Jump to content
Not connected, Your IP: 13.58.203.255

Recommended Posts

I keep getting the restarting in 3 second loop, but I think its because of this: . 2024.01.23 11:46:24 - Routes, delete 184.75.223.221/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", not exists. I saw it in the logs.

Any idea how to fix it?

. 2024.01.23 11:30:36 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.22631.0, Mono/.Net: v4.0.30319
. 2024.01.23 11:30:36 - Command line arguments (1): path="home"
. 2024.01.23 11:30:37 - Profile options not found, using defaults.
. 2024.01.23 11:30:38 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2024.01.23 11:30:38 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe)
. 2024.01.23 11:30:38 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe)
I 2024.01.23 11:30:38 - Ready
. 2024.01.23 11:30:40 - Collect information about AirVPN completed
I 2024.01.23 11:32:06 - Checking login ...
! 2024.01.23 11:32:07 - Logged in.
I 2024.01.23 11:32:26 - Session starting.
I 2024.01.23 11:32:27 - Checking authorization ...
. 2024.01.23 11:32:28 - Using WinTun network interface "Local Area Connection 2 (WireSock Virtual Adapter)"
! 2024.01.23 11:32:28 - Connecting to Teegarden (United States of America, Los Angeles)
. 2024.01.23 11:32:28 - Routes, add 37.120.132.93/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:32:28 - Routes, add 37.120.132.93/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", already exists.
. 2024.01.23 11:32:28 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.01.23 11:32:28 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.01.23 11:32:28 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.01.23 11:32:28 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:32:28 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:32:28 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:32:28 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:32:28 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]37.120.132.93:443
. 2024.01.23 11:32:28 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.01.23 11:32:28 - OpenVPN > UDP link local: (not bound)
. 2024.01.23 11:32:28 - OpenVPN > UDP link remote: [AF_INET]37.120.132.93:443
. 2024.01.23 11:32:28 - OpenVPN > TLS: Initial packet from [AF_INET]37.120.132.93:443, sid=74b5e1f3 2bb91480
. 2024.01.23 11:32:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2024.01.23 11:32:28 - OpenVPN > VERIFY KU OK
. 2024.01.23 11:32:28 - OpenVPN > Validating certificate extended key usage
. 2024.01.23 11:32:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2024.01.23 11:32:28 - OpenVPN > VERIFY EKU OK
. 2024.01.23 11:32:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Teegarden, emailAddress=info@airvpn.org
. 2024.01.23 11:32:28 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2024.01.23 11:32:28 - OpenVPN > [Teegarden] Peer Connection Initiated with [AF_INET]37.120.132.93:443
. 2024.01.23 11:32:28 - OpenVPN > SENT CONTROL [Teegarden]: 'PUSH_REQUEST' (status=1)
. 2024.01.23 11:32:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.18.42.1,dhcp-option DNS6 fde6:7a:7d20:e2a::1,tun-ipv6,route-gateway 10.18.42.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:e2a::10d0/64 fde6:7a:7d20:e2a::1,ifconfig 10.18.42.210 255.255.255.0,peer-id 6,cipher AES-256-GCM'
. 2024.01.23 11:32:28 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2024.01.23 11:32:28 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.18.42.1'
. 2024.01.23 11:32:28 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:e2a::1'
. 2024.01.23 11:32:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2024.01.23 11:32:28 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2024.01.23 11:32:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2024.01.23 11:32:28 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2024.01.23 11:32:28 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2024.01.23 11:32:28 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2024.01.23 11:32:28 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2024.01.23 11:32:28 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2024.01.23 11:32:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:32:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:32:28 - OpenVPN > interactive service msg_channel=0
. 2024.01.23 11:32:28 - OpenVPN > open_tun
. 2024.01.23 11:32:28 - OpenVPN > All wintun adapters on this system are currently in use or disabled.
. 2024.01.23 11:32:28 - OpenVPN > Exiting due to fatal error
! 2024.01.23 11:32:28 - Disconnecting
. 2024.01.23 11:32:29 - Routes, delete 37.120.132.93/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:32:29 - Routes, delete 37.120.132.93/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", not exists.
. 2024.01.23 11:32:29 - Connection terminated.
I 2024.01.23 11:32:32 - Checking authorization ...
. 2024.01.23 11:32:32 - Using WinTun network interface "Local Area Connection 2 (WireSock Virtual Adapter)"
! 2024.01.23 11:32:32 - Connecting to Nahn (Canada, Vancouver)
. 2024.01.23 11:32:33 - Routes, add 192.30.89.69/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:32:33 - Routes, add 192.30.89.69/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", already exists.
. 2024.01.23 11:32:33 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.01.23 11:32:33 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.01.23 11:32:33 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.01.23 11:32:33 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:32:33 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:32:33 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:32:33 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:32:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.69:443
. 2024.01.23 11:32:33 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.01.23 11:32:33 - OpenVPN > UDP link local: (not bound)
. 2024.01.23 11:32:33 - OpenVPN > UDP link remote: [AF_INET]192.30.89.69:443
. 2024.01.23 11:32:33 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.69:443, sid=064cdeab 2981118e
. 2024.01.23 11:32:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2024.01.23 11:32:33 - OpenVPN > VERIFY KU OK
. 2024.01.23 11:32:33 - OpenVPN > Validating certificate extended key usage
. 2024.01.23 11:32:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2024.01.23 11:32:33 - OpenVPN > VERIFY EKU OK
. 2024.01.23 11:32:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nahn, emailAddress=info@airvpn.org
. 2024.01.23 11:32:33 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2024.01.23 11:32:33 - OpenVPN > [Nahn] Peer Connection Initiated with [AF_INET]192.30.89.69:443
. 2024.01.23 11:32:34 - OpenVPN > SENT CONTROL [Nahn]: 'PUSH_REQUEST' (status=1)
. 2024.01.23 11:32:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.35.74.1,dhcp-option DNS6 fde6:7a:7d20:1f4a::1,tun-ipv6,route-gateway 10.35.74.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1f4a::1004/64 fde6:7a:7d20:1f4a::1,ifconfig 10.35.74.6 255.255.255.0,peer-id 12,cipher AES-256-GCM'
. 2024.01.23 11:32:34 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2024.01.23 11:32:34 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.35.74.1'
. 2024.01.23 11:32:34 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1f4a::1'
. 2024.01.23 11:32:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2024.01.23 11:32:34 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2024.01.23 11:32:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2024.01.23 11:32:34 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2024.01.23 11:32:34 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2024.01.23 11:32:34 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2024.01.23 11:32:34 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2024.01.23 11:32:34 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2024.01.23 11:32:34 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:32:34 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:32:34 - OpenVPN > interactive service msg_channel=0
. 2024.01.23 11:32:34 - OpenVPN > open_tun
. 2024.01.23 11:32:34 - OpenVPN > All wintun adapters on this system are currently in use or disabled.
. 2024.01.23 11:32:34 - OpenVPN > Exiting due to fatal error
! 2024.01.23 11:32:34 - Disconnecting
. 2024.01.23 11:32:34 - Routes, delete 192.30.89.69/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:32:34 - Routes, delete 192.30.89.69/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", not exists.
. 2024.01.23 11:32:34 - Connection terminated.
I 2024.01.23 11:32:37 - Checking authorization ...
. 2024.01.23 11:32:37 - Using WinTun network interface "Local Area Connection 2 (WireSock Virtual Adapter)"
! 2024.01.23 11:32:37 - Connecting to Telescopium (Canada, Vancouver)
. 2024.01.23 11:32:38 - Routes, add 192.30.89.53/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:32:38 - Routes, add 192.30.89.53/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", already exists.
. 2024.01.23 11:32:38 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.01.23 11:32:38 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.01.23 11:32:38 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.01.23 11:32:38 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:32:38 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:32:38 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:32:38 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:32:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:443
. 2024.01.23 11:32:38 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.01.23 11:32:38 - OpenVPN > UDP link local: (not bound)
. 2024.01.23 11:32:38 - OpenVPN > UDP link remote: [AF_INET]192.30.89.53:443
. 2024.01.23 11:32:38 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.53:443, sid=bb159dfa b62b548b
. 2024.01.23 11:32:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2024.01.23 11:32:40 - OpenVPN > VERIFY KU OK
. 2024.01.23 11:32:40 - OpenVPN > Validating certificate extended key usage
. 2024.01.23 11:32:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2024.01.23 11:32:40 - OpenVPN > VERIFY EKU OK
. 2024.01.23 11:32:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org
. 2024.01.23 11:32:40 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2024.01.23 11:32:40 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.53:443
. 2024.01.23 11:32:41 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1)
. 2024.01.23 11:32:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.10.1,dhcp-option DNS6 fde6:7a:7d20:f0a::1,tun-ipv6,route-gateway 10.19.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:f0a::10f4/64 fde6:7a:7d20:f0a::1,ifconfig 10.19.10.246 255.255.255.0,peer-id 4,cipher AES-256-GCM'
. 2024.01.23 11:32:41 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2024.01.23 11:32:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.10.1'
. 2024.01.23 11:32:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:f0a::1'
. 2024.01.23 11:32:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2024.01.23 11:32:41 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2024.01.23 11:32:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2024.01.23 11:32:41 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2024.01.23 11:32:41 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2024.01.23 11:32:41 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2024.01.23 11:32:41 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2024.01.23 11:32:41 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2024.01.23 11:32:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:32:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:32:41 - OpenVPN > interactive service msg_channel=0
. 2024.01.23 11:32:41 - OpenVPN > open_tun
. 2024.01.23 11:32:41 - OpenVPN > All wintun adapters on this system are currently in use or disabled.
. 2024.01.23 11:32:41 - OpenVPN > Exiting due to fatal error
! 2024.01.23 11:32:41 - Disconnecting
. 2024.01.23 11:32:41 - Routes, delete 192.30.89.53/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:32:41 - Routes, delete 192.30.89.53/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", not exists.
. 2024.01.23 11:32:41 - Connection terminated.
I 2024.01.23 11:32:43 - Cancel requested.
! 2024.01.23 11:32:43 - Session terminated.
I 2024.01.23 11:38:55 - Session starting.
I 2024.01.23 11:38:56 - Checking authorization ...
. 2024.01.23 11:38:57 - Using WinTun network interface "Local Area Connection 2 (WireSock Virtual Adapter)"
! 2024.01.23 11:38:57 - Connecting to Groombridge (United States of America, Los Angeles)
. 2024.01.23 11:38:57 - Routes, add 37.120.132.85/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:38:57 - Routes, add 37.120.132.85/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", already exists.
. 2024.01.23 11:38:57 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.01.23 11:38:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.01.23 11:38:57 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.01.23 11:38:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:38:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:38:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:38:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:38:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]37.120.132.85:443
. 2024.01.23 11:38:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.01.23 11:38:57 - OpenVPN > UDP link local: (not bound)
. 2024.01.23 11:38:57 - OpenVPN > UDP link remote: [AF_INET]37.120.132.85:443
. 2024.01.23 11:38:57 - OpenVPN > TLS: Initial packet from [AF_INET]37.120.132.85:443, sid=30f0ecd0 ff3204e8
. 2024.01.23 11:38:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2024.01.23 11:38:57 - OpenVPN > VERIFY KU OK
. 2024.01.23 11:38:57 - OpenVPN > Validating certificate extended key usage
. 2024.01.23 11:38:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2024.01.23 11:38:57 - OpenVPN > VERIFY EKU OK
. 2024.01.23 11:38:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Groombridge, emailAddress=info@airvpn.org
. 2024.01.23 11:38:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2024.01.23 11:38:57 - OpenVPN > [Groombridge] Peer Connection Initiated with [AF_INET]37.120.132.85:443
. 2024.01.23 11:38:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.138.1,dhcp-option DNS6 fde6:7a:7d20:b8a::1,tun-ipv6,route-gateway 10.15.138.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:b8a::1074/64 fde6:7a:7d20:b8a::1,ifconfig 10.15.138.118 255.255.255.0,peer-id 4,cipher AES-256-GCM'
. 2024.01.23 11:38:58 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2024.01.23 11:38:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.15.138.1'
. 2024.01.23 11:38:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:b8a::1'
. 2024.01.23 11:38:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2024.01.23 11:38:58 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2024.01.23 11:38:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2024.01.23 11:38:58 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2024.01.23 11:38:58 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2024.01.23 11:38:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2024.01.23 11:38:58 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2024.01.23 11:38:58 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2024.01.23 11:38:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:38:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:38:58 - OpenVPN > interactive service msg_channel=0
. 2024.01.23 11:38:58 - OpenVPN > open_tun
. 2024.01.23 11:38:58 - OpenVPN > All wintun adapters on this system are currently in use or disabled.
. 2024.01.23 11:38:58 - OpenVPN > Exiting due to fatal error
! 2024.01.23 11:38:58 - Disconnecting
. 2024.01.23 11:38:58 - Routes, delete 37.120.132.85/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:38:58 - Routes, delete 37.120.132.85/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", not exists.
. 2024.01.23 11:38:58 - Connection terminated.
I 2024.01.23 11:39:01 - Checking authorization ...
. 2024.01.23 11:39:02 - Using WinTun network interface "Local Area Connection 2 (WireSock Virtual Adapter)"
! 2024.01.23 11:39:02 - Connecting to Pisces (Canada, Vancouver)
. 2024.01.23 11:39:02 - Routes, add 192.30.89.29/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:39:02 - Routes, add 192.30.89.29/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", already exists.
. 2024.01.23 11:39:02 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.01.23 11:39:02 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.01.23 11:39:02 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.01.23 11:39:02 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:39:02 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:39:02 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:39:02 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:39:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.29:443
. 2024.01.23 11:39:02 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.01.23 11:39:02 - OpenVPN > UDP link local: (not bound)
. 2024.01.23 11:39:02 - OpenVPN > UDP link remote: [AF_INET]192.30.89.29:443
. 2024.01.23 11:39:02 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.29:443, sid=b517e943 26b6af65
. 2024.01.23 11:39:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2024.01.23 11:39:02 - OpenVPN > VERIFY KU OK
. 2024.01.23 11:39:02 - OpenVPN > Validating certificate extended key usage
. 2024.01.23 11:39:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2024.01.23 11:39:02 - OpenVPN > VERIFY EKU OK
. 2024.01.23 11:39:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2024.01.23 11:39:02 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2024.01.23 11:39:02 - OpenVPN > [Pisces] Peer Connection Initiated with [AF_INET]192.30.89.29:443
. 2024.01.23 11:39:03 - OpenVPN > SENT CONTROL [Pisces]: 'PUSH_REQUEST' (status=1)
. 2024.01.23 11:39:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.234.1,dhcp-option DNS6 fde6:7a:7d20:bea::1,tun-ipv6,route-gateway 10.15.234.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:bea::101a/64 fde6:7a:7d20:bea::1,ifconfig 10.15.234.28 255.255.255.0,peer-id 23,cipher AES-256-GCM'
. 2024.01.23 11:39:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2024.01.23 11:39:03 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.15.234.1'
. 2024.01.23 11:39:03 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:bea::1'
. 2024.01.23 11:39:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2024.01.23 11:39:03 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2024.01.23 11:39:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2024.01.23 11:39:03 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2024.01.23 11:39:03 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2024.01.23 11:39:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2024.01.23 11:39:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2024.01.23 11:39:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2024.01.23 11:39:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:39:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:39:03 - OpenVPN > interactive service msg_channel=0
. 2024.01.23 11:39:03 - OpenVPN > open_tun
. 2024.01.23 11:39:03 - OpenVPN > All wintun adapters on this system are currently in use or disabled.
. 2024.01.23 11:39:03 - OpenVPN > Exiting due to fatal error
! 2024.01.23 11:39:03 - Disconnecting
. 2024.01.23 11:39:03 - Routes, delete 192.30.89.29/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:39:03 - Routes, delete 192.30.89.29/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", not exists.
. 2024.01.23 11:39:03 - Connection terminated.
I 2024.01.23 11:39:06 - Checking authorization ...
. 2024.01.23 11:39:07 - Using WinTun network interface "Local Area Connection 2 (WireSock Virtual Adapter)"
! 2024.01.23 11:39:07 - Connecting to Ginan (Canada, Vancouver)
. 2024.01.23 11:39:07 - Routes, add 104.193.135.245/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:39:07 - Routes, add 104.193.135.245/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", already exists.
. 2024.01.23 11:39:08 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.01.23 11:39:08 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.01.23 11:39:08 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.01.23 11:39:08 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:39:08 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:39:08 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:39:08 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:39:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.193.135.245:443
. 2024.01.23 11:39:08 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.01.23 11:39:08 - OpenVPN > UDP link local: (not bound)
. 2024.01.23 11:39:08 - OpenVPN > UDP link remote: [AF_INET]104.193.135.245:443
. 2024.01.23 11:39:08 - OpenVPN > TLS: Initial packet from [AF_INET]104.193.135.245:443, sid=e61f70ec c5845e08
. 2024.01.23 11:39:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2024.01.23 11:39:08 - OpenVPN > VERIFY KU OK
. 2024.01.23 11:39:08 - OpenVPN > Validating certificate extended key usage
. 2024.01.23 11:39:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2024.01.23 11:39:08 - OpenVPN > VERIFY EKU OK
. 2024.01.23 11:39:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ginan, emailAddress=info@airvpn.org
. 2024.01.23 11:39:08 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2024.01.23 11:39:08 - OpenVPN > [Ginan] Peer Connection Initiated with [AF_INET]104.193.135.245:443
. 2024.01.23 11:39:08 - OpenVPN > SENT CONTROL [Ginan]: 'PUSH_REQUEST' (status=1)
. 2024.01.23 11:39:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.42.1,dhcp-option DNS6 fde6:7a:7d20:152a::1,tun-ipv6,route-gateway 10.25.42.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:152a::1013/64 fde6:7a:7d20:152a::1,ifconfig 10.25.42.21 255.255.255.0,peer-id 7,cipher AES-256-GCM'
. 2024.01.23 11:39:08 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2024.01.23 11:39:08 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.25.42.1'
. 2024.01.23 11:39:08 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:152a::1'
. 2024.01.23 11:39:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2024.01.23 11:39:08 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2024.01.23 11:39:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2024.01.23 11:39:08 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2024.01.23 11:39:08 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2024.01.23 11:39:08 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2024.01.23 11:39:08 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2024.01.23 11:39:08 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2024.01.23 11:39:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:39:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:39:08 - OpenVPN > interactive service msg_channel=0
. 2024.01.23 11:39:08 - OpenVPN > open_tun
. 2024.01.23 11:39:08 - OpenVPN > All wintun adapters on this system are currently in use or disabled.
. 2024.01.23 11:39:08 - OpenVPN > Exiting due to fatal error
! 2024.01.23 11:39:08 - Disconnecting
. 2024.01.23 11:39:09 - Routes, delete 104.193.135.245/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:39:09 - Routes, delete 104.193.135.245/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", not exists.
. 2024.01.23 11:39:09 - Connection terminated.
I 2024.01.23 11:39:12 - Checking authorization ...
. 2024.01.23 11:39:13 - Using WinTun network interface "Local Area Connection 2 (WireSock Virtual Adapter)"
! 2024.01.23 11:39:13 - Connecting to Titawin (Canada, Vancouver)
. 2024.01.23 11:39:13 - Routes, add 192.30.89.61/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:39:13 - Routes, add 192.30.89.61/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", already exists.
. 2024.01.23 11:39:13 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.01.23 11:39:13 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.01.23 11:39:13 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.01.23 11:39:13 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:39:13 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:39:13 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:39:13 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:39:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.61:443
. 2024.01.23 11:39:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.01.23 11:39:13 - OpenVPN > UDP link local: (not bound)
. 2024.01.23 11:39:13 - OpenVPN > UDP link remote: [AF_INET]192.30.89.61:443
. 2024.01.23 11:39:13 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.61:443, sid=e37f9cc4 a8764574
. 2024.01.23 11:39:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2024.01.23 11:39:13 - OpenVPN > VERIFY KU OK
. 2024.01.23 11:39:13 - OpenVPN > Validating certificate extended key usage
. 2024.01.23 11:39:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2024.01.23 11:39:13 - OpenVPN > VERIFY EKU OK
. 2024.01.23 11:39:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Titawin, emailAddress=info@airvpn.org
. 2024.01.23 11:39:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2024.01.23 11:39:13 - OpenVPN > [Titawin] Peer Connection Initiated with [AF_INET]192.30.89.61:443
. 2024.01.23 11:39:14 - OpenVPN > SENT CONTROL [Titawin]: 'PUSH_REQUEST' (status=1)
. 2024.01.23 11:39:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.74.1,dhcp-option DNS6 fde6:7a:7d20:104a::1,tun-ipv6,route-gateway 10.20.74.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:104a::10a6/64 fde6:7a:7d20:104a::1,ifconfig 10.20.74.168 255.255.255.0,peer-id 2,cipher AES-256-GCM'
. 2024.01.23 11:39:14 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2024.01.23 11:39:14 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.20.74.1'
. 2024.01.23 11:39:14 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:104a::1'
. 2024.01.23 11:39:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2024.01.23 11:39:14 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2024.01.23 11:39:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2024.01.23 11:39:14 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2024.01.23 11:39:14 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2024.01.23 11:39:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2024.01.23 11:39:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2024.01.23 11:39:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2024.01.23 11:39:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:39:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:39:14 - OpenVPN > interactive service msg_channel=0
. 2024.01.23 11:39:14 - OpenVPN > open_tun
. 2024.01.23 11:39:14 - OpenVPN > All wintun adapters on this system are currently in use or disabled.
. 2024.01.23 11:39:14 - OpenVPN > Exiting due to fatal error
! 2024.01.23 11:39:14 - Disconnecting
. 2024.01.23 11:39:14 - Routes, delete 192.30.89.61/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:39:14 - Routes, delete 192.30.89.61/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", not exists.
. 2024.01.23 11:39:14 - Connection terminated.
I 2024.01.23 11:39:18 - Checking authorization ...
. 2024.01.23 11:39:18 - Using WinTun network interface "Local Area Connection 2 (WireSock Virtual Adapter)"
! 2024.01.23 11:39:18 - Connecting to Sharatan (Canada, Toronto, Ontario)
. 2024.01.23 11:39:19 - Routes, add 104.254.90.197/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:39:19 - Routes, add 104.254.90.197/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", already exists.
. 2024.01.23 11:39:19 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.01.23 11:39:19 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.01.23 11:39:19 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.01.23 11:39:19 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:39:19 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:39:19 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:39:19 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:39:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.197:443
. 2024.01.23 11:39:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.01.23 11:39:19 - OpenVPN > UDP link local: (not bound)
. 2024.01.23 11:39:19 - OpenVPN > UDP link remote: [AF_INET]104.254.90.197:443
. 2024.01.23 11:39:19 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.197:443, sid=86b385bd a7e42496
. 2024.01.23 11:39:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2024.01.23 11:39:19 - OpenVPN > VERIFY KU OK
. 2024.01.23 11:39:19 - OpenVPN > Validating certificate extended key usage
. 2024.01.23 11:39:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2024.01.23 11:39:19 - OpenVPN > VERIFY EKU OK
. 2024.01.23 11:39:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org
. 2024.01.23 11:39:19 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2024.01.23 11:39:19 - OpenVPN > [Sharatan] Peer Connection Initiated with [AF_INET]104.254.90.197:443
. 2024.01.23 11:39:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.234.1,dhcp-option DNS6 fde6:7a:7d20:19ea::1,tun-ipv6,route-gateway 10.29.234.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:19ea::1090/64 fde6:7a:7d20:19ea::1,ifconfig 10.29.234.146 255.255.255.0,peer-id 1,cipher AES-256-GCM'
. 2024.01.23 11:39:20 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2024.01.23 11:39:20 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.29.234.1'
. 2024.01.23 11:39:20 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:19ea::1'
. 2024.01.23 11:39:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2024.01.23 11:39:20 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2024.01.23 11:39:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2024.01.23 11:39:20 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2024.01.23 11:39:20 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2024.01.23 11:39:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2024.01.23 11:39:20 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2024.01.23 11:39:20 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2024.01.23 11:39:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:39:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:39:20 - OpenVPN > interactive service msg_channel=0
. 2024.01.23 11:39:20 - OpenVPN > open_tun
. 2024.01.23 11:39:20 - OpenVPN > All wintun adapters on this system are currently in use or disabled.
. 2024.01.23 11:39:20 - OpenVPN > Exiting due to fatal error
! 2024.01.23 11:39:20 - Disconnecting
. 2024.01.23 11:39:20 - Routes, delete 104.254.90.197/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:39:20 - Routes, delete 104.254.90.197/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", not exists.
. 2024.01.23 11:39:20 - Connection terminated.
I 2024.01.23 11:39:23 - Cancel requested.
! 2024.01.23 11:39:23 - Session terminated.
I 2024.01.23 11:40:59 - Session starting.
I 2024.01.23 11:40:59 - Checking authorization ...
. 2024.01.23 11:41:00 - Using WinTun network interface "Local Area Connection 2 (WireSock Virtual Adapter)"
! 2024.01.23 11:41:00 - Connecting to Groombridge (United States of America, Los Angeles)
. 2024.01.23 11:41:00 - Routes, add 37.120.132.85/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:41:00 - Routes, add 37.120.132.85/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", already exists.
. 2024.01.23 11:41:00 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.01.23 11:41:00 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.01.23 11:41:00 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.01.23 11:41:00 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:41:00 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:41:00 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:41:00 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:41:00 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]37.120.132.85:443
. 2024.01.23 11:41:00 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.01.23 11:41:00 - OpenVPN > UDP link local: (not bound)
. 2024.01.23 11:41:00 - OpenVPN > UDP link remote: [AF_INET]37.120.132.85:443
. 2024.01.23 11:41:00 - OpenVPN > TLS: Initial packet from [AF_INET]37.120.132.85:443, sid=7a21adbf c7476ef3
. 2024.01.23 11:41:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2024.01.23 11:41:00 - OpenVPN > VERIFY KU OK
. 2024.01.23 11:41:00 - OpenVPN > Validating certificate extended key usage
. 2024.01.23 11:41:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2024.01.23 11:41:00 - OpenVPN > VERIFY EKU OK
. 2024.01.23 11:41:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Groombridge, emailAddress=info@airvpn.org
. 2024.01.23 11:41:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2024.01.23 11:41:00 - OpenVPN > [Groombridge] Peer Connection Initiated with [AF_INET]37.120.132.85:443
. 2024.01.23 11:41:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.138.1,dhcp-option DNS6 fde6:7a:7d20:b8a::1,tun-ipv6,route-gateway 10.15.138.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:b8a::1074/64 fde6:7a:7d20:b8a::1,ifconfig 10.15.138.118 255.255.255.0,peer-id 4,cipher AES-256-GCM'
. 2024.01.23 11:41:01 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2024.01.23 11:41:01 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.15.138.1'
. 2024.01.23 11:41:01 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:b8a::1'
. 2024.01.23 11:41:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2024.01.23 11:41:01 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2024.01.23 11:41:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2024.01.23 11:41:01 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2024.01.23 11:41:01 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2024.01.23 11:41:01 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2024.01.23 11:41:01 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2024.01.23 11:41:01 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2024.01.23 11:41:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:41:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:41:01 - OpenVPN > interactive service msg_channel=0
. 2024.01.23 11:41:01 - OpenVPN > open_tun
. 2024.01.23 11:41:01 - OpenVPN > All wintun adapters on this system are currently in use or disabled.
. 2024.01.23 11:41:01 - OpenVPN > Exiting due to fatal error
! 2024.01.23 11:41:01 - Disconnecting
. 2024.01.23 11:41:01 - Routes, delete 37.120.132.85/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:41:01 - Routes, delete 37.120.132.85/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", not exists.
. 2024.01.23 11:41:01 - Connection terminated.
I 2024.01.23 11:41:04 - Checking authorization ...
. 2024.01.23 11:41:05 - Using WinTun network interface "Local Area Connection 2 (WireSock Virtual Adapter)"
! 2024.01.23 11:41:05 - Connecting to Alhena (Canada, Toronto, Ontario)
. 2024.01.23 11:41:05 - Routes, add 162.219.176.5/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:41:05 - Routes, add 162.219.176.5/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", already exists.
. 2024.01.23 11:41:05 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.01.23 11:41:05 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.01.23 11:41:05 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.01.23 11:41:05 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:41:05 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:41:05 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:41:05 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:41:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.5:443
. 2024.01.23 11:41:05 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.01.23 11:41:05 - OpenVPN > UDP link local: (not bound)
. 2024.01.23 11:41:05 - OpenVPN > UDP link remote: [AF_INET]162.219.176.5:443
. 2024.01.23 11:41:05 - OpenVPN > TLS: Initial packet from [AF_INET]162.219.176.5:443, sid=b7b8b19d 1521eaa3
. 2024.01.23 11:41:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2024.01.23 11:41:05 - OpenVPN > VERIFY KU OK
. 2024.01.23 11:41:05 - OpenVPN > Validating certificate extended key usage
. 2024.01.23 11:41:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2024.01.23 11:41:05 - OpenVPN > VERIFY EKU OK
. 2024.01.23 11:41:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alhena, emailAddress=info@airvpn.org
. 2024.01.23 11:41:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2024.01.23 11:41:05 - OpenVPN > [Alhena] Peer Connection Initiated with [AF_INET]162.219.176.5:443
. 2024.01.23 11:41:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.106.1,dhcp-option DNS6 fde6:7a:7d20:26a::1,tun-ipv6,route-gateway 10.6.106.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:26a::1086/64 fde6:7a:7d20:26a::1,ifconfig 10.6.106.136 255.255.255.0,peer-id 4,cipher AES-256-GCM'
. 2024.01.23 11:41:06 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2024.01.23 11:41:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.6.106.1'
. 2024.01.23 11:41:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:26a::1'
. 2024.01.23 11:41:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2024.01.23 11:41:06 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2024.01.23 11:41:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2024.01.23 11:41:06 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2024.01.23 11:41:06 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2024.01.23 11:41:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2024.01.23 11:41:06 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2024.01.23 11:41:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2024.01.23 11:41:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:41:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:41:06 - OpenVPN > interactive service msg_channel=0
. 2024.01.23 11:41:06 - OpenVPN > open_tun
. 2024.01.23 11:41:06 - OpenVPN > All wintun adapters on this system are currently in use or disabled.
. 2024.01.23 11:41:06 - OpenVPN > Exiting due to fatal error
! 2024.01.23 11:41:06 - Disconnecting
. 2024.01.23 11:41:06 - Routes, delete 162.219.176.5/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:41:06 - Routes, delete 162.219.176.5/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", not exists.
. 2024.01.23 11:41:06 - Connection terminated.
I 2024.01.23 11:41:09 - Checking authorization ...
I 2024.01.23 11:41:10 - Cancel requested.
! 2024.01.23 11:41:10 - Session terminated.
I 2024.01.23 11:46:11 - Session starting.
I 2024.01.23 11:46:12 - Checking authorization ...
. 2024.01.23 11:46:13 - Using WinTun network interface "Local Area Connection 2 (WireSock Virtual Adapter)"
! 2024.01.23 11:46:13 - Connecting to Denebola (United Kingdom of Great Britain and Northern Ireland, London)
. 2024.01.23 11:46:13 - Routes, add 146.70.61.141/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:46:13 - Routes, add 146.70.61.141/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", already exists.
. 2024.01.23 11:46:13 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.01.23 11:46:13 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.01.23 11:46:13 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.01.23 11:46:13 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:46:13 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:46:13 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:46:13 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:46:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]146.70.61.141:443
. 2024.01.23 11:46:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.01.23 11:46:13 - OpenVPN > UDP link local: (not bound)
. 2024.01.23 11:46:13 - OpenVPN > UDP link remote: [AF_INET]146.70.61.141:443
. 2024.01.23 11:46:13 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.61.141:443, sid=617823f6 1aab03bb
. 2024.01.23 11:46:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2024.01.23 11:46:13 - OpenVPN > VERIFY KU OK
. 2024.01.23 11:46:13 - OpenVPN > Validating certificate extended key usage
. 2024.01.23 11:46:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2024.01.23 11:46:13 - OpenVPN > VERIFY EKU OK
. 2024.01.23 11:46:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Denebola, emailAddress=info@airvpn.org
. 2024.01.23 11:46:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2024.01.23 11:46:13 - OpenVPN > [Denebola] Peer Connection Initiated with [AF_INET]146.70.61.141:443
. 2024.01.23 11:46:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.106.1,dhcp-option DNS6 fde6:7a:7d20:b6a::1,tun-ipv6,route-gateway 10.15.106.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:b6a::10ed/64 fde6:7a:7d20:b6a::1,ifconfig 10.15.106.239 255.255.255.0,peer-id 2,cipher AES-256-GCM'
. 2024.01.23 11:46:14 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2024.01.23 11:46:14 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.15.106.1'
. 2024.01.23 11:46:14 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:b6a::1'
. 2024.01.23 11:46:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2024.01.23 11:46:14 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2024.01.23 11:46:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2024.01.23 11:46:14 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2024.01.23 11:46:14 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2024.01.23 11:46:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2024.01.23 11:46:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2024.01.23 11:46:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2024.01.23 11:46:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:46:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:46:14 - OpenVPN > interactive service msg_channel=0
. 2024.01.23 11:46:14 - OpenVPN > open_tun
. 2024.01.23 11:46:14 - OpenVPN > All wintun adapters on this system are currently in use or disabled.
. 2024.01.23 11:46:14 - OpenVPN > Exiting due to fatal error
! 2024.01.23 11:46:14 - Disconnecting
. 2024.01.23 11:46:14 - Routes, delete 146.70.61.141/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:46:14 - Routes, delete 146.70.61.141/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", not exists.
. 2024.01.23 11:46:14 - Connection terminated.
I 2024.01.23 11:46:17 - Checking authorization ...
. 2024.01.23 11:46:18 - Using WinTun network interface "Local Area Connection 2 (WireSock Virtual Adapter)"
! 2024.01.23 11:46:18 - Connecting to Rotanev (Canada, Toronto, Ontario)
. 2024.01.23 11:46:18 - Routes, add 104.254.90.189/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:46:18 - Routes, add 104.254.90.189/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", already exists.
. 2024.01.23 11:46:18 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.01.23 11:46:18 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.01.23 11:46:18 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.01.23 11:46:18 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:46:18 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:46:18 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:46:18 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:46:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.189:443
. 2024.01.23 11:46:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.01.23 11:46:18 - OpenVPN > UDP link local: (not bound)
. 2024.01.23 11:46:18 - OpenVPN > UDP link remote: [AF_INET]104.254.90.189:443
. 2024.01.23 11:46:18 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.189:443, sid=3969a72e fd3693ae
. 2024.01.23 11:46:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2024.01.23 11:46:18 - OpenVPN > VERIFY KU OK
. 2024.01.23 11:46:18 - OpenVPN > Validating certificate extended key usage
. 2024.01.23 11:46:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2024.01.23 11:46:18 - OpenVPN > VERIFY EKU OK
. 2024.01.23 11:46:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Rotanev, emailAddress=info@airvpn.org
. 2024.01.23 11:46:18 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2024.01.23 11:46:18 - OpenVPN > [Rotanev] Peer Connection Initiated with [AF_INET]104.254.90.189:443
. 2024.01.23 11:46:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.74.1,dhcp-option DNS6 fde6:7a:7d20:184a::1,tun-ipv6,route-gateway 10.28.74.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:184a::105c/64 fde6:7a:7d20:184a::1,ifconfig 10.28.74.94 255.255.255.0,peer-id 3,cipher AES-256-GCM'
. 2024.01.23 11:46:19 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2024.01.23 11:46:19 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.74.1'
. 2024.01.23 11:46:19 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:184a::1'
. 2024.01.23 11:46:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2024.01.23 11:46:19 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2024.01.23 11:46:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2024.01.23 11:46:19 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2024.01.23 11:46:19 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2024.01.23 11:46:19 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2024.01.23 11:46:19 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2024.01.23 11:46:19 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2024.01.23 11:46:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:46:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:46:19 - OpenVPN > interactive service msg_channel=0
. 2024.01.23 11:46:19 - OpenVPN > open_tun
. 2024.01.23 11:46:19 - OpenVPN > All wintun adapters on this system are currently in use or disabled.
. 2024.01.23 11:46:19 - OpenVPN > Exiting due to fatal error
! 2024.01.23 11:46:19 - Disconnecting
. 2024.01.23 11:46:19 - Routes, delete 104.254.90.189/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:46:19 - Routes, delete 104.254.90.189/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", not exists.
. 2024.01.23 11:46:19 - Connection terminated.
I 2024.01.23 11:46:22 - Checking authorization ...
. 2024.01.23 11:46:23 - Using WinTun network interface "Local Area Connection 2 (WireSock Virtual Adapter)"
! 2024.01.23 11:46:23 - Connecting to Mintaka (Canada, Toronto, Ontario)
. 2024.01.23 11:46:23 - Routes, add 184.75.223.221/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:46:23 - Routes, add 184.75.223.221/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", already exists.
. 2024.01.23 11:46:23 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2024.01.23 11:46:23 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2024.01.23 11:46:23 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2024.01.23 11:46:23 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:46:23 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:46:23 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2024.01.23 11:46:23 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2024.01.23 11:46:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.221:443
. 2024.01.23 11:46:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2024.01.23 11:46:23 - OpenVPN > UDP link local: (not bound)
. 2024.01.23 11:46:23 - OpenVPN > UDP link remote: [AF_INET]184.75.223.221:443
. 2024.01.23 11:46:23 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.221:443, sid=4aa8f809 f2580343
. 2024.01.23 11:46:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2024.01.23 11:46:23 - OpenVPN > VERIFY KU OK
. 2024.01.23 11:46:23 - OpenVPN > Validating certificate extended key usage
. 2024.01.23 11:46:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2024.01.23 11:46:23 - OpenVPN > VERIFY EKU OK
. 2024.01.23 11:46:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2024.01.23 11:46:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2024.01.23 11:46:23 - OpenVPN > [Mintaka] Peer Connection Initiated with [AF_INET]184.75.223.221:443
. 2024.01.23 11:46:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.10.1,dhcp-option DNS6 fde6:7a:7d20:140a::1,tun-ipv6,route-gateway 10.24.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:140a::10f0/64 fde6:7a:7d20:140a::1,ifconfig 10.24.10.242 255.255.255.0,peer-id 2,cipher AES-256-GCM'
. 2024.01.23 11:46:24 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2024.01.23 11:46:24 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.24.10.1'
. 2024.01.23 11:46:24 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:140a::1'
. 2024.01.23 11:46:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2024.01.23 11:46:24 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2024.01.23 11:46:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2024.01.23 11:46:24 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2024.01.23 11:46:24 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2024.01.23 11:46:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2024.01.23 11:46:24 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2024.01.23 11:46:24 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2024.01.23 11:46:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:46:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2024.01.23 11:46:24 - OpenVPN > interactive service msg_channel=0
. 2024.01.23 11:46:24 - OpenVPN > open_tun
. 2024.01.23 11:46:24 - OpenVPN > All wintun adapters on this system are currently in use or disabled.
. 2024.01.23 11:46:24 - OpenVPN > Exiting due to fatal error
! 2024.01.23 11:46:24 - Disconnecting
. 2024.01.23 11:46:24 - Routes, delete 184.75.223.221/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)".
. 2024.01.23 11:46:24 - Routes, delete 184.75.223.221/32 for interface "Ethernet (Intel(R) Ethernet Controller (3) I225-V)", not exists.
. 2024.01.23 11:46:24 - Connection terminated.
I 2024.01.23 11:46:25 - Cancel requested.
! 2024.01.23 11:46:25 - Session terminated.

Share this post


Link to post
Guest
This topic is now closed to further replies.

×
×
  • Create New...