Jump to content
Not connected, Your IP: 3.236.253.192

Recommended Posts

Posted ... (edited)

Just Loops Auth Failed, Check Client area to find out why.\

Logs make no sense to me.

. 2021.10.04 17:34:42 - Eddie version: 2.20.0 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.19043.0, Mono/.Net: v4.0.30319
. 2021.10.04 17:34:42 - Command line arguments (1): path="home"
. 2021.10.04 17:34:44 - Profile path: C:\Users\ggiby\AppData\Local\Eddie\default.profile
. 2021.10.04 17:34:44 - Reading options from C:\Users\ggiby\AppData\Local\Eddie\default.profile
. 2021.10.04 17:34:46 - Tun Driver - 0901: 9.24.2; wintun: Not found
. 2021.10.04 17:34:46 - OpenVPN - Version: 2.5.1 - OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2021.10.04 17:34:46 - SSH - Version: plink 0.73
. 2021.10.04 17:34:46 -     Build platform: 64-bit x86 Windows
. 2021.10.04 17:34:46 -     Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800
. 2021.10.04 17:34:46 -     Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe)
. 2021.10.04 17:34:46 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe)
I 2021.10.04 17:34:47 - Ready
. 2021.10.04 17:34:48 - Collect information about AirVPN completed
I 2021.10.04 17:34:51 - Session starting.
I 2021.10.04 17:34:51 - Checking authorization ...
! 2021.10.04 17:34:52 - Connecting to Saiph (Canada, Toronto, Ontario)
. 2021.10.04 17:34:52 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:34:52 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:34:52 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:34:52 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:34:52 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:34:52 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:34:52 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:34:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.229:443
. 2021.10.04 17:34:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:34:52 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.229:443 [nonblock]
. 2021.10.04 17:34:52 - OpenVPN > TCP connection established with [AF_INET]184.75.223.229:443
. 2021.10.04 17:34:52 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:34:52 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.229:443
. 2021.10.04 17:34:52 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.229:443, sid=aea5c842 bc740cfb
. 2021.10.04 17:34:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:34:52 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:34:52 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:34:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:34:52 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:34:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2021.10.04 17:34:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:34:53 - OpenVPN > [Saiph] Peer Connection Initiated with [AF_INET]184.75.223.229:443
. 2021.10.04 17:34:54 - OpenVPN > SENT CONTROL [Saiph]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:34:54 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:34:54 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:34:54 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:34:54 - Disconnecting
. 2021.10.04 17:34:54 - Connection terminated.
I 2021.10.04 17:34:57 - Checking authorization ...
! 2021.10.04 17:34:57 - Connecting to Agena (Canada, Toronto, Ontario)
. 2021.10.04 17:34:57 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:34:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:34:57 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:34:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:34:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:34:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:34:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:34:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.213:443
. 2021.10.04 17:34:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:34:57 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.213:443 [nonblock]
. 2021.10.04 17:34:57 - OpenVPN > TCP connection established with [AF_INET]184.75.223.213:443
. 2021.10.04 17:34:57 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:34:57 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.213:443
. 2021.10.04 17:34:58 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.213:443, sid=511cb4f4 bb16c622
. 2021.10.04 17:34:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:34:58 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:34:58 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:34:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:34:58 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:34:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Agena, emailAddress=info@airvpn.org
. 2021.10.04 17:34:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:34:58 - OpenVPN > [Agena] Peer Connection Initiated with [AF_INET]184.75.223.213:443
! 2021.10.04 17:34:59 - Disconnecting
. 2021.10.04 17:34:59 - Sending soft termination signal
. 2021.10.04 17:35:02 - Connection terminated.
. 2021.10.04 17:35:02 - OpenVPN > SIGTERM[hard,] received, process exiting
I 2021.10.04 17:35:02 - Cancel requested.
! 2021.10.04 17:35:02 - Session terminated.
I 2021.10.04 17:35:33 - Session starting.
I 2021.10.04 17:35:33 - Checking authorization ...
! 2021.10.04 17:35:34 - Connecting to Agena (Canada, Toronto, Ontario)
. 2021.10.04 17:35:34 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:35:34 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:35:34 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:35:34 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:34 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:34 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:34 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:34 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.213:443
. 2021.10.04 17:35:34 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:35:34 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.213:443 [nonblock]
. 2021.10.04 17:35:34 - OpenVPN > TCP connection established with [AF_INET]184.75.223.213:443
. 2021.10.04 17:35:34 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:35:34 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.213:443
. 2021.10.04 17:35:34 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.213:443, sid=96de6638 b674f479
. 2021.10.04 17:35:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:35:34 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:35:34 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:35:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:35:34 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:35:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Agena, emailAddress=info@airvpn.org
. 2021.10.04 17:35:34 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:35:34 - OpenVPN > [Agena] Peer Connection Initiated with [AF_INET]184.75.223.213:443
. 2021.10.04 17:35:35 - OpenVPN > SENT CONTROL [Agena]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:35:35 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:35:35 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:35:35 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:35:35 - Disconnecting
. 2021.10.04 17:35:35 - Connection terminated.
I 2021.10.04 17:35:38 - Checking authorization ...
! 2021.10.04 17:35:39 - Connecting to Sharatan (Canada, Toronto, Ontario)
. 2021.10.04 17:35:39 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:35:39 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:35:39 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:35:39 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:39 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:39 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:39 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.197:443
. 2021.10.04 17:35:39 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:35:39 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.197:443 [nonblock]
. 2021.10.04 17:35:39 - OpenVPN > TCP connection established with [AF_INET]104.254.90.197:443
. 2021.10.04 17:35:39 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:35:39 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.254.90.197:443
. 2021.10.04 17:35:39 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.197:443, sid=a95acbd8 aae09afb
. 2021.10.04 17:35:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:35:39 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:35:39 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:35:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:35:39 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:35:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org
. 2021.10.04 17:35:40 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:35:40 - OpenVPN > [Sharatan] Peer Connection Initiated with [AF_INET]104.254.90.197:443
. 2021.10.04 17:35:41 - OpenVPN > SENT CONTROL [Sharatan]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:35:41 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:35:41 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:35:41 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:35:41 - Disconnecting
. 2021.10.04 17:35:41 - Connection terminated.
I 2021.10.04 17:35:44 - Checking authorization ...
! 2021.10.04 17:35:44 - Connecting to Sadalbari (Canada, Toronto, Ontario)
. 2021.10.04 17:35:45 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:35:45 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:35:45 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:35:45 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:45 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:45 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:45 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:45 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.181:443
. 2021.10.04 17:35:45 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:35:45 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.181:443 [nonblock]
. 2021.10.04 17:35:45 - OpenVPN > TCP connection established with [AF_INET]184.75.221.181:443
. 2021.10.04 17:35:45 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:35:45 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.181:443
. 2021.10.04 17:35:45 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.181:443, sid=40c6922c 60dc3457
. 2021.10.04 17:35:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:35:45 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:35:45 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:35:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:35:45 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:35:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sadalbari, emailAddress=info@airvpn.org
. 2021.10.04 17:35:45 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:35:45 - OpenVPN > [Sadalbari] Peer Connection Initiated with [AF_INET]184.75.221.181:443
. 2021.10.04 17:35:46 - OpenVPN > SENT CONTROL [Sadalbari]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:35:46 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:35:46 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:35:46 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:35:46 - Disconnecting
. 2021.10.04 17:35:46 - Connection terminated.
I 2021.10.04 17:35:49 - Checking authorization ...
! 2021.10.04 17:35:50 - Connecting to Angetenar (Canada, Toronto, Ontario)
. 2021.10.04 17:35:50 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:35:50 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:35:50 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:35:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.165:443
. 2021.10.04 17:35:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:35:50 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.165:443 [nonblock]
. 2021.10.04 17:35:50 - OpenVPN > TCP connection established with [AF_INET]184.75.221.165:443
. 2021.10.04 17:35:50 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:35:50 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.165:443
. 2021.10.04 17:35:50 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.165:443, sid=e18a8b26 3d78446b
. 2021.10.04 17:35:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:35:50 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:35:50 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:35:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:35:50 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:35:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Angetenar, emailAddress=info@airvpn.org
. 2021.10.04 17:35:50 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:35:50 - OpenVPN > [Angetenar] Peer Connection Initiated with [AF_INET]184.75.221.165:443
. 2021.10.04 17:35:51 - OpenVPN > SENT CONTROL [Angetenar]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:35:51 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:35:51 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:35:51 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:35:51 - Disconnecting
. 2021.10.04 17:35:51 - Connection terminated.
I 2021.10.04 17:35:54 - Checking authorization ...
! 2021.10.04 17:35:55 - Connecting to Sargas (Canada, Toronto, Ontario)
. 2021.10.04 17:35:55 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:35:55 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:35:55 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:35:55 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:55 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:55 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:35:55 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:35:55 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.197:443
. 2021.10.04 17:35:55 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:35:55 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.197:443 [nonblock]
. 2021.10.04 17:35:55 - OpenVPN > TCP connection established with [AF_INET]184.75.223.197:443
. 2021.10.04 17:35:55 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:35:55 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.197:443
. 2021.10.04 17:35:55 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.197:443, sid=a1796c24 135627fa
. 2021.10.04 17:35:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:35:56 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:35:56 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:35:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:35:56 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:35:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sargas, emailAddress=info@airvpn.org
. 2021.10.04 17:35:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:35:56 - OpenVPN > [Sargas] Peer Connection Initiated with [AF_INET]184.75.223.197:443
. 2021.10.04 17:35:57 - OpenVPN > SENT CONTROL [Sargas]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:35:57 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:35:57 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:35:57 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:35:57 - Disconnecting
. 2021.10.04 17:35:57 - Connection terminated.
I 2021.10.04 17:36:00 - Checking authorization ...
! 2021.10.04 17:36:01 - Connecting to Chort (Canada, Toronto, Ontario)
. 2021.10.04 17:36:01 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:01 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:01 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:01 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:01 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:01 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:01 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:01 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.237:443
. 2021.10.04 17:36:01 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:01 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.237:443 [nonblock]
. 2021.10.04 17:36:01 - OpenVPN > TCP connection established with [AF_INET]104.254.90.237:443
. 2021.10.04 17:36:01 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:01 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.254.90.237:443
. 2021.10.04 17:36:01 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.237:443, sid=d786d239 1ea1561f
. 2021.10.04 17:36:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:01 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:01 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:01 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chort, emailAddress=info@airvpn.org
. 2021.10.04 17:36:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:01 - OpenVPN > [Chort] Peer Connection Initiated with [AF_INET]104.254.90.237:443
. 2021.10.04 17:36:02 - OpenVPN > SENT CONTROL [Chort]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:03 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:03 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:03 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:03 - Disconnecting
. 2021.10.04 17:36:03 - Connection terminated.
I 2021.10.04 17:36:06 - Checking authorization ...
! 2021.10.04 17:36:06 - Connecting to Arkab (Canada, Toronto, Ontario)
. 2021.10.04 17:36:06 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:06 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:06 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.213:443
. 2021.10.04 17:36:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:06 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.213:443 [nonblock]
. 2021.10.04 17:36:06 - OpenVPN > TCP connection established with [AF_INET]184.75.221.213:443
. 2021.10.04 17:36:06 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:06 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.213:443
. 2021.10.04 17:36:06 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.213:443, sid=b8242ed5 0ddb8fb0
. 2021.10.04 17:36:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:07 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:07 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:07 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Arkab, emailAddress=info@airvpn.org
. 2021.10.04 17:36:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:07 - OpenVPN > [Arkab] Peer Connection Initiated with [AF_INET]184.75.221.213:443
. 2021.10.04 17:36:08 - OpenVPN > SENT CONTROL [Arkab]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:08 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:08 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:08 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:08 - Disconnecting
. 2021.10.04 17:36:08 - Connection terminated.
I 2021.10.04 17:36:11 - Checking authorization ...
! 2021.10.04 17:36:13 - Connecting to Avior (Canada, Toronto, Ontario)
. 2021.10.04 17:36:13 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:13 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:13 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:13 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:13 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:13 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:13 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.237:443
. 2021.10.04 17:36:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:13 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.237:443 [nonblock]
. 2021.10.04 17:36:13 - OpenVPN > TCP connection established with [AF_INET]184.75.223.237:443
. 2021.10.04 17:36:13 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:13 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.237:443
. 2021.10.04 17:36:13 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.237:443, sid=f04069c8 525d9cbf
. 2021.10.04 17:36:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:13 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:13 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:13 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org
. 2021.10.04 17:36:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:13 - OpenVPN > [Avior] Peer Connection Initiated with [AF_INET]184.75.223.237:443
. 2021.10.04 17:36:14 - OpenVPN > SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:14 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:14 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:14 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:14 - Disconnecting
. 2021.10.04 17:36:14 - Connection terminated.
I 2021.10.04 17:36:17 - Checking authorization ...
! 2021.10.04 17:36:18 - Connecting to Enif (Canada, Toronto, Ontario)
. 2021.10.04 17:36:18 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:18 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:18 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:18 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:18 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:18 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:18 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.245:443
. 2021.10.04 17:36:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:18 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.245:443 [nonblock]
. 2021.10.04 17:36:18 - OpenVPN > TCP connection established with [AF_INET]104.254.90.245:443
. 2021.10.04 17:36:18 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:18 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.254.90.245:443
. 2021.10.04 17:36:18 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.245:443, sid=75cfbcc4 4c5fed0b
. 2021.10.04 17:36:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:18 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:18 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:18 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org
. 2021.10.04 17:36:18 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:18 - OpenVPN > [Enif] Peer Connection Initiated with [AF_INET]104.254.90.245:443
. 2021.10.04 17:36:19 - OpenVPN > SENT CONTROL [Enif]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:20 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:20 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:20 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:20 - Disconnecting
. 2021.10.04 17:36:20 - Connection terminated.
I 2021.10.04 17:36:23 - Checking authorization ...
! 2021.10.04 17:36:23 - Connecting to Alkurhah (Canada, Toronto, Ontario)
. 2021.10.04 17:36:23 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:23 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:23 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:23 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:23 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:23 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:23 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.205:443
. 2021.10.04 17:36:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:23 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.205:443 [nonblock]
. 2021.10.04 17:36:23 - OpenVPN > TCP connection established with [AF_INET]184.75.221.205:443
. 2021.10.04 17:36:23 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:23 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.205:443
. 2021.10.04 17:36:23 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.205:443, sid=af5e508e 4b32d3d5
. 2021.10.04 17:36:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:24 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:24 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:24 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2021.10.04 17:36:24 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:24 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.205:443
. 2021.10.04 17:36:25 - OpenVPN > SENT CONTROL [Alkurhah]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:25 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:25 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:25 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:25 - Disconnecting
. 2021.10.04 17:36:25 - Connection terminated.
I 2021.10.04 17:36:28 - Checking authorization ...
! 2021.10.04 17:36:29 - Connecting to Mintaka (Canada, Toronto, Ontario)
. 2021.10.04 17:36:29 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:29 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:29 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:29 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:29 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:29 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:29 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.221:443
. 2021.10.04 17:36:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:29 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.223.221:443 [nonblock]
. 2021.10.04 17:36:29 - OpenVPN > TCP connection established with [AF_INET]184.75.223.221:443
. 2021.10.04 17:36:29 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:29 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.223.221:443
. 2021.10.04 17:36:29 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.221:443, sid=036ad811 14e52d9d
. 2021.10.04 17:36:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:29 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:29 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:29 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2021.10.04 17:36:29 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:29 - OpenVPN > [Mintaka] Peer Connection Initiated with [AF_INET]184.75.223.221:443
. 2021.10.04 17:36:30 - OpenVPN > SENT CONTROL [Mintaka]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:31 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:31 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:31 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:31 - Disconnecting
. 2021.10.04 17:36:31 - Connection terminated.
I 2021.10.04 17:36:34 - Checking authorization ...
! 2021.10.04 17:36:34 - Connecting to Lesath (Canada, Toronto, Ontario)
. 2021.10.04 17:36:34 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:34 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:34 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:34 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:34 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:34 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:34 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:34 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.5:443
. 2021.10.04 17:36:34 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:34 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.5:443 [nonblock]
. 2021.10.04 17:36:34 - OpenVPN > TCP connection established with [AF_INET]184.75.221.5:443
. 2021.10.04 17:36:34 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:34 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.5:443
. 2021.10.04 17:36:34 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.5:443, sid=8f1b7dc3 97b4a729
. 2021.10.04 17:36:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:35 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:35 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:35 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2021.10.04 17:36:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:35 - OpenVPN > [Lesath] Peer Connection Initiated with [AF_INET]184.75.221.5:443
. 2021.10.04 17:36:36 - OpenVPN > SENT CONTROL [Lesath]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:36 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:36 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:36 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:36 - Disconnecting
. 2021.10.04 17:36:36 - Connection terminated.
I 2021.10.04 17:36:39 - Checking authorization ...
! 2021.10.04 17:36:40 - Connecting to Alya (Canada, Toronto, Ontario)
. 2021.10.04 17:36:40 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:40 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:40 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:40 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:40 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:40 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:40 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.173:443
. 2021.10.04 17:36:40 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:40 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.173:443 [nonblock]
. 2021.10.04 17:36:40 - OpenVPN > TCP connection established with [AF_INET]184.75.221.173:443
. 2021.10.04 17:36:40 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:40 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.173:443
. 2021.10.04 17:36:40 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.173:443, sid=5d6378a2 109d2808
. 2021.10.04 17:36:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:40 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:40 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:40 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alya, emailAddress=info@airvpn.org
. 2021.10.04 17:36:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:41 - OpenVPN > [Alya] Peer Connection Initiated with [AF_INET]184.75.221.173:443
. 2021.10.04 17:36:42 - OpenVPN > SENT CONTROL [Alya]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:42 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:42 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:42 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:42 - Disconnecting
. 2021.10.04 17:36:42 - Connection terminated.
I 2021.10.04 17:36:45 - Checking authorization ...
! 2021.10.04 17:36:45 - Connecting to Tegmen (Canada, Toronto, Ontario)
. 2021.10.04 17:36:46 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:46 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:46 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:46 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:46 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:46 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:46 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:46 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]137.63.71.53:443
. 2021.10.04 17:36:46 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:46 - OpenVPN > Attempting to establish TCP connection with [AF_INET]137.63.71.53:443 [nonblock]
. 2021.10.04 17:36:46 - OpenVPN > TCP connection established with [AF_INET]137.63.71.53:443
. 2021.10.04 17:36:46 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:46 - OpenVPN > TCP_CLIENT link remote: [AF_INET]137.63.71.53:443
. 2021.10.04 17:36:46 - OpenVPN > TLS: Initial packet from [AF_INET]137.63.71.53:443, sid=290466f8 70d9ea05
. 2021.10.04 17:36:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:46 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:46 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:46 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org
. 2021.10.04 17:36:46 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:46 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]137.63.71.53:443
. 2021.10.04 17:36:47 - OpenVPN > SENT CONTROL [Tegmen]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:47 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:47 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:47 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:47 - Disconnecting
. 2021.10.04 17:36:47 - Connection terminated.
I 2021.10.04 17:36:50 - Checking authorization ...
! 2021.10.04 17:36:51 - Connecting to Alwaid (Canada, Toronto, Ontario)
. 2021.10.04 17:36:51 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:51 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:51 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:51 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:51 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:51 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:51 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.117:443
. 2021.10.04 17:36:51 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.117:443 [nonblock]
. 2021.10.04 17:36:51 - OpenVPN > TCP connection established with [AF_INET]184.75.221.117:443
. 2021.10.04 17:36:51 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:51 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.117:443
. 2021.10.04 17:36:51 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.117:443, sid=dced678e f6138adf
. 2021.10.04 17:36:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:51 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:51 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:51 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org
. 2021.10.04 17:36:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:52 - OpenVPN > [Alwaid] Peer Connection Initiated with [AF_INET]184.75.221.117:443
. 2021.10.04 17:36:53 - OpenVPN > SENT CONTROL [Alwaid]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:53 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:53 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:53 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:53 - Disconnecting
. 2021.10.04 17:36:53 - Connection terminated.
I 2021.10.04 17:36:56 - Checking authorization ...
! 2021.10.04 17:36:57 - Connecting to Gorgonea (Canada, Toronto, Ontario)
. 2021.10.04 17:36:57 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:36:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:36:57 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:36:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:36:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:36:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.253:443
. 2021.10.04 17:36:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:36:57 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.253:443 [nonblock]
. 2021.10.04 17:36:57 - OpenVPN > TCP connection established with [AF_INET]104.254.90.253:443
. 2021.10.04 17:36:57 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:36:57 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.254.90.253:443
. 2021.10.04 17:36:57 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.253:443, sid=ccc42ed2 4b1b6ecd
. 2021.10.04 17:36:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:36:57 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:36:57 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:36:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:36:57 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:36:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Gorgonea, emailAddress=info@airvpn.org
. 2021.10.04 17:36:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:36:57 - OpenVPN > [Gorgonea] Peer Connection Initiated with [AF_INET]104.254.90.253:443
. 2021.10.04 17:36:58 - OpenVPN > SENT CONTROL [Gorgonea]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:36:58 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:36:58 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:36:58 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:36:58 - Disconnecting
. 2021.10.04 17:36:58 - Connection terminated.
I 2021.10.04 17:37:01 - Checking authorization ...
! 2021.10.04 17:37:02 - Connecting to Sualocin (Canada, Toronto, Ontario)
. 2021.10.04 17:37:02 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:37:02 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:37:02 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:37:02 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:37:02 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:37:02 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:37:02 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:37:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.45:443
. 2021.10.04 17:37:02 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:37:02 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.45:443 [nonblock]
. 2021.10.04 17:37:02 - OpenVPN > TCP connection established with [AF_INET]184.75.221.45:443
. 2021.10.04 17:37:02 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:37:02 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.45:443
. 2021.10.04 17:37:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.45:443, sid=b5ef10af 9e87d73f
. 2021.10.04 17:37:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:37:02 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:37:02 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:37:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:37:02 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:37:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sualocin, emailAddress=info@airvpn.org
. 2021.10.04 17:37:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:37:03 - OpenVPN > [Sualocin] Peer Connection Initiated with [AF_INET]184.75.221.45:443
. 2021.10.04 17:37:04 - OpenVPN > SENT CONTROL [Sualocin]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:37:04 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:37:04 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:37:04 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:37:04 - Disconnecting
. 2021.10.04 17:37:04 - Connection terminated.
I 2021.10.04 17:37:07 - Checking authorization ...
! 2021.10.04 17:37:07 - Connecting to Alhena (Canada, Toronto, Ontario)
. 2021.10.04 17:37:08 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:37:08 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:37:08 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:37:08 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:37:08 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:37:08 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:37:08 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:37:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.5:443
. 2021.10.04 17:37:08 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:37:08 - OpenVPN > Attempting to establish TCP connection with [AF_INET]162.219.176.5:443 [nonblock]
. 2021.10.04 17:37:08 - OpenVPN > TCP connection established with [AF_INET]162.219.176.5:443
. 2021.10.04 17:37:08 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:37:08 - OpenVPN > TCP_CLIENT link remote: [AF_INET]162.219.176.5:443
. 2021.10.04 17:37:08 - OpenVPN > TLS: Initial packet from [AF_INET]162.219.176.5:443, sid=c7a6835a 14afbfae
. 2021.10.04 17:37:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:37:08 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:37:08 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:37:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:37:08 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:37:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alhena, emailAddress=info@airvpn.org
. 2021.10.04 17:37:08 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:37:08 - OpenVPN > [Alhena] Peer Connection Initiated with [AF_INET]162.219.176.5:443
. 2021.10.04 17:37:09 - OpenVPN > SENT CONTROL [Alhena]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:37:09 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:37:09 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:37:09 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:37:09 - Disconnecting
. 2021.10.04 17:37:09 - Connection terminated.
I 2021.10.04 17:37:12 - Checking authorization ...
! 2021.10.04 17:37:13 - Connecting to Rotanev (Canada, Toronto, Ontario)
. 2021.10.04 17:37:13 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:37:13 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:37:13 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:37:13 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:37:13 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:37:13 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:37:13 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:37:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.189:443
. 2021.10.04 17:37:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:37:13 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.189:443 [nonblock]
. 2021.10.04 17:37:13 - OpenVPN > TCP connection established with [AF_INET]104.254.90.189:443
. 2021.10.04 17:37:13 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:37:13 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.254.90.189:443
. 2021.10.04 17:37:13 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.189:443, sid=c5ae2b51 d8d6ce46
. 2021.10.04 17:37:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:37:13 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:37:13 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:37:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:37:13 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:37:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Rotanev, emailAddress=info@airvpn.org
. 2021.10.04 17:37:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:37:14 - OpenVPN > [Rotanev] Peer Connection Initiated with [AF_INET]104.254.90.189:443
. 2021.10.04 17:37:15 - OpenVPN > SENT CONTROL [Rotanev]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:37:15 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:37:15 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:37:15 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:37:15 - Disconnecting
. 2021.10.04 17:37:15 - Connection terminated.
I 2021.10.04 17:37:18 - Checking authorization ...
! 2021.10.04 17:37:19 - Connecting to Regulus (Canada, Toronto, Ontario)
. 2021.10.04 17:37:19 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2021.10.04 17:37:19 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2021.10.04 17:37:19 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2021.10.04 17:37:19 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:37:19 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:37:19 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2021.10.04 17:37:19 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2021.10.04 17:37:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.37:443
. 2021.10.04 17:37:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2021.10.04 17:37:19 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.37:443 [nonblock]
. 2021.10.04 17:37:19 - OpenVPN > TCP connection established with [AF_INET]184.75.221.37:443
. 2021.10.04 17:37:19 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2021.10.04 17:37:19 - OpenVPN > TCP_CLIENT link remote: [AF_INET]184.75.221.37:443
. 2021.10.04 17:37:19 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.37:443, sid=cbd5fd8c 2f7b4c11
. 2021.10.04 17:37:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2021.10.04 17:37:19 - OpenVPN > VERIFY KU OK
. 2021.10.04 17:37:19 - OpenVPN > Validating certificate extended key usage
. 2021.10.04 17:37:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2021.10.04 17:37:19 - OpenVPN > VERIFY EKU OK
. 2021.10.04 17:37:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org
. 2021.10.04 17:37:19 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2021.10.04 17:37:19 - OpenVPN > [Regulus] Peer Connection Initiated with [AF_INET]184.75.221.37:443
. 2021.10.04 17:37:20 - OpenVPN > SENT CONTROL [Regulus]: 'PUSH_REQUEST' (status=1)
W 2021.10.04 17:37:21 - Authorization failed. Look at the client area to discover the reason.
. 2021.10.04 17:37:21 - OpenVPN > AUTH: Received control message: AUTH_FAILED
. 2021.10.04 17:37:21 - OpenVPN > SIGTERM[soft,auth-failure] received, process exiting
! 2021.10.04 17:37:21 - Disconnecting
. 2021.10.04 17:37:21 - Connection terminated.
I 2021.10.04 17:37:24 - Cancel requested.
! 2021.10.04 17:37:24 - Session terminated.

Edited ... by OpenSourcerer
Apply LOG format to logs

Share this post


Link to post
Just now, tgiby3 said:

Check Client area to find out why.\


And have you?

» I am not an AirVPN team member. All opinions are my own and are not official. Refer to Staff postings for the official word.

» These are the community forums, not the support portal. You're writing with other users here.

» New here? LZ1's New User Guide to AirVPN. Use the search function, Luke!

» Tor exits behind a VPN connection are discouraged. Using Tor on the other hand is not.

 

» Privacy is like alcohol: Drink a little and it can help you stay unnoticed. Drink a lot and everyone will notice you.

» I cannot give you the solution to all your issues. But I can guide you to it. The rest is up to you.

Share this post


Link to post

What am I checking for? There are no listed error or anything to suggest the service IS OR ISNT working 

Share this post


Link to post

The error message suggests that the error is with your account, not with a server or even AirVPN itself. Possible reasons include usage of a certificate that is not there and your account having no access to the service itself because it's unpaid or something.


» I am not an AirVPN team member. All opinions are my own and are not official. Refer to Staff postings for the official word.

» These are the community forums, not the support portal. You're writing with other users here.

» New here? LZ1's New User Guide to AirVPN. Use the search function, Luke!

» Tor exits behind a VPN connection are discouraged. Using Tor on the other hand is not.

 

» Privacy is like alcohol: Drink a little and it can help you stay unnoticed. Drink a lot and everyone will notice you.

» I cannot give you the solution to all your issues. But I can guide you to it. The rest is up to you.

Share this post


Link to post

It's paid, and the Client Page suggests everything should be working. A redditor just figured it out on my post from months ago. Despite un-installing and re-installing Eddie after it deleted my Ethernet drivers, Eddie was not re-installing with what ever a "TAP driver" is.
I re-installed Eddie as system admin and now it works. The Client page was worthless 

Share this post


Link to post
Just now, tgiby3 said:

The Client page was worthless


No, the error message was misleading.
Though, another problem was insufficient information. You only posted the logs, but the support file (Logs tab > lifebelt icon) would've been a dead giveaway. Besides, now that you mention it, the OpenVPN process halts right before the TAP interface is to be opened, but you don't see that right away. :)

In any case, I'm glad it works now. Enjoy!

» I am not an AirVPN team member. All opinions are my own and are not official. Refer to Staff postings for the official word.

» These are the community forums, not the support portal. You're writing with other users here.

» New here? LZ1's New User Guide to AirVPN. Use the search function, Luke!

» Tor exits behind a VPN connection are discouraged. Using Tor on the other hand is not.

 

» Privacy is like alcohol: Drink a little and it can help you stay unnoticed. Drink a lot and everyone will notice you.

» I cannot give you the solution to all your issues. But I can guide you to it. The rest is up to you.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...