Jump to content
Not connected, Your IP: 3.144.3.235
Sign in to follow this  
remy1234

Unable to Connect / Weird uninstall

Recommended Posts

Hello,

After a restart to my PC (win7) and some time I noticed that the AirVPN client was no longer installed.  I was given the windows option to delete the shortcut and am not sure why.   I reinstalled the client and am have trouble connecting to the server.  Any help would be very appreciated.  Thank you.

I 2022.06.09 01:19:37 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64
. 2022.06.09 01:19:37 - Reading options from C:\Users\Aaron\AppData\Local\AirVPN\AirVPN.xml
. 2022.06.09 01:19:37 - Data Path: C:\Users\Aaron\AppData\Local\AirVPN
. 2022.06.09 01:19:37 - App Path: C:\Program Files\AirVPN
. 2022.06.09 01:19:37 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2022.06.09 01:19:37 - Command line arguments (1): path="home"
. 2022.06.09 01:19:37 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1
. 2022.06.09 01:19:37 - Updating systems & servers data ...
I 2022.06.09 01:19:37 - OpenVPN Driver - TAP-Windows Adapter V9 #3, version 9.24.2
I 2022.06.09 01:19:37 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2022.06.09 01:19:37 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2022.06.09 01:19:37 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2022.06.09 01:19:37 - Ready
. 2022.06.09 01:19:38 - Systems & servers data update completed
I 2022.06.09 01:19:41 - Session starting.
I 2022.06.09 01:20:15 - Checking authorization ...
! 2022.06.09 01:20:15 - Connecting to Haedus (United States, New York City)
! 2022.06.09 01:20:18 - Disconnecting
. 2022.06.09 01:20:18 - Connection terminated.
I 2022.06.09 01:20:21 - Checking authorization ...
! 2022.06.09 01:20:23 - Connecting to Haedus (United States, New York City)
! 2022.06.09 01:20:27 - Disconnecting
. 2022.06.09 01:20:27 - Connection terminated.
I 2022.06.09 01:20:30 - Checking authorization ...
! 2022.06.09 01:20:30 - Connecting to Haedus (United States, New York City)
! 2022.06.09 01:20:33 - Disconnecting
. 2022.06.09 01:20:33 - Connection terminated.
I 2022.06.09 01:20:36 - Checking authorization ...
! 2022.06.09 01:20:36 - Connecting to Haedus (United States, New York City)
! 2022.06.09 01:20:40 - Disconnecting
. 2022.06.09 01:20:40 - Connection terminated.
I 2022.06.09 01:20:43 - Checking authorization ...
! 2022.06.09 01:20:43 - Connecting to Haedus (United States, New York City)
! 2022.06.09 01:20:46 - Disconnecting
. 2022.06.09 01:20:46 - Connection terminated.
I 2022.06.09 01:20:49 - Checking authorization ...
! 2022.06.09 01:20:50 - Connecting to Haedus (United States, New York City)
! 2022.06.09 01:20:53 - Disconnecting
. 2022.06.09 01:20:53 - Connection terminated.
I 2022.06.09 01:20:56 - Checking authorization ...
! 2022.06.09 01:20:56 - Connecting to Haedus (United States, New York City)
! 2022.06.09 01:20:59 - Disconnecting
. 2022.06.09 01:20:59 - Connection terminated.
I 2022.06.09 01:21:02 - Checking authorization ...
! 2022.06.09 01:21:03 - Connecting to Haedus (United States, New York City)
! 2022.06.09 01:21:06 - Disconnecting
. 2022.06.09 01:21:06 - Connection terminated.
. 2022.06.09 01:21:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:21:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:21:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:21:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:21:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:21:09 - OpenVPN > UDPv4 link local: [undef]
. 2022.06.09 01:21:09 - OpenVPN > UDPv4 link remote: [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:09 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.115.138:443, sid=fd2991e0 c96ead3c
. 2022.06.09 01:21:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:21:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:21:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:21:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:21:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:21:09 - OpenVPN > UDPv4 link local: [undef]
. 2022.06.09 01:21:09 - OpenVPN > UDPv4 link remote: [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:09 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.115.138:443, sid=aa8279ce 9a877026
. 2022.06.09 01:21:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:21:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:21:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:21:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:21:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:21:09 - OpenVPN > UDPv4 link local: [undef]
. 2022.06.09 01:21:09 - OpenVPN > UDPv4 link remote: [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:09 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.115.138:443, sid=35b0b9db 74de05c6
. 2022.06.09 01:21:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:21:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:21:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:21:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:21:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:21:09 - OpenVPN > UDPv4 link local: [undef]
. 2022.06.09 01:21:09 - OpenVPN > UDPv4 link remote: [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:09 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.115.138:443, sid=f52ff04d 1de34019
. 2022.06.09 01:21:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:21:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:21:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:21:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:21:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:21:09 - OpenVPN > UDPv4 link local: [undef]
. 2022.06.09 01:21:09 - OpenVPN > UDPv4 link remote: [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:09 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.115.138:443, sid=b534030b 61c0fda4
. 2022.06.09 01:21:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:21:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:21:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:21:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:21:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:21:09 - OpenVPN > UDPv4 link local: [undef]
. 2022.06.09 01:21:09 - OpenVPN > UDPv4 link remote: [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:09 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.115.138:443, sid=4d50a419 2fbfe4ad
. 2022.06.09 01:21:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:21:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:21:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:21:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:21:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:21:09 - OpenVPN > UDPv4 link local: [undef]
. 2022.06.09 01:21:09 - OpenVPN > UDPv4 link remote: [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:09 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.115.138:443, sid=d4722dd2 47149178
. 2022.06.09 01:21:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:21:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:21:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:21:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:21:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:21:09 - OpenVPN > UDPv4 link local: [undef]
. 2022.06.09 01:21:09 - OpenVPN > UDPv4 link remote: [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:09 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.115.138:443, sid=35cc5aad 821f84d7
. 2022.06.09 01:21:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:21:09 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:21:09 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 01:21:09 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:21:09 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:21:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:21:09 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:21:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Haedus, emailAddress=info@airvpn.org
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:21:09 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:21:09 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 01:21:09 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:21:09 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:21:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:21:09 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:21:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Haedus, emailAddress=info@airvpn.org
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:21:09 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:21:09 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 01:21:09 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:21:09 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:21:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:21:09 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:21:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Haedus, emailAddress=info@airvpn.org
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:21:09 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:21:09 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 01:21:09 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:21:09 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:21:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:21:09 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:21:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Haedus, emailAddress=info@airvpn.org
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:21:09 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:21:09 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 01:21:09 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:21:09 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:21:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:21:09 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:21:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Haedus, emailAddress=info@airvpn.org
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:21:09 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:21:09 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 01:21:09 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:21:09 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:21:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:21:09 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:21:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Haedus, emailAddress=info@airvpn.org
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:21:09 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:21:09 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 01:21:09 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:21:09 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:21:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:21:09 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:21:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Haedus, emailAddress=info@airvpn.org
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:21:09 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:21:09 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 01:21:09 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:21:09 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:21:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:21:09 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:21:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Haedus, emailAddress=info@airvpn.org
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 01:21:09 - OpenVPN > [Haedus] Peer Connection Initiated with [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:09 - OpenVPN > SENT CONTROL [Haedus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:21:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.224.1,route-gateway 10.26.224.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.224.70 255.255.255.0,peer-id 5'
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: route options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:21:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 01:21:09 - OpenVPN > [Haedus] Peer Connection Initiated with [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:09 - OpenVPN > SENT CONTROL [Haedus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:21:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.224.1,route-gateway 10.26.224.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.224.70 255.255.255.0,peer-id 6'
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: route options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:21:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 01:21:09 - OpenVPN > [Haedus] Peer Connection Initiated with [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:09 - OpenVPN > SENT CONTROL [Haedus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:21:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.224.1,route-gateway 10.26.224.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.224.70 255.255.255.0,peer-id 5'
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: route options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:21:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 01:21:09 - OpenVPN > [Haedus] Peer Connection Initiated with [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:09 - OpenVPN > SENT CONTROL [Haedus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:21:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.224.1,route-gateway 10.26.224.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.224.70 255.255.255.0,peer-id 6'
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: route options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:21:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 01:21:09 - OpenVPN > [Haedus] Peer Connection Initiated with [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:09 - OpenVPN > SENT CONTROL [Haedus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:21:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.224.1,route-gateway 10.26.224.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.224.70 255.255.255.0,peer-id 5'
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: route options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:21:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 01:21:09 - OpenVPN > [Haedus] Peer Connection Initiated with [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:09 - OpenVPN > SENT CONTROL [Haedus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:21:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.224.1,route-gateway 10.26.224.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.224.70 255.255.255.0,peer-id 6'
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: route options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:21:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 01:21:09 - OpenVPN > [Haedus] Peer Connection Initiated with [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:09 - OpenVPN > SENT CONTROL [Haedus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:21:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.224.1,route-gateway 10.26.224.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.224.70 255.255.255.0,peer-id 5'
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: route options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:21:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 01:21:09 - OpenVPN > [Haedus] Peer Connection Initiated with [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:09 - OpenVPN > SENT CONTROL [Haedus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:21:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.224.1,route-gateway 10.26.224.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.224.70 255.255.255.0,peer-id 6'
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: route options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2022.06.09 01:21:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:21:09 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:21:09 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 01:21:09 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:21:09 - OpenVPN > Exiting due to fatal error
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2022.06.09 01:21:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:21:09 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:21:09 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 01:21:09 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:21:09 - OpenVPN > Exiting due to fatal error
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2022.06.09 01:21:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:21:09 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:21:09 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 01:21:09 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:21:09 - OpenVPN > Exiting due to fatal error
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2022.06.09 01:21:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:21:09 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:21:09 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 01:21:09 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:21:09 - OpenVPN > Exiting due to fatal error
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2022.06.09 01:21:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:21:09 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:21:09 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 01:21:09 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:21:09 - OpenVPN > Exiting due to fatal error
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2022.06.09 01:21:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:21:09 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:21:09 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 01:21:09 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:21:09 - OpenVPN > Exiting due to fatal error
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2022.06.09 01:21:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:21:09 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:21:09 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 01:21:09 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:21:09 - OpenVPN > Exiting due to fatal error
. 2022.06.09 01:21:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2022.06.09 01:21:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:21:09 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:21:09 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 01:21:09 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:21:09 - OpenVPN > Exiting due to fatal error
I 2022.06.09 01:21:09 - Checking authorization ...
! 2022.06.09 01:21:09 - Connecting to Haedus (United States, New York City)
. 2022.06.09 01:21:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:21:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:21:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:21:10 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:21:10 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:10 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:10 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:21:10 - OpenVPN > UDPv4 link local: [undef]
. 2022.06.09 01:21:10 - OpenVPN > UDPv4 link remote: [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:10 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.115.138:443, sid=3395db0d e24657e0
. 2022.06.09 01:21:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:21:10 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:21:10 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 01:21:10 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:21:10 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:21:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:21:10 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:21:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Haedus, emailAddress=info@airvpn.org
. 2022.06.09 01:21:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 01:21:10 - OpenVPN > [Haedus] Peer Connection Initiated with [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:13 - OpenVPN > SENT CONTROL [Haedus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:21:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.224.1,route-gateway 10.26.224.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.224.70 255.255.255.0,peer-id 5'
. 2022.06.09 01:21:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 01:21:13 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 01:21:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.06.09 01:21:13 - OpenVPN > OPTIONS IMPORT: route options modified
. 2022.06.09 01:21:13 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 01:21:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 01:21:13 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:21:13 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2022.06.09 01:21:13 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:21:13 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:21:13 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 01:21:13 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:21:13 - OpenVPN > Exiting due to fatal error
! 2022.06.09 01:21:13 - Disconnecting
. 2022.06.09 01:21:13 - Connection terminated.
I 2022.06.09 01:21:16 - Checking authorization ...
! 2022.06.09 01:21:16 - Connecting to Haedus (United States, New York City)
. 2022.06.09 01:21:16 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:21:16 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:21:16 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:21:16 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:21:16 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:16 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:16 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:21:16 - OpenVPN > UDPv4 link local: [undef]
. 2022.06.09 01:21:16 - OpenVPN > UDPv4 link remote: [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:16 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.115.138:443, sid=5c4f8f3d 8745ce9d
. 2022.06.09 01:21:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:21:16 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:21:16 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 01:21:16 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:21:16 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:21:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:21:16 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:21:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Haedus, emailAddress=info@airvpn.org
. 2022.06.09 01:21:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 01:21:17 - OpenVPN > [Haedus] Peer Connection Initiated with [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:19 - OpenVPN > SENT CONTROL [Haedus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:21:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.224.1,route-gateway 10.26.224.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.224.70 255.255.255.0,peer-id 6'
. 2022.06.09 01:21:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 01:21:19 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 01:21:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.06.09 01:21:19 - OpenVPN > OPTIONS IMPORT: route options modified
. 2022.06.09 01:21:19 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 01:21:19 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 01:21:19 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:21:19 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2022.06.09 01:21:19 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:21:19 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:21:19 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 01:21:19 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:21:19 - OpenVPN > Exiting due to fatal error
! 2022.06.09 01:21:19 - Disconnecting
. 2022.06.09 01:21:19 - Connection terminated.
I 2022.06.09 01:21:22 - Checking authorization ...
! 2022.06.09 01:21:23 - Connecting to Haedus (United States, New York City)
. 2022.06.09 01:21:23 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:21:23 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:21:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:21:23 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:21:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:23 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:21:23 - OpenVPN > UDPv4 link local: [undef]
. 2022.06.09 01:21:23 - OpenVPN > UDPv4 link remote: [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:23 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.115.138:443, sid=bdc1a9fc 903e5479
. 2022.06.09 01:21:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:21:23 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:21:23 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 01:21:23 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:21:23 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:21:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:21:23 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:21:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Haedus, emailAddress=info@airvpn.org
. 2022.06.09 01:21:23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:23 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:23 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 01:21:23 - OpenVPN > [Haedus] Peer Connection Initiated with [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:25 - OpenVPN > SENT CONTROL [Haedus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:21:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.224.1,route-gateway 10.26.224.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.224.70 255.255.255.0,peer-id 5'
. 2022.06.09 01:21:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 01:21:25 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 01:21:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.06.09 01:21:25 - OpenVPN > OPTIONS IMPORT: route options modified
. 2022.06.09 01:21:25 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 01:21:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 01:21:25 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:21:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2022.06.09 01:21:25 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:21:25 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:21:25 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 01:21:25 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:21:25 - OpenVPN > Exiting due to fatal error
! 2022.06.09 01:21:25 - Disconnecting
. 2022.06.09 01:21:25 - Connection terminated.
I 2022.06.09 01:21:28 - Checking authorization ...
! 2022.06.09 01:21:29 - Connecting to Haedus (United States, New York City)
. 2022.06.09 01:21:29 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:21:29 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:21:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:21:29 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:21:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:29 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:21:29 - OpenVPN > UDPv4 link local: [undef]
. 2022.06.09 01:21:29 - OpenVPN > UDPv4 link remote: [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:29 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.115.138:443, sid=2c560637 58c14d51
. 2022.06.09 01:21:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:21:29 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:21:29 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 01:21:29 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:21:29 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:21:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:21:29 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:21:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Haedus, emailAddress=info@airvpn.org
. 2022.06.09 01:21:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 01:21:30 - OpenVPN > [Haedus] Peer Connection Initiated with [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:32 - OpenVPN > SENT CONTROL [Haedus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:21:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.224.1,route-gateway 10.26.224.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.224.70 255.255.255.0,peer-id 6'
. 2022.06.09 01:21:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 01:21:32 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 01:21:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.06.09 01:21:32 - OpenVPN > OPTIONS IMPORT: route options modified
. 2022.06.09 01:21:32 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 01:21:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 01:21:32 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:21:32 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2022.06.09 01:21:32 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:21:32 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:21:32 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 01:21:32 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:21:32 - OpenVPN > Exiting due to fatal error
! 2022.06.09 01:21:32 - Disconnecting
. 2022.06.09 01:21:32 - Connection terminated.
I 2022.06.09 01:21:35 - Checking authorization ...
! 2022.06.09 01:21:35 - Connecting to Haedus (United States, New York City)
. 2022.06.09 01:21:35 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:21:35 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:21:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:21:36 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:21:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:36 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:21:36 - OpenVPN > UDPv4 link local: [undef]
. 2022.06.09 01:21:36 - OpenVPN > UDPv4 link remote: [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:36 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.115.138:443, sid=9b31f4af 1805743c
. 2022.06.09 01:21:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:21:36 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:21:36 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 01:21:36 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:21:36 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:21:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:21:36 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:21:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Haedus, emailAddress=info@airvpn.org
. 2022.06.09 01:21:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 01:21:36 - OpenVPN > [Haedus] Peer Connection Initiated with [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:38 - OpenVPN > SENT CONTROL [Haedus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:21:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.224.1,route-gateway 10.26.224.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.224.70 255.255.255.0,peer-id 5'
. 2022.06.09 01:21:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 01:21:38 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 01:21:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.06.09 01:21:38 - OpenVPN > OPTIONS IMPORT: route options modified
. 2022.06.09 01:21:38 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 01:21:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 01:21:38 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:21:38 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2022.06.09 01:21:38 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:21:38 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:21:38 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 01:21:38 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:21:38 - OpenVPN > Exiting due to fatal error
! 2022.06.09 01:21:38 - Disconnecting
. 2022.06.09 01:21:38 - Connection terminated.
I 2022.06.09 01:21:41 - Checking authorization ...
! 2022.06.09 01:21:42 - Connecting to Haedus (United States, New York City)
. 2022.06.09 01:21:42 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:21:42 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:21:42 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:21:42 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:21:42 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:42 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:42 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:21:42 - OpenVPN > UDPv4 link local: [undef]
. 2022.06.09 01:21:42 - OpenVPN > UDPv4 link remote: [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:42 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.115.138:443, sid=fc426aa4 7a7ff5e7
. 2022.06.09 01:21:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:21:42 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:21:42 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 01:21:42 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:21:42 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:21:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:21:42 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:21:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Haedus, emailAddress=info@airvpn.org
. 2022.06.09 01:21:43 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:43 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:43 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:43 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 01:21:43 - OpenVPN > [Haedus] Peer Connection Initiated with [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:45 - OpenVPN > SENT CONTROL [Haedus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:21:45 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.224.1,route-gateway 10.26.224.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.224.70 255.255.255.0,peer-id 6'
. 2022.06.09 01:21:45 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 01:21:45 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 01:21:45 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.06.09 01:21:45 - OpenVPN > OPTIONS IMPORT: route options modified
. 2022.06.09 01:21:45 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 01:21:45 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 01:21:45 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:21:45 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2022.06.09 01:21:45 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:21:45 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:21:45 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 01:21:45 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:21:45 - OpenVPN > Exiting due to fatal error
! 2022.06.09 01:21:45 - Disconnecting
. 2022.06.09 01:21:45 - Connection terminated.
I 2022.06.09 01:21:48 - Checking authorization ...
! 2022.06.09 01:21:49 - Connecting to Haedus (United States, New York City)
. 2022.06.09 01:21:49 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:21:49 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:21:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:21:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:21:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:49 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:21:49 - OpenVPN > UDPv4 link local: [undef]
. 2022.06.09 01:21:49 - OpenVPN > UDPv4 link remote: [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:49 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.115.138:443, sid=980d40d0 f3a72799
. 2022.06.09 01:21:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:21:49 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:21:49 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 01:21:49 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:21:49 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:21:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:21:49 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:21:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Haedus, emailAddress=info@airvpn.org
. 2022.06.09 01:21:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:21:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:21:49 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 01:21:49 - OpenVPN > [Haedus] Peer Connection Initiated with [AF_INET]146.70.115.138:443
. 2022.06.09 01:21:52 - OpenVPN > SENT CONTROL [Haedus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:21:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.224.1,route-gateway 10.26.224.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.224.70 255.255.255.0,peer-id 5'
. 2022.06.09 01:21:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 01:21:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 01:21:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.06.09 01:21:52 - OpenVPN > OPTIONS IMPORT: route options modified
. 2022.06.09 01:21:52 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 01:21:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 01:21:52 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:21:52 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2022.06.09 01:21:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:21:52 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:21:52 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 01:21:52 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:21:52 - OpenVPN > Exiting due to fatal error
! 2022.06.09 01:21:52 - Disconnecting
. 2022.06.09 01:21:52 - Connection terminated.
I 2022.06.09 01:21:52 - Cancel requested.
! 2022.06.09 01:21:52 - Session terminated.
I 2022.06.09 01:26:54 - Session starting.
I 2022.06.09 01:26:54 - Checking authorization ...
! 2022.06.09 01:26:54 - Connecting to Pegasus (United States, Dallas, Texas)
! 2022.06.09 01:27:00 - Disconnecting
. 2022.06.09 01:27:00 - Connection terminated.
I 2022.06.09 01:27:03 - Checking authorization ...
! 2022.06.09 01:27:03 - Connecting to Pegasus (United States, Dallas, Texas)
! 2022.06.09 01:27:09 - Disconnecting
. 2022.06.09 01:27:09 - Connection terminated.
I 2022.06.09 01:27:12 - Checking authorization ...
! 2022.06.09 01:27:13 - Connecting to Pegasus (United States, Dallas, Texas)
! 2022.06.09 01:27:18 - Disconnecting
. 2022.06.09 01:27:18 - Connection terminated.
I 2022.06.09 01:27:21 - Checking authorization ...
! 2022.06.09 01:27:22 - Connecting to Pegasus (United States, Dallas, Texas)
! 2022.06.09 01:27:27 - Disconnecting
. 2022.06.09 01:27:27 - Connection terminated.
I 2022.06.09 01:27:27 - Cancel requested.
! 2022.06.09 01:27:27 - Session terminated.
. 2022.06.09 01:29:47 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:29:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:29:47 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:29:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:29:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:29:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:29:47 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:29:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:29:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:29:47 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:29:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:29:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:29:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:29:47 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:29:47 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]
. 2022.06.09 01:29:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:29:47 - OpenVPN > TCP connection established with [AF_INET]199.249.230.16:80
. 2022.06.09 01:29:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:29:47 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:29:47 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:29:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:29:47 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2022.06.09 01:29:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:29:47 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]
. 2022.06.09 01:29:47 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]
. 2022.06.09 01:29:47 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:29:47 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2022.06.09 01:29:47 - OpenVPN > TCP connection established with [AF_INET]199.249.230.16:80
. 2022.06.09 01:29:47 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]
. 2022.06.09 01:29:47 - OpenVPN > TCP connection established with [AF_INET]199.249.230.16:80
. 2022.06.09 01:29:47 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2022.06.09 01:29:47 - OpenVPN > TCPv4_CLIENT link local: [undef]
! 2022.06.09 01:30:50 - Activation of Network Lock - Windows Firewall
. 2022.06.09 01:30:55 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]199.249.230.16:80
. 2022.06.09 01:30:55 - OpenVPN > TLS: Initial packet from [AF_INET]199.249.230.16:80, sid=4df55943 cc69e397
. 2022.06.09 01:30:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:30:55 - OpenVPN > TLS: Initial packet from [AF_INET]199.249.230.16:80, sid=ac6df75f 51ace626
. 2022.06.09 01:30:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:30:55 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:30:55 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:30:55 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:30:55 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 01:30:55 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:30:55 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:30:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:30:55 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:30:55 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:30:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pegasus, emailAddress=info@airvpn.org
. 2022.06.09 01:30:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:30:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:30:55 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:30:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:30:55 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]199.249.230.16:80
. 2022.06.09 01:30:55 - OpenVPN > TLS: Initial packet from [AF_INET]199.249.230.16:80, sid=643b043b 31c5fdce
. 2022.06.09 01:30:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:30:55 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:30:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pegasus, emailAddress=info@airvpn.org
. 2022.06.09 01:30:55 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 01:30:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:30:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:30:55 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:30:55 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:30:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:30:55 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]199.249.230.16:80
. 2022.06.09 01:30:55 - OpenVPN > TLS: Initial packet from [AF_INET]199.249.230.16:80, sid=1b6c6a87 aa93ee86
. 2022.06.09 01:30:55 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:30:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 01:30:55 - OpenVPN > Validating certificate key usage
. 2022.06.09 01:30:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pegasus, emailAddress=info@airvpn.org
. 2022.06.09 01:30:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:30:55 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 01:30:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:30:55 - OpenVPN > VERIFY KU OK
. 2022.06.09 01:30:55 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 01:30:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 01:30:55 - OpenVPN > VERIFY EKU OK
. 2022.06.09 01:30:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pegasus, emailAddress=info@airvpn.org
. 2022.06.09 01:30:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:30:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:30:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:30:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:30:55 - OpenVPN > [Pegasus] Peer Connection Initiated with [AF_INET]199.249.230.16:80
. 2022.06.09 01:30:55 - OpenVPN > SENT CONTROL [Pegasus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:30:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 01:30:55 - OpenVPN > [Pegasus] Peer Connection Initiated with [AF_INET]199.249.230.16:80
. 2022.06.09 01:30:55 - OpenVPN > SENT CONTROL [Pegasus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:30:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.65.1,route-gateway 10.26.65.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.65.104 255.255.255.0,peer-id 0'
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 01:30:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.65.1,route-gateway 10.26.65.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.65.104 255.255.255.0,peer-id 0'
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: route options modified
. 2022.06.09 01:30:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:30:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 01:30:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 01:30:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:30:55 - OpenVPN > [Pegasus] Peer Connection Initiated with [AF_INET]199.249.230.16:80
. 2022.06.09 01:30:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 01:30:55 - OpenVPN > SENT CONTROL [Pegasus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:30:55 - OpenVPN > [Pegasus] Peer Connection Initiated with [AF_INET]199.249.230.16:80
. 2022.06.09 01:30:55 - OpenVPN > SENT CONTROL [Pegasus]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 01:30:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.65.1,route-gateway 10.26.65.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.65.104 255.255.255.0,peer-id 0'
. 2022.06.09 01:30:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.26.65.1,route-gateway 10.26.65.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.26.65.104 255.255.255.0,peer-id 0'
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: route options modified
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1563
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 01:30:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:30:55 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1563
. 2022.06.09 01:30:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:30:55 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:30:55 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:30:55 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 01:30:55 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:30:55 - OpenVPN > Exiting due to fatal error
. 2022.06.09 01:30:55 - OpenVPN > Exiting due to fatal error
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1563
. 2022.06.09 01:30:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:30:55 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 01:30:55 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 01:30:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1563
. 2022.06.09 01:30:55 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:30:55 - OpenVPN > Exiting due to fatal error
. 2022.06.09 01:30:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 01:30:55 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 01:30:55 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 01:30:55 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 01:30:55 - OpenVPN > Exiting due to fatal error
I 2022.06.09 01:31:04 - Session starting.
I 2022.06.09 01:31:04 - Checking authorization ...
W 2022.06.09 01:31:04 - Authorization check failed, continue anyway ({1])
! 2022.06.09 01:31:04 - Connecting to Kruger (United States, Chicago, Illinois)
. 2022.06.09 01:31:04 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:31:04 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:31:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:31:04 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:31:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:31:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:31:04 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:31:04 - OpenVPN > Attempting to establish TCP connection with [AF_INET]68.235.35.123:80 [nonblock]
. 2022.06.09 01:31:14 - OpenVPN > TCP: connect to [AF_INET]68.235.35.123:80 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
. 2022.06.09 01:31:14 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2022.06.09 01:31:14 - OpenVPN > Restart pause, 5 second(s)
! 2022.06.09 01:31:14 - Disconnecting
. 2022.06.09 01:31:14 - Connection terminated.
I 2022.06.09 01:31:17 - Checking authorization ...
W 2022.06.09 01:31:17 - Authorization check failed, continue anyway ({1])
! 2022.06.09 01:31:17 - Connecting to Pegasus (United States, Dallas, Texas)
. 2022.06.09 01:31:17 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:31:17 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:31:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:31:17 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:31:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:31:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:31:17 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:31:17 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]
. 2022.06.09 01:31:27 - OpenVPN > TCP: connect to [AF_INET]199.249.230.16:80 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
. 2022.06.09 01:31:27 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2022.06.09 01:31:27 - OpenVPN > Restart pause, 5 second(s)
! 2022.06.09 01:31:27 - Disconnecting
. 2022.06.09 01:31:27 - Connection terminated.
I 2022.06.09 01:31:30 - Checking authorization ...
W 2022.06.09 01:31:30 - Authorization check failed, continue anyway ({1])
! 2022.06.09 01:31:30 - Connecting to Fang (United States, Chicago, Illinois)
. 2022.06.09 01:31:30 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:31:30 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:31:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:31:30 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:31:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:31:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:31:30 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:31:30 - OpenVPN > Attempting to establish TCP connection with [AF_INET]68.235.48.107:80 [nonblock]
. 2022.06.09 01:31:40 - OpenVPN > TCP: connect to [AF_INET]68.235.48.107:80 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
. 2022.06.09 01:31:40 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2022.06.09 01:31:40 - OpenVPN > Restart pause, 5 second(s)
! 2022.06.09 01:31:40 - Disconnecting
. 2022.06.09 01:31:40 - Connection terminated.
I 2022.06.09 01:31:44 - Checking authorization ...
W 2022.06.09 01:31:44 - Authorization check failed, continue anyway ({1])
! 2022.06.09 01:31:44 - Connecting to Pegasus (United States, Dallas, Texas)
. 2022.06.09 01:31:44 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:31:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:31:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:31:44 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:31:44 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:31:44 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:31:44 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:31:44 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]
. 2022.06.09 01:31:54 - OpenVPN > TCP: connect to [AF_INET]199.249.230.16:80 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
. 2022.06.09 01:31:54 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2022.06.09 01:31:54 - OpenVPN > Restart pause, 5 second(s)
! 2022.06.09 01:31:54 - Disconnecting
. 2022.06.09 01:31:54 - Connection terminated.
I 2022.06.09 01:31:57 - Checking authorization ...
W 2022.06.09 01:31:57 - Authorization check failed, continue anyway ({1])
! 2022.06.09 01:31:57 - Connecting to Pegasus (United States, Dallas, Texas)
. 2022.06.09 01:31:57 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:31:57 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:31:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:31:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:31:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:31:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:31:57 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:31:57 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]

 

Share this post


Link to post

Here I am attempting to force connection to another server:

I 2022.06.09 01:59:07 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64
. 2022.06.09 01:59:07 - Reading options from C:\Users\Aaron\AppData\Local\AirVPN\AirVPN.xml
. 2022.06.09 01:59:08 - Data Path: C:\Users\Aaron\AppData\Local\AirVPN
. 2022.06.09 01:59:08 - App Path: C:\Program Files\AirVPN
. 2022.06.09 01:59:08 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2022.06.09 01:59:08 - Command line arguments (1): path="home"
. 2022.06.09 01:59:08 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1
. 2022.06.09 01:59:08 - Updating systems & servers data ...
I 2022.06.09 01:59:09 - OpenVPN Driver - TAP-Windows Adapter V9 #3, version 9.24.2
I 2022.06.09 01:59:09 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2022.06.09 01:59:09 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2022.06.09 01:59:09 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2022.06.09 01:59:09 - Ready
. 2022.06.09 01:59:13 - Systems & servers data update completed
! 2022.06.09 01:59:20 - Activation of Network Lock - Windows Firewall
I 2022.06.09 01:59:27 - Session starting.
I 2022.06.09 01:59:29 - Checking authorization ...
W 2022.06.09 01:59:29 - Authorization check failed, continue anyway ({1])
! 2022.06.09 01:59:29 - Connecting to Pegasus (United States, Dallas, Texas)
. 2022.06.09 01:59:30 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:59:30 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:59:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:59:30 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:59:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:59:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:59:30 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:59:30 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]
. 2022.06.09 01:59:40 - OpenVPN > TCP: connect to [AF_INET]199.249.230.16:80 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
. 2022.06.09 01:59:40 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2022.06.09 01:59:40 - OpenVPN > Restart pause, 5 second(s)
! 2022.06.09 01:59:40 - Disconnecting
. 2022.06.09 01:59:40 - Connection terminated.
I 2022.06.09 01:59:43 - Checking authorization ...
W 2022.06.09 01:59:43 - Authorization check failed, continue anyway ({1])
! 2022.06.09 01:59:43 - Connecting to Pegasus (United States, Dallas, Texas)
. 2022.06.09 01:59:43 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:59:43 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:59:43 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:59:43 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:59:43 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:59:43 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:59:43 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:59:43 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]
. 2022.06.09 01:59:53 - OpenVPN > TCP: connect to [AF_INET]199.249.230.16:80 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
. 2022.06.09 01:59:53 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2022.06.09 01:59:53 - OpenVPN > Restart pause, 5 second(s)
! 2022.06.09 01:59:53 - Disconnecting
. 2022.06.09 01:59:53 - Connection terminated.
I 2022.06.09 01:59:56 - Checking authorization ...
W 2022.06.09 01:59:56 - Authorization check failed, continue anyway ({1])
! 2022.06.09 01:59:56 - Connecting to Pegasus (United States, Dallas, Texas)
. 2022.06.09 01:59:56 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 01:59:56 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 01:59:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 01:59:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 01:59:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:59:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 01:59:56 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 01:59:56 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]
. 2022.06.09 02:00:06 - OpenVPN > TCP: connect to [AF_INET]199.249.230.16:80 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
. 2022.06.09 02:00:06 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2022.06.09 02:00:06 - OpenVPN > Restart pause, 5 second(s)
! 2022.06.09 02:00:06 - Disconnecting
. 2022.06.09 02:00:06 - Connection terminated.
I 2022.06.09 02:00:09 - Checking authorization ...
W 2022.06.09 02:00:09 - Authorization check failed, continue anyway ({1])
! 2022.06.09 02:00:09 - Connecting to Pegasus (United States, Dallas, Texas)
. 2022.06.09 02:00:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 02:00:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 02:00:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 02:00:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 02:00:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:00:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:00:09 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 02:00:09 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]
. 2022.06.09 02:00:19 - OpenVPN > TCP: connect to [AF_INET]199.249.230.16:80 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
. 2022.06.09 02:00:19 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2022.06.09 02:00:19 - OpenVPN > Restart pause, 5 second(s)
! 2022.06.09 02:00:20 - Disconnecting
. 2022.06.09 02:00:20 - Connection terminated.
I 2022.06.09 02:00:23 - Checking authorization ...
W 2022.06.09 02:00:23 - Authorization check failed, continue anyway ({1])
! 2022.06.09 02:00:23 - Connecting to Pegasus (United States, Dallas, Texas)
. 2022.06.09 02:00:23 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 02:00:23 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 02:00:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 02:00:23 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 02:00:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:00:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:00:23 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 02:00:23 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]
. 2022.06.09 02:00:33 - OpenVPN > TCP: connect to [AF_INET]199.249.230.16:80 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
. 2022.06.09 02:00:33 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2022.06.09 02:00:33 - OpenVPN > Restart pause, 5 second(s)
! 2022.06.09 02:00:33 - Disconnecting
. 2022.06.09 02:00:33 - Connection terminated.
I 2022.06.09 02:00:36 - Checking authorization ...
W 2022.06.09 02:00:36 - Authorization check failed, continue anyway ({1])
! 2022.06.09 02:00:36 - Connecting to Pegasus (United States, Dallas, Texas)
. 2022.06.09 02:00:36 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 02:00:36 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 02:00:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 02:00:36 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 02:00:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:00:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:00:36 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 02:00:36 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]
. 2022.06.09 02:00:46 - OpenVPN > TCP: connect to [AF_INET]199.249.230.16:80 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
. 2022.06.09 02:00:46 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2022.06.09 02:00:46 - OpenVPN > Restart pause, 5 second(s)
! 2022.06.09 02:00:46 - Disconnecting
. 2022.06.09 02:00:46 - Connection terminated.
I 2022.06.09 02:00:49 - Checking authorization ...
W 2022.06.09 02:00:49 - Authorization check failed, continue anyway ({1])
! 2022.06.09 02:00:49 - Connecting to Pegasus (United States, Dallas, Texas)
. 2022.06.09 02:00:49 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 02:00:49 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 02:00:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 02:00:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 02:00:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:00:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:00:49 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 02:00:49 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]
. 2022.06.09 02:00:59 - OpenVPN > TCP: connect to [AF_INET]199.249.230.16:80 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
. 2022.06.09 02:00:59 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2022.06.09 02:00:59 - OpenVPN > Restart pause, 5 second(s)
! 2022.06.09 02:00:59 - Disconnecting
. 2022.06.09 02:00:59 - Connection terminated.
I 2022.06.09 02:01:02 - Checking authorization ...
W 2022.06.09 02:01:02 - Authorization check failed, continue anyway ({1])
! 2022.06.09 02:01:02 - Connecting to Pegasus (United States, Dallas, Texas)
. 2022.06.09 02:01:02 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 02:01:02 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 02:01:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 02:01:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 02:01:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:01:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:01:02 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 02:01:02 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]
. 2022.06.09 02:01:12 - OpenVPN > TCP: connect to [AF_INET]199.249.230.16:80 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
. 2022.06.09 02:01:12 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2022.06.09 02:01:12 - OpenVPN > Restart pause, 5 second(s)
! 2022.06.09 02:01:13 - Disconnecting
. 2022.06.09 02:01:13 - Connection terminated.
I 2022.06.09 02:01:16 - Checking authorization ...
W 2022.06.09 02:01:16 - Authorization check failed, continue anyway ({1])
! 2022.06.09 02:01:16 - Connecting to Pegasus (United States, Dallas, Texas)
. 2022.06.09 02:01:16 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 02:01:16 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 02:01:16 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 02:01:16 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 02:01:16 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:01:16 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:01:16 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 02:01:16 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]
. 2022.06.09 02:01:26 - OpenVPN > TCP: connect to [AF_INET]199.249.230.16:80 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
. 2022.06.09 02:01:26 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2022.06.09 02:01:26 - OpenVPN > Restart pause, 5 second(s)
! 2022.06.09 02:01:26 - Disconnecting
. 2022.06.09 02:01:26 - Connection terminated.
I 2022.06.09 02:01:29 - Checking authorization ...
W 2022.06.09 02:01:29 - Authorization check failed, continue anyway ({1])
! 2022.06.09 02:01:29 - Connecting to Pegasus (United States, Dallas, Texas)
. 2022.06.09 02:01:29 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 02:01:29 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 02:01:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 02:01:29 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 02:01:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:01:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:01:29 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 02:01:29 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]
. 2022.06.09 02:01:39 - OpenVPN > TCP: connect to [AF_INET]199.249.230.16:80 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
. 2022.06.09 02:01:39 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2022.06.09 02:01:39 - OpenVPN > Restart pause, 5 second(s)
! 2022.06.09 02:01:39 - Disconnecting
. 2022.06.09 02:01:39 - Connection terminated.
I 2022.06.09 02:01:42 - Checking authorization ...
W 2022.06.09 02:01:42 - Authorization check failed, continue anyway ({1])
! 2022.06.09 02:01:42 - Connecting to Pegasus (United States, Dallas, Texas)
. 2022.06.09 02:01:42 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 02:01:42 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 02:01:42 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 02:01:42 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 02:01:42 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:01:42 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:01:42 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 02:01:42 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]
. 2022.06.09 02:01:52 - OpenVPN > TCP: connect to [AF_INET]199.249.230.16:80 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
. 2022.06.09 02:01:52 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2022.06.09 02:01:52 - OpenVPN > Restart pause, 5 second(s)
! 2022.06.09 02:01:52 - Disconnecting
. 2022.06.09 02:01:52 - Connection terminated.
I 2022.06.09 02:01:52 - Cancel requested.
! 2022.06.09 02:01:52 - Session terminated.
! 2022.06.09 02:02:03 - Deactivation of Network Lock
I 2022.06.09 02:02:12 - Session starting.
I 2022.06.09 02:02:12 - Checking authorization ...
! 2022.06.09 02:02:12 - Connecting to Aquila (United States, Fremont, California)
. 2022.06.09 02:02:12 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 02:02:12 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 02:02:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 02:02:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 02:02:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:02:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:02:13 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 02:02:13 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.223.129:80 [nonblock]
. 2022.06.09 02:02:14 - OpenVPN > TCP connection established with [AF_INET]199.249.223.129:80
. 2022.06.09 02:02:14 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2022.06.09 02:02:14 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]199.249.223.129:80
. 2022.06.09 02:02:14 - OpenVPN > TLS: Initial packet from [AF_INET]199.249.223.129:80, sid=28c7dcd1 4bfb6bca
. 2022.06.09 02:02:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 02:02:14 - OpenVPN > Validating certificate key usage
. 2022.06.09 02:02:14 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 02:02:14 - OpenVPN > VERIFY KU OK
. 2022.06.09 02:02:14 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 02:02:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 02:02:14 - OpenVPN > VERIFY EKU OK
. 2022.06.09 02:02:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aquila, emailAddress=info@airvpn.org
. 2022.06.09 02:02:16 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 02:02:16 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:02:16 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 02:02:16 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:02:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 02:02:16 - OpenVPN > [Aquila] Peer Connection Initiated with [AF_INET]199.249.223.129:80
. 2022.06.09 02:02:18 - OpenVPN > SENT CONTROL [Aquila]: 'PUSH_REQUEST' (status=1)
. 2022.06.09 02:02:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.9.161.1,route-gateway 10.9.161.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.9.161.12 255.255.255.0,peer-id 0'
. 2022.06.09 02:02:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.06.09 02:02:18 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2022.06.09 02:02:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.06.09 02:02:18 - OpenVPN > OPTIONS IMPORT: route options modified
. 2022.06.09 02:02:18 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.06.09 02:02:18 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.06.09 02:02:18 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.06.09 02:02:18 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1563
. 2022.06.09 02:02:18 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2022.06.09 02:02:18 - OpenVPN > open_tun, tt->ipv6=0
. 2022.06.09 02:02:18 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{5AD17D36-905E-453C-BC7F-351EB8CF4396}.tap
. 2022.06.09 02:02:18 - OpenVPN > All TAP-Windows adapters on this system are currently in use.
. 2022.06.09 02:02:18 - OpenVPN > Exiting due to fatal error
! 2022.06.09 02:02:18 - Disconnecting
. 2022.06.09 02:02:18 - Connection terminated.
I 2022.06.09 02:02:21 - Checking authorization ...
! 2022.06.09 02:02:22 - Connecting to Pegasus (United States, Dallas, Texas)
. 2022.06.09 02:02:22 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Aug 13 2015
. 2022.06.09 02:02:22 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2022.06.09 02:02:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2022.06.09 02:02:22 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2022.06.09 02:02:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:02:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:02:22 - OpenVPN > Socket Buffers: R=[8192->131072] S=[64512->131072]
. 2022.06.09 02:02:22 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.249.230.16:80 [nonblock]
. 2022.06.09 02:02:23 - OpenVPN > TCP connection established with [AF_INET]199.249.230.16:80
. 2022.06.09 02:02:23 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2022.06.09 02:02:23 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]199.249.230.16:80
. 2022.06.09 02:02:23 - OpenVPN > TLS: Initial packet from [AF_INET]199.249.230.16:80, sid=8831cdd0 05970d9f
. 2022.06.09 02:02:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.06.09 02:02:23 - OpenVPN > Validating certificate key usage
. 2022.06.09 02:02:23 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2022.06.09 02:02:23 - OpenVPN > VERIFY KU OK
. 2022.06.09 02:02:23 - OpenVPN > Validating certificate extended key usage
. 2022.06.09 02:02:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.06.09 02:02:23 - OpenVPN > VERIFY EKU OK
. 2022.06.09 02:02:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pegasus, emailAddress=info@airvpn.org
. 2022.06.09 02:02:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 02:02:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:02:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2022.06.09 02:02:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2022.06.09 02:02:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2022.06.09 02:02:25 - OpenVPN > [Pegasus] Peer Connection Initiated with [AF_INET]199.249.230.16:80

Share this post


Link to post

Hello!

Before any investigation starts, please upgrade Eddie. You are running a version dated August 2015 which is no more compatible with our service (thank you very much, you are indeed a long time customer!). You can download Eddie latest release for Windows here:
https://airvpn.org/windows

Let us know whether the new version resolves all the problems.

Kind regards
 

Share this post


Link to post

I was able to get the client working using 2.21.6.  Other versions, fairly recent to that one, also had the same connection issue detailed above.  Hopefully it continues to function...

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...