17:35:45 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.181:443, sid=40c6922c 60dc3457
. 2021.10.04 17:35:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:35:45 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:35:45 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:35:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:35:45 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:35:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sadalbari, emailAddress=info@airvpn.org
. 2021.10.04 17:35:45 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:35:45 - OpenVPN > [Sadalbari] Peer Connection Initiated with [AF_INET]184.75.221.181:443
. 2021.10.04 17:35:46 - OpenVPN > SENT CONTROL [Sadalbari]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:35:46 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:35:46 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:35:46 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:35:46 - Disconnecting
. 2021.10.04 17:35:46 - Connection terminated.
I 2021.10.04 17:35:49 - Checking authorization ...
! 2021.10.04 17:35:50 - Connecting to Angetenar (Canada, Toronto, Ontario)
. 2021.10.04 17:35:50 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:35:50 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:35:50 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:35:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.165:443
. 2021.10.04 17:35:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:35:50 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.165:443 [nonblock]
. 2021.10.04 17:35:50 - OpenVPN > TCP connection established with [AF_INET]184.75.221.165:443
. 2021.10.04 17:35:50 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:35:50 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.165:443
. 2021.10.04 17:35:50 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.165:443, sid=e18a8b26 3d78446b
. 2021.10.04 17:35:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:35:50 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:35:50 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:35:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:35:50 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:35:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Angetenar, emailAddress=info@airvpn.org
. 2021.10.04 17:35:50 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:35:50 - OpenVPN > [Angetenar] Peer Connection Initiated with [AF_INET]184.75.221.165:443
. 2021.10.04 17:35:51 - OpenVPN > SENT CONTROL [Angetenar]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:35:51 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:35:51 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:35:51 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:35:51 - Disconnecting
. 2021.10.04 17:35:51 - Connection terminated.
I 2021.10.04 17:35:54 - Checking authorization ...
! 2021.10.04 17:35:55 - Connecting to Sargas (Canada, Toronto, Ontario)
. 2021.10.04 17:35:55 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:35:55 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:35:55 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:35:55 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:55 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:55 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:55 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:55 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.197:443
. 2021.10.04 17:35:55 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:35:55 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.197:443 [nonblock]
. 2021.10.04 17:35:55 - OpenVPN > TCP connection established with [AF_INET]184.75.223.197:443
. 2021.10.04 17:35:55 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:35:55 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.197:443
. 2021.10.04 17:35:55 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.197:443, sid=a1796c24 135627fa
. 2021.10.04 17:35:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:35:56 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:35:56 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:35:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:35:56 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:35:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sargas, emailAddress=info@airvpn.org
. 2021.10.04 17:35:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:35:56 - OpenVPN > [Sargas] Peer Connection Initiated with [AF_INET]184.75.223.197:443
. 2021.10.04 17:35:57 - OpenVPN > SENT CONTROL [Sargas]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:35:57 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:35:57 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:35:57 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:35:57 - Disconnecting
. 2021.10.04 17:35:57 - Connection terminated.
I 2021.10.04 17:36:00 - Checking authorization ...
! 2021.10.04 17:36:01 - Connecting to Chort (Canada, Toronto, Ontario)
. 2021.10.04 17:36:01 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:01 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:01 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:01 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:01 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:01 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:01 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:01 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.237:443
. 2021.10.04 17:36:01 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:01 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.237:443 [nonblock]
. 2021.10.04 17:36:01 - OpenVPN > TCP connection established with [AF_INET]104.254.90.237:443
. 2021.10.04 17:36:01 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:01 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.254.90.237:443
. 2021.10.04 17:36:01 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.237:443, sid=d786d239 1ea1561f
. 2021.10.04 17:36:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:01 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:01 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:01 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chort, emailAddress=info@airvpn.org
. 2021.10.04 17:36:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:01 - OpenVPN > [Chort] Peer Connection Initiated with [AF_INET]104.254.90.237:443
. 2021.10.04 17:36:02 - OpenVPN > SENT CONTROL [Chort]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:03 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:03 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:03 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:03 - Disconnecting
. 2021.10.04 17:36:03 - Connection terminated.
I 2021.10.04 17:36:06 - Checking authorization ...
! 2021.10.04 17:36:06 - Connecting to Arkab (Canada, Toronto, Ontario)
. 2021.10.04 17:36:06 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:06 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:06 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.213:443
. 2021.10.04 17:36:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:06 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.213:443 [nonblock]
. 2021.10.04 17:36:06 - OpenVPN > TCP connection established with [AF_INET]184.75.221.213:443
. 2021.10.04 17:36:06 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:06 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.213:443
. 2021.10.04 17:36:06 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.213:443, sid=b8242ed5 0ddb8fb0
. 2021.10.04 17:36:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:07 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:07 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:07 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Arkab, emailAddress=info@airvpn.org
. 2021.10.04 17:36:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:07 - OpenVPN > [Arkab] Peer Connection Initiated with [AF_INET]184.75.221.213:443
. 2021.10.04 17:36:08 - OpenVPN > SENT CONTROL [Arkab]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:08 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:08 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:08 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:08 - Disconnecting
. 2021.10.04 17:36:08 - Connection terminated.
I 2021.10.04 17:36:11 - Checking authorization ...
! 2021.10.04 17:36:13 - Connecting to Avior (Canada, Toronto, Ontario)
. 2021.10.04 17:36:13 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:13 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:13 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:13 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:13 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:13 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:13 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.237:443
. 2021.10.04 17:36:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:13 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.237:443 [nonblock]
. 2021.10.04 17:36:13 - OpenVPN > TCP connection established with [AF_INET]184.75.223.237:443
. 2021.10.04 17:36:13 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:13 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.237:443
. 2021.10.04 17:36:13 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.237:443, sid=f04069c8 525d9cbf
. 2021.10.04 17:36:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:13 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:13 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:13 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org
. 2021.10.04 17:36:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:13 - OpenVPN > [Avior] Peer Connection Initiated with [AF_INET]184.75.223.237:443
. 2021.10.04 17:36:14 - OpenVPN > SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:14 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:14 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:14 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:14 - Disconnecting
. 2021.10.04 17:36:14 - Connection terminated.
I 2021.10.04 17:36:17 - Checking authorization ...
! 2021.10.04 17:36:18 - Connecting to Enif (Canada, Toronto, Ontario)
. 2021.10.04 17:36:18 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:18 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:18 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:18 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:18 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:18 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:18 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.245:443
. 2021.10.04 17:36:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:18 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.245:443 [nonblock]
. 2021.10.04 17:36:18 - OpenVPN > TCP connection established with [AF_INET]104.254.90.245:443
. 2021.10.04 17:36:18 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:18 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.254.90.245:443
. 2021.10.04 17:36:18 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.245:443, sid=75cfbcc4 4c5fed0b
. 2021.10.04 17:36:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:18 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:18 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:18 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org
. 2021.10.04 17:36:18 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:18 - OpenVPN > [Enif] Peer Connection Initiated with [AF_INET]104.254.90.245:443
. 2021.10.04 17:36:19 - OpenVPN > SENT CONTROL [Enif]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:20 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:20 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:20 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:20 - Disconnecting
. 2021.10.04 17:36:20 - Connection terminated.
I 2021.10.04 17:36:23 - Checking authorization ...
! 2021.10.04 17:36:23 - Connecting to Alkurhah (Canada, Toronto, Ontario)
. 2021.10.04 17:36:23 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:23 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:23 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:23 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:23 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:23 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:23 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.205:443
. 2021.10.04 17:36:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:23 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.205:443 [nonblock]
. 2021.10.04 17:36:23 - OpenVPN > TCP connection established with [AF_INET]184.75.221.205:443
. 2021.10.04 17:36:23 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:23 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.205:443
. 2021.10.04 17:36:23 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.205:443, sid=af5e508e 4b32d3d5
. 2021.10.04 17:36:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:24 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:24 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:24 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2021.10.04 17:36:24 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:24 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.205:443
. 2021.10.04 17:36:25 - OpenVPN > SENT CONTROL [Alkurhah]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:25 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:25 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:25 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:25 - Disconnecting
. 2021.10.04 17:36:25 - Connection terminated.
I 2021.10.04 17:36:28 - Checking authorization ...
! 2021.10.04 17:36:29 - Connecting to Mintaka (Canada, Toronto, Ontario)
. 2021.10.04 17:36:29 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:29 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:29 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:29 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:29 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:29 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:29 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.221:443
. 2021.10.04 17:36:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:29 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.221:443 [nonblock]
. 2021.10.04 17:36:29 - OpenVPN > TCP connection established with [AF_INET]184.75.223.221:443
. 2021.10.04 17:36:29 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:29 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.221:443
. 2021.10.04 17:36:29 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.221:443, sid=036ad811 14e52d9d
. 2021.10.04 17:36:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:29 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:29 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:29 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2021.10.04 17:36:29 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:29 - OpenVPN > [Mintaka] Peer Connection Initiated with [AF_INET]184.75.223.221:443
. 2021.10.04 17:36:30 - OpenVPN > SENT CONTROL [Mintaka]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:31 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:31 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:31 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:31 - Disconnecting
. 2021.10.04 17:36:31 - Connection terminated.
I 2021.10.04 17:36:34 - Checking authorization ...
! 2021.10.04 17:36:34 - Connecting to Lesath (Canada, Toronto, Ontario)
. 2021.10.04 17:36:34 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:34 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:34 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:34 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:34 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:34 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:34 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:34 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.5:443
. 2021.10.04 17:36:34 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:34 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.5:443 [nonblock]
. 2021.10.04 17:36:34 - OpenVPN > TCP connection established with [AF_INET]184.75.221.5:443
. 2021.10.04 17:36:34 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:34 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.5:443
. 2021.10.04 17:36:34 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.5:443, sid=8f1b7dc3 97b4a729
. 2021.10.04 17:36:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:35 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:35 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:35 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2021.10.04 17:36:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:35 - OpenVPN > [Lesath] Peer Connection Initiated with [AF_INET]184.75.221.5:443
. 2021.10.04 17:36:36 - OpenVPN > SENT CONTROL [Lesath]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:36 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:36 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:36 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:36 - Disconnecting
. 2021.10.04 17:36:36 - Connection terminated.
I 2021.10.04 17:36:39 - Checking authorization ...
! 2021.10.04 17:36:40 - Connecting to Alya (Canada, Toronto, Ontario)
. 2021.10.04 17:36:40 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:40 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:40 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:40 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:40 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:40 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:40 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.173:443
. 2021.10.04 17:36:40 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:40 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.173:443 [nonblock]
. 2021.10.04 17:36:40 - OpenVPN > TCP connection established with [AF_INET]184.75.221.173:443
. 2021.10.04 17:36:40 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:40 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.173:443
. 2021.10.04 17:36:40 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.173:443, sid=5d6378a2 109d2808
. 2021.10.04 17:36:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:40 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:40 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:40 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alya, emailAddress=info@airvpn.org
. 2021.10.04 17:36:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:41 - OpenVPN > [Alya] Peer Connection Initiated with [AF_INET]184.75.221.173:443
. 2021.10.04 17:36:42 - OpenVPN > SENT CONTROL [Alya]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:42 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:42 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:42 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:42 - Disconnecting
. 2021.10.04 17:36:42 - Connection terminated.
I 2021.10.04 17:36:45 - Checking authorization ...
! 2021.10.04 17:36:45 - Connecting to Tegmen (Canada, Toronto, Ontario)
. 2021.10.04 17:36:46 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:46 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:46 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:46 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:46 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:46 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:46 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:46 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]137.63.71.53:443
. 2021.10.04 17:36:46 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:46 - OpenVPN > Attempting to establish TCP connection with [AF_INET]137.63.71.53:443 [nonblock]
. 2021.10.04 17:36:46 - OpenVPN > TCP connection established with [AF_INET]137.63.71.53:443
. 2021.10.04 17:36:46 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:46 - OpenVPN > TCP_CLIENT link remote: [AF_INET]137.63.71.53:443
. 2021.10.04 17:36:46 - OpenVPN > TLS: Initial packet from [AF_INET]137.63.71.53:443, sid=290466f8 70d9ea05
. 2021.10.04 17:36:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:46 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:46 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:46 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org
. 2021.10.04 17:36:46 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:46 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]137.63.71.53:443
. 2021.10.04 17:36:47 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:47 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:47 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:47 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:47 - Disconnecting
. 2021.10.04 17:36:47 - Connection terminated.
I 2021.10.04 17:36:50 - Checking authorization ...
! 2021.10.04 17:36:51 - Connecting to Alwaid (Canada, Toronto, Ontario)
. 2021.10.04 17:36:51 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:51 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:51 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:51 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:51 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:51 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:51 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.117:443
. 2021.10.04 17:36:51 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.117:443 [nonblock]
. 2021.10.04 17:36:51 - OpenVPN > TCP connection established with [AF_INET]184.75.221.117:443
. 2021.10.04 17:36:51 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:51 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.117:443
. 2021.10.04 17:36:51 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.117:443, sid=dced678e f6138adf
. 2021.10.04 17:36:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:51 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:51 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:51 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org
. 2021.10.04 17:36:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:52 - OpenVPN > [Alwaid] Peer Connection Initiated with [AF_INET]184.75.221.117:443
. 2021.10.04 17:36:53 - OpenVPN > SENT CONTROL [Alwaid]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:53 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:53 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:53 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:53 - Disconnecting
. 2021.10.04 17:36:53 - Connection terminated.
I 2021.10.04 17:36:56 - Checking authorization ...
! 2021.10.04 17:36:57 - Connecting to Gorgonea (Canada, Toronto, Ontario)
. 2021.10.04 17:36:57 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:57 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.253:443
. 2021.10.04 17:36:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:57 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.253:443 [nonblock]
. 2021.10.04 17:36:57 - OpenVPN > TCP connection established with [AF_INET]104.254.90.253:443
. 2021.10.04 17:36:57 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:57 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.254.90.253:443
. 2021.10.04 17:36:57 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.253:443, sid=ccc42ed2 4b1b6ecd
. 2021.10.04 17:36:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:57 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:57 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:57 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Gorgonea, emailAddress=info@airvpn.org
. 2021.10.04 17:36:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:57 - OpenVPN > [Gorgonea] Peer Connection Initiated with [AF_INET]104.254.90.253:443
. 2021.10.04 17:36:58 - OpenVPN > SENT CONTROL [Gorgonea]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:58 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:58 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:58 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:58 - Disconnecting
. 2021.10.04 17:36:58 - Connection terminated.
I 2021.10.04 17:37:01 - Checking authorization ...
! 2021.10.04 17:37:02 - Connecting to Sualocin (Canada, Toronto, Ontario)
. 2021.10.04 17:37:02 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:37:02 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:37:02 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:37:02 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:37:02 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:37:02 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:37:02 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:37:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.45:443
. 2021.10.04 17:37:02 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:37:02 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.45:443 [nonblock]
. 2021.10.04 17:37:02 - OpenVPN > TCP connection established with [AF_INET]184.75.221.45:443
. 2021.10.04 17:37:02 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:37:02 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.45:443
. 2021.10.04 17:37:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.45:443, sid=b5ef10af 9e87d73f
. 2021.10.04 17:37:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:37:02 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:37:02 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:37:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:37:02 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:37:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sualocin, emailAddress=info@airvpn.org
. 2021.10.04 17:37:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:37:03 - OpenVPN > [Sualocin] Peer Connection Initiated with [AF_INET]184.75.221.45:443
. 2021.10.04 17:37:04 - OpenVPN > SENT CONTROL [Sualocin]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:37:04 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:37:04 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:37:04 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:37:04 - Disconnecting
. 2021.10.04 17:37:04 - Connection terminated.
I 2021.10.04 17:37:07 - Checking authorization ...
! 2021.10.04 17:37:07 - Connecting to Alhena (Canada, Toronto, Ontario)
. 2021.10.04 17:37:08 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:37:08 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:37:08 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:37:08 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:37:08 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:37:08 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:37:08 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:37:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.5:443
. 2021.10.04 17:37:08 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:37:08 - OpenVPN > Attempting to establish TCP connection with [AF_INET]162.219.176.5:443 [nonblock]
. 2021.10.04 17:37:08 - OpenVPN > TCP connection established with [AF_INET]162.219.176.5:443
. 2021.10.04 17:37:08 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:37:08 - OpenVPN > TCP_CLIENT link remote: [AF_INET]162.219.176.5:443
. 2021.10.04 17:37:08 - OpenVPN > TLS: Initial packet from [AF_INET]162.219.176.5:443, sid=c7a6835a 14afbfae
. 2021.10.04 17:37:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:37:08 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:37:08 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:37:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:37:08 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:37:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alhena, emailAddress=info@airvpn.org
. 2021.10.04 17:37:08 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:37:08 - OpenVPN > [Alhena] Peer Connection Initiated with [AF_INET]162.219.176.5:443
. 2021.10.04 17:37:09 - OpenVPN > SENT CONTROL [Alhena]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:37:09 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:37:09 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:37:09 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:37:09 - Disconnecting
. 2021.10.04 17:37:09 - Connection terminated.
I 2021.10.04 17:37:12 - Checking authorization ...
! 2021.10.04 17:37:13 - Connecting to Rotanev (Canada, Toronto, Ontario)
. 2021.10.04 17:37:13 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:37:13 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:37:13 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:37:13 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:37:13 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:37:13 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:37:13 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:37:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.189:443
. 2021.10.04 17:37:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:37:13 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.189:443 [nonblock]
. 2021.10.04 17:37:13 - OpenVPN > TCP connection established with [AF_INET]104.254.90.189:443
. 2021.10.04 17:37:13 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:37:13 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.254.90.189:443
. 2021.10.04 17:37:13 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.189:443, sid=c5ae2b51 d8d6ce46
. 2021.10.04 17:37:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:37:13 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:37:13 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:37:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:37:13 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:37:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Rotanev, emailAddress=info@airvpn.org
. 2021.10.04 17:37:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:37:14 - OpenVPN > [Rotanev] Peer Connection Initiated with [AF_INET]104.254.90.189:443
. 2021.10.04 17:37:15 - OpenVPN > SENT CONTROL [Rotanev]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:37:15 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:37:15 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:37:15 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:37:15 - Disconnecting
. 2021.10.04 17:37:15 - Connection terminated.
I 2021.10.04 17:37:18 - Checking authorization ...
! 2021.10.04 17:37:19 - Connecting to Regulus (Canada, Toronto, Ontario)
. 2021.10.04 17:37:19 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:37:19 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:37:19 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:37:19 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:37:19 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:37:19 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:37:19 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:37:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.37:443
. 2021.10.04 17:37:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:37:19 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.37:443 [nonblock]
. 2021.10.04 17:37:19 - OpenVPN > TCP connection established with [AF_INET]184.75.221.37:443
. 2021.10.04 17:37:19 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:37:19 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.37:443
. 2021.10.04 17:37:19 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.37:443, sid=cbd5fd8c 2f7b4c11
. 2021.10.04 17:37:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:37:19 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:37:19 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:37:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:37:19 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:37:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org
. 2021.10.04 17:37:19 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:37:19 - OpenVPN > [Regulus] Peer Connection Initiated with [AF_INET]184.75.221.37:443
. 2021.10.04 17:37:20 - OpenVPN > SENT CONTROL [Regulus]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:37:21 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:37:21 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:37:21 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:37:21 - Disconnecting
. 2021.10.04 17:37:21 - Connection terminated.
I 2021.10.04 17:37:24 - Cancel requested.
! 2021.10.04 17:37:24 - Session terminated.

Edited ... by OpenSourcerer
Apply LOG format to logs

Share this post


Link to post
Just now, tgiby3 said:

Check Client area to find out why.\


And have you?

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Unofficial Eddie for Android F-Droid repository: repo.opensourcery.eu

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

What am I checking for? There are no listed error or anything to suggest the service IS OR ISNT working 

Share this post


Link to post

The error message suggests that the error is with your account, not with a server or even AirVPN itself. Possible reasons include usage of a certificate that is not there and your account having no access to the service itself because it's unpaid or something.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Unofficial Eddie for Android F-Droid repository: repo.opensourcery.eu

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

It's paid, and the Client Page suggests everything should be working. A redditor just figured it out on my post from months ago. Despite un-installing and re-installing Eddie after it deleted my Ethernet drivers, Eddie was not re-installing with what ever a "TAP driver" is.
I re-installed Eddie as system admin and now it works. The Client page was worthless 

Share this post


Link to post
Just now, tgiby3 said:

The Client page was worthless


No, the error message was misleading.
Though, another problem was insufficient information. You only posted the logs, but the support file (Logs tab > lifebelt icon) would've been a dead giveaway. Besides, now that you mention it, the OpenVPN process halts right before the TAP interface is to be opened, but you don't see that right away. :)

In any case, I'm glad it works now. Enjoy!

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Unofficial Eddie for Android F-Droid repository: repo.opensourcery.eu

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

It's paid, and the Client Page suggests everything should be working. A redditor just figured it out on my post from months ago. Despite un-installing and re-installing Eddie after it deleted my Ethernet drivers, Eddie was not re-installing with what ever a "TAP driver" is.
I re-installed Eddie as system admin and now it works. The Client page was worthless 

THanks for this mate. exact same issue out of no where, subcription paid also, one day it says Auth Failed blah blah and some crap about certificates. Your reinstall as Admin worked for me too, which is odd. Why normal reinstall didnt work is wierd too. anyway. Ta!

Share this post


Link to post
@PortlyNinja
@tgiby3

Hello!

Each time you renew your client key and certificate in your account "Devices" panel you need to log your account out and in again from Eddie main window, as you might have read in the instructions. In this way you force Eddie  to download the new pairs. If Eddie sends an expired certificate you will get AUTH_FAILED from the VPN server, and not form the infrastructure, so no message is visible in the Client Area, in spite of the wrong suggestion by Eddie, we're sorry.

The TAP driver is the driver which handles the virtual network interface used by OpenVPN. Only administrators, according to system default settings and ordinary practice in the last decades, can install system drivers. Windows lacks any such driver so it needs this additional installation of some third-party tun/tap driver for the tun/tap interfaces .The wintun driver, which is supported by OpenVPN 2.5 and higher versions, and by Eddie, is a more modern driver to drive the tun/tap interfaces. If you have issues caused by the TAP driver, including poor performance, try the wintun driver. You can activate it from Eddie's "Preferences" > "Advanced" window: check "Use wintun driver", click "Save" and re-start Eddie.

Kind regards
 

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...