Leaderboard
Popular Content
Showing content with the highest reputation on 10/26/22 in Posts
-
1 point. 2022.10.25 13:08:00 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Education, Version: Microsoft Windows NT 10.0.19044.0, Mono/.Net: v4.0.30319 . 2022.10.25 13:08:00 - Command line arguments (1): path="home" . 2022.10.25 13:08:01 - Reading options from C:\Users\mm\AppData\Local\Eddie\default.profile . 2022.10.25 13:08:03 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2022.10.25 13:08:03 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2022.10.25 13:08:03 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2022.10.25 13:08:03 - Ready . 2022.10.25 13:08:05 - Collect information about AirVPN completed ! 2022.10.25 13:08:16 - Activation of Network Lock - Windows Filtering Platform I 2022.10.25 13:08:19 - Session starting. I 2022.10.25 13:08:20 - Checking authorization ... . 2022.10.25 13:08:21 - Using WinTun network interface "torguardwintun (Wintun Userspace Tunnel #2)" ! 2022.10.25 13:08:21 - Connecting to Sculptor (United States of America, Atlanta, Georgia) . 2022.10.25 13:08:22 - Routes, add 64.42.179.37/32 for interface "Ethernet (Intel(R) I211 Gigabit Network Connection)". . 2022.10.25 13:08:22 - Routes, add 64.42.179.37/32 for interface "Ethernet (Intel(R) I211 Gigabit Network Connection)", already exists. . 2022.10.25 13:08:22 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.10.25 13:08:22 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.10.25 13:08:22 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.10.25 13:08:22 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.10.25 13:08:22 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.10.25 13:08:22 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.10.25 13:08:22 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.10.25 13:08:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.37:443 . 2022.10.25 13:08:22 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.10.25 13:08:22 - OpenVPN > UDP link local: (not bound) . 2022.10.25 13:08:22 - OpenVPN > UDP link remote: [AF_INET]64.42.179.37:443 . 2022.10.25 13:08:22 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.37:443, sid=4719a08d 49b58d17 . 2022.10.25 13:08:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.10.25 13:08:22 - OpenVPN > VERIFY KU OK . 2022.10.25 13:08:22 - OpenVPN > Validating certificate extended key usage . 2022.10.25 13:08:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.10.25 13:08:22 - OpenVPN > VERIFY EKU OK . 2022.10.25 13:08:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sculptor, emailAddress=info@airvpn.org . 2022.10.25 13:08:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.10.25 13:08:22 - OpenVPN > [Sculptor] Peer Connection Initiated with [AF_INET]64.42.179.37:443 . 2022.10.25 13:08:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.74.1,dhcp-option DNS6 fde6:7a:7d20:134a::1,tun-ipv6,route-gateway 10.23.74.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:134a::10c3/64 fde6:7a:7d20:134a::1,ifconfig 10.23.74.197 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.10.25 13:08:23 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.10.25 13:08:23 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.74.1' . 2022.10.25 13:08:23 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:134a::1' . 2022.10.25 13:08:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.10.25 13:08:23 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.10.25 13:08:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.10.25 13:08:23 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.10.25 13:08:23 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.10.25 13:08:23 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.10.25 13:08:23 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.10.25 13:08:23 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.10.25 13:08:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.10.25 13:08:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.10.25 13:08:23 - OpenVPN > interactive service msg_channel=0 . 2022.10.25 13:08:23 - OpenVPN > open_tun . 2022.10.25 13:08:23 - OpenVPN > wintun device [torguardwintun] opened . 2022.10.25 13:08:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 20 static 10.23.74.197 255.255.255.0 . 2022.10.25 13:08:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 20 all . 2022.10.25 13:08:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 20 all . 2022.10.25 13:08:23 - OpenVPN > IPv4 MTU set to 1500 on interface 20 using SetIpInterfaceEntry() . 2022.10.25 13:08:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 20 fde6:7a:7d20:134a::10c3/128 store=active . 2022.10.25 13:08:23 - OpenVPN > add_route_ipv6(fde6:7a:7d20:134a::/64 -> fde6:7a:7d20:134a::10c3 metric 0) dev torguardwintun . 2022.10.25 13:08:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:134a::/64 20 fe80::8 store=active . 2022.10.25 13:08:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.10.25 13:08:24 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 20 all . 2022.10.25 13:08:24 - OpenVPN > IPv6 MTU set to 1500 on interface 20 using SetIpInterfaceEntry() . 2022.10.25 13:08:24 - OpenVPN > Initialization Sequence Completed . 2022.10.25 13:08:24 - Interface torguardwintun metric changed from Automatic to 3, layer IPv4 . 2022.10.25 13:08:24 - Interface torguardwintun metric changed from Automatic to 3, layer IPv6 . 2022.10.25 13:08:24 - DNS leak protection with packet filtering enabled. . 2022.10.25 13:08:25 - DNS IPv4 of a network adapter forced (torguardwintun, from automatic to 10.23.74.1) . 2022.10.25 13:08:25 - DNS IPv6 of a network adapter forced (torguardwintun, from automatic to fde6:7a:7d20:134a::1) . 2022.10.25 13:08:25 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.23.74.1) . 2022.10.25 13:08:25 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:134a::1) . 2022.10.25 13:08:25 - DNS IPv4 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to 10.23.74.1) . 2022.10.25 13:08:25 - DNS IPv6 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to fde6:7a:7d20:134a::1) . 2022.10.25 13:08:26 - Routes, add 0.0.0.0/1 for interface "torguardwintun (Wintun Userspace Tunnel #2)". . 2022.10.25 13:08:27 - Routes, add 128.0.0.0/1 for interface "torguardwintun (Wintun Userspace Tunnel #2)". . 2022.10.25 13:08:28 - Routes, add ::/1 for interface "torguardwintun (Wintun Userspace Tunnel #2)". . 2022.10.25 13:08:29 - Routes, add 8000::/1 for interface "torguardwintun (Wintun Userspace Tunnel #2)". . 2022.10.25 13:08:29 - Routes, add 64.42.179.35/32 for interface "torguardwintun (Wintun Userspace Tunnel #2)". . 2022.10.25 13:08:30 - Routes, add 2605:9f80:6000:77:25ba:81d8:c17b:536b/128 for interface "torguardwintun (Wintun Userspace Tunnel #2)". . 2022.10.25 13:08:30 - Flushing DNS I 2022.10.25 13:08:30 - Checking route IPv4 I 2022.10.25 13:08:31 - Checking route IPv6 I 2022.10.25 13:08:31 - Checking DNS ! 2022.10.25 13:08:32 - Connected. . 2022.10.25 13:38:08 - Collect information about AirVPN completed . 2022.10.25 14:05:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.10.25 14:05:25 - OpenVPN > VERIFY KU OK . 2022.10.25 14:05:25 - OpenVPN > Validating certificate extended key usage . 2022.10.25 14:05:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.10.25 14:05:25 - OpenVPN > VERIFY EKU OK . 2022.10.25 14:05:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sculptor, emailAddress=info@airvpn.org . 2022.10.25 14:05:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.10.25 14:05:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.10.25 14:05:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.10.25 14:08:09 - Collect information about AirVPN completed . 2022.10.25 14:38:09 - Collect information about AirVPN completed . 2022.10.25 15:02:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.10.25 15:02:30 - OpenVPN > VERIFY KU OK . 2022.10.25 15:02:30 - OpenVPN > Validating certificate extended key usage . 2022.10.25 15:02:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.10.25 15:02:30 - OpenVPN > VERIFY EKU OK . 2022.10.25 15:02:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sculptor, emailAddress=info@airvpn.org . 2022.10.25 15:02:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.10.25 15:02:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.10.25 15:02:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.10.25 15:08:11 - Collect information about AirVPN completed . 2022.10.25 15:38:13 - Collect information about AirVPN completed
-
1 pointHello! It mainly depends on WireGuard and OpenVPN after all. QUIC looks very promising and is widely used by Chrome for HTTPS/2 (mainly with Google sites) so we guess it's quite robust after 9 years of tests and no critical problems found. However we frankly don't know how it would speed up OpenVPN or WireGuard, because it includes some error correction and packet re-ordering routines working on packets on the userspace which are, apparently, quite unwelcome by WireGuard (and OpenVPN too, due to its efficiency in packet re-ordering in UDP), exactly because they tend to waste a lot of time. Kind regards