Jump to content
Not connected, Your IP: 3.145.76.159
ProphetPX

I updated Eddie to latest 2.21.8 on Win10Home x64 and now i cannot connect - netsh error 1 every single time

Recommended Posts

Posted ... (edited)

I just today updated Eddie to latest 2.21.8 on Win10 Home x64 (21H2 build ID 19044.1706) and now i cannot connect - i am getting a netsh error 1 every single time
I DID start logging after about 5 errors and i let it log the fails on run about 10-15 more times  lol
i am not able to connect to ANY AirVPN servers!
Eddie and AirVPN BOTH WORKED GREAT last week or 2 weeks ago when i last logged in, BEFORE i upgraded.  Should i DOWNGRADE Eddie?  that is my next try...
but i'd rather wait to have an expert read my logfiles here??
i did recently upgrade my network drivers, and i replaced a CPU and my video card, and upped my memory and added a new SSD drive -- could that have affected it?

---
Log file attached

what do i need to do?  Thanks so much
 

eddie_2022-05-27.log

Edited ... by ProphetPX
more info

Share this post


Link to post

I'm sorry, your log is a bit difficult to read. Disable logging to file and close Eddie. Start it again and try a connection. Then create a system report.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
34 minutes ago, ProphetPX said:

can you read that better? thank you, kindly, in advance!!!


Forgot to tell you to disable debug logging, it's overkill. But it doesn't matter, I've spotted something.

. 2022.05.27 17:22:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all
E 2022.05.27 17:22:47 - OpenVPN > ERROR: netsh command failed: returned error code 1

This looks a bit alien to me. I don't remember a netsh interface ip command, it should be netsh interface ipv4 or netsh interface ipv6. Unsure if a simple syntax error in the command or somehow your netsh is not standard. Might be something for the dev. Create a ticket or post it here:.

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

uggggh well i appreciate the help but i have no idea how that happened.  should i post a config file??

and i REALLY need to connect, so, after i post this thread URL over there, will my VPN work if i downgrade the Eddie client??
(uninstall, fully reinstall.... might reboot in between)

thanks again.
 

Share this post


Link to post
1 hour ago, OpenSourcerer said:

Forgot to tell you to disable debug logging, it's overkill. But it doesn't matter, I've spotted something.

. 2022.05.27 17:22:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 13 all
E 2022.05.27 17:22:47 - OpenVPN > ERROR: netsh command failed: returned error code 1

This looks a bit alien to me. I don't remember a netsh interface ip command, it should be netsh interface ipv4 or netsh interface ipv6. Unsure if a simple syntax error in the command or somehow your netsh is not standard. Might be something for the dev. Create a ticket or post it here:.


UPDATE:  i fixed my problem by DOWNGRADING my Eddie client to 2.20.0 INSTEAD of the last few versions (the most recent ones) which i also tried but THIS IS THE ONLY ONE THAT WORKS and i am on the VPN right now using 2.20.0 --

 

Share this post


Link to post
Posted ... (edited)
6 hours ago, OpenSourcerer said:

Can you post another system report for spotting differences, please?


yes.  at least the older Eddie v20.x still works well?  And unlike the latest version i cannot just make a link to send you so i am going to have to paste the whole thing in here.  here you go:
----

Eddie System/Environment Report - 5/28/2022 - 2:34 PM UTC

Eddie version: 2.20.0
Eddie OS build: windows_x64
Eddie architecture: x64
OS type: Windows
OS name: Windows 10 Home
OS version: Microsoft Windows NT 10.0.19044.0
OS architecture: x64
Mono /.Net Framework: v4.0.30319
TUN driver: 0901: 9.24.2; wintun: Not found
OpenVPN: 2.5.1 - OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
Hummingbird:  ()
SSH: OpenSSH_for_Windows_8.0p1, LibreSSL 2.6.5 (C:\Program Files\OpenSSH-Win64\ssh.exe)
SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe)
Profile path: C:\Users\ProphetPX\AppData\Local\Eddie\default.profile
Data path: C:\Users\ProphetPX\AppData\Local\Eddie
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\Eddie-UI.exe
Command line arguments: (1 args) path="home"
Network Lock Active: Yes, Windows Filtering Platform
Connected to VPN: Yes, Alkurhah
Detected DNS:
Test DNS IPv4: Ok
Test DNS IPv6: Failed
Test Ping IPv4: 165 ms
Test Ping IPv6: Failed
Test HTTP IPv4: Ok
Test HTTP IPv6: Error: Fetch url error:Couldn't connect to server
Test HTTPS: Ok
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
key: (omissis)
dns.servers: 10.4.0.1,10.5.0.1
netlock.allow_dns: True
network.entry.iplayer: ipv4-only
network.ipv4.mode: in-block
network.ipv6.mode: block
network.ipv4.autoswitch: True
openvpn.sndbuf: 524288
openvpn.rcvbuf: 524288
event.vpn.down.filename: C:\ProgramData\chocolatey\bin\sync64.exe
windows.ipv6.bypass_dns: True
windows.ssh.plink.force: False
ui.skip.promotional: True
gui.font.normal.name: Segoe UI
gui.font.normal.size:  9

----------------------------
Logs:

. 2022.05.27 20:15:13 - Eddie version: 2.20.0 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.19044.0, Mono/.Net: v4.0.30319
. 2022.05.27 20:15:13 - Command line arguments (1): path="home"
. 2022.05.27 20:15:14 - Profile path: C:\Users\ProphetPX\AppData\Local\Eddie\default.profile
. 2022.05.27 20:15:15 - Reading options from C:\Users\ProphetPX\AppData\Local\Eddie\default.profile
. 2022.05.27 20:15:18 - Tun Driver - 0901: 9.24.2; wintun: Not found
. 2022.05.27 20:15:18 - OpenVPN - Version: 2.5.1 - OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2022.05.27 20:15:18 - SSH - Version: OpenSSH_for_Windows_8.0p1, LibreSSL 2.6.5 (C:\Program Files\OpenSSH-Win64\ssh.exe)
. 2022.05.27 20:15:18 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe)
I 2022.05.27 20:15:22 - Ready
. 2022.05.27 20:15:23 - Collect information about AirVPN completed
I 2022.05.27 20:15:55 - Checking login ...
! 2022.05.27 20:15:56 - Logged in.
! 2022.05.27 20:16:04 - Activation of Network Lock - Windows Filtering Platform
I 2022.05.27 20:17:17 - Session starting.
I 2022.05.27 20:17:20 - Checking authorization ...
. 2022.05.27 20:17:21 - IPv6 disabled with packet filtering.
! 2022.05.27 20:17:21 - Connecting to Alkurhah (Canada, Toronto, Ontario)
. 2022.05.27 20:17:21 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2022.05.27 20:17:21 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2022.05.27 20:17:21 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2022.05.27 20:17:22 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.05.27 20:17:22 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.05.27 20:17:22 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.05.27 20:17:22 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.05.27 20:17:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.205:443
. 2022.05.27 20:17:22 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288]
. 2022.05.27 20:17:22 - OpenVPN > UDP link local: (not bound)
. 2022.05.27 20:17:22 - OpenVPN > UDP link remote: [AF_INET]184.75.221.205:443
. 2022.05.27 20:17:22 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.205:443, sid=d59b9322 08665434
. 2022.05.27 20:17:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.27 20:17:22 - OpenVPN > VERIFY KU OK
. 2022.05.27 20:17:22 - OpenVPN > Validating certificate extended key usage
. 2022.05.27 20:17:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.27 20:17:22 - OpenVPN > VERIFY EKU OK
. 2022.05.27 20:17:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.27 20:17:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.27 20:17:22 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.205:443
. 2022.05.27 20:17:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.218.1,dhcp-option DNS6 fde6:7a:7d20:2da::1,tun-ipv6,route-gateway 10.6.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:2da::10f7/64 fde6:7a:7d20:2da::1,ifconfig 10.6.218.249 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2022.05.27 20:17:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2022.05.27 20:17:22 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:2da::1'
. 2022.05.27 20:17:22 - OpenVPN > Pushed option removed by filter: 'tun-ipv6'
. 2022.05.27 20:17:22 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:2da::10f7/64 fde6:7a:7d20:2da::1'
. 2022.05.27 20:17:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.05.27 20:17:22 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2022.05.27 20:17:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.05.27 20:17:22 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.05.27 20:17:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.05.27 20:17:22 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.05.27 20:17:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2022.05.27 20:17:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2022.05.27 20:17:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2022.05.27 20:17:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 20:17:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 20:17:22 - OpenVPN > interactive service msg_channel=0
. 2022.05.27 20:17:22 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=50:e5:49:b4:1b:8f
. 2022.05.27 20:17:22 - OpenVPN > open_tun
. 2022.05.27 20:17:27 - OpenVPN > tap-windows6 device [Local Area Connection] opened
. 2022.05.27 20:17:27 - OpenVPN > TAP-Windows Driver Version 9.24
. 2022.05.27 20:17:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.218.0/10.6.218.249/255.255.255.0 [SUCCEEDED]
. 2022.05.27 20:17:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.218.249/255.255.255.0 on interface {924067ED-41A4-438C-AE4C-472758D3B4D8} [DHCP-serv: 10.6.218.254, lease-time: 31536000]
. 2022.05.27 20:17:27 - OpenVPN > Successful ARP Flush on interface [13] {924067ED-41A4-438C-AE4C-472758D3B4D8}
. 2022.05.27 20:17:27 - OpenVPN > IPv4 MTU set to 1500 on interface 13 using SetIpInterfaceEntry()
. 2022.05.27 20:17:27 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2022.05.27 20:17:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.205 MASK 255.255.255.255 192.168.0.1
. 2022.05.27 20:17:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2022.05.27 20:17:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2022.05.27 20:17:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.218.1
. 2022.05.27 20:17:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2022.05.27 20:17:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2022.05.27 20:17:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.218.1
. 2022.05.27 20:17:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2022.05.27 20:17:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2022.05.27 20:17:27 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4
. 2022.05.27 20:17:27 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6
. 2022.05.27 20:17:27 - DNS leak protection with packet filtering enabled.
. 2022.05.27 20:17:31 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.4.0.1, 10.5.0.1)
. 2022.05.27 20:17:32 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.4.0.1, 10.5.0.1)
. 2022.05.27 20:17:32 - DNS IPv4 of a network adapter forced (VBOX VLAN Ethernet, from automatic to 10.4.0.1, 10.5.0.1)
. 2022.05.27 20:17:33 - Routes, added a new route, 184.75.221.203 for gateway 10.6.218.1
. 2022.05.27 20:17:33 - Unable to compute route for 2606:6080:1001:16:3492:5f11:f1fb:66ae: IPv6 VPN gateway not available.
. 2022.05.27 20:17:33 - Flushing DNS
I 2022.05.27 20:17:33 - Checking route IPv4
! 2022.05.27 20:17:34 - Connected.
. 2022.05.27 20:17:34 - OpenVPN > Initialization Sequence Completed
. 2022.05.27 20:39:04 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #21030 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 20:45:26 - Above log line repeated 3431 times more
. 2022.05.27 20:45:26 - Collect information about AirVPN completed
. 2022.05.27 20:45:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #653920 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 21:12:17 - Above log line repeated 4912 times more
. 2022.05.27 21:12:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.27 21:12:17 - OpenVPN > VERIFY KU OK
. 2022.05.27 21:12:17 - OpenVPN > Validating certificate extended key usage
. 2022.05.27 21:12:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.27 21:12:17 - OpenVPN > VERIFY EKU OK
. 2022.05.27 21:12:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.27 21:12:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 21:12:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 21:12:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.27 21:12:38 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #4669160 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 21:15:28 - Above log line repeated 646 times more
. 2022.05.27 21:15:28 - Collect information about AirVPN completed
. 2022.05.27 21:15:29 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #422301 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 21:45:34 - Above log line repeated 4377 times more
. 2022.05.27 21:45:34 - Collect information about AirVPN completed
. 2022.05.27 21:45:39 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #4529974 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 22:07:12 - Above log line repeated 853 times more
. 2022.05.27 22:07:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.27 22:07:12 - OpenVPN > VERIFY KU OK
. 2022.05.27 22:07:12 - OpenVPN > Validating certificate extended key usage
. 2022.05.27 22:07:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.27 22:07:12 - OpenVPN > VERIFY EKU OK
. 2022.05.27 22:07:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.27 22:07:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 22:07:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 22:07:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.27 22:07:13 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #7675374 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 22:15:37 - Above log line repeated 228 times more
. 2022.05.27 22:15:37 - Collect information about AirVPN completed
. 2022.05.27 22:15:38 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1144941 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 22:45:40 - Above log line repeated 1465 times more
. 2022.05.27 22:45:40 - Collect information about AirVPN completed
. 2022.05.27 22:45:46 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #5850661 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 23:02:07 - Above log line repeated 724 times more
. 2022.05.27 23:02:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.27 23:02:07 - OpenVPN > VERIFY KU OK
. 2022.05.27 23:02:07 - OpenVPN > Validating certificate extended key usage
. 2022.05.27 23:02:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.27 23:02:07 - OpenVPN > VERIFY EKU OK
. 2022.05.27 23:02:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.27 23:02:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 23:02:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 23:02:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.27 23:02:11 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #8362014 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 23:15:43 - Above log line repeated 1059 times more
. 2022.05.27 23:15:43 - Collect information about AirVPN completed
. 2022.05.27 23:15:48 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1948182 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 23:45:45 - Above log line repeated 1667 times more
. 2022.05.27 23:45:45 - Collect information about AirVPN completed
. 2022.05.27 23:45:54 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #6569951 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 23:57:02 - Above log line repeated 411 times more
. 2022.05.27 23:57:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.27 23:57:02 - OpenVPN > VERIFY KU OK
. 2022.05.27 23:57:02 - OpenVPN > Validating certificate extended key usage
. 2022.05.27 23:57:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.27 23:57:02 - OpenVPN > VERIFY EKU OK
. 2022.05.27 23:57:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.27 23:57:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 23:57:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 23:57:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.27 23:57:09 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #8273934 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 00:15:49 - Above log line repeated 721 times more
. 2022.05.28 00:15:49 - Collect information about AirVPN completed
. 2022.05.28 00:45:53 - Collect information about AirVPN completed
. 2022.05.28 00:51:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 00:51:58 - OpenVPN > VERIFY KU OK
. 2022.05.28 00:51:58 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 00:51:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 00:51:58 - OpenVPN > VERIFY EKU OK
. 2022.05.28 00:51:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 00:51:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 00:51:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 00:51:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 01:15:56 - Collect information about AirVPN completed
. 2022.05.28 01:46:53 - Above log line repeated 1 times more
. 2022.05.28 01:46:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 01:46:53 - OpenVPN > VERIFY KU OK
. 2022.05.28 01:46:53 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 01:46:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 01:46:53 - OpenVPN > VERIFY EKU OK
. 2022.05.28 01:46:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 01:46:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 01:46:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 01:46:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 02:16:04 - Collect information about AirVPN completed
. 2022.05.28 02:41:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 02:41:46 - OpenVPN > VERIFY KU OK
. 2022.05.28 02:41:46 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 02:41:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 02:41:46 - OpenVPN > VERIFY EKU OK
. 2022.05.28 02:41:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 02:41:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 02:41:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 02:41:46 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 02:46:07 - Collect information about AirVPN completed
. 2022.05.28 03:17:01 - Above log line repeated 1 times more
. 2022.05.28 03:17:01 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #231428 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 03:17:01 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #231429 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 03:36:41 - Above log line repeated 2276 times more
. 2022.05.28 03:36:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 03:36:41 - OpenVPN > VERIFY KU OK
. 2022.05.28 03:36:41 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 03:36:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 03:36:41 - OpenVPN > VERIFY EKU OK
. 2022.05.28 03:36:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 03:36:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 03:36:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 03:36:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 03:36:45 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3190801 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 03:46:11 - Above log line repeated 139 times more
. 2022.05.28 03:46:11 - Collect information about AirVPN completed
. 2022.05.28 03:46:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1149997 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 04:16:12 - Above log line repeated 540 times more
. 2022.05.28 04:16:12 - Collect information about AirVPN completed
. 2022.05.28 04:16:14 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #5181791 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 04:31:36 - Above log line repeated 220 times more
. 2022.05.28 04:31:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 04:31:36 - OpenVPN > VERIFY KU OK
. 2022.05.28 04:31:36 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 04:31:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 04:31:36 - OpenVPN > VERIFY EKU OK
. 2022.05.28 04:31:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 04:31:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 04:31:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 04:31:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 04:31:37 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #7100611 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 04:46:13 - Above log line repeated 241 times more
. 2022.05.28 04:46:13 - Collect information about AirVPN completed
. 2022.05.28 04:46:35 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1882871 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 05:16:15 - Above log line repeated 1896 times more
. 2022.05.28 05:16:15 - Collect information about AirVPN completed
. 2022.05.28 05:16:15 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #5392158 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 05:26:31 - Above log line repeated 1323 times more
. 2022.05.28 05:26:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 05:26:31 - OpenVPN > VERIFY KU OK
. 2022.05.28 05:26:31 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 05:26:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 05:26:31 - OpenVPN > VERIFY EKU OK
. 2022.05.28 05:26:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 05:26:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 05:26:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 05:26:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 05:46:16 - Collect information about AirVPN completed
. 2022.05.28 06:21:26 - Above log line repeated 1 times more
. 2022.05.28 06:21:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 06:21:26 - OpenVPN > VERIFY KU OK
. 2022.05.28 06:21:26 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 06:21:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 06:21:26 - OpenVPN > VERIFY EKU OK
. 2022.05.28 06:21:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 06:21:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 06:21:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 06:21:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 06:46:21 - Collect information about AirVPN completed
. 2022.05.28 07:16:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 07:16:22 - OpenVPN > VERIFY KU OK
. 2022.05.28 07:16:22 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 07:16:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 07:16:22 - OpenVPN > VERIFY EKU OK
. 2022.05.28 07:16:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 07:16:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 07:16:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 07:16:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 07:16:22 - Collect information about AirVPN completed
. 2022.05.28 07:21:38 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #100532 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 07:46:25 - Above log line repeated 870 times more
. 2022.05.28 07:46:25 - Collect information about AirVPN completed
. 2022.05.28 07:46:27 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3438429 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 08:11:17 - Above log line repeated 993 times more
. 2022.05.28 08:11:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 08:11:17 - OpenVPN > VERIFY KU OK
. 2022.05.28 08:11:17 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 08:11:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 08:11:17 - OpenVPN > VERIFY EKU OK
. 2022.05.28 08:11:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 08:11:17 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #6844133 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 08:11:17 - Above log line repeated 1 times more
. 2022.05.28 08:11:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 08:11:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 08:11:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 08:11:30 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #6877572 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 08:16:26 - Above log line repeated 202 times more
. 2022.05.28 08:16:26 - Collect information about AirVPN completed
. 2022.05.28 08:16:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #622929 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 08:46:27 - Above log line repeated 1156 times more
. 2022.05.28 08:46:27 - Collect information about AirVPN completed
. 2022.05.28 08:46:30 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #4503698 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 09:06:12 - Above log line repeated 500 times more
. 2022.05.28 09:06:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 09:06:12 - OpenVPN > VERIFY KU OK
. 2022.05.28 09:06:12 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 09:06:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 09:06:12 - OpenVPN > VERIFY EKU OK
. 2022.05.28 09:06:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 09:06:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 09:06:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 09:06:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 09:06:24 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #7204287 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 09:16:27 - Above log line repeated 563 times more
. 2022.05.28 09:16:27 - Collect information about AirVPN completed
. 2022.05.28 09:16:35 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1030385 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 09:34:16 - Above log line repeated 1486 times more
. 2022.05.28 09:34:16 - ping 1
. 2022.05.28 09:34:16 - ping 2 W
. 2022.05.28 09:34:16 - ping 2 WE

----------------------------
Network Interfaces and Routes:

{
    "support_ipv4": true,
    "support_ipv6": true,
    "routes": [
        {
            "address": "0.0.0.0\/0",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "25"
        },
        {
            "address": "0.0.0.0\/1",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "10.6.218.1",
            "metric": "3"
        },
        {
            "address": "10.6.218.0\/24",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "10.6.218.249",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "10.6.218.255",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "127.0.0.0\/8",
            "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "127.0.0.1",
            "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "127.255.255.255",
            "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "128.0.0.0\/1",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "10.6.218.1",
            "metric": "3"
        },
        {
            "address": "159.153.65.213",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "26"
        },
        {
            "address": "159.153.65.214",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "26"
        },
        {
            "address": "159.153.65.219",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "26"
        },
        {
            "address": "159.153.65.235",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "26"
        },
        {
            "address": "159.153.72.252",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "26"
        },
        {
            "address": "159.153.78.102",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "26"
        },
        {
            "address": "159.153.78.103",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "26"
        },
        {
            "address": "159.153.78.109",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "26"
        },
        {
            "address": "159.153.92.28",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "26"
        },
        {
            "address": "169.254.0.0\/16",
            "interface": "{CDE141BA-930E-4E5E-8FBB-5FEA15A05774}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "169.254.202.20",
            "interface": "{CDE141BA-930E-4E5E-8FBB-5FEA15A05774}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "169.254.255.255",
            "interface": "{CDE141BA-930E-4E5E-8FBB-5FEA15A05774}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "184.75.221.203",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "10.6.218.1",
            "metric": "4"
        },
        {
            "address": "184.75.221.205",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "25"
        },
        {
            "address": "192.168.0.0\/24",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "192.168.0.99",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "192.168.0.255",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{CDE141BA-930E-4E5E-8FBB-5FEA15A05774}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "255.255.255.255",
            "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "255.255.255.255",
            "interface": "{CDE141BA-930E-4E5E-8FBB-5FEA15A05774}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "255.255.255.255",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "255.255.255.255",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "::1",
            "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "2603:8090:1b00:6d00::\/56",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "fe80::4a00:33ff:fef5:7e45",
            "metric": "281"
        },
        {
            "address": "2603:8090:1b00:6d00::\/64",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "2603:8090:1b00:6d00:d9dd:e69a:a76e:b996",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "2603:8090:1b00:6d00:f8bc:dbb5:af61:10d8",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "fe80::\/64",
            "interface": "{CDE141BA-930E-4E5E-8FBB-5FEA15A05774}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "fe80::\/64",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "fe80::\/64",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "fe80::28c6:8ca5:36f9:ca14",
            "interface": "{CDE141BA-930E-4E5E-8FBB-5FEA15A05774}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "fe80::d538:c344:1e37:cf2e",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "fe80::f8bc:dbb5:af61:10d8",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "ff00::\/8",
            "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "ff00::\/8",
            "interface": "{CDE141BA-930E-4E5E-8FBB-5FEA15A05774}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "ff00::\/8",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "ff00::\/8",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "link",
            "metric": "259"
        }
    ],
    "interfaces": [
        {
            "friendly": "Local Area Connection",
            "id": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "name": "Local Area Connection",
            "description": "TAP-Windows Adapter V9",
            "type": "Virtual",
            "status": "Up",
            "bytes_received": "57343518568",
            "bytes_sent": "14998405711",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::d538:c344:1e37:cf2e",
                "10.6.218.249"
            ],
            "gateways": [
                "10.6.218.1"
            ],
            "bind": true,
            "dns4": "10.4.0.1,10.5.0.1",
            "dns6": null
        },
        {
            "friendly": "Ethernet",
            "id": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "name": "Ethernet",
            "description": "Realtek PCIe GbE Family Controller",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "62849536489",
            "bytes_sent": "18058117043",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "2603:8090:1b00:6d00:f8bc:dbb5:af61:10d8",
                "2603:8090:1b00:6d00:d9dd:e69a:a76e:b996",
                "fe80::f8bc:dbb5:af61:10d8",
                "192.168.0.99"
            ],
            "gateways": [
                "192.168.0.1",
                "fe80::4a00:33ff:fef5:7e45"
            ],
            "bind": true,
            "dns4": "10.4.0.1,10.5.0.1",
            "dns6": null
        },
        {
            "friendly": "VBOX VLAN Ethernet",
            "id": "{CDE141BA-930E-4E5E-8FBB-5FEA15A05774}",
            "name": "VBOX VLAN Ethernet",
            "description": "VirtualBox Host-Only Ethernet Adapter",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::28c6:8ca5:36f9:ca14",
                "169.254.202.20"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "10.4.0.1,10.5.0.1",
            "dns6": null
        },
        {
            "friendly": "Bluetooth Network Connection",
            "id": "{B92283B6-E3EA-4567-9547-F43574AD93D5}",
            "name": "Bluetooth Network Connection",
            "description": "Bluetooth Device (Personal Area Network) #3",
            "type": "Ethernet",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::c0f1:b79e:9ce8:f4c",
                "169.254.15.76"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Loopback Pseudo-Interface 1",
            "id": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}",
            "name": "Loopback Pseudo-Interface 1",
            "description": "Software Loopback Interface 1",
            "type": "Loopback",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "::1",
                "127.0.0.1"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        }
    ],
    "ipv4-default-gateway": "10.6.218.1",
    "ipv4-default-interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
    "ipv6-default-gateway": "fe80::4a00:33ff:fef5:7e45",
    "ipv6-default-interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}"
}
----------------------------
ipconfig /all:

Windows IP Configuration

   Host Name . . . . . . . . . . . . : C001-RIGEL
   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : kc.rr.com

Unknown adapter Local Area Connection:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : TAP-Windows Adapter V9
   Physical Address. . . . . . . . . : 00-FF-92-40-67-ED
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::d538:c344:1e37:cf2e%13(Preferred)
   IPv4 Address. . . . . . . . . . . : 10.6.218.249(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Friday, May 27, 2022 8:17:22 PM
   Lease Expires . . . . . . . . . . : Saturday, May 27, 2023 8:17:20 PM
   Default Gateway . . . . . . . . . :
   DHCP Server . . . . . . . . . . . : 10.6.218.254
   DHCPv6 IAID . . . . . . . . . . . : 218169234
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-D3-3F-C1-50-E5-49-B4-1B-8F
   NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Ethernet:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Realtek PCIe GbE Family Controller
   Physical Address. . . . . . . . . : 50-E5-49-B4-1B-8F
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : 2603:8090:1b00:6d00:f8bc:dbb5:af61:10d8(Preferred)
   Temporary IPv6 Address. . . . . . : 2603:8090:1b00:6d00:d9dd:e69a:a76e:b996(Preferred)
   Link-local IPv6 Address . . . . . : fe80::f8bc:dbb5:af61:10d8%3(Preferred)
   IPv4 Address. . . . . . . . . . . : 192.168.0.99(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Friday, May 27, 2022 8:12:04 PM
   Lease Expires . . . . . . . . . . : Friday, June 24, 2022 8:12:02 PM
   Default Gateway . . . . . . . . . : 192.168.0.1
   DHCP Server . . . . . . . . . . . : 192.168.0.1
   DHCPv6 IAID . . . . . . . . . . . : 609281353
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-D3-3F-C1-50-E5-49-B4-1B-8F
   NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter VBOX VLAN Ethernet:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : VirtualBox Host-Only Ethernet Adapter
   Physical Address. . . . . . . . . : 0A-00-27-00-00-0A
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::28c6:8ca5:36f9:ca14%10(Preferred)
   Autoconfiguration IPv4 Address. . : 169.254.202.20(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.0.0
   Default Gateway . . . . . . . . . :
   DHCPv6 IAID . . . . . . . . . . . : 235536423
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-D3-3F-C1-50-E5-49-B4-1B-8F
   NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Bluetooth Network Connection:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) #3
   Physical Address. . . . . . . . . : 00-1A-7D-DA-71-13
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Edited ... by OpenSourcerer
Apply LOG format to system report

Share this post


Link to post

Hmm. To confirm one thing, can you please tick Force usage of old tunnel driver in Eddie Preferences > Advanced?


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
17 minutes ago, OpenSourcerer said:

Hmm. To confirm one thing, can you please tick Force usage of old tunnel driver in Eddie Preferences > Advanced?


cannot do it right now.   am busy.   when i am un-busy i will try your suggestion for you and thank you.
i will get back to you when i can do that.
 

Share this post


Link to post
Posted ... (edited)
18 hours ago, OpenSourcerer said:

Hmm. To confirm one thing, can you please tick Force usage of old tunnel driver in Eddie Preferences > Advanced?


There is NO option that uses that language in v2.20.0 client.  I THINK you meant....
"Force usage of bundled plink.exe" ?"

This is the state of my advanced options screen right now, WHILE i am NEWLY connected a 2nd time.

image.png.d43e229b91d6e9dd188920dc3c76417b.png

Using those options set that way, i was able to connect.  BUT i was also able to connect just fine WITHOUT using plink -- i only ticked that this time because i thought that was what you meant?

Note i am connected to a server right now with those options set that way.
but it seems v2.20 does not give me problems like any of the newer ones do.

here is my latest system report, attempt 3 at this:
-----

Eddie System/Environment Report - 5/29/2022 - 12:23 PM UTC

Eddie version: 2.20.0
Eddie OS build: windows_x64
Eddie architecture: x64
OS type: Windows
OS name: Windows 10 Home
OS version: Microsoft Windows NT 10.0.19044.0
OS architecture: x64
Mono /.Net Framework: v4.0.30319
TUN driver: 0901: 9.24.2; wintun: Not found
OpenVPN: 2.5.1 - OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
Hummingbird:  ()
SSH: OpenSSH_for_Windows_8.0p1, LibreSSL 2.6.5 (C:\Program Files\OpenSSH-Win64\ssh.exe)
SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe)
Profile path: C:\Users\ProphetPX\AppData\Local\Eddie\default.profile
Data path: C:\Users\ProphetPX\AppData\Local\Eddie
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\Eddie-UI.exe
Command line arguments: (1 args) path="home"
Network Lock Active: Yes, Windows Filtering Platform
Connected to VPN: Yes, Agena
Detected DNS:
Test DNS IPv4: Ok
Test DNS IPv6: Failed
Test Ping IPv4: 163 ms
Test Ping IPv6: Failed
Test HTTP IPv4: Ok
Test HTTP IPv6: Error: Fetch url error:Couldn't connect to server
Test HTTPS: Ok
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
key: (omissis)
dns.servers: 10.4.0.1,10.5.0.1
netlock.allow_dns: True
network.entry.iplayer: ipv4-only
network.ipv4.mode: in-block
network.ipv6.mode: block
network.ipv4.autoswitch: True
openvpn.sndbuf: 524288
openvpn.rcvbuf: 524288
event.vpn.down.filename: C:\ProgramData\chocolatey\bin\sync64.exe
windows.ipv6.bypass_dns: True
ui.skip.promotional: True
gui.font.normal.name: Segoe UI
gui.font.normal.size:  9

----------------------------
Logs:

. 2022.05.27 20:15:13 - Eddie version: 2.20.0 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.19044.0, Mono/.Net: v4.0.30319
. 2022.05.27 20:15:13 - Command line arguments (1): path="home"
. 2022.05.27 20:15:14 - Profile path: C:\Users\ProphetPX\AppData\Local\Eddie\default.profile
. 2022.05.27 20:15:15 - Reading options from C:\Users\ProphetPX\AppData\Local\Eddie\default.profile
. 2022.05.27 20:15:18 - Tun Driver - 0901: 9.24.2; wintun: Not found
. 2022.05.27 20:15:18 - OpenVPN - Version: 2.5.1 - OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2022.05.27 20:15:18 - SSH - Version: OpenSSH_for_Windows_8.0p1, LibreSSL 2.6.5 (C:\Program Files\OpenSSH-Win64\ssh.exe)
. 2022.05.27 20:15:18 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe)
I 2022.05.27 20:15:22 - Ready
. 2022.05.27 20:15:23 - Collect information about AirVPN completed
I 2022.05.27 20:15:55 - Checking login ...
! 2022.05.27 20:15:56 - Logged in.
! 2022.05.27 20:16:04 - Activation of Network Lock - Windows Filtering Platform
I 2022.05.27 20:17:17 - Session starting.
I 2022.05.27 20:17:20 - Checking authorization ...
. 2022.05.27 20:17:21 - IPv6 disabled with packet filtering.
! 2022.05.27 20:17:21 - Connecting to Alkurhah (Canada, Toronto, Ontario)
. 2022.05.27 20:17:21 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2022.05.27 20:17:21 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2022.05.27 20:17:21 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2022.05.27 20:17:22 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.05.27 20:17:22 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.05.27 20:17:22 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.05.27 20:17:22 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.05.27 20:17:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.205:443
. 2022.05.27 20:17:22 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288]
. 2022.05.27 20:17:22 - OpenVPN > UDP link local: (not bound)
. 2022.05.27 20:17:22 - OpenVPN > UDP link remote: [AF_INET]184.75.221.205:443
. 2022.05.27 20:17:22 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.205:443, sid=d59b9322 08665434
. 2022.05.27 20:17:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.27 20:17:22 - OpenVPN > VERIFY KU OK
. 2022.05.27 20:17:22 - OpenVPN > Validating certificate extended key usage
. 2022.05.27 20:17:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.27 20:17:22 - OpenVPN > VERIFY EKU OK
. 2022.05.27 20:17:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.27 20:17:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.27 20:17:22 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.205:443
. 2022.05.27 20:17:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.218.1,dhcp-option DNS6 fde6:7a:7d20:2da::1,tun-ipv6,route-gateway 10.6.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:2da::10f7/64 fde6:7a:7d20:2da::1,ifconfig 10.6.218.249 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2022.05.27 20:17:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2022.05.27 20:17:22 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:2da::1'
. 2022.05.27 20:17:22 - OpenVPN > Pushed option removed by filter: 'tun-ipv6'
. 2022.05.27 20:17:22 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:2da::10f7/64 fde6:7a:7d20:2da::1'
. 2022.05.27 20:17:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.05.27 20:17:22 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2022.05.27 20:17:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.05.27 20:17:22 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.05.27 20:17:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.05.27 20:17:22 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.05.27 20:17:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2022.05.27 20:17:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2022.05.27 20:17:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2022.05.27 20:17:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 20:17:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 20:17:22 - OpenVPN > interactive service msg_channel=0
. 2022.05.27 20:17:22 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=50:e5:49:b4:1b:8f
. 2022.05.27 20:17:22 - OpenVPN > open_tun
. 2022.05.27 20:17:27 - OpenVPN > tap-windows6 device [Local Area Connection] opened
. 2022.05.27 20:17:27 - OpenVPN > TAP-Windows Driver Version 9.24
. 2022.05.27 20:17:27 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.218.0/10.6.218.249/255.255.255.0 [SUCCEEDED]
. 2022.05.27 20:17:27 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.218.249/255.255.255.0 on interface {924067ED-41A4-438C-AE4C-472758D3B4D8} [DHCP-serv: 10.6.218.254, lease-time: 31536000]
. 2022.05.27 20:17:27 - OpenVPN > Successful ARP Flush on interface [13] {924067ED-41A4-438C-AE4C-472758D3B4D8}
. 2022.05.27 20:17:27 - OpenVPN > IPv4 MTU set to 1500 on interface 13 using SetIpInterfaceEntry()
. 2022.05.27 20:17:27 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2022.05.27 20:17:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.205 MASK 255.255.255.255 192.168.0.1
. 2022.05.27 20:17:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2022.05.27 20:17:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2022.05.27 20:17:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.218.1
. 2022.05.27 20:17:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2022.05.27 20:17:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2022.05.27 20:17:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.218.1
. 2022.05.27 20:17:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2022.05.27 20:17:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2022.05.27 20:17:27 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4
. 2022.05.27 20:17:27 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6
. 2022.05.27 20:17:27 - DNS leak protection with packet filtering enabled.
. 2022.05.27 20:17:31 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.4.0.1, 10.5.0.1)
. 2022.05.27 20:17:32 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.4.0.1, 10.5.0.1)
. 2022.05.27 20:17:32 - DNS IPv4 of a network adapter forced (VBOX VLAN Ethernet, from automatic to 10.4.0.1, 10.5.0.1)
. 2022.05.27 20:17:33 - Routes, added a new route, 184.75.221.203 for gateway 10.6.218.1
. 2022.05.27 20:17:33 - Unable to compute route for 2606:6080:1001:16:3492:5f11:f1fb:66ae: IPv6 VPN gateway not available.
. 2022.05.27 20:17:33 - Flushing DNS
I 2022.05.27 20:17:33 - Checking route IPv4
! 2022.05.27 20:17:34 - Connected.
. 2022.05.27 20:17:34 - OpenVPN > Initialization Sequence Completed
. 2022.05.27 20:39:04 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #21030 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 20:45:26 - Above log line repeated 3431 times more
. 2022.05.27 20:45:26 - Collect information about AirVPN completed
. 2022.05.27 20:45:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #653920 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 21:12:17 - Above log line repeated 4912 times more
. 2022.05.27 21:12:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.27 21:12:17 - OpenVPN > VERIFY KU OK
. 2022.05.27 21:12:17 - OpenVPN > Validating certificate extended key usage
. 2022.05.27 21:12:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.27 21:12:17 - OpenVPN > VERIFY EKU OK
. 2022.05.27 21:12:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.27 21:12:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 21:12:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 21:12:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.27 21:12:38 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #4669160 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 21:15:28 - Above log line repeated 646 times more
. 2022.05.27 21:15:28 - Collect information about AirVPN completed
. 2022.05.27 21:15:29 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #422301 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 21:45:34 - Above log line repeated 4377 times more
. 2022.05.27 21:45:34 - Collect information about AirVPN completed
. 2022.05.27 21:45:39 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #4529974 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 22:07:12 - Above log line repeated 853 times more
. 2022.05.27 22:07:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.27 22:07:12 - OpenVPN > VERIFY KU OK
. 2022.05.27 22:07:12 - OpenVPN > Validating certificate extended key usage
. 2022.05.27 22:07:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.27 22:07:12 - OpenVPN > VERIFY EKU OK
. 2022.05.27 22:07:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.27 22:07:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 22:07:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 22:07:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.27 22:07:13 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #7675374 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 22:15:37 - Above log line repeated 228 times more
. 2022.05.27 22:15:37 - Collect information about AirVPN completed
. 2022.05.27 22:15:38 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1144941 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 22:45:40 - Above log line repeated 1465 times more
. 2022.05.27 22:45:40 - Collect information about AirVPN completed
. 2022.05.27 22:45:46 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #5850661 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 23:02:07 - Above log line repeated 724 times more
. 2022.05.27 23:02:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.27 23:02:07 - OpenVPN > VERIFY KU OK
. 2022.05.27 23:02:07 - OpenVPN > Validating certificate extended key usage
. 2022.05.27 23:02:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.27 23:02:07 - OpenVPN > VERIFY EKU OK
. 2022.05.27 23:02:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.27 23:02:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 23:02:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 23:02:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.27 23:02:11 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #8362014 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 23:15:43 - Above log line repeated 1059 times more
. 2022.05.27 23:15:43 - Collect information about AirVPN completed
. 2022.05.27 23:15:48 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1948182 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 23:45:45 - Above log line repeated 1667 times more
. 2022.05.27 23:45:45 - Collect information about AirVPN completed
. 2022.05.27 23:45:54 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #6569951 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.27 23:57:02 - Above log line repeated 411 times more
. 2022.05.27 23:57:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.27 23:57:02 - OpenVPN > VERIFY KU OK
. 2022.05.27 23:57:02 - OpenVPN > Validating certificate extended key usage
. 2022.05.27 23:57:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.27 23:57:02 - OpenVPN > VERIFY EKU OK
. 2022.05.27 23:57:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.27 23:57:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 23:57:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.27 23:57:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.27 23:57:09 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #8273934 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 00:15:49 - Above log line repeated 721 times more
. 2022.05.28 00:15:49 - Collect information about AirVPN completed
. 2022.05.28 00:45:53 - Collect information about AirVPN completed
. 2022.05.28 00:51:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 00:51:58 - OpenVPN > VERIFY KU OK
. 2022.05.28 00:51:58 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 00:51:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 00:51:58 - OpenVPN > VERIFY EKU OK
. 2022.05.28 00:51:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 00:51:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 00:51:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 00:51:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 01:15:56 - Collect information about AirVPN completed
. 2022.05.28 01:46:53 - Above log line repeated 1 times more
. 2022.05.28 01:46:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 01:46:53 - OpenVPN > VERIFY KU OK
. 2022.05.28 01:46:53 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 01:46:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 01:46:53 - OpenVPN > VERIFY EKU OK
. 2022.05.28 01:46:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 01:46:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 01:46:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 01:46:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 02:16:04 - Collect information about AirVPN completed
. 2022.05.28 02:41:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 02:41:46 - OpenVPN > VERIFY KU OK
. 2022.05.28 02:41:46 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 02:41:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 02:41:46 - OpenVPN > VERIFY EKU OK
. 2022.05.28 02:41:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 02:41:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 02:41:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 02:41:46 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 02:46:07 - Collect information about AirVPN completed
. 2022.05.28 03:17:01 - Above log line repeated 1 times more
. 2022.05.28 03:17:01 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #231428 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 03:17:01 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #231429 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 03:36:41 - Above log line repeated 2276 times more
. 2022.05.28 03:36:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 03:36:41 - OpenVPN > VERIFY KU OK
. 2022.05.28 03:36:41 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 03:36:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 03:36:41 - OpenVPN > VERIFY EKU OK
. 2022.05.28 03:36:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 03:36:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 03:36:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 03:36:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 03:36:45 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3190801 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 03:46:11 - Above log line repeated 139 times more
. 2022.05.28 03:46:11 - Collect information about AirVPN completed
. 2022.05.28 03:46:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1149997 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 04:16:12 - Above log line repeated 540 times more
. 2022.05.28 04:16:12 - Collect information about AirVPN completed
. 2022.05.28 04:16:14 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #5181791 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 04:31:36 - Above log line repeated 220 times more
. 2022.05.28 04:31:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 04:31:36 - OpenVPN > VERIFY KU OK
. 2022.05.28 04:31:36 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 04:31:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 04:31:36 - OpenVPN > VERIFY EKU OK
. 2022.05.28 04:31:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 04:31:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 04:31:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 04:31:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 04:31:37 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #7100611 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 04:46:13 - Above log line repeated 241 times more
. 2022.05.28 04:46:13 - Collect information about AirVPN completed
. 2022.05.28 04:46:35 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1882871 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 05:16:15 - Above log line repeated 1896 times more
. 2022.05.28 05:16:15 - Collect information about AirVPN completed
. 2022.05.28 05:16:15 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #5392158 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 05:26:31 - Above log line repeated 1323 times more
. 2022.05.28 05:26:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 05:26:31 - OpenVPN > VERIFY KU OK
. 2022.05.28 05:26:31 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 05:26:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 05:26:31 - OpenVPN > VERIFY EKU OK
. 2022.05.28 05:26:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 05:26:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 05:26:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 05:26:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 05:46:16 - Collect information about AirVPN completed
. 2022.05.28 06:21:26 - Above log line repeated 1 times more
. 2022.05.28 06:21:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 06:21:26 - OpenVPN > VERIFY KU OK
. 2022.05.28 06:21:26 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 06:21:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 06:21:26 - OpenVPN > VERIFY EKU OK
. 2022.05.28 06:21:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 06:21:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 06:21:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 06:21:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 06:46:21 - Collect information about AirVPN completed
. 2022.05.28 07:16:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 07:16:22 - OpenVPN > VERIFY KU OK
. 2022.05.28 07:16:22 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 07:16:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 07:16:22 - OpenVPN > VERIFY EKU OK
. 2022.05.28 07:16:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 07:16:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 07:16:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 07:16:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 07:16:22 - Collect information about AirVPN completed
. 2022.05.28 07:21:38 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #100532 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 07:46:25 - Above log line repeated 870 times more
. 2022.05.28 07:46:25 - Collect information about AirVPN completed
. 2022.05.28 07:46:27 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3438429 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 08:11:17 - Above log line repeated 993 times more
. 2022.05.28 08:11:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 08:11:17 - OpenVPN > VERIFY KU OK
. 2022.05.28 08:11:17 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 08:11:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 08:11:17 - OpenVPN > VERIFY EKU OK
. 2022.05.28 08:11:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 08:11:17 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #6844133 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 08:11:17 - Above log line repeated 1 times more
. 2022.05.28 08:11:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 08:11:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 08:11:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 08:11:30 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #6877572 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 08:16:26 - Above log line repeated 202 times more
. 2022.05.28 08:16:26 - Collect information about AirVPN completed
. 2022.05.28 08:16:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #622929 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 08:46:27 - Above log line repeated 1156 times more
. 2022.05.28 08:46:27 - Collect information about AirVPN completed
. 2022.05.28 08:46:30 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #4503698 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 09:06:12 - Above log line repeated 500 times more
. 2022.05.28 09:06:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 09:06:12 - OpenVPN > VERIFY KU OK
. 2022.05.28 09:06:12 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 09:06:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 09:06:12 - OpenVPN > VERIFY EKU OK
. 2022.05.28 09:06:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 09:06:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 09:06:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 09:06:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 09:06:24 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #7204287 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 09:16:27 - Above log line repeated 563 times more
. 2022.05.28 09:16:27 - Collect information about AirVPN completed
. 2022.05.28 09:16:35 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1030385 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 09:34:16 - Above log line repeated 1486 times more
. 2022.05.28 09:34:16 - ping 1
. 2022.05.28 09:34:16 - ping 2 W
. 2022.05.28 09:34:16 - ping 2 WE
. 2022.05.28 09:34:24 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3399125 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 09:35:55 - Above log line repeated 410 times more
. 2022.05.28 09:35:55 - ping 1
. 2022.05.28 09:35:55 - ping 2 W
. 2022.05.28 09:35:55 - ping 2 WE
. 2022.05.28 09:35:57 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3597685 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 09:46:30 - Above log line repeated 1948 times more
. 2022.05.28 09:46:30 - Collect information about AirVPN completed
. 2022.05.28 10:01:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 10:01:07 - OpenVPN > VERIFY KU OK
. 2022.05.28 10:01:07 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 10:01:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 10:01:07 - OpenVPN > VERIFY EKU OK
. 2022.05.28 10:01:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 10:01:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 10:01:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 10:01:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 10:16:34 - Collect information about AirVPN completed
. 2022.05.28 10:56:02 - Above log line repeated 1 times more
. 2022.05.28 10:56:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 10:56:02 - OpenVPN > VERIFY KU OK
. 2022.05.28 10:56:02 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 10:56:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 10:56:02 - OpenVPN > VERIFY EKU OK
. 2022.05.28 10:56:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 10:56:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 10:56:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 10:56:02 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 11:16:48 - Collect information about AirVPN completed
. 2022.05.28 11:25:48 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #697573 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 11:46:49 - Above log line repeated 1467 times more
. 2022.05.28 11:46:49 - Collect information about AirVPN completed
. 2022.05.28 11:46:51 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2832951 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 11:50:57 - Above log line repeated 179 times more
. 2022.05.28 11:50:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 11:50:57 - OpenVPN > VERIFY KU OK
. 2022.05.28 11:50:57 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 11:50:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 11:50:57 - OpenVPN > VERIFY EKU OK
. 2022.05.28 11:50:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 11:50:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 11:50:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 11:50:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 11:51:29 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3241222 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 12:16:49 - Above log line repeated 999 times more
. 2022.05.28 12:16:49 - Collect information about AirVPN completed
. 2022.05.28 12:16:56 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2642611 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 12:45:52 - Above log line repeated 621 times more
. 2022.05.28 12:45:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 12:45:53 - OpenVPN > VERIFY KU OK
. 2022.05.28 12:45:53 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 12:45:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 12:45:53 - OpenVPN > VERIFY EKU OK
. 2022.05.28 12:45:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 12:45:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 12:45:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 12:45:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 12:46:51 - Collect information about AirVPN completed
. 2022.05.28 12:47:47 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #88844 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 13:16:52 - Above log line repeated 2449 times more
. 2022.05.28 13:16:52 - Collect information about AirVPN completed
. 2022.05.28 13:19:45 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2451020 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 13:40:48 - Above log line repeated 1116 times more
. 2022.05.28 13:40:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 13:40:48 - OpenVPN > VERIFY KU OK
. 2022.05.28 13:40:48 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 13:40:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 13:40:48 - OpenVPN > VERIFY EKU OK
. 2022.05.28 13:40:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 13:40:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 13:40:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 13:40:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 13:40:52 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #4472571 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 13:46:55 - Above log line repeated 709 times more
. 2022.05.28 13:46:55 - Collect information about AirVPN completed
. 2022.05.28 13:47:29 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #458856 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 14:16:59 - Above log line repeated 648 times more
. 2022.05.28 14:16:59 - Collect information about AirVPN completed
. 2022.05.28 14:17:03 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2205086 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 14:35:43 - Above log line repeated 1249 times more
. 2022.05.28 14:35:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 14:35:43 - OpenVPN > VERIFY KU OK
. 2022.05.28 14:35:43 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 14:35:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 14:35:43 - OpenVPN > VERIFY EKU OK
. 2022.05.28 14:35:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 14:35:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 14:35:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 14:35:43 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 14:35:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3414796 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 14:47:02 - Above log line repeated 34 times more
. 2022.05.28 14:47:02 - Collect information about AirVPN completed
. 2022.05.28 15:06:35 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1029816 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 15:17:06 - Above log line repeated 5 times more
. 2022.05.28 15:17:06 - Collect information about AirVPN completed
. 2022.05.28 15:24:20 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1514681 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 15:30:38 - Above log line repeated 5 times more
. 2022.05.28 15:30:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 15:30:38 - OpenVPN > VERIFY KU OK
. 2022.05.28 15:30:38 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 15:30:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 15:30:38 - OpenVPN > VERIFY EKU OK
. 2022.05.28 15:30:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 15:30:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 15:30:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 15:30:38 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 15:36:50 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #291317 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 15:47:09 - Above log line repeated 220 times more
. 2022.05.28 15:47:09 - Collect information about AirVPN completed
. 2022.05.28 15:47:14 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #917955 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 16:17:13 - Above log line repeated 34 times more
. 2022.05.28 16:17:13 - Collect information about AirVPN completed
. 2022.05.28 16:18:53 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2325139 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 16:25:33 - Above log line repeated 541 times more
. 2022.05.28 16:25:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 16:25:33 - OpenVPN > VERIFY KU OK
. 2022.05.28 16:25:33 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 16:25:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 16:25:33 - OpenVPN > VERIFY EKU OK
. 2022.05.28 16:25:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 16:25:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 16:25:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 16:25:33 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 16:25:41 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2815008 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 16:47:14 - Above log line repeated 87 times more
. 2022.05.28 16:47:14 - Collect information about AirVPN completed
. 2022.05.28 16:50:51 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #891396 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 17:17:19 - Above log line repeated 36 times more
. 2022.05.28 17:17:19 - Collect information about AirVPN completed
. 2022.05.28 17:20:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 17:20:28 - OpenVPN > VERIFY KU OK
. 2022.05.28 17:20:28 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 17:20:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 17:20:28 - OpenVPN > VERIFY EKU OK
. 2022.05.28 17:20:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 17:20:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 17:20:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 17:20:28 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 17:25:17 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #293619 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 17:47:20 - Above log line repeated 439 times more
. 2022.05.28 17:47:20 - Collect information about AirVPN completed
. 2022.05.28 17:48:26 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2128468 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 18:15:23 - Above log line repeated 607 times more
. 2022.05.28 18:15:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 18:15:23 - OpenVPN > VERIFY KU OK
. 2022.05.28 18:15:23 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 18:15:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 18:15:23 - OpenVPN > VERIFY EKU OK
. 2022.05.28 18:15:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 18:15:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 18:15:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 18:15:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 18:16:25 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2007 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 18:17:21 - Above log line repeated 1 times more
. 2022.05.28 18:17:21 - Collect information about AirVPN completed
. 2022.05.28 18:17:36 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #93005 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 18:47:26 - Above log line repeated 340 times more
. 2022.05.28 18:47:26 - Collect information about AirVPN completed
. 2022.05.28 18:47:36 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1988925 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 19:10:18 - Above log line repeated 711 times more
. 2022.05.28 19:10:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 19:10:18 - OpenVPN > VERIFY KU OK
. 2022.05.28 19:10:18 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 19:10:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 19:10:18 - OpenVPN > VERIFY EKU OK
. 2022.05.28 19:10:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 19:10:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 19:10:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 19:10:19 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 19:13:38 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #117136 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 19:17:28 - Above log line repeated 7 times more
. 2022.05.28 19:17:28 - Collect information about AirVPN completed
. 2022.05.28 19:22:12 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #474715 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 19:47:29 - Above log line repeated 196 times more
. 2022.05.28 19:47:29 - Collect information about AirVPN completed
. 2022.05.28 20:04:50 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2187753 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 20:05:13 - Above log line repeated 3 times more
. 2022.05.28 20:05:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 20:05:13 - OpenVPN > VERIFY KU OK
. 2022.05.28 20:05:13 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 20:05:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 20:05:13 - OpenVPN > VERIFY EKU OK
. 2022.05.28 20:05:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 20:05:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 20:05:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 20:05:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 20:05:14 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2211270 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 20:17:33 - Above log line repeated 781 times more
. 2022.05.28 20:17:33 - Collect information about AirVPN completed
. 2022.05.28 20:17:52 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1159356 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 20:47:36 - Above log line repeated 182 times more
. 2022.05.28 20:47:36 - Collect information about AirVPN completed
. 2022.05.28 20:48:06 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2823441 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 21:00:09 - Above log line repeated 17 times more
. 2022.05.28 21:00:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 21:00:09 - OpenVPN > VERIFY KU OK
. 2022.05.28 21:00:09 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 21:00:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 21:00:09 - OpenVPN > VERIFY EKU OK
. 2022.05.28 21:00:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 21:00:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 21:00:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 21:00:09 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 21:00:35 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3477539 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 21:17:42 - Above log line repeated 47 times more
. 2022.05.28 21:17:42 - Collect information about AirVPN completed
. 2022.05.28 21:23:54 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #888527 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 21:47:46 - Above log line repeated 799 times more
. 2022.05.28 21:47:46 - Collect information about AirVPN completed
. 2022.05.28 21:53:54 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2785899 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 21:55:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 21:55:04 - OpenVPN > VERIFY KU OK
. 2022.05.28 21:55:04 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 21:55:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 21:55:04 - OpenVPN > VERIFY EKU OK
. 2022.05.28 21:55:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 21:55:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 21:55:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 21:55:04 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 21:59:53 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #128600 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 22:17:51 - Above log line repeated 11 times more
. 2022.05.28 22:17:51 - Collect information about AirVPN completed
. 2022.05.28 22:18:38 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #778658 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 22:47:58 - Above log line repeated 147 times more
. 2022.05.28 22:47:58 - Collect information about AirVPN completed
. 2022.05.28 22:49:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 22:49:59 - OpenVPN > VERIFY KU OK
. 2022.05.28 22:49:59 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 22:49:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 22:49:59 - OpenVPN > VERIFY EKU OK
. 2022.05.28 22:49:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 22:49:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 22:49:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 22:49:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 22:50:24 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1795755 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 23:18:03 - Above log line repeated 2 times more
. 2022.05.28 23:18:03 - Collect information about AirVPN completed
. 2022.05.28 23:37:40 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1155072 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.28 23:44:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.28 23:44:54 - OpenVPN > VERIFY KU OK
. 2022.05.28 23:44:54 - OpenVPN > Validating certificate extended key usage
. 2022.05.28 23:44:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.28 23:44:54 - OpenVPN > VERIFY EKU OK
. 2022.05.28 23:44:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.28 23:44:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 23:44:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.28 23:44:54 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.28 23:48:07 - Collect information about AirVPN completed
. 2022.05.29 00:39:50 - Above log line repeated 1 times more
. 2022.05.29 00:39:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.29 00:39:50 - OpenVPN > VERIFY KU OK
. 2022.05.29 00:39:50 - OpenVPN > Validating certificate extended key usage
. 2022.05.29 00:39:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.29 00:39:50 - OpenVPN > VERIFY EKU OK
. 2022.05.29 00:39:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.29 00:39:50 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.29 00:39:50 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.29 00:39:50 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.29 00:48:20 - Collect information about AirVPN completed
. 2022.05.29 01:03:08 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #644327 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.29 01:18:25 - Above log line repeated 5 times more
. 2022.05.29 01:18:25 - Collect information about AirVPN completed
. 2022.05.29 01:34:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.29 01:34:44 - OpenVPN > VERIFY KU OK
. 2022.05.29 01:34:44 - OpenVPN > Validating certificate extended key usage
. 2022.05.29 01:34:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.29 01:34:44 - OpenVPN > VERIFY EKU OK
. 2022.05.29 01:34:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.29 01:34:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.29 01:34:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.29 01:34:46 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.29 01:35:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #927301 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.29 01:48:32 - Above log line repeated 745 times more
. 2022.05.29 01:48:32 - Collect information about AirVPN completed
. 2022.05.29 01:48:33 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2425505 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.29 02:18:34 - Above log line repeated 624 times more
. 2022.05.29 02:18:34 - Collect information about AirVPN completed
. 2022.05.29 02:18:38 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #8645200 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.29 02:29:41 - Above log line repeated 326 times more
. 2022.05.29 02:29:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.29 02:29:41 - OpenVPN > VERIFY KU OK
. 2022.05.29 02:29:41 - OpenVPN > Validating certificate extended key usage
. 2022.05.29 02:29:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.29 02:29:41 - OpenVPN > VERIFY EKU OK
. 2022.05.29 02:29:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.29 02:29:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.29 02:29:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.29 02:29:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.29 02:29:43 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #11011904 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.29 02:48:35 - Above log line repeated 510 times more
. 2022.05.29 02:48:35 - Collect information about AirVPN completed
. 2022.05.29 02:49:01 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3808673 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.29 03:18:36 - Above log line repeated 666 times more
. 2022.05.29 03:18:36 - Collect information about AirVPN completed
. 2022.05.29 03:18:36 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #10385137 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2022.05.29 03:24:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.29 03:24:33 - OpenVPN > VERIFY KU OK
. 2022.05.29 03:24:33 - OpenVPN > Validating certificate extended key usage
. 2022.05.29 03:24:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.29 03:24:33 - OpenVPN > VERIFY EKU OK
. 2022.05.29 03:24:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.29 03:24:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.29 03:24:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.29 03:24:33 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.29 03:48:38 - Collect information about AirVPN completed
. 2022.05.29 04:19:28 - Above log line repeated 1 times more
. 2022.05.29 04:19:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.29 04:19:28 - OpenVPN > VERIFY KU OK
. 2022.05.29 04:19:28 - OpenVPN > Validating certificate extended key usage
. 2022.05.29 04:19:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.29 04:19:28 - OpenVPN > VERIFY EKU OK
. 2022.05.29 04:19:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.29 04:19:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.29 04:19:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.29 04:19:28 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.29 04:48:42 - Collect information about AirVPN completed
. 2022.05.29 05:14:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.29 05:14:23 - OpenVPN > VERIFY KU OK
. 2022.05.29 05:14:23 - OpenVPN > Validating certificate extended key usage
. 2022.05.29 05:14:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.29 05:14:23 - OpenVPN > VERIFY EKU OK
. 2022.05.29 05:14:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.29 05:14:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.29 05:14:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.29 05:14:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.29 05:18:44 - Collect information about AirVPN completed
. 2022.05.29 06:09:18 - Above log line repeated 1 times more
. 2022.05.29 06:09:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.29 06:09:18 - OpenVPN > VERIFY KU OK
. 2022.05.29 06:09:18 - OpenVPN > Validating certificate extended key usage
. 2022.05.29 06:09:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.29 06:09:18 - OpenVPN > VERIFY EKU OK
. 2022.05.29 06:09:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.29 06:09:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.29 06:09:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.29 06:09:20 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.29 06:18:52 - Collect information about AirVPN completed
. 2022.05.29 07:04:13 - Above log line repeated 1 times more
. 2022.05.29 07:04:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.29 07:04:13 - OpenVPN > VERIFY KU OK
. 2022.05.29 07:04:13 - OpenVPN > Validating certificate extended key usage
. 2022.05.29 07:04:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.29 07:04:13 - OpenVPN > VERIFY EKU OK
. 2022.05.29 07:04:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2022.05.29 07:04:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.29 07:04:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.29 07:04:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
! 2022.05.29 07:07:48 - Disconnecting
. 2022.05.29 07:07:48 - Routes, removed a route previously added, 184.75.221.203 for gateway 10.6.218.1
. 2022.05.29 07:07:48 - Sending soft termination signal
. 2022.05.29 07:07:51 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2022.05.29 07:07:53 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.221.205 MASK 255.255.255.255 192.168.0.1
. 2022.05.29 07:07:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2022.05.29 07:07:53 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.6.218.1
. 2022.05.29 07:07:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2022.05.29 07:07:53 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.6.218.1
. 2022.05.29 07:07:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2022.05.29 07:07:53 - OpenVPN > Closing TUN/TAP interface
. 2022.05.29 07:07:53 - OpenVPN > TAP: DHCP address released
. 2022.05.29 07:07:53 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2022.05.29 07:07:53 - Connection terminated.
I 2022.05.29 07:07:53 - Running event vpn.down
. 2022.05.29 07:07:57 - IPv6 restored with packet filtering.
. 2022.05.29 07:07:57 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic)
. 2022.05.29 07:07:57 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic)
. 2022.05.29 07:07:58 - DNS IPv4 of a network adapter restored to original settings (VBOX VLAN Ethernet, to automatic)
. 2022.05.29 07:07:58 - DNS leak protection with packet filtering disabled.
. 2022.05.29 07:07:58 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4
. 2022.05.29 07:07:58 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6
. 2022.05.29 07:07:58 - Flushing DNS
! 2022.05.29 07:07:58 - Session terminated.
I 2022.05.29 07:08:59 - Session starting.
I 2022.05.29 07:09:02 - Checking authorization ...
. 2022.05.29 07:09:03 - IPv6 disabled with packet filtering.
! 2022.05.29 07:09:03 - Connecting to Agena (Canada, Toronto, Ontario)
. 2022.05.29 07:09:03 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2022.05.29 07:09:03 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2022.05.29 07:09:03 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2022.05.29 07:09:03 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.05.29 07:09:03 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.05.29 07:09:03 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.05.29 07:09:03 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.05.29 07:09:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.213:443
. 2022.05.29 07:09:03 - OpenVPN > Socket Buffers: R=[1600000->524288] S=[160000->524288]
. 2022.05.29 07:09:03 - OpenVPN > UDP link local: (not bound)
. 2022.05.29 07:09:03 - OpenVPN > UDP link remote: [AF_INET]184.75.223.213:443
. 2022.05.29 07:09:03 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.213:443, sid=1c4fffd7 a5a9feb9
. 2022.05.29 07:09:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.05.29 07:09:03 - OpenVPN > VERIFY KU OK
. 2022.05.29 07:09:03 - OpenVPN > Validating certificate extended key usage
. 2022.05.29 07:09:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.05.29 07:09:03 - OpenVPN > VERIFY EKU OK
. 2022.05.29 07:09:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Agena, emailAddress=info@airvpn.org
. 2022.05.29 07:09:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.05.29 07:09:03 - OpenVPN > [Agena] Peer Connection Initiated with [AF_INET]184.75.223.213:443
. 2022.05.29 07:09:04 - OpenVPN > SENT CONTROL [Agena]: 'PUSH_REQUEST' (status=1)
. 2022.05.29 07:09:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.4.218.1,dhcp-option DNS6 fde6:7a:7d20:da::1,tun-ipv6,route-gateway 10.4.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:da::10dd/64 fde6:7a:7d20:da::1,ifconfig 10.4.218.223 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2022.05.29 07:09:04 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2022.05.29 07:09:04 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:da::1'
. 2022.05.29 07:09:04 - OpenVPN > Pushed option removed by filter: 'tun-ipv6'
. 2022.05.29 07:09:04 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:da::10dd/64 fde6:7a:7d20:da::1'
. 2022.05.29 07:09:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.05.29 07:09:04 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2022.05.29 07:09:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.05.29 07:09:04 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.05.29 07:09:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.05.29 07:09:04 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.05.29 07:09:04 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2022.05.29 07:09:04 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2022.05.29 07:09:04 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2022.05.29 07:09:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.29 07:09:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.05.29 07:09:04 - OpenVPN > interactive service msg_channel=0
. 2022.05.29 07:09:04 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=50:e5:49:b4:1b:8f
. 2022.05.29 07:09:04 - OpenVPN > open_tun
. 2022.05.29 07:09:08 - OpenVPN > tap-windows6 device [Local Area Connection] opened
. 2022.05.29 07:09:08 - OpenVPN > TAP-Windows Driver Version 9.24
. 2022.05.29 07:09:08 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.218.0/10.4.218.223/255.255.255.0 [SUCCEEDED]
. 2022.05.29 07:09:08 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.218.223/255.255.255.0 on interface {924067ED-41A4-438C-AE4C-472758D3B4D8} [DHCP-serv: 10.4.218.254, lease-time: 31536000]
. 2022.05.29 07:09:08 - OpenVPN > Successful ARP Flush on interface [13] {924067ED-41A4-438C-AE4C-472758D3B4D8}
. 2022.05.29 07:09:08 - OpenVPN > IPv4 MTU set to 1500 on interface 13 using SetIpInterfaceEntry()
. 2022.05.29 07:09:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2022.05.29 07:09:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.223.213 MASK 255.255.255.255 192.168.0.1
. 2022.05.29 07:09:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2022.05.29 07:09:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2022.05.29 07:09:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.218.1
. 2022.05.29 07:09:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2022.05.29 07:09:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2022.05.29 07:09:10 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.218.1
. 2022.05.29 07:09:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2022.05.29 07:09:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2022.05.29 07:09:11 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4
. 2022.05.29 07:09:11 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6
. 2022.05.29 07:09:11 - DNS leak protection with packet filtering enabled.
. 2022.05.29 07:09:12 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.4.0.1, 10.5.0.1)
. 2022.05.29 07:09:12 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.4.0.1, 10.5.0.1)
. 2022.05.29 07:09:13 - DNS IPv4 of a network adapter forced (VBOX VLAN Ethernet, from automatic to 10.4.0.1, 10.5.0.1)
. 2022.05.29 07:09:13 - Routes, added a new route, 184.75.223.211 for gateway 10.4.218.1
. 2022.05.29 07:09:13 - Unable to compute route for 2606:6080:1002:6:f780:efa6:f9d2:3459: IPv6 VPN gateway not available.
. 2022.05.29 07:09:13 - Flushing DNS
I 2022.05.29 07:09:13 - Checking route IPv4
! 2022.05.29 07:09:14 - Connected.
. 2022.05.29 07:09:15 - OpenVPN > Initialization Sequence Completed
. 2022.05.29 07:19:04 - Collect information about AirVPN completed
. 2022.05.29 07:23:45 - ping 1
. 2022.05.29 07:23:45 - ping 2 W
. 2022.05.29 07:23:45 - ping 2 WE

----------------------------
Network Interfaces and Routes:

{
    "support_ipv4": true,
    "support_ipv6": true,
    "routes": [
        {
            "address": "0.0.0.0\/0",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "25"
        },
        {
            "address": "0.0.0.0\/1",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "10.4.218.1",
            "metric": "3"
        },
        {
            "address": "10.4.218.0\/24",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "10.4.218.223",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "10.4.218.255",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "127.0.0.0\/8",
            "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "127.0.0.1",
            "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "127.255.255.255",
            "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "128.0.0.0\/1",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "10.4.218.1",
            "metric": "3"
        },
        {
            "address": "159.153.65.213",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "26"
        },
        {
            "address": "159.153.65.214",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "26"
        },
        {
            "address": "159.153.65.219",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "26"
        },
        {
            "address": "159.153.65.235",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "26"
        },
        {
            "address": "159.153.72.252",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "26"
        },
        {
            "address": "159.153.78.102",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "26"
        },
        {
            "address": "159.153.78.103",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "26"
        },
        {
            "address": "159.153.78.109",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "26"
        },
        {
            "address": "159.153.92.28",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "26"
        },
        {
            "address": "169.254.0.0\/16",
            "interface": "{CDE141BA-930E-4E5E-8FBB-5FEA15A05774}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "169.254.202.20",
            "interface": "{CDE141BA-930E-4E5E-8FBB-5FEA15A05774}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "169.254.255.255",
            "interface": "{CDE141BA-930E-4E5E-8FBB-5FEA15A05774}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "184.75.223.211",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "10.4.218.1",
            "metric": "4"
        },
        {
            "address": "184.75.223.213",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "192.168.0.1",
            "metric": "25"
        },
        {
            "address": "192.168.0.0\/24",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "192.168.0.99",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "192.168.0.255",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{CDE141BA-930E-4E5E-8FBB-5FEA15A05774}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "255.255.255.255",
            "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "255.255.255.255",
            "interface": "{CDE141BA-930E-4E5E-8FBB-5FEA15A05774}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "255.255.255.255",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "255.255.255.255",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "::1",
            "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "2603:8090:1b00:6d00::\/56",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "fe80::4a00:33ff:fef5:7e45",
            "metric": "281"
        },
        {
            "address": "2603:8090:1b00:6d00::\/64",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "2603:8090:1b00:6d00:9816:973a:d65d:bba3",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "2603:8090:1b00:6d00:d9dd:e69a:a76e:b996",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "2603:8090:1b00:6d00:f8bc:dbb5:af61:10d8",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "fe80::\/64",
            "interface": "{CDE141BA-930E-4E5E-8FBB-5FEA15A05774}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "fe80::\/64",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "fe80::\/64",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "fe80::28c6:8ca5:36f9:ca14",
            "interface": "{CDE141BA-930E-4E5E-8FBB-5FEA15A05774}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "fe80::d538:c344:1e37:cf2e",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "fe80::f8bc:dbb5:af61:10d8",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "ff00::\/8",
            "interface": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "ff00::\/8",
            "interface": "{CDE141BA-930E-4E5E-8FBB-5FEA15A05774}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "ff00::\/8",
            "interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "ff00::\/8",
            "interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "gateway": "link",
            "metric": "259"
        }
    ],
    "interfaces": [
        {
            "friendly": "Local Area Connection",
            "id": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
            "name": "Local Area Connection",
            "description": "TAP-Windows Adapter V9",
            "type": "Virtual",
            "status": "Up",
            "bytes_received": "118832038294",
            "bytes_sent": "24530280417",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::d538:c344:1e37:cf2e",
                "10.4.218.223"
            ],
            "gateways": [
                "10.4.218.1"
            ],
            "bind": true,
            "dns4": "10.4.0.1,10.5.0.1",
            "dns6": null
        },
        {
            "friendly": "Ethernet",
            "id": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}",
            "name": "Ethernet",
            "description": "Realtek PCIe GbE Family Controller",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "128172336888",
            "bytes_sent": "29867328595",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "2603:8090:1b00:6d00:f8bc:dbb5:af61:10d8",
                "2603:8090:1b00:6d00:9816:973a:d65d:bba3",
                "2603:8090:1b00:6d00:d9dd:e69a:a76e:b996",
                "fe80::f8bc:dbb5:af61:10d8",
                "192.168.0.99"
            ],
            "gateways": [
                "192.168.0.1",
                "fe80::4a00:33ff:fef5:7e45"
            ],
            "bind": true,
            "dns4": "10.4.0.1,10.5.0.1",
            "dns6": null
        },
        {
            "friendly": "VBOX VLAN Ethernet",
            "id": "{CDE141BA-930E-4E5E-8FBB-5FEA15A05774}",
            "name": "VBOX VLAN Ethernet",
            "description": "VirtualBox Host-Only Ethernet Adapter",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::28c6:8ca5:36f9:ca14",
                "169.254.202.20"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "10.4.0.1,10.5.0.1",
            "dns6": null
        },
        {
            "friendly": "Bluetooth Network Connection",
            "id": "{B92283B6-E3EA-4567-9547-F43574AD93D5}",
            "name": "Bluetooth Network Connection",
            "description": "Bluetooth Device (Personal Area Network) #3",
            "type": "Ethernet",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::c0f1:b79e:9ce8:f4c",
                "169.254.15.76"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Loopback Pseudo-Interface 1",
            "id": "{59E6807D-389A-11E9-8CA3-806E6F6E6963}",
            "name": "Loopback Pseudo-Interface 1",
            "description": "Software Loopback Interface 1",
            "type": "Loopback",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "::1",
                "127.0.0.1"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        }
    ],
    "ipv4-default-gateway": "10.4.218.1",
    "ipv4-default-interface": "{924067ED-41A4-438C-AE4C-472758D3B4D8}",
    "ipv6-default-gateway": "fe80::4a00:33ff:fef5:7e45",
    "ipv6-default-interface": "{2790E8FB-A0AD-4319-9F40-382C9A50DF67}"
}
----------------------------
ipconfig /all:

Windows IP Configuration

   Host Name . . . . . . . . . . . . : C001-RIGEL
   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : kc.rr.com

Unknown adapter Local Area Connection:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : TAP-Windows Adapter V9
   Physical Address. . . . . . . . . : 00-FF-92-40-67-ED
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::d538:c344:1e37:cf2e%13(Preferred)
   IPv4 Address. . . . . . . . . . . : 10.4.218.223(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Sunday, May 29, 2022 7:09:04 AM
   Lease Expires . . . . . . . . . . : Monday, May 29, 2023 7:09:04 AM
   Default Gateway . . . . . . . . . :
   DHCP Server . . . . . . . . . . . : 10.4.218.254
   DHCPv6 IAID . . . . . . . . . . . : 218169234
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-D3-3F-C1-50-E5-49-B4-1B-8F
   NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Ethernet:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Realtek PCIe GbE Family Controller
   Physical Address. . . . . . . . . : 50-E5-49-B4-1B-8F
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : 2603:8090:1b00:6d00:f8bc:dbb5:af61:10d8(Preferred)
   Temporary IPv6 Address. . . . . . : 2603:8090:1b00:6d00:9816:973a:d65d:bba3(Preferred)
   Temporary IPv6 Address. . . . . . : 2603:8090:1b00:6d00:d9dd:e69a:a76e:b996(Deprecated)
   Link-local IPv6 Address . . . . . : fe80::f8bc:dbb5:af61:10d8%3(Preferred)
   IPv4 Address. . . . . . . . . . . : 192.168.0.99(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Friday, May 27, 2022 8:12:04 PM
   Lease Expires . . . . . . . . . . : Friday, June 24, 2022 8:11:58 PM
   Default Gateway . . . . . . . . . : 192.168.0.1
   DHCP Server . . . . . . . . . . . : 192.168.0.1
   DHCPv6 IAID . . . . . . . . . . . : 609281353
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-D3-3F-C1-50-E5-49-B4-1B-8F
   NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter VBOX VLAN Ethernet:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : VirtualBox Host-Only Ethernet Adapter
   Physical Address. . . . . . . . . : 0A-00-27-00-00-0A
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::28c6:8ca5:36f9:ca14%10(Preferred)
   Autoconfiguration IPv4 Address. . : 169.254.202.20(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.0.0
   Default Gateway . . . . . . . . . :
   DHCPv6 IAID . . . . . . . . . . . : 235536423
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-D3-3F-C1-50-E5-49-B4-1B-8F
   NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Bluetooth Network Connection:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) #3
   Physical Address. . . . . . . . . : 00-1A-7D-DA-71-13
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes



  Edited ... by OpenSourcerer
Apply LOG format to system report

Share this post


Link to post
2 hours ago, ProphetPX said:

There is NO option that uses that language in v2.20.0 client.  I THINK you meant....
"Force usage of bundled plink.exe" ?"


I meant in 2.21.x client, sorry. 2.20 uses TAP by default which seems to connect just fine. If TAP will connect as well in 2.21.x, it's a wintun problem, in which case the developer wants to know because he advised to never suggest that option anymore for troubleshooting.
Because of this, my recommendation shall be to contact support with the 2.21.x wintun problem, but actually use 2.20 productively yourself, as you've already done.

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
On 5/29/2022 at 5:02 PM, OpenSourcerer said:

I meant in 2.21.x client, sorry. 2.20 uses TAP by default which seems to connect just fine. If TAP will connect as well in 2.21.x, it's a wintun problem, in which case the developer wants to know because he advised to never suggest that option anymore for troubleshooting.
Because of this, my recommendation shall be to contact support with the 2.21.x wintun problem, but actually use 2.20 productively yourself, as you've already done.

Exactly, the NETSH error above is an OpenVPN error, not Eddie's.
Seems related to the wintun driver, but tap-driver is deprecated.
@ProphetPX the issue is under investigation, please be patient.

Share this post


Link to post
Posted ... (edited)
On 5/30/2022 at 10:00 AM, Clodo said:

Exactly, the NETSH error above is an OpenVPN error, not Eddie's.
Seems related to the wintun driver, but tap-driver is deprecated.
@ProphetPX the issue is under investigation, please be patient.

Thank you so much!   i know that this reply (here right now) is far after this issue was brought up, but i wonder if any progress has been made?  I am still using the OLD Eddie packaga that i noted above.  Are there any security problems with the older one that i am still using?   And have any of those problems i was having been fixed in any latest updates?  Thank you!
NOTE:  it has now been ALMOST EXACTLY 1 YEAR since the last comment / reply on this thread  lol
I am right now just wondering if it is SAFE for me to upgrade my Eddie client from the old one i am using now??  Will it work without those netsh errors?
Thanks!

BTW i just renewed my plan for another full year -- I LOVE AirVPN!!!!!!!!!!!!!!!!!!
  Edited ... by ProphetPX
added question

Share this post


Link to post
Three versions have been published since then, but the changelog is rather terse and does not refer to any fixes in connection with netsh. You can try, though. :)

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

well here it is, 1 year later, and i just upgraded and again tried NEW Eddie, now version 2.21.8, and i am still having the same problem as netsh error 1 :(
the same problem i was having 1 year ago is again still happening now.

guess i was wrong to try upgrading again?
i am gonna reset/default all options and retry 2.21.8, and see how that goes.

 

Share this post


Link to post
Posted ... (edited)

@Clodo @OpenSourcerer
USING NEW Eddie 2.21.8 a lil more ... i think i figured out the whole problem.  ON MY SYSTEM, for my own reasons, i have disabled my "DNS Client" Service in Windows 10.  And i think the reason netsh is failing on error 1 is because of this?!  ON THE OLD client i was using all this time, this did not ever present a problem!  And AirVPN worked all the time, even with that service disabled.  How can i setup new Eddie so that i do not leak IP, data, or DNS while still keeping my DNS Client disabled?

I do not want to have my DNS Client enabled because i want to get back to using very large host files, eventually..... as i was used to.
And old Eddie worked great without needing DNS Client.  But it seems new Eddie (or even wireguard conf files) need DNS client because even those (generated confs for Wireguard) are failing, now too?

Thanks
 

Edited ... by ProphetPX
tagged people from before

Share this post


Link to post
@ProphetPX

Hello!

First and foremost, let's specify that the system names resolution priority is always hosts file before DNS (unless you have deeply tweaked the system, but it's not the case we guess). With that said, you can tell Eddie not to consider the server DNS push and leave your DNS settings unaltered in the "Preferences" > "DNS" window. Set the "DNS switch mode" combo box to "Disabled" and uncheck "Check AirVPN DNS".

We don't know how it's possible, according to your description, that DNS push could work if DNS client service was disabled, we leave this part to Clodo.
 
On 6/4/2023 at 7:54 PM, ProphetPX said:
BTW i just renewed my plan for another full year -- I LOVE AirVPN!!!!!!!!!!!!!!!!!!

Thank you very much!

Kind regards
 

Share this post


Link to post
2 hours ago, Staff said:
@ProphetPX

Hello!

First and foremost, let's specify that the system names resolution priority is always hosts file before DNS (unless you have deeply tweaked the system, but it's not the case we guess). With that said, you can tell Eddie not to consider the server DNS push and leave your DNS settings unaltered in the "Preferences" > "DNS" window. Set the "DNS switch mode" combo box to "Disabled" and uncheck "Check AirVPN DNS".

We don't know how it's possible, according to your description, that DNS push could work if DNS client service was disabled, we leave this part to Clodo.
 
Thank you very much!

Kind regards
 

@Staff
i really do not think you understood what i was trying to say at all.  IT SEEMS that the system is being commanded by Eddie to netsh towards the DNS Client service which i HAVE DISABLED and is NOT running and that is why i think i am getting the netsh error 1 and the VPN tunnel is NOT CONNECTING or working?!?

THIS DOES NOT HAVE ANYTHING TO DO with my hosts file or ranking in terms of how to get DNS working.

This FAILURE i think is because of my DNS Client service being OFF and DISABLED and netsh is not liking that for SOME reason and i am asking is:
IS THERE SOME WAY to STOP Eddie from making netsh to stop trying to access DNS Client service?
because I KNOW the error "RPC Server is not available" is because DNS Client is NOT RUNNING.

do you understand what i am getting at, what i am saying is going on and why i think that is what it is??
 

Share this post


Link to post
14 minutes ago, ProphetPX said:

IT SEEMS that the system is being commanded by Eddie to netsh towards the DNS Client service which i HAVE DISABLED and is NOT running and that is why i think i am getting the netsh error 1 and the VPN tunnel is NOT CONNECTING or working?!?


To convert what seems to be the case to fact, enable the service, reboot and try again. If the problem persists, you and everyone else in here will know it's not what you're trying to express in an overly lengthy way.
 
23 minutes ago, ProphetPX said:

i really do not think you understood what i was trying to say at all.


No, they did. If DNS mode is Disabled, Eddie does not attempt to set DNS. So, set it to Disabled and see if the error persists.
Any other netsh error comes from OpenVPN, not Eddie.
 
25 minutes ago, ProphetPX said:

IS THERE SOME WAY to STOP Eddie from making netsh to stop trying to access DNS Client service?


No, because OpenVPN does the netshs.

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
12 minutes ago, OpenSourcerer said:

To convert what seems to be the case to fact, enable the service, reboot and try again. If the problem persists, you and everyone else in here will know it's not what you're trying to express in an overly lengthy way.
 

I DO NOT WANT DNS Client service in Windows 10 to be enabled though???

I want to be able to use Eddie WITHOUT enabling DNS Client service.  please understand that is all i want.
i want AirVPN to work, either in normal Eddie mode, or via OpenVPN or Wireguard conf generation, and NOT have to enable DNS Client service in windows.

what do i do, what setting do i setup, to allow that?
because that is the root of my whole problem here.  please help me with this INSTEAD
i do not want and am NOT going to re-enable  DNS Client in windows because THEIR CODE IS TRASH.
MICROSOFT CODE IS TRASH.

thanks
 

Share this post


Link to post
2 minutes ago, ProphetPX said:

I DO NOT WANT DNS Client service in Windows 10 to be enabled though???

I want to be able to use Eddie WITHOUT enabling DNS Client service.  please understand that is all i want.


But we need to establish a fact that your setting is what trips up OpenVPN. What if it isn't, and you're trying to fix something that is not broken?
You must invest your share of understanding as well here. This is for troubleshooting purposes, because you came to us for help; have the decency to at least follow the directions of those investing their time to help with your crude, one-in-a-billion setup. We all know that is what you want, but right now any factor that is nonstandard must be reverted to a standard one to allow pinning down the problem. You being stubborn about all this completely defeats the purpose of your asking for help.
 
1 minute ago, ProphetPX said:

please JUST HELP ME!!  A LOT of you are using terminology "disable DNS" that DOES NOT MATCH what Eddie says in the client window -- please use proper terms please!!!


We are trying to, but you get hung up with the terminology yourself and point fingers in all directions. Please simply follow the proposed fixes; you can always revert!

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
8 minutes ago, OpenSourcerer said:

But we need to establish a fact that your setting is what trips up OpenVPN. What if it isn't, and you're trying to fix something that is not broken?
You must invest your share of understanding as well here. This is for troubleshooting purposes, because you came to us for help; have the decency to at least follow the directions of those investing their time to help with your crude, one-in-a-billion setup. We all know that is what you want, but right now any factor that is nonstandard must be reverted to a standard one to allow pinning down the problem. You being stubborn about all this completely defeats the purpose of your asking for help.
 
We are trying to, but you get hung up with the terminology yourself and point fingers in all directions. Please simply follow the proposed fixes; you can always revert!

ok i get all that but you were the one (a year ago) who said my netsh was not standard, that my netsh was doing weird commands

here is a new system report...

sigh.  editing registry and rebooting  :(
 

eddie_sys_report_7-17-2023.txt

Share this post


Link to post
Just now, ProphetPX said:

ok i get all that but you were the one (a year ago) who said my netsh was not standard, that my netsh was doing weird commands


I wrote that I think it was not standard, but also told you to contact professional support and keep using 2.20 in the meantime. What was the result of that?

In any case, I found the option --ip-win32 ipapi in the manpage. Setting this will not use netsh to set things. You could try that.

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...