Jump to content
Not connected, Your IP: 3.144.100.252
martinb244

The UI doesn't display latency and drops connection often.

Recommended Posts

The UI doesn't display any latencies of the servers and no matter which serve I'm on, the internet connection will drop often when I'm connected to the VPN.  I've tried reinstalling more than once and the problem persists. That's the best I can explain it.

 

. 2023.02.27 23:40:42 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.22621.0, Mono/.Net: v4.0.30319
. 2023.02.27 23:40:43 - Command line arguments (1): path="home"
. 2023.02.27 23:40:44 - Reading options from C:\Users\omarr\AppData\Local\Eddie\default.profile
. 2023.02.27 23:40:46 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2023.02.27 23:40:46 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe)
. 2023.02.27 23:40:46 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe)
I 2023.02.27 23:40:47 - Ready
. 2023.02.27 23:40:48 - Collect information about AirVPN completed
I 2023.02.27 23:40:56 - Checking login ...
! 2023.02.27 23:40:57 - Logged in.
I 2023.02.27 23:41:11 - Session starting.
I 2023.02.27 23:41:12 - Checking authorization ...
. 2023.02.27 23:41:13 - Added new network interface "Eddie", Wintun version 0.12
. 2023.02.27 23:41:13 - Using WinTun network interface "Eddie (Eddie Tunnel)"
! 2023.02.27 23:41:13 - Connecting to Sculptor (United States of America, Atlanta, Georgia)
. 2023.02.27 23:41:14 - Routes, add 64.42.179.37/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)".
. 2023.02.27 23:41:14 - Routes, add 64.42.179.37/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists.
. 2023.02.27 23:41:14 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2023.02.27 23:41:14 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2023.02.27 23:41:14 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2023.02.27 23:41:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.02.27 23:41:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.02.27 23:41:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.02.27 23:41:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.02.27 23:41:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.37:443
. 2023.02.27 23:41:14 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2023.02.27 23:41:14 - OpenVPN > UDP link local: (not bound)
. 2023.02.27 23:41:14 - OpenVPN > UDP link remote: [AF_INET]64.42.179.37:443
. 2023.02.27 23:41:14 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.37:443, sid=c166c72a 3c7e4a7c
. 2023.02.27 23:41:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.27 23:41:14 - OpenVPN > VERIFY KU OK
. 2023.02.27 23:41:14 - OpenVPN > Validating certificate extended key usage
. 2023.02.27 23:41:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.27 23:41:14 - OpenVPN > VERIFY EKU OK
. 2023.02.27 23:41:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sculptor, emailAddress=info@airvpn.org
. 2023.02.27 23:41:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.27 23:41:14 - OpenVPN > [Sculptor] Peer Connection Initiated with [AF_INET]64.42.179.37:443
. 2023.02.27 23:41:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.82.1,dhcp-option DNS6 fde6:7a:7d20:1352::1,tun-ipv6,route-gateway 10.23.82.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1352::10c7/64 fde6:7a:7d20:1352::1,ifconfig 10.23.82.201 255.255.255.0,peer-id 3,cipher AES-256-GCM'
. 2023.02.27 23:41:15 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2023.02.27 23:41:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.82.1'
. 2023.02.27 23:41:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1352::1'
. 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2023.02.27 23:41:15 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2023.02.27 23:41:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.27 23:41:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.27 23:41:15 - OpenVPN > interactive service msg_channel=0
. 2023.02.27 23:41:15 - OpenVPN > open_tun
. 2023.02.27 23:41:15 - OpenVPN > wintun device [Eddie] opened
. 2023.02.27 23:41:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.23.82.201 255.255.255.0
. 2023.02.27 23:41:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all
. 2023.02.27 23:41:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all
. 2023.02.27 23:41:15 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry()
. 2023.02.27 23:41:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 44 fde6:7a:7d20:1352::10c7/128 store=active
. 2023.02.27 23:41:15 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1352::/64 -> fde6:7a:7d20:1352::10c7 metric 0) dev Eddie
. 2023.02.27 23:41:16 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1352::/64 44 fe80::8 store=active
. 2023.02.27 23:41:16 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2023.02.27 23:41:16 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 44 all
. 2023.02.27 23:41:16 - OpenVPN > IPv6 MTU set to 1500 on interface 44 using SetIpInterfaceEntry()
. 2023.02.27 23:41:16 - OpenVPN > Initialization Sequence Completed
. 2023.02.27 23:41:16 - Interface Eddie metric changed from Automatic to 3, layer IPv4
. 2023.02.27 23:41:16 - Interface Eddie metric changed from Automatic to 3, layer IPv6
. 2023.02.27 23:41:16 - DNS leak protection with packet filtering enabled.
. 2023.02.27 23:41:16 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.82.1)
. 2023.02.27 23:41:16 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1352::1)
. 2023.02.27 23:41:17 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.27 23:41:17 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.27 23:41:18 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.27 23:41:18 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.27 23:41:18 - Routes, add 64.42.179.35/32 for interface "Eddie (Eddie Tunnel)".
. 2023.02.27 23:41:19 - Routes, add 2605:9f80:6000:77:25ba:81d8:c17b:536b/128 for interface "Eddie (Eddie Tunnel)".
. 2023.02.27 23:41:19 - Flushing DNS
I 2023.02.27 23:41:19 - Checking route IPv4
I 2023.02.27 23:41:19 - Checking route IPv6
I 2023.02.27 23:41:20 - Checking DNS
! 2023.02.27 23:41:20 - Connected.
! 2023.02.27 23:53:39 - Disconnecting
. 2023.02.27 23:53:39 - Sending soft termination signal
. 2023.02.27 23:53:43 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2023.02.27 23:53:44 - OpenVPN > Closing TUN/TAP interface
. 2023.02.27 23:53:44 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1352::/64)
. 2023.02.27 23:53:44 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1352::/64 44 fe80::8 store=active
. 2023.02.27 23:53:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 44 fde6:7a:7d20:1352::10c7 store=active
. 2023.02.27 23:53:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 44 10.23.82.201 store=active
. 2023.02.27 23:53:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2023.02.27 23:53:46 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.27 23:53:46 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.27 23:53:46 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.27 23:53:47 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.27 23:53:47 - Routes, delete 64.42.179.37/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)".
. 2023.02.27 23:53:47 - Routes, delete 64.42.179.35/32 for interface "Eddie (Eddie Tunnel)".
. 2023.02.27 23:53:48 - Routes, delete 2605:9f80:6000:77:25ba:81d8:c17b:536b/128 for interface "Eddie (Eddie Tunnel)".
. 2023.02.27 23:53:48 - Routes, delete 64.42.179.37/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", not exists.
. 2023.02.27 23:53:48 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic)
. 2023.02.27 23:53:48 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic)
. 2023.02.27 23:53:48 - DNS leak protection with packet filtering disabled.
. 2023.02.27 23:53:48 - Interface Eddie metric restored from 3 to Automatic, layer IPv4
. 2023.02.27 23:53:48 - Interface Eddie metric restored from 3 to Automatic, layer IPv6
. 2023.02.27 23:53:48 - Connection terminated.
I 2023.02.27 23:53:48 - Checking authorization ...
. 2023.02.27 23:53:49 - Using WinTun network interface "Eddie (Eddie Tunnel)"
! 2023.02.27 23:53:49 - Connecting to Ursa (United States of America, Atlanta, Georgia)
. 2023.02.27 23:53:50 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)".
. 2023.02.27 23:53:50 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists.
. 2023.02.27 23:53:50 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2023.02.27 23:53:50 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2023.02.27 23:53:50 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2023.02.27 23:53:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.02.27 23:53:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.02.27 23:53:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.02.27 23:53:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.02.27 23:53:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.53:443
. 2023.02.27 23:53:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2023.02.27 23:53:50 - OpenVPN > UDP link local: (not bound)
. 2023.02.27 23:53:50 - OpenVPN > UDP link remote: [AF_INET]64.42.179.53:443
. 2023.02.27 23:53:50 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.53:443, sid=2f491c10 4764d9bd
. 2023.02.27 23:53:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.27 23:53:51 - OpenVPN > VERIFY KU OK
. 2023.02.27 23:53:51 - OpenVPN > Validating certificate extended key usage
. 2023.02.27 23:53:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.27 23:53:51 - OpenVPN > VERIFY EKU OK
. 2023.02.27 23:53:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.27 23:53:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.27 23:53:51 - OpenVPN > [Ursa] Peer Connection Initiated with [AF_INET]64.42.179.53:443
. 2023.02.27 23:53:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.146.1,dhcp-option DNS6 fde6:7a:7d20:1392::1,tun-ipv6,route-gateway 10.23.146.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1392::100a/64 fde6:7a:7d20:1392::1,ifconfig 10.23.146.12 255.255.255.0,peer-id 1,cipher AES-256-GCM'
. 2023.02.27 23:53:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2023.02.27 23:53:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.146.1'
. 2023.02.27 23:53:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1392::1'
. 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2023.02.27 23:53:51 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2023.02.27 23:53:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.27 23:53:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.27 23:53:51 - OpenVPN > interactive service msg_channel=0
. 2023.02.27 23:53:51 - OpenVPN > open_tun
. 2023.02.27 23:53:51 - OpenVPN > wintun device [Eddie] opened
. 2023.02.27 23:53:51 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.23.146.12 255.255.255.0
. 2023.02.27 23:53:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all
. 2023.02.27 23:53:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all
. 2023.02.27 23:53:52 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry()
. 2023.02.27 23:53:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 44 fde6:7a:7d20:1392::100a/128 store=active
. 2023.02.27 23:53:52 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1392::/64 -> fde6:7a:7d20:1392::100a metric 0) dev Eddie
. 2023.02.27 23:53:52 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1392::/64 44 fe80::8 store=active
. 2023.02.27 23:53:52 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2023.02.27 23:53:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 44 all
. 2023.02.27 23:53:53 - OpenVPN > IPv6 MTU set to 1500 on interface 44 using SetIpInterfaceEntry()
. 2023.02.27 23:53:53 - OpenVPN > Initialization Sequence Completed
. 2023.02.27 23:53:53 - Interface Eddie metric changed from Automatic to 3, layer IPv4
. 2023.02.27 23:53:53 - Interface Eddie metric changed from Automatic to 3, layer IPv6
. 2023.02.27 23:53:53 - DNS leak protection with packet filtering enabled.
. 2023.02.27 23:53:54 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.146.1)
. 2023.02.27 23:53:54 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1392::1)
. 2023.02.27 23:53:54 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.27 23:53:55 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.27 23:53:55 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.27 23:53:56 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.27 23:53:56 - Routes, add 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)".
. 2023.02.27 23:53:56 - Routes, add 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)".
. 2023.02.27 23:53:56 - Flushing DNS
I 2023.02.27 23:53:57 - Checking route IPv4
I 2023.02.27 23:53:57 - Checking route IPv6
I 2023.02.27 23:53:57 - Checking DNS
! 2023.02.27 23:53:58 - Connected.
. 2023.02.28 00:10:56 - Collect information about AirVPN completed
. 2023.02.28 00:41:02 - Collect information about AirVPN completed
. 2023.02.28 00:53:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 00:53:47 - OpenVPN > VERIFY KU OK
. 2023.02.28 00:53:47 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 00:53:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 00:53:47 - OpenVPN > VERIFY EKU OK
. 2023.02.28 00:53:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 00:53:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 00:53:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 00:53:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 01:11:04 - Collect information about AirVPN completed
. 2023.02.28 01:41:07 - Collect information about AirVPN completed
. 2023.02.28 01:53:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 01:53:44 - OpenVPN > VERIFY KU OK
. 2023.02.28 01:53:44 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 01:53:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 01:53:44 - OpenVPN > VERIFY EKU OK
. 2023.02.28 01:53:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 01:53:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 01:53:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 01:53:44 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 02:11:10 - Collect information about AirVPN completed
. 2023.02.28 02:41:16 - Collect information about AirVPN completed
. 2023.02.28 02:53:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 02:53:41 - OpenVPN > VERIFY KU OK
. 2023.02.28 02:53:41 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 02:53:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 02:53:41 - OpenVPN > VERIFY EKU OK
. 2023.02.28 02:53:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 02:53:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 02:53:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 02:53:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 03:11:18 - Collect information about AirVPN completed
. 2023.02.28 03:41:20 - Collect information about AirVPN completed
. 2023.02.28 03:53:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 03:53:38 - OpenVPN > VERIFY KU OK
. 2023.02.28 03:53:38 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 03:53:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 03:53:38 - OpenVPN > VERIFY EKU OK
. 2023.02.28 03:53:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 03:53:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 03:53:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 03:53:38 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 04:11:24 - Collect information about AirVPN completed
. 2023.02.28 04:41:31 - Collect information about AirVPN completed
. 2023.02.28 04:53:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 04:53:35 - OpenVPN > VERIFY KU OK
. 2023.02.28 04:53:35 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 04:53:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 04:53:35 - OpenVPN > VERIFY EKU OK
. 2023.02.28 04:53:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 04:53:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 04:53:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 04:53:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 05:11:38 - Collect information about AirVPN completed
. 2023.02.28 05:41:45 - Collect information about AirVPN completed
. 2023.02.28 05:53:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 05:53:32 - OpenVPN > VERIFY KU OK
. 2023.02.28 05:53:32 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 05:53:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 05:53:32 - OpenVPN > VERIFY EKU OK
. 2023.02.28 05:53:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 05:53:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 05:53:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 05:53:32 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 06:11:53 - Collect information about AirVPN completed
. 2023.02.28 06:41:53 - Collect information about AirVPN completed
. 2023.02.28 06:51:38 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #251174 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 06:53:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 06:53:29 - OpenVPN > VERIFY KU OK
. 2023.02.28 06:53:29 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 06:53:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 06:53:29 - OpenVPN > VERIFY EKU OK
. 2023.02.28 06:53:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 06:53:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 06:53:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 06:53:29 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 07:11:55 - Collect information about AirVPN completed
. 2023.02.28 07:42:01 - Collect information about AirVPN completed
. 2023.02.28 07:53:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 07:53:25 - OpenVPN > VERIFY KU OK
. 2023.02.28 07:53:25 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 07:53:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 07:53:25 - OpenVPN > VERIFY EKU OK
. 2023.02.28 07:53:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 07:53:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 07:53:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 07:53:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 08:12:02 - Collect information about AirVPN completed
! 2023.02.28 08:41:33 - Disconnecting
. 2023.02.28 08:41:33 - Sending soft termination signal
. 2023.02.28 08:41:36 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2023.02.28 08:41:37 - OpenVPN > Closing TUN/TAP interface
. 2023.02.28 08:41:37 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1392::/64)
. 2023.02.28 08:41:37 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1392::/64 44 fe80::8 store=active
. 2023.02.28 08:41:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 44 fde6:7a:7d20:1392::100a store=active
. 2023.02.28 08:41:38 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 44 10.23.146.12 store=active
. 2023.02.28 08:41:38 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2023.02.28 08:41:38 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.28 08:41:39 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.28 08:41:39 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.28 08:41:39 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.28 08:41:40 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)".
. 2023.02.28 08:41:40 - Routes, delete 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)".
. 2023.02.28 08:41:40 - Routes, delete 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)".
. 2023.02.28 08:41:40 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", not exists.
. 2023.02.28 08:41:40 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic)
. 2023.02.28 08:41:41 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic)
. 2023.02.28 08:41:41 - DNS leak protection with packet filtering disabled.
. 2023.02.28 08:41:41 - Interface Eddie metric restored from 3 to Automatic, layer IPv4
. 2023.02.28 08:41:41 - Interface Eddie metric restored from 3 to Automatic, layer IPv6
. 2023.02.28 08:41:41 - Connection terminated.
I 2023.02.28 08:41:41 - Checking authorization ...
. 2023.02.28 08:41:49 - Using WinTun network interface "Eddie (Eddie Tunnel)"
! 2023.02.28 08:41:49 - Connecting to Ursa (United States of America, Atlanta, Georgia)
. 2023.02.28 08:41:49 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)".
. 2023.02.28 08:41:50 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists.
. 2023.02.28 08:41:50 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2023.02.28 08:41:50 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2023.02.28 08:41:50 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2023.02.28 08:41:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.02.28 08:41:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.02.28 08:41:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.02.28 08:41:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.02.28 08:41:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.53:443
. 2023.02.28 08:41:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2023.02.28 08:41:50 - OpenVPN > UDP link local: (not bound)
. 2023.02.28 08:41:50 - OpenVPN > UDP link remote: [AF_INET]64.42.179.53:443
. 2023.02.28 08:41:50 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.53:443, sid=4f3556fe 72618fe9
. 2023.02.28 08:41:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 08:41:50 - OpenVPN > VERIFY KU OK
. 2023.02.28 08:41:50 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 08:41:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 08:41:50 - OpenVPN > VERIFY EKU OK
. 2023.02.28 08:41:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 08:41:50 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 08:41:50 - OpenVPN > [Ursa] Peer Connection Initiated with [AF_INET]64.42.179.53:443
. 2023.02.28 08:41:51 - OpenVPN > SENT CONTROL [Ursa]: 'PUSH_REQUEST' (status=1)
. 2023.02.28 08:41:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.146.1,dhcp-option DNS6 fde6:7a:7d20:1392::1,tun-ipv6,route-gateway 10.23.146.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1392::100a/64 fde6:7a:7d20:1392::1,ifconfig 10.23.146.12 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2023.02.28 08:41:52 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2023.02.28 08:41:52 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.146.1'
. 2023.02.28 08:41:52 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1392::1'
. 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2023.02.28 08:41:52 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2023.02.28 08:41:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 08:41:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 08:41:52 - OpenVPN > interactive service msg_channel=0
. 2023.02.28 08:41:52 - OpenVPN > open_tun
. 2023.02.28 08:41:52 - OpenVPN > wintun device [Eddie] opened
. 2023.02.28 08:41:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.23.146.12 255.255.255.0
. 2023.02.28 08:41:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all
. 2023.02.28 08:41:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all
. 2023.02.28 08:41:53 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry()
. 2023.02.28 08:41:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 44 fde6:7a:7d20:1392::100a/128 store=active
. 2023.02.28 08:41:53 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1392::/64 -> fde6:7a:7d20:1392::100a metric 0) dev Eddie
. 2023.02.28 08:41:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1392::/64 44 fe80::8 store=active
. 2023.02.28 08:41:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2023.02.28 08:41:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 44 all
. 2023.02.28 08:41:54 - OpenVPN > IPv6 MTU set to 1500 on interface 44 using SetIpInterfaceEntry()
. 2023.02.28 08:41:54 - OpenVPN > Initialization Sequence Completed
. 2023.02.28 08:41:54 - Interface Eddie metric changed from Automatic to 3, layer IPv4
. 2023.02.28 08:41:54 - Interface Eddie metric changed from Automatic to 3, layer IPv6
. 2023.02.28 08:41:54 - DNS leak protection with packet filtering enabled.
. 2023.02.28 08:41:55 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.146.1)
. 2023.02.28 08:41:55 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1392::1)
. 2023.02.28 08:41:56 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.28 08:41:56 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.28 08:41:57 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.28 08:41:58 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.02.28 08:41:59 - Routes, add 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)".
. 2023.02.28 08:42:00 - Routes, add 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)".
. 2023.02.28 08:42:00 - Flushing DNS
I 2023.02.28 08:42:00 - Checking route IPv4
I 2023.02.28 08:42:00 - Checking route IPv6
I 2023.02.28 08:42:07 - Checking DNS
! 2023.02.28 08:42:09 - Connected.
. 2023.02.28 08:42:15 - Collect information about AirVPN completed
. 2023.02.28 09:12:05 - Collect information about AirVPN completed
. 2023.02.28 09:35:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #559128 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 09:35:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #559129 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 09:35:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #559130 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 09:41:38 - Above log line repeated 1 times more
. 2023.02.28 09:41:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 09:41:38 - OpenVPN > VERIFY KU OK
. 2023.02.28 09:41:38 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 09:41:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 09:41:38 - OpenVPN > VERIFY EKU OK
. 2023.02.28 09:41:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 09:41:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 09:41:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 09:41:38 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 09:42:09 - Collect information about AirVPN completed
. 2023.02.28 10:07:45 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #7714700 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 10:12:13 - Collect information about AirVPN completed
. 2023.02.28 10:41:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 10:41:25 - OpenVPN > VERIFY KU OK
. 2023.02.28 10:41:25 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 10:41:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 10:41:25 - OpenVPN > VERIFY EKU OK
. 2023.02.28 10:41:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 10:41:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 10:41:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 10:41:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 10:42:23 - Collect information about AirVPN completed
. 2023.02.28 11:12:28 - Collect information about AirVPN completed
. 2023.02.28 11:41:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 11:41:12 - OpenVPN > VERIFY KU OK
. 2023.02.28 11:41:12 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 11:41:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 11:41:12 - OpenVPN > VERIFY EKU OK
. 2023.02.28 11:41:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 11:41:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 11:41:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 11:41:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 11:42:31 - Collect information about AirVPN completed
. 2023.02.28 11:50:49 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2803532 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 11:50:49 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2803533 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 11:50:49 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2803534 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 12:12:35 - Above log line repeated 22 times more
. 2023.02.28 12:12:35 - Collect information about AirVPN completed
. 2023.02.28 12:41:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 12:41:01 - OpenVPN > VERIFY KU OK
. 2023.02.28 12:41:01 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 12:41:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 12:41:01 - OpenVPN > VERIFY EKU OK
. 2023.02.28 12:41:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 12:41:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 12:41:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 12:41:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 12:42:39 - Collect information about AirVPN completed
. 2023.02.28 13:12:43 - Collect information about AirVPN completed
. 2023.02.28 13:21:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1802111 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 13:21:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1802112 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 13:21:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1802113 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 13:40:48 - Above log line repeated 1 times more
. 2023.02.28 13:40:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 13:40:48 - OpenVPN > VERIFY KU OK
. 2023.02.28 13:40:48 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 13:40:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 13:40:48 - OpenVPN > VERIFY EKU OK
. 2023.02.28 13:40:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 13:40:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 13:40:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 13:40:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 13:42:47 - Collect information about AirVPN completed
. 2023.02.28 14:12:51 - Collect information about AirVPN completed
. 2023.02.28 14:24:47 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1669588 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 14:24:47 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1669589 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 14:24:47 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1669590 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 14:40:35 - Above log line repeated 1 times more
. 2023.02.28 14:40:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 14:40:35 - OpenVPN > VERIFY KU OK
. 2023.02.28 14:40:35 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 14:40:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 14:40:35 - OpenVPN > VERIFY EKU OK
. 2023.02.28 14:40:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 14:40:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 14:40:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 14:40:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 14:42:55 - Collect information about AirVPN completed
. 2023.02.28 15:12:59 - Collect information about AirVPN completed
. 2023.02.28 15:40:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 15:40:22 - OpenVPN > VERIFY KU OK
. 2023.02.28 15:40:22 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 15:40:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 15:40:22 - OpenVPN > VERIFY EKU OK
. 2023.02.28 15:40:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 15:40:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 15:40:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 15:40:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 15:43:03 - Collect information about AirVPN completed
. 2023.02.28 15:49:18 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3467510 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 15:49:18 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3467511 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 15:49:18 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3467512 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 16:13:06 - Above log line repeated 1593 times more
. 2023.02.28 16:13:06 - Collect information about AirVPN completed
. 2023.02.28 16:19:00 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #15034958 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 16:19:00 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #15034960 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 16:19:00 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #15034961 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 16:40:09 - Above log line repeated 7428 times more
. 2023.02.28 16:40:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 16:40:09 - OpenVPN > VERIFY KU OK
. 2023.02.28 16:40:09 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 16:40:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 16:40:09 - OpenVPN > VERIFY EKU OK
. 2023.02.28 16:40:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 16:40:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 16:40:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 16:40:09 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 16:43:09 - Collect information about AirVPN completed
. 2023.02.28 16:48:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2306925 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 16:48:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2306926 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 16:48:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2306927 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 17:13:13 - Above log line repeated 6178 times more
. 2023.02.28 17:13:13 - Collect information about AirVPN completed
. 2023.02.28 17:39:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 17:39:56 - OpenVPN > VERIFY KU OK
. 2023.02.28 17:39:56 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 17:39:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 17:39:56 - OpenVPN > VERIFY EKU OK
. 2023.02.28 17:39:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 17:39:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 17:39:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 17:39:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 17:40:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #19175705 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 17:40:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #19175706 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 17:40:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #19175707 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 17:43:18 - Above log line repeated 6087 times more
. 2023.02.28 17:43:18 - Collect information about AirVPN completed
. 2023.02.28 17:43:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #435124 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 17:43:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #435125 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 17:43:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #435126 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 18:13:19 - Above log line repeated 59064 times more
. 2023.02.28 18:13:19 - Collect information about AirVPN completed
. 2023.02.28 18:32:40 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #12467559 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 18:32:40 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #12467560 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 18:32:40 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #12467561 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.02.28 18:39:43 - Above log line repeated 3177 times more
. 2023.02.28 18:39:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 18:39:43 - OpenVPN > VERIFY KU OK
. 2023.02.28 18:39:43 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 18:39:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 18:39:43 - OpenVPN > VERIFY EKU OK
. 2023.02.28 18:39:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 18:39:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 18:39:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 18:39:43 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 18:43:20 - Collect information about AirVPN completed
. 2023.02.28 19:13:25 - Collect information about AirVPN completed
. 2023.02.28 19:39:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 19:39:30 - OpenVPN > VERIFY KU OK
. 2023.02.28 19:39:30 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 19:39:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 19:39:30 - OpenVPN > VERIFY EKU OK
. 2023.02.28 19:39:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 19:39:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 19:39:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 19:39:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 19:43:27 - Collect information about AirVPN completed
. 2023.02.28 20:13:28 - Collect information about AirVPN completed
. 2023.02.28 20:39:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 20:39:17 - OpenVPN > VERIFY KU OK
. 2023.02.28 20:39:17 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 20:39:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 20:39:17 - OpenVPN > VERIFY EKU OK
. 2023.02.28 20:39:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 20:39:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 20:39:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 20:39:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 20:43:30 - Collect information about AirVPN completed
. 2023.02.28 21:13:39 - Collect information about AirVPN completed
. 2023.02.28 21:39:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 21:39:05 - OpenVPN > VERIFY KU OK
. 2023.02.28 21:39:05 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 21:39:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 21:39:05 - OpenVPN > VERIFY EKU OK
. 2023.02.28 21:39:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 21:39:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 21:39:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 21:39:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 21:43:47 - Collect information about AirVPN completed
. 2023.02.28 22:13:48 - Collect information about AirVPN completed
. 2023.02.28 22:38:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 22:38:52 - OpenVPN > VERIFY KU OK
. 2023.02.28 22:38:52 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 22:38:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 22:38:52 - OpenVPN > VERIFY EKU OK
. 2023.02.28 22:38:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 22:38:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 22:38:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 22:38:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 22:43:48 - Collect information about AirVPN completed
. 2023.02.28 23:13:57 - Collect information about AirVPN completed
. 2023.02.28 23:38:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.02.28 23:38:39 - OpenVPN > VERIFY KU OK
. 2023.02.28 23:38:39 - OpenVPN > Validating certificate extended key usage
. 2023.02.28 23:38:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.02.28 23:38:39 - OpenVPN > VERIFY EKU OK
. 2023.02.28 23:38:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.02.28 23:38:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 23:38:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.02.28 23:38:39 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.02.28 23:43:57 - Collect information about AirVPN completed
. 2023.03.01 00:13:57 - Collect information about AirVPN completed
! 2023.03.01 00:38:38 - Disconnecting
. 2023.03.01 00:38:38 - Sending soft termination signal
. 2023.03.01 00:38:41 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2023.03.01 00:38:42 - OpenVPN > Closing TUN/TAP interface
. 2023.03.01 00:38:42 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1392::/64)
. 2023.03.01 00:38:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1392::/64 44 fe80::8 store=active
. 2023.03.01 00:38:43 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 44 fde6:7a:7d20:1392::100a store=active
. 2023.03.01 00:38:43 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 44 10.23.146.12 store=active
. 2023.03.01 00:38:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2023.03.01 00:38:43 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:38:44 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:38:44 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:38:44 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:38:45 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)".
. 2023.03.01 00:38:45 - Routes, delete 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:38:45 - Routes, delete 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:38:45 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", not exists.
. 2023.03.01 00:38:45 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic)
. 2023.03.01 00:38:46 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic)
. 2023.03.01 00:38:46 - DNS leak protection with packet filtering disabled.
. 2023.03.01 00:38:46 - Interface Eddie metric restored from 3 to Automatic, layer IPv4
. 2023.03.01 00:38:46 - Interface Eddie metric restored from 3 to Automatic, layer IPv6
. 2023.03.01 00:38:46 - Connection terminated.
I 2023.03.01 00:38:46 - Checking authorization ...
. 2023.03.01 00:38:54 - Using WinTun network interface "Eddie (Eddie Tunnel)"
! 2023.03.01 00:38:54 - Connecting to Ursa (United States of America, Atlanta, Georgia)
. 2023.03.01 00:38:55 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)".
. 2023.03.01 00:38:55 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists.
. 2023.03.01 00:38:55 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2023.03.01 00:38:55 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2023.03.01 00:38:55 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2023.03.01 00:38:55 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.03.01 00:38:55 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.03.01 00:38:55 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.03.01 00:38:55 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.03.01 00:38:55 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.53:443
. 2023.03.01 00:38:55 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2023.03.01 00:38:55 - OpenVPN > UDP link local: (not bound)
. 2023.03.01 00:38:55 - OpenVPN > UDP link remote: [AF_INET]64.42.179.53:443
. 2023.03.01 00:38:55 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.53:443, sid=650cbd35 586318cc
. 2023.03.01 00:38:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.03.01 00:38:55 - OpenVPN > VERIFY KU OK
. 2023.03.01 00:38:55 - OpenVPN > Validating certificate extended key usage
. 2023.03.01 00:38:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.03.01 00:38:55 - OpenVPN > VERIFY EKU OK
. 2023.03.01 00:38:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.03.01 00:38:55 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.03.01 00:38:55 - OpenVPN > [Ursa] Peer Connection Initiated with [AF_INET]64.42.179.53:443
. 2023.03.01 00:38:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.146.1,dhcp-option DNS6 fde6:7a:7d20:1392::1,tun-ipv6,route-gateway 10.23.146.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1392::100a/64 fde6:7a:7d20:1392::1,ifconfig 10.23.146.12 255.255.255.0,peer-id 1,cipher AES-256-GCM'
. 2023.03.01 00:38:56 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2023.03.01 00:38:56 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.146.1'
. 2023.03.01 00:38:56 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1392::1'
. 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2023.03.01 00:38:56 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2023.03.01 00:38:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.03.01 00:38:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.03.01 00:38:56 - OpenVPN > interactive service msg_channel=0
. 2023.03.01 00:38:56 - OpenVPN > open_tun
. 2023.03.01 00:38:56 - OpenVPN > wintun device [Eddie] opened
. 2023.03.01 00:38:56 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.23.146.12 255.255.255.0
. 2023.03.01 00:38:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all
. 2023.03.01 00:38:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all
. 2023.03.01 00:38:57 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry()
. 2023.03.01 00:38:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 44 fde6:7a:7d20:1392::100a/128 store=active
. 2023.03.01 00:38:58 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1392::/64 -> fde6:7a:7d20:1392::100a metric 0) dev Eddie
. 2023.03.01 00:38:58 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1392::/64 44 fe80::8 store=active
. 2023.03.01 00:38:58 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2023.03.01 00:38:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 44 all
. 2023.03.01 00:38:58 - OpenVPN > IPv6 MTU set to 1500 on interface 44 using SetIpInterfaceEntry()
. 2023.03.01 00:38:58 - OpenVPN > Initialization Sequence Completed
. 2023.03.01 00:38:58 - Interface Eddie metric changed from Automatic to 3, layer IPv4
. 2023.03.01 00:38:58 - Interface Eddie metric changed from Automatic to 3, layer IPv6
. 2023.03.01 00:38:58 - DNS leak protection with packet filtering enabled.
. 2023.03.01 00:38:59 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.146.1)
. 2023.03.01 00:38:59 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1392::1)
. 2023.03.01 00:38:59 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:39:00 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:39:01 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:39:01 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:39:02 - Routes, add 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:39:02 - Routes, add 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:39:02 - Flushing DNS
I 2023.03.01 00:39:03 - Checking route IPv4
I 2023.03.01 00:39:03 - Checking route IPv6
I 2023.03.01 00:39:03 - Checking DNS
! 2023.03.01 00:39:04 - Connected.
! 2023.03.01 00:41:22 - Disconnecting
. 2023.03.01 00:41:22 - Sending soft termination signal
. 2023.03.01 00:41:26 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2023.03.01 00:41:27 - OpenVPN > Closing TUN/TAP interface
. 2023.03.01 00:41:27 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1392::/64)
. 2023.03.01 00:41:27 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1392::/64 44 fe80::8 store=active
. 2023.03.01 00:41:28 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 44 fde6:7a:7d20:1392::100a store=active
. 2023.03.01 00:41:28 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 44 10.23.146.12 store=active
. 2023.03.01 00:41:28 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2023.03.01 00:41:29 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:41:29 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:41:29 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:41:30 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:41:30 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)".
. 2023.03.01 00:41:30 - Routes, delete 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:41:31 - Routes, delete 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:41:31 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", not exists.
. 2023.03.01 00:41:31 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic)
. 2023.03.01 00:41:31 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic)
. 2023.03.01 00:41:31 - DNS leak protection with packet filtering disabled.
. 2023.03.01 00:41:31 - Interface Eddie metric restored from 3 to Automatic, layer IPv4
. 2023.03.01 00:41:31 - Interface Eddie metric restored from 3 to Automatic, layer IPv6
. 2023.03.01 00:41:31 - Connection terminated.
I 2023.03.01 00:41:31 - Checking authorization ...
. 2023.03.01 00:41:47 - Using WinTun network interface "Eddie (Eddie Tunnel)"
! 2023.03.01 00:41:47 - Connecting to Ursa (United States of America, Atlanta, Georgia)
. 2023.03.01 00:41:48 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)".
. 2023.03.01 00:41:48 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists.
. 2023.03.01 00:41:48 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2023.03.01 00:41:48 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2023.03.01 00:41:48 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2023.03.01 00:41:48 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.03.01 00:41:48 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.03.01 00:41:48 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.03.01 00:41:48 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.03.01 00:41:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.53:443
. 2023.03.01 00:41:48 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2023.03.01 00:41:48 - OpenVPN > UDP link local: (not bound)
. 2023.03.01 00:41:48 - OpenVPN > UDP link remote: [AF_INET]64.42.179.53:443
. 2023.03.01 00:41:48 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.53:443, sid=d74da7f2 3bbc66d0
. 2023.03.01 00:41:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.03.01 00:41:48 - OpenVPN > VERIFY KU OK
. 2023.03.01 00:41:48 - OpenVPN > Validating certificate extended key usage
. 2023.03.01 00:41:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.03.01 00:41:48 - OpenVPN > VERIFY EKU OK
. 2023.03.01 00:41:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org
. 2023.03.01 00:41:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.03.01 00:41:48 - OpenVPN > [Ursa] Peer Connection Initiated with [AF_INET]64.42.179.53:443
. 2023.03.01 00:41:49 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.146.1,dhcp-option DNS6 fde6:7a:7d20:1392::1,tun-ipv6,route-gateway 10.23.146.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1392::100a/64 fde6:7a:7d20:1392::1,ifconfig 10.23.146.12 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2023.03.01 00:41:49 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2023.03.01 00:41:49 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.146.1'
. 2023.03.01 00:41:49 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1392::1'
. 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2023.03.01 00:41:49 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2023.03.01 00:41:49 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.03.01 00:41:49 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.03.01 00:41:49 - OpenVPN > interactive service msg_channel=0
. 2023.03.01 00:41:49 - OpenVPN > open_tun
. 2023.03.01 00:41:49 - OpenVPN > wintun device [Eddie] opened
. 2023.03.01 00:41:49 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.23.146.12 255.255.255.0
. 2023.03.01 00:41:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all
. 2023.03.01 00:41:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all
. 2023.03.01 00:41:50 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry()
. 2023.03.01 00:41:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 44 fde6:7a:7d20:1392::100a/128 store=active
. 2023.03.01 00:41:50 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1392::/64 -> fde6:7a:7d20:1392::100a metric 0) dev Eddie
. 2023.03.01 00:41:51 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1392::/64 44 fe80::8 store=active
. 2023.03.01 00:41:51 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2023.03.01 00:41:51 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 44 all
. 2023.03.01 00:41:51 - OpenVPN > IPv6 MTU set to 1500 on interface 44 using SetIpInterfaceEntry()
. 2023.03.01 00:41:51 - OpenVPN > Initialization Sequence Completed
. 2023.03.01 00:41:51 - Interface Eddie metric changed from Automatic to 3, layer IPv4
. 2023.03.01 00:41:51 - Interface Eddie metric changed from Automatic to 3, layer IPv6
. 2023.03.01 00:41:51 - DNS leak protection with packet filtering enabled.
. 2023.03.01 00:41:52 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.146.1)
. 2023.03.01 00:41:52 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1392::1)
. 2023.03.01 00:41:53 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:41:53 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:41:54 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:41:54 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:41:55 - Routes, add 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:41:56 - Routes, add 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:41:56 - Flushing DNS
I 2023.03.01 00:41:57 - Checking route IPv4
I 2023.03.01 00:41:58 - Checking route IPv6
I 2023.03.01 00:41:58 - Checking DNS
! 2023.03.01 00:41:59 - Connected.
. 2023.03.01 00:42:15 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #9960 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.03.01 00:42:15 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #9961 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.03.01 00:42:15 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #9962 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2023.03.01 00:42:52 - Above log line repeated 5 times more
! 2023.03.01 00:42:52 - Disconnecting
. 2023.03.01 00:42:52 - Sending soft termination signal
. 2023.03.01 00:42:55 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2023.03.01 00:42:56 - OpenVPN > Closing TUN/TAP interface
. 2023.03.01 00:42:56 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1392::/64)
. 2023.03.01 00:42:56 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1392::/64 44 fe80::8 store=active
. 2023.03.01 00:42:56 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 44 fde6:7a:7d20:1392::100a store=active
. 2023.03.01 00:42:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 44 10.23.146.12 store=active
. 2023.03.01 00:42:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2023.03.01 00:42:57 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:42:58 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:42:59 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:42:59 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:43:00 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)".
. 2023.03.01 00:43:00 - Routes, delete 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:43:01 - Routes, delete 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:43:01 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", not exists.
. 2023.03.01 00:43:01 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic)
. 2023.03.01 00:43:01 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic)
. 2023.03.01 00:43:01 - DNS leak protection with packet filtering disabled.
. 2023.03.01 00:43:01 - Interface Eddie metric restored from 3 to Automatic, layer IPv4
. 2023.03.01 00:43:01 - Interface Eddie metric restored from 3 to Automatic, layer IPv6
. 2023.03.01 00:43:01 - Connection terminated.
I 2023.03.01 00:43:01 - Checking authorization ...
. 2023.03.01 00:43:30 - Using WinTun network interface "Eddie (Eddie Tunnel)"
! 2023.03.01 00:43:30 - Connecting to Musca (United States of America, Atlanta, Georgia)
. 2023.03.01 00:43:31 - Routes, add 64.42.179.45/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)".
. 2023.03.01 00:43:31 - Routes, add 64.42.179.45/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists.
. 2023.03.01 00:43:31 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2023.03.01 00:43:31 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2023.03.01 00:43:31 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2023.03.01 00:43:31 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.03.01 00:43:31 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.03.01 00:43:31 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.03.01 00:43:31 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.03.01 00:43:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.45:443
. 2023.03.01 00:43:31 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2023.03.01 00:43:31 - OpenVPN > UDP link local: (not bound)
. 2023.03.01 00:43:31 - OpenVPN > UDP link remote: [AF_INET]64.42.179.45:443
. 2023.03.01 00:43:31 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.45:443, sid=956ffbce 7f1a3e2f
. 2023.03.01 00:43:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.03.01 00:43:31 - OpenVPN > VERIFY KU OK
. 2023.03.01 00:43:31 - OpenVPN > Validating certificate extended key usage
. 2023.03.01 00:43:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.03.01 00:43:31 - OpenVPN > VERIFY EKU OK
. 2023.03.01 00:43:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Musca, emailAddress=info@airvpn.org
. 2023.03.01 00:43:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.03.01 00:43:31 - OpenVPN > [Musca] Peer Connection Initiated with [AF_INET]64.42.179.45:443
. 2023.03.01 00:43:31 - OpenVPN > SENT CONTROL [Musca]: 'PUSH_REQUEST' (status=1)
. 2023.03.01 00:43:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.50.1,dhcp-option DNS6 fde6:7a:7d20:1332::1,tun-ipv6,route-gateway 10.23.50.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1332::10b1/64 fde6:7a:7d20:1332::1,ifconfig 10.23.50.179 255.255.255.0,peer-id 7,cipher AES-256-GCM'
. 2023.03.01 00:43:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2023.03.01 00:43:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.50.1'
. 2023.03.01 00:43:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1332::1'
. 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2023.03.01 00:43:31 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2023.03.01 00:43:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.03.01 00:43:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.03.01 00:43:31 - OpenVPN > interactive service msg_channel=0
. 2023.03.01 00:43:31 - OpenVPN > open_tun
. 2023.03.01 00:43:31 - OpenVPN > wintun device [Eddie] opened
. 2023.03.01 00:43:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.23.50.179 255.255.255.0
. 2023.03.01 00:43:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all
. 2023.03.01 00:43:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all
. 2023.03.01 00:43:32 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry()
. 2023.03.01 00:43:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 44 fde6:7a:7d20:1332::10b1/128 store=active
. 2023.03.01 00:43:33 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1332::/64 -> fde6:7a:7d20:1332::10b1 metric 0) dev Eddie
. 2023.03.01 00:43:33 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1332::/64 44 fe80::8 store=active
. 2023.03.01 00:43:33 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2023.03.01 00:43:33 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 44 all
. 2023.03.01 00:43:33 - OpenVPN > IPv6 MTU set to 1500 on interface 44 using SetIpInterfaceEntry()
. 2023.03.01 00:43:33 - OpenVPN > Initialization Sequence Completed
. 2023.03.01 00:43:33 - Interface Eddie metric changed from Automatic to 3, layer IPv4
. 2023.03.01 00:43:33 - Interface Eddie metric changed from Automatic to 3, layer IPv6
. 2023.03.01 00:43:33 - DNS leak protection with packet filtering enabled.
. 2023.03.01 00:43:34 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.50.1)
. 2023.03.01 00:43:34 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1332::1)
. 2023.03.01 00:43:34 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:43:35 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:43:35 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:43:36 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:43:36 - Routes, add 64.42.179.43/32 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:43:37 - Routes, add 2605:9f80:6000:78:848d:e3b5:8bc8:34f/128 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:43:37 - Flushing DNS
I 2023.03.01 00:43:37 - Checking route IPv4
I 2023.03.01 00:43:37 - Checking route IPv6
I 2023.03.01 00:43:38 - Checking DNS
! 2023.03.01 00:43:38 - Connected.
! 2023.03.01 00:45:57 - Disconnecting
. 2023.03.01 00:45:57 - Sending soft termination signal
. 2023.03.01 00:46:00 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2023.03.01 00:46:01 - OpenVPN > Closing TUN/TAP interface
. 2023.03.01 00:46:01 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1332::/64)
. 2023.03.01 00:46:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1332::/64 44 fe80::8 store=active
. 2023.03.01 00:46:02 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 44 fde6:7a:7d20:1332::10b1 store=active
. 2023.03.01 00:46:02 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 44 10.23.50.179 store=active
. 2023.03.01 00:46:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2023.03.01 00:46:03 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:46:03 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:46:03 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:46:04 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:46:04 - Routes, delete 64.42.179.45/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)".
. 2023.03.01 00:46:04 - Routes, delete 64.42.179.43/32 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:46:05 - Routes, delete 2605:9f80:6000:78:848d:e3b5:8bc8:34f/128 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:46:05 - Routes, delete 64.42.179.45/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", not exists.
. 2023.03.01 00:46:05 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic)
. 2023.03.01 00:46:05 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic)
. 2023.03.01 00:46:05 - DNS leak protection with packet filtering disabled.
. 2023.03.01 00:46:05 - Interface Eddie metric restored from 3 to Automatic, layer IPv4
. 2023.03.01 00:46:05 - Interface Eddie metric restored from 3 to Automatic, layer IPv6
. 2023.03.01 00:46:05 - Connection terminated.
I 2023.03.01 00:46:05 - Checking authorization ...
. 2023.03.01 00:46:30 - Using WinTun network interface "Eddie (Eddie Tunnel)"
. 2023.03.01 00:46:30 - IPv6 disabled with packet filtering.
! 2023.03.01 00:46:30 - Connecting to Metallah (United States of America, Pennsylvania)
. 2023.03.01 00:46:31 - Routes, add 156.96.151.134/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)".
. 2023.03.01 00:46:31 - Routes, add 156.96.151.134/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists.
. 2023.03.01 00:46:31 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2023.03.01 00:46:31 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2023.03.01 00:46:31 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2023.03.01 00:46:31 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.03.01 00:46:31 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.03.01 00:46:31 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.03.01 00:46:31 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.03.01 00:46:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]156.96.151.134:443
. 2023.03.01 00:46:31 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2023.03.01 00:46:31 - OpenVPN > UDP link local: (not bound)
. 2023.03.01 00:46:31 - OpenVPN > UDP link remote: [AF_INET]156.96.151.134:443
. 2023.03.01 00:46:31 - OpenVPN > TLS: Initial packet from [AF_INET]156.96.151.134:443, sid=8ce2686b 932e2e2a
. 2023.03.01 00:46:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.03.01 00:46:31 - OpenVPN > VERIFY KU OK
. 2023.03.01 00:46:31 - OpenVPN > Validating certificate extended key usage
. 2023.03.01 00:46:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.03.01 00:46:31 - OpenVPN > VERIFY EKU OK
. 2023.03.01 00:46:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Metallah, emailAddress=info@airvpn.org
. 2023.03.01 00:46:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.03.01 00:46:31 - OpenVPN > [Metallah] Peer Connection Initiated with [AF_INET]156.96.151.134:443
. 2023.03.01 00:46:31 - OpenVPN > SENT CONTROL [Metallah]: 'PUSH_REQUEST' (status=1)
. 2023.03.01 00:46:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.22.146.1,route-gateway 10.22.146.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.22.146.18 255.255.255.0,peer-id 1,cipher AES-256-GCM'
. 2023.03.01 00:46:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2023.03.01 00:46:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.146.1'
. 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2023.03.01 00:46:31 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2023.03.01 00:46:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.03.01 00:46:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.03.01 00:46:31 - OpenVPN > interactive service msg_channel=0
. 2023.03.01 00:46:31 - OpenVPN > open_tun
. 2023.03.01 00:46:31 - OpenVPN > wintun device [Eddie] opened
. 2023.03.01 00:46:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.22.146.18 255.255.255.0
. 2023.03.01 00:46:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all
. 2023.03.01 00:46:32 - Collect information about AirVPN completed
. 2023.03.01 00:46:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all
. 2023.03.01 00:46:32 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry()
. 2023.03.01 00:46:32 - OpenVPN > Initialization Sequence Completed
. 2023.03.01 00:46:33 - Interface Eddie metric changed from Automatic to 3, layer IPv4
. 2023.03.01 00:46:33 - Interface Eddie metric changed from Automatic to 3, layer IPv6
. 2023.03.01 00:46:33 - DNS leak protection with packet filtering enabled.
. 2023.03.01 00:46:33 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.22.146.1)
. 2023.03.01 00:46:34 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:46:34 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:46:35 - Routes, add 156.96.151.132/32 for interface "Eddie (Eddie Tunnel)".
. 2023.03.01 00:46:35 - Flushing DNS
I 2023.03.01 00:46:35 - Checking route IPv4
I 2023.03.01 00:46:37 - Checking DNS
! 2023.03.01 00:46:37 - Connected.

 

IMG_20230301_004446088.jpg

Share this post


Link to post

Please don't copy the logs alone. We'd need the info from a system report.And be advised that screenshots can be taken with OS tools. Check for Snipping Tool on Windows. Don't take "shooting the screen" out of context. :P


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
12 hours ago, tranquivox69 said:

You defined an allowlist. Be advised that Eddie does not perform latency tests on servers which are on the denylist or not on the allowlist.

Come to think of it, this might actually be the thing with OP as well. Next time, Mr. tranquivox69, please open your own thread. Issues sounding the same don't always have the same cause, so it's always better to start seeing things separately.

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
1 hour ago, OpenSourcerer said:

You defined an allowlist. Be advised that Eddie does not perform latency tests on servers which are on the denylist or not on the allowlist.

Come to think of it, this might actually be the thing with OP as well. Next time, Mr. tranquivox69, please open your own thread. Issues sounding the same don't always have the same cause, so it's always better to start seeing things separately.
I do not have latency tests on the allowed servers. I wouldn't have posted about it otherwise.

image.png.acb66c51caac43564106e77bdc3b938b.png

Share this post


Link to post
4 hours ago, tranquivox69 said:

I do not have latency tests on the allowed servers. I wouldn't have posted about it otherwise.


That is true, I was a little unattentive there, sorry. Can you check whether ping is used by Eddie? In Task Manager, look in the Details tab, check for ping.exe popping up there. With Process Explorer look for eddie.exe and check if there are any subprocesses started and stopped.

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
3 hours ago, OpenSourcerer said:

That is true, I was a little unattentive there, sorry. Can you check whether ping is used by Eddie? In Task Manager, look in the Details tab, check for ping.exe popping up there. With Process Explorer look for eddie.exe and check if there are any subprocesses started and stopped.
No problem at all. Thanks, actually, for trying to help. 🙂

I suppose I should be looking while refreshing the list. If that is the case, I don't see ping.exe popping up in task manager and I don't see any subprocess in Process Explorer coming up during refresh.

Just these two:


image.png.1f24a4ed1a866eb3cf5ec9c756ceaa04.png

Share this post


Link to post
12 hours ago, tranquivox69 said:

I suppose I should be looking while refreshing the list. If that is the case, I don't see ping.exe popping up in task manager and I don't see any subprocess in Process Explorer coming up during refresh.


Yeah, under Eddie a constant flux of ping.exe processes launching and exiting should be shown. Interesting. Do you have the same thing if you're not connected? Did you try other servers, ports and protocols for good measure?

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
1 hour ago, OpenSourcerer said:

Yeah, under Eddie a constant flux of ping.exe processes launching and exiting should be shown. Interesting. Do you have the same thing if you're not connected? Did you try other servers, ports and protocols for good measure?

If I am not connected the latency is shown and refreshed. But I still don't have ping.exe appearing in task manager, nor extra activity in Process Explorer while refreshing servers.
I don't know if this could have something to do with me using Eddie installed as a Windows service (don't remember if that's the default or even if one could use it in a different way, tbh).

Also: the latency is not updated but server load is.

Share this post


Link to post
3 hours ago, tranquivox69 said:

I don't know if this could have something to do with me using Eddie installed as a Windows service (don't remember if that's the default or even if one could use it in a different way, tbh).


No, now I believe the problem is that Ping actually times out for all servers for you. Did you try other servers, ports and protocols?

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
@tranquivox69

Hello!

Probably everything is fine. The "pinger" is disabled when the system is connected to some VPN server, according to the logic that the round trip times for Eddie connection purposes make sense only between the client node and the VPN servers, and not between client+VPN server and the all other VPN servers.
https://github.com/AirVPN/Eddie/blob/de5c1ebb91030dc654a4cd3de81bfa8225982400/src/App.CLI.Common.Elevated/ping.cpp
 
public bool GetCanRun()
		{
			bool canRun = true;

			// Logic: Can't ping when the connection is unstable. Can't ping when connected to server.
			if (Engine.Instance.IsConnected())
			{
				canRun = false;
			}
			else if (Engine.Instance.IsWaiting() && (Engine.Instance.WaitMessage.StartsWithInv(LanguageManager.GetText("WaitingLatencyTestsTitle")) == false))
				canRun = false;

			return canRun;
		}
If you want the pinger to be active even while the system is connected to the VPN you can set canRun to true (here above), even when Engine.Instance.IsConnected() is true.

When the pinger is active you should not see in Windows "ping.exe" processes (if we're not mistaken). See also:
https://github.com/AirVPN/Eddie/blob/de5c1ebb91030dc654a4cd3de81bfa8225982400/src/App.CLI.Common.Elevated/ping.cpp
Quote

// Windows implementation incomplete. Eddie still use the Net Framework Ping.



and
https://github.com/AirVPN/Eddie/blob/de5c1ebb91030dc654a4cd3de81bfa8225982400/src/Lib.Core/Jobs/Latency.cs

Kind regards
 

Share this post


Link to post
19 hours ago, Staff said:

f you want the pinger to be active even while the system is connected to the VPN you can set canRun to true (here above), even when Engine.Instance.IsConnected() is true.


I simply want the system to work as intended. Since this "no latency" thing is recent, I am curious as to what has changed. If you think everything is fine, I won't worry about it. But it's still strange.

Share this post


Link to post
1 hour ago, tranquivox69 said:

I simply want the system to work as intended. Since this "no latency" thing is recent, I am curious as to what has changed. If you think everything is fine, I won't worry about it. But it's still strange.

In this case you're most probably fine: if we interpret correctly the data set you provided the behavior is expected. The "pinger" has always remained disabled (as far as we remember) when Eddie is connected to the VPN. Maybe you had some release with a bug? The unexpected behavior in this case would be Eddie that "pings" the VPN servers even while the system is connected to one of them.

Kind regards

 

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...