虎骨冬青 0 Posted ... With default settings, stuck at the "Checking route IPv4" part, then fail, automatically try another server and repeat. After unchecking "Check AirVPN DNS" and "Check if the tunnel works", connect successfully (just seemingly) but with totally 0 download speed. Eddie System/Environment Report - 2023/5/10 - 2:19 UTC Eddie version: 2.21.8 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Pro OS version: Microsoft Windows NT 10.0.22621.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: Not available WireGuard: 0.5.2 SSH: plink 0.73 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\wu_yi\AppData\Local\Eddie\default.profile Data path: C:\Users\wu_yi\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (0 args) Network Lock Active: No Connected to VPN: No OS support IPv4: Yes OS support IPv6: Yes Detected DNS: 2001:da8:3001:2000::7, 122.204.167.6 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 306 ms Test Ping IPv6: 259 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True servers.denylist: 6833c08795a1ecc816f7f2f4879ff0e27809fbb40e43dbea5c2b4cc1fea66ddc proxy.mode: none dns.check: False advanced.check.route: False ---------------------------- Logs: . 2023.05.10 09:47:06 - Sending soft termination signal . 2023.05.10 09:47:09 - OpenVPN > IPv4 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 09:47:09 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 37 fde6:7a:7d20:fb6::103a/128 store=active . 2023.05.10 09:47:09 - OpenVPN > add_route_ipv6(fde6:7a:7d20:fb6::/64 -> fde6:7a:7d20:fb6::103a metric 0) dev Eddie . 2023.05.10 09:47:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:fb6::/64 37 fe80::8 store=active . 2023.05.10 09:47:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.05.10 09:47:09 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 37 all . 2023.05.10 09:47:09 - OpenVPN > IPv6 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 09:47:09 - OpenVPN > Initialization Sequence Completed . 2023.05.10 09:47:09 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.05.10 09:47:09 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.05.10 09:47:09 - DNS leak protection with packet filtering enabled. . 2023.05.10 09:47:09 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.19.182.1) . 2023.05.10 09:47:10 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:fb6::1) . 2023.05.10 09:47:10 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:47:10 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:47:10 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:47:11 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:47:11 - Routes, add 82.102.28.107/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:47:11 - Routes, add 2001:ac8:40:8:ff92:53b9:316d:b8a7/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:47:11 - Flushing DNS . 2023.05.10 09:47:11 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.05.10 09:47:11 - OpenVPN > Closing TUN/TAP interface . 2023.05.10 09:47:11 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:fb6::/64) . 2023.05.10 09:47:11 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:fb6::/64 37 fe80::8 store=active . 2023.05.10 09:47:11 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 37 fde6:7a:7d20:fb6::103a store=active . 2023.05.10 09:47:11 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 37 10.19.182.60 store=active . 2023.05.10 09:47:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.05.10 09:47:12 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:47:12 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:47:12 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:47:12 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:47:13 - Routes, delete 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 09:47:13 - Routes, delete 82.102.28.107/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:47:13 - Routes, delete 2001:ac8:40:8:ff92:53b9:316d:b8a7/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:47:13 - Routes, delete 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", not exists. . 2023.05.10 09:47:13 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 09:47:14 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 09:47:14 - DNS leak protection with packet filtering disabled. . 2023.05.10 09:47:14 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.05.10 09:47:14 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.05.10 09:47:14 - Connection terminated. I 2023.05.10 09:47:14 - Cancel requested. ! 2023.05.10 09:47:14 - Session terminated. I 2023.05.10 09:47:45 - Session starting. I 2023.05.10 09:47:45 - Checking authorization ... . 2023.05.10 09:47:46 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.05.10 09:47:46 - Connecting to Iskandar (Japan, Tokyo) . 2023.05.10 09:47:47 - Routes, add 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 09:47:47 - Routes, add 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", already exists. . 2023.05.10 09:47:47 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.05.10 09:47:47 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.05.10 09:47:47 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.05.10 09:47:47 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 09:47:47 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 09:47:47 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 09:47:47 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 09:47:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]82.102.28.109:443 . 2023.05.10 09:47:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.05.10 09:47:47 - OpenVPN > UDP link local: (not bound) . 2023.05.10 09:47:47 - OpenVPN > UDP link remote: [AF_INET]82.102.28.109:443 . 2023.05.10 09:47:47 - OpenVPN > TLS: Initial packet from [AF_INET]82.102.28.109:443, sid=dcc3c2c4 c4c31fa7 . 2023.05.10 09:47:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.05.10 09:47:47 - OpenVPN > VERIFY KU OK . 2023.05.10 09:47:47 - OpenVPN > Validating certificate extended key usage . 2023.05.10 09:47:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.05.10 09:47:47 - OpenVPN > VERIFY EKU OK . 2023.05.10 09:47:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Iskandar, emailAddress=info@airvpn.org . 2023.05.10 09:47:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.05.10 09:47:47 - OpenVPN > [Iskandar] Peer Connection Initiated with [AF_INET]82.102.28.109:443 . 2023.05.10 09:47:48 - OpenVPN > SENT CONTROL [Iskandar]: 'PUSH_REQUEST' (status=1) . 2023.05.10 09:47:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.182.1,dhcp-option DNS6 fde6:7a:7d20:fb6::1,tun-ipv6,route-gateway 10.19.182.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:fb6::103a/64 fde6:7a:7d20:fb6::1,ifconfig 10.19.182.60 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.05.10 09:47:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.05.10 09:47:48 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.182.1' . 2023.05.10 09:47:48 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:fb6::1' . 2023.05.10 09:47:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.05.10 09:47:48 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.05.10 09:47:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.05.10 09:47:48 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.05.10 09:47:48 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.05.10 09:47:48 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.05.10 09:47:48 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.05.10 09:47:48 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.05.10 09:47:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 09:47:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 09:47:48 - OpenVPN > interactive service msg_channel=0 . 2023.05.10 09:47:48 - OpenVPN > open_tun . 2023.05.10 09:47:48 - OpenVPN > wintun device [Eddie] opened . 2023.05.10 09:47:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 37 static 10.19.182.60 255.255.255.0 . 2023.05.10 09:47:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 37 all . 2023.05.10 09:47:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 37 all . 2023.05.10 09:47:48 - OpenVPN > IPv4 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 09:47:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 37 fde6:7a:7d20:fb6::103a/128 store=active . 2023.05.10 09:47:48 - OpenVPN > add_route_ipv6(fde6:7a:7d20:fb6::/64 -> fde6:7a:7d20:fb6::103a metric 0) dev Eddie . 2023.05.10 09:47:48 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:fb6::/64 37 fe80::8 store=active . 2023.05.10 09:47:48 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.05.10 09:47:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 37 all . 2023.05.10 09:47:48 - OpenVPN > IPv6 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 09:47:48 - OpenVPN > Initialization Sequence Completed . 2023.05.10 09:47:49 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.05.10 09:47:49 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.05.10 09:47:49 - DNS leak protection with packet filtering enabled. . 2023.05.10 09:47:49 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.19.182.1) . 2023.05.10 09:47:49 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:fb6::1) . 2023.05.10 09:47:49 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:47:50 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:47:50 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:47:50 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:47:50 - Routes, add 82.102.28.107/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:47:51 - Routes, add 2001:ac8:40:8:ff92:53b9:316d:b8a7/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:47:51 - Flushing DNS I 2023.05.10 09:47:51 - Checking route IPv4 . 2023.05.10 09:48:13 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 09:48:13 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 09:48:13 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 09:48:13 - Above log line repeated 8 times more ! 2023.05.10 09:48:13 - Disconnecting . 2023.05.10 09:48:13 - Sending soft termination signal . 2023.05.10 09:48:16 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.05.10 09:48:17 - OpenVPN > Closing TUN/TAP interface . 2023.05.10 09:48:17 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:fb6::/64) . 2023.05.10 09:48:17 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:fb6::/64 37 fe80::8 store=active . 2023.05.10 09:48:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 37 fde6:7a:7d20:fb6::103a store=active . 2023.05.10 09:48:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 37 10.19.182.60 store=active . 2023.05.10 09:48:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.05.10 09:48:18 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:48:18 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:48:19 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:48:19 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:48:19 - Routes, delete 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 09:48:19 - Routes, delete 82.102.28.107/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:48:20 - Routes, delete 2001:ac8:40:8:ff92:53b9:316d:b8a7/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:48:20 - Routes, delete 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", not exists. . 2023.05.10 09:48:20 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 09:48:20 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 09:48:20 - DNS leak protection with packet filtering disabled. . 2023.05.10 09:48:20 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.05.10 09:48:20 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.05.10 09:48:20 - Connection terminated. I 2023.05.10 09:48:20 - Cancel requested. ! 2023.05.10 09:48:20 - Session terminated. I 2023.05.10 09:52:21 - Session starting. I 2023.05.10 09:52:21 - Checking authorization ... . 2023.05.10 09:52:22 - Added new network interface "Eddie", Wintun version 0.12 . 2023.05.10 09:52:22 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.05.10 09:52:22 - Connecting to Iskandar (Japan, Tokyo) . 2023.05.10 09:52:23 - Routes, add 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 09:52:23 - Routes, add 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", already exists. . 2023.05.10 09:52:23 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.05.10 09:52:23 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.05.10 09:52:23 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.05.10 09:52:23 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 09:52:23 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 09:52:23 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 09:52:23 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 09:52:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]82.102.28.109:443 . 2023.05.10 09:52:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.05.10 09:52:23 - OpenVPN > UDP link local: (not bound) . 2023.05.10 09:52:23 - OpenVPN > UDP link remote: [AF_INET]82.102.28.109:443 . 2023.05.10 09:52:23 - OpenVPN > TLS: Initial packet from [AF_INET]82.102.28.109:443, sid=ddca0d45 f7e26e7d . 2023.05.10 09:52:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.05.10 09:52:23 - OpenVPN > VERIFY KU OK . 2023.05.10 09:52:23 - OpenVPN > Validating certificate extended key usage . 2023.05.10 09:52:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.05.10 09:52:23 - OpenVPN > VERIFY EKU OK . 2023.05.10 09:52:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Iskandar, emailAddress=info@airvpn.org . 2023.05.10 09:52:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.05.10 09:52:23 - OpenVPN > [Iskandar] Peer Connection Initiated with [AF_INET]82.102.28.109:443 . 2023.05.10 09:52:24 - OpenVPN > SENT CONTROL [Iskandar]: 'PUSH_REQUEST' (status=1) . 2023.05.10 09:52:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.182.1,dhcp-option DNS6 fde6:7a:7d20:fb6::1,tun-ipv6,route-gateway 10.19.182.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:fb6::103a/64 fde6:7a:7d20:fb6::1,ifconfig 10.19.182.60 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.05.10 09:52:24 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.05.10 09:52:24 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.182.1' . 2023.05.10 09:52:24 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:fb6::1' . 2023.05.10 09:52:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.05.10 09:52:24 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.05.10 09:52:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.05.10 09:52:24 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.05.10 09:52:24 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.05.10 09:52:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.05.10 09:52:24 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.05.10 09:52:24 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.05.10 09:52:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 09:52:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 09:52:24 - OpenVPN > interactive service msg_channel=0 . 2023.05.10 09:52:24 - OpenVPN > open_tun . 2023.05.10 09:52:24 - OpenVPN > wintun device [Eddie] opened . 2023.05.10 09:52:24 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 37 static 10.19.182.60 255.255.255.0 . 2023.05.10 09:52:24 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 37 all . 2023.05.10 09:52:24 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 37 all . 2023.05.10 09:52:24 - OpenVPN > IPv4 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 09:52:24 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 37 fde6:7a:7d20:fb6::103a/128 store=active . 2023.05.10 09:52:24 - OpenVPN > add_route_ipv6(fde6:7a:7d20:fb6::/64 -> fde6:7a:7d20:fb6::103a metric 0) dev Eddie . 2023.05.10 09:52:24 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:fb6::/64 37 fe80::8 store=active . 2023.05.10 09:52:24 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.05.10 09:52:24 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 37 all . 2023.05.10 09:52:25 - OpenVPN > IPv6 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 09:52:25 - OpenVPN > Initialization Sequence Completed . 2023.05.10 09:52:25 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.05.10 09:52:25 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.05.10 09:52:25 - DNS leak protection with packet filtering enabled. . 2023.05.10 09:52:25 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.19.182.1) . 2023.05.10 09:52:25 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:fb6::1) . 2023.05.10 09:52:26 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:52:26 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:52:26 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:52:26 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:52:27 - Routes, add 82.102.28.107/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:52:27 - Routes, add 2001:ac8:40:8:ff92:53b9:316d:b8a7/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:52:27 - Flushing DNS ! 2023.05.10 09:52:27 - Connected. . 2023.05.10 09:52:27 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 09:52:27 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 09:52:27 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 09:53:01 - Above log line repeated 7 times more ! 2023.05.10 09:53:01 - Disconnecting . 2023.05.10 09:53:01 - Sending soft termination signal . 2023.05.10 09:53:04 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.05.10 09:53:06 - OpenVPN > Closing TUN/TAP interface . 2023.05.10 09:53:06 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:fb6::/64) . 2023.05.10 09:53:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:fb6::/64 37 fe80::8 store=active . 2023.05.10 09:53:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 37 fde6:7a:7d20:fb6::103a store=active . 2023.05.10 09:53:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 37 10.19.182.60 store=active . 2023.05.10 09:53:06 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.05.10 09:53:06 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:53:07 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:53:07 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:53:07 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:53:07 - Routes, delete 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 09:53:08 - Routes, delete 82.102.28.107/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:53:08 - Routes, delete 2001:ac8:40:8:ff92:53b9:316d:b8a7/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:53:08 - Routes, delete 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", not exists. . 2023.05.10 09:53:08 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 09:53:08 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 09:53:08 - DNS leak protection with packet filtering disabled. . 2023.05.10 09:53:08 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.05.10 09:53:08 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.05.10 09:53:08 - Connection terminated. . 2023.05.10 09:53:08 - Flushing DNS ! 2023.05.10 09:53:08 - Session terminated. I 2023.05.10 09:53:11 - Session starting. I 2023.05.10 09:53:11 - Checking authorization ... . 2023.05.10 09:53:12 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.05.10 09:53:12 - Connecting to Albaldah (Japan, Tokyo) . 2023.05.10 09:53:12 - Routes, add 146.70.76.45/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 09:53:12 - Routes, add 146.70.76.45/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", already exists. . 2023.05.10 09:53:12 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.05.10 09:53:12 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.05.10 09:53:12 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.05.10 09:53:12 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 09:53:12 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 09:53:12 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 09:53:12 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 09:53:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]146.70.76.45:443 . 2023.05.10 09:53:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.05.10 09:53:12 - OpenVPN > UDP link local: (not bound) . 2023.05.10 09:53:12 - OpenVPN > UDP link remote: [AF_INET]146.70.76.45:443 . 2023.05.10 09:53:12 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.76.45:443, sid=89e07b28 eb7cc175 . 2023.05.10 09:53:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.05.10 09:53:12 - OpenVPN > VERIFY KU OK . 2023.05.10 09:53:12 - OpenVPN > Validating certificate extended key usage . 2023.05.10 09:53:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.05.10 09:53:12 - OpenVPN > VERIFY EKU OK . 2023.05.10 09:53:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Albaldah, emailAddress=info@airvpn.org . 2023.05.10 09:53:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.05.10 09:53:12 - OpenVPN > [Albaldah] Peer Connection Initiated with [AF_INET]146.70.76.45:443 . 2023.05.10 09:53:13 - OpenVPN > SENT CONTROL [Albaldah]: 'PUSH_REQUEST' (status=1) . 2023.05.10 09:53:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.18.86.1,dhcp-option DNS6 fde6:7a:7d20:e56::1,tun-ipv6,route-gateway 10.18.86.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:e56::1016/64 fde6:7a:7d20:e56::1,ifconfig 10.18.86.24 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.05.10 09:53:13 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.05.10 09:53:13 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.18.86.1' . 2023.05.10 09:53:13 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:e56::1' . 2023.05.10 09:53:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.05.10 09:53:13 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.05.10 09:53:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.05.10 09:53:13 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.05.10 09:53:13 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.05.10 09:53:13 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.05.10 09:53:13 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.05.10 09:53:13 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.05.10 09:53:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 09:53:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 09:53:13 - OpenVPN > interactive service msg_channel=0 . 2023.05.10 09:53:13 - OpenVPN > open_tun . 2023.05.10 09:53:13 - OpenVPN > wintun device [Eddie] opened . 2023.05.10 09:53:13 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 37 static 10.18.86.24 255.255.255.0 . 2023.05.10 09:53:14 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 37 all . 2023.05.10 09:53:14 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 37 all . 2023.05.10 09:53:14 - OpenVPN > IPv4 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 09:53:14 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 37 fde6:7a:7d20:e56::1016/128 store=active . 2023.05.10 09:53:14 - OpenVPN > add_route_ipv6(fde6:7a:7d20:e56::/64 -> fde6:7a:7d20:e56::1016 metric 0) dev Eddie . 2023.05.10 09:53:14 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:e56::/64 37 fe80::8 store=active . 2023.05.10 09:53:14 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.05.10 09:53:14 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 37 all . 2023.05.10 09:53:14 - OpenVPN > IPv6 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 09:53:14 - OpenVPN > Initialization Sequence Completed . 2023.05.10 09:53:14 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.05.10 09:53:14 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.05.10 09:53:14 - DNS leak protection with packet filtering enabled. . 2023.05.10 09:53:14 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.18.86.1) . 2023.05.10 09:53:14 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:e56::1) . 2023.05.10 09:53:14 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:53:15 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:53:15 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:53:15 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:53:16 - Routes, add 146.70.76.43/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:53:16 - Routes, add 2001:ac8:40:ca:f29f:ed42:489a:2f5d/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:53:16 - Flushing DNS ! 2023.05.10 09:53:16 - Connected. . 2023.05.10 09:53:16 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 09:53:16 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 09:53:16 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 09:53:38 - Above log line repeated 13 times more ! 2023.05.10 09:53:38 - Disconnecting . 2023.05.10 09:53:38 - Sending soft termination signal . 2023.05.10 09:53:41 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.05.10 09:53:43 - OpenVPN > Closing TUN/TAP interface . 2023.05.10 09:53:43 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:e56::/64) . 2023.05.10 09:53:43 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:e56::/64 37 fe80::8 store=active . 2023.05.10 09:53:43 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 37 fde6:7a:7d20:e56::1016 store=active . 2023.05.10 09:53:43 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 37 10.18.86.24 store=active . 2023.05.10 09:53:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.05.10 09:53:43 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:53:44 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:53:44 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:53:44 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:53:45 - Routes, delete 146.70.76.45/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 09:53:45 - Routes, delete 146.70.76.43/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:53:45 - Routes, delete 2001:ac8:40:ca:f29f:ed42:489a:2f5d/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:53:45 - Routes, delete 146.70.76.45/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", not exists. . 2023.05.10 09:53:45 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 09:53:45 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 09:53:45 - DNS leak protection with packet filtering disabled. . 2023.05.10 09:53:45 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.05.10 09:53:45 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.05.10 09:53:45 - Connection terminated. . 2023.05.10 09:53:45 - Flushing DNS ! 2023.05.10 09:53:45 - Session terminated. I 2023.05.10 09:54:51 - Session starting. I 2023.05.10 09:54:51 - Checking authorization ... . 2023.05.10 09:54:52 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.05.10 09:54:52 - Connecting to Albaldah (Japan, Tokyo) . 2023.05.10 09:54:52 - Routes, add 146.70.76.45/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 09:54:53 - Routes, add 146.70.76.45/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", already exists. . 2023.05.10 09:54:53 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.05.10 09:54:53 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.05.10 09:54:53 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.05.10 09:54:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 09:54:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 09:54:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 09:54:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 09:54:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]146.70.76.45:443 . 2023.05.10 09:54:53 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.05.10 09:54:53 - OpenVPN > UDP link local: (not bound) . 2023.05.10 09:54:53 - OpenVPN > UDP link remote: [AF_INET]146.70.76.45:443 . 2023.05.10 09:54:53 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.76.45:443, sid=5110497d df444d27 . 2023.05.10 09:54:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.05.10 09:54:53 - OpenVPN > VERIFY KU OK . 2023.05.10 09:54:53 - OpenVPN > Validating certificate extended key usage . 2023.05.10 09:54:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.05.10 09:54:53 - OpenVPN > VERIFY EKU OK . 2023.05.10 09:54:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Albaldah, emailAddress=info@airvpn.org . 2023.05.10 09:54:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.05.10 09:54:53 - OpenVPN > [Albaldah] Peer Connection Initiated with [AF_INET]146.70.76.45:443 . 2023.05.10 09:54:54 - OpenVPN > SENT CONTROL [Albaldah]: 'PUSH_REQUEST' (status=1) . 2023.05.10 09:54:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.18.86.1,dhcp-option DNS6 fde6:7a:7d20:e56::1,tun-ipv6,route-gateway 10.18.86.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:e56::1016/64 fde6:7a:7d20:e56::1,ifconfig 10.18.86.24 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2023.05.10 09:54:55 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.05.10 09:54:55 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.18.86.1' . 2023.05.10 09:54:55 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:e56::1' . 2023.05.10 09:54:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.05.10 09:54:55 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.05.10 09:54:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.05.10 09:54:55 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.05.10 09:54:55 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.05.10 09:54:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.05.10 09:54:55 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.05.10 09:54:55 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.05.10 09:54:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 09:54:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 09:54:55 - OpenVPN > interactive service msg_channel=0 . 2023.05.10 09:54:55 - OpenVPN > open_tun . 2023.05.10 09:54:55 - OpenVPN > wintun device [Eddie] opened . 2023.05.10 09:54:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 37 static 10.18.86.24 255.255.255.0 . 2023.05.10 09:54:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 37 all . 2023.05.10 09:54:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 37 all . 2023.05.10 09:54:55 - OpenVPN > IPv4 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 09:54:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 37 fde6:7a:7d20:e56::1016/128 store=active . 2023.05.10 09:54:55 - OpenVPN > add_route_ipv6(fde6:7a:7d20:e56::/64 -> fde6:7a:7d20:e56::1016 metric 0) dev Eddie . 2023.05.10 09:54:55 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:e56::/64 37 fe80::8 store=active . 2023.05.10 09:54:55 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.05.10 09:54:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 37 all . 2023.05.10 09:54:55 - OpenVPN > IPv6 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 09:54:55 - OpenVPN > Initialization Sequence Completed . 2023.05.10 09:54:55 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.05.10 09:54:55 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.05.10 09:54:55 - DNS leak protection with packet filtering enabled. . 2023.05.10 09:54:55 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.18.86.1) . 2023.05.10 09:54:56 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:e56::1) . 2023.05.10 09:54:56 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:54:56 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:54:57 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:54:57 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:54:57 - Routes, add 146.70.76.43/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:54:58 - Routes, add 2001:ac8:40:ca:f29f:ed42:489a:2f5d/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:54:58 - Flushing DNS ! 2023.05.10 09:54:58 - Connected. . 2023.05.10 09:54:58 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 09:54:58 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 09:54:58 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 09:55:08 - Above log line repeated 17 times more ! 2023.05.10 09:55:08 - Disconnecting . 2023.05.10 09:55:08 - Sending soft termination signal . 2023.05.10 09:55:11 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.05.10 09:55:13 - OpenVPN > Closing TUN/TAP interface . 2023.05.10 09:55:13 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:e56::/64) . 2023.05.10 09:55:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:e56::/64 37 fe80::8 store=active . 2023.05.10 09:55:13 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 37 fde6:7a:7d20:e56::1016 store=active . 2023.05.10 09:55:13 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 37 10.18.86.24 store=active . 2023.05.10 09:55:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.05.10 09:55:13 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:55:14 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:55:14 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:55:14 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:55:15 - Routes, delete 146.70.76.45/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 09:55:15 - Routes, delete 146.70.76.43/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:55:15 - Routes, delete 2001:ac8:40:ca:f29f:ed42:489a:2f5d/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:55:15 - Routes, delete 146.70.76.45/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", not exists. . 2023.05.10 09:55:16 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 09:55:16 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 09:55:16 - DNS leak protection with packet filtering disabled. . 2023.05.10 09:55:16 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.05.10 09:55:16 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.05.10 09:55:16 - Connection terminated. . 2023.05.10 09:55:16 - Flushing DNS ! 2023.05.10 09:55:16 - Session terminated. I 2023.05.10 09:55:43 - Session starting. I 2023.05.10 09:55:43 - Checking authorization ... . 2023.05.10 09:55:44 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.05.10 09:55:44 - Connecting to Castor (Belgium, Brussels) . 2023.05.10 09:55:45 - Routes, add 91.207.57.117/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 09:55:45 - Routes, add 91.207.57.117/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", already exists. . 2023.05.10 09:55:45 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.05.10 09:55:45 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.05.10 09:55:45 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.05.10 09:55:45 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 09:55:45 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 09:55:45 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 09:55:45 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 09:55:45 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]91.207.57.117:443 . 2023.05.10 09:55:45 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.05.10 09:55:45 - OpenVPN > UDP link local: (not bound) . 2023.05.10 09:55:45 - OpenVPN > UDP link remote: [AF_INET]91.207.57.117:443 . 2023.05.10 09:55:45 - OpenVPN > TLS: Initial packet from [AF_INET]91.207.57.117:443, sid=e7d5da9d fcaf0c2e . 2023.05.10 09:55:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.05.10 09:55:46 - OpenVPN > VERIFY KU OK . 2023.05.10 09:55:46 - OpenVPN > Validating certificate extended key usage . 2023.05.10 09:55:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.05.10 09:55:46 - OpenVPN > VERIFY EKU OK . 2023.05.10 09:55:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Castor, emailAddress=info@airvpn.org . 2023.05.10 09:55:46 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.05.10 09:55:46 - OpenVPN > [Castor] Peer Connection Initiated with [AF_INET]91.207.57.117:443 . 2023.05.10 09:55:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.12.246.1,dhcp-option DNS6 fde6:7a:7d20:8f6::1,tun-ipv6,route-gateway 10.12.246.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:8f6::10ef/64 fde6:7a:7d20:8f6::1,ifconfig 10.12.246.241 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2023.05.10 09:55:46 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.05.10 09:55:46 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.12.246.1' . 2023.05.10 09:55:46 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:8f6::1' . 2023.05.10 09:55:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.05.10 09:55:46 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.05.10 09:55:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.05.10 09:55:46 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.05.10 09:55:46 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.05.10 09:55:46 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.05.10 09:55:46 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.05.10 09:55:46 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.05.10 09:55:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 09:55:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 09:55:46 - OpenVPN > interactive service msg_channel=0 . 2023.05.10 09:55:46 - OpenVPN > open_tun . 2023.05.10 09:55:46 - OpenVPN > wintun device [Eddie] opened . 2023.05.10 09:55:46 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 37 static 10.12.246.241 255.255.255.0 . 2023.05.10 09:55:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 37 all . 2023.05.10 09:55:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 37 all . 2023.05.10 09:55:47 - OpenVPN > IPv4 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 09:55:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 37 fde6:7a:7d20:8f6::10ef/128 store=active . 2023.05.10 09:55:47 - OpenVPN > add_route_ipv6(fde6:7a:7d20:8f6::/64 -> fde6:7a:7d20:8f6::10ef metric 0) dev Eddie . 2023.05.10 09:55:47 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:8f6::/64 37 fe80::8 store=active . 2023.05.10 09:55:47 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.05.10 09:55:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 37 all . 2023.05.10 09:55:47 - OpenVPN > IPv6 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 09:55:47 - OpenVPN > Initialization Sequence Completed . 2023.05.10 09:55:47 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.05.10 09:55:47 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.05.10 09:55:47 - DNS leak protection with packet filtering enabled. . 2023.05.10 09:55:47 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.12.246.1) . 2023.05.10 09:55:47 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:8f6::1) . 2023.05.10 09:55:47 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:55:48 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:55:48 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:55:48 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:55:49 - Routes, add 91.207.57.115/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:55:49 - Routes, add 2001:ac8:27:f:c0ca:9f36:68ed:1e70/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:55:49 - Flushing DNS ! 2023.05.10 09:55:49 - Connected. . 2023.05.10 09:55:49 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 09:55:49 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 09:55:49 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 09:56:21 - Above log line repeated 22 times more ! 2023.05.10 09:56:21 - Disconnecting . 2023.05.10 09:56:21 - Sending soft termination signal . 2023.05.10 09:56:24 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.05.10 09:56:26 - OpenVPN > Closing TUN/TAP interface . 2023.05.10 09:56:26 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:8f6::/64) . 2023.05.10 09:56:26 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:8f6::/64 37 fe80::8 store=active . 2023.05.10 09:56:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 37 fde6:7a:7d20:8f6::10ef store=active . 2023.05.10 09:56:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 37 10.12.246.241 store=active . 2023.05.10 09:56:26 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.05.10 09:56:26 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:56:26 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:56:27 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:56:27 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:56:27 - Routes, delete 91.207.57.117/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 09:56:27 - Routes, delete 91.207.57.115/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:56:28 - Routes, delete 2001:ac8:27:f:c0ca:9f36:68ed:1e70/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:56:28 - Routes, delete 91.207.57.117/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", not exists. . 2023.05.10 09:56:28 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 09:56:28 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 09:56:28 - DNS leak protection with packet filtering disabled. . 2023.05.10 09:56:28 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.05.10 09:56:28 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.05.10 09:56:28 - Connection terminated. . 2023.05.10 09:56:28 - Flushing DNS ! 2023.05.10 09:56:28 - Session terminated. . 2023.05.10 09:57:10 - Collect information about AirVPN completed I 2023.05.10 09:58:51 - Session starting. I 2023.05.10 09:58:51 - Checking authorization ... . 2023.05.10 09:58:52 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.05.10 09:58:52 - Connecting to Iskandar (Japan, Tokyo) . 2023.05.10 09:58:52 - Routes, add 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 09:58:52 - Routes, add 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", already exists. . 2023.05.10 09:58:53 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.05.10 09:58:53 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.05.10 09:58:53 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.05.10 09:58:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 09:58:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 09:58:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 09:58:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 09:58:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]82.102.28.109:443 . 2023.05.10 09:58:53 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.05.10 09:58:53 - OpenVPN > UDP link local: (not bound) . 2023.05.10 09:58:53 - OpenVPN > UDP link remote: [AF_INET]82.102.28.109:443 . 2023.05.10 09:58:53 - OpenVPN > TLS: Initial packet from [AF_INET]82.102.28.109:443, sid=ece87911 7c7a4bea . 2023.05.10 09:58:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.05.10 09:58:53 - OpenVPN > VERIFY KU OK . 2023.05.10 09:58:53 - OpenVPN > Validating certificate extended key usage . 2023.05.10 09:58:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.05.10 09:58:53 - OpenVPN > VERIFY EKU OK . 2023.05.10 09:58:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Iskandar, emailAddress=info@airvpn.org . 2023.05.10 09:58:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.05.10 09:58:53 - OpenVPN > [Iskandar] Peer Connection Initiated with [AF_INET]82.102.28.109:443 . 2023.05.10 09:58:54 - OpenVPN > SENT CONTROL [Iskandar]: 'PUSH_REQUEST' (status=1) . 2023.05.10 09:58:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.182.1,dhcp-option DNS6 fde6:7a:7d20:fb6::1,tun-ipv6,route-gateway 10.19.182.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:fb6::103a/64 fde6:7a:7d20:fb6::1,ifconfig 10.19.182.60 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.05.10 09:58:54 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.05.10 09:58:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.182.1' . 2023.05.10 09:58:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:fb6::1' . 2023.05.10 09:58:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.05.10 09:58:54 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.05.10 09:58:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.05.10 09:58:54 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.05.10 09:58:54 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.05.10 09:58:54 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.05.10 09:58:54 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.05.10 09:58:54 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.05.10 09:58:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 09:58:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 09:58:54 - OpenVPN > interactive service msg_channel=0 . 2023.05.10 09:58:54 - OpenVPN > open_tun . 2023.05.10 09:58:54 - OpenVPN > wintun device [Eddie] opened . 2023.05.10 09:58:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 37 static 10.19.182.60 255.255.255.0 . 2023.05.10 09:58:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 37 all . 2023.05.10 09:58:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 37 all . 2023.05.10 09:58:54 - OpenVPN > IPv4 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 09:58:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 37 fde6:7a:7d20:fb6::103a/128 store=active . 2023.05.10 09:58:54 - OpenVPN > add_route_ipv6(fde6:7a:7d20:fb6::/64 -> fde6:7a:7d20:fb6::103a metric 0) dev Eddie . 2023.05.10 09:58:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:fb6::/64 37 fe80::8 store=active . 2023.05.10 09:58:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.05.10 09:58:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 37 all . 2023.05.10 09:58:54 - OpenVPN > IPv6 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 09:58:54 - OpenVPN > Initialization Sequence Completed . 2023.05.10 09:58:54 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.05.10 09:58:54 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.05.10 09:58:54 - DNS leak protection with packet filtering enabled. . 2023.05.10 09:58:55 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.19.182.1) . 2023.05.10 09:58:55 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:fb6::1) . 2023.05.10 09:58:55 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:58:55 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:58:56 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:58:56 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:58:56 - Routes, add 82.102.28.107/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:58:56 - Routes, add 2001:ac8:40:8:ff92:53b9:316d:b8a7/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:58:56 - Flushing DNS ! 2023.05.10 09:58:57 - Connected. . 2023.05.10 09:58:57 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 09:58:57 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 09:58:57 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 09:59:20 - Above log line repeated 20 times more ! 2023.05.10 09:59:20 - Disconnecting . 2023.05.10 09:59:20 - Sending soft termination signal . 2023.05.10 09:59:23 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.05.10 09:59:25 - OpenVPN > Closing TUN/TAP interface . 2023.05.10 09:59:25 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:fb6::/64) . 2023.05.10 09:59:25 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:fb6::/64 37 fe80::8 store=active . 2023.05.10 09:59:25 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 37 fde6:7a:7d20:fb6::103a store=active . 2023.05.10 09:59:25 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 37 10.19.182.60 store=active . 2023.05.10 09:59:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.05.10 09:59:26 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:59:26 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:59:26 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:59:26 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:59:27 - Routes, delete 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 09:59:27 - Routes, delete 82.102.28.107/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:59:27 - Routes, delete 2001:ac8:40:8:ff92:53b9:316d:b8a7/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 09:59:27 - Routes, delete 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", not exists. . 2023.05.10 09:59:27 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 09:59:27 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 09:59:27 - DNS leak protection with packet filtering disabled. . 2023.05.10 09:59:28 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.05.10 09:59:28 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.05.10 09:59:28 - Connection terminated. . 2023.05.10 09:59:28 - Flushing DNS ! 2023.05.10 09:59:28 - Session terminated. I 2023.05.10 10:05:56 - Session starting. I 2023.05.10 10:05:56 - Checking authorization ... . 2023.05.10 10:05:57 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" . 2023.05.10 10:05:57 - IPv6 disabled with packet filtering. ! 2023.05.10 10:05:57 - Connecting to Iskandar (Japan, Tokyo) . 2023.05.10 10:05:57 - Routes, add 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 10:05:57 - Routes, add 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", already exists. . 2023.05.10 10:05:57 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.05.10 10:05:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.05.10 10:05:57 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.05.10 10:05:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 10:05:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 10:05:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 10:05:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 10:05:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]82.102.28.109:443 . 2023.05.10 10:05:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.05.10 10:05:57 - OpenVPN > UDP link local: (not bound) . 2023.05.10 10:05:57 - OpenVPN > UDP link remote: [AF_INET]82.102.28.109:443 . 2023.05.10 10:05:57 - OpenVPN > TLS: Initial packet from [AF_INET]82.102.28.109:443, sid=bbcdc459 8c1377c6 . 2023.05.10 10:05:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.05.10 10:05:57 - OpenVPN > VERIFY KU OK . 2023.05.10 10:05:57 - OpenVPN > Validating certificate extended key usage . 2023.05.10 10:05:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.05.10 10:05:57 - OpenVPN > VERIFY EKU OK . 2023.05.10 10:05:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Iskandar, emailAddress=info@airvpn.org . 2023.05.10 10:05:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.05.10 10:05:58 - OpenVPN > [Iskandar] Peer Connection Initiated with [AF_INET]82.102.28.109:443 . 2023.05.10 10:05:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.182.1,dhcp-option DNS6 fde6:7a:7d20:fb6::1,tun-ipv6,route-gateway 10.19.182.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:fb6::103a/64 fde6:7a:7d20:fb6::1,ifconfig 10.19.182.60 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.05.10 10:05:58 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.05.10 10:05:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.182.1' . 2023.05.10 10:05:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:fb6::1' . 2023.05.10 10:05:58 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2023.05.10 10:05:58 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:fb6::103a/64 fde6:7a:7d20:fb6::1' . 2023.05.10 10:05:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.05.10 10:05:58 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.05.10 10:05:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.05.10 10:05:58 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.05.10 10:05:58 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.05.10 10:05:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.05.10 10:05:58 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.05.10 10:05:58 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.05.10 10:05:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 10:05:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 10:05:58 - OpenVPN > interactive service msg_channel=0 . 2023.05.10 10:05:58 - OpenVPN > open_tun . 2023.05.10 10:05:58 - OpenVPN > wintun device [Eddie] opened . 2023.05.10 10:05:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 37 static 10.19.182.60 255.255.255.0 . 2023.05.10 10:05:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 37 all . 2023.05.10 10:05:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 37 all . 2023.05.10 10:05:59 - OpenVPN > IPv4 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 10:05:59 - OpenVPN > Initialization Sequence Completed . 2023.05.10 10:05:59 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.05.10 10:05:59 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.05.10 10:05:59 - DNS leak protection with packet filtering enabled. . 2023.05.10 10:05:59 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.19.182.1) . 2023.05.10 10:05:59 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:06:00 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:06:00 - Routes, add 82.102.28.107/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:06:00 - Routes, skipped for 2001:ac8:40:8:ff92:53b9:316d:b8a7 : IPv6 blocked. . 2023.05.10 10:06:00 - Flushing DNS ! 2023.05.10 10:06:00 - Connected. ! 2023.05.10 10:07:52 - Disconnecting . 2023.05.10 10:07:52 - Sending soft termination signal . 2023.05.10 10:07:55 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.05.10 10:07:57 - OpenVPN > Closing TUN/TAP interface . 2023.05.10 10:07:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 37 10.19.182.60 store=active . 2023.05.10 10:07:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.05.10 10:07:57 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:07:57 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:07:58 - Routes, delete 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 10:07:58 - Routes, delete 82.102.28.107/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:07:58 - Routes, skipped for 2001:ac8:40:8:ff92:53b9:316d:b8a7 : IPv6 blocked. . 2023.05.10 10:07:58 - Routes, delete 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", not exists. . 2023.05.10 10:07:58 - IPv6 restored with packet filtering. . 2023.05.10 10:07:58 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 10:07:58 - DNS leak protection with packet filtering disabled. . 2023.05.10 10:07:58 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.05.10 10:07:58 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.05.10 10:07:58 - Connection terminated. . 2023.05.10 10:07:58 - Flushing DNS ! 2023.05.10 10:07:58 - Session terminated. I 2023.05.10 10:11:31 - Session starting. I 2023.05.10 10:11:31 - Checking authorization ... . 2023.05.10 10:11:32 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.05.10 10:11:32 - Connecting to Iskandar (Japan, Tokyo) . 2023.05.10 10:11:32 - Routes, add 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 10:11:32 - Routes, add 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", already exists. . 2023.05.10 10:11:33 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.05.10 10:11:33 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.05.10 10:11:33 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.05.10 10:11:33 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 10:11:33 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 10:11:33 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 10:11:33 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 10:11:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]82.102.28.109:443 . 2023.05.10 10:11:33 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.05.10 10:11:33 - OpenVPN > UDP link local: (not bound) . 2023.05.10 10:11:33 - OpenVPN > UDP link remote: [AF_INET]82.102.28.109:443 . 2023.05.10 10:11:33 - OpenVPN > TLS: Initial packet from [AF_INET]82.102.28.109:443, sid=057f194b 8d3491ae . 2023.05.10 10:11:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.05.10 10:11:33 - OpenVPN > VERIFY KU OK . 2023.05.10 10:11:33 - OpenVPN > Validating certificate extended key usage . 2023.05.10 10:11:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.05.10 10:11:33 - OpenVPN > VERIFY EKU OK . 2023.05.10 10:11:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Iskandar, emailAddress=info@airvpn.org . 2023.05.10 10:11:33 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.05.10 10:11:33 - OpenVPN > [Iskandar] Peer Connection Initiated with [AF_INET]82.102.28.109:443 . 2023.05.10 10:11:34 - OpenVPN > SENT CONTROL [Iskandar]: 'PUSH_REQUEST' (status=1) . 2023.05.10 10:11:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.182.1,dhcp-option DNS6 fde6:7a:7d20:fb6::1,tun-ipv6,route-gateway 10.19.182.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:fb6::103a/64 fde6:7a:7d20:fb6::1,ifconfig 10.19.182.60 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.05.10 10:11:34 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.05.10 10:11:34 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.182.1' . 2023.05.10 10:11:34 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:fb6::1' . 2023.05.10 10:11:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.05.10 10:11:34 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.05.10 10:11:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.05.10 10:11:34 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.05.10 10:11:34 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.05.10 10:11:34 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.05.10 10:11:34 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.05.10 10:11:34 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.05.10 10:11:34 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 10:11:34 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 10:11:34 - OpenVPN > interactive service msg_channel=0 . 2023.05.10 10:11:34 - OpenVPN > open_tun . 2023.05.10 10:11:34 - OpenVPN > wintun device [Eddie] opened . 2023.05.10 10:11:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 37 static 10.19.182.60 255.255.255.0 . 2023.05.10 10:11:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 37 all . 2023.05.10 10:11:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 37 all . 2023.05.10 10:11:34 - OpenVPN > IPv4 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 10:11:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 37 fde6:7a:7d20:fb6::103a/128 store=active . 2023.05.10 10:11:34 - OpenVPN > add_route_ipv6(fde6:7a:7d20:fb6::/64 -> fde6:7a:7d20:fb6::103a metric 0) dev Eddie . 2023.05.10 10:11:34 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:fb6::/64 37 fe80::8 store=active . 2023.05.10 10:11:34 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.05.10 10:11:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 37 all . 2023.05.10 10:11:34 - OpenVPN > IPv6 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 10:11:34 - OpenVPN > Initialization Sequence Completed . 2023.05.10 10:11:34 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.05.10 10:11:34 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.05.10 10:11:34 - DNS leak protection with packet filtering enabled. . 2023.05.10 10:11:34 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.19.182.1) . 2023.05.10 10:11:34 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:fb6::1) . 2023.05.10 10:11:35 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:11:35 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:11:35 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:11:36 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:11:36 - Routes, add 82.102.28.107/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:11:36 - Routes, add 2001:ac8:40:8:ff92:53b9:316d:b8a7/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:11:36 - Flushing DNS I 2023.05.10 10:11:36 - Checking route IPv4 . 2023.05.10 10:12:25 - Checking route (4° try) . 2023.05.10 10:12:50 - Checking route (5° try) E 2023.05.10 10:13:11 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2023.05.10 10:13:11 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 10:13:11 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 10:13:11 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 10:13:11 - Above log line repeated 22 times more ! 2023.05.10 10:13:11 - Disconnecting . 2023.05.10 10:13:11 - Sending soft termination signal . 2023.05.10 10:13:14 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.05.10 10:13:17 - OpenVPN > Closing TUN/TAP interface . 2023.05.10 10:13:17 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:fb6::/64) . 2023.05.10 10:13:17 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:fb6::/64 37 fe80::8 store=active . 2023.05.10 10:13:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 37 fde6:7a:7d20:fb6::103a store=active . 2023.05.10 10:13:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 37 10.19.182.60 store=active . 2023.05.10 10:13:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.05.10 10:13:17 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:13:17 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:13:18 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:13:18 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:13:18 - Routes, delete 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 10:13:19 - Routes, delete 82.102.28.107/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:13:19 - Routes, delete 2001:ac8:40:8:ff92:53b9:316d:b8a7/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:13:19 - Routes, delete 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", not exists. . 2023.05.10 10:13:19 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 10:13:19 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 10:13:19 - DNS leak protection with packet filtering disabled. . 2023.05.10 10:13:19 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.05.10 10:13:19 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.05.10 10:13:19 - Connection terminated. I 2023.05.10 10:13:23 - Checking authorization ... . 2023.05.10 10:13:23 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.05.10 10:13:24 - Connecting to Diadema (Belgium, Brussels) . 2023.05.10 10:13:24 - Routes, add 194.187.251.165/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 10:13:24 - Routes, add 194.187.251.165/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", already exists. . 2023.05.10 10:13:24 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.05.10 10:13:24 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.05.10 10:13:24 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.05.10 10:13:24 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 10:13:24 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 10:13:24 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 10:13:24 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 10:13:24 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.165:443 . 2023.05.10 10:13:24 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.05.10 10:13:24 - OpenVPN > UDP link local: (not bound) . 2023.05.10 10:13:24 - OpenVPN > UDP link remote: [AF_INET]194.187.251.165:443 . 2023.05.10 10:13:24 - OpenVPN > TLS: Initial packet from [AF_INET]194.187.251.165:443, sid=0a642211 faa0ab8a . 2023.05.10 10:13:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.05.10 10:13:25 - OpenVPN > VERIFY KU OK . 2023.05.10 10:13:25 - OpenVPN > Validating certificate extended key usage . 2023.05.10 10:13:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.05.10 10:13:25 - OpenVPN > VERIFY EKU OK . 2023.05.10 10:13:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Diadema, emailAddress=info@airvpn.org . 2023.05.10 10:13:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.05.10 10:13:25 - OpenVPN > [Diadema] Peer Connection Initiated with [AF_INET]194.187.251.165:443 . 2023.05.10 10:13:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.182.1,dhcp-option DNS6 fde6:7a:7d20:bb6::1,tun-ipv6,route-gateway 10.15.182.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:bb6::10c8/64 fde6:7a:7d20:bb6::1,ifconfig 10.15.182.202 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2023.05.10 10:13:25 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.05.10 10:13:25 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.15.182.1' . 2023.05.10 10:13:25 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:bb6::1' . 2023.05.10 10:13:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.05.10 10:13:25 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.05.10 10:13:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.05.10 10:13:25 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.05.10 10:13:25 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.05.10 10:13:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.05.10 10:13:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.05.10 10:13:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.05.10 10:13:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 10:13:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 10:13:25 - OpenVPN > interactive service msg_channel=0 . 2023.05.10 10:13:25 - OpenVPN > open_tun . 2023.05.10 10:13:25 - OpenVPN > wintun device [Eddie] opened . 2023.05.10 10:13:25 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 37 static 10.15.182.202 255.255.255.0 . 2023.05.10 10:13:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 37 all . 2023.05.10 10:13:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 37 all . 2023.05.10 10:13:26 - OpenVPN > IPv4 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 10:13:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 37 fde6:7a:7d20:bb6::10c8/128 store=active . 2023.05.10 10:13:26 - OpenVPN > add_route_ipv6(fde6:7a:7d20:bb6::/64 -> fde6:7a:7d20:bb6::10c8 metric 0) dev Eddie . 2023.05.10 10:13:26 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:bb6::/64 37 fe80::8 store=active . 2023.05.10 10:13:26 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.05.10 10:13:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 37 all . 2023.05.10 10:13:26 - OpenVPN > IPv6 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 10:13:26 - OpenVPN > Initialization Sequence Completed . 2023.05.10 10:13:26 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.05.10 10:13:26 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.05.10 10:13:26 - DNS leak protection with packet filtering enabled. . 2023.05.10 10:13:26 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.15.182.1) . 2023.05.10 10:13:26 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:bb6::1) . 2023.05.10 10:13:27 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:13:27 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:13:27 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:13:27 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:13:28 - Routes, add 194.187.251.163/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:13:28 - Routes, add 2001:ac8:27:8:565a:d8b5:65b0:a0c6/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:13:28 - Flushing DNS I 2023.05.10 10:13:28 - Checking route IPv4 . 2023.05.10 10:14:13 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 10:14:13 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 10:14:13 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 10:14:13 - Above log line repeated 13 times more ! 2023.05.10 10:14:13 - Disconnecting . 2023.05.10 10:14:13 - Sending soft termination signal . 2023.05.10 10:14:16 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.05.10 10:14:18 - OpenVPN > Closing TUN/TAP interface . 2023.05.10 10:14:18 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:bb6::/64) . 2023.05.10 10:14:18 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:bb6::/64 37 fe80::8 store=active . 2023.05.10 10:14:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 37 fde6:7a:7d20:bb6::10c8 store=active . 2023.05.10 10:14:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 37 10.15.182.202 store=active . 2023.05.10 10:14:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.05.10 10:14:19 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:14:19 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:14:19 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:14:20 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:14:20 - Routes, delete 194.187.251.165/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 10:14:20 - Routes, delete 194.187.251.163/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:14:21 - Routes, delete 2001:ac8:27:8:565a:d8b5:65b0:a0c6/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:14:21 - Routes, delete 194.187.251.165/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", not exists. . 2023.05.10 10:14:21 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 10:14:21 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 10:14:21 - DNS leak protection with packet filtering disabled. . 2023.05.10 10:14:21 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.05.10 10:14:21 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.05.10 10:14:21 - Connection terminated. I 2023.05.10 10:14:21 - Cancel requested. ! 2023.05.10 10:14:21 - Session terminated. I 2023.05.10 10:18:23 - Session starting. I 2023.05.10 10:18:23 - Checking authorization ... . 2023.05.10 10:18:25 - Added new network interface "Eddie", Wintun version 0.12 . 2023.05.10 10:18:25 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.05.10 10:18:25 - Connecting to Iskandar (Japan, Tokyo) . 2023.05.10 10:18:25 - Routes, add 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 10:18:25 - Routes, add 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", already exists. . 2023.05.10 10:18:26 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.05.10 10:18:26 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.05.10 10:18:26 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.05.10 10:18:26 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 10:18:26 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 10:18:26 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.10 10:18:26 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.10 10:18:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]82.102.28.109:443 . 2023.05.10 10:18:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.05.10 10:18:26 - OpenVPN > UDP link local: (not bound) . 2023.05.10 10:18:26 - OpenVPN > UDP link remote: [AF_INET]82.102.28.109:443 . 2023.05.10 10:18:26 - OpenVPN > TLS: Initial packet from [AF_INET]82.102.28.109:443, sid=34b53fa4 619960cd . 2023.05.10 10:18:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.05.10 10:18:26 - OpenVPN > VERIFY KU OK . 2023.05.10 10:18:26 - OpenVPN > Validating certificate extended key usage . 2023.05.10 10:18:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.05.10 10:18:26 - OpenVPN > VERIFY EKU OK . 2023.05.10 10:18:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Iskandar, emailAddress=info@airvpn.org . 2023.05.10 10:18:26 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.05.10 10:18:26 - OpenVPN > [Iskandar] Peer Connection Initiated with [AF_INET]82.102.28.109:443 . 2023.05.10 10:18:26 - OpenVPN > SENT CONTROL [Iskandar]: 'PUSH_REQUEST' (status=1) . 2023.05.10 10:18:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.182.1,dhcp-option DNS6 fde6:7a:7d20:fb6::1,tun-ipv6,route-gateway 10.19.182.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:fb6::103a/64 fde6:7a:7d20:fb6::1,ifconfig 10.19.182.60 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.05.10 10:18:26 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.05.10 10:18:26 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.182.1' . 2023.05.10 10:18:26 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:fb6::1' . 2023.05.10 10:18:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.05.10 10:18:26 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.05.10 10:18:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.05.10 10:18:26 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.05.10 10:18:26 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.05.10 10:18:26 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.05.10 10:18:26 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.05.10 10:18:26 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.05.10 10:18:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 10:18:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.10 10:18:26 - OpenVPN > interactive service msg_channel=0 . 2023.05.10 10:18:26 - OpenVPN > open_tun . 2023.05.10 10:18:26 - OpenVPN > wintun device [Eddie] opened . 2023.05.10 10:18:27 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 37 static 10.19.182.60 255.255.255.0 . 2023.05.10 10:18:27 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 37 all . 2023.05.10 10:18:27 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 37 all . 2023.05.10 10:18:27 - OpenVPN > IPv4 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 10:18:27 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 37 fde6:7a:7d20:fb6::103a/128 store=active . 2023.05.10 10:18:27 - OpenVPN > add_route_ipv6(fde6:7a:7d20:fb6::/64 -> fde6:7a:7d20:fb6::103a metric 0) dev Eddie . 2023.05.10 10:18:27 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:fb6::/64 37 fe80::8 store=active . 2023.05.10 10:18:27 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.05.10 10:18:27 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 37 all . 2023.05.10 10:18:27 - OpenVPN > IPv6 MTU set to 1500 on interface 37 using SetIpInterfaceEntry() . 2023.05.10 10:18:27 - OpenVPN > Initialization Sequence Completed . 2023.05.10 10:18:27 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.05.10 10:18:27 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.05.10 10:18:27 - DNS leak protection with packet filtering enabled. . 2023.05.10 10:18:27 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.19.182.1) . 2023.05.10 10:18:27 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:fb6::1) . 2023.05.10 10:18:28 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:18:28 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:18:28 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:18:29 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:18:29 - Routes, add 82.102.28.107/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:18:29 - Routes, add 2001:ac8:40:8:ff92:53b9:316d:b8a7/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:18:29 - Flushing DNS ! 2023.05.10 10:18:29 - Connected. . 2023.05.10 10:18:29 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 10:18:29 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 10:18:29 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.05.10 10:18:50 - Above log line repeated 22 times more ! 2023.05.10 10:18:50 - Disconnecting . 2023.05.10 10:18:50 - Sending soft termination signal . 2023.05.10 10:18:54 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.05.10 10:18:56 - OpenVPN > Closing TUN/TAP interface . 2023.05.10 10:18:56 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:fb6::/64) . 2023.05.10 10:18:56 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:fb6::/64 37 fe80::8 store=active . 2023.05.10 10:18:56 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 37 fde6:7a:7d20:fb6::103a store=active . 2023.05.10 10:18:56 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 37 10.19.182.60 store=active . 2023.05.10 10:18:56 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.05.10 10:18:56 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:18:57 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:18:57 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:18:57 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:18:58 - Routes, delete 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)". . 2023.05.10 10:18:58 - Routes, delete 82.102.28.107/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:18:58 - Routes, delete 2001:ac8:40:8:ff92:53b9:316d:b8a7/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.05.10 10:18:58 - Routes, delete 82.102.28.109/32 for interface "以太网 (Realtek PCIe GbE Family Controller)", not exists. . 2023.05.10 10:18:58 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 10:18:58 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.05.10 10:18:58 - DNS leak protection with packet filtering disabled. . 2023.05.10 10:18:58 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.05.10 10:18:58 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.05.10 10:18:58 - Connection terminated. . 2023.05.10 10:18:58 - Flushing DNS ! 2023.05.10 10:18:59 - Session terminated. ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/0", "gateway": "10.135.255.254", "interface_index": 18, "metric": 0, "interface": "{D4F9A562-CB2C-4CF4-B2F0-498213E38459}" }, { "destination": "0.0.0.0\/0", "gateway": "10.135.255.254", "interface_index": 2, "metric": 0, "interface": "{0471D511-919E-4F6C-8C41-2DC7365E5F5C}" }, { "destination": "10.135.0.0\/16", "gateway": "0.0.0.0", "interface_index": 2, "metric": 256, "interface": "{0471D511-919E-4F6C-8C41-2DC7365E5F5C}" }, { "destination": "10.135.64.79\/32", "gateway": "0.0.0.0", "interface_index": 2, "metric": 256, "interface": "{0471D511-919E-4F6C-8C41-2DC7365E5F5C}" }, { "destination": "10.135.255.255\/32", "gateway": "0.0.0.0", "interface_index": 2, "metric": 256, "interface": "{0471D511-919E-4F6C-8C41-2DC7365E5F5C}" }, { "destination": "127.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{76D5025A-D3D8-11EB-A4A9-806E6F6E6963}" }, { "destination": "127.0.0.1\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{76D5025A-D3D8-11EB-A4A9-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{76D5025A-D3D8-11EB-A4A9-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{76D5025A-D3D8-11EB-A4A9-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{D4F9A562-CB2C-4CF4-B2F0-498213E38459}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{17966862-302D-4630-B27B-62A1B4A22F9F}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 2, "metric": 256, "interface": "{0471D511-919E-4F6C-8C41-2DC7365E5F5C}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 19, "metric": 256, "interface": "{DD9576E0-B8CD-4C18-AEB2-2B2E01E936DC}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 15, "metric": 256, "interface": "{9161487D-BDD0-41F2-9CEF-22B6F148A07E}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{76D5025A-D3D8-11EB-A4A9-806E6F6E6963}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{D4F9A562-CB2C-4CF4-B2F0-498213E38459}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{17966862-302D-4630-B27B-62A1B4A22F9F}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 2, "metric": 256, "interface": "{0471D511-919E-4F6C-8C41-2DC7365E5F5C}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 19, "metric": 256, "interface": "{DD9576E0-B8CD-4C18-AEB2-2B2E01E936DC}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 15, "metric": 256, "interface": "{9161487D-BDD0-41F2-9CEF-22B6F148A07E}" }, { "destination": "::\/0", "gateway": "fe80::662f:c7ff:fece:1802", "interface_index": 2, "metric": 256, "interface": "{0471D511-919E-4F6C-8C41-2DC7365E5F5C}" }, { "destination": "::1\/128", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{76D5025A-D3D8-11EB-A4A9-806E6F6E6963}" }, { "destination": "2001:da8:3001:1020::15cd:f6ad\/128", "gateway": "::", "interface_index": 2, "metric": 256, "interface": "{0471D511-919E-4F6C-8C41-2DC7365E5F5C}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 18, "metric": 256, "interface": "{D4F9A562-CB2C-4CF4-B2F0-498213E38459}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 4, "metric": 256, "interface": "{17966862-302D-4630-B27B-62A1B4A22F9F}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 2, "metric": 256, "interface": "{0471D511-919E-4F6C-8C41-2DC7365E5F5C}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 19, "metric": 256, "interface": "{DD9576E0-B8CD-4C18-AEB2-2B2E01E936DC}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 15, "metric": 256, "interface": "{9161487D-BDD0-41F2-9CEF-22B6F148A07E}" }, { "destination": "fe80::1bd2:af22:2214:da47\/128", "gateway": "::", "interface_index": 2, "metric": 256, "interface": "{0471D511-919E-4F6C-8C41-2DC7365E5F5C}" }, { "destination": "fe80::3a78:24ef:8ecd:e70f\/128", "gateway": "::", "interface_index": 18, "metric": 256, "interface": "{D4F9A562-CB2C-4CF4-B2F0-498213E38459}" }, { "destination": "fe80::8782:efd5:886f:b5a7\/128", "gateway": "::", "interface_index": 4, "metric": 256, "interface": "{17966862-302D-4630-B27B-62A1B4A22F9F}" }, { "destination": "fe80::b964:5e46:4c5d:55e2\/128", "gateway": "::", "interface_index": 15, "metric": 256, "interface": "{9161487D-BDD0-41F2-9CEF-22B6F148A07E}" }, { "destination": "fe80::e596:7378:515f:c288\/128", "gateway": "::", "interface_index": 19, "metric": 256, "interface": "{DD9576E0-B8CD-4C18-AEB2-2B2E01E936DC}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{76D5025A-D3D8-11EB-A4A9-806E6F6E6963}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 18, "metric": 256, "interface": "{D4F9A562-CB2C-4CF4-B2F0-498213E38459}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 4, "metric": 256, "interface": "{17966862-302D-4630-B27B-62A1B4A22F9F}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 2, "metric": 256, "interface": "{0471D511-919E-4F6C-8C41-2DC7365E5F5C}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 19, "metric": 256, "interface": "{DD9576E0-B8CD-4C18-AEB2-2B2E01E936DC}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 15, "metric": 256, "interface": "{9161487D-BDD0-41F2-9CEF-22B6F148A07E}" } ], "ipv4-default-gateway": "10.135.255.254", "ipv4-default-interface": "{D4F9A562-CB2C-4CF4-B2F0-498213E38459}", "ipv6-default-gateway": "fe80::662f:c7ff:fece:1802", "ipv6-default-interface": "{0471D511-919E-4F6C-8C41-2DC7365E5F5C}", "interfaces": [ { "friendly": "\u4ee5\u592a\u7f51", "id": "{D4F9A562-CB2C-4CF4-B2F0-498213E38459}", "name": "\u4ee5\u592a\u7f51", "description": "Realtek PCIe GbE Family Controller", "type": "Ethernet", "status": "Down", "bytes_received": "3959019257", "bytes_sent": "697190221", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::3a78:24ef:8ecd:e70f", "169.254.103.106" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "\u672c\u5730\u8fde\u63a5* 1", "id": "{DD9576E0-B8CD-4C18-AEB2-2B2E01E936DC}", "name": "\u672c\u5730\u8fde\u63a5* 1", "description": "Microsoft Wi-Fi Direct Virtual Adapter #3", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::e596:7378:515f:c288", "169.254.54.206" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "\u672c\u5730\u8fde\u63a5* 2", "id": "{9161487D-BDD0-41F2-9CEF-22B6F148A07E}", "name": "\u672c\u5730\u8fde\u63a5* 2", "description": "Microsoft Wi-Fi Direct Virtual Adapter #4", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::b964:5e46:4c5d:55e2", "169.254.11.196" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "WLAN", "id": "{0471D511-919E-4F6C-8C41-2DC7365E5F5C}", "name": "WLAN", "description": "Realtek RTL8852AE WiFi 6 802.11ax PCIe Adapter", "type": "Wireless80211", "status": "Up", "bytes_received": "8001174094", "bytes_sent": "1877845031", "support_ipv4": true, "support_ipv6": true, "ips": [ "2001:da8:3001:1020::15cd:f6ad", "fe80::1bd2:af22:2214:da47", "10.135.64.79" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "\u84dd\u7259\u7f51\u7edc\u8fde\u63a5", "id": "{17966862-302D-4630-B27B-62A1B4A22F9F}", "name": "\u84dd\u7259\u7f51\u7edc\u8fde\u63a5", "description": "Bluetooth Device (Personal Area Network)", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::8782:efd5:886f:b5a7", "169.254.225.235" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{76D5025A-D3D8-11EB-A4A9-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "bind": true, "dns4": "", "dns6": null } ] } ---------------------------- ipconfig /all: Windows IP 配置 主机名 . . . . . . . . . . . . . : LAPTOP-P54LHDRG 主 DNS 后缀 . . . . . . . . . . . : 节点类型 . . . . . . . . . . . . : 混合 IP 路由已启用 . . . . . . . . . . : 否 WINS 代理已启用 . . . . . . . . . : 否 以太网适配器 以太网: 媒体状态 . . . . . . . . . . . . : 媒体已断开连接 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : Realtek PCIe GbE Family Controller 物理地址. . . . . . . . . . . . . : 84-A9-38-90-4C-84 DHCP 已启用 . . . . . . . . . . . : 是 自动配置已启用. . . . . . . . . . : 是 无线局域网适配器 本地连接* 1: 媒体状态 . . . . . . . . . . . . : 媒体已断开连接 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #3 物理地址. . . . . . . . . . . . . : E2-0A-F6-45-89-1B DHCP 已启用 . . . . . . . . . . . : 是 自动配置已启用. . . . . . . . . . : 是 无线局域网适配器 本地连接* 2: 媒体状态 . . . . . . . . . . . . : 媒体已断开连接 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #4 物理地址. . . . . . . . . . . . . : F2-0A-F6-45-89-1B DHCP 已启用 . . . . . . . . . . . : 是 自动配置已启用. . . . . . . . . . : 是 无线局域网适配器 WLAN: 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : Realtek RTL8852AE WiFi 6 802.11ax PCIe Adapter 物理地址. . . . . . . . . . . . . : E0-0A-F6-45-89-1B DHCP 已启用 . . . . . . . . . . . : 是 自动配置已启用. . . . . . . . . . : 是 IPv6 地址 . . . . . . . . . . . . : 2001:da8:3001:1020::15cd:f6ad(首选) 获得租约的时间 . . . . . . . . . : 2023年5月10日 8:53:41 租约过期的时间 . . . . . . . . . : 2023年5月10日 16:53:41 本地链接 IPv6 地址. . . . . . . . : fe80::1bd2:af22:2214:da47%2(首选) IPv4 地址 . . . . . . . . . . . . : 10.135.64.79(首选) 子网掩码 . . . . . . . . . . . . : 255.255.0.0 获得租约的时间 . . . . . . . . . : 2023年5月10日 8:53:40 租约过期的时间 . . . . . . . . . : 2023年5月10日 11:53:40 默认网关. . . . . . . . . . . . . : fe80::662f:c7ff:fece:1802%2 10.135.255.254 DHCP 服务器 . . . . . . . . . . . : 10.135.255.254 DHCPv6 IAID . . . . . . . . . . . : 333449974 DHCPv6 客户端 DUID . . . . . . . : 00-01-00-01-29-20-21-E6-84-A9-38-90-4C-84 DNS 服务器 . . . . . . . . . . . : 2001:da8:3001:2000::7 122.204.167.6 TCPIP 上的 NetBIOS . . . . . . . : 已启用 以太网适配器 蓝牙网络连接: 媒体状态 . . . . . . . . . . . . : 媒体已断开连接 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : Bluetooth Device (Personal Area Network) 物理地址. . . . . . . . . . . . . : E0-0A-F6-45-89-1C DHCP 已启用 . . . . . . . . . . . : 是 自动配置已启用. . . . . . . . . . : 是 For the chinese part, I don't know some of the terms, so I used machine translation, as below. Windows IP Configuration Host Name: LAPTOP-P54LHDRG Primary DNS Suffix. . . : Node Type: blend IP routing enabled. . . : no The Wins proxy has been enabled. . . : no Ethernet adapter Ethernet: Media Status: Media disconnected Connect specific DNS suffixes. . . : Description: Realtek PCIe GbE Family Controller Physical address: 84-A9-38-90-4C-84 DHCP enabled. . . : yes Automatic configuration enabled. . . : yes Wireless LAN adapter local connection * 1: Media Status: Media disconnected Connect specific DNS suffixes. . . : Description: Microsoft Wi-Fi Direct Virtual Adapter #3 Physical address: E2-0A-F6-45-89-1B DHCP enabled. . . : yes Automatic configuration enabled. . . : yes Wireless LAN adapter local connection * 2: Media Status: Media disconnected Connect specific DNS suffixes. . . : Description: Microsoft Wi-Fi Direct Virtual Adapter #4 Physical address: F2-0A-F6-45-89-1B DHCP enabled. . . : yes Automatic configuration enabled. . . : yes Wireless LAN adapter WLAN: Connect specific DNS suffixes. . . : Description: Realtek RTL8852AE WiFi 6 802. 11ax PCIe Adapter Physical address: E0-0A-F6-45-89-1B DHCP enabled. . . : yes Automatic configuration enabled. . . : yes IPv6 address: 2001:da8:3001:1020: 15cd:f6ad (preferred) Time of obtaining the lease. . . : May 10, 2023 8:53:41 The expiration date of the lease agreement: May 10, 2023 16:53:41 Local Link IPv6 Address. . . : Fe80::1bd2:af22:2214:da47%2(preferred) IPv4 address: 10.135.64.79(preferred) Subnet mask. . . . . . . . . . . . . . . : 255.255.0.0 Time of obtaining the lease. . . : May 10, 2023 8:53:40 The expiration date of the lease agreement: May 10, 2023 11:53:40 Default gateway: fe80::662f:c7ff:fece:1802%2 10.135.255.254 DHCP Server. . . : 10.135.255.254 DHCPv6 IAID . . . . . . . . . . . : 333449974 DHCPv6 client DUID: 00-01-00-01-29-20-21-E6-84-A9-38-90-4C-84 DNS server. . . : 2001:da8:3001:2000::7 122.204.167.6 NetBIOS on TCPIP. . . :Enabled Ethernet adapter Bluetooth network connection: Media Status: Media disconnected Connect specific DNS suffixes. . . : Description: Bluetooth Device (Personal Area Network) Physical address: E0-0A-F6-45-89-1C DHCP enabled. . . : yes Automatic configuration enabled. . . : yes Share this post Link to post
Staff 9972 Posted ... Hello! OpenVPN over UDP and WireGuard are blocked on most (if not all) China residential lines. You need the following connection mode: OpenVPN protocol TCP port 443 entry-IP address 3 (three) When you run Eddie you can change connection mode on the "Preferences" > "Protocols" window. Uncheck "Automatic", select the proper line (the selection is confirmed by highlighted line) and click "Save". Kind regards 1 虎骨冬青 reacted to this Share this post Link to post