Leaderboard
Popular Content
Showing content with the highest reputation on 06/23/25 in Posts
-
2 points
Ain problems
caffeine0030 and one other reacted to AG999 for a post in a topic
Can confirm and will also provide some info that may be useful: 1. Ping is horrible no matter what is done (I usually get ~35 ping to Stockholm, on Ain I get 100-180) 2. Something may be wrong with the MTU of the server, because on 1400 MTU I get 2 mbit/s download, with 1280 I get 450 mbit/s. I have no problem with 1400 MTU on other servers -
0 points
ANSWERED Can't connect to any server besides Telescopium
Guest reacted to drybones99 for a post in a topic
I attempted to connect to Titawin, it failed three times, and then I was able to successfully connect to Telescopium, as usual. These are the results, regardless of whether I have network lock turned on or not. Here is the log, in LOG formatting: Eddie System/Environment Report - 1/23/2020 11:25 PM UTC Eddie version: 2.13.6 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Pro OS version: Microsoft Windows NT 10.0.18363.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2 OpenVPN: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe) Profile path: C:\Program Files\AirVPN\AirVPN.xml Data path: C:\Program Files\AirVPN Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\AirVPN.exe Command line arguments: (0 args) Network Lock Active: Yes, Windows Filtering Platform Connected to VPN: Yes, Eddie.Core.StatsEntry Detected DNS: 1.0.0.1, 1.1.1.1, 10.19.12.1 Test DNS IPv4: Ok Test DNS IPv6: Failed ---------------------------- Test HTTP: Status: HTTP/1.1 200 OK - Headers: server:nginx;date:Thu, 23 Jan 2020 23:25:49 GMT;content-type:text/html; charset=UTF-8;transfer-encoding:chunked;connection:keep-alive;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;feature-policy:autoplay 'none'; camera 'none'; encrypted-media 'none'; fullscreen 'self'; geolocation 'none'; microphone 'none'; magnetometer 'none'; midi 'none'; payment 'none'; speaker 'self'; sync-xhr 'self'; vr 'none';;content-security-policy-report-only:report-uri https://airvpn.org/services/csp_report.php; default-src 'none'; connect-src 'self'; script-src 'self'; style-src 'self'; font-src 'self'; img-src 'self' data:; base-uri 'none'; frame-ancestors 'self' eddie.website; form-action 'self';content-security-policy:default-src 'none'; connect-src 'self'; script-src 'self'; style-src 'self'; font-src 'self'; img-src 'self' data:; base-uri 'none'; frame-ancestors 'self' eddie.website; form-action 'self';cache-control:max-age=0, no-cache, no-store, must-revalidate; - Body (10 bytes): Success. ---------------------------- Test HTTPS: Status: HTTP/2 200 - Headers: server:nginx;date:Thu, 23 Jan 2020 23:25:50 GMT;content-type:text/html; charset=UTF-8;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;feature-policy:autoplay 'none'; camera 'none'; encrypted-media 'none'; fullscreen 'self'; geolocation 'none'; microphone 'none'; magnetometer 'none'; midi 'none'; payment 'none'; speaker 'self'; sync-xhr 'self'; vr 'none';;content-security-policy-report-only:report-uri https://airvpn.org/services/csp_report.php; default-src 'none'; connect-src 'self'; script-src 'self'; style-src 'self'; font-src 'self'; img-src 'self' data:; base-uri 'none'; frame-ancestors 'self' eddie.website; form-action 'self';content-security-policy:default-src 'none'; connect-src 'self'; script-src 'self'; style-src 'self'; font-src 'self'; img-src 'self' data:; base-uri 'none'; frame-ancestors 'self' eddie.website; form-action 'self';cache-control:max-age=0, no-cache, no-store, must-revalidate; - Body (10 bytes): Success. ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True advanced.expert: True advanced.check.route: False ---------------------------- Logs: I 2020.01.23 15:23:43 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.18363.0, Mono/.Net Framework: v4.0.30319 . 2020.01.23 15:23:43 - Reading options from C:\Program Files\AirVPN\AirVPN.xml . 2020.01.23 15:23:43 - Command line arguments (0): I 2020.01.23 15:23:44 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2 I 2020.01.23 15:23:44 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) I 2020.01.23 15:23:44 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe) I 2020.01.23 15:23:44 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) I 2020.01.23 15:23:44 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe) I 2020.01.23 15:23:44 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem . 2020.01.23 15:23:45 - Updating systems & servers data ... ! 2020.01.23 15:23:45 - Ready . 2020.01.23 15:23:46 - Systems & servers data update completed ! 2020.01.23 15:23:47 - Activation of Network Lock - Windows Filtering Platform I 2020.01.23 15:23:56 - Session starting. . 2020.01.23 15:23:56 - IPv6 disabled with packet filtering. I 2020.01.23 15:23:56 - Checking authorization ... ! 2020.01.23 15:23:57 - Connecting to Titawin (Canada, Vancouver) . 2020.01.23 15:23:57 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017 . 2020.01.23 15:23:57 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.01.23 15:23:57 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2020.01.23 15:23:57 - Connection to OpenVPN Management Interface . 2020.01.23 15:23:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.01.23 15:23:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.01.23 15:23:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.01.23 15:23:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.58:443 . 2020.01.23 15:23:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.01.23 15:23:57 - OpenVPN > UDP link local: (not bound) . 2020.01.23 15:23:57 - OpenVPN > UDP link remote: [AF_INET]192.30.89.58:443 . 2020.01.23 15:23:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2020.01.23 15:23:57 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.58:443, sid=c0639bcb 872f806e . 2020.01.23 15:23:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.01.23 15:23:57 - OpenVPN > VERIFY KU OK . 2020.01.23 15:23:57 - OpenVPN > Validating certificate extended key usage . 2020.01.23 15:23:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.01.23 15:23:57 - OpenVPN > VERIFY EKU OK . 2020.01.23 15:23:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Titawin, emailAddress=info@airvpn.org . 2020.01.23 15:23:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.01.23 15:23:57 - OpenVPN > [Titawin] Peer Connection Initiated with [AF_INET]192.30.89.58:443 . 2020.01.23 15:23:58 - OpenVPN > SENT CONTROL [Titawin]: 'PUSH_REQUEST' (status=1) . 2020.01.23 15:23:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.20.68.1,route-gateway 10.20.68.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.20.68.68 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2020.01.23 15:23:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.01.23 15:23:58 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.01.23 15:23:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.01.23 15:23:58 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.01.23 15:23:58 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.01.23 15:23:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.01.23 15:23:58 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.01.23 15:23:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.01.23 15:23:58 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.01.23 15:23:58 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.01.23 15:23:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.01.23 15:23:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.01.23 15:23:58 - OpenVPN > interactive service msg_channel=0 . 2020.01.23 15:23:58 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=21 HWADDR=18:31:bf:6c:c5:85 . 2020.01.23 15:23:59 - OpenVPN > open_tun . 2020.01.23 15:23:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{49D78DAA-9B0B-4538-AF60-1B02795C0B5B}.tap . 2020.01.23 15:23:59 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.01.23 15:23:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.20.68.0/10.20.68.68/255.255.255.0 [SUCCEEDED] . 2020.01.23 15:23:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.20.68.68/255.255.255.0 on interface {49D78DAA-9B0B-4538-AF60-1B02795C0B5B} [DHCP-serv: 10.20.68.254, lease-time: 31536000] . 2020.01.23 15:23:59 - OpenVPN > Successful ARP Flush on interface [9] {49D78DAA-9B0B-4538-AF60-1B02795C0B5B} . 2020.01.23 15:23:59 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.01.23 15:24:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.01.23 15:24:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.30.89.58 MASK 255.255.255.255 192.168.1.1 . 2020.01.23 15:24:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.01.23 15:24:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.01.23 15:24:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.20.68.1 . 2020.01.23 15:24:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.01.23 15:24:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.01.23 15:24:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.20.68.1 . 2020.01.23 15:24:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.01.23 15:24:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.01.23 15:24:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4 . 2020.01.23 15:24:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6 . 2020.01.23 15:24:04 - DNS leak protection with packet filtering enabled. . 2020.01.23 15:24:04 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.19.12.1) to 10.20.68.1) . 2020.01.23 15:24:04 - Flushing DNS I 2020.01.23 15:24:04 - Checking DNS . 2020.01.23 15:24:29 - curl: (6) Could not resolve host: titawin_exit.airservers.org . 2020.01.23 15:24:29 - Checking DNS (2° try) . 2020.01.23 15:24:54 - curl: (6) Could not resolve host: titawin_exit.airservers.org . 2020.01.23 15:24:54 - Checking DNS (3° try) . 2020.01.23 15:25:21 - curl: (6) Could not resolve host: titawin_exit.airservers.org E 2020.01.23 15:25:21 - Checking DNS failed. . 2020.01.23 15:25:21 - OpenVPN > Initialization Sequence Completed ! 2020.01.23 15:25:21 - Disconnecting . 2020.01.23 15:25:21 - Sending management termination signal . 2020.01.23 15:25:21 - Management - Send 'signal SIGTERM' . 2020.01.23 15:25:26 - Connection terminated. . 2020.01.23 15:25:26 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.19.12.1) . 2020.01.23 15:25:26 - DNS leak protection with packet filtering disabled. . 2020.01.23 15:25:26 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4 . 2020.01.23 15:25:26 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6 I 2020.01.23 15:25:29 - Checking authorization ... ! 2020.01.23 15:25:30 - Connecting to Telescopium (Canada, Vancouver) . 2020.01.23 15:25:30 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017 . 2020.01.23 15:25:30 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.01.23 15:25:30 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2020.01.23 15:25:30 - Connection to OpenVPN Management Interface . 2020.01.23 15:25:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.01.23 15:25:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.01.23 15:25:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.01.23 15:25:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.50:443 . 2020.01.23 15:25:30 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.01.23 15:25:30 - OpenVPN > UDP link local: (not bound) . 2020.01.23 15:25:30 - OpenVPN > UDP link remote: [AF_INET]192.30.89.50:443 . 2020.01.23 15:25:30 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2020.01.23 15:25:30 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.50:443, sid=c3a550ab da534c17 . 2020.01.23 15:25:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.01.23 15:25:30 - OpenVPN > VERIFY KU OK . 2020.01.23 15:25:30 - OpenVPN > Validating certificate extended key usage . 2020.01.23 15:25:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.01.23 15:25:30 - OpenVPN > VERIFY EKU OK . 2020.01.23 15:25:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org . 2020.01.23 15:25:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.01.23 15:25:31 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.50:443 . 2020.01.23 15:25:32 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1) . 2020.01.23 15:25:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.19.4.1,route-gateway 10.19.4.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.19.4.238 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2020.01.23 15:25:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.01.23 15:25:32 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.01.23 15:25:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.01.23 15:25:32 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.01.23 15:25:32 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.01.23 15:25:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.01.23 15:25:32 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.01.23 15:25:32 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.01.23 15:25:32 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.01.23 15:25:32 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.01.23 15:25:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.01.23 15:25:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.01.23 15:25:32 - OpenVPN > interactive service msg_channel=0 . 2020.01.23 15:25:32 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=21 HWADDR=18:31:bf:6c:c5:85 . 2020.01.23 15:25:32 - OpenVPN > open_tun . 2020.01.23 15:25:32 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{49D78DAA-9B0B-4538-AF60-1B02795C0B5B}.tap . 2020.01.23 15:25:32 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.01.23 15:25:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.19.4.0/10.19.4.238/255.255.255.0 [SUCCEEDED] . 2020.01.23 15:25:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.19.4.238/255.255.255.0 on interface {49D78DAA-9B0B-4538-AF60-1B02795C0B5B} [DHCP-serv: 10.19.4.254, lease-time: 31536000] . 2020.01.23 15:25:32 - OpenVPN > Successful ARP Flush on interface [9] {49D78DAA-9B0B-4538-AF60-1B02795C0B5B} . 2020.01.23 15:25:32 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.01.23 15:25:37 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.01.23 15:25:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.30.89.50 MASK 255.255.255.255 192.168.1.1 . 2020.01.23 15:25:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.01.23 15:25:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.01.23 15:25:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.19.4.1 . 2020.01.23 15:25:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.01.23 15:25:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.01.23 15:25:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.19.4.1 . 2020.01.23 15:25:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.01.23 15:25:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.01.23 15:25:37 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4 . 2020.01.23 15:25:37 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6 . 2020.01.23 15:25:37 - DNS leak protection with packet filtering enabled. . 2020.01.23 15:25:37 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.19.12.1) to 10.19.4.1) . 2020.01.23 15:25:37 - Flushing DNS I 2020.01.23 15:25:37 - Checking DNS ! 2020.01.23 15:25:38 - Connected. . 2020.01.23 15:25:38 - OpenVPN > Initialization Sequence Completed ---------------------------- Network Interfaces: Network Interface: Ethernet 2 (TAP-Windows Adapter V9, ID:{49D78DAA-9B0B-4538-AF60-1B02795C0B5B}) - Ethernet - Up Network Interface: Ethernet (Intel(R) Ethernet Connection (2) I219-V, ID:{D7ED2D2E-0008-4377-8107-BC99C4CA3233}) - Ethernet - Up Network Interface: Local Area Connection* 1 (Microsoft Wi-Fi Direct Virtual Adapter #3, ID:{CAC75FD4-1AA3-449C-BC0F-5F54BF68D100}) - Wireless80211 - Down Network Interface: Local Area Connection* 12 (Microsoft Wi-Fi Direct Virtual Adapter #4, ID:{31D63908-A579-4E93-89DA-6DA8FDDE846F}) - Wireless80211 - Down Network Interface: Wi-Fi (Realtek 8822BE Wireless LAN 802.11ac PCI-E NIC, ID:{33C74F91-A3F9-4213-B286-AB0C829EED54}) - Wireless80211 - Down Network Interface: Bluetooth Network Connection (Bluetooth Device (Personal Area Network), ID:{55B27356-53BD-493E-9F58-5E341EC139EB}) - Ethernet - Down Network Interface: Loopback Pseudo-Interface 1 (Software Loopback Interface 1, ID:{F24A2B59-FE5D-11E8-956B-806E6F6E6963}) - Loopback - Up ---------------------------- Default gateways: 192.168.1.1, Intel(R) Ethernet Connection (2) I219-V ---------------------------- ipconfig /all: 'ipconfig' is not recognized as an internal or external command, operable program or batch file. ---------------------------- route print: 'route' is not recognized as an internal or external command, operable program or batch file.