Eddie System/Environment Report - 4/7/2018 1:42 AM UTC Eddie version: 2.13.6 Eddie OS build: windows_x86 Eddie architecture: x86 OS type: Windows OS name: Windows 10 Home OS version: Microsoft Windows NT 10.0.16299.0 OS architecture: x86 Mono /.Net Framework: v4.0.30319 OpenVPN driver: TAP-Windows Adapter V9, version 9.9.2 OpenVPN: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe) Profile path: C:\Users\Silver Scorpion\AppData\Local\AirVPN\AirVPN.xml Data path: C:\Users\Silver Scorpion\AppData\Local\AirVPN Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\AirVPN.exe Command line arguments: (1 args) path="home" Network Lock Active: No Connected to VPN: Yes, Eddie.Core.StatsEntry Detected DNS: 10.50.0.1, 68.105.28.11, 68.105.28.12, 68.105.29.11 Test DNS IPv4: Ok Test DNS IPv6: Failed ---------------------------- Test HTTP: Status: HTTP/1.1 200 OK - Headers: server:nginx;date:Sat, 07 Apr 2018 01:42:30 GMT;content-type:text/html; charset=UTF-8;transfer-encoding:chunked;connection:keep-alive;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success. ---------------------------- Test HTTPS: Status: HTTP/2 200 - Headers: server:nginx;date:Sat, 07 Apr 2018 01:42:32 GMT;content-type:text/html; charset=UTF-8;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (10 bytes): Success. ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True mode.protocol: SSL mode.alt: 1 openvpn.custom: mssfix 1430 openvpn.sndbuf: 524288 openvpn.rcvbuf: 524288 windows.disable_driver_upgrade: True ---------------------------- Logs: . 2018.04.06 17:55:09 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.04.06 17:55:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2018.04.06 17:55:09 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2018.04.06 17:55:09 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2018.04.06 17:55:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.04.06 17:55:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.04.06 17:55:09 - OpenVPN > interactive service msg_channel=0 . 2018.04.06 17:55:09 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=18 HWADDR=f0:7d:68:c1:b2:f7 . 2018.04.06 17:55:09 - OpenVPN > open_tun . 2018.04.06 17:55:09 - OpenVPN > TAP-WIN32 device [{DEE92E62-4608-4634-8C77-482D6B02C256}] opened: \\.\Global\{DEE92E62-4608-4634-8C77-482D6B02C256}.tap . 2018.04.06 17:55:09 - OpenVPN > TAP-Windows Driver Version 9.9 . 2018.04.06 17:55:09 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.37/255.255.0.0 [SUCCEEDED] . 2018.04.06 17:55:09 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.37/255.255.0.0 on interface {DEE92E62-4608-4634-8C77-482D6B02C256} [DHCP-serv: 10.50.255.254, lease-time: 31536000] . 2018.04.06 17:55:09 - OpenVPN > Successful ARP Flush on interface [19] {DEE92E62-4608-4634-8C77-482D6B02C256} . 2018.04.06 17:55:09 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2018.04.06 17:55:14 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2018.04.06 17:55:14 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1 . 2018.04.06 17:55:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2018.04.06 17:55:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 17:55:14 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1 . 2018.04.06 17:55:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2018.04.06 17:55:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 17:55:14 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1 . 2018.04.06 17:55:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2018.04.06 17:55:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 17:55:14 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.252.115 MASK 255.255.255.255 192.168.0.1 . 2018.04.06 17:55:14 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2018.04.06 17:55:14 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 17:55:14 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv4 . 2018.04.06 17:55:14 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv6 . 2018.04.06 17:55:14 - DNS leak protection with packet filtering enabled. . 2018.04.06 17:55:15 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.4.0.1) to 10.50.0.1) . 2018.04.06 17:55:15 - Flushing DNS I 2018.04.06 17:55:18 - Checking route I 2018.04.06 17:55:21 - Checking DNS ! 2018.04.06 17:55:41 - Connected. . 2018.04.06 17:55:41 - OpenVPN > Initialization Sequence Completed . 2018.04.06 17:56:07 - SSL > 2018.04.06 17:56:07 LOG6[cron]: Executing cron jobs . 2018.04.06 17:56:07 - SSL > 2018.04.06 17:56:07 LOG6[cron]: Cron jobs completed in 0 seconds ! 2018.04.06 17:58:05 - Disconnecting . 2018.04.06 17:58:05 - Sending management termination signal . 2018.04.06 17:58:05 - Management - Send 'signal SIGTERM' . 2018.04.06 17:58:15 - Sending soft termination signal . 2018.04.06 17:58:15 - Connection terminated. . 2018.04.06 17:58:15 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.4.0.1) . 2018.04.06 17:58:15 - DNS leak protection with packet filtering disabled. . 2018.04.06 17:58:15 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv4 . 2018.04.06 17:58:15 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv6 . 2018.04.06 17:58:15 - Flushing DNS . 2018.04.06 17:58:19 - IPv6 restored with packet filtering. ! 2018.04.06 17:58:19 - Session terminated. I 2018.04.06 17:58:29 - Session starting. . 2018.04.06 17:58:29 - IPv6 disabled with packet filtering. I 2018.04.06 17:58:29 - Checking authorization ... ! 2018.04.06 17:58:30 - Connecting to Kleeia (Canada, Vancouver) . 2018.04.06 17:58:31 - SSH > Looking up host "71.19.252.33" . 2018.04.06 17:58:31 - SSH > Connecting to 71.19.252.33 port 53 . 2018.04.06 17:58:31 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.67 . 2018.04.06 17:58:31 - SSH > Server version: SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u1 . 2018.04.06 17:58:31 - SSH > Using SSH protocol version 2 . 2018.04.06 17:58:31 - SSH > Doing Diffie-Hellman group exchange . 2018.04.06 17:58:31 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256 . 2018.04.06 17:58:32 - SSH > Host key fingerprint is: . 2018.04.06 17:58:32 - SSH > ssh-rsa 2048 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34 . 2018.04.06 17:58:32 - SSH > The server's host key is not cached in the registry. You . 2018.04.06 17:58:32 - SSH > have no guarantee that the server is the computer you . 2018.04.06 17:58:32 - SSH > think it is. . 2018.04.06 17:58:32 - SSH > The server's rsa2 key fingerprint is: . 2018.04.06 17:58:32 - SSH > ssh-rsa 2048 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34 . 2018.04.06 17:58:32 - SSH > If you trust this host, enter "y" to add the key to . 2018.04.06 17:58:32 - SSH > PuTTY's cache and carry on connecting. . 2018.04.06 17:58:32 - SSH > If you want to carry on connecting just once, without . 2018.04.06 17:58:32 - SSH > adding the key to the cache, enter "n". . 2018.04.06 17:58:32 - SSH > If you do not trust this host, press Return to abandon the . 2018.04.06 17:58:32 - SSH > connection. . 2018.04.06 17:58:32 - SSH > Store key in cache? (y/n) Initialised AES-256 SDCTR client->server encryption . 2018.04.06 17:58:32 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm . 2018.04.06 17:58:32 - SSH > Initialised AES-256 SDCTR server->client encryption . 2018.04.06 17:58:32 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm . 2018.04.06 17:58:32 - SSH > Reading private key file "C:\Users\Silver Scorpion\AppData\Local\AirVPN\bf847c857d650549dc0ee9920789f74161c79dc06cc26cb01863249c043381a6.tmp.ppk" . 2018.04.06 17:58:32 - SSH > Using username "sshtunnel". . 2018.04.06 17:58:32 - SSH > Offered public key . 2018.04.06 17:58:32 - SSH > Offer of public key accepted . 2018.04.06 17:58:32 - SSH > Authenticating with public key "" . 2018.04.06 17:58:32 - SSH > Sent public key signature . 2018.04.06 17:58:32 - SSH > Access granted . 2018.04.06 17:58:32 - SSH > Local port 60237 forwarding to 127.0.0.1:2018 . 2018.04.06 17:58:32 - SSH > Remote debug message: PTY allocation disabled. . 2018.04.06 17:58:32 - SSH > Remote debug message: X11 forwarding disabled. . 2018.04.06 17:58:32 - SSH > Remote debug message: Forced command. . 2018.04.06 17:58:32 - SSH > Remote debug message: PTY allocation disabled. . 2018.04.06 17:58:32 - SSH > Remote debug message: X11 forwarding disabled. . 2018.04.06 17:58:32 - SSH > Remote debug message: Forced command. . 2018.04.06 17:58:32 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017 . 2018.04.06 17:58:32 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 32bit . 2018.04.06 17:58:32 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2018.04.06 17:58:32 - Connection to OpenVPN Management Interface . 2018.04.06 17:58:32 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2018.04.06 17:58:33 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.04.06 17:58:33 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.04.06 17:58:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:60237 . 2018.04.06 17:58:33 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288] . 2018.04.06 17:58:33 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:60237 [nonblock] . 2018.04.06 17:58:33 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:60237 . 2018.04.06 17:58:33 - OpenVPN > TCP_CLIENT link local: (not bound) . 2018.04.06 17:58:33 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:60237 . 2018.04.06 17:58:33 - SSH > Opening connection to 127.0.0.1:2018 for forwarding from 127.0.0.1:62192 . 2018.04.06 17:58:33 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2018.04.06 17:58:33 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:60237, sid=48a9399c feadf50f . 2018.04.06 17:58:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.04.06 17:58:33 - OpenVPN > VERIFY KU OK . 2018.04.06 17:58:33 - OpenVPN > Validating certificate extended key usage . 2018.04.06 17:58:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.04.06 17:58:33 - OpenVPN > VERIFY EKU OK . 2018.04.06 17:58:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org . 2018.04.06 17:58:33 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.04.06 17:58:33 - OpenVPN > [Kleeia] Peer Connection Initiated with [AF_INET]127.0.0.1:60237 . 2018.04.06 17:58:34 - OpenVPN > SENT CONTROL [Kleeia]: 'PUSH_REQUEST' (status=1) . 2018.04.06 17:58:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.162 255.255.0.0,peer-id 0,cipher AES-256-GCM' . 2018.04.06 17:58:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.04.06 17:58:34 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2018.04.06 17:58:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.04.06 17:58:34 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.04.06 17:58:34 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.04.06 17:58:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.04.06 17:58:34 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.04.06 17:58:34 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2018.04.06 17:58:34 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2018.04.06 17:58:34 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2018.04.06 17:58:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.04.06 17:58:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.04.06 17:58:35 - OpenVPN > interactive service msg_channel=0 . 2018.04.06 17:58:35 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=18 HWADDR=f0:7d:68:c1:b2:f7 . 2018.04.06 17:58:35 - OpenVPN > open_tun . 2018.04.06 17:58:35 - OpenVPN > TAP-WIN32 device [{DEE92E62-4608-4634-8C77-482D6B02C256}] opened: \\.\Global\{DEE92E62-4608-4634-8C77-482D6B02C256}.tap . 2018.04.06 17:58:35 - OpenVPN > TAP-Windows Driver Version 9.9 . 2018.04.06 17:58:35 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.1.162/255.255.0.0 [SUCCEEDED] . 2018.04.06 17:58:35 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.1.162/255.255.0.0 on interface {DEE92E62-4608-4634-8C77-482D6B02C256} [DHCP-serv: 10.50.255.254, lease-time: 31536000] . 2018.04.06 17:58:35 - OpenVPN > Successful ARP Flush on interface [19] {DEE92E62-4608-4634-8C77-482D6B02C256} . 2018.04.06 17:58:35 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2018.04.06 17:58:40 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2018.04.06 17:58:40 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1 . 2018.04.06 17:58:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2018.04.06 17:58:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 17:58:40 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1 . 2018.04.06 17:58:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2018.04.06 17:58:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 17:58:40 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1 . 2018.04.06 17:58:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2018.04.06 17:58:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 17:58:40 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.252.33 MASK 255.255.255.255 192.168.0.1 . 2018.04.06 17:58:40 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2018.04.06 17:58:40 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 17:58:40 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv4 . 2018.04.06 17:58:40 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv6 . 2018.04.06 17:58:40 - DNS leak protection with packet filtering enabled. . 2018.04.06 17:58:40 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.4.0.1) to 10.50.0.1) . 2018.04.06 17:58:40 - Flushing DNS I 2018.04.06 17:58:43 - Checking route . 2018.04.06 17:59:05 - curl: (7) Failed to connect to kleeia_exit.airservers.org port 89: Timed out . 2018.04.06 17:59:05 - Checking route (2° try) . 2018.04.06 17:59:28 - curl: (7) Failed to connect to kleeia_exit.airservers.org port 89: Timed out . 2018.04.06 17:59:28 - Checking route (3° try) . 2018.04.06 17:59:53 - curl: (7) Failed to connect to kleeia_exit.airservers.org port 89: Timed out E 2018.04.06 17:59:53 - Checking route failed. . 2018.04.06 17:59:53 - OpenVPN > Initialization Sequence Completed ! 2018.04.06 17:59:53 - Disconnecting . 2018.04.06 17:59:53 - Sending management termination signal . 2018.04.06 17:59:53 - Management - Send 'signal SIGTERM' . 2018.04.06 17:59:53 - Connection terminated. . 2018.04.06 17:59:53 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.4.0.1) . 2018.04.06 17:59:53 - DNS leak protection with packet filtering disabled. . 2018.04.06 17:59:53 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv4 . 2018.04.06 17:59:53 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv6 I 2018.04.06 17:59:56 - Checking authorization ... ! 2018.04.06 17:59:58 - Connecting to Cynosura (Canada, Vancouver) . 2018.04.06 17:59:58 - SSH > Looking up host "71.19.252.23" . 2018.04.06 17:59:58 - SSH > Connecting to 71.19.252.23 port 53 . 2018.04.06 17:59:58 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.67 . 2018.04.06 17:59:58 - SSH > Server version: SSH-2.0-OpenSSH_6.7p1 Debian-5+deb8u3 . 2018.04.06 17:59:58 - SSH > Using SSH protocol version 2 . 2018.04.06 17:59:58 - SSH > Doing Diffie-Hellman group exchange . 2018.04.06 17:59:58 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256 . 2018.04.06 17:59:59 - SSH > Host key fingerprint is: . 2018.04.06 17:59:59 - SSH > ssh-rsa 2048 76:05:c8:ec:a1:5f:ea:bd:9e:58:d7:55:a8:39:40:b6 . 2018.04.06 17:59:59 - SSH > The server's host key is not cached in the registry. You . 2018.04.06 17:59:59 - SSH > have no guarantee that the server is the computer you . 2018.04.06 17:59:59 - SSH > think it is. . 2018.04.06 17:59:59 - SSH > The server's rsa2 key fingerprint is: . 2018.04.06 17:59:59 - SSH > ssh-rsa 2048 76:05:c8:ec:a1:5f:ea:bd:9e:58:d7:55:a8:39:40:b6 . 2018.04.06 17:59:59 - SSH > If you trust this host, enter "y" to add the key to . 2018.04.06 17:59:59 - SSH > PuTTY's cache and carry on connecting. . 2018.04.06 17:59:59 - SSH > If you want to carry on connecting just once, without . 2018.04.06 17:59:59 - SSH > adding the key to the cache, enter "n". . 2018.04.06 17:59:59 - SSH > If you do not trust this host, press Return to abandon the . 2018.04.06 17:59:59 - SSH > connection. . 2018.04.06 17:59:59 - SSH > Store key in cache? (y/n) Initialised AES-256 SDCTR client->server encryption . 2018.04.06 17:59:59 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm . 2018.04.06 17:59:59 - SSH > Initialised AES-256 SDCTR server->client encryption . 2018.04.06 17:59:59 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm . 2018.04.06 17:59:59 - SSH > Reading private key file "C:\Users\Silver Scorpion\AppData\Local\AirVPN\5bb020edcf4a8691e38206757a2e7e605c773940ad627e1797f3dd2aa1a6acec.tmp.ppk" . 2018.04.06 18:00:00 - SSH > Using username "sshtunnel". . 2018.04.06 18:00:00 - SSH > Offered public key . 2018.04.06 18:00:00 - SSH > Offer of public key accepted . 2018.04.06 18:00:00 - SSH > Authenticating with public key "" . 2018.04.06 18:00:00 - SSH > Sent public key signature . 2018.04.06 18:00:00 - SSH > Access granted . 2018.04.06 18:00:00 - SSH > Local port 52323 forwarding to 127.0.0.1:2018 . 2018.04.06 18:00:01 - SSH > Remote debug message: Pty allocation disabled. . 2018.04.06 18:00:01 - SSH > Remote debug message: X11 forwarding disabled. . 2018.04.06 18:00:01 - SSH > Remote debug message: Forced command. . 2018.04.06 18:00:01 - SSH > Remote debug message: Pty allocation disabled. . 2018.04.06 18:00:01 - SSH > Remote debug message: X11 forwarding disabled. . 2018.04.06 18:00:01 - SSH > Remote debug message: Forced command. . 2018.04.06 18:00:01 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017 . 2018.04.06 18:00:01 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 32bit . 2018.04.06 18:00:01 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2018.04.06 18:00:01 - Connection to OpenVPN Management Interface . 2018.04.06 18:00:01 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2018.04.06 18:00:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.04.06 18:00:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.04.06 18:00:01 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:52323 . 2018.04.06 18:00:01 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288] . 2018.04.06 18:00:01 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:52323 [nonblock] . 2018.04.06 18:00:01 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:52323 . 2018.04.06 18:00:01 - OpenVPN > TCP_CLIENT link local: (not bound) . 2018.04.06 18:00:01 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:52323 . 2018.04.06 18:00:01 - SSH > Opening connection to 127.0.0.1:2018 for forwarding from 127.0.0.1:62224 . 2018.04.06 18:00:01 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2018.04.06 18:00:01 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:52323, sid=ce83910d 8d3e02ce . 2018.04.06 18:00:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.04.06 18:00:01 - OpenVPN > VERIFY KU OK . 2018.04.06 18:00:01 - OpenVPN > Validating certificate extended key usage . 2018.04.06 18:00:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.04.06 18:00:01 - OpenVPN > VERIFY EKU OK . 2018.04.06 18:00:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org . 2018.04.06 18:00:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.04.06 18:00:02 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]127.0.0.1:52323 . 2018.04.06 18:00:03 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1) . 2018.04.06 18:00:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.3.138 255.255.0.0,peer-id 0,cipher AES-256-GCM' . 2018.04.06 18:00:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.04.06 18:00:03 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2018.04.06 18:00:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.04.06 18:00:03 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.04.06 18:00:03 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.04.06 18:00:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.04.06 18:00:03 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.04.06 18:00:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2018.04.06 18:00:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2018.04.06 18:00:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2018.04.06 18:00:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.04.06 18:00:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.04.06 18:00:03 - OpenVPN > interactive service msg_channel=0 . 2018.04.06 18:00:03 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=18 HWADDR=f0:7d:68:c1:b2:f7 . 2018.04.06 18:00:03 - OpenVPN > open_tun . 2018.04.06 18:00:03 - OpenVPN > TAP-WIN32 device [{DEE92E62-4608-4634-8C77-482D6B02C256}] opened: \\.\Global\{DEE92E62-4608-4634-8C77-482D6B02C256}.tap . 2018.04.06 18:00:03 - OpenVPN > TAP-Windows Driver Version 9.9 . 2018.04.06 18:00:03 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.3.138/255.255.0.0 [SUCCEEDED] . 2018.04.06 18:00:03 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.3.138/255.255.0.0 on interface {DEE92E62-4608-4634-8C77-482D6B02C256} [DHCP-serv: 10.50.255.254, lease-time: 31536000] . 2018.04.06 18:00:03 - OpenVPN > Successful ARP Flush on interface [19] {DEE92E62-4608-4634-8C77-482D6B02C256} . 2018.04.06 18:00:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2018.04.06 18:00:08 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2018.04.06 18:00:08 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2018.04.06 18:00:08 - Eddie Windows Interface Hack executed (Ethernet 3) . 2018.04.06 18:00:13 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2018.04.06 18:00:13 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1 . 2018.04.06 18:00:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2018.04.06 18:00:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:00:13 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1 . 2018.04.06 18:00:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2018.04.06 18:00:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:00:13 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1 . 2018.04.06 18:00:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2018.04.06 18:00:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:00:13 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.252.23 MASK 255.255.255.255 192.168.0.1 . 2018.04.06 18:00:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2018.04.06 18:00:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:00:13 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv4 . 2018.04.06 18:00:13 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv6 . 2018.04.06 18:00:13 - DNS leak protection with packet filtering enabled. . 2018.04.06 18:00:14 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.4.0.1) to 10.50.0.1) . 2018.04.06 18:00:14 - Flushing DNS I 2018.04.06 18:00:17 - Checking route . 2018.04.06 18:00:39 - curl: (7) Failed to connect to cynosura_exit.airservers.org port 89: Timed out . 2018.04.06 18:00:39 - Checking route (2° try) . 2018.04.06 18:01:02 - curl: (7) Failed to connect to cynosura_exit.airservers.org port 89: Timed out . 2018.04.06 18:01:02 - Checking route (3° try) . 2018.04.06 18:01:26 - curl: (7) Failed to connect to cynosura_exit.airservers.org port 89: Timed out . 2018.04.06 18:01:26 - OpenVPN > Initialization Sequence Completed ! 2018.04.06 18:01:27 - Disconnecting . 2018.04.06 18:01:27 - Sending management termination signal . 2018.04.06 18:01:27 - Management - Send 'signal SIGTERM' . 2018.04.06 18:01:27 - Connection terminated. . 2018.04.06 18:01:27 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.4.0.1) . 2018.04.06 18:01:27 - DNS leak protection with packet filtering disabled. . 2018.04.06 18:01:27 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv4 . 2018.04.06 18:01:27 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv6 I 2018.04.06 18:01:27 - Cancel requested. . 2018.04.06 18:01:27 - IPv6 restored with packet filtering. ! 2018.04.06 18:01:27 - Session terminated. I 2018.04.06 18:01:33 - Session starting. . 2018.04.06 18:01:34 - IPv6 disabled with packet filtering. I 2018.04.06 18:01:34 - Checking authorization ... ! 2018.04.06 18:01:35 - Connecting to Kraz (Canada, Toronto, Ontario) . 2018.04.06 18:01:36 - SSH > Looking up host "199.19.94.65" . 2018.04.06 18:01:36 - SSH > Connecting to 199.19.94.65 port 53 . 2018.04.06 18:01:36 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.67 . 2018.04.06 18:01:36 - SSH > Server version: SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u2 . 2018.04.06 18:01:36 - SSH > Using SSH protocol version 2 . 2018.04.06 18:01:36 - SSH > Doing Diffie-Hellman group exchange . 2018.04.06 18:01:36 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256 . 2018.04.06 18:01:36 - SSH > Host key fingerprint is: . 2018.04.06 18:01:36 - SSH > ssh-rsa 2048 ad:f3:ee:c4:10:f4:74:92:50:c2:d2:42:a2:48:15:ab . 2018.04.06 18:01:36 - SSH > The server's host key is not cached in the registry. You . 2018.04.06 18:01:36 - SSH > have no guarantee that the server is the computer you . 2018.04.06 18:01:36 - SSH > think it is. . 2018.04.06 18:01:36 - SSH > The server's rsa2 key fingerprint is: . 2018.04.06 18:01:36 - SSH > ssh-rsa 2048 ad:f3:ee:c4:10:f4:74:92:50:c2:d2:42:a2:48:15:ab . 2018.04.06 18:01:36 - SSH > If you trust this host, enter "y" to add the key to . 2018.04.06 18:01:36 - SSH > PuTTY's cache and carry on connecting. . 2018.04.06 18:01:36 - SSH > If you want to carry on connecting just once, without . 2018.04.06 18:01:36 - SSH > adding the key to the cache, enter "n". . 2018.04.06 18:01:36 - SSH > If you do not trust this host, press Return to abandon the . 2018.04.06 18:01:36 - SSH > connection. . 2018.04.06 18:01:36 - SSH > Store key in cache? (y/n) Initialised AES-256 SDCTR client->server encryption . 2018.04.06 18:01:36 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm . 2018.04.06 18:01:36 - SSH > Initialised AES-256 SDCTR server->client encryption . 2018.04.06 18:01:36 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm . 2018.04.06 18:01:37 - SSH > Reading private key file "C:\Users\Silver Scorpion\AppData\Local\AirVPN\d16759c832797a66dd8946ef464cc368c36ebc9e441cf23d2d1a673ee2c33560.tmp.ppk" . 2018.04.06 18:01:37 - SSH > Using username "sshtunnel". . 2018.04.06 18:01:37 - SSH > Offered public key . 2018.04.06 18:01:37 - SSH > Offer of public key accepted . 2018.04.06 18:01:37 - SSH > Authenticating with public key "" . 2018.04.06 18:01:37 - SSH > Sent public key signature . 2018.04.06 18:01:37 - SSH > Access granted . 2018.04.06 18:01:37 - SSH > Local port 41961 forwarding to 127.0.0.1:2018 . 2018.04.06 18:01:37 - SSH > Remote debug message: PTY allocation disabled. . 2018.04.06 18:01:37 - SSH > Remote debug message: X11 forwarding disabled. . 2018.04.06 18:01:37 - SSH > Remote debug message: Forced command. . 2018.04.06 18:01:37 - SSH > Remote debug message: PTY allocation disabled. . 2018.04.06 18:01:37 - SSH > Remote debug message: X11 forwarding disabled. . 2018.04.06 18:01:37 - SSH > Remote debug message: Forced command. . 2018.04.06 18:01:37 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017 . 2018.04.06 18:01:37 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 32bit . 2018.04.06 18:01:37 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2018.04.06 18:01:37 - Connection to OpenVPN Management Interface . 2018.04.06 18:01:37 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2018.04.06 18:01:37 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.04.06 18:01:37 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.04.06 18:01:37 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:41961 . 2018.04.06 18:01:37 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288] . 2018.04.06 18:01:37 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:41961 [nonblock] . 2018.04.06 18:01:37 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:41961 . 2018.04.06 18:01:37 - OpenVPN > TCP_CLIENT link local: (not bound) . 2018.04.06 18:01:37 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:41961 . 2018.04.06 18:01:37 - SSH > Opening connection to 127.0.0.1:2018 for forwarding from 127.0.0.1:62262 . 2018.04.06 18:01:37 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2018.04.06 18:01:37 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:41961, sid=05f2f7c7 cdb3fb3e . 2018.04.06 18:01:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.04.06 18:01:38 - OpenVPN > VERIFY KU OK . 2018.04.06 18:01:38 - OpenVPN > Validating certificate extended key usage . 2018.04.06 18:01:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.04.06 18:01:38 - OpenVPN > VERIFY EKU OK . 2018.04.06 18:01:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2018.04.06 18:01:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.04.06 18:01:38 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:41961 . 2018.04.06 18:01:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2018.04.06 18:01:40 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.93 255.255.0.0,peer-id 0,cipher AES-256-GCM' . 2018.04.06 18:01:40 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.04.06 18:01:40 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2018.04.06 18:01:40 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.04.06 18:01:40 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.04.06 18:01:40 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.04.06 18:01:40 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.04.06 18:01:40 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.04.06 18:01:40 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2018.04.06 18:01:40 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2018.04.06 18:01:40 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2018.04.06 18:01:40 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.04.06 18:01:40 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.04.06 18:01:40 - OpenVPN > interactive service msg_channel=0 . 2018.04.06 18:01:40 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=18 HWADDR=f0:7d:68:c1:b2:f7 . 2018.04.06 18:01:40 - OpenVPN > open_tun . 2018.04.06 18:01:40 - OpenVPN > TAP-WIN32 device [{DEE92E62-4608-4634-8C77-482D6B02C256}] opened: \\.\Global\{DEE92E62-4608-4634-8C77-482D6B02C256}.tap . 2018.04.06 18:01:40 - OpenVPN > TAP-Windows Driver Version 9.9 . 2018.04.06 18:01:40 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.1.93/255.255.0.0 [SUCCEEDED] . 2018.04.06 18:01:40 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.1.93/255.255.0.0 on interface {DEE92E62-4608-4634-8C77-482D6B02C256} [DHCP-serv: 10.50.255.254, lease-time: 31536000] . 2018.04.06 18:01:40 - OpenVPN > Successful ARP Flush on interface [19] {DEE92E62-4608-4634-8C77-482D6B02C256} . 2018.04.06 18:01:40 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2018.04.06 18:01:45 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2018.04.06 18:01:45 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2018.04.06 18:01:45 - Eddie Windows Interface Hack executed (Ethernet 3) . 2018.04.06 18:01:50 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2018.04.06 18:01:50 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1 . 2018.04.06 18:01:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2018.04.06 18:01:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:01:50 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1 . 2018.04.06 18:01:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2018.04.06 18:01:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:01:50 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1 . 2018.04.06 18:01:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2018.04.06 18:01:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:01:50 - OpenVPN > C:\Windows\system32\route.exe ADD 199.19.94.65 MASK 255.255.255.255 192.168.0.1 . 2018.04.06 18:01:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2018.04.06 18:01:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:01:50 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv4 . 2018.04.06 18:01:50 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv6 . 2018.04.06 18:01:50 - DNS leak protection with packet filtering enabled. . 2018.04.06 18:01:50 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.4.0.1) to 10.50.0.1) . 2018.04.06 18:01:50 - Flushing DNS I 2018.04.06 18:01:53 - Checking route . 2018.04.06 18:02:16 - curl: (7) Failed to connect to kraz_exit.airservers.org port 89: Timed out . 2018.04.06 18:02:16 - Checking route (2° try) . 2018.04.06 18:02:39 - curl: (7) Failed to connect to kraz_exit.airservers.org port 89: Timed out . 2018.04.06 18:02:39 - OpenVPN > Initialization Sequence Completed ! 2018.04.06 18:02:39 - Disconnecting . 2018.04.06 18:02:39 - Sending management termination signal . 2018.04.06 18:02:39 - Management - Send 'signal SIGTERM' . 2018.04.06 18:02:39 - Connection terminated. . 2018.04.06 18:02:39 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.4.0.1) . 2018.04.06 18:02:39 - DNS leak protection with packet filtering disabled. . 2018.04.06 18:02:39 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv4 . 2018.04.06 18:02:39 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv6 I 2018.04.06 18:02:39 - Cancel requested. . 2018.04.06 18:02:39 - IPv6 restored with packet filtering. ! 2018.04.06 18:02:39 - Session terminated. I 2018.04.06 18:03:24 - Session starting. . 2018.04.06 18:03:24 - IPv6 disabled with packet filtering. I 2018.04.06 18:03:24 - Checking authorization ... ! 2018.04.06 18:03:26 - Connecting to Sargas (Canada, Toronto, Ontario) . 2018.04.06 18:03:26 - SSH > Looking up host "184.75.223.196" . 2018.04.06 18:03:26 - SSH > Connecting to 184.75.223.196 port 38915 . 2018.04.06 18:03:26 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.67 . 2018.04.06 18:03:27 - SSH > Server version: SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u2 . 2018.04.06 18:03:27 - SSH > Using SSH protocol version 2 . 2018.04.06 18:03:27 - SSH > Doing Diffie-Hellman group exchange . 2018.04.06 18:03:27 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256 . 2018.04.06 18:03:27 - SSH > Host key fingerprint is: . 2018.04.06 18:03:27 - SSH > ssh-rsa 2048 57:2f:cb:7a:95:ea:ac:bb:58:b3:34:54:7b:3f:37:a8 . 2018.04.06 18:03:27 - SSH > The server's host key is not cached in the registry. You . 2018.04.06 18:03:27 - SSH > have no guarantee that the server is the computer you . 2018.04.06 18:03:27 - SSH > think it is. . 2018.04.06 18:03:27 - SSH > The server's rsa2 key fingerprint is: . 2018.04.06 18:03:27 - SSH > ssh-rsa 2048 57:2f:cb:7a:95:ea:ac:bb:58:b3:34:54:7b:3f:37:a8 . 2018.04.06 18:03:27 - SSH > If you trust this host, enter "y" to add the key to . 2018.04.06 18:03:27 - SSH > PuTTY's cache and carry on connecting. . 2018.04.06 18:03:27 - SSH > If you want to carry on connecting just once, without . 2018.04.06 18:03:27 - SSH > adding the key to the cache, enter "n". . 2018.04.06 18:03:27 - SSH > If you do not trust this host, press Return to abandon the . 2018.04.06 18:03:27 - SSH > connection. . 2018.04.06 18:03:27 - SSH > Store key in cache? (y/n) Initialised AES-256 SDCTR client->server encryption . 2018.04.06 18:03:27 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm . 2018.04.06 18:03:27 - SSH > Initialised AES-256 SDCTR server->client encryption . 2018.04.06 18:03:27 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm . 2018.04.06 18:03:28 - SSH > Reading private key file "C:\Users\Silver Scorpion\AppData\Local\AirVPN\8330857f5caebe135dd80442d1bf49ccbbea386d82deb2ce3961102427c59bb7.tmp.ppk" . 2018.04.06 18:03:28 - SSH > Using username "sshtunnel". . 2018.04.06 18:03:28 - SSH > Offered public key . 2018.04.06 18:03:28 - SSH > Offer of public key accepted . 2018.04.06 18:03:28 - SSH > Authenticating with public key "" . 2018.04.06 18:03:28 - SSH > Sent public key signature . 2018.04.06 18:03:28 - SSH > Access granted . 2018.04.06 18:03:28 - SSH > Local port 27544 forwarding to 127.0.0.1:2018 . 2018.04.06 18:03:28 - SSH > Remote debug message: PTY allocation disabled. . 2018.04.06 18:03:28 - SSH > Remote debug message: X11 forwarding disabled. . 2018.04.06 18:03:28 - SSH > Remote debug message: Forced command. . 2018.04.06 18:03:28 - SSH > Remote debug message: PTY allocation disabled. . 2018.04.06 18:03:28 - SSH > Remote debug message: X11 forwarding disabled. . 2018.04.06 18:03:28 - SSH > Remote debug message: Forced command. . 2018.04.06 18:03:28 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017 . 2018.04.06 18:03:28 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 32bit . 2018.04.06 18:03:28 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2018.04.06 18:03:28 - Connection to OpenVPN Management Interface . 2018.04.06 18:03:28 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2018.04.06 18:03:28 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.04.06 18:03:28 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.04.06 18:03:28 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:27544 . 2018.04.06 18:03:28 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288] . 2018.04.06 18:03:28 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:27544 [nonblock] . 2018.04.06 18:03:28 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:27544 . 2018.04.06 18:03:28 - SSH > Opening connection to 127.0.0.1:2018 for forwarding from 127.0.0.1:62286 . 2018.04.06 18:03:28 - OpenVPN > TCP_CLIENT link local: (not bound) . 2018.04.06 18:03:28 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:27544 . 2018.04.06 18:03:28 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2018.04.06 18:03:28 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:27544, sid=dbdec64a 5b8b30ff . 2018.04.06 18:03:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.04.06 18:03:29 - OpenVPN > VERIFY KU OK . 2018.04.06 18:03:29 - OpenVPN > Validating certificate extended key usage . 2018.04.06 18:03:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.04.06 18:03:29 - OpenVPN > VERIFY EKU OK . 2018.04.06 18:03:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2018.04.06 18:03:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.04.06 18:03:29 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:27544 . 2018.04.06 18:03:30 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2018.04.06 18:03:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.210 255.255.0.0,peer-id 0,cipher AES-256-GCM' . 2018.04.06 18:03:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.04.06 18:03:31 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2018.04.06 18:03:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.04.06 18:03:31 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.04.06 18:03:31 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.04.06 18:03:31 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.04.06 18:03:31 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.04.06 18:03:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2018.04.06 18:03:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2018.04.06 18:03:31 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2018.04.06 18:03:31 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.04.06 18:03:31 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.04.06 18:03:31 - OpenVPN > interactive service msg_channel=0 . 2018.04.06 18:03:31 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=18 HWADDR=f0:7d:68:c1:b2:f7 . 2018.04.06 18:03:31 - OpenVPN > open_tun . 2018.04.06 18:03:31 - OpenVPN > TAP-WIN32 device [{DEE92E62-4608-4634-8C77-482D6B02C256}] opened: \\.\Global\{DEE92E62-4608-4634-8C77-482D6B02C256}.tap . 2018.04.06 18:03:31 - OpenVPN > TAP-Windows Driver Version 9.9 . 2018.04.06 18:03:31 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.210/255.255.0.0 [SUCCEEDED] . 2018.04.06 18:03:31 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.210/255.255.0.0 on interface {DEE92E62-4608-4634-8C77-482D6B02C256} [DHCP-serv: 10.50.255.254, lease-time: 31536000] . 2018.04.06 18:03:31 - OpenVPN > Successful ARP Flush on interface [19] {DEE92E62-4608-4634-8C77-482D6B02C256} . 2018.04.06 18:03:31 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2018.04.06 18:03:36 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2018.04.06 18:03:36 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1 . 2018.04.06 18:03:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2018.04.06 18:03:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:03:36 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1 . 2018.04.06 18:03:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2018.04.06 18:03:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:03:36 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1 . 2018.04.06 18:03:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2018.04.06 18:03:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:03:36 - OpenVPN > C:\Windows\system32\route.exe ADD 184.75.223.196 MASK 255.255.255.255 192.168.0.1 . 2018.04.06 18:03:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2018.04.06 18:03:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:03:36 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv4 . 2018.04.06 18:03:36 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv6 . 2018.04.06 18:03:36 - DNS leak protection with packet filtering enabled. . 2018.04.06 18:03:36 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.4.0.1) to 10.50.0.1) . 2018.04.06 18:03:36 - Flushing DNS I 2018.04.06 18:03:39 - Checking route I 2018.04.06 18:03:43 - Checking DNS ! 2018.04.06 18:03:57 - Connected. . 2018.04.06 18:03:57 - OpenVPN > Initialization Sequence Completed . 2018.04.06 18:05:19 - Updating systems & servers data ... . 2018.04.06 18:05:26 - Systems & servers data update completed ! 2018.04.06 18:13:21 - Disconnecting . 2018.04.06 18:13:21 - Sending management termination signal . 2018.04.06 18:13:21 - Management - Send 'signal SIGTERM' . 2018.04.06 18:13:31 - Sending soft termination signal . 2018.04.06 18:13:31 - Connection terminated. . 2018.04.06 18:13:31 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.4.0.1) . 2018.04.06 18:13:31 - DNS leak protection with packet filtering disabled. . 2018.04.06 18:13:31 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv4 . 2018.04.06 18:13:31 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv6 . 2018.04.06 18:13:31 - Flushing DNS . 2018.04.06 18:13:35 - IPv6 restored with packet filtering. ! 2018.04.06 18:13:35 - Session terminated. I 2018.04.06 18:14:07 - Session starting. . 2018.04.06 18:14:08 - IPv6 disabled with packet filtering. I 2018.04.06 18:14:08 - Checking authorization ... ! 2018.04.06 18:14:09 - Connecting to Gemma (Canada, Vancouver) . 2018.04.06 18:14:09 - SSH > Looking up host "71.19.252.115" . 2018.04.06 18:14:09 - SSH > Connecting to 71.19.252.115 port 80 . 2018.04.06 18:14:09 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.67 . 2018.04.06 18:14:10 - SSH > Server version: SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u3 . 2018.04.06 18:14:10 - SSH > Using SSH protocol version 2 . 2018.04.06 18:14:10 - SSH > Doing Diffie-Hellman group exchange . 2018.04.06 18:14:10 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256 . 2018.04.06 18:14:10 - SSH > Host key fingerprint is: . 2018.04.06 18:14:10 - SSH > ssh-rsa 2048 d2:0d:ab:0d:88:5b:0b:e1:01:9a:08:29:98:35:8a:a2 . 2018.04.06 18:14:10 - SSH > The server's host key is not cached in the registry. You . 2018.04.06 18:14:10 - SSH > have no guarantee that the server is the computer you . 2018.04.06 18:14:10 - SSH > think it is. . 2018.04.06 18:14:10 - SSH > The server's rsa2 key fingerprint is: . 2018.04.06 18:14:10 - SSH > ssh-rsa 2048 d2:0d:ab:0d:88:5b:0b:e1:01:9a:08:29:98:35:8a:a2 . 2018.04.06 18:14:10 - SSH > If you trust this host, enter "y" to add the key to . 2018.04.06 18:14:10 - SSH > PuTTY's cache and carry on connecting. . 2018.04.06 18:14:10 - SSH > If you want to carry on connecting just once, without . 2018.04.06 18:14:10 - SSH > adding the key to the cache, enter "n". . 2018.04.06 18:14:10 - SSH > If you do not trust this host, press Return to abandon the . 2018.04.06 18:14:10 - SSH > connection. . 2018.04.06 18:14:10 - SSH > Store key in cache? (y/n) Initialised AES-256 SDCTR client->server encryption . 2018.04.06 18:14:10 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm . 2018.04.06 18:14:10 - SSH > Initialised AES-256 SDCTR server->client encryption . 2018.04.06 18:14:10 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm . 2018.04.06 18:14:10 - SSH > Reading private key file "C:\Users\Silver Scorpion\AppData\Local\AirVPN\05e0dd6365a37fdd28a4818d06d9e081601893c69cce8498d99005c46ee0f0b0.tmp.ppk" . 2018.04.06 18:14:11 - SSH > Using username "sshtunnel". . 2018.04.06 18:14:11 - SSH > Offered public key . 2018.04.06 18:14:11 - SSH > Offer of public key accepted . 2018.04.06 18:14:11 - SSH > Authenticating with public key "" . 2018.04.06 18:14:11 - SSH > Sent public key signature . 2018.04.06 18:14:11 - SSH > Access granted . 2018.04.06 18:14:11 - SSH > Local port 33984 forwarding to 127.0.0.1:2018 . 2018.04.06 18:14:11 - SSH > Remote debug message: PTY allocation disabled. . 2018.04.06 18:14:11 - SSH > Remote debug message: X11 forwarding disabled. . 2018.04.06 18:14:11 - SSH > Remote debug message: Forced command. . 2018.04.06 18:14:11 - SSH > Remote debug message: PTY allocation disabled. . 2018.04.06 18:14:11 - SSH > Remote debug message: X11 forwarding disabled. . 2018.04.06 18:14:11 - SSH > Remote debug message: Forced command. . 2018.04.06 18:14:11 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017 . 2018.04.06 18:14:11 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 32bit . 2018.04.06 18:14:11 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2018.04.06 18:14:11 - Connection to OpenVPN Management Interface . 2018.04.06 18:14:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2018.04.06 18:14:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.04.06 18:14:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.04.06 18:14:11 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:33984 . 2018.04.06 18:14:11 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288] . 2018.04.06 18:14:11 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:33984 [nonblock] . 2018.04.06 18:14:11 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:33984 . 2018.04.06 18:14:11 - OpenVPN > TCP_CLIENT link local: (not bound) . 2018.04.06 18:14:11 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:33984 . 2018.04.06 18:14:11 - SSH > Opening connection to 127.0.0.1:2018 for forwarding from 127.0.0.1:64669 . 2018.04.06 18:14:11 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2018.04.06 18:14:11 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:33984, sid=d545eb41 ae311510 . 2018.04.06 18:14:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.04.06 18:14:12 - OpenVPN > VERIFY KU OK . 2018.04.06 18:14:12 - OpenVPN > Validating certificate extended key usage . 2018.04.06 18:14:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.04.06 18:14:12 - OpenVPN > VERIFY EKU OK . 2018.04.06 18:14:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2018.04.06 18:14:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.04.06 18:14:12 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:33984 . 2018.04.06 18:14:13 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2018.04.06 18:14:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.37 255.255.0.0,peer-id 0,cipher AES-256-GCM' . 2018.04.06 18:14:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.04.06 18:14:13 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2018.04.06 18:14:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.04.06 18:14:13 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.04.06 18:14:13 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.04.06 18:14:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.04.06 18:14:13 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.04.06 18:14:13 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2018.04.06 18:14:13 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2018.04.06 18:14:13 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2018.04.06 18:14:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.04.06 18:14:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.04.06 18:14:13 - OpenVPN > interactive service msg_channel=0 . 2018.04.06 18:14:13 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=18 HWADDR=f0:7d:68:c1:b2:f7 . 2018.04.06 18:14:13 - OpenVPN > open_tun . 2018.04.06 18:14:14 - OpenVPN > TAP-WIN32 device [{DEE92E62-4608-4634-8C77-482D6B02C256}] opened: \\.\Global\{DEE92E62-4608-4634-8C77-482D6B02C256}.tap . 2018.04.06 18:14:14 - OpenVPN > TAP-Windows Driver Version 9.9 . 2018.04.06 18:14:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.37/255.255.0.0 [SUCCEEDED] . 2018.04.06 18:14:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.37/255.255.0.0 on interface {DEE92E62-4608-4634-8C77-482D6B02C256} [DHCP-serv: 10.50.255.254, lease-time: 31536000] . 2018.04.06 18:14:14 - OpenVPN > Successful ARP Flush on interface [19] {DEE92E62-4608-4634-8C77-482D6B02C256} . 2018.04.06 18:14:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2018.04.06 18:14:19 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2018.04.06 18:14:19 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1 . 2018.04.06 18:14:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2018.04.06 18:14:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:14:19 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1 . 2018.04.06 18:14:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2018.04.06 18:14:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:14:19 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1 . 2018.04.06 18:14:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2018.04.06 18:14:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:14:19 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.252.115 MASK 255.255.255.255 192.168.0.1 . 2018.04.06 18:14:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2018.04.06 18:14:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:14:19 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv4 . 2018.04.06 18:14:19 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv6 . 2018.04.06 18:14:19 - DNS leak protection with packet filtering enabled. . 2018.04.06 18:14:19 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.4.0.1) to 10.50.0.1) . 2018.04.06 18:14:19 - Flushing DNS I 2018.04.06 18:14:22 - Checking route I 2018.04.06 18:14:26 - Checking DNS ! 2018.04.06 18:14:40 - Connected. . 2018.04.06 18:14:40 - OpenVPN > Initialization Sequence Completed . 2018.04.06 18:16:19 - Updating systems & servers data ... . 2018.04.06 18:16:23 - Systems & servers data update completed ! 2018.04.06 18:19:42 - Disconnecting . 2018.04.06 18:19:42 - Sending management termination signal . 2018.04.06 18:19:42 - Management - Send 'signal SIGTERM' . 2018.04.06 18:19:51 - Sending soft termination signal . 2018.04.06 18:19:51 - Connection terminated. . 2018.04.06 18:19:51 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.4.0.1) . 2018.04.06 18:19:51 - DNS leak protection with packet filtering disabled. . 2018.04.06 18:19:51 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv4 . 2018.04.06 18:19:51 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv6 . 2018.04.06 18:19:51 - Flushing DNS . 2018.04.06 18:19:55 - IPv6 restored with packet filtering. ! 2018.04.06 18:19:55 - Session terminated. I 2018.04.06 18:20:27 - Session starting. . 2018.04.06 18:20:27 - IPv6 disabled with packet filtering. I 2018.04.06 18:20:27 - Checking authorization ... ! 2018.04.06 18:20:29 - Connecting to Gemma (Canada, Vancouver) . 2018.04.06 18:20:31 - SSL > 2018.04.06 18:20:31 LOG5[ui]: stunnel 5.40 on x86-pc-mingw32-gnu platform . 2018.04.06 18:20:31 - SSL > 2018.04.06 18:20:31 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k 26 Jan 2017 . 2018.04.06 18:20:31 - SSL > 2018.04.06 18:20:31 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2018.04.06 18:20:31 - SSL > 2018.04.06 18:20:31 LOG5[ui]: Reading configuration from file C:\Users\Silver Scorpion\AppData\Local\AirVPN\e0677a1d3c3fcdad12d49875985c30dbc9c950370a44b5d53f33a9f1980e47d4.tmp.ssl . 2018.04.06 18:20:31 - SSL > 2018.04.06 18:20:31 LOG5[ui]: UTF-8 byte order mark not detected . 2018.04.06 18:20:31 - SSL > 2018.04.06 18:20:31 LOG6[ui]: Initializing service [openvpn] . 2018.04.06 18:20:31 - SSL > 2018.04.06 18:20:31 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2018.04.06 18:20:31 - SSL > 2018.04.06 18:20:31 LOG5[ui]: Configuration successful . 2018.04.06 18:20:31 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017 . 2018.04.06 18:20:31 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 32bit . 2018.04.06 18:20:31 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2018.04.06 18:20:31 - Connection to OpenVPN Management Interface . 2018.04.06 18:20:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2018.04.06 18:20:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.04.06 18:20:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.04.06 18:20:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:58740 . 2018.04.06 18:20:31 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288] . 2018.04.06 18:20:31 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:58740 [nonblock] . 2018.04.06 18:20:31 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:58740 . 2018.04.06 18:20:31 - OpenVPN > TCP_CLIENT link local: (not bound) . 2018.04.06 18:20:31 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:58740 . 2018.04.06 18:20:31 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2018.04.06 18:20:31 - SSL > 2018.04.06 18:20:31 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:49795 . 2018.04.06 18:20:31 - SSL > 2018.04.06 18:20:31 LOG6[0]: s_connect: connecting 71.19.252.115:28439 . 2018.04.06 18:20:31 - SSL > 2018.04.06 18:20:31 LOG5[0]: s_connect: connected 71.19.252.115:28439 . 2018.04.06 18:20:31 - SSL > 2018.04.06 18:20:31 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.2:49796 . 2018.04.06 18:20:31 - SSL > 2018.04.06 18:20:31 LOG6[0]: SNI: sending servername: 71.19.252.115 . 2018.04.06 18:20:31 - SSL > 2018.04.06 18:20:31 LOG6[0]: Peer certificate not required . 2018.04.06 18:20:32 - SSL > 2018.04.06 18:20:32 LOG6[0]: Certificate verification disabled . 2018.04.06 18:20:32 - SSL > 2018.04.06 18:20:32 LOG6[0]: Client certificate not requested . 2018.04.06 18:20:32 - SSL > 2018.04.06 18:20:32 LOG6[0]: TLS connected: new session negotiated . 2018.04.06 18:20:32 - SSL > 2018.04.06 18:20:32 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption) . 2018.04.06 18:20:32 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:58740, sid=f77ea4fa cf673201 . 2018.04.06 18:20:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.04.06 18:20:32 - OpenVPN > VERIFY KU OK . 2018.04.06 18:20:32 - OpenVPN > Validating certificate extended key usage . 2018.04.06 18:20:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.04.06 18:20:32 - OpenVPN > VERIFY EKU OK . 2018.04.06 18:20:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2018.04.06 18:20:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.04.06 18:20:32 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:58740 . 2018.04.06 18:20:33 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2018.04.06 18:20:33 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.37 255.255.0.0,peer-id 0,cipher AES-256-GCM' . 2018.04.06 18:20:33 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.04.06 18:20:33 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2018.04.06 18:20:33 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.04.06 18:20:33 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.04.06 18:20:33 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.04.06 18:20:33 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.04.06 18:20:33 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.04.06 18:20:33 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2018.04.06 18:20:33 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2018.04.06 18:20:33 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2018.04.06 18:20:33 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.04.06 18:20:33 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.04.06 18:20:33 - OpenVPN > interactive service msg_channel=0 . 2018.04.06 18:20:33 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=18 HWADDR=f0:7d:68:c1:b2:f7 . 2018.04.06 18:20:33 - OpenVPN > open_tun . 2018.04.06 18:20:34 - OpenVPN > TAP-WIN32 device [{DEE92E62-4608-4634-8C77-482D6B02C256}] opened: \\.\Global\{DEE92E62-4608-4634-8C77-482D6B02C256}.tap . 2018.04.06 18:20:34 - OpenVPN > TAP-Windows Driver Version 9.9 . 2018.04.06 18:20:34 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.37/255.255.0.0 [SUCCEEDED] . 2018.04.06 18:20:34 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.37/255.255.0.0 on interface {DEE92E62-4608-4634-8C77-482D6B02C256} [DHCP-serv: 10.50.255.254, lease-time: 31536000] . 2018.04.06 18:20:34 - OpenVPN > Successful ARP Flush on interface [19] {DEE92E62-4608-4634-8C77-482D6B02C256} . 2018.04.06 18:20:34 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2018.04.06 18:20:38 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2018.04.06 18:20:38 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1 . 2018.04.06 18:20:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2018.04.06 18:20:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:20:38 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1 . 2018.04.06 18:20:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2018.04.06 18:20:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:20:38 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1 . 2018.04.06 18:20:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2018.04.06 18:20:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:20:38 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.252.115 MASK 255.255.255.255 192.168.0.1 . 2018.04.06 18:20:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2018.04.06 18:20:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:20:38 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv4 . 2018.04.06 18:20:38 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv6 . 2018.04.06 18:20:38 - DNS leak protection with packet filtering enabled. . 2018.04.06 18:20:39 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.4.0.1) to 10.50.0.1) . 2018.04.06 18:20:39 - Flushing DNS I 2018.04.06 18:20:42 - Checking route I 2018.04.06 18:20:45 - Checking DNS ! 2018.04.06 18:20:58 - Connected. . 2018.04.06 18:20:58 - OpenVPN > Initialization Sequence Completed . 2018.04.06 18:21:31 - SSL > 2018.04.06 18:21:31 LOG6[cron]: Executing cron jobs . 2018.04.06 18:21:31 - SSL > 2018.04.06 18:21:31 LOG6[cron]: Cron jobs completed in 0 seconds ! 2018.04.06 18:25:00 - Disconnecting . 2018.04.06 18:25:00 - Sending management termination signal . 2018.04.06 18:25:00 - Management - Send 'signal SIGTERM' . 2018.04.06 18:25:09 - Sending soft termination signal . 2018.04.06 18:25:09 - Connection terminated. . 2018.04.06 18:25:09 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.4.0.1) . 2018.04.06 18:25:09 - DNS leak protection with packet filtering disabled. . 2018.04.06 18:25:09 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv4 . 2018.04.06 18:25:09 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv6 . 2018.04.06 18:25:09 - Flushing DNS . 2018.04.06 18:25:13 - IPv6 restored with packet filtering. ! 2018.04.06 18:25:13 - Session terminated. I 2018.04.06 18:25:47 - Session starting. . 2018.04.06 18:25:47 - IPv6 disabled with packet filtering. I 2018.04.06 18:25:47 - Checking authorization ... ! 2018.04.06 18:25:49 - Connecting to Gemma (Canada, Vancouver) . 2018.04.06 18:25:49 - SSH > Looking up host "71.19.252.113" . 2018.04.06 18:25:49 - SSH > Connecting to 71.19.252.113 port 38915 . 2018.04.06 18:25:49 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.67 . 2018.04.06 18:25:49 - SSH > Server version: SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u3 . 2018.04.06 18:25:49 - SSH > Using SSH protocol version 2 . 2018.04.06 18:25:49 - SSH > Doing Diffie-Hellman group exchange . 2018.04.06 18:25:49 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256 . 2018.04.06 18:25:50 - SSH > Host key fingerprint is: . 2018.04.06 18:25:50 - SSH > ssh-rsa 2048 d2:0d:ab:0d:88:5b:0b:e1:01:9a:08:29:98:35:8a:a2 . 2018.04.06 18:25:50 - SSH > The server's host key is not cached in the registry. You . 2018.04.06 18:25:50 - SSH > have no guarantee that the server is the computer you . 2018.04.06 18:25:50 - SSH > think it is. . 2018.04.06 18:25:50 - SSH > The server's rsa2 key fingerprint is: . 2018.04.06 18:25:50 - SSH > ssh-rsa 2048 d2:0d:ab:0d:88:5b:0b:e1:01:9a:08:29:98:35:8a:a2 . 2018.04.06 18:25:50 - SSH > If you trust this host, enter "y" to add the key to . 2018.04.06 18:25:50 - SSH > PuTTY's cache and carry on connecting. . 2018.04.06 18:25:50 - SSH > If you want to carry on connecting just once, without . 2018.04.06 18:25:50 - SSH > adding the key to the cache, enter "n". . 2018.04.06 18:25:50 - SSH > If you do not trust this host, press Return to abandon the . 2018.04.06 18:25:50 - SSH > connection. . 2018.04.06 18:25:50 - SSH > Store key in cache? (y/n) Initialised AES-256 SDCTR client->server encryption . 2018.04.06 18:25:50 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm . 2018.04.06 18:25:50 - SSH > Initialised AES-256 SDCTR server->client encryption . 2018.04.06 18:25:50 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm . 2018.04.06 18:25:50 - SSH > Reading private key file "C:\Users\Silver Scorpion\AppData\Local\AirVPN\3bd4e8723ff56457f24f3dcf12035611f1cd7ca15a9e8695d212ad924e4bc84d.tmp.ppk" . 2018.04.06 18:25:50 - SSH > Using username "sshtunnel". . 2018.04.06 18:25:50 - SSH > Offered public key . 2018.04.06 18:25:50 - SSH > Offer of public key accepted . 2018.04.06 18:25:50 - SSH > Authenticating with public key "" . 2018.04.06 18:25:50 - SSH > Sent public key signature . 2018.04.06 18:25:51 - SSH > Access granted . 2018.04.06 18:25:51 - SSH > Local port 1886 forwarding to 127.0.0.1:2018 . 2018.04.06 18:25:51 - SSH > Remote debug message: PTY allocation disabled. . 2018.04.06 18:25:51 - SSH > Remote debug message: X11 forwarding disabled. . 2018.04.06 18:25:51 - SSH > Remote debug message: Forced command. . 2018.04.06 18:25:51 - SSH > Remote debug message: PTY allocation disabled. . 2018.04.06 18:25:51 - SSH > Remote debug message: X11 forwarding disabled. . 2018.04.06 18:25:51 - SSH > Remote debug message: Forced command. . 2018.04.06 18:25:51 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017 . 2018.04.06 18:25:51 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 32bit . 2018.04.06 18:25:51 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2018.04.06 18:25:51 - Connection to OpenVPN Management Interface . 2018.04.06 18:25:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2018.04.06 18:25:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.04.06 18:25:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.04.06 18:25:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1886 . 2018.04.06 18:25:51 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288] . 2018.04.06 18:25:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:1886 [nonblock] . 2018.04.06 18:25:51 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:1886 . 2018.04.06 18:25:51 - OpenVPN > TCP_CLIENT link local: (not bound) . 2018.04.06 18:25:51 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:1886 . 2018.04.06 18:25:51 - SSH > Opening connection to 127.0.0.1:2018 for forwarding from 127.0.0.1:51350 . 2018.04.06 18:25:51 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2018.04.06 18:25:51 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:1886, sid=e2d6e4ba 4e03e326 . 2018.04.06 18:25:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.04.06 18:25:51 - OpenVPN > VERIFY KU OK . 2018.04.06 18:25:51 - OpenVPN > Validating certificate extended key usage . 2018.04.06 18:25:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.04.06 18:25:51 - OpenVPN > VERIFY EKU OK . 2018.04.06 18:25:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2018.04.06 18:25:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.04.06 18:25:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:1886 . 2018.04.06 18:25:53 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2018.04.06 18:25:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.37 255.255.0.0,peer-id 0,cipher AES-256-GCM' . 2018.04.06 18:25:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.04.06 18:25:54 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2018.04.06 18:25:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.04.06 18:25:54 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.04.06 18:25:54 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.04.06 18:25:54 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.04.06 18:25:54 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.04.06 18:25:54 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2018.04.06 18:25:54 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2018.04.06 18:25:54 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2018.04.06 18:25:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.04.06 18:25:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.04.06 18:25:54 - OpenVPN > interactive service msg_channel=0 . 2018.04.06 18:25:54 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=18 HWADDR=f0:7d:68:c1:b2:f7 . 2018.04.06 18:25:54 - OpenVPN > open_tun . 2018.04.06 18:25:54 - OpenVPN > TAP-WIN32 device [{DEE92E62-4608-4634-8C77-482D6B02C256}] opened: \\.\Global\{DEE92E62-4608-4634-8C77-482D6B02C256}.tap . 2018.04.06 18:25:54 - OpenVPN > TAP-Windows Driver Version 9.9 . 2018.04.06 18:25:54 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.37/255.255.0.0 [SUCCEEDED] . 2018.04.06 18:25:54 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.37/255.255.0.0 on interface {DEE92E62-4608-4634-8C77-482D6B02C256} [DHCP-serv: 10.50.255.254, lease-time: 31536000] . 2018.04.06 18:25:54 - OpenVPN > Successful ARP Flush on interface [19] {DEE92E62-4608-4634-8C77-482D6B02C256} . 2018.04.06 18:25:54 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2018.04.06 18:25:59 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2018.04.06 18:25:59 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1 . 2018.04.06 18:25:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2018.04.06 18:25:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:25:59 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1 . 2018.04.06 18:25:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2018.04.06 18:25:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:25:59 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1 . 2018.04.06 18:25:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2018.04.06 18:25:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:25:59 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.0.1 . 2018.04.06 18:25:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2018.04.06 18:25:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:25:59 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv4 . 2018.04.06 18:25:59 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv6 . 2018.04.06 18:25:59 - DNS leak protection with packet filtering enabled. . 2018.04.06 18:25:59 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.4.0.1) to 10.50.0.1) . 2018.04.06 18:25:59 - Flushing DNS I 2018.04.06 18:26:02 - Checking route I 2018.04.06 18:26:06 - Checking DNS ! 2018.04.06 18:26:20 - Connected. . 2018.04.06 18:26:20 - OpenVPN > Initialization Sequence Completed . 2018.04.06 18:26:40 - Updating systems & servers data ... . 2018.04.06 18:26:44 - Systems & servers data update completed ! 2018.04.06 18:30:12 - Disconnecting . 2018.04.06 18:30:12 - Sending management termination signal . 2018.04.06 18:30:12 - Management - Send 'signal SIGTERM' . 2018.04.06 18:30:21 - Sending soft termination signal . 2018.04.06 18:30:21 - Connection terminated. . 2018.04.06 18:30:21 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.4.0.1) . 2018.04.06 18:30:21 - DNS leak protection with packet filtering disabled. . 2018.04.06 18:30:21 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv4 . 2018.04.06 18:30:21 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv6 . 2018.04.06 18:30:21 - Flushing DNS . 2018.04.06 18:30:24 - IPv6 restored with packet filtering. ! 2018.04.06 18:30:25 - Session terminated. I 2018.04.06 18:31:00 - Session starting. . 2018.04.06 18:31:00 - IPv6 disabled with packet filtering. I 2018.04.06 18:31:00 - Checking authorization ... ! 2018.04.06 18:31:02 - Connecting to Homam (Canada, Vancouver) . 2018.04.06 18:31:04 - SSL > 2018.04.06 18:31:04 LOG5[ui]: stunnel 5.40 on x86-pc-mingw32-gnu platform . 2018.04.06 18:31:04 - SSL > 2018.04.06 18:31:04 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k 26 Jan 2017 . 2018.04.06 18:31:04 - SSL > 2018.04.06 18:31:04 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2018.04.06 18:31:04 - SSL > 2018.04.06 18:31:04 LOG5[ui]: Reading configuration from file C:\Users\Silver Scorpion\AppData\Local\AirVPN\a37bb67b0145fc0bbabb91dbffaff8cd01a83e53e97c064d2bf11f25571ab79c.tmp.ssl . 2018.04.06 18:31:04 - SSL > 2018.04.06 18:31:04 LOG5[ui]: UTF-8 byte order mark not detected . 2018.04.06 18:31:04 - SSL > 2018.04.06 18:31:04 LOG6[ui]: Initializing service [openvpn] . 2018.04.06 18:31:04 - SSL > 2018.04.06 18:31:04 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2018.04.06 18:31:04 - SSL > 2018.04.06 18:31:04 LOG5[ui]: Configuration successful . 2018.04.06 18:31:04 - OpenVPN > OpenVPN 2.4.3 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017 . 2018.04.06 18:31:04 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 32bit . 2018.04.06 18:31:04 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2018.04.06 18:31:04 - Connection to OpenVPN Management Interface . 2018.04.06 18:31:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2018.04.06 18:31:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.04.06 18:31:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.04.06 18:31:04 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:17009 . 2018.04.06 18:31:04 - OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288] . 2018.04.06 18:31:04 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:17009 [nonblock] . 2018.04.06 18:31:04 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:17009 . 2018.04.06 18:31:04 - OpenVPN > TCP_CLIENT link local: (not bound) . 2018.04.06 18:31:04 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:17009 . 2018.04.06 18:31:04 - SSL > 2018.04.06 18:31:04 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:53086 . 2018.04.06 18:31:04 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2018.04.06 18:31:04 - SSL > 2018.04.06 18:31:04 LOG6[0]: s_connect: connecting 71.19.252.28:443 . 2018.04.06 18:31:04 - SSL > 2018.04.06 18:31:04 LOG5[0]: s_connect: connected 71.19.252.28:443 . 2018.04.06 18:31:04 - SSL > 2018.04.06 18:31:04 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.2:53087 . 2018.04.06 18:31:04 - SSL > 2018.04.06 18:31:04 LOG6[0]: SNI: sending servername: 71.19.252.28 . 2018.04.06 18:31:04 - SSL > 2018.04.06 18:31:04 LOG6[0]: Peer certificate not required . 2018.04.06 18:31:05 - SSL > 2018.04.06 18:31:04 LOG6[0]: Certificate verification disabled . 2018.04.06 18:31:05 - SSL > 2018.04.06 18:31:04 LOG6[0]: Client certificate not requested . 2018.04.06 18:31:05 - SSL > 2018.04.06 18:31:05 LOG6[0]: TLS connected: new session negotiated . 2018.04.06 18:31:05 - SSL > 2018.04.06 18:31:05 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption) . 2018.04.06 18:31:05 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:17009, sid=d83a9004 291ea812 . 2018.04.06 18:31:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.04.06 18:31:05 - OpenVPN > VERIFY KU OK . 2018.04.06 18:31:05 - OpenVPN > Validating certificate extended key usage . 2018.04.06 18:31:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.04.06 18:31:05 - OpenVPN > VERIFY EKU OK . 2018.04.06 18:31:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Homam, emailAddress=info@airvpn.org . 2018.04.06 18:31:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.04.06 18:31:05 - OpenVPN > [Homam] Peer Connection Initiated with [AF_INET]127.0.0.1:17009 . 2018.04.06 18:31:06 - OpenVPN > SENT CONTROL [Homam]: 'PUSH_REQUEST' (status=1) . 2018.04.06 18:31:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.2.181 255.255.0.0,peer-id 0,cipher AES-256-GCM' . 2018.04.06 18:31:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.04.06 18:31:06 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2018.04.06 18:31:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.04.06 18:31:06 - OpenVPN > OPTIONS IMPORT: route options modified . 2018.04.06 18:31:06 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.04.06 18:31:06 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.04.06 18:31:06 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.04.06 18:31:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2018.04.06 18:31:06 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2018.04.06 18:31:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2018.04.06 18:31:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.04.06 18:31:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.04.06 18:31:06 - OpenVPN > interactive service msg_channel=0 . 2018.04.06 18:31:06 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=18 HWADDR=f0:7d:68:c1:b2:f7 . 2018.04.06 18:31:06 - OpenVPN > open_tun . 2018.04.06 18:31:07 - OpenVPN > TAP-WIN32 device [{DEE92E62-4608-4634-8C77-482D6B02C256}] opened: \\.\Global\{DEE92E62-4608-4634-8C77-482D6B02C256}.tap . 2018.04.06 18:31:07 - OpenVPN > TAP-Windows Driver Version 9.9 . 2018.04.06 18:31:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.2.181/255.255.0.0 [SUCCEEDED] . 2018.04.06 18:31:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.2.181/255.255.0.0 on interface {DEE92E62-4608-4634-8C77-482D6B02C256} [DHCP-serv: 10.50.255.254, lease-time: 31536000] . 2018.04.06 18:31:07 - OpenVPN > Successful ARP Flush on interface [19] {DEE92E62-4608-4634-8C77-482D6B02C256} . 2018.04.06 18:31:07 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2018.04.06 18:31:11 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2018.04.06 18:31:11 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1 . 2018.04.06 18:31:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2018.04.06 18:31:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:31:11 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1 . 2018.04.06 18:31:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2018.04.06 18:31:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:31:11 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1 . 2018.04.06 18:31:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2018.04.06 18:31:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:31:11 - OpenVPN > C:\Windows\system32\route.exe ADD 71.19.252.28 MASK 255.255.255.255 192.168.0.1 . 2018.04.06 18:31:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2018.04.06 18:31:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.04.06 18:31:12 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv4 . 2018.04.06 18:31:12 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv6 . 2018.04.06 18:31:12 - DNS leak protection with packet filtering enabled. . 2018.04.06 18:31:12 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.4.0.1) to 10.50.0.1) . 2018.04.06 18:31:12 - Flushing DNS I 2018.04.06 18:31:15 - Checking route I 2018.04.06 18:31:18 - Checking DNS ! 2018.04.06 18:31:31 - Connected. . 2018.04.06 18:31:31 - OpenVPN > Initialization Sequence Completed . 2018.04.06 18:32:04 - SSL > 2018.04.06 18:32:04 LOG6[cron]: Executing cron jobs . 2018.04.06 18:32:04 - SSL > 2018.04.06 18:32:04 LOG6[cron]: Cron jobs completed in 0 seconds . 2018.04.06 18:37:43 - Updating systems & servers data ... . 2018.04.06 18:37:47 - Systems & servers data update completed ---------------------------- Network Interfaces: Network Interface: Ethernet 3 (TAP-Windows Adapter V9, ID:{DEE92E62-4608-4634-8C77-482D6B02C256}) - Ethernet - Up Network Interface: Ethernet (Intel(R) 82562V-2 10/100 Network Connection, ID:{BCEA487A-D78D-44C7-8DAD-F429BB709368}) - Ethernet - Down Network Interface: Local Area Connection* 1 (Microsoft Wi-Fi Direct Virtual Adapter, ID:{888B9D73-A3C8-4D55-B5D4-8BE5235AA53B}) - Wireless80211 - Down Network Interface: Wi-Fi (D-Link DWA-556 Xtreme N PCIe Desktop Adapter, ID:{D7D15184-61FA-42D0-B7E5-80AFDCFF2EC1}) - Wireless80211 - Up Network Interface: Ethernet 2 (ADMtek AN983 based ethernet adapter, ID:{739D8007-0786-4909-96F7-7DCD9B46F557}) - Ethernet - Down Network Interface: Loopback Pseudo-Interface 1 (Software Loopback Interface 1, ID:{11A99924-EE2F-11E7-8E0E-806E6F6E6963}) - Loopback - Up Network Interface: Teredo Tunneling Pseudo-Interface (Teredo Tunneling Pseudo-Interface, ID:{834BCBED-6081-498B-A1EC-DCA232E27E88}) - Tunnel - Down ---------------------------- Default gateways: fe80::a02:8eff:fe87:fdab%18, D-Link DWA-556 Xtreme N PCIe Desktop Adapter 192.168.0.1, D-Link DWA-556 Xtreme N PCIe Desktop Adapter ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : DESKTOP-C674BJH Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Ethernet adapter Ethernet 3: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-DE-E9-2E-62 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::fccc:9cf:47d4:7363%19(Preferred) IPv4 Address. . . . . . . . . . . : 10.50.2.181(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.0.0 Lease Obtained. . . . . . . . . . : Friday, April 6, 2018 6:31:06 PM Lease Expires . . . . . . . . . . : Saturday, April 6, 2019 6:31:06 PM Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.50.255.254 DHCPv6 IAID . . . . . . . . . . . : 687931358 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-DA-AF-33-00-1D-09-99-AB-6B DNS Servers . . . . . . . . . . . : 10.50.0.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Intel(R) 82562V-2 10/100 Network Connection Physical Address. . . . . . . . . : 00-1D-09-99-AB-6B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 12-7D-68-C1-B2-F7 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : D-Link DWA-556 Xtreme N PCIe Desktop Adapter Physical Address. . . . . . . . . : F0-7D-68-C1-B2-F7 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2600:8800:7d05:9600:9d44:bf3d:8f86:7185(Preferred) Temporary IPv6 Address. . . . . . : 2600:8800:7d05:9600:b052:9a61:42bd:abb6(Preferred) Link-local IPv6 Address . . . . . : fe80::9d44:bf3d:8f86:7185%18(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.0.2(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Friday, April 6, 2018 5:54:53 PM Lease Expires . . . . . . . . . . : Friday, April 6, 2018 7:25:00 PM Default Gateway . . . . . . . . . : fe80::a02:8eff:fe87:fdab%18 192.168.0.1 DHCP Server . . . . . . . . . . . : 192.168.0.1 DHCPv6 IAID . . . . . . . . . . . : 133201256 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-DA-AF-33-00-1D-09-99-AB-6B DNS Servers . . . . . . . . . . . : 68.105.28.11 68.105.29.11 68.105.28.12 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : ADMtek AN983 based ethernet adapter Physical Address. . . . . . . . . : 00-0C-41-1C-3C-36 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Tunnel adapter Teredo Tunneling Pseudo-Interface: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes ---------------------------- route print: =========================================================================== Interface List 19...00 ff de e9 2e 62 ......TAP-Windows Adapter V9 15...00 1d 09 99 ab 6b ......Intel(R) 82562V-2 10/100 Network Connection 11...12 7d 68 c1 b2 f7 ......Microsoft Wi-Fi Direct Virtual Adapter 18...f0 7d 68 c1 b2 f7 ......D-Link DWA-556 Xtreme N PCIe Desktop Adapter 7...00 0c 41 1c 3c 36 ......ADMtek AN983 based ethernet adapter 1...........................Software Loopback Interface 1 10...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface =========================================================================== IPv4 Route Table =========================================================================== Active Routes: Network Destination Netmask Gateway Interface Metric 0.0.0.0 0.0.0.0 192.168.0.1 192.168.0.2 50 0.0.0.0 128.0.0.0 10.50.0.1 10.50.2.181 3 10.50.0.0 255.255.0.0 On-link 10.50.2.181 259 10.50.2.181 255.255.255.255 On-link 10.50.2.181 259 10.50.255.255 255.255.255.255 On-link 10.50.2.181 259 71.19.252.28 255.255.255.255 192.168.0.1 192.168.0.2 50 127.0.0.0 255.0.0.0 On-link 127.0.0.1 331 127.0.0.1 255.255.255.255 On-link 127.0.0.1 331 127.0.0.1 255.255.255.255 192.168.0.1 192.168.0.2 50 127.255.255.255 255.255.255.255 On-link 127.0.0.1 331 128.0.0.0 128.0.0.0 10.50.0.1 10.50.2.181 3 192.168.0.0 255.255.255.0 On-link 192.168.0.2 306 192.168.0.2 255.255.255.255 On-link 192.168.0.2 306 192.168.0.255 255.255.255.255 On-link 192.168.0.2 306 224.0.0.0 240.0.0.0 On-link 127.0.0.1 331 224.0.0.0 240.0.0.0 On-link 10.50.2.181 259 224.0.0.0 240.0.0.0 On-link 192.168.0.2 306 255.255.255.255 255.255.255.255 On-link 127.0.0.1 331 255.255.255.255 255.255.255.255 On-link 10.50.2.181 259 255.255.255.255 255.255.255.255 On-link 192.168.0.2 306 =========================================================================== Persistent Routes: None IPv6 Route Table =========================================================================== Active Routes: If Metric Network Destination Gateway 18 306 ::/0 fe80::a02:8eff:fe87:fdab 1 331 ::1/128 On-link 18 306 2600:8800:7d05:9600::/56 fe80::a02:8eff:fe87:fdab 18 306 2600:8800:7d05:9600::/64 On-link 18 306 2600:8800:7d05:9600:9d44:bf3d:8f86:7185/128 On-link 18 306 2600:8800:7d05:9600:b052:9a61:42bd:abb6/128 On-link 19 259 fe80::/64 On-link 18 306 fe80::/64 On-link 18 306 fe80::9d44:bf3d:8f86:7185/128 On-link 19 259 fe80::fccc:9cf:47d4:7363/128 On-link 1 331 ff00::/8 On-link 19 259 ff00::/8 On-link 18 306 ff00::/8 On-link =========================================================================== Persistent Routes: None