Feelingesoteric 0 Posted ... Hello Airvpn team! Im not sure what im doing wrong but every time i try connecting to any server I am hit with an error saying: Checking route IPv6 failed, last reason: Fetch url error:Timeout was reached I've never used a vpn on pc before so i'm sorry for anything i may be doing wrong and, here are the logs, any help would be greatly appreciated! Eddie System/Environment Report - 12/11/2024 - 9:16 AM UTC Eddie version: 2.21.8 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Pro OS version: Microsoft Windows NT 10.0.26100.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Users\josep\OneDrive\Desktop\AirVPN\openvpn.exe) Hummingbird: Not available WireGuard: 0.5.2 SSH: plink 0.73 (C:\Users\josep\OneDrive\Desktop\AirVPN\plink.exe) SSL: stunnel 5.56 (C:\Users\josep\OneDrive\Desktop\AirVPN\stunnel.exe) Profile path: C:\Users\josep\OneDrive\Desktop\AirVPN\default.profile Data path: C:\Users\josep\OneDrive\Desktop\AirVPN Application path: C:\Users\josep\OneDrive\Desktop\AirVPN Executable path: C:\Users\josep\OneDrive\Desktop\AirVPN\Eddie-UI.exe Command line arguments: (0 args) Network Lock Active: No Connected to VPN: No OS support IPv4: Yes OS support IPv6: Yes Detected DNS: 71.10.216.1, 71.10.216.2 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 206 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: Fetch url error:Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True areas.allowlist: ch,de,ca,se,jp,us,ro,gb,nl,at,rs,ee,sg,bg,no,be,cz,es,nz,lv,br,ie,tw mode.type: openvpn mode.protocol: TCP mode.alt: 2 proxy.mode: none ---------------------------- Logs: . 2024.12.11 00:47:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 34 static 10.35.98.81 255.255.255.0 . 2024.12.11 00:47:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 34 all . 2024.12.11 00:47:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 34 all . 2024.12.11 00:47:48 - OpenVPN > IPv4 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 00:47:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 34 fde6:7a:7d20:1f62::104f/128 store=active . 2024.12.11 00:47:48 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1f62::/64 -> fde6:7a:7d20:1f62::104f metric 0) dev Eddie . 2024.12.11 00:47:48 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1f62::/64 34 fe80::8 store=active . 2024.12.11 00:47:48 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.12.11 00:47:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 34 all . 2024.12.11 00:47:48 - OpenVPN > IPv6 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 00:47:48 - OpenVPN > Initialization Sequence Completed . 2024.12.11 00:47:48 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.12.11 00:47:48 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.12.11 00:47:48 - DNS leak protection with packet filtering enabled. . 2024.12.11 00:47:48 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.35.98.1) . 2024.12.11 00:47:48 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1f62::1) . 2024.12.11 00:47:49 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:47:49 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:47:49 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:47:49 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:47:49 - Routes, add 192.30.89.75/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:47:49 - Routes, add 2606:9580:100:f:5792:2dec:a4b6:2419/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:47:49 - Flushing DNS I 2024.12.11 00:47:49 - Checking route IPv4 . 2024.12.11 00:48:16 - Checking route (4° try) . 2024.12.11 00:48:41 - Checking route (5° try) E 2024.12.11 00:49:02 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2024.12.11 00:49:02 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.12.11 00:49:02 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.12.11 00:49:02 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.12.11 00:49:02 - Above log line repeated 23 times more ! 2024.12.11 00:49:02 - Disconnecting . 2024.12.11 00:49:02 - Sending soft termination signal . 2024.12.11 00:49:06 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.12.11 00:49:07 - OpenVPN > Closing TUN/TAP interface . 2024.12.11 00:49:07 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1f62::/64) . 2024.12.11 00:49:07 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1f62::/64 34 fe80::8 store=active . 2024.12.11 00:49:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 34 fde6:7a:7d20:1f62::104f store=active . 2024.12.11 00:49:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 34 10.35.98.81 store=active . 2024.12.11 00:49:07 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.12.11 00:49:07 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:49:07 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:49:07 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:49:07 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:49:08 - Routes, delete 192.30.89.77/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 00:49:08 - Routes, delete 192.30.89.75/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:49:08 - Routes, delete 2606:9580:100:f:5792:2dec:a4b6:2419/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:49:08 - Routes, delete 192.30.89.77/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2024.12.11 00:49:08 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 00:49:08 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 00:49:08 - DNS leak protection with packet filtering disabled. . 2024.12.11 00:49:08 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.12.11 00:49:08 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.12.11 00:49:08 - Connection terminated. I 2024.12.11 00:49:11 - Checking authorization ... . 2024.12.11 00:49:12 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.12.11 00:49:12 - Connecting to Ginan (Canada, Vancouver) . 2024.12.11 00:49:12 - Routes, add 104.193.135.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 00:49:12 - Routes, add 104.193.135.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2024.12.11 00:49:12 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.12.11 00:49:12 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.12.11 00:49:12 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.12.11 00:49:12 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 00:49:12 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 00:49:12 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 00:49:12 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 00:49:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.193.135.245:443 . 2024.12.11 00:49:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.12.11 00:49:12 - OpenVPN > UDP link local: (not bound) . 2024.12.11 00:49:12 - OpenVPN > UDP link remote: [AF_INET]104.193.135.245:443 . 2024.12.11 00:49:12 - OpenVPN > TLS: Initial packet from [AF_INET]104.193.135.245:443, sid=14a63af7 cb45c85f . 2024.12.11 00:49:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.12.11 00:49:12 - OpenVPN > VERIFY KU OK . 2024.12.11 00:49:12 - OpenVPN > Validating certificate extended key usage . 2024.12.11 00:49:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.12.11 00:49:12 - OpenVPN > VERIFY EKU OK . 2024.12.11 00:49:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ginan, emailAddress=info@airvpn.org . 2024.12.11 00:49:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.12.11 00:49:12 - OpenVPN > [Ginan] Peer Connection Initiated with [AF_INET]104.193.135.245:443 . 2024.12.11 00:49:14 - OpenVPN > SENT CONTROL [Ginan]: 'PUSH_REQUEST' (status=1) ! 2024.12.11 00:49:15 - Disconnecting . 2024.12.11 00:49:15 - Sending soft termination signal . 2024.12.11 00:49:18 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.12.11 00:49:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.50.1,dhcp-option DNS6 fde6:7a:7d20:1532::1,tun-ipv6,route-gateway 10.25.50.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1532::1079/64 fde6:7a:7d20:1532::1,ifconfig 10.25.50.123 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2024.12.11 00:49:18 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.12.11 00:49:18 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.25.50.1' . 2024.12.11 00:49:18 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1532::1' . 2024.12.11 00:49:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.12.11 00:49:18 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.12.11 00:49:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.12.11 00:49:18 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.12.11 00:49:18 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.12.11 00:49:18 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.12.11 00:49:18 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.12.11 00:49:18 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.12.11 00:49:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.11 00:49:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.11 00:49:18 - OpenVPN > interactive service msg_channel=0 . 2024.12.11 00:49:18 - OpenVPN > open_tun . 2024.12.11 00:49:18 - OpenVPN > wintun device [Eddie] opened . 2024.12.11 00:49:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 34 static 10.25.50.123 255.255.255.0 . 2024.12.11 00:49:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 34 all . 2024.12.11 00:49:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 34 all . 2024.12.11 00:49:18 - OpenVPN > IPv4 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 00:49:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 34 fde6:7a:7d20:1532::1079/128 store=active . 2024.12.11 00:49:18 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1532::/64 -> fde6:7a:7d20:1532::1079 metric 0) dev Eddie . 2024.12.11 00:49:18 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1532::/64 34 fe80::8 store=active . 2024.12.11 00:49:18 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.12.11 00:49:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 34 all . 2024.12.11 00:49:18 - OpenVPN > IPv6 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 00:49:18 - OpenVPN > Initialization Sequence Completed . 2024.12.11 00:49:18 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.12.11 00:49:18 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.12.11 00:49:18 - DNS leak protection with packet filtering enabled. . 2024.12.11 00:49:18 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.25.50.1) . 2024.12.11 00:49:18 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1532::1) . 2024.12.11 00:49:19 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:49:19 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:49:19 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:49:19 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:49:19 - Routes, add 104.193.135.243/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:49:19 - Routes, add 2606:9580:103:13:228d:c3e1:cc6e:bda3/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:49:19 - Flushing DNS . 2024.12.11 00:49:19 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.12.11 00:49:19 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.12.11 00:49:19 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.12.11 00:49:20 - Above log line repeated 8 times more . 2024.12.11 00:49:20 - OpenVPN > Closing TUN/TAP interface . 2024.12.11 00:49:20 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1532::/64) . 2024.12.11 00:49:20 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1532::/64 34 fe80::8 store=active . 2024.12.11 00:49:20 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 34 fde6:7a:7d20:1532::1079 store=active . 2024.12.11 00:49:20 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 34 10.25.50.123 store=active . 2024.12.11 00:49:20 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.12.11 00:49:20 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:49:20 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:49:20 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:49:20 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:49:21 - Routes, delete 104.193.135.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 00:49:21 - Routes, delete 104.193.135.243/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:49:21 - Routes, delete 2606:9580:103:13:228d:c3e1:cc6e:bda3/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:49:21 - Routes, delete 104.193.135.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2024.12.11 00:49:21 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 00:49:21 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 00:49:21 - DNS leak protection with packet filtering disabled. . 2024.12.11 00:49:21 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.12.11 00:49:21 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.12.11 00:49:21 - Connection terminated. I 2024.12.11 00:49:21 - Cancel requested. ! 2024.12.11 00:49:21 - Session terminated. I 2024.12.11 00:55:39 - Session starting. I 2024.12.11 00:55:40 - Checking authorization ... . 2024.12.11 00:55:41 - Added new network interface "Eddie", Wintun version 0.12 . 2024.12.11 00:55:41 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.12.11 00:55:41 - Connecting to Ginan (Canada, Vancouver) . 2024.12.11 00:55:41 - Routes, add 104.193.135.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 00:55:41 - Routes, add 104.193.135.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2024.12.11 00:55:41 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.12.11 00:55:41 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.12.11 00:55:41 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.12.11 00:55:41 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 00:55:41 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 00:55:41 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 00:55:41 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 00:55:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.193.135.245:443 . 2024.12.11 00:55:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.12.11 00:55:41 - OpenVPN > UDP link local: (not bound) . 2024.12.11 00:55:41 - OpenVPN > UDP link remote: [AF_INET]104.193.135.245:443 . 2024.12.11 00:55:41 - OpenVPN > TLS: Initial packet from [AF_INET]104.193.135.245:443, sid=61c56fa4 70787b76 . 2024.12.11 00:55:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.12.11 00:55:41 - OpenVPN > VERIFY KU OK . 2024.12.11 00:55:41 - OpenVPN > Validating certificate extended key usage . 2024.12.11 00:55:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.12.11 00:55:41 - OpenVPN > VERIFY EKU OK . 2024.12.11 00:55:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ginan, emailAddress=info@airvpn.org . 2024.12.11 00:55:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.12.11 00:55:41 - OpenVPN > [Ginan] Peer Connection Initiated with [AF_INET]104.193.135.245:443 . 2024.12.11 00:55:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.50.1,dhcp-option DNS6 fde6:7a:7d20:1532::1,tun-ipv6,route-gateway 10.25.50.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1532::1079/64 fde6:7a:7d20:1532::1,ifconfig 10.25.50.123 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2024.12.11 00:55:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.12.11 00:55:42 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.25.50.1' . 2024.12.11 00:55:42 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1532::1' . 2024.12.11 00:55:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.12.11 00:55:42 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.12.11 00:55:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.12.11 00:55:42 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.12.11 00:55:42 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.12.11 00:55:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.12.11 00:55:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.12.11 00:55:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.12.11 00:55:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.11 00:55:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.11 00:55:42 - OpenVPN > interactive service msg_channel=0 . 2024.12.11 00:55:42 - OpenVPN > open_tun . 2024.12.11 00:55:42 - OpenVPN > wintun device [Eddie] opened . 2024.12.11 00:55:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 34 static 10.25.50.123 255.255.255.0 . 2024.12.11 00:55:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 34 all . 2024.12.11 00:55:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 34 all . 2024.12.11 00:55:42 - OpenVPN > IPv4 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 00:55:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 34 fde6:7a:7d20:1532::1079/128 store=active . 2024.12.11 00:55:42 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1532::/64 -> fde6:7a:7d20:1532::1079 metric 0) dev Eddie . 2024.12.11 00:55:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1532::/64 34 fe80::8 store=active . 2024.12.11 00:55:42 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.12.11 00:55:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 34 all . 2024.12.11 00:55:42 - OpenVPN > IPv6 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 00:55:42 - OpenVPN > Initialization Sequence Completed . 2024.12.11 00:55:42 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.12.11 00:55:42 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.12.11 00:55:42 - DNS leak protection with packet filtering enabled. . 2024.12.11 00:55:42 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.25.50.1) . 2024.12.11 00:55:42 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1532::1) . 2024.12.11 00:55:42 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.25.50.1) . 2024.12.11 00:55:42 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1532::1) . 2024.12.11 00:55:42 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:55:43 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:55:43 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:55:43 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:55:43 - Routes, add 104.193.135.243/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:55:43 - Routes, add 2606:9580:103:13:228d:c3e1:cc6e:bda3/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:55:43 - Flushing DNS I 2024.12.11 00:55:43 - Checking route IPv4 I 2024.12.11 00:55:46 - Checking route IPv6 . 2024.12.11 00:56:56 - Checking route (4° try) . 2024.12.11 00:57:21 - Checking route (5° try) E 2024.12.11 00:57:42 - Checking route IPv6 failed, last reason: Fetch url error:Timeout was reached . 2024.12.11 00:57:42 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #470 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2024.12.11 00:57:42 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #601 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2024.12.11 00:57:42 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1686 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2024.12.11 00:57:42 - Above log line repeated 4 times more ! 2024.12.11 00:57:42 - Disconnecting . 2024.12.11 00:57:42 - Sending soft termination signal . 2024.12.11 00:57:45 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.12.11 00:57:46 - OpenVPN > Closing TUN/TAP interface . 2024.12.11 00:57:46 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1532::/64) . 2024.12.11 00:57:46 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1532::/64 34 fe80::8 store=active . 2024.12.11 00:57:46 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 34 fde6:7a:7d20:1532::1079 store=active . 2024.12.11 00:57:46 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 34 10.25.50.123 store=active . 2024.12.11 00:57:46 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.12.11 00:57:46 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:57:47 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:57:47 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:57:47 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:57:47 - Routes, delete 104.193.135.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 00:57:47 - Routes, delete 104.193.135.243/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:57:47 - Routes, delete 2606:9580:103:13:228d:c3e1:cc6e:bda3/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:57:47 - Routes, delete 104.193.135.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2024.12.11 00:57:47 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 00:57:47 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 00:57:47 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.12.11 00:57:47 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.12.11 00:57:47 - DNS leak protection with packet filtering disabled. . 2024.12.11 00:57:48 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.12.11 00:57:48 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.12.11 00:57:48 - Connection terminated. I 2024.12.11 00:57:51 - Checking authorization ... . 2024.12.11 00:57:51 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.12.11 00:57:51 - Connecting to Pisces (Canada, Vancouver) . 2024.12.11 00:57:51 - Routes, add 192.30.89.29/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 00:57:51 - Routes, add 192.30.89.29/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2024.12.11 00:57:52 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.12.11 00:57:52 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.12.11 00:57:52 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.12.11 00:57:52 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 00:57:52 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 00:57:52 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 00:57:52 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 00:57:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.29:443 . 2024.12.11 00:57:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.12.11 00:57:52 - OpenVPN > UDP link local: (not bound) . 2024.12.11 00:57:52 - OpenVPN > UDP link remote: [AF_INET]192.30.89.29:443 . 2024.12.11 00:57:52 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.29:443, sid=67f0d343 2de56275 . 2024.12.11 00:57:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.12.11 00:57:52 - OpenVPN > VERIFY KU OK . 2024.12.11 00:57:52 - OpenVPN > Validating certificate extended key usage . 2024.12.11 00:57:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.12.11 00:57:52 - OpenVPN > VERIFY EKU OK . 2024.12.11 00:57:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org . 2024.12.11 00:57:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.12.11 00:57:52 - OpenVPN > [Pisces] Peer Connection Initiated with [AF_INET]192.30.89.29:443 . 2024.12.11 00:57:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.226.1,dhcp-option DNS6 fde6:7a:7d20:be2::1,tun-ipv6,route-gateway 10.15.226.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:be2::10cc/64 fde6:7a:7d20:be2::1,ifconfig 10.15.226.206 255.255.255.0,peer-id 8,cipher AES-256-GCM' . 2024.12.11 00:57:52 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.12.11 00:57:52 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.15.226.1' . 2024.12.11 00:57:52 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:be2::1' . 2024.12.11 00:57:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.12.11 00:57:52 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.12.11 00:57:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.12.11 00:57:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.12.11 00:57:52 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.12.11 00:57:52 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.12.11 00:57:52 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.12.11 00:57:52 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.12.11 00:57:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.11 00:57:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.11 00:57:52 - OpenVPN > interactive service msg_channel=0 . 2024.12.11 00:57:52 - OpenVPN > open_tun . 2024.12.11 00:57:52 - OpenVPN > wintun device [Eddie] opened . 2024.12.11 00:57:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 34 static 10.15.226.206 255.255.255.0 . 2024.12.11 00:57:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 34 all . 2024.12.11 00:57:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 34 all . 2024.12.11 00:57:53 - OpenVPN > IPv4 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 00:57:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 34 fde6:7a:7d20:be2::10cc/128 store=active . 2024.12.11 00:57:53 - OpenVPN > add_route_ipv6(fde6:7a:7d20:be2::/64 -> fde6:7a:7d20:be2::10cc metric 0) dev Eddie . 2024.12.11 00:57:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:be2::/64 34 fe80::8 store=active . 2024.12.11 00:57:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.12.11 00:57:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 34 all . 2024.12.11 00:57:53 - OpenVPN > IPv6 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 00:57:53 - OpenVPN > Initialization Sequence Completed . 2024.12.11 00:57:53 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.12.11 00:57:53 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.12.11 00:57:53 - DNS leak protection with packet filtering enabled. . 2024.12.11 00:57:53 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.15.226.1) . 2024.12.11 00:57:53 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:be2::1) . 2024.12.11 00:57:53 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.15.226.1) . 2024.12.11 00:57:53 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:be2::1) . 2024.12.11 00:57:53 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:57:53 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:57:53 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:57:54 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:57:54 - Routes, add 192.30.89.27/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:57:54 - Routes, add 2606:9580:103:a:fda7:1f4c:8c40:8c3e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:57:54 - Flushing DNS I 2024.12.11 00:57:54 - Checking route IPv4 I 2024.12.11 00:57:57 - Checking route IPv6 ! 2024.12.11 00:58:18 - Disconnecting . 2024.12.11 00:58:18 - Sending soft termination signal . 2024.12.11 00:58:21 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.12.11 00:58:23 - OpenVPN > Closing TUN/TAP interface . 2024.12.11 00:58:23 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:be2::/64) . 2024.12.11 00:58:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:be2::/64 34 fe80::8 store=active . 2024.12.11 00:58:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 34 fde6:7a:7d20:be2::10cc store=active . 2024.12.11 00:58:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 34 10.15.226.206 store=active . 2024.12.11 00:58:23 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.12.11 00:58:23 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:58:23 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:58:23 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:58:23 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:58:24 - Routes, delete 192.30.89.29/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 00:58:24 - Routes, delete 192.30.89.27/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:58:24 - Routes, delete 2606:9580:103:a:fda7:1f4c:8c40:8c3e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 00:58:24 - Routes, delete 192.30.89.29/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2024.12.11 00:58:24 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 00:58:24 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 00:58:24 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.12.11 00:58:24 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.12.11 00:58:24 - DNS leak protection with packet filtering disabled. . 2024.12.11 00:58:24 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.12.11 00:58:24 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.12.11 00:58:24 - Connection terminated. I 2024.12.11 00:58:24 - Cancel requested. ! 2024.12.11 00:58:24 - Session terminated. I 2024.12.11 01:04:52 - Session starting. I 2024.12.11 01:04:52 - Checking authorization ... . 2024.12.11 01:04:53 - Added new network interface "Eddie", Wintun version 0.12 . 2024.12.11 01:04:53 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.12.11 01:04:53 - Connecting to Rotanev (Canada, Toronto, Ontario) . 2024.12.11 01:04:53 - Routes, add 104.254.90.189/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 01:04:53 - Routes, add 104.254.90.189/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2024.12.11 01:04:53 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.12.11 01:04:53 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.12.11 01:04:53 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.12.11 01:04:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 01:04:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 01:04:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 01:04:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 01:04:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.189:443 . 2024.12.11 01:04:53 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.12.11 01:04:53 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.254.90.189:443 [nonblock] . 2024.12.11 01:04:54 - OpenVPN > TCP connection established with [AF_INET]104.254.90.189:443 . 2024.12.11 01:04:54 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.12.11 01:04:54 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.254.90.189:443 . 2024.12.11 01:04:54 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.189:443, sid=310a3153 0444cc13 . 2024.12.11 01:04:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.12.11 01:04:54 - OpenVPN > VERIFY KU OK . 2024.12.11 01:04:54 - OpenVPN > Validating certificate extended key usage . 2024.12.11 01:04:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.12.11 01:04:54 - OpenVPN > VERIFY EKU OK . 2024.12.11 01:04:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Rotanev, emailAddress=info@airvpn.org . 2024.12.11 01:04:54 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.12.11 01:04:54 - OpenVPN > [Rotanev] Peer Connection Initiated with [AF_INET]104.254.90.189:443 . 2024.12.11 01:04:55 - OpenVPN > SENT CONTROL [Rotanev]: 'PUSH_REQUEST' (status=1) . 2024.12.11 01:04:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.83.1,dhcp-option DNS6 fde6:7a:7d20:1853::1,tun-ipv6,route-gateway 10.28.83.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1853::103d/64 fde6:7a:7d20:1853::1,ifconfig 10.28.83.63 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.12.11 01:04:55 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.12.11 01:04:55 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.83.1' . 2024.12.11 01:04:55 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1853::1' . 2024.12.11 01:04:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.12.11 01:04:55 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.12.11 01:04:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.12.11 01:04:55 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.12.11 01:04:55 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.12.11 01:04:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2024.12.11 01:04:55 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.12.11 01:04:55 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.12.11 01:04:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.11 01:04:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.11 01:04:55 - OpenVPN > interactive service msg_channel=0 . 2024.12.11 01:04:55 - OpenVPN > open_tun . 2024.12.11 01:04:55 - OpenVPN > wintun device [Eddie] opened . 2024.12.11 01:04:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 34 static 10.28.83.63 255.255.255.0 . 2024.12.11 01:04:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 34 all . 2024.12.11 01:04:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 34 all . 2024.12.11 01:04:55 - OpenVPN > IPv4 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 01:04:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 34 fde6:7a:7d20:1853::103d/128 store=active . 2024.12.11 01:04:55 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1853::/64 -> fde6:7a:7d20:1853::103d metric 0) dev Eddie . 2024.12.11 01:04:55 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1853::/64 34 fe80::8 store=active . 2024.12.11 01:04:55 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.12.11 01:04:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 34 all . 2024.12.11 01:04:55 - OpenVPN > IPv6 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 01:04:55 - OpenVPN > Initialization Sequence Completed . 2024.12.11 01:04:55 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.12.11 01:04:55 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.12.11 01:04:55 - DNS leak protection with packet filtering enabled. . 2024.12.11 01:04:55 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.28.83.1) . 2024.12.11 01:04:55 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1853::1) . 2024.12.11 01:04:55 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.28.83.1) . 2024.12.11 01:04:56 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1853::1) . 2024.12.11 01:04:56 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:04:56 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:04:56 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:04:56 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:04:56 - Routes, add 104.254.90.187/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:04:56 - Routes, add 2606:6080:1001:43:ef3d:a50d:3b83:741e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:04:56 - Flushing DNS I 2024.12.11 01:04:56 - Checking route IPv4 I 2024.12.11 01:05:01 - Checking route IPv6 . 2024.12.11 01:05:27 - Collect information about AirVPN completed . 2024.12.11 01:06:10 - Checking route (4° try) . 2024.12.11 01:06:35 - Checking route (5° try) E 2024.12.11 01:06:56 - Checking route IPv6 failed, last reason: Fetch url error:Timeout was reached ! 2024.12.11 01:06:56 - Disconnecting . 2024.12.11 01:06:56 - Sending soft termination signal . 2024.12.11 01:06:59 - OpenVPN > Closing TUN/TAP interface . 2024.12.11 01:06:59 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1853::/64) . 2024.12.11 01:06:59 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1853::/64 34 fe80::8 store=active . 2024.12.11 01:06:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 34 fde6:7a:7d20:1853::103d store=active . 2024.12.11 01:06:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 34 10.28.83.63 store=active . 2024.12.11 01:06:59 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.12.11 01:06:59 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:06:59 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:06:59 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:06:59 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:07:00 - Routes, delete 104.254.90.189/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 01:07:00 - Routes, delete 104.254.90.187/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:07:00 - Routes, delete 2606:6080:1001:43:ef3d:a50d:3b83:741e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:07:00 - Routes, delete 104.254.90.189/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2024.12.11 01:07:00 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 01:07:00 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 01:07:00 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.12.11 01:07:00 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.12.11 01:07:00 - DNS leak protection with packet filtering disabled. . 2024.12.11 01:07:00 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.12.11 01:07:00 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.12.11 01:07:00 - Connection terminated. I 2024.12.11 01:07:02 - Cancel requested. ! 2024.12.11 01:07:02 - Session terminated. I 2024.12.11 01:07:19 - Session starting. I 2024.12.11 01:07:19 - Checking authorization ... . 2024.12.11 01:07:20 - Added new network interface "Eddie", Wintun version 0.12 . 2024.12.11 01:07:20 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.12.11 01:07:20 - Connecting to Sheratan (United States of America, Phoenix, Arizona) . 2024.12.11 01:07:21 - Routes, add 198.44.133.78/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 01:07:21 - Routes, add 198.44.133.78/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2024.12.11 01:07:21 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.12.11 01:07:21 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.12.11 01:07:21 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.12.11 01:07:21 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 01:07:21 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 01:07:21 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 01:07:21 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 01:07:21 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.133.78:443 . 2024.12.11 01:07:21 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.12.11 01:07:21 - OpenVPN > Attempting to establish TCP connection with [AF_INET]198.44.133.78:443 [nonblock] . 2024.12.11 01:07:21 - OpenVPN > TCP connection established with [AF_INET]198.44.133.78:443 . 2024.12.11 01:07:21 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.12.11 01:07:21 - OpenVPN > TCP_CLIENT link remote: [AF_INET]198.44.133.78:443 . 2024.12.11 01:07:21 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.133.78:443, sid=e9af8a7f e9f89c60 . 2024.12.11 01:07:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.12.11 01:07:21 - OpenVPN > VERIFY KU OK . 2024.12.11 01:07:21 - OpenVPN > Validating certificate extended key usage . 2024.12.11 01:07:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.12.11 01:07:21 - OpenVPN > VERIFY EKU OK . 2024.12.11 01:07:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sheratan, emailAddress=info@airvpn.org . 2024.12.11 01:07:21 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.12.11 01:07:21 - OpenVPN > [Sheratan] Peer Connection Initiated with [AF_INET]198.44.133.78:443 . 2024.12.11 01:07:22 - OpenVPN > SENT CONTROL [Sheratan]: 'PUSH_REQUEST' (status=1) . 2024.12.11 01:07:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.70.19.1,dhcp-option DNS6 fde6:7a:7d20:4213::1,tun-ipv6,route-gateway 10.70.19.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:4213::100d/64 fde6:7a:7d20:4213::1,ifconfig 10.70.19.15 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.12.11 01:07:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.12.11 01:07:22 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.70.19.1' . 2024.12.11 01:07:22 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:4213::1' . 2024.12.11 01:07:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.12.11 01:07:22 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.12.11 01:07:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.12.11 01:07:22 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.12.11 01:07:22 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.12.11 01:07:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2024.12.11 01:07:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.12.11 01:07:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.12.11 01:07:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.11 01:07:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.11 01:07:22 - OpenVPN > interactive service msg_channel=0 . 2024.12.11 01:07:22 - OpenVPN > open_tun . 2024.12.11 01:07:22 - OpenVPN > wintun device [Eddie] opened . 2024.12.11 01:07:22 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 34 static 10.70.19.15 255.255.255.0 . 2024.12.11 01:07:22 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 34 all . 2024.12.11 01:07:22 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 34 all . 2024.12.11 01:07:22 - OpenVPN > IPv4 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 01:07:22 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 34 fde6:7a:7d20:4213::100d/128 store=active . 2024.12.11 01:07:22 - OpenVPN > add_route_ipv6(fde6:7a:7d20:4213::/64 -> fde6:7a:7d20:4213::100d metric 0) dev Eddie . 2024.12.11 01:07:22 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:4213::/64 34 fe80::8 store=active . 2024.12.11 01:07:22 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.12.11 01:07:22 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 34 all . 2024.12.11 01:07:22 - OpenVPN > IPv6 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 01:07:22 - OpenVPN > Initialization Sequence Completed . 2024.12.11 01:07:23 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.12.11 01:07:23 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.12.11 01:07:23 - DNS leak protection with packet filtering enabled. . 2024.12.11 01:07:23 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.70.19.1) . 2024.12.11 01:07:23 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:4213::1) . 2024.12.11 01:07:23 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.70.19.1) . 2024.12.11 01:07:23 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:4213::1) . 2024.12.11 01:07:23 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:07:23 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:07:23 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:07:23 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:07:23 - Routes, add 198.44.133.117/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:07:24 - Routes, add 2607:9000:7000:32:b52a:2d04:d993:cdf5/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:07:24 - Flushing DNS I 2024.12.11 01:07:24 - Checking route IPv4 I 2024.12.11 01:07:27 - Checking route IPv6 . 2024.12.11 01:08:37 - Checking route (4° try) . 2024.12.11 01:09:02 - Checking route (5° try) E 2024.12.11 01:09:23 - Checking route IPv6 failed, last reason: Fetch url error:Timeout was reached ! 2024.12.11 01:09:23 - Disconnecting . 2024.12.11 01:09:23 - Sending soft termination signal . 2024.12.11 01:09:26 - OpenVPN > Closing TUN/TAP interface . 2024.12.11 01:09:26 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:4213::/64) . 2024.12.11 01:09:26 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:4213::/64 34 fe80::8 store=active . 2024.12.11 01:09:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 34 fde6:7a:7d20:4213::100d store=active . 2024.12.11 01:09:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 34 10.70.19.15 store=active . 2024.12.11 01:09:26 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.12.11 01:09:26 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:09:26 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:09:26 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:09:26 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:09:26 - Routes, delete 198.44.133.78/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 01:09:26 - Routes, delete 198.44.133.117/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:09:26 - Routes, delete 2607:9000:7000:32:b52a:2d04:d993:cdf5/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:09:27 - Routes, delete 198.44.133.78/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2024.12.11 01:09:27 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 01:09:27 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 01:09:27 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.12.11 01:09:27 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.12.11 01:09:27 - DNS leak protection with packet filtering disabled. . 2024.12.11 01:09:27 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.12.11 01:09:27 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.12.11 01:09:27 - Connection terminated. I 2024.12.11 01:09:29 - Cancel requested. ! 2024.12.11 01:09:29 - Session terminated. . 2024.12.11 01:35:36 - Collect information about AirVPN completed I 2024.12.11 01:39:09 - Session starting. I 2024.12.11 01:39:09 - Checking authorization ... . 2024.12.11 01:39:10 - Added new network interface "Eddie", Wintun version 0.12 . 2024.12.11 01:39:10 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.12.11 01:39:10 - Connecting to Castor (Belgium, Brussels) . 2024.12.11 01:39:10 - Routes, add 91.207.57.117/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 01:39:10 - Routes, add 91.207.57.117/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2024.12.11 01:39:10 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.12.11 01:39:10 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.12.11 01:39:10 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.12.11 01:39:10 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 01:39:10 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 01:39:10 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 01:39:10 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 01:39:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]91.207.57.117:443 . 2024.12.11 01:39:10 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.12.11 01:39:10 - OpenVPN > Attempting to establish TCP connection with [AF_INET]91.207.57.117:443 [nonblock] . 2024.12.11 01:39:11 - OpenVPN > TCP connection established with [AF_INET]91.207.57.117:443 . 2024.12.11 01:39:11 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.12.11 01:39:11 - OpenVPN > TCP_CLIENT link remote: [AF_INET]91.207.57.117:443 . 2024.12.11 01:39:11 - OpenVPN > TLS: Initial packet from [AF_INET]91.207.57.117:443, sid=e1b8e879 8a061db9 . 2024.12.11 01:39:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.12.11 01:39:11 - OpenVPN > VERIFY KU OK . 2024.12.11 01:39:11 - OpenVPN > Validating certificate extended key usage . 2024.12.11 01:39:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.12.11 01:39:11 - OpenVPN > VERIFY EKU OK . 2024.12.11 01:39:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Castor, emailAddress=info@airvpn.org . 2024.12.11 01:39:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.12.11 01:39:12 - OpenVPN > [Castor] Peer Connection Initiated with [AF_INET]91.207.57.117:443 . 2024.12.11 01:39:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.12.243.1,dhcp-option DNS6 fde6:7a:7d20:8f3::1,tun-ipv6,route-gateway 10.12.243.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:8f3::10ec/64 fde6:7a:7d20:8f3::1,ifconfig 10.12.243.238 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.12.11 01:39:12 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.12.11 01:39:12 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.12.243.1' . 2024.12.11 01:39:12 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:8f3::1' . 2024.12.11 01:39:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.12.11 01:39:12 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.12.11 01:39:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.12.11 01:39:12 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.12.11 01:39:12 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.12.11 01:39:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2024.12.11 01:39:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.12.11 01:39:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.12.11 01:39:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.11 01:39:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.11 01:39:12 - OpenVPN > interactive service msg_channel=0 . 2024.12.11 01:39:12 - OpenVPN > open_tun . 2024.12.11 01:39:12 - OpenVPN > wintun device [Eddie] opened . 2024.12.11 01:39:12 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 34 static 10.12.243.238 255.255.255.0 . 2024.12.11 01:39:13 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 34 all . 2024.12.11 01:39:13 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 34 all . 2024.12.11 01:39:13 - OpenVPN > IPv4 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 01:39:13 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 34 fde6:7a:7d20:8f3::10ec/128 store=active . 2024.12.11 01:39:13 - OpenVPN > add_route_ipv6(fde6:7a:7d20:8f3::/64 -> fde6:7a:7d20:8f3::10ec metric 0) dev Eddie . 2024.12.11 01:39:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:8f3::/64 34 fe80::8 store=active . 2024.12.11 01:39:13 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.12.11 01:39:13 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 34 all . 2024.12.11 01:39:13 - OpenVPN > IPv6 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 01:39:13 - OpenVPN > Initialization Sequence Completed . 2024.12.11 01:39:13 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.12.11 01:39:13 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.12.11 01:39:13 - DNS leak protection with packet filtering enabled. . 2024.12.11 01:39:13 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.12.243.1) . 2024.12.11 01:39:13 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:8f3::1) . 2024.12.11 01:39:13 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.12.243.1) . 2024.12.11 01:39:13 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:8f3::1) . 2024.12.11 01:39:13 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:39:13 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:39:13 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:39:14 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:39:14 - Routes, add 91.207.57.115/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:39:14 - Routes, add 2001:ac8:27:f:c0ca:9f36:68ed:1e70/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:39:14 - Flushing DNS I 2024.12.11 01:39:14 - Checking route IPv4 I 2024.12.11 01:39:18 - Checking route IPv6 . 2024.12.11 01:40:27 - Checking route (4° try) . 2024.12.11 01:40:52 - Checking route (5° try) E 2024.12.11 01:41:13 - Checking route IPv6 failed, last reason: Fetch url error:Timeout was reached ! 2024.12.11 01:41:13 - Disconnecting . 2024.12.11 01:41:13 - Sending soft termination signal . 2024.12.11 01:41:16 - OpenVPN > Closing TUN/TAP interface . 2024.12.11 01:41:16 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:8f3::/64) . 2024.12.11 01:41:16 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:8f3::/64 34 fe80::8 store=active . 2024.12.11 01:41:16 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 34 fde6:7a:7d20:8f3::10ec store=active . 2024.12.11 01:41:16 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 34 10.12.243.238 store=active . 2024.12.11 01:41:16 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.12.11 01:41:17 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:41:17 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:41:17 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:41:17 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:41:17 - Routes, delete 91.207.57.117/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 01:41:17 - Routes, delete 91.207.57.115/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:41:17 - Routes, delete 2001:ac8:27:f:c0ca:9f36:68ed:1e70/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:41:17 - Routes, delete 91.207.57.117/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2024.12.11 01:41:17 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 01:41:18 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 01:41:18 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.12.11 01:41:18 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.12.11 01:41:18 - DNS leak protection with packet filtering disabled. . 2024.12.11 01:41:18 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.12.11 01:41:18 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.12.11 01:41:18 - Connection terminated. I 2024.12.11 01:41:21 - Checking authorization ... . 2024.12.11 01:41:21 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.12.11 01:41:21 - Connecting to Ginan (Canada, Vancouver) . 2024.12.11 01:41:21 - Routes, add 104.193.135.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 01:41:21 - Routes, add 104.193.135.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2024.12.11 01:41:22 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.12.11 01:41:22 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.12.11 01:41:22 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.12.11 01:41:22 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 01:41:22 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 01:41:22 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 01:41:22 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 01:41:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.193.135.245:443 . 2024.12.11 01:41:22 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.12.11 01:41:22 - OpenVPN > Attempting to establish TCP connection with [AF_INET]104.193.135.245:443 [nonblock] . 2024.12.11 01:41:22 - OpenVPN > TCP connection established with [AF_INET]104.193.135.245:443 . 2024.12.11 01:41:22 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.12.11 01:41:22 - OpenVPN > TCP_CLIENT link remote: [AF_INET]104.193.135.245:443 . 2024.12.11 01:41:22 - OpenVPN > TLS: Initial packet from [AF_INET]104.193.135.245:443, sid=8016720f 7954307d . 2024.12.11 01:41:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.12.11 01:41:22 - OpenVPN > VERIFY KU OK . 2024.12.11 01:41:22 - OpenVPN > Validating certificate extended key usage . 2024.12.11 01:41:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.12.11 01:41:22 - OpenVPN > VERIFY EKU OK . 2024.12.11 01:41:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ginan, emailAddress=info@airvpn.org . 2024.12.11 01:41:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.12.11 01:41:22 - OpenVPN > [Ginan] Peer Connection Initiated with [AF_INET]104.193.135.245:443 ! 2024.12.11 01:41:22 - Disconnecting . 2024.12.11 01:41:22 - Sending soft termination signal . 2024.12.11 01:41:25 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.12.11 01:41:26 - Routes, delete 104.193.135.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 01:41:26 - Routes, delete 104.193.135.245/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2024.12.11 01:41:26 - Connection terminated. I 2024.12.11 01:41:26 - Cancel requested. ! 2024.12.11 01:41:26 - Session terminated. I 2024.12.11 01:42:47 - Session starting. I 2024.12.11 01:42:48 - Checking authorization ... . 2024.12.11 01:42:49 - Added new network interface "Eddie", Wintun version 0.12 . 2024.12.11 01:42:49 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.12.11 01:42:49 - Connecting to Unukalhai (United States of America, New York City) . 2024.12.11 01:42:49 - Routes, add 198.44.136.246/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 01:42:49 - Routes, add 198.44.136.246/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2024.12.11 01:42:49 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.12.11 01:42:49 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.12.11 01:42:49 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.12.11 01:42:49 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 01:42:49 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 01:42:49 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 01:42:49 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 01:42:49 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.136.246:443 . 2024.12.11 01:42:49 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.12.11 01:42:49 - OpenVPN > Attempting to establish TCP connection with [AF_INET]198.44.136.246:443 [nonblock] . 2024.12.11 01:42:49 - OpenVPN > TCP connection established with [AF_INET]198.44.136.246:443 . 2024.12.11 01:42:49 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.12.11 01:42:49 - OpenVPN > TCP_CLIENT link remote: [AF_INET]198.44.136.246:443 . 2024.12.11 01:42:49 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.136.246:443, sid=4b59d89c a4ab94e6 . 2024.12.11 01:42:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.12.11 01:42:50 - OpenVPN > VERIFY KU OK . 2024.12.11 01:42:50 - OpenVPN > Validating certificate extended key usage . 2024.12.11 01:42:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.12.11 01:42:50 - OpenVPN > VERIFY EKU OK . 2024.12.11 01:42:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Unukalhai, emailAddress=info@airvpn.org . 2024.12.11 01:42:50 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.12.11 01:42:50 - OpenVPN > [Unukalhai] Peer Connection Initiated with [AF_INET]198.44.136.246:443 . 2024.12.11 01:42:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.67.147.1,dhcp-option DNS6 fde6:7a:7d20:3f93::1,tun-ipv6,route-gateway 10.67.147.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:3f93::1026/64 fde6:7a:7d20:3f93::1,ifconfig 10.67.147.40 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.12.11 01:42:50 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.12.11 01:42:50 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.67.147.1' . 2024.12.11 01:42:50 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:3f93::1' . 2024.12.11 01:42:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.12.11 01:42:50 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.12.11 01:42:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.12.11 01:42:50 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.12.11 01:42:50 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.12.11 01:42:50 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2024.12.11 01:42:50 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.12.11 01:42:50 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.12.11 01:42:50 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.11 01:42:50 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.11 01:42:50 - OpenVPN > interactive service msg_channel=0 . 2024.12.11 01:42:50 - OpenVPN > open_tun . 2024.12.11 01:42:50 - OpenVPN > wintun device [Eddie] opened . 2024.12.11 01:42:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 34 static 10.67.147.40 255.255.255.0 . 2024.12.11 01:42:51 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 34 all . 2024.12.11 01:42:51 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 34 all . 2024.12.11 01:42:51 - OpenVPN > IPv4 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 01:42:51 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 34 fde6:7a:7d20:3f93::1026/128 store=active . 2024.12.11 01:42:51 - OpenVPN > add_route_ipv6(fde6:7a:7d20:3f93::/64 -> fde6:7a:7d20:3f93::1026 metric 0) dev Eddie . 2024.12.11 01:42:51 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:3f93::/64 34 fe80::8 store=active . 2024.12.11 01:42:51 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.12.11 01:42:51 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 34 all . 2024.12.11 01:42:51 - OpenVPN > IPv6 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 01:42:51 - OpenVPN > Initialization Sequence Completed . 2024.12.11 01:42:51 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.12.11 01:42:51 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.12.11 01:42:51 - DNS leak protection with packet filtering enabled. . 2024.12.11 01:42:51 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.67.147.1) . 2024.12.11 01:42:51 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:3f93::1) . 2024.12.11 01:42:51 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.67.147.1) . 2024.12.11 01:42:51 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:3f93::1) . 2024.12.11 01:42:51 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:42:51 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:42:52 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:42:52 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:42:52 - Routes, add 173.249.217.38/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:42:52 - Routes, add 2607:9000:a000:27:6c15:311d:d436:7a5f/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:42:52 - Flushing DNS I 2024.12.11 01:42:52 - Checking route IPv4 I 2024.12.11 01:42:56 - Checking route IPv6 . 2024.12.11 01:44:05 - Checking route (4° try) . 2024.12.11 01:44:30 - Checking route (5° try) E 2024.12.11 01:44:51 - Checking route IPv6 failed, last reason: Fetch url error:Timeout was reached ! 2024.12.11 01:44:51 - Disconnecting . 2024.12.11 01:44:51 - Sending soft termination signal . 2024.12.11 01:44:54 - OpenVPN > Closing TUN/TAP interface . 2024.12.11 01:44:54 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:3f93::/64) . 2024.12.11 01:44:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:3f93::/64 34 fe80::8 store=active . 2024.12.11 01:44:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 34 fde6:7a:7d20:3f93::1026 store=active . 2024.12.11 01:44:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 34 10.67.147.40 store=active . 2024.12.11 01:44:54 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.12.11 01:44:54 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:44:54 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:44:54 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:44:54 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:44:54 - Routes, delete 198.44.136.246/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 01:44:55 - Routes, delete 173.249.217.38/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:44:55 - Routes, delete 2607:9000:a000:27:6c15:311d:d436:7a5f/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:44:55 - Routes, delete 198.44.136.246/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2024.12.11 01:44:55 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 01:44:55 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 01:44:55 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.12.11 01:44:55 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.12.11 01:44:55 - DNS leak protection with packet filtering disabled. . 2024.12.11 01:44:55 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.12.11 01:44:55 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.12.11 01:44:55 - Connection terminated. I 2024.12.11 01:44:56 - Cancel requested. ! 2024.12.11 01:44:56 - Session terminated. I 2024.12.11 01:48:28 - Session starting. I 2024.12.11 01:48:28 - Checking authorization ... . 2024.12.11 01:48:29 - Added new network interface "Eddie", Wintun version 0.12 . 2024.12.11 01:48:29 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.12.11 01:48:29 - Connecting to Lupus (Sweden, Stockholm) . 2024.12.11 01:48:29 - Routes, add 128.127.105.186/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 01:48:29 - Routes, add 128.127.105.186/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2024.12.11 01:48:29 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.12.11 01:48:29 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.12.11 01:48:29 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.12.11 01:48:29 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 01:48:29 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 01:48:29 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 01:48:29 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 01:48:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]128.127.105.186:443 . 2024.12.11 01:48:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.12.11 01:48:29 - OpenVPN > Attempting to establish TCP connection with [AF_INET]128.127.105.186:443 [nonblock] . 2024.12.11 01:48:30 - OpenVPN > TCP connection established with [AF_INET]128.127.105.186:443 . 2024.12.11 01:48:30 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.12.11 01:48:30 - OpenVPN > TCP_CLIENT link remote: [AF_INET]128.127.105.186:443 . 2024.12.11 01:48:30 - OpenVPN > TLS: Initial packet from [AF_INET]128.127.105.186:443, sid=cd4aaad4 e2da81ca . 2024.12.11 01:48:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.12.11 01:48:30 - OpenVPN > VERIFY KU OK . 2024.12.11 01:48:30 - OpenVPN > Validating certificate extended key usage . 2024.12.11 01:48:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.12.11 01:48:30 - OpenVPN > VERIFY EKU OK . 2024.12.11 01:48:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lupus, emailAddress=info@airvpn.org . 2024.12.11 01:48:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.12.11 01:48:31 - OpenVPN > [Lupus] Peer Connection Initiated with [AF_INET]128.127.105.186:443 . 2024.12.11 01:48:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.163.1,dhcp-option DNS6 fde6:7a:7d20:13a3::1,tun-ipv6,route-gateway 10.23.163.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:13a3::1013/64 fde6:7a:7d20:13a3::1,ifconfig 10.23.163.21 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.12.11 01:48:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.12.11 01:48:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.163.1' . 2024.12.11 01:48:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:13a3::1' . 2024.12.11 01:48:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.12.11 01:48:31 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.12.11 01:48:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.12.11 01:48:31 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.12.11 01:48:31 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.12.11 01:48:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2024.12.11 01:48:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.12.11 01:48:31 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.12.11 01:48:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.11 01:48:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.11 01:48:31 - OpenVPN > interactive service msg_channel=0 . 2024.12.11 01:48:31 - OpenVPN > open_tun . 2024.12.11 01:48:31 - OpenVPN > wintun device [Eddie] opened . 2024.12.11 01:48:31 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 34 static 10.23.163.21 255.255.255.0 . 2024.12.11 01:48:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 34 all . 2024.12.11 01:48:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 34 all . 2024.12.11 01:48:32 - OpenVPN > IPv4 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 01:48:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 34 fde6:7a:7d20:13a3::1013/128 store=active . 2024.12.11 01:48:32 - OpenVPN > add_route_ipv6(fde6:7a:7d20:13a3::/64 -> fde6:7a:7d20:13a3::1013 metric 0) dev Eddie . 2024.12.11 01:48:32 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:13a3::/64 34 fe80::8 store=active . 2024.12.11 01:48:32 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.12.11 01:48:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 34 all . 2024.12.11 01:48:32 - OpenVPN > IPv6 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 01:48:32 - OpenVPN > Initialization Sequence Completed . 2024.12.11 01:48:32 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.12.11 01:48:32 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.12.11 01:48:32 - DNS leak protection with packet filtering enabled. . 2024.12.11 01:48:32 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.163.1) . 2024.12.11 01:48:32 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:13a3::1) . 2024.12.11 01:48:32 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.23.163.1) . 2024.12.11 01:48:32 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:13a3::1) . 2024.12.11 01:48:32 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:48:32 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:48:32 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:48:33 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:48:33 - Routes, add 128.127.105.184/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:48:33 - Routes, add 2a00:7142:2c:56ee:f0d1:6384:9c2e:a497/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:48:33 - Flushing DNS I 2024.12.11 01:48:33 - Checking route IPv4 I 2024.12.11 01:48:38 - Checking route IPv6 . 2024.12.11 01:49:47 - Checking route (4° try) . 2024.12.11 01:50:12 - Checking route (5° try) E 2024.12.11 01:50:33 - Checking route IPv6 failed, last reason: Fetch url error:Timeout was reached ! 2024.12.11 01:50:33 - Disconnecting . 2024.12.11 01:50:33 - Sending soft termination signal . 2024.12.11 01:50:36 - OpenVPN > Closing TUN/TAP interface . 2024.12.11 01:50:36 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:13a3::/64) . 2024.12.11 01:50:36 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:13a3::/64 34 fe80::8 store=active . 2024.12.11 01:50:36 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 34 fde6:7a:7d20:13a3::1013 store=active . 2024.12.11 01:50:36 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 34 10.23.163.21 store=active . 2024.12.11 01:50:36 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.12.11 01:50:36 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:50:36 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:50:36 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:50:36 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:50:36 - Routes, delete 128.127.105.186/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 01:50:36 - Routes, delete 128.127.105.184/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:50:37 - Routes, delete 2a00:7142:2c:56ee:f0d1:6384:9c2e:a497/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 01:50:37 - Routes, delete 128.127.105.186/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2024.12.11 01:50:37 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 01:50:37 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 01:50:37 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.12.11 01:50:37 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.12.11 01:50:37 - DNS leak protection with packet filtering disabled. . 2024.12.11 01:50:37 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.12.11 01:50:37 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.12.11 01:50:37 - Connection terminated. I 2024.12.11 01:50:39 - Cancel requested. ! 2024.12.11 01:50:39 - Session terminated. . 2024.12.11 02:05:44 - Collect information about AirVPN completed I 2024.12.11 02:13:52 - Session starting. I 2024.12.11 02:13:52 - Checking authorization ... . 2024.12.11 02:13:53 - Added new network interface "Eddie", Wintun version 0.12 . 2024.12.11 02:13:53 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.12.11 02:13:53 - Connecting to Bharani (Japan, Tokyo) . 2024.12.11 02:13:53 - Routes, add 146.70.76.37/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 02:13:53 - Routes, add 146.70.76.37/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2024.12.11 02:13:53 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.12.11 02:13:53 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.12.11 02:13:53 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.12.11 02:13:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 02:13:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 02:13:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.12.11 02:13:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.12.11 02:13:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]146.70.76.37:443 . 2024.12.11 02:13:53 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.12.11 02:13:53 - OpenVPN > Attempting to establish TCP connection with [AF_INET]146.70.76.37:443 [nonblock] . 2024.12.11 02:13:54 - OpenVPN > TCP connection established with [AF_INET]146.70.76.37:443 . 2024.12.11 02:13:54 - OpenVPN > TCP_CLIENT link local: (not bound) . 2024.12.11 02:13:54 - OpenVPN > TCP_CLIENT link remote: [AF_INET]146.70.76.37:443 . 2024.12.11 02:13:54 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.76.37:443, sid=a84b597b de3a5934 . 2024.12.11 02:13:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.12.11 02:13:54 - OpenVPN > VERIFY KU OK . 2024.12.11 02:13:54 - OpenVPN > Validating certificate extended key usage . 2024.12.11 02:13:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.12.11 02:13:54 - OpenVPN > VERIFY EKU OK . 2024.12.11 02:13:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Bharani, emailAddress=info@airvpn.org . 2024.12.11 02:13:54 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.12.11 02:13:54 - OpenVPN > [Bharani] Peer Connection Initiated with [AF_INET]146.70.76.37:443 . 2024.12.11 02:13:56 - OpenVPN > SENT CONTROL [Bharani]: 'PUSH_REQUEST' (status=1) . 2024.12.11 02:13:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.243.1,dhcp-option DNS6 fde6:7a:7d20:13f3::1,tun-ipv6,route-gateway 10.23.243.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:13f3::1041/64 fde6:7a:7d20:13f3::1,ifconfig 10.23.243.67 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.12.11 02:13:56 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.12.11 02:13:56 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.243.1' . 2024.12.11 02:13:56 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:13f3::1' . 2024.12.11 02:13:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.12.11 02:13:56 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.12.11 02:13:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.12.11 02:13:56 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.12.11 02:13:56 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.12.11 02:13:56 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2024.12.11 02:13:56 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.12.11 02:13:56 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.12.11 02:13:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.11 02:13:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.12.11 02:13:56 - OpenVPN > interactive service msg_channel=0 . 2024.12.11 02:13:56 - OpenVPN > open_tun . 2024.12.11 02:13:56 - OpenVPN > wintun device [Eddie] opened . 2024.12.11 02:13:56 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 34 static 10.23.243.67 255.255.255.0 . 2024.12.11 02:13:56 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 34 all . 2024.12.11 02:13:56 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 34 all . 2024.12.11 02:13:56 - OpenVPN > IPv4 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 02:13:56 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 34 fde6:7a:7d20:13f3::1041/128 store=active . 2024.12.11 02:13:56 - OpenVPN > add_route_ipv6(fde6:7a:7d20:13f3::/64 -> fde6:7a:7d20:13f3::1041 metric 0) dev Eddie . 2024.12.11 02:13:56 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:13f3::/64 34 fe80::8 store=active . 2024.12.11 02:13:56 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.12.11 02:13:56 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 34 all . 2024.12.11 02:13:56 - OpenVPN > IPv6 MTU set to 1500 on interface 34 using SetIpInterfaceEntry() . 2024.12.11 02:13:56 - OpenVPN > Initialization Sequence Completed . 2024.12.11 02:13:56 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.12.11 02:13:56 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.12.11 02:13:56 - DNS leak protection with packet filtering enabled. . 2024.12.11 02:13:56 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.243.1) . 2024.12.11 02:13:56 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:13f3::1) . 2024.12.11 02:13:56 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.23.243.1) . 2024.12.11 02:13:56 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:13f3::1) . 2024.12.11 02:13:56 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 02:13:57 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 02:13:57 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 02:13:57 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 02:13:57 - Routes, add 146.70.76.35/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 02:13:57 - Routes, add 2001:ac8:40:c9:1a4:7d15:11ec:43cd/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 02:13:57 - Flushing DNS I 2024.12.11 02:13:57 - Checking route IPv4 I 2024.12.11 02:14:01 - Checking route IPv6 . 2024.12.11 02:15:10 - Checking route (4° try) . 2024.12.11 02:15:35 - Checking route (5° try) E 2024.12.11 02:15:56 - Checking route IPv6 failed, last reason: Fetch url error:Timeout was reached ! 2024.12.11 02:15:56 - Disconnecting . 2024.12.11 02:15:56 - Sending soft termination signal . 2024.12.11 02:15:59 - OpenVPN > Closing TUN/TAP interface . 2024.12.11 02:15:59 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:13f3::/64) . 2024.12.11 02:15:59 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:13f3::/64 34 fe80::8 store=active . 2024.12.11 02:15:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 34 fde6:7a:7d20:13f3::1041 store=active . 2024.12.11 02:15:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 34 10.23.243.67 store=active . 2024.12.11 02:15:59 - OpenVPN > SIGTERM[hard,] received, process exiting . 2024.12.11 02:16:00 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 02:16:00 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 02:16:00 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 02:16:00 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 02:16:00 - Routes, delete 146.70.76.37/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2024.12.11 02:16:00 - Routes, delete 146.70.76.35/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 02:16:00 - Routes, delete 2001:ac8:40:c9:1a4:7d15:11ec:43cd/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.12.11 02:16:00 - Routes, delete 146.70.76.37/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2024.12.11 02:16:00 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 02:16:00 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.12.11 02:16:01 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.12.11 02:16:01 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2024.12.11 02:16:01 - DNS leak protection with packet filtering disabled. . 2024.12.11 02:16:01 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.12.11 02:16:01 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.12.11 02:16:01 - Connection terminated. I 2024.12.11 02:16:03 - Cancel requested. ! 2024.12.11 02:16:03 - Session terminated. ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/0", "gateway": "192.168.68.1", "interface_index": 2, "metric": 0, "interface": "{010AD9EC-1109-47B9-A5E7-33EDEF6694FD}" }, { "destination": "0.0.0.0\/0", "gateway": "192.168.68.1", "interface_index": 5, "metric": 0, "interface": "{269089A9-701E-4C4B-B6BF-8A253195EAA6}" }, { "destination": "127.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{3EF3ADAC-AC4C-11EF-B356-806E6F6E6963}" }, { "destination": "127.0.0.1\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{3EF3ADAC-AC4C-11EF-B356-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{3EF3ADAC-AC4C-11EF-B356-806E6F6E6963}" }, { "destination": "192.168.68.0\/22", "gateway": "0.0.0.0", "interface_index": 2, "metric": 256, "interface": "{010AD9EC-1109-47B9-A5E7-33EDEF6694FD}" }, { "destination": "192.168.68.0\/22", "gateway": "0.0.0.0", "interface_index": 5, "metric": 256, "interface": "{269089A9-701E-4C4B-B6BF-8A253195EAA6}" }, { "destination": "192.168.68.51\/32", "gateway": "0.0.0.0", "interface_index": 5, "metric": 256, "interface": "{269089A9-701E-4C4B-B6BF-8A253195EAA6}" }, { "destination": "192.168.68.59\/32", "gateway": "0.0.0.0", "interface_index": 2, "metric": 256, "interface": "{010AD9EC-1109-47B9-A5E7-33EDEF6694FD}" }, { "destination": "192.168.71.255\/32", "gateway": "0.0.0.0", "interface_index": 2, "metric": 256, "interface": "{010AD9EC-1109-47B9-A5E7-33EDEF6694FD}" }, { "destination": "192.168.71.255\/32", "gateway": "0.0.0.0", "interface_index": 5, "metric": 256, "interface": "{269089A9-701E-4C4B-B6BF-8A253195EAA6}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{3EF3ADAC-AC4C-11EF-B356-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 2, "metric": 256, "interface": "{010AD9EC-1109-47B9-A5E7-33EDEF6694FD}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 9, "metric": 256, "interface": "{501DE543-BC65-41CD-86FE-151FC2E1C181}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 5, "metric": 256, "interface": "{269089A9-701E-4C4B-B6BF-8A253195EAA6}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 6, "metric": 256, "interface": "{2E877571-2BAF-488D-901A-2AB3B0503B43}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 15, "metric": 256, "interface": "{BC6A4E3F-2FB2-44FF-8644-58A6AD20BB4A}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{3EF3ADAC-AC4C-11EF-B356-806E6F6E6963}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 2, "metric": 256, "interface": "{010AD9EC-1109-47B9-A5E7-33EDEF6694FD}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 9, "metric": 256, "interface": "{501DE543-BC65-41CD-86FE-151FC2E1C181}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 5, "metric": 256, "interface": "{269089A9-701E-4C4B-B6BF-8A253195EAA6}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 6, "metric": 256, "interface": "{2E877571-2BAF-488D-901A-2AB3B0503B43}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 15, "metric": 256, "interface": "{BC6A4E3F-2FB2-44FF-8644-58A6AD20BB4A}" }, { "destination": "::\/0", "gateway": "fe80::76fe:ceff:feb4:2ce4", "interface_index": 5, "metric": 256, "interface": "{269089A9-701E-4C4B-B6BF-8A253195EAA6}" }, { "destination": "::1\/128", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{3EF3ADAC-AC4C-11EF-B356-806E6F6E6963}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 9, "metric": 256, "interface": "{501DE543-BC65-41CD-86FE-151FC2E1C181}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 5, "metric": 256, "interface": "{269089A9-701E-4C4B-B6BF-8A253195EAA6}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 6, "metric": 256, "interface": "{2E877571-2BAF-488D-901A-2AB3B0503B43}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 15, "metric": 256, "interface": "{BC6A4E3F-2FB2-44FF-8644-58A6AD20BB4A}" }, { "destination": "fe80::7633:a6d3:72d:b842\/128", "gateway": "::", "interface_index": 6, "metric": 256, "interface": "{2E877571-2BAF-488D-901A-2AB3B0503B43}" }, { "destination": "fe80::996b:f79a:9d64:c76a\/128", "gateway": "::", "interface_index": 9, "metric": 256, "interface": "{501DE543-BC65-41CD-86FE-151FC2E1C181}" }, { "destination": "fe80::bcc8:2d1c:3ebf:5222\/128", "gateway": "::", "interface_index": 5, "metric": 256, "interface": "{269089A9-701E-4C4B-B6BF-8A253195EAA6}" }, { "destination": "fe80::fe76:9caa:2e59:4b9a\/128", "gateway": "::", "interface_index": 15, "metric": 256, "interface": "{BC6A4E3F-2FB2-44FF-8644-58A6AD20BB4A}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{3EF3ADAC-AC4C-11EF-B356-806E6F6E6963}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 9, "metric": 256, "interface": "{501DE543-BC65-41CD-86FE-151FC2E1C181}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 5, "metric": 256, "interface": "{269089A9-701E-4C4B-B6BF-8A253195EAA6}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 6, "metric": 256, "interface": "{2E877571-2BAF-488D-901A-2AB3B0503B43}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 15, "metric": 256, "interface": "{BC6A4E3F-2FB2-44FF-8644-58A6AD20BB4A}" } ], "ipv4-default-gateway": "192.168.68.1", "ipv4-default-interface": "{010AD9EC-1109-47B9-A5E7-33EDEF6694FD}", "ipv6-default-gateway": "fe80::76fe:ceff:feb4:2ce4", "ipv6-default-interface": "{269089A9-701E-4C4B-B6BF-8A253195EAA6}", "interfaces": [ { "friendly": "Ethernet", "id": "{010AD9EC-1109-47B9-A5E7-33EDEF6694FD}", "name": "Ethernet", "description": "Realtek PCIe GbE Family Controller", "type": "Ethernet", "status": "Up", "bytes_received": "1063505442", "bytes_sent": "334123856", "support_ipv4": true, "support_ipv6": true, "ips": [ "192.168.68.59" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 9", "id": "{2E877571-2BAF-488D-901A-2AB3B0503B43}", "name": "Local Area Connection* 9", "description": "Microsoft Wi-Fi Direct Virtual Adapter", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::7633:a6d3:72d:b842", "169.254.66.129" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 10", "id": "{BC6A4E3F-2FB2-44FF-8644-58A6AD20BB4A}", "name": "Local Area Connection* 10", "description": "Microsoft Wi-Fi Direct Virtual Adapter #2", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::fe76:9caa:2e59:4b9a", "169.254.125.212" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Wi-Fi", "id": "{269089A9-701E-4C4B-B6BF-8A253195EAA6}", "name": "Wi-Fi", "description": "Realtek 8852CE WiFi 6E PCI-E NIC", "type": "Wireless80211", "status": "Down", "bytes_received": "55256515", "bytes_sent": "2560491", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::bcc8:2d1c:3ebf:5222", "192.168.68.51" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Bluetooth Network Connection", "id": "{501DE543-BC65-41CD-86FE-151FC2E1C181}", "name": "Bluetooth Network Connection", "description": "Bluetooth Device (Personal Area Network)", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::996b:f79a:9d64:c76a", "169.254.24.60" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{3EF3ADAC-AC4C-11EF-B356-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "bind": true, "dns4": "", "dns6": null } ] } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : jojospc Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Ethernet adapter Ethernet: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek PCIe GbE Family Controller Physical Address. . . . . . . . . : 10-FF-E0-3A-84-88 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv4 Address. . . . . . . . . . . : 192.168.68.59(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.252.0 Lease Obtained. . . . . . . . . . : Tuesday, December 10, 2024 9:10:15 PM Lease Expires . . . . . . . . . . : Wednesday, December 11, 2024 3:55:02 AM Default Gateway . . . . . . . . . : 192.168.68.1 DHCP Server . . . . . . . . . . . : 192.168.68.1 DHCPv6 IAID . . . . . . . . . . . : 34668512 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-2E-D8-0F-9A-10-FF-E0-3A-84-88 DNS Servers . . . . . . . . . . . : 71.10.216.1 71.10.216.2 NetBIOS over Tcpip. . . . . . . . : Enabled Wireless LAN adapter Local Area Connection* 9: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : BE-C7-46-EC-0C-A3 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 10: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2 Physical Address. . . . . . . . . : B2-C7-46-EC-0C-A3 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek 8852CE WiFi 6E PCI-E NIC Physical Address. . . . . . . . . : BC-C7-46-EC-0C-A3 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Ethernet adapter Bluetooth Network Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) Physical Address. . . . . . . . . : BC-C7-46-EC-81-D7 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Share this post Link to post
Staff 10014 Posted ... @Feelingesoteric Hello! In the first part of your log the IPv4 route check failed because of a possible UDP block, which is later resolved. In the second part of the log the route check fails in IPv6 only, while it is successful in IPv4. You may consider to investigate whether you have some IPv6 related issue in your system, or just tell Eddie not to consider IPv6 in the following way: from Eddie's main window select "Preferences" > "Networking" set the "IPv6 layer" combo box to "Block" enable Network Lock from the main window before starting the connection The above should solve the problem although you will not use IPv6 on the VPN (not a big deal at the moment and for the foreseeable future). Kind regards Share this post Link to post
Feelingesoteric 0 Posted ... Thank you! the fix worked immediately and i was able to connect to any server, thanks for the help! Share this post Link to post