<?xml version="1.0"?>
<rss version="2.0"><channel><title>AirVPN Forums</title><link>https://airvpn.org/rss/2-airvpn-forums.xml/</link><description>Forums</description><language>en</language><item><title>Client hang when starting  "Check recovery status"</title><link><![CDATA[https://airvpn.org/forums/topic/45528-client-hang-when-starting-check-recovery-status/?do=findComment&comment=101683]]></link><description>So I downloaded and installed the latest experimental release and yet when starting it, it begins to load and then stays stuck on "check recovery status"</description><pubDate>Tue, 24 Sep 2019 08:23:02 +0000</pubDate></item><item><title>port forwarding no longer working</title><link><![CDATA[https://airvpn.org/forums/topic/45526-port-forwarding-no-longer-working/?do=findComment&comment=101669]]></link><description>I'm running sshd and for a couple years this has been working fine, but lately it is not.  
	I can ssh to localhost:port, but trying to ssh to vpn_ip:forwarded_port times out on the connection.  Has anything changed with ssh to no longer allow it to go through a forwarded port to my connected laptop?  I've switched endpoints a couple times, and still no go.  The "test" button on the forwarded ports screen shows green for the port in question.  
	The Open Port check tool at "CanYouSeeMe.org" for my forwarded port does *NOT* show the port as open.  
	I have a few other ports open, and they also seem to not work in that I can't any connection from the outside through the VPN to my machine.   Going directly to my machine (from inside my network on the lan) works fine.  All the "open port" tools from outside the VPN show all my ports as closed.</description><pubDate>Sat, 21 Sep 2019 23:33:37 +0000</pubDate></item><item><title>China problem</title><link><![CDATA[https://airvpn.org/forums/topic/45525-china-problem/?do=findComment&comment=101663]]></link><description>Hello,  
In China currently i have issue connecting to America server.  
Only one working for me is Miami Cursa UDP but netflix is giving me the proxy error message.  
Is there anyway to make the others servers works from China ?  
Thx</description><pubDate>Sat, 21 Sep 2019 18:19:16 +0000</pubDate></item><item><title>No IPv6 traffic</title><link><![CDATA[https://airvpn.org/forums/topic/45524-no-ipv6-traffic/?do=findComment&comment=101661]]></link><description>Hello,
 
	I am having technical problems with my current IPv6 setup. Specifically, when I try to access websites that report my IP (such as whatismyipaddress.com), they report only detecting an IPv4 address (specifically 185.9.19.107, which is an AirVPN server I believe) from my browser's request when I'm connected with my airvpn configuration, no IPv6 address visible to them. This is strange, specifically because my airvpn configuration is setup to use both IPv6 as the outbound address as well as the inbound one.  
	So my question is, why is this happening? I'm assuming this is a configuration issue on my side.  
	Further context below: 
	1) All the devices in my house are connected in a LAN that has a single gateway to the public internet: a wireless router with OpenWrt 18.06.2 
	2) The OpenWrt router is the one maintaining an open connection to the AirVPN server. Basically, the devices in my LAN should have all their network traffic routed through AirVPN servers before reaching their intended destinations. 
	3) OpenVPN has the airvpn.conf file generated using this website's config generator after selecting the "Linux" category (maybe "Router" would have been a better choice for the configuration file?). The conf file is attached to this thread (the same conf file also contains the certificates, openvpn static key and my private key but I omitted them since I don't believe they are relevant here). airvpn.conf   
	4) Here are other configurations from my OpenWRT setup: networkfirewall 
	5) I should probably point out that my internet didn't work at all when using the VPN with the initial airvpn config file (not even pinging the remote server by its Ipv6 address). After digging a lot through the internet I eventually came up with a script called remote_host_route6.sh which I reference in my airvpn config file and which gets executed every time openvpn tries to start the said configuration (it's referenced in the "route-up" directive in the airvpn.conf file attached). It was only after I added this script to the configuration that I began having internet at all when the VPN connection was up, albeit with the problem I'm describing in this post. The contents of this remote_host_route6 script are the following: remote_host_route6.sh 
	6) OpenVPN version is OpenVPN 2.4.5 
	7) Finally, although I am unsure how relevant this is, my "gateway" router that all my LAN devices connect to and which connects to the VPN server is itself behind an OTN device from my ISP which converts all traffic to fiber optic signal. This device is set into bridge mode and should be transparent to the network though, I believe (hence why my OpenVPN router handles the pppoe configuration).  
	Sorry for the long post :(</description><pubDate>Sat, 21 Sep 2019 16:18:20 +0000</pubDate></item><item><title>AirVPN.org requires JS to view the website, making it TOR unfriendly :(</title><link><![CDATA[https://airvpn.org/forums/topic/45523-airvpnorg-requires-js-to-view-the-website-making-it-tor-unfriendly/?do=findComment&comment=101657]]></link><description><![CDATA[Hi.   
	I recently noticed AirVPN.org added a new barrier to their website meaning visitors need JS in order to view the website. Disabling JS (using a script blocker) means you'll see a completely white/blank page.  
	Here is a sample URL:  https://airvpn.org/entry/?aek_v=3&amp;aek_id=$ID&amp;aek_url=%2Fclient%2F  
	This page loads a script, which is as follows:
 


				
var _0x8ace=["\x66\x61\x64\x65\x49\x6E","\x23\x77\x61\x69\x74","\x74\x72\x69\x6D","\x61\x65\x6B\x5F\x75\x72\x6C","\x67\x65\x74\x55\x72\x6C\x50\x61\x72\x61\x6D\x65\x74\x65\x72","","\x2F","\x61\x65\x6B\x5F\x69\x64","\x6C\x65\x6E\x67\x74\x68","\x63\x68\x61\x72\x43\x6F\x64\x65\x41\x74","\x63\x6F\x6F\x6B\x69\x65","\x61\x66\x33\x3D","\x3B\x73\x65\x63\x75\x72\x65\x3B\x70\x61\x74\x68\x3D\x2F","\x6C\x6F\x63\x61\x74\x69\x6F\x6E","\x5C\x5D","\x72\x65\x70\x6C\x61\x63\x65","\x5C\x5B","\x5B\x5C\x3F\x26\x5D","\x3D\x28\x5B\x5E\x26\x23\x5D\x2A\x29","\x73\x65\x61\x72\x63\x68","\x65\x78\x65\x63","\x20","\x69\x6E\x69\x74","\x72\x65\x61\x64\x79"];var AirEntry={init:function(){jQuery(_0x8ace[1])[_0x8ace[0]]();setTimeout(function(){var _0xfb62x2=AirEntry[_0x8ace[4]](_0x8ace[3])[_0x8ace[2]]();if((_0xfb62x2== _0x8ace[5])|| (_0xfb62x2[0]!= _0x8ace[6])){_0xfb62x2= _0x8ace[6]};var _0xfb62x3=AirEntry[_0x8ace[4]](_0x8ace[7]);var _0xfb62x4=0;for(var _0xfb62x5=0;_0xfb62x5&lt; _0xfb62x3[_0x8ace[8]];_0xfb62x5++){var _0xfb62x6=_0xfb62x3[_0x8ace[9]](_0xfb62x5);_0xfb62x6*= _0xfb62x6;_0xfb62x4= _0xfb62x4% _0xfb62x6;_0xfb62x4+= _0xfb62x6};document[_0x8ace[10]]= _0x8ace[11]+ _0xfb62x4+ _0x8ace[12];window[_0x8ace[13]]= _0xfb62x2},200)},getUrlParameter:function(_0xfb62x7){_0xfb62x7= _0xfb62x7[_0x8ace[15]](/[\[]/,_0x8ace[16])[_0x8ace[15]](/[\]]/,_0x8ace[14]);var _0xfb62x8= new RegExp(_0x8ace[17]+ _0xfb62x7+ _0x8ace[18]);var _0xfb62x9=_0xfb62x8[_0x8ace[20]](location[_0x8ace[19]]);return _0xfb62x9=== null?_0x8ace[5]:decodeURIComponent(_0xfb62x9[1][_0x8ace[15]](/\+/g,_0x8ace[21]))}};jQuery(document)[_0x8ace[23]](function(){AirEntry[_0x8ace[22]]()})
				You can copy/paste and console.log the variable to see what it does exactly. The tl;dr is that it sets 2 cookies in your browser:  
				af3 and afh which you can see using your browsers deb tools.   
				I reported this, initially to the staff to voice my disdain at using JS in this way. Here was their response: 
				 
				 
				  
				This is a VPN that is supposedly designed to help NGOs in hostile regimes, and they operated successfully for years without making JS a requirement for service.  
				I'd like to request AirVPN to invest time into making the site operable without JS, using TOR, preferably behind an .onion service.  
				Requiring JS, which is a technology used to abuse human rights on an unprecedented scale feels like a HUGE violation of their core mission, and is EXTREMELY disappointing.   
				I'm hoping founders can weigh in on why they decided to require JS in this way to access a VPN. I may not be able to use JS, does that mean I cannot use AirVPN? This "security" feature is likely to be broken in a matter of days. Relying on some "encoded" JS (you can't "encode" JS),  
				that can be reverse engineered is not "security".  
				If it helps for "now", great, but you've just put a HUGE firewall of legitimate paying customers. I guess you no longer care about us? Due to the sheer amount of JS this site loads I am not willing to add it to my "exception" list (apart from this throw away account, even then I'm still concerned).]]></description><pubDate>Sat, 21 Sep 2019 11:23:56 +0000</pubDate></item><item><title>Eddie - Cannot login. (Padding is invalid and cannot be removed)</title><link><![CDATA[https://airvpn.org/forums/topic/45522-eddie-cannot-login-padding-is-invalid-and-cannot-be-removed/?do=findComment&comment=101652]]></link><description>I am in a heavily firewalled environment, only port 80 and 443 are open. I can not even use the client to log in. 
The client offers me to input a custom bootstrap url. How can I get this?  
Many thanks in advance!</description><pubDate>Fri, 20 Sep 2019 20:44:52 +0000</pubDate></item><item><title>Airvpn in Public WLAN Security</title><link><![CDATA[https://airvpn.org/forums/topic/45521-airvpn-in-public-wlan-security/?do=findComment&comment=101647]]></link><description>Hey   
I want to use an Ipad and Laptop with AirVPN while using public WIFI in McDonalds or Burger King.  
Now I'm wondering if it is secure to access non-ssl websites that contain sensitive information when using network lock or if the fast-food restaurant can still read the information transferred?  
Thanks for the help</description><pubDate>Fri, 20 Sep 2019 15:50:18 +0000</pubDate></item><item><title>Can't connet to Eddie</title><link><![CDATA[https://airvpn.org/forums/topic/45520-cant-connet-to-eddie/?do=findComment&comment=101632]]></link><description>Hi! 
I have problem after upgrade Ubuntu to version 19.04 i cant connect to Eddie. Conneting stopped at "Checking DNS" and have information "Checking DNS failed". If i check in ipleak i see in DNS Servers my ISP. Can anyone help me, please?</description><pubDate>Thu, 19 Sep 2019 15:52:28 +0000</pubDate></item><item><title>Eddie icon disappears in Windows 10</title><link><![CDATA[https://airvpn.org/forums/topic/45519-eddie-icon-disappears-in-windows-10/?do=findComment&comment=101631]]></link><description>Sometimes, after a while, Eddie disappears so I cannot open the interface. The VPN connection is still active (and the process). I don't know how to reproduce this, but generally it happens after I've had it open for a while and then minimize it to the tray.</description><pubDate>Thu, 19 Sep 2019 15:51:57 +0000</pubDate></item><item><title>ssh into servers behind vpn</title><link><![CDATA[https://airvpn.org/forums/topic/45517-ssh-into-servers-behind-vpn/?do=findComment&comment=101624]]></link><description>Is it possible to ssh into a server running the vpn? I understand many will be sharing the same ip so i may need a different port forwarded. My plan is to run 5 different QTUM style testnet wallets on different devices using vpn so their ip is different. I know that port forwarding is possible so connecting to my nodes externally to configure things should be possible right? As for the service I see that 5 different devices are covered under one plan. Does this include 5 different servers at the same time? Sorry for many questions, I just want to double check before spending the money for a three year plan.</description><pubDate>Thu, 19 Sep 2019 07:06:30 +0000</pubDate></item><item><title>Ubuntu, using OpenVPN,  TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)</title><link><![CDATA[https://airvpn.org/forums/topic/45514-ubuntu-using-openvpn-tls-error-tls-key-negotiation-failed-to-occur-within-60-seconds-check-your-network-connectivity/?do=findComment&comment=101613]]></link><description><![CDATA[Hello, I'm getting TLS handshake failures when trying to connect with OpenVPN. I also cannot connect with the Eddie client. It used to work a couple days ago. Any ideas?   
$ openvpn --config AirVPN_America_TCP-443.ovpn 
Wed Sep 18 11:29:18 2019 OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2019 
Wed Sep 18 11:29:18 2019 library versions: OpenSSL 1.1.1  11 Sep 2018, LZO 2.08 
Wed Sep 18 11:29:18 2019 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Wed Sep 18 11:29:18 2019 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Wed Sep 18 11:29:20 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.194:443 
Wed Sep 18 11:29:20 2019 Socket Buffers: R=[87380-&gt;87380] S=[16384-&gt;16384] 
Wed Sep 18 11:29:20 2019 Attempting to establish TCP connection with [AF_INET]104.254.90.194:443 [nonblock] 
Wed Sep 18 11:29:21 2019 TCP connection established with [AF_INET]104.254.90.194:443 
Wed Sep 18 11:29:21 2019 TCP_CLIENT link local: (not bound) 
Wed Sep 18 11:29:21 2019 TCP_CLIENT link remote: [AF_INET]104.254.90.194:443 
Wed Sep 18 11:30:21 2019 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 
Wed Sep 18 11:30:21 2019 TLS Error: TLS handshake failed 
Wed Sep 18 11:30:21 2019 Fatal TLS error (check_tls_errors_co), restarting 
Wed Sep 18 11:30:21 2019 SIGUSR1[soft,tls-error] received, process restarting 
Wed Sep 18 11:30:21 2019 Restart pause, 5 second(s) 
Wed Sep 18 11:30:26 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.194:443 
Wed Sep 18 11:30:26 2019 Socket Buffers: R=[87380-&gt;87380] S=[16384-&gt;16384] 
Wed Sep 18 11:30:26 2019 Attempting to establish TCP connection with [AF_INET]104.254.90.194:443 [nonblock] 
Wed Sep 18 11:30:27 2019 TCP connection established with [AF_INET]104.254.90.194:443 
Wed Sep 18 11:30:27 2019 TCP_CLIENT link local: (not bound) 
Wed Sep 18 11:30:27 2019 TCP_CLIENT link remote: [AF_INET]104.254.90.194:443 
Wed Sep 18 11:31:27 2019 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 
Wed Sep 18 11:31:27 2019 TLS Error: TLS handshake failed 
Wed Sep 18 11:31:27 2019 Fatal TLS error (check_tls_errors_co), restarting 
Wed Sep 18 11:31:27 2019 SIGUSR1[soft,tls-error] received, process restarting 
Wed Sep 18 11:31:27 2019 Restart pause, 5 second(s) 
Wed Sep 18 11:31:32 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.194:443 
Wed Sep 18 11:31:32 2019 Socket Buffers: R=[87380-&gt;87380] S=[16384-&gt;16384] 
Wed Sep 18 11:31:32 2019 Attempting to establish TCP connection with [AF_INET]104.254.90.194:443 [nonblock] 
Wed Sep 18 11:31:33 2019 TCP connection established with [AF_INET]104.254.90.194:443 
Wed Sep 18 11:31:33 2019 TCP_CLIENT link local: (not bound) 
Wed Sep 18 11:31:33 2019 TCP_CLIENT link remote: [AF_INET]104.254.90.194:443 
Wed Sep 18 11:32:33 2019 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 
Wed Sep 18 11:32:33 2019 TLS Error: TLS handshake failed 
Wed Sep 18 11:32:33 2019 Fatal TLS error (check_tls_errors_co), restarting 
Wed Sep 18 11:32:33 2019 SIGUSR1[soft,tls-error] received, process restarting 
Wed Sep 18 11:32:33 2019 Restart pause, 5 second(s) 
Wed Sep 18 11:32:38 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.194:443 
Wed Sep 18 11:32:38 2019 Socket Buffers: R=[87380-&gt;87380] S=[16384-&gt;16384] 
Wed Sep 18 11:32:38 2019 Attempting to establish TCP connection with [AF_INET]104.254.90.194:443 [nonblock] 
Wed Sep 18 11:32:39 2019 TCP connection established with [AF_INET]104.254.90.194:443 
Wed Sep 18 11:32:39 2019 TCP_CLIENT link local: (not bound) 
Wed Sep 18 11:32:39 2019 TCP_CLIENT link remote: [AF_INET]104.254.90.194:443 
Wed Sep 18 11:33:39 2019 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 
Wed Sep 18 11:33:39 2019 TLS Error: TLS handshake failed 
Wed Sep 18 11:33:39 2019 Fatal TLS error (check_tls_errors_co), restarting 
Wed Sep 18 11:33:39 2019 SIGUSR1[soft,tls-error] received, process restarting 
Wed Sep 18 11:33:39 2019 Restart pause, 5 second(s) 
Wed Sep 18 11:33:44 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.194:443 
Wed Sep 18 11:33:44 2019 Socket Buffers: R=[87380-&gt;87380] S=[16384-&gt;16384] 
Wed Sep 18 11:33:44 2019 Attempting to establish TCP connection with [AF_INET]104.254.90.194:443 [nonblock] 
Wed Sep 18 11:33:45 2019 TCP connection established with [AF_INET]104.254.90.194:443 
Wed Sep 18 11:33:45 2019 TCP_CLIENT link local: (not bound) 
Wed Sep 18 11:33:45 2019 TCP_CLIENT link remote: [AF_INET]104.254.90.194:443]]></description><pubDate>Wed, 18 Sep 2019 15:36:16 +0000</pubDate></item><item><title>Problem drop connection after upgrade ubuntu</title><link><![CDATA[https://airvpn.org/forums/topic/45494-problem-drop-connection-after-upgrade-ubuntu/?do=findComment&comment=101579]]></link><description><![CDATA[Hello all. 
I updated ubuntu today from 18.04 to 19.04. I am using https://github.com/corrad1nho/qomui to connect to vpn. The Qomui logs are as follows:
 
2019-09-18 03:51:51,334 - DEBUG - Successfully connected to qomui-service via DBus
2019-09-18 03:51:51,358 - DEBUG - Current configuration: {'alt_dns1': '208.67.222.222', 'alt_dns2': '208.67.220.220', 'firewall': 0, 'autoconnect': 0, 'minimize': 0, 'ipv6_disable': 0, 'alt_dns': 0, 'bypass': 0, 'ping': 0, 'auto_update': 0, 'no_dnsmasq': 0, 'dns_off': 0, 'block_lan': 0, 'preserve_rules': 0, 'fw_gui_only': 0, 'log_level': 'Info'}
2019-09-18 03:51:51,360 - INFO - Qomui version 0.8.2
2019-09-18 03:51:51,368 - WARNING - [Errno 2] No such file or directory: '/home/x/.qomui/bypass_apps.json': Could not open /home/x/.qomui/bypass_apps.json
2019-09-18 03:51:51,372 - INFO - Total number of server: 241
2019-09-18 03:51:52,147 - ERROR - Could not identify default gateway for ipv6 - no network connectivity
2019-09-18 03:51:52,149 - INFO - Detected new network connection
2019-09-18 03:51:52,171 - WARNING - iptables: failed to apply ['-t', 'mangle', '-D', 'OUTPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-j', 'MARK', '--set-mark', '11']
2019-09-18 03:51:52,184 - WARNING - iptables: failed to apply ['-t', 'nat', '-D', 'POSTROUTING', '-m', 'cgroup', '--cgroup', '0x00110011', '-o', 'wlp8s0', '-j', 'MASQUERADE']
2019-09-18 03:51:52,196 - WARNING - iptables: failed to apply ['-D', 'OUTPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-j', 'ACCEPT']
2019-09-18 03:51:52,205 - WARNING - iptables: failed to apply ['-D', 'INPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-j', 'ACCEPT']
2019-09-18 03:51:52,217 - WARNING - iptables: failed to apply ['-t', 'nat', '-D', 'OUTPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-p', 'tcp', '--dport', '53', '-j', 'REDIRECT', '--to-ports', '5354']
2019-09-18 03:51:52,229 - WARNING - iptables: failed to apply ['-t', 'nat', '-D', 'OUTPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-p', 'udp', '--dport', '53', '-j', 'REDIRECT', '--to-ports', '5354']
2019-09-18 03:51:52,242 - WARNING - iptables: failed to apply ['-t', 'mangle', '-D', 'OUTPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-j', 'MARK', '--set-mark', '11']
2019-09-18 03:51:52,255 - WARNING - iptables: failed to apply ['-t', 'nat', '-D', 'POSTROUTING', '-m', 'cgroup', '--cgroup', '0x00110011', '-o', 'wlp8s0', '-j', 'MASQUERADE']
2019-09-18 03:51:52,269 - WARNING - iptables: failed to apply ['-D', 'OUTPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-j', 'ACCEPT']
2019-09-18 03:51:52,281 - WARNING - iptables: failed to apply ['-D', 'INPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-j', 'ACCEPT']
2019-09-18 03:51:52,294 - WARNING - iptables: failed to apply ['-t', 'nat', '-D', 'OUTPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-p', 'tcp', '--dport', '53', '-j', 'REDIRECT', '--to-ports', '5354']
2019-09-18 03:51:52,307 - WARNING - iptables: failed to apply ['-t', 'nat', '-D', 'OUTPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-p', 'udp', '--dport', '53', '-j', 'REDIRECT', '--to-ports', '5354']
2019-09-18 03:51:52,308 - INFO - Deleted cgroup
2019-09-18 03:52:09,142 - INFO - Configuration changes applied successfully
2019-09-18 03:52:09,149 - INFO - (Re-)enabled ipv6
2019-09-18 03:52:09,200 - INFO - iptables: flushed existing rules
2019-09-18 03:52:09,587 - INFO - iptables: activated firewall
2019-09-18 03:52:09,609 - WARNING - iptables: failed to apply ['-t', 'mangle', '-D', 'OUTPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-j', 'MARK', '--set-mark', '11']
2019-09-18 03:52:09,621 - WARNING - iptables: failed to apply ['-t', 'nat', '-D', 'POSTROUTING', '-m', 'cgroup', '--cgroup', '0x00110011', '-o', 'wlp8s0', '-j', 'MASQUERADE']
2019-09-18 03:52:09,633 - WARNING - iptables: failed to apply ['-D', 'OUTPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-j', 'ACCEPT']
2019-09-18 03:52:09,646 - WARNING - iptables: failed to apply ['-D', 'INPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-j', 'ACCEPT']
2019-09-18 03:52:09,660 - WARNING - iptables: failed to apply ['-t', 'nat', '-D', 'OUTPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-p', 'tcp', '--dport', '53', '-j', 'REDIRECT', '--to-ports', '5354']
2019-09-18 03:52:09,674 - WARNING - iptables: failed to apply ['-t', 'nat', '-D', 'OUTPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-p', 'udp', '--dport', '53', '-j', 'REDIRECT', '--to-ports', '5354']
2019-09-18 03:52:09,686 - WARNING - iptables: failed to apply ['-t', 'mangle', '-D', 'OUTPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-j', 'MARK', '--set-mark', '11']
2019-09-18 03:52:09,697 - WARNING - iptables: failed to apply ['-t', 'nat', '-D', 'POSTROUTING', '-m', 'cgroup', '--cgroup', '0x00110011', '-o', 'wlp8s0', '-j', 'MASQUERADE']
2019-09-18 03:52:09,709 - WARNING - iptables: failed to apply ['-D', 'OUTPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-j', 'ACCEPT']
2019-09-18 03:52:09,720 - WARNING - iptables: failed to apply ['-D', 'INPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-j', 'ACCEPT']
2019-09-18 03:52:09,732 - WARNING - iptables: failed to apply ['-t', 'nat', '-D', 'OUTPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-p', 'tcp', '--dport', '53', '-j', 'REDIRECT', '--to-ports', '5354']
2019-09-18 03:52:09,745 - WARNING - iptables: failed to apply ['-t', 'nat', '-D', 'OUTPUT', '-m', 'cgroup', '--cgroup', '0x00110011', '-p', 'udp', '--dport', '53', '-j', 'REDIRECT', '--to-ports', '5354']
2019-09-18 03:52:09,746 - INFO - Deleted cgroup
2019-09-18 03:52:21,089 - INFO - Connecting to Achernar....
2019-09-18 03:52:21,116 - INFO - iptables: created rule for 185.156.175.173
2019-09-18 03:52:21,118 - INFO - Establishing new OpenVPN tunnel
2019-09-18 03:52:21,121 - INFO - Establishing connection to Achernar
2019-09-18 03:52:21,128 - INFO - OpenVPN: OpenVPN 2.4.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2019
2019-09-18 03:52:21,128 - INFO - OpenVPN: library versions: OpenSSL 1.1.1b  26 Feb 2019, LZO 2.10
2019-09-18 03:52:21,130 - INFO - OpenVPN: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2019-09-18 03:52:21,131 - INFO - OpenVPN: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-09-18 03:52:21,131 - INFO - OpenVPN: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2019-09-18 03:52:21,132 - INFO - OpenVPN: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-09-18 03:52:21,132 - INFO - OpenVPN: TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.175.173:443
2019-09-18 03:52:21,132 - INFO - OpenVPN: Socket Buffers: R=[212992-&gt;212992] S=[212992-&gt;212992]
2019-09-18 03:52:21,133 - INFO - OpenVPN: UDP link local: (not bound)
2019-09-18 03:52:21,133 - INFO - OpenVPN: UDP link remote: [AF_INET]185.156.175.173:443
2019-09-18 03:52:21,180 - INFO - OpenVPN: TLS: Initial packet from [AF_INET]185.156.175.173:443, sid=8704f193 d15c68c0
2019-09-18 03:52:21,287 - INFO - OpenVPN: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
2019-09-18 03:52:21,289 - INFO - OpenVPN: VERIFY KU OK
2019-09-18 03:52:21,290 - INFO - OpenVPN: Validating certificate extended key usage
2019-09-18 03:52:21,291 - INFO - OpenVPN: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2019-09-18 03:52:21,292 - INFO - OpenVPN: VERIFY EKU OK
2019-09-18 03:52:21,294 - INFO - OpenVPN: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Achernar, emailAddress=info@airvpn.org
2019-09-18 03:52:21,605 - INFO - OpenVPN: Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
2019-09-18 03:52:21,606 - INFO - OpenVPN: [Achernar] Peer Connection Initiated with [AF_INET]185.156.175.173:443
2019-09-18 03:52:22,762 - INFO - OpenVPN: SENT CONTROL [Achernar]: 'PUSH_REQUEST' (status=1)
2019-09-18 03:52:22,813 - INFO - OpenVPN: PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.4.110.1,route-gateway 10.4.110.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.110.242 255.255.255.0,peer-id 1,cipher AES-256-GCM'
2019-09-18 03:52:22,814 - INFO - DNS: Overwriting /etc/resolv.conf with 10.4.110.1 and None
2019-09-18 03:52:22,818 - INFO - OpenVPN: OPTIONS IMPORT: timers and/or timeouts modified
2019-09-18 03:52:22,819 - INFO - OpenVPN: OPTIONS IMPORT: compression parms modified
2019-09-18 03:52:22,819 - INFO - OpenVPN: OPTIONS IMPORT: --ifconfig/up options modified
2019-09-18 03:52:22,820 - INFO - OpenVPN: OPTIONS IMPORT: route options modified
2019-09-18 03:52:22,821 - INFO - OpenVPN: OPTIONS IMPORT: route-related options modified
2019-09-18 03:52:22,821 - INFO - OpenVPN: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2019-09-18 03:52:22,822 - INFO - OpenVPN: OPTIONS IMPORT: peer-id set
2019-09-18 03:52:22,823 - INFO - OpenVPN: OPTIONS IMPORT: adjusting link_mtu to 1625
2019-09-18 03:52:22,823 - INFO - OpenVPN: OPTIONS IMPORT: data channel crypto options modified
2019-09-18 03:52:22,823 - INFO - OpenVPN: Data Channel: using negotiated cipher 'AES-256-GCM'
2019-09-18 03:52:22,824 - INFO - OpenVPN: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2019-09-18 03:52:22,824 - INFO - OpenVPN: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2019-09-18 03:52:22,825 - INFO - OpenVPN: ROUTE_GATEWAY 192.168.2.254/255.255.255.0 IFACE=wlp8s0 HWADDR=68:94:23:b5:8f:7d
2019-09-18 03:52:22,825 - INFO - OpenVPN: TUN/TAP device tun1 opened
2019-09-18 03:52:22,827 - INFO - OpenVPN: TUN/TAP TX queue length set to 100
2019-09-18 03:52:22,827 - INFO - OpenVPN: do_ifconfig, tt-&gt;did_ifconfig_ipv6_setup=0
2019-09-18 03:52:22,827 - INFO - OpenVPN: /sbin/ip link set dev tun1 up mtu 1500
2019-09-18 03:52:22,830 - INFO - OpenVPN: /sbin/ip addr add dev tun1 10.4.110.242/24 broadcast 10.4.110.255
2019-09-18 03:52:22,834 - INFO - OpenVPN: /sbin/ip route add 185.156.175.173/32 via 192.168.2.254
2019-09-18 03:52:22,845 - INFO - OpenVPN: /sbin/ip route add 0.0.0.0/1 via 10.4.110.1
2019-09-18 03:52:22,848 - INFO - OpenVPN: /sbin/ip route add 128.0.0.0/1 via 10.4.110.1
2019-09-18 03:52:22,852 - INFO - OpenVPN: Initialization Sequence Completed
2019-09-18 03:52:22,852 - INFO - DNS: Overwriting /etc/resolv.conf with 10.4.110.1 and None
2019-09-18 03:52:22,853 - INFO - Successfully connected to Achernar
2019-09-18 03:52:23,598 - ERROR - Import Error: QtWebEngine is not available
2019-09-18 03:53:52,434 - INFO - OpenVPN:
2019-09-18 03:53:52,439 - INFO - OpenVPN:
2019-09-18 03:53:52,439 - INFO - OpenVPN - process killed
2019-09-18 03:53:52,457 - INFO - Openvpn connection closed
Can anyone help me? :)]]></description><pubDate>Wed, 18 Sep 2019 02:00:24 +0000</pubDate></item><item><title>? about server scoring</title><link><![CDATA[https://airvpn.org/forums/topic/45453-about-server-scoring/?do=findComment&comment=101484]]></link><description>I'm a newbie at all this, so please excuse me if this is something already known to you all.  
In the Eddie client screen, when I take a look at available servers to connect to, the scoring seems to be heavily oriented towards Canada.  None of the USA servers have even a one star rating even though they should certainly be closer to me (north Florida, USA) than any of the other selections.  So I am assuming that none of the USA servers will ever be selected if I just let Eddie make the decision on who to connect to.  So why the low rating to basically exclude the USA servers from an automated selection?</description><pubDate>Mon, 16 Sep 2019 23:21:44 +0000</pubDate></item><item><title>Can't connect with IPv6, IPv4 has no speed, Network lock disables internet.</title><link><![CDATA[https://airvpn.org/forums/topic/45445-cant-connect-with-ipv6-ipv4-has-no-speed-network-lock-disables-internet/?do=findComment&comment=101468]]></link><description>Hey all,    
	    I'm excited to start using AirVPN.  I'm running into a couple of issues.  When I try connecting with IPv6 enabled it gets stuck and never connects.  When I try connecting with just IPv4, it works!  However the download and upload are both 0 bits.  When I try using network lock with the IPv4 connection, it worsens even further by disabling even web browser connection.  I can connect to the web when using only IPv4, but not when network lock is activated.  (I'm activating network lock and then connecting to the VPN)   Is the speed supposed to read only how much is being used currently?   If so that's not a problem.  I still would like to be able to use network lock.   I noticed NordVPN in my network adapters could that interfere?  Log files included.    
	Edit:  Hey sorry everyone seems to be working now!  Thanks.    
	Edit2:  Well IPv4, still no dice on IPv6.   Will this be a detriment?  
 


	ipv4 network lock.txt ipv4 no lock.txt ipv6 no lock.txt ipv6 lock.txt</description><pubDate>Mon, 16 Sep 2019 19:18:43 +0000</pubDate></item><item><title>Does Country matter?</title><link><![CDATA[https://airvpn.org/forums/topic/45444-does-country-matter/?do=findComment&comment=101465]]></link><description>Hi  
Maybe a dumb question but I've been using airvpn for years but i have always use a server in Canada because i wasn't sure if servers in the US are as 'safe/secure'. Is there really any difference? Is it safe to use servers in the US for torrenting? I think my speeds and latency might be better if i used a closer server. thanks in advance.</description><pubDate>Mon, 16 Sep 2019 18:46:35 +0000</pubDate></item><item><title>Port Forwarding For A Game (Opening NAT)</title><link><![CDATA[https://airvpn.org/forums/topic/45420-port-forwarding-for-a-game-opening-nat/?do=findComment&comment=101407]]></link><description>Hi I went to test out the port forwarding feature to open my NAT type for call of duty modern warfare 2, but my NAT type is still strict. I want to host some games but use a vpn so people will not ddos my home IP. The ports are: TCP - 3074,27014-27050 and UDP 3478,4379-4380,27000-27031,27036. Maybe I entered them incorrectly?</description><pubDate>Sun, 15 Sep 2019 17:16:41 +0000</pubDate></item><item><title>Control Eddie Client via scripts</title><link><![CDATA[https://airvpn.org/forums/topic/45410-control-eddie-client-via-scripts/?do=findComment&comment=101385]]></link><description>Hi, I am wondering whether is it possible to control Eddie VPN via commands, signals,etc?  
I need only a single feature, to change VPN servers via scripts. Currently I am running it on MacOS, but I also have Linux.  
Please suggest what are the ways to change VPN from scripts automatically?</description><pubDate>Sun, 15 Sep 2019 07:08:01 +0000</pubDate></item><item><title><![CDATA[Eddie & openvpn with Android 9 pie]]></title><link><![CDATA[https://airvpn.org/forums/topic/45388-eddie-openvpn-with-android-9-pie/?do=findComment&comment=101328]]></link><description>Hi there I wonder if anybody can help me I have a new Android box what has Android 9 pie when I use Eddie or open VPN when I am connected to the Ethernet and I connect to the Netherlands or United States  the apps crash and knocks out my internet connection I have to reboot the box Android box but when I use Wi-Fi the apps work OK but the internet is not as good as wired is there a problem with Android 9 pie regards Dave</description><pubDate>Sat, 14 Sep 2019 06:06:16 +0000</pubDate></item><item><title>Replacing Asus RT-AC56U (UK user)</title><link><![CDATA[https://airvpn.org/forums/topic/45376-replacing-asus-rt-ac56u-uk-user/?do=findComment&comment=101293]]></link><description>Hi,  
Finding my VPN speed being crippled to around 15Mbps, which was fine when our actual broadband speed was less than that, however, recent fibre upgrade has put us into the 250Mbps territory. When tested directly through OpenVPN I'm able to get around 100+Mbps using the same settings as the router, so I'm guessing it's a CPU issue within the Asus. According to Tomato it's a dual core ARM 800mhz, which seems fairly quick compared to what else is around - would a 2nd hand Netgear R7000 be that much of an improvement?  
What do people suggest. Bear in mind, I'm UK based, so model numbers might be different, and I'll be putting Advanced Tomato on whatever I end up with.  
Cheers.</description><pubDate>Fri, 13 Sep 2019 17:26:53 +0000</pubDate></item><item><title>How setup portforwarding</title><link><![CDATA[https://airvpn.org/forums/topic/45372-how-setup-portforwarding/?do=findComment&comment=101278]]></link><description><![CDATA[Hello all, 
 


	 
 


	If I read and understand the forum correctly, I’m not the only one who is unable to set up a port forwarding with vpn. 
 


	 
 


	Because I have tried all sorts of things and cannot find a solution, I’m curious if there is someone who can help me out on this. 
 


	 
 


	What I want to do: 
 


	I want to acces my NASserver and my Webcam from outside my network. This requires three ports. I chose Air vpn because they support port forwarding and I bought an Asus router (RT-AC66U) that has a vpn-server and that also has a vpn-client. 
 


	 
 


	My network configuration is set as follows:
 


	- modem / router from ISP (iprange 192.168.xxx.xxx)
 


	- behind it the Asus router (iprange 192.169.xxx.xxx)
 


	- WAN port Asus router is connected to LAN port of ISP
 


	- behind Asus router an additional router (sitecom) that serves as an "amplifier". These routers are connected by a cable between LAN. The sitecom router has a fixed IP address within the range of the Asus router.
 


	- DHCP from sitecom is switched off. Asus router controls the allocation of IP addresses and handling of internet traffic.
 


	 
 


	This setup has always worked great (without VPN). After setting up a vpn-client, all computers, phones etc can acces the internet without any problems. The NASserver is able to make a backup via a built-in SSH to a server at a different location (outside LAN). 
 


	It is no longer possible to access the NAS server from outside the LAN via http / ftp / sftp. 
 


	 
 


	I tried the following to get it working: 
 


	- vpn server enabled / vpn client disabled 
	- vpn server enabled &amp; vpn client enabled 
	- nasserver provided with ipadress within range of vpn-server
 


	- routes
 


	- Port forwarding set from VPN server to LAN and vice versa I don't get it working.
 


	 
 


	Thanks in advance for your tips and help   
	Kind regards,   
	Ivo]]></description><pubDate>Fri, 13 Sep 2019 11:54:49 +0000</pubDate></item><item><title>AirVPN on DDWRT: Connected to VPN, but no internet access</title><link><![CDATA[https://airvpn.org/forums/topic/45370-airvpn-on-ddwrt-connected-to-vpn-but-no-internet-access/?do=findComment&comment=101273]]></link><description><![CDATA[Hi. I've been using AirVPN on a DDWRT router for about 3 months with no problems. I haven't changed any settings since I set it up, but when I came home, it has stopped giving me access to the internet. Before I left home a few hours earlier, it was fine. Done lots of reboots of all the routers on the network, but with no success. I'm connected to GB servers. I have tried connecting to US and NL servers and the same occurred. Any help would be welcomed. Here are the logs: 
	 
 





Server: : Local Address: Remote Address: Client: CONNECTED: SUCCESS Local Address: 10.10.44.198 Remote Address: 10.10.44.198



Serverlog Clientlog 19700101 00:00:21 I OpenVPN 2.3.0 mipsel-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Mar 25 2013 
19700101 00:00:21 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16 
19700101 00:00:21 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 
19700101 00:00:21 W WARNING: file '/tmp/openvpncl/client.key' is group or others accessible 
19700101 00:00:21 W WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible 
19700101 00:00:21 I Control Channel Authentication: using '/tmp/openvpncl/ta.key' as a OpenVPN static key file 
19700101 00:00:21 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
19700101 00:00:21 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
19700101 00:00:21 Socket Buffers: R=[114688-&gt;131072] S=[114688-&gt;131072] 
19700101 00:00:21 I UDPv4 link local: [undef] 
19700101 00:00:21 I UDPv4 link remote: [AF_INET]217.151.98.167:443 
19700101 00:00:21 TLS: Initial packet from [AF_INET]217.151.98.167:443 sid=0ac94a8a b007a465 
19700101 00:00:21 N VERIFY ERROR: depth=1 error=certificate is not yet valid: C=IT ST=IT L=Perugia O=airvpn.org CN=airvpn.org CA emailAddress=info@airvpn.org 
19700101 00:00:21 N TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:lib(20):func(144):reason(134) 
19700101 00:00:21 N TLS Error: TLS object -&gt; incoming plaintext read error 
19700101 00:00:21 NOTE: --mute triggered... 
19700101 00:00:21 1 variation(s) on previous 3 message(s) suppressed by --mute 
19700101 00:00:21 I SIGUSR1[soft tls-error] received process restarting 
19700101 00:00:21 Restart pause 2 second(s) 
20190913 10:43:25 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 
20190913 10:43:25 Socket Buffers: R=[114688-&gt;131072] S=[114688-&gt;131072] 
20190913 10:43:25 I UDPv4 link local: [undef] 
20190913 10:43:25 I UDPv4 link remote: [AF_INET]217.151.98.167:443 
20190913 10:43:25 TLS: Initial packet from [AF_INET]217.151.98.167:443 sid=6a62150a 59a5e44b 
20190913 10:43:25 VERIFY OK: depth=1 C=IT ST=IT L=Perugia O=airvpn.org CN=airvpn.org CA emailAddress=info@airvpn.org 
20190913 10:43:25 Validating certificate key usage 
20190913 10:43:25 NOTE: --mute triggered... 
20190913 10:43:48 6 variation(s) on previous 3 message(s) suppressed by --mute 
20190913 10:43:48 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 
20190913 10:43:48 N TLS Error: Unroutable control packet received from [AF_INET]217.151.98.167:443 (si=3 op=P_CONTROL_V1) 
20190913 10:43:48 D MANAGEMENT: CMD 'state' 
20190913 10:43:48 N TLS Error: Unroutable control packet received from [AF_INET]217.151.98.167:443 (si=3 op=P_CONTROL_V1) 
20190913 10:43:48 MANAGEMENT: Client disconnected 
20190913 10:43:48 N TLS Error: Unroutable control packet received from [AF_INET]217.151.98.167:443 (si=3 op=P_CONTROL_V1) 
20190913 10:43:48 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 
20190913 10:43:48 N TLS Error: Unroutable control packet received from [AF_INET]217.151.98.167:443 (si=3 op=P_CONTROL_V1) 
20190913 10:43:48 D MANAGEMENT: CMD 'state' 
20190913 10:43:48 MANAGEMENT: Client disconnected 
20190913 10:43:48 N TLS Error: Unroutable control packet received from [AF_INET]217.151.98.167:443 (si=3 op=P_CONTROL_V1) 
20190913 10:43:48 N TLS Error: Unroutable control packet received from [AF_INET]217.151.98.167:443 (si=3 op=P_CONTROL_V1) 
20190913 10:43:48 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 
20190913 10:43:48 N TLS Error: Unroutable control packet received from [AF_INET]217.151.98.167:443 (si=3 op=P_CONTROL_V1) 
20190913 10:43:48 D MANAGEMENT: CMD 'state' 
20190913 10:43:48 N TLS Error: Unroutable control packet received from [AF_INET]217.151.98.167:443 (si=3 op=P_CONTROL_V1) 
20190913 10:43:48 MANAGEMENT: Client disconnected 
20190913 10:43:48 N TLS Error: Unroutable control packet received from [AF_INET]217.151.98.167:443 (si=3 op=P_CONTROL_V1) 
20190913 10:43:48 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key 
20190913 10:43:48 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication 
20190913 10:43:48 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key 
20190913 10:43:48 NOTE: --mute triggered... 
20190913 10:43:48 2 variation(s) on previous 3 message(s) suppressed by --mute 
20190913 10:43:48 I [server] Peer Connection Initiated with [AF_INET]217.151.98.167:443 
20190913 10:43:48 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 
20190913 10:43:48 D MANAGEMENT: CMD 'log 500' 
20190913 10:43:48 MANAGEMENT: Client disconnected 
20190913 10:43:51 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) 
20190913 10:43:51 PUSH: Received control message: 'PUSH_REPLY comp-lzo no redirect-gateway def1 bypass-dhcp dhcp-option DNS 10.10.44.1 route-gateway 10.10.44.1 topology subnet ping 10 ping-restart 60 ifconfig 10.10.44.198 255.255.255.0' 
20190913 10:43:51 OPTIONS IMPORT: timers and/or timeouts modified 
20190913 10:43:51 NOTE: --mute triggered... 
20190913 10:43:51 5 variation(s) on previous 3 message(s) suppressed by --mute 
20190913 10:43:51 ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=vlan2 HWADDR=c8:b3:73:00:d0:eb 
20190913 10:43:51 I TUN/TAP device tun1 opened 
20190913 10:43:51 TUN/TAP TX queue length set to 100 
20190913 10:43:51 I do_ifconfig tt-&gt;ipv6=1 tt-&gt;did_ifconfig_ipv6_setup=0 
20190913 10:43:51 I /sbin/ifconfig tun1 10.10.44.198 netmask 255.255.255.0 mtu 1500 broadcast 10.10.44.255 
20190913 10:43:56 /sbin/route add -net 217.151.98.167 netmask 255.255.255.255 gw 192.168.1.254 
20190913 10:43:56 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.10.44.1 
20190913 10:43:56 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.10.44.1 
20190913 10:43:56 I Initialization Sequence Completed 
20190913 10:43:56 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 
20190913 10:43:56 D MANAGEMENT: CMD 'state' 
20190913 10:43:56 MANAGEMENT: Client disconnected 
20190913 10:43:57 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 
20190913 10:43:57 D MANAGEMENT: CMD 'state' 
20190913 10:43:57 MANAGEMENT: Client disconnected 
20190913 10:43:57 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 
20190913 10:43:57 D MANAGEMENT: CMD 'state' 
20190913 10:43:57 MANAGEMENT: Client disconnected 
20190913 10:43:57 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 
20190913 10:43:57 D MANAGEMENT: CMD 'log 500' 
19700101 00:00:00]]></description><pubDate>Fri, 13 Sep 2019 09:54:12 +0000</pubDate></item><item><title>speeds spiking significantly and are very slow</title><link><![CDATA[https://airvpn.org/forums/topic/45364-speeds-spiking-significantly-and-are-very-slow/?do=findComment&comment=101251]]></link><description><![CDATA[I got AirVPN a couple of days ago and up until now I was extremely satisfied with it. However, today (and also yesterday) my download speeds have been spiking constantly, going from 4 kbit/s to 2 mbit/s and back down to 0, so on and so forth. I seem unable to maintain a constant download speed. I just bought 3 months of AirVPN and this really just seems unacceptable to me but I'm sure it's something wrong on my side. I'm really not great with this kind of stuff (technology more advanced than Google Drive) and would really appreciate some help. I'm hoping to use the VPN for torrenting. I've tried different protocols and none of them seem to fix this issue. I've also applied mssfix and have tried port forwarding as well. My ISP is TDS if that means anything. I also tried changing the buffer sizes but it has no effect. 
	Here are some logs:
 


	
		Eddie System/Environment Report - 9/13/2019 2:06 AM UTC  
		Eddie version: 2.16.3 
		Eddie OS build: windows_x64 
		Eddie architecture: x64 
		OS type: Windows 
		OS name: Windows 10 Home 
		OS version: Microsoft Windows NT 10.0.18362.0 
		OS architecture: x64 
		Mono /.Net Framework: v4.0.30319 
		OpenVPN driver: TAP-Windows Adapter V9 #2, version 9.21.2 
		OpenVPN: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) 
		SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe) 
		SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) 
		curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe) 
		Profile path: C:\Users\tropi\AppData\Local\AirVPN\default.xml 
		Data path: C:\Users\tropi\AppData\Local\AirVPN 
		Application path: C:\Program Files\AirVPN 
		Executable path: C:\Program Files\AirVPN\Eddie-UI.exe 
		Command line arguments: (1 args) path="home" 
		Network Lock Active: No 
		Connected to VPN: Yes, Anser 
		Detected DNS: 10.9.90.1, 192.168.0.1, 216.170.153.146, fde6:7a:7d20:55a::1 
		Test DNS IPv4: Ok 
		Test DNS IPv6: Ok 
		Test Ping IPv4: 257 ms 
		Test Ping IPv6: 253 ms 
		Test HTTP IPv4: Ok 
		Test HTTP IPv6: Ok 
		Test HTTPS: Ok 
		---------------------------- 
		Important options not at defaults:  
		login: (omissis) 
		password: (omissis) 
		remember: True 
		servers.blacklist: 9c6476c8458f559686cd084a78d622e6ae7ccd26d1fbeb8cd50b8c6350146291 
		mode.protocol: UDP 
		mode.alt: 3 
		openvpn.custom: mssfix 1442  
		openvpn.sndbuf: -1 
		openvpn.rcvbuf: -1  
		---------------------------- 
		Logs:  
		. 2019.09.12 20:12:54 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.18362.0, Mono/.Net: v4.0.30319 
		. 2019.09.12 20:12:54 - Reading options from C:\Users\tropi\AppData\Local\AirVPN\default.xml 
		. 2019.09.12 20:12:55 - Command line arguments (1): path="home" 
		. 2019.09.12 20:12:55 - Profile path: C:\Users\tropi\AppData\Local\AirVPN\default.xml 
		. 2019.09.12 20:12:58 - OpenVPN Driver - TAP-Windows Adapter V9 #2, version 9.21.2 
		. 2019.09.12 20:12:58 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) 
		. 2019.09.12 20:12:58 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe) 
		. 2019.09.12 20:12:58 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) 
		. 2019.09.12 20:12:58 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe) 
		. 2019.09.12 20:12:58 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem 
		. 2019.09.12 20:12:58 - Updating systems &amp; servers data ... 
		I 2019.09.12 20:12:58 - Ready 
		. 2019.09.12 20:12:59 - Systems &amp; servers data update completed 
		I 2019.09.12 20:13:42 - Session starting. 
		I 2019.09.12 20:13:42 - Checking authorization ... 
		! 2019.09.12 20:13:43 - Connecting to Alwaid (Canada, Toronto, Ontario) 
		. 2019.09.12 20:13:43 - OpenVPN &gt; OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 
		. 2019.09.12 20:13:43 - OpenVPN &gt; Windows version 6.2 (Windows 8 or greater) 64bit 
		. 2019.09.12 20:13:43 - OpenVPN &gt; library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 
		. 2019.09.12 20:13:43 - Connection to OpenVPN Management Interface 
		. 2019.09.12 20:13:43 - OpenVPN &gt; MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 
		. 2019.09.12 20:13:43 - OpenVPN &gt; Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2019.09.12 20:13:43 - OpenVPN &gt; Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2019.09.12 20:13:43 - OpenVPN &gt; Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2019.09.12 20:13:43 - OpenVPN &gt; Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2019.09.12 20:13:43 - OpenVPN &gt; TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.117:1194 
		. 2019.09.12 20:13:43 - OpenVPN &gt; Socket Buffers: R=[65536-&gt;524288] S=[65536-&gt;524288] 
		. 2019.09.12 20:13:43 - OpenVPN &gt; Attempting to establish TCP connection with [AF_INET]184.75.221.117:1194 [nonblock] 
		. 2019.09.12 20:13:43 - OpenVPN &gt; MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 
		. 2019.09.12 20:13:44 - OpenVPN &gt; TCP connection established with [AF_INET]184.75.221.117:1194 
		. 2019.09.12 20:13:44 - OpenVPN &gt; TCP_CLIENT link local: (not bound) 
		. 2019.09.12 20:13:44 - OpenVPN &gt; TCP_CLIENT link remote: [AF_INET]184.75.221.117:1194 
		. 2019.09.12 20:13:44 - OpenVPN &gt; TLS: Initial packet from [AF_INET]184.75.221.117:1194, sid=60f0ff1e 8d313054 
		. 2019.09.12 20:13:44 - OpenVPN &gt; VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org 
		. 2019.09.12 20:13:44 - OpenVPN &gt; VERIFY KU OK 
		. 2019.09.12 20:13:44 - OpenVPN &gt; Validating certificate extended key usage 
		. 2019.09.12 20:13:44 - OpenVPN &gt; ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 
		. 2019.09.12 20:13:44 - OpenVPN &gt; VERIFY EKU OK 
		. 2019.09.12 20:13:44 - OpenVPN &gt; VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org 
		. 2019.09.12 20:13:44 - OpenVPN &gt; Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA 
		. 2019.09.12 20:13:44 - OpenVPN &gt; [server] Peer Connection Initiated with [AF_INET]184.75.221.117:1194 
		. 2019.09.12 20:13:45 - OpenVPN &gt; SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) 
		. 2019.09.12 20:13:45 - OpenVPN &gt; PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.155.1,dhcp-option DNS6 fde6:7a:7d20:49b::1,tun-ipv6,route-gateway 10.8.155.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:49b::1034/64 fde6:7a:7d20:49b::1,ifconfig 10.8.155.54 255.255.255.0,peer-id 0,cipher AES-256-GCM' 
		. 2019.09.12 20:13:45 - OpenVPN &gt; Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' 
		. 2019.09.12 20:13:45 - OpenVPN &gt; OPTIONS IMPORT: timers and/or timeouts modified 
		. 2019.09.12 20:13:45 - OpenVPN &gt; OPTIONS IMPORT: compression parms modified 
		. 2019.09.12 20:13:45 - OpenVPN &gt; OPTIONS IMPORT: --ifconfig/up options modified 
		. 2019.09.12 20:13:45 - OpenVPN &gt; OPTIONS IMPORT: route-related options modified 
		. 2019.09.12 20:13:45 - OpenVPN &gt; OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified 
		. 2019.09.12 20:13:45 - OpenVPN &gt; OPTIONS IMPORT: peer-id set 
		. 2019.09.12 20:13:45 - OpenVPN &gt; OPTIONS IMPORT: adjusting link_mtu to 1627 
		. 2019.09.12 20:13:45 - OpenVPN &gt; OPTIONS IMPORT: data channel crypto options modified 
		. 2019.09.12 20:13:45 - OpenVPN &gt; Data Channel: using negotiated cipher 'AES-256-GCM' 
		. 2019.09.12 20:13:45 - OpenVPN &gt; Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2019.09.12 20:13:45 - OpenVPN &gt; Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2019.09.12 20:13:45 - OpenVPN &gt; interactive service msg_channel=0 
		. 2019.09.12 20:13:45 - OpenVPN &gt; ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=15 HWADDR=10:02:b5:86:59:5c 
		. 2019.09.12 20:13:45 - OpenVPN &gt; GDG6: remote_host_ipv6=n/a 
		. 2019.09.12 20:13:45 - OpenVPN &gt; NOTE: GetBestInterfaceEx returned error: Element not found.   (code=1168) 
		. 2019.09.12 20:13:45 - OpenVPN &gt; ROUTE6: default_gateway=UNDEF 
		. 2019.09.12 20:13:45 - OpenVPN &gt; open_tun 
		. 2019.09.12 20:13:46 - OpenVPN &gt; TAP-WIN32 device [Ethernet 4] opened: \\.\Global\{EC5D0326-55CA-4233-B026-CDC459606FF8}.tap 
		. 2019.09.12 20:13:46 - OpenVPN &gt; TAP-Windows Driver Version 9.21 
		. 2019.09.12 20:13:46 - OpenVPN &gt; Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.155.0/10.8.155.54/255.255.255.0 [SUCCEEDED] 
		. 2019.09.12 20:13:46 - OpenVPN &gt; Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.155.54/255.255.255.0 on interface {EC5D0326-55CA-4233-B026-CDC459606FF8} [DHCP-serv: 10.8.155.254, lease-time: 31536000] 
		. 2019.09.12 20:13:46 - OpenVPN &gt; Successful ARP Flush on interface [23] {EC5D0326-55CA-4233-B026-CDC459606FF8} 
		. 2019.09.12 20:13:46 - OpenVPN &gt; do_ifconfig, tt-&gt;did_ifconfig_ipv6_setup=1 
		. 2019.09.12 20:13:47 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=23 fde6:7a:7d20:49b::1034 store=active 
		. 2019.09.12 20:13:48 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 4 static fde6:7a:7d20:49b::1 validate=no 
		. 2019.09.12 20:13:48 - Detected an OpenVPN bug (On-Link route on VPN range), autofix. 
		. 2019.09.12 20:13:48 - OpenVPN &gt; add_route_ipv6(fde6:7a:7d20:49b::/64 -&gt; fde6:7a:7d20:49b::1034 metric 0) dev Ethernet 4 
		. 2019.09.12 20:13:48 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:49b::/64 interface=23 fe80::8 store=active 
		. 2019.09.12 20:13:48 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:13:53 - OpenVPN &gt; TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up 
		. 2019.09.12 20:13:53 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 184.75.221.117 MASK 255.255.255.255 192.168.0.1 
		. 2019.09.12 20:13:53 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 
		. 2019.09.12 20:13:53 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:13:53 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.155.1 
		. 2019.09.12 20:13:53 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 
		. 2019.09.12 20:13:53 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:13:53 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.155.1 
		. 2019.09.12 20:13:53 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 
		. 2019.09.12 20:13:53 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:13:53 - OpenVPN &gt; add_route_ipv6(::/3 -&gt; fde6:7a:7d20:49b::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:13:53 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=23 fe80::8 store=active 
		. 2019.09.12 20:13:53 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:13:53 - OpenVPN &gt; add_route_ipv6(2000::/4 -&gt; fde6:7a:7d20:49b::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:13:53 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:13:53 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:13:53 - OpenVPN &gt; add_route_ipv6(3000::/4 -&gt; fde6:7a:7d20:49b::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:13:53 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:13:53 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:13:53 - OpenVPN &gt; add_route_ipv6(fc00::/7 -&gt; fde6:7a:7d20:49b::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:13:53 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=23 fe80::8 store=active 
		. 2019.09.12 20:13:53 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:13:53 - Interface Ethernet 4 metric changed from Automatic to 3, layer IPv4 
		. 2019.09.12 20:13:53 - Interface Ethernet 4 metric changed from Automatic to 3, layer IPv6 
		. 2019.09.12 20:13:53 - DNS leak protection with packet filtering enabled. 
		. 2019.09.12 20:13:54 - DNS IPv4 of a network adapter forced (Ethernet 4, from automatic to 10.8.155.1) 
		. 2019.09.12 20:13:54 - DNS IPv6 of a network adapter forced (Ethernet 4, from automatic to fde6:7a:7d20:49b::1) 
		. 2019.09.12 20:13:54 - Routes, added a new route, 184.75.221.115 for gateway 10.8.155.1 
		. 2019.09.12 20:13:54 - Routes, added a new route, 2606:6080:1001:11:60bc:461c:1305:bb4b for gateway fde6:7a:7d20:49b::1 
		. 2019.09.12 20:13:54 - Flushing DNS 
		I 2019.09.12 20:13:58 - Checking route IPv4 
		I 2019.09.12 20:13:58 - Checking route IPv6 
		I 2019.09.12 20:14:02 - Checking DNS 
		! 2019.09.12 20:14:02 - Connected. 
		. 2019.09.12 20:14:02 - OpenVPN &gt; Initialization Sequence Completed 
		. 2019.09.12 20:23:03 - Updating systems &amp; servers data ... 
		. 2019.09.12 20:23:04 - Systems &amp; servers data update completed 
		. 2019.09.12 20:33:08 - Updating systems &amp; servers data ... 
		. 2019.09.12 20:33:09 - Systems &amp; servers data update completed 
		! 2019.09.12 20:34:58 - Disconnecting 
		. 2019.09.12 20:34:59 - Routes, removed a route previously added, 184.75.221.115 for gateway 10.8.155.1 
		. 2019.09.12 20:34:59 - Routes, removed a route previously added, 2606:6080:1001:11:60bc:461c:1305:bb4b for gateway fde6:7a:7d20:49b::1 
		. 2019.09.12 20:34:59 - Sending management termination signal 
		. 2019.09.12 20:34:59 - Management - Send 'signal SIGTERM' 
		. 2019.09.12 20:34:59 - OpenVPN &gt; MANAGEMENT: CMD 'signal SIGTERM' 
		. 2019.09.12 20:34:59 - OpenVPN &gt; C:\WINDOWS\system32\route.exe DELETE 184.75.221.117 MASK 255.255.255.255 192.168.0.1 
		. 2019.09.12 20:34:59 - OpenVPN &gt; Route deletion via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:34:59 - OpenVPN &gt; C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.155.1 
		. 2019.09.12 20:34:59 - OpenVPN &gt; Route deletion via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:34:59 - OpenVPN &gt; C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.8.155.1 
		. 2019.09.12 20:34:59 - OpenVPN &gt; Route deletion via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:34:59 - OpenVPN &gt; delete_route_ipv6(::/3) 
		. 2019.09.12 20:34:59 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=23 fe80::8 store=active 
		. 2019.09.12 20:34:59 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:34:59 - OpenVPN &gt; delete_route_ipv6(2000::/4) 
		. 2019.09.12 20:34:59 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:34:59 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:34:59 - OpenVPN &gt; delete_route_ipv6(3000::/4) 
		. 2019.09.12 20:34:59 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:34:59 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:34:59 - OpenVPN &gt; delete_route_ipv6(fc00::/7) 
		. 2019.09.12 20:34:59 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=23 fe80::8 store=active 
		. 2019.09.12 20:34:59 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:35:00 - OpenVPN &gt; Closing TUN/TAP interface 
		. 2019.09.12 20:35:00 - OpenVPN &gt; delete_route_ipv6(fde6:7a:7d20:49b::/64) 
		. 2019.09.12 20:35:00 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:49b::/64 interface=23 fe80::8 store=active 
		. 2019.09.12 20:35:00 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 4 fde6:7a:7d20:49b::1034 store=active 
		. 2019.09.12 20:35:00 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 4 all 
		. 2019.09.12 20:35:00 - OpenVPN &gt; TAP: DHCP address released 
		. 2019.09.12 20:35:00 - OpenVPN &gt; SIGTERM[hard,] received, process exiting 
		. 2019.09.12 20:35:00 - Connection terminated. 
		. 2019.09.12 20:35:00 - DNS IPv4 of a network adapter restored to original settings (Ethernet 4, to automatic) 
		. 2019.09.12 20:35:01 - DNS IPv6 of a network adapter restored to original settings (Ethernet 4, to automatic) 
		. 2019.09.12 20:35:01 - DNS leak protection with packet filtering disabled. 
		. 2019.09.12 20:35:01 - Interface Ethernet 4 metric restored from 3 to Automatic, layer IPv4 
		. 2019.09.12 20:35:01 - Interface Ethernet 4 metric restored from 3 to Automatic, layer IPv6 
		. 2019.09.12 20:35:01 - Flushing DNS 
		! 2019.09.12 20:35:04 - Session terminated. 
		I 2019.09.12 20:35:34 - Session starting. 
		I 2019.09.12 20:35:34 - Checking authorization ... 
		! 2019.09.12 20:35:35 - Connecting to Enif (Canada, Toronto, Ontario) 
		. 2019.09.12 20:35:35 - OpenVPN &gt; OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 
		. 2019.09.12 20:35:35 - OpenVPN &gt; Windows version 6.2 (Windows 8 or greater) 64bit 
		. 2019.09.12 20:35:35 - OpenVPN &gt; library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 
		. 2019.09.12 20:35:35 - Connection to OpenVPN Management Interface 
		. 2019.09.12 20:35:35 - OpenVPN &gt; MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 
		. 2019.09.12 20:35:35 - OpenVPN &gt; Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2019.09.12 20:35:35 - OpenVPN &gt; Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2019.09.12 20:35:35 - OpenVPN &gt; Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2019.09.12 20:35:35 - OpenVPN &gt; Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2019.09.12 20:35:35 - OpenVPN &gt; TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.245:2018 
		. 2019.09.12 20:35:35 - OpenVPN &gt; Socket Buffers: R=[65536-&gt;524288] S=[65536-&gt;524288] 
		. 2019.09.12 20:35:35 - OpenVPN &gt; Attempting to establish TCP connection with [AF_INET]104.254.90.245:2018 [nonblock] 
		. 2019.09.12 20:35:35 - OpenVPN &gt; MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 
		. 2019.09.12 20:35:36 - OpenVPN &gt; TCP connection established with [AF_INET]104.254.90.245:2018 
		. 2019.09.12 20:35:36 - OpenVPN &gt; TCP_CLIENT link local: (not bound) 
		. 2019.09.12 20:35:36 - OpenVPN &gt; TCP_CLIENT link remote: [AF_INET]104.254.90.245:2018 
		. 2019.09.12 20:35:36 - OpenVPN &gt; TLS: Initial packet from [AF_INET]104.254.90.245:2018, sid=154320cf 5e27c918 
		. 2019.09.12 20:35:36 - OpenVPN &gt; VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org 
		. 2019.09.12 20:35:36 - OpenVPN &gt; VERIFY KU OK 
		. 2019.09.12 20:35:36 - OpenVPN &gt; Validating certificate extended key usage 
		. 2019.09.12 20:35:36 - OpenVPN &gt; ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 
		. 2019.09.12 20:35:36 - OpenVPN &gt; VERIFY EKU OK 
		. 2019.09.12 20:35:36 - OpenVPN &gt; VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org 
		. 2019.09.12 20:35:36 - OpenVPN &gt; Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA 
		. 2019.09.12 20:35:36 - OpenVPN &gt; [server] Peer Connection Initiated with [AF_INET]104.254.90.245:2018 
		. 2019.09.12 20:35:37 - OpenVPN &gt; SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) 
		. 2019.09.12 20:35:38 - OpenVPN &gt; PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.91.1,dhcp-option DNS6 fde6:7a:7d20:c5b::1,tun-ipv6,route-gateway 10.16.91.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:c5b::102f/64 fde6:7a:7d20:c5b::1,ifconfig 10.16.91.49 255.255.255.0,peer-id 0,cipher AES-256-GCM' 
		. 2019.09.12 20:35:38 - OpenVPN &gt; Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' 
		. 2019.09.12 20:35:38 - OpenVPN &gt; OPTIONS IMPORT: timers and/or timeouts modified 
		. 2019.09.12 20:35:38 - OpenVPN &gt; OPTIONS IMPORT: compression parms modified 
		. 2019.09.12 20:35:38 - OpenVPN &gt; OPTIONS IMPORT: --ifconfig/up options modified 
		. 2019.09.12 20:35:38 - OpenVPN &gt; OPTIONS IMPORT: route-related options modified 
		. 2019.09.12 20:35:38 - OpenVPN &gt; OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified 
		. 2019.09.12 20:35:38 - OpenVPN &gt; OPTIONS IMPORT: peer-id set 
		. 2019.09.12 20:35:38 - OpenVPN &gt; OPTIONS IMPORT: adjusting link_mtu to 1627 
		. 2019.09.12 20:35:38 - OpenVPN &gt; OPTIONS IMPORT: data channel crypto options modified 
		. 2019.09.12 20:35:38 - OpenVPN &gt; Data Channel: using negotiated cipher 'AES-256-GCM' 
		. 2019.09.12 20:35:38 - OpenVPN &gt; Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2019.09.12 20:35:38 - OpenVPN &gt; Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2019.09.12 20:35:38 - OpenVPN &gt; interactive service msg_channel=0 
		. 2019.09.12 20:35:38 - OpenVPN &gt; ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=15 HWADDR=10:02:b5:86:59:5c 
		. 2019.09.12 20:35:38 - OpenVPN &gt; GDG6: remote_host_ipv6=n/a 
		. 2019.09.12 20:35:38 - OpenVPN &gt; NOTE: GetBestInterfaceEx returned error: Element not found.   (code=1168) 
		. 2019.09.12 20:35:38 - OpenVPN &gt; ROUTE6: default_gateway=UNDEF 
		. 2019.09.12 20:35:38 - OpenVPN &gt; open_tun 
		. 2019.09.12 20:35:38 - OpenVPN &gt; TAP-WIN32 device [Ethernet 4] opened: \\.\Global\{EC5D0326-55CA-4233-B026-CDC459606FF8}.tap 
		. 2019.09.12 20:35:38 - OpenVPN &gt; TAP-Windows Driver Version 9.21 
		. 2019.09.12 20:35:38 - OpenVPN &gt; Set TAP-Windows TUN subnet mode network/local/netmask = 10.16.91.0/10.16.91.49/255.255.255.0 [SUCCEEDED] 
		. 2019.09.12 20:35:38 - OpenVPN &gt; Notified TAP-Windows driver to set a DHCP IP/netmask of 10.16.91.49/255.255.255.0 on interface {EC5D0326-55CA-4233-B026-CDC459606FF8} [DHCP-serv: 10.16.91.254, lease-time: 31536000] 
		. 2019.09.12 20:35:38 - OpenVPN &gt; Successful ARP Flush on interface [23] {EC5D0326-55CA-4233-B026-CDC459606FF8} 
		. 2019.09.12 20:35:38 - OpenVPN &gt; do_ifconfig, tt-&gt;did_ifconfig_ipv6_setup=1 
		. 2019.09.12 20:35:39 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=23 fde6:7a:7d20:c5b::102f store=active 
		. 2019.09.12 20:35:40 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 4 static fde6:7a:7d20:c5b::1 validate=no 
		. 2019.09.12 20:35:40 - Detected an OpenVPN bug (On-Link route on VPN range), autofix. 
		. 2019.09.12 20:35:40 - OpenVPN &gt; add_route_ipv6(fde6:7a:7d20:c5b::/64 -&gt; fde6:7a:7d20:c5b::102f metric 0) dev Ethernet 4 
		. 2019.09.12 20:35:40 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:c5b::/64 interface=23 fe80::8 store=active 
		. 2019.09.12 20:35:40 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:35:45 - OpenVPN &gt; TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up 
		. 2019.09.12 20:35:45 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 104.254.90.245 MASK 255.255.255.255 192.168.0.1 
		. 2019.09.12 20:35:45 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 
		. 2019.09.12 20:35:45 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:35:45 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.16.91.1 
		. 2019.09.12 20:35:45 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 
		. 2019.09.12 20:35:45 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:35:45 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.16.91.1 
		. 2019.09.12 20:35:45 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 
		. 2019.09.12 20:35:45 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:35:45 - OpenVPN &gt; add_route_ipv6(::/3 -&gt; fde6:7a:7d20:c5b::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:35:45 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=23 fe80::8 store=active 
		. 2019.09.12 20:35:45 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:35:45 - OpenVPN &gt; add_route_ipv6(2000::/4 -&gt; fde6:7a:7d20:c5b::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:35:45 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:35:45 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:35:45 - OpenVPN &gt; add_route_ipv6(3000::/4 -&gt; fde6:7a:7d20:c5b::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:35:45 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:35:45 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:35:45 - OpenVPN &gt; add_route_ipv6(fc00::/7 -&gt; fde6:7a:7d20:c5b::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:35:45 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=23 fe80::8 store=active 
		. 2019.09.12 20:35:45 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:35:45 - Interface Ethernet 4 metric changed from Automatic to 3, layer IPv4 
		. 2019.09.12 20:35:45 - Interface Ethernet 4 metric changed from Automatic to 3, layer IPv6 
		. 2019.09.12 20:35:45 - DNS leak protection with packet filtering enabled. 
		. 2019.09.12 20:35:46 - DNS IPv4 of a network adapter forced (Ethernet 4, from automatic to 10.16.91.1) 
		. 2019.09.12 20:35:46 - DNS IPv6 of a network adapter forced (Ethernet 4, from automatic to fde6:7a:7d20:c5b::1) 
		. 2019.09.12 20:35:46 - Routes, added a new route, 104.254.90.243 for gateway 10.16.91.1 
		. 2019.09.12 20:35:47 - Routes, added a new route, 2606:6080:2001:9:2679:addd:655:8142 for gateway fde6:7a:7d20:c5b::1 
		. 2019.09.12 20:35:47 - Flushing DNS 
		I 2019.09.12 20:35:50 - Checking route IPv4 
		I 2019.09.12 20:35:50 - Checking route IPv6 
		I 2019.09.12 20:35:54 - Checking DNS 
		! 2019.09.12 20:35:54 - Connected. 
		. 2019.09.12 20:35:54 - OpenVPN &gt; Initialization Sequence Completed 
		! 2019.09.12 20:37:51 - Disconnecting 
		. 2019.09.12 20:37:51 - Routes, removed a route previously added, 104.254.90.243 for gateway 10.16.91.1 
		. 2019.09.12 20:37:51 - Routes, removed a route previously added, 2606:6080:2001:9:2679:addd:655:8142 for gateway fde6:7a:7d20:c5b::1 
		. 2019.09.12 20:37:51 - Sending management termination signal 
		. 2019.09.12 20:37:51 - Management - Send 'signal SIGTERM' 
		. 2019.09.12 20:37:51 - OpenVPN &gt; MANAGEMENT: CMD 'signal SIGTERM' 
		. 2019.09.12 20:37:51 - OpenVPN &gt; C:\WINDOWS\system32\route.exe DELETE 104.254.90.245 MASK 255.255.255.255 192.168.0.1 
		. 2019.09.12 20:37:51 - OpenVPN &gt; Route deletion via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:37:51 - OpenVPN &gt; C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.16.91.1 
		. 2019.09.12 20:37:51 - OpenVPN &gt; Route deletion via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:37:51 - OpenVPN &gt; C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.16.91.1 
		. 2019.09.12 20:37:51 - OpenVPN &gt; Route deletion via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:37:51 - OpenVPN &gt; delete_route_ipv6(::/3) 
		. 2019.09.12 20:37:51 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=23 fe80::8 store=active 
		. 2019.09.12 20:37:51 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:37:51 - OpenVPN &gt; delete_route_ipv6(2000::/4) 
		. 2019.09.12 20:37:51 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:37:51 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:37:51 - OpenVPN &gt; delete_route_ipv6(3000::/4) 
		. 2019.09.12 20:37:51 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:37:51 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:37:51 - OpenVPN &gt; delete_route_ipv6(fc00::/7) 
		. 2019.09.12 20:37:51 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=23 fe80::8 store=active 
		. 2019.09.12 20:37:51 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:37:52 - OpenVPN &gt; Closing TUN/TAP interface 
		. 2019.09.12 20:37:52 - OpenVPN &gt; delete_route_ipv6(fde6:7a:7d20:c5b::/64) 
		. 2019.09.12 20:37:52 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:c5b::/64 interface=23 fe80::8 store=active 
		. 2019.09.12 20:37:52 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 4 fde6:7a:7d20:c5b::102f store=active 
		. 2019.09.12 20:37:52 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 4 all 
		. 2019.09.12 20:37:52 - OpenVPN &gt; TAP: DHCP address released 
		. 2019.09.12 20:37:52 - OpenVPN &gt; SIGTERM[hard,] received, process exiting 
		. 2019.09.12 20:37:52 - Connection terminated. 
		. 2019.09.12 20:37:52 - DNS IPv4 of a network adapter restored to original settings (Ethernet 4, to automatic) 
		. 2019.09.12 20:37:53 - DNS IPv6 of a network adapter restored to original settings (Ethernet 4, to automatic) 
		. 2019.09.12 20:37:53 - DNS leak protection with packet filtering disabled. 
		. 2019.09.12 20:37:53 - Interface Ethernet 4 metric restored from 3 to Automatic, layer IPv4 
		. 2019.09.12 20:37:53 - Interface Ethernet 4 metric restored from 3 to Automatic, layer IPv6 
		I 2019.09.12 20:37:53 - Checking authorization ... 
		! 2019.09.12 20:37:53 - Connecting to Alphirk (Netherlands, Alblasserdam) 
		. 2019.09.12 20:37:53 - OpenVPN &gt; OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 
		. 2019.09.12 20:37:53 - OpenVPN &gt; Windows version 6.2 (Windows 8 or greater) 64bit 
		. 2019.09.12 20:37:53 - OpenVPN &gt; library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 
		. 2019.09.12 20:37:53 - Connection to OpenVPN Management Interface 
		. 2019.09.12 20:37:53 - OpenVPN &gt; MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 
		. 2019.09.12 20:37:53 - OpenVPN &gt; Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2019.09.12 20:37:53 - OpenVPN &gt; Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2019.09.12 20:37:53 - OpenVPN &gt; Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2019.09.12 20:37:53 - OpenVPN &gt; Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2019.09.12 20:37:53 - OpenVPN &gt; TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.149:2018 
		. 2019.09.12 20:37:53 - OpenVPN &gt; Socket Buffers: R=[65536-&gt;524288] S=[65536-&gt;524288] 
		. 2019.09.12 20:37:53 - OpenVPN &gt; Attempting to establish TCP connection with [AF_INET]109.202.107.149:2018 [nonblock] 
		. 2019.09.12 20:37:54 - OpenVPN &gt; MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 
		. 2019.09.12 20:37:54 - OpenVPN &gt; TCP connection established with [AF_INET]109.202.107.149:2018 
		. 2019.09.12 20:37:54 - OpenVPN &gt; TCP_CLIENT link local: (not bound) 
		. 2019.09.12 20:37:54 - OpenVPN &gt; TCP_CLIENT link remote: [AF_INET]109.202.107.149:2018 
		. 2019.09.12 20:37:55 - OpenVPN &gt; TLS: Initial packet from [AF_INET]109.202.107.149:2018, sid=5a982d1a 1fd2edc9 
		. 2019.09.12 20:37:55 - OpenVPN &gt; VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org 
		. 2019.09.12 20:37:55 - OpenVPN &gt; VERIFY KU OK 
		. 2019.09.12 20:37:55 - OpenVPN &gt; Validating certificate extended key usage 
		. 2019.09.12 20:37:55 - OpenVPN &gt; ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 
		. 2019.09.12 20:37:55 - OpenVPN &gt; VERIFY EKU OK 
		. 2019.09.12 20:37:55 - OpenVPN &gt; VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alphirk, emailAddress=info@airvpn.org 
		. 2019.09.12 20:37:55 - OpenVPN &gt; Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA 
		. 2019.09.12 20:37:55 - OpenVPN &gt; [Alphirk] Peer Connection Initiated with [AF_INET]109.202.107.149:2018 
		. 2019.09.12 20:37:56 - OpenVPN &gt; SENT CONTROL [Alphirk]: 'PUSH_REQUEST' (status=1) 
		. 2019.09.12 20:37:57 - OpenVPN &gt; PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.7.123.1,dhcp-option DNS6 fde6:7a:7d20:37b::1,tun-ipv6,route-gateway 10.7.123.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:37b::10a9/64 fde6:7a:7d20:37b::1,ifconfig 10.7.123.171 255.255.255.0,peer-id 0,cipher AES-256-GCM' 
		. 2019.09.12 20:37:57 - OpenVPN &gt; Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' 
		. 2019.09.12 20:37:57 - OpenVPN &gt; OPTIONS IMPORT: timers and/or timeouts modified 
		. 2019.09.12 20:37:57 - OpenVPN &gt; OPTIONS IMPORT: compression parms modified 
		. 2019.09.12 20:37:57 - OpenVPN &gt; OPTIONS IMPORT: --ifconfig/up options modified 
		. 2019.09.12 20:37:57 - OpenVPN &gt; OPTIONS IMPORT: route-related options modified 
		. 2019.09.12 20:37:57 - OpenVPN &gt; OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified 
		. 2019.09.12 20:37:57 - OpenVPN &gt; OPTIONS IMPORT: peer-id set 
		. 2019.09.12 20:37:57 - OpenVPN &gt; OPTIONS IMPORT: adjusting link_mtu to 1627 
		. 2019.09.12 20:37:57 - OpenVPN &gt; OPTIONS IMPORT: data channel crypto options modified 
		. 2019.09.12 20:37:57 - OpenVPN &gt; Data Channel: using negotiated cipher 'AES-256-GCM' 
		. 2019.09.12 20:37:57 - OpenVPN &gt; Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2019.09.12 20:37:57 - OpenVPN &gt; Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2019.09.12 20:37:57 - OpenVPN &gt; interactive service msg_channel=0 
		. 2019.09.12 20:37:57 - OpenVPN &gt; ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=15 HWADDR=10:02:b5:86:59:5c 
		. 2019.09.12 20:37:57 - OpenVPN &gt; GDG6: remote_host_ipv6=n/a 
		. 2019.09.12 20:37:57 - OpenVPN &gt; NOTE: GetBestInterfaceEx returned error: Element not found.   (code=1168) 
		. 2019.09.12 20:37:57 - OpenVPN &gt; ROUTE6: default_gateway=UNDEF 
		. 2019.09.12 20:37:57 - OpenVPN &gt; open_tun 
		. 2019.09.12 20:37:57 - OpenVPN &gt; TAP-WIN32 device [Ethernet 4] opened: \\.\Global\{EC5D0326-55CA-4233-B026-CDC459606FF8}.tap 
		. 2019.09.12 20:37:57 - OpenVPN &gt; TAP-Windows Driver Version 9.21 
		. 2019.09.12 20:37:57 - OpenVPN &gt; Set TAP-Windows TUN subnet mode network/local/netmask = 10.7.123.0/10.7.123.171/255.255.255.0 [SUCCEEDED] 
		. 2019.09.12 20:37:57 - OpenVPN &gt; Notified TAP-Windows driver to set a DHCP IP/netmask of 10.7.123.171/255.255.255.0 on interface {EC5D0326-55CA-4233-B026-CDC459606FF8} [DHCP-serv: 10.7.123.254, lease-time: 31536000] 
		. 2019.09.12 20:37:57 - OpenVPN &gt; Successful ARP Flush on interface [23] {EC5D0326-55CA-4233-B026-CDC459606FF8} 
		. 2019.09.12 20:37:57 - OpenVPN &gt; do_ifconfig, tt-&gt;did_ifconfig_ipv6_setup=1 
		. 2019.09.12 20:37:58 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=23 fde6:7a:7d20:37b::10a9 store=active 
		. 2019.09.12 20:37:59 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 4 static fde6:7a:7d20:37b::1 validate=no 
		. 2019.09.12 20:37:59 - Detected an OpenVPN bug (On-Link route on VPN range), autofix. 
		. 2019.09.12 20:37:59 - OpenVPN &gt; add_route_ipv6(fde6:7a:7d20:37b::/64 -&gt; fde6:7a:7d20:37b::10a9 metric 0) dev Ethernet 4 
		. 2019.09.12 20:37:59 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:37b::/64 interface=23 fe80::8 store=active 
		. 2019.09.12 20:37:59 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:38:04 - OpenVPN &gt; TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up 
		. 2019.09.12 20:38:04 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 109.202.107.149 MASK 255.255.255.255 192.168.0.1 
		. 2019.09.12 20:38:04 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 
		. 2019.09.12 20:38:04 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:38:04 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.7.123.1 
		. 2019.09.12 20:38:04 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 
		. 2019.09.12 20:38:04 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:38:04 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.7.123.1 
		. 2019.09.12 20:38:04 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 
		. 2019.09.12 20:38:04 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:38:04 - OpenVPN &gt; add_route_ipv6(::/3 -&gt; fde6:7a:7d20:37b::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:38:04 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=23 fe80::8 store=active 
		. 2019.09.12 20:38:04 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:38:04 - OpenVPN &gt; add_route_ipv6(2000::/4 -&gt; fde6:7a:7d20:37b::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:38:04 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:38:04 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:38:04 - OpenVPN &gt; add_route_ipv6(3000::/4 -&gt; fde6:7a:7d20:37b::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:38:04 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:38:04 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:38:04 - OpenVPN &gt; add_route_ipv6(fc00::/7 -&gt; fde6:7a:7d20:37b::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:38:04 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=23 fe80::8 store=active 
		. 2019.09.12 20:38:04 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:38:04 - Interface Ethernet 4 metric changed from Automatic to 3, layer IPv4 
		. 2019.09.12 20:38:04 - Interface Ethernet 4 metric changed from Automatic to 3, layer IPv6 
		. 2019.09.12 20:38:04 - DNS leak protection with packet filtering enabled. 
		. 2019.09.12 20:38:05 - DNS IPv4 of a network adapter forced (Ethernet 4, from automatic to 10.7.123.1) 
		. 2019.09.12 20:38:05 - DNS IPv6 of a network adapter forced (Ethernet 4, from automatic to fde6:7a:7d20:37b::1) 
		. 2019.09.12 20:38:05 - Routes, added a new route, 109.202.107.147 for gateway 10.7.123.1 
		. 2019.09.12 20:38:06 - Routes, added a new route, 2a00:1678:2470:22:d8a1:dc22:34fb:d6c4 for gateway fde6:7a:7d20:37b::1 
		. 2019.09.12 20:38:06 - Flushing DNS 
		I 2019.09.12 20:38:09 - Checking route IPv4 
		I 2019.09.12 20:38:10 - Checking route IPv6 
		I 2019.09.12 20:38:14 - Checking DNS 
		! 2019.09.12 20:38:15 - Connected. 
		. 2019.09.12 20:38:15 - OpenVPN &gt; Initialization Sequence Completed 
		! 2019.09.12 20:42:27 - Disconnecting 
		. 2019.09.12 20:42:27 - Routes, removed a route previously added, 109.202.107.147 for gateway 10.7.123.1 
		. 2019.09.12 20:42:28 - Routes, removed a route previously added, 2a00:1678:2470:22:d8a1:dc22:34fb:d6c4 for gateway fde6:7a:7d20:37b::1 
		. 2019.09.12 20:42:28 - Sending management termination signal 
		. 2019.09.12 20:42:28 - Management - Send 'signal SIGTERM' 
		. 2019.09.12 20:42:28 - OpenVPN &gt; MANAGEMENT: CMD 'signal SIGTERM' 
		. 2019.09.12 20:42:28 - OpenVPN &gt; C:\WINDOWS\system32\route.exe DELETE 109.202.107.149 MASK 255.255.255.255 192.168.0.1 
		. 2019.09.12 20:42:28 - OpenVPN &gt; Route deletion via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:42:28 - OpenVPN &gt; C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.7.123.1 
		. 2019.09.12 20:42:28 - OpenVPN &gt; Route deletion via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:42:28 - OpenVPN &gt; C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.7.123.1 
		. 2019.09.12 20:42:28 - OpenVPN &gt; Route deletion via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:42:28 - OpenVPN &gt; delete_route_ipv6(::/3) 
		. 2019.09.12 20:42:28 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=23 fe80::8 store=active 
		. 2019.09.12 20:42:28 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:42:28 - OpenVPN &gt; delete_route_ipv6(2000::/4) 
		. 2019.09.12 20:42:28 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:42:28 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:42:28 - OpenVPN &gt; delete_route_ipv6(3000::/4) 
		. 2019.09.12 20:42:28 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:42:28 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:42:28 - OpenVPN &gt; delete_route_ipv6(fc00::/7) 
		. 2019.09.12 20:42:28 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=23 fe80::8 store=active 
		. 2019.09.12 20:42:28 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:42:28 - OpenVPN &gt; Closing TUN/TAP interface 
		. 2019.09.12 20:42:28 - OpenVPN &gt; delete_route_ipv6(fde6:7a:7d20:37b::/64) 
		. 2019.09.12 20:42:28 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:37b::/64 interface=23 fe80::8 store=active 
		. 2019.09.12 20:42:28 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 4 fde6:7a:7d20:37b::10a9 store=active 
		. 2019.09.12 20:42:28 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 4 all 
		. 2019.09.12 20:42:29 - OpenVPN &gt; TAP: DHCP address released 
		. 2019.09.12 20:42:29 - OpenVPN &gt; SIGTERM[hard,] received, process exiting 
		. 2019.09.12 20:42:29 - Connection terminated. 
		. 2019.09.12 20:42:29 - DNS IPv4 of a network adapter restored to original settings (Ethernet 4, to automatic) 
		. 2019.09.12 20:42:29 - DNS IPv6 of a network adapter restored to original settings (Ethernet 4, to automatic) 
		. 2019.09.12 20:42:29 - DNS leak protection with packet filtering disabled. 
		. 2019.09.12 20:42:29 - Interface Ethernet 4 metric restored from 3 to Automatic, layer IPv4 
		. 2019.09.12 20:42:29 - Interface Ethernet 4 metric restored from 3 to Automatic, layer IPv6 
		. 2019.09.12 20:42:29 - Flushing DNS 
		! 2019.09.12 20:42:33 - Session terminated. 
		I 2019.09.12 20:42:34 - Session starting. 
		I 2019.09.12 20:42:34 - Checking authorization ... 
		! 2019.09.12 20:42:35 - Connecting to Enif (Canada, Toronto, Ontario) 
		. 2019.09.12 20:42:35 - Routes, added a new route, 104.254.90.246 for gateway 192.168.0.1 
		. 2019.09.12 20:42:35 - SSL &gt; 2019.09.12 20:42:35 LOG5[ui]: stunnel 5.40 on x86-pc-mingw32-gnu platform 
		. 2019.09.12 20:42:35 - SSL &gt; 2019.09.12 20:42:35 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k  26 Jan 2017 
		. 2019.09.12 20:42:35 - SSL &gt; 2019.09.12 20:42:35 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI 
		. 2019.09.12 20:42:35 - SSL &gt; 2019.09.12 20:42:35 LOG5[ui]: Reading configuration from file C:\Users\tropi\AppData\Local\AirVPN\f41768b8c1e01ce755e542dbc63cc77f3c25fd055f69ff14bf191cbcc780e632.tmp.ssl 
		. 2019.09.12 20:42:35 - SSL &gt; 2019.09.12 20:42:35 LOG5[ui]: UTF-8 byte order mark detected 
		. 2019.09.12 20:42:35 - SSL &gt; 2019.09.12 20:42:35 LOG6[ui]: Initializing service [openvpn] 
		. 2019.09.12 20:42:35 - SSL &gt; 2019.09.12 20:42:35 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks 
		. 2019.09.12 20:42:35 - SSL &gt; 2019.09.12 20:42:35 LOG5[ui]: Configuration successful 
		. 2019.09.12 20:42:35 - OpenVPN &gt; OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 
		. 2019.09.12 20:42:35 - OpenVPN &gt; Windows version 6.2 (Windows 8 or greater) 64bit 
		. 2019.09.12 20:42:35 - OpenVPN &gt; library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 
		. 2019.09.12 20:42:35 - Connection to OpenVPN Management Interface 
		. 2019.09.12 20:42:35 - OpenVPN &gt; MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 
		. 2019.09.12 20:42:35 - OpenVPN &gt; Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2019.09.12 20:42:35 - OpenVPN &gt; Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2019.09.12 20:42:35 - OpenVPN &gt; Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2019.09.12 20:42:35 - OpenVPN &gt; Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2019.09.12 20:42:35 - OpenVPN &gt; TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:53409 
		. 2019.09.12 20:42:35 - OpenVPN &gt; Socket Buffers: R=[65536-&gt;524288] S=[65536-&gt;524288] 
		. 2019.09.12 20:42:35 - OpenVPN &gt; Attempting to establish TCP connection with [AF_INET]127.0.0.1:53409 [nonblock] 
		. 2019.09.12 20:42:35 - SSL &gt; 2019.09.12 20:42:35 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:54270 
		. 2019.09.12 20:42:35 - SSL &gt; 2019.09.12 20:42:35 LOG6[0]: s_connect: connecting 104.254.90.246:443 
		. 2019.09.12 20:42:35 - OpenVPN &gt; TCP connection established with [AF_INET]127.0.0.1:53409 
		. 2019.09.12 20:42:35 - OpenVPN &gt; TCP_CLIENT link local: (not bound) 
		. 2019.09.12 20:42:35 - OpenVPN &gt; TCP_CLIENT link remote: [AF_INET]127.0.0.1:53409 
		. 2019.09.12 20:42:35 - SSL &gt; 2019.09.12 20:42:35 LOG5[0]: s_connect: connected 104.254.90.246:443 
		. 2019.09.12 20:42:35 - SSL &gt; 2019.09.12 20:42:35 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.23:54271 
		. 2019.09.12 20:42:36 - SSL &gt; 2019.09.12 20:42:35 LOG6[0]: SNI: sending servername: 104.254.90.246 
		. 2019.09.12 20:42:36 - SSL &gt; 2019.09.12 20:42:35 LOG6[0]: Peer certificate not required 
		. 2019.09.12 20:42:36 - OpenVPN &gt; MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 
		. 2019.09.12 20:42:36 - SSL &gt; 2019.09.12 20:42:36 LOG6[0]: Certificate verification disabled 
		. 2019.09.12 20:42:36 - SSL &gt; 2019.09.12 20:42:36 LOG6[0]: Client certificate not requested 
		. 2019.09.12 20:42:36 - SSL &gt; 2019.09.12 20:42:36 LOG6[0]: TLS connected: new session negotiated 
		. 2019.09.12 20:42:36 - SSL &gt; 2019.09.12 20:42:36 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption) 
		. 2019.09.12 20:42:36 - OpenVPN &gt; TLS: Initial packet from [AF_INET]127.0.0.1:53409, sid=93b6dc8b baa033b3 
		. 2019.09.12 20:42:36 - OpenVPN &gt; VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org 
		. 2019.09.12 20:42:36 - OpenVPN &gt; VERIFY KU OK 
		. 2019.09.12 20:42:36 - OpenVPN &gt; Validating certificate extended key usage 
		. 2019.09.12 20:42:36 - OpenVPN &gt; ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 
		. 2019.09.12 20:42:36 - OpenVPN &gt; VERIFY EKU OK 
		. 2019.09.12 20:42:36 - OpenVPN &gt; VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org 
		. 2019.09.12 20:42:36 - OpenVPN &gt; Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA 
		. 2019.09.12 20:42:36 - OpenVPN &gt; [server] Peer Connection Initiated with [AF_INET]127.0.0.1:53409 
		. 2019.09.12 20:42:37 - OpenVPN &gt; SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) 
		. 2019.09.12 20:42:37 - OpenVPN &gt; PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.91.1,dhcp-option DNS6 fde6:7a:7d20:c5b::1,tun-ipv6,route-gateway 10.16.91.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:c5b::102f/64 fde6:7a:7d20:c5b::1,ifconfig 10.16.91.49 255.255.255.0,peer-id 0,cipher AES-256-GCM' 
		. 2019.09.12 20:42:37 - OpenVPN &gt; Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' 
		. 2019.09.12 20:42:37 - OpenVPN &gt; OPTIONS IMPORT: timers and/or timeouts modified 
		. 2019.09.12 20:42:37 - OpenVPN &gt; OPTIONS IMPORT: compression parms modified 
		. 2019.09.12 20:42:37 - OpenVPN &gt; OPTIONS IMPORT: --ifconfig/up options modified 
		. 2019.09.12 20:42:37 - OpenVPN &gt; OPTIONS IMPORT: route-related options modified 
		. 2019.09.12 20:42:37 - OpenVPN &gt; OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified 
		. 2019.09.12 20:42:37 - OpenVPN &gt; OPTIONS IMPORT: peer-id set 
		. 2019.09.12 20:42:37 - OpenVPN &gt; OPTIONS IMPORT: adjusting link_mtu to 1627 
		. 2019.09.12 20:42:37 - OpenVPN &gt; OPTIONS IMPORT: data channel crypto options modified 
		. 2019.09.12 20:42:37 - OpenVPN &gt; Data Channel: using negotiated cipher 'AES-256-GCM' 
		. 2019.09.12 20:42:37 - OpenVPN &gt; Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2019.09.12 20:42:37 - OpenVPN &gt; Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2019.09.12 20:42:37 - OpenVPN &gt; interactive service msg_channel=0 
		. 2019.09.12 20:42:37 - OpenVPN &gt; ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=15 HWADDR=10:02:b5:86:59:5c 
		. 2019.09.12 20:42:37 - OpenVPN &gt; GDG6: remote_host_ipv6=n/a 
		. 2019.09.12 20:42:37 - OpenVPN &gt; NOTE: GetBestInterfaceEx returned error: Element not found.   (code=1168) 
		. 2019.09.12 20:42:37 - OpenVPN &gt; ROUTE6: default_gateway=UNDEF 
		. 2019.09.12 20:42:37 - OpenVPN &gt; open_tun 
		. 2019.09.12 20:42:37 - OpenVPN &gt; TAP-WIN32 device [Ethernet 4] opened: \\.\Global\{EC5D0326-55CA-4233-B026-CDC459606FF8}.tap 
		. 2019.09.12 20:42:37 - OpenVPN &gt; TAP-Windows Driver Version 9.21 
		. 2019.09.12 20:42:37 - OpenVPN &gt; Set TAP-Windows TUN subnet mode network/local/netmask = 10.16.91.0/10.16.91.49/255.255.255.0 [SUCCEEDED] 
		. 2019.09.12 20:42:37 - OpenVPN &gt; Notified TAP-Windows driver to set a DHCP IP/netmask of 10.16.91.49/255.255.255.0 on interface {EC5D0326-55CA-4233-B026-CDC459606FF8} [DHCP-serv: 10.16.91.254, lease-time: 31536000] 
		. 2019.09.12 20:42:37 - OpenVPN &gt; Successful ARP Flush on interface [23] {EC5D0326-55CA-4233-B026-CDC459606FF8} 
		. 2019.09.12 20:42:37 - OpenVPN &gt; do_ifconfig, tt-&gt;did_ifconfig_ipv6_setup=1 
		. 2019.09.12 20:42:38 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=23 fde6:7a:7d20:c5b::102f store=active 
		. 2019.09.12 20:42:39 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 4 static fde6:7a:7d20:c5b::1 validate=no 
		. 2019.09.12 20:42:40 - Detected an OpenVPN bug (On-Link route on VPN range), autofix. 
		. 2019.09.12 20:42:40 - OpenVPN &gt; add_route_ipv6(fde6:7a:7d20:c5b::/64 -&gt; fde6:7a:7d20:c5b::102f metric 0) dev Ethernet 4 
		. 2019.09.12 20:42:40 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:c5b::/64 interface=23 fe80::8 store=active 
		. 2019.09.12 20:42:40 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:42:45 - OpenVPN &gt; TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up 
		. 2019.09.12 20:42:45 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1 
		. 2019.09.12 20:42:45 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 
		. 2019.09.12 20:42:45 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:42:45 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.16.91.1 
		. 2019.09.12 20:42:45 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 
		. 2019.09.12 20:42:45 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:42:45 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.16.91.1 
		. 2019.09.12 20:42:45 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 
		. 2019.09.12 20:42:45 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:42:45 - OpenVPN &gt; add_route_ipv6(::/3 -&gt; fde6:7a:7d20:c5b::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:42:45 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=23 fe80::8 store=active 
		. 2019.09.12 20:42:45 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:42:45 - OpenVPN &gt; add_route_ipv6(2000::/4 -&gt; fde6:7a:7d20:c5b::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:42:45 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:42:45 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:42:45 - OpenVPN &gt; add_route_ipv6(3000::/4 -&gt; fde6:7a:7d20:c5b::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:42:45 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:42:45 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:42:45 - OpenVPN &gt; add_route_ipv6(fc00::/7 -&gt; fde6:7a:7d20:c5b::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:42:45 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=23 fe80::8 store=active 
		. 2019.09.12 20:42:45 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:42:45 - Interface Ethernet 4 metric changed from Automatic to 3, layer IPv4 
		. 2019.09.12 20:42:45 - Interface Ethernet 4 metric changed from Automatic to 3, layer IPv6 
		. 2019.09.12 20:42:45 - DNS leak protection with packet filtering enabled. 
		. 2019.09.12 20:42:46 - DNS IPv4 of a network adapter forced (Ethernet 4, from automatic to 10.16.91.1) 
		. 2019.09.12 20:42:46 - DNS IPv6 of a network adapter forced (Ethernet 4, from automatic to fde6:7a:7d20:c5b::1) 
		. 2019.09.12 20:42:46 - Routes, added a new route, 104.254.90.243 for gateway 10.16.91.1 
		. 2019.09.12 20:42:47 - Routes, added a new route, 2606:6080:2001:9:2679:addd:655:8142 for gateway fde6:7a:7d20:c5b::1 
		. 2019.09.12 20:42:47 - Flushing DNS 
		I 2019.09.12 20:42:50 - Checking route IPv4 
		I 2019.09.12 20:42:50 - Checking route IPv6 
		I 2019.09.12 20:42:54 - Checking DNS 
		! 2019.09.12 20:42:54 - Connected. 
		. 2019.09.12 20:42:54 - OpenVPN &gt; Initialization Sequence Completed 
		. 2019.09.12 20:43:13 - Updating systems &amp; servers data ... 
		. 2019.09.12 20:43:15 - Systems &amp; servers data update completed 
		. 2019.09.12 20:43:35 - SSL &gt; 2019.09.12 20:43:35 LOG6[cron]: Executing cron jobs 
		. 2019.09.12 20:43:35 - SSL &gt; 2019.09.12 20:43:35 LOG6[cron]: Cron jobs completed in 0 seconds 
		! 2019.09.12 20:48:29 - Disconnecting 
		. 2019.09.12 20:48:29 - Routes, removed a route previously added, 104.254.90.246 for gateway 192.168.0.1 
		. 2019.09.12 20:48:29 - Routes, removed a route previously added, 104.254.90.243 for gateway 10.16.91.1 
		. 2019.09.12 20:48:29 - Routes, removed a route previously added, 2606:6080:2001:9:2679:addd:655:8142 for gateway fde6:7a:7d20:c5b::1 
		. 2019.09.12 20:48:29 - Sending management termination signal 
		. 2019.09.12 20:48:29 - Management - Send 'signal SIGTERM' 
		. 2019.09.12 20:48:30 - OpenVPN &gt; MANAGEMENT: CMD 'signal SIGTERM' 
		. 2019.09.12 20:48:30 - SSL &gt; 2019.09.12 20:48:29 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054) 
		. 2019.09.12 20:48:30 - OpenVPN &gt; C:\WINDOWS\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.0.1 
		. 2019.09.12 20:48:30 - SSL &gt; 2019.09.12 20:48:29 LOG5[0]: Connection reset: 1536249 byte(s) sent to TLS, 49740501 byte(s) sent to socket 
		. 2019.09.12 20:48:30 - OpenVPN &gt; Route deletion via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:48:30 - OpenVPN &gt; C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.16.91.1 
		. 2019.09.12 20:48:30 - OpenVPN &gt; Route deletion via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:48:30 - OpenVPN &gt; C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.16.91.1 
		. 2019.09.12 20:48:30 - OpenVPN &gt; Route deletion via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:48:30 - OpenVPN &gt; delete_route_ipv6(::/3) 
		. 2019.09.12 20:48:30 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=23 fe80::8 store=active 
		. 2019.09.12 20:48:30 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:48:30 - OpenVPN &gt; delete_route_ipv6(2000::/4) 
		. 2019.09.12 20:48:30 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:48:30 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:48:30 - OpenVPN &gt; delete_route_ipv6(3000::/4) 
		. 2019.09.12 20:48:30 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:48:30 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:48:30 - OpenVPN &gt; delete_route_ipv6(fc00::/7) 
		. 2019.09.12 20:48:30 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=23 fe80::8 store=active 
		. 2019.09.12 20:48:30 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:48:30 - OpenVPN &gt; Closing TUN/TAP interface 
		. 2019.09.12 20:48:30 - OpenVPN &gt; delete_route_ipv6(fde6:7a:7d20:c5b::/64) 
		. 2019.09.12 20:48:30 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:c5b::/64 interface=23 fe80::8 store=active 
		. 2019.09.12 20:48:30 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 4 fde6:7a:7d20:c5b::102f store=active 
		. 2019.09.12 20:48:30 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 4 all 
		. 2019.09.12 20:48:31 - OpenVPN &gt; TAP: DHCP address released 
		. 2019.09.12 20:48:31 - OpenVPN &gt; SIGTERM[hard,] received, process exiting 
		. 2019.09.12 20:48:39 - Sending soft termination signal 
		. 2019.09.12 20:48:49 - Sending hard termination signal 
		. 2019.09.12 20:48:49 - Connection terminated. 
		. 2019.09.12 20:48:49 - DNS IPv4 of a network adapter restored to original settings (Ethernet 4, to automatic) 
		. 2019.09.12 20:48:49 - DNS IPv6 of a network adapter restored to original settings (Ethernet 4, to automatic) 
		. 2019.09.12 20:48:49 - DNS leak protection with packet filtering disabled. 
		. 2019.09.12 20:48:49 - Interface Ethernet 4 metric restored from 3 to Automatic, layer IPv4 
		. 2019.09.12 20:48:49 - Interface Ethernet 4 metric restored from 3 to Automatic, layer IPv6 
		. 2019.09.12 20:48:49 - Flushing DNS 
		! 2019.09.12 20:48:53 - Session terminated. 
		I 2019.09.12 20:49:28 - Session starting. 
		I 2019.09.12 20:49:29 - Checking authorization ... 
		! 2019.09.12 20:49:29 - Connecting to Lesath (Canada, Toronto, Ontario) 
		. 2019.09.12 20:49:30 - OpenVPN &gt; OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 
		. 2019.09.12 20:49:30 - OpenVPN &gt; Windows version 6.2 (Windows 8 or greater) 64bit 
		. 2019.09.12 20:49:30 - OpenVPN &gt; library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 
		. 2019.09.12 20:49:30 - Connection to OpenVPN Management Interface 
		. 2019.09.12 20:49:30 - OpenVPN &gt; MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 
		. 2019.09.12 20:49:30 - OpenVPN &gt; Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2019.09.12 20:49:30 - OpenVPN &gt; Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2019.09.12 20:49:30 - OpenVPN &gt; Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2019.09.12 20:49:30 - OpenVPN &gt; Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2019.09.12 20:49:30 - OpenVPN &gt; TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.5:443 
		. 2019.09.12 20:49:30 - OpenVPN &gt; Socket Buffers: R=[65536-&gt;65536] S=[65536-&gt;65536] 
		. 2019.09.12 20:49:30 - OpenVPN &gt; UDP link local: (not bound) 
		. 2019.09.12 20:49:30 - OpenVPN &gt; UDP link remote: [AF_INET]184.75.221.5:443 
		. 2019.09.12 20:49:30 - OpenVPN &gt; TLS: Initial packet from [AF_INET]184.75.221.5:443, sid=bc0d976b 5dc80327 
		. 2019.09.12 20:49:30 - OpenVPN &gt; MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 
		. 2019.09.12 20:49:30 - OpenVPN &gt; VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org 
		. 2019.09.12 20:49:30 - OpenVPN &gt; VERIFY KU OK 
		. 2019.09.12 20:49:30 - OpenVPN &gt; Validating certificate extended key usage 
		. 2019.09.12 20:49:30 - OpenVPN &gt; ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 
		. 2019.09.12 20:49:30 - OpenVPN &gt; VERIFY EKU OK 
		. 2019.09.12 20:49:30 - OpenVPN &gt; VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org 
		. 2019.09.12 20:49:30 - OpenVPN &gt; Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA 
		. 2019.09.12 20:49:30 - OpenVPN &gt; [Lesath] Peer Connection Initiated with [AF_INET]184.75.221.5:443 
		. 2019.09.12 20:49:31 - OpenVPN &gt; SENT CONTROL [Lesath]: 'PUSH_REQUEST' (status=1) 
		. 2019.09.12 20:49:31 - OpenVPN &gt; PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.250.1,dhcp-option DNS6 fde6:7a:7d20:10fa::1,tun-ipv6,route-gateway 10.20.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:10fa::1046/64 fde6:7a:7d20:10fa::1,ifconfig 10.20.250.72 255.255.255.0,peer-id 3,cipher AES-256-GCM' 
		. 2019.09.12 20:49:31 - OpenVPN &gt; Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' 
		. 2019.09.12 20:49:31 - OpenVPN &gt; OPTIONS IMPORT: timers and/or timeouts modified 
		. 2019.09.12 20:49:31 - OpenVPN &gt; OPTIONS IMPORT: compression parms modified 
		. 2019.09.12 20:49:31 - OpenVPN &gt; OPTIONS IMPORT: --ifconfig/up options modified 
		. 2019.09.12 20:49:31 - OpenVPN &gt; OPTIONS IMPORT: route-related options modified 
		. 2019.09.12 20:49:31 - OpenVPN &gt; OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified 
		. 2019.09.12 20:49:31 - OpenVPN &gt; OPTIONS IMPORT: peer-id set 
		. 2019.09.12 20:49:31 - OpenVPN &gt; OPTIONS IMPORT: adjusting link_mtu to 1625 
		. 2019.09.12 20:49:31 - OpenVPN &gt; OPTIONS IMPORT: data channel crypto options modified 
		. 2019.09.12 20:49:31 - OpenVPN &gt; Data Channel: using negotiated cipher 'AES-256-GCM' 
		. 2019.09.12 20:49:31 - OpenVPN &gt; Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2019.09.12 20:49:31 - OpenVPN &gt; Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2019.09.12 20:49:31 - OpenVPN &gt; interactive service msg_channel=0 
		. 2019.09.12 20:49:31 - OpenVPN &gt; ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=15 HWADDR=10:02:b5:86:59:5c 
		. 2019.09.12 20:49:31 - OpenVPN &gt; GDG6: remote_host_ipv6=n/a 
		. 2019.09.12 20:49:31 - OpenVPN &gt; NOTE: GetBestInterfaceEx returned error: Element not found.   (code=1168) 
		. 2019.09.12 20:49:31 - OpenVPN &gt; ROUTE6: default_gateway=UNDEF 
		. 2019.09.12 20:49:31 - OpenVPN &gt; open_tun 
		. 2019.09.12 20:49:31 - OpenVPN &gt; TAP-WIN32 device [Ethernet 4] opened: \\.\Global\{EC5D0326-55CA-4233-B026-CDC459606FF8}.tap 
		. 2019.09.12 20:49:31 - OpenVPN &gt; TAP-Windows Driver Version 9.21 
		. 2019.09.12 20:49:31 - OpenVPN &gt; Set TAP-Windows TUN subnet mode network/local/netmask = 10.20.250.0/10.20.250.72/255.255.255.0 [SUCCEEDED] 
		. 2019.09.12 20:49:31 - OpenVPN &gt; Notified TAP-Windows driver to set a DHCP IP/netmask of 10.20.250.72/255.255.255.0 on interface {EC5D0326-55CA-4233-B026-CDC459606FF8} [DHCP-serv: 10.20.250.254, lease-time: 31536000] 
		. 2019.09.12 20:49:31 - OpenVPN &gt; Successful ARP Flush on interface [23] {EC5D0326-55CA-4233-B026-CDC459606FF8} 
		. 2019.09.12 20:49:31 - OpenVPN &gt; do_ifconfig, tt-&gt;did_ifconfig_ipv6_setup=1 
		. 2019.09.12 20:49:32 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=23 fde6:7a:7d20:10fa::1046 store=active 
		. 2019.09.12 20:49:33 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 4 static fde6:7a:7d20:10fa::1 validate=no 
		. 2019.09.12 20:49:33 - Detected an OpenVPN bug (On-Link route on VPN range), autofix. 
		. 2019.09.12 20:49:34 - OpenVPN &gt; add_route_ipv6(fde6:7a:7d20:10fa::/64 -&gt; fde6:7a:7d20:10fa::1046 metric 0) dev Ethernet 4 
		. 2019.09.12 20:49:34 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:10fa::/64 interface=23 fe80::8 store=active 
		. 2019.09.12 20:49:34 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:49:38 - OpenVPN &gt; TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up 
		. 2019.09.12 20:49:38 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 184.75.221.5 MASK 255.255.255.255 192.168.0.1 
		. 2019.09.12 20:49:38 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 
		. 2019.09.12 20:49:38 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:49:38 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.20.250.1 
		. 2019.09.12 20:49:38 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 
		. 2019.09.12 20:49:38 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:49:38 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.20.250.1 
		. 2019.09.12 20:49:38 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 
		. 2019.09.12 20:49:38 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:49:38 - OpenVPN &gt; add_route_ipv6(::/3 -&gt; fde6:7a:7d20:10fa::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:49:38 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=23 fe80::8 store=active 
		. 2019.09.12 20:49:38 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:49:38 - OpenVPN &gt; add_route_ipv6(2000::/4 -&gt; fde6:7a:7d20:10fa::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:49:38 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:49:38 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:49:38 - OpenVPN &gt; add_route_ipv6(3000::/4 -&gt; fde6:7a:7d20:10fa::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:49:38 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:49:38 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:49:38 - OpenVPN &gt; add_route_ipv6(fc00::/7 -&gt; fde6:7a:7d20:10fa::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:49:38 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=23 fe80::8 store=active 
		. 2019.09.12 20:49:38 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:49:38 - Interface Ethernet 4 metric changed from Automatic to 3, layer IPv4 
		. 2019.09.12 20:49:38 - Interface Ethernet 4 metric changed from Automatic to 3, layer IPv6 
		. 2019.09.12 20:49:38 - DNS leak protection with packet filtering enabled. 
		. 2019.09.12 20:49:39 - DNS IPv4 of a network adapter forced (Ethernet 4, from automatic to 10.20.250.1) 
		. 2019.09.12 20:49:39 - DNS IPv6 of a network adapter forced (Ethernet 4, from automatic to fde6:7a:7d20:10fa::1) 
		. 2019.09.12 20:49:39 - Routes, added a new route, 184.75.221.3 for gateway 10.20.250.1 
		. 2019.09.12 20:49:39 - Routes, added a new route, 2606:6080:1001:d:c59c:6e9a:3115:6f2f for gateway fde6:7a:7d20:10fa::1 
		. 2019.09.12 20:49:39 - Flushing DNS 
		I 2019.09.12 20:49:43 - Checking route IPv4 
		I 2019.09.12 20:49:43 - Checking route IPv6 
		I 2019.09.12 20:49:47 - Checking DNS 
		! 2019.09.12 20:49:47 - Connected. 
		. 2019.09.12 20:49:47 - OpenVPN &gt; Initialization Sequence Completed 
		. 2019.09.12 20:53:19 - Updating systems &amp; servers data ... 
		. 2019.09.12 20:53:20 - Systems &amp; servers data update completed 
		! 2019.09.12 20:55:13 - Disconnecting 
		. 2019.09.12 20:55:13 - Routes, removed a route previously added, 184.75.221.3 for gateway 10.20.250.1 
		. 2019.09.12 20:55:13 - Routes, removed a route previously added, 2606:6080:1001:d:c59c:6e9a:3115:6f2f for gateway fde6:7a:7d20:10fa::1 
		. 2019.09.12 20:55:13 - Sending management termination signal 
		. 2019.09.12 20:55:13 - Management - Send 'signal SIGTERM' 
		. 2019.09.12 20:55:13 - OpenVPN &gt; MANAGEMENT: CMD 'signal SIGTERM' 
		. 2019.09.12 20:55:13 - OpenVPN &gt; SIGTERM received, sending exit notification to peer 
		. 2019.09.12 20:55:18 - OpenVPN &gt; C:\WINDOWS\system32\route.exe DELETE 184.75.221.5 MASK 255.255.255.255 192.168.0.1 
		. 2019.09.12 20:55:18 - OpenVPN &gt; Route deletion via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:55:18 - OpenVPN &gt; C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.20.250.1 
		. 2019.09.12 20:55:18 - OpenVPN &gt; Route deletion via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:55:18 - OpenVPN &gt; C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.20.250.1 
		. 2019.09.12 20:55:18 - OpenVPN &gt; Route deletion via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:55:18 - OpenVPN &gt; delete_route_ipv6(::/3) 
		. 2019.09.12 20:55:18 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=23 fe80::8 store=active 
		. 2019.09.12 20:55:18 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:55:18 - OpenVPN &gt; delete_route_ipv6(2000::/4) 
		. 2019.09.12 20:55:18 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:55:18 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:55:19 - OpenVPN &gt; delete_route_ipv6(3000::/4) 
		. 2019.09.12 20:55:19 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:55:19 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:55:19 - OpenVPN &gt; delete_route_ipv6(fc00::/7) 
		. 2019.09.12 20:55:19 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=23 fe80::8 store=active 
		. 2019.09.12 20:55:19 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:55:19 - OpenVPN &gt; Closing TUN/TAP interface 
		. 2019.09.12 20:55:19 - OpenVPN &gt; delete_route_ipv6(fde6:7a:7d20:10fa::/64) 
		. 2019.09.12 20:55:19 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:10fa::/64 interface=23 fe80::8 store=active 
		. 2019.09.12 20:55:19 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 4 fde6:7a:7d20:10fa::1046 store=active 
		. 2019.09.12 20:55:19 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 4 all 
		. 2019.09.12 20:55:19 - OpenVPN &gt; TAP: DHCP address released 
		. 2019.09.12 20:55:19 - OpenVPN &gt; SIGTERM[soft,exit-with-notification] received, process exiting 
		. 2019.09.12 20:55:19 - Connection terminated. 
		. 2019.09.12 20:55:20 - DNS IPv4 of a network adapter restored to original settings (Ethernet 4, to automatic) 
		. 2019.09.12 20:55:20 - DNS IPv6 of a network adapter restored to original settings (Ethernet 4, to automatic) 
		. 2019.09.12 20:55:20 - DNS leak protection with packet filtering disabled. 
		. 2019.09.12 20:55:20 - Interface Ethernet 4 metric restored from 3 to Automatic, layer IPv4 
		. 2019.09.12 20:55:20 - Interface Ethernet 4 metric restored from 3 to Automatic, layer IPv6 
		. 2019.09.12 20:55:20 - Flushing DNS 
		! 2019.09.12 20:55:23 - Session terminated. 
		I 2019.09.12 20:55:44 - Session starting. 
		I 2019.09.12 20:55:44 - Checking authorization ... 
		! 2019.09.12 20:55:45 - Connecting to Arkab (Canada, Toronto, Ontario) 
		. 2019.09.12 20:55:45 - OpenVPN &gt; OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 
		. 2019.09.12 20:55:45 - OpenVPN &gt; Windows version 6.2 (Windows 8 or greater) 64bit 
		. 2019.09.12 20:55:45 - OpenVPN &gt; library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 
		. 2019.09.12 20:55:45 - Connection to OpenVPN Management Interface 
		. 2019.09.12 20:55:45 - OpenVPN &gt; MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 
		. 2019.09.12 20:55:45 - OpenVPN &gt; Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2019.09.12 20:55:45 - OpenVPN &gt; Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2019.09.12 20:55:45 - OpenVPN &gt; Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2019.09.12 20:55:45 - OpenVPN &gt; Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2019.09.12 20:55:45 - OpenVPN &gt; TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.214:443 
		. 2019.09.12 20:55:45 - OpenVPN &gt; Socket Buffers: R=[65536-&gt;65536] S=[65536-&gt;65536] 
		. 2019.09.12 20:55:45 - OpenVPN &gt; UDP link local: (not bound) 
		. 2019.09.12 20:55:45 - OpenVPN &gt; UDP link remote: [AF_INET]184.75.221.214:443 
		. 2019.09.12 20:55:45 - OpenVPN &gt; TLS: Initial packet from [AF_INET]184.75.221.214:443, sid=c53ab2d8 f7624394 
		. 2019.09.12 20:55:45 - OpenVPN &gt; MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 
		. 2019.09.12 20:55:45 - OpenVPN &gt; VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org 
		. 2019.09.12 20:55:45 - OpenVPN &gt; VERIFY KU OK 
		. 2019.09.12 20:55:45 - OpenVPN &gt; Validating certificate extended key usage 
		. 2019.09.12 20:55:45 - OpenVPN &gt; ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 
		. 2019.09.12 20:55:45 - OpenVPN &gt; VERIFY EKU OK 
		. 2019.09.12 20:55:45 - OpenVPN &gt; VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org 
		. 2019.09.12 20:55:45 - OpenVPN &gt; Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA 
		. 2019.09.12 20:55:45 - OpenVPN &gt; [server] Peer Connection Initiated with [AF_INET]184.75.221.214:443 
		. 2019.09.12 20:55:46 - OpenVPN &gt; SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) 
		. 2019.09.12 20:55:46 - OpenVPN &gt; PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.9.250.1,dhcp-option DNS6 fde6:7a:7d20:5fa::1,tun-ipv6,route-gateway 10.9.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:5fa::10b9/64 fde6:7a:7d20:5fa::1,ifconfig 10.9.250.187 255.255.255.0,peer-id 1,cipher AES-256-GCM' 
		. 2019.09.12 20:55:46 - OpenVPN &gt; Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' 
		. 2019.09.12 20:55:46 - OpenVPN &gt; OPTIONS IMPORT: timers and/or timeouts modified 
		. 2019.09.12 20:55:46 - OpenVPN &gt; OPTIONS IMPORT: compression parms modified 
		. 2019.09.12 20:55:46 - OpenVPN &gt; OPTIONS IMPORT: --ifconfig/up options modified 
		. 2019.09.12 20:55:46 - OpenVPN &gt; OPTIONS IMPORT: route-related options modified 
		. 2019.09.12 20:55:46 - OpenVPN &gt; OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified 
		. 2019.09.12 20:55:46 - OpenVPN &gt; OPTIONS IMPORT: peer-id set 
		. 2019.09.12 20:55:46 - OpenVPN &gt; OPTIONS IMPORT: adjusting link_mtu to 1625 
		. 2019.09.12 20:55:46 - OpenVPN &gt; OPTIONS IMPORT: data channel crypto options modified 
		. 2019.09.12 20:55:46 - OpenVPN &gt; Data Channel: using negotiated cipher 'AES-256-GCM' 
		. 2019.09.12 20:55:46 - OpenVPN &gt; Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2019.09.12 20:55:46 - OpenVPN &gt; Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2019.09.12 20:55:46 - OpenVPN &gt; interactive service msg_channel=0 
		. 2019.09.12 20:55:46 - OpenVPN &gt; ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=15 HWADDR=10:02:b5:86:59:5c 
		. 2019.09.12 20:55:46 - OpenVPN &gt; GDG6: remote_host_ipv6=n/a 
		. 2019.09.12 20:55:46 - OpenVPN &gt; NOTE: GetBestInterfaceEx returned error: Element not found.   (code=1168) 
		. 2019.09.12 20:55:46 - OpenVPN &gt; ROUTE6: default_gateway=UNDEF 
		. 2019.09.12 20:55:46 - OpenVPN &gt; open_tun 
		. 2019.09.12 20:55:46 - OpenVPN &gt; TAP-WIN32 device [Ethernet 4] opened: \\.\Global\{EC5D0326-55CA-4233-B026-CDC459606FF8}.tap 
		. 2019.09.12 20:55:46 - OpenVPN &gt; TAP-Windows Driver Version 9.21 
		. 2019.09.12 20:55:46 - OpenVPN &gt; Set TAP-Windows TUN subnet mode network/local/netmask = 10.9.250.0/10.9.250.187/255.255.255.0 [SUCCEEDED] 
		. 2019.09.12 20:55:46 - OpenVPN &gt; Notified TAP-Windows driver to set a DHCP IP/netmask of 10.9.250.187/255.255.255.0 on interface {EC5D0326-55CA-4233-B026-CDC459606FF8} [DHCP-serv: 10.9.250.254, lease-time: 31536000] 
		. 2019.09.12 20:55:46 - OpenVPN &gt; Successful ARP Flush on interface [23] {EC5D0326-55CA-4233-B026-CDC459606FF8} 
		. 2019.09.12 20:55:46 - OpenVPN &gt; do_ifconfig, tt-&gt;did_ifconfig_ipv6_setup=1 
		. 2019.09.12 20:55:47 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=23 fde6:7a:7d20:5fa::10b9 store=active 
		. 2019.09.12 20:55:48 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 4 static fde6:7a:7d20:5fa::1 validate=no 
		. 2019.09.12 20:55:49 - OpenVPN &gt; add_route_ipv6(fde6:7a:7d20:5fa::/64 -&gt; fde6:7a:7d20:5fa::10b9 metric 0) dev Ethernet 4 
		. 2019.09.12 20:55:49 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:5fa::/64 interface=23 fe80::8 store=active 
		. 2019.09.12 20:55:49 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:55:54 - OpenVPN &gt; TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up 
		. 2019.09.12 20:55:54 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 184.75.221.214 MASK 255.255.255.255 192.168.0.1 
		. 2019.09.12 20:55:54 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 
		. 2019.09.12 20:55:54 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:55:54 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.9.250.1 
		. 2019.09.12 20:55:54 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 
		. 2019.09.12 20:55:54 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:55:54 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.9.250.1 
		. 2019.09.12 20:55:54 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 
		. 2019.09.12 20:55:54 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:55:54 - OpenVPN &gt; add_route_ipv6(::/3 -&gt; fde6:7a:7d20:5fa::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:55:54 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=23 fe80::8 store=active 
		. 2019.09.12 20:55:54 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:55:54 - OpenVPN &gt; add_route_ipv6(2000::/4 -&gt; fde6:7a:7d20:5fa::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:55:54 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:55:54 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:55:54 - OpenVPN &gt; add_route_ipv6(3000::/4 -&gt; fde6:7a:7d20:5fa::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:55:54 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:55:54 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:55:54 - OpenVPN &gt; add_route_ipv6(fc00::/7 -&gt; fde6:7a:7d20:5fa::1 metric -1) dev Ethernet 4 
		. 2019.09.12 20:55:54 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=23 fe80::8 store=active 
		. 2019.09.12 20:55:54 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:55:54 - Interface Ethernet 4 metric changed from Automatic to 3, layer IPv4 
		. 2019.09.12 20:55:54 - Interface Ethernet 4 metric changed from Automatic to 3, layer IPv6 
		. 2019.09.12 20:55:54 - DNS leak protection with packet filtering enabled. 
		. 2019.09.12 20:55:55 - DNS IPv4 of a network adapter forced (Ethernet 4, from automatic to 10.9.250.1) 
		. 2019.09.12 20:55:55 - DNS IPv6 of a network adapter forced (Ethernet 4, from automatic to fde6:7a:7d20:5fa::1) 
		. 2019.09.12 20:55:55 - Routes, added a new route, 184.75.221.211 for gateway 10.9.250.1 
		. 2019.09.12 20:55:55 - Routes, added a new route, 2606:6080:1001:17:9ea4:71f9:d294:d7b7 for gateway fde6:7a:7d20:5fa::1 
		. 2019.09.12 20:55:55 - Flushing DNS 
		I 2019.09.12 20:55:59 - Checking route IPv4 
		I 2019.09.12 20:55:59 - Checking route IPv6 
		I 2019.09.12 20:56:02 - Checking DNS 
		! 2019.09.12 20:56:03 - Connected. 
		. 2019.09.12 20:56:03 - OpenVPN &gt; Initialization Sequence Completed 
		! 2019.09.12 20:58:55 - Disconnecting 
		. 2019.09.12 20:58:55 - Routes, removed a route previously added, 184.75.221.211 for gateway 10.9.250.1 
		. 2019.09.12 20:58:56 - Routes, removed a route previously added, 2606:6080:1001:17:9ea4:71f9:d294:d7b7 for gateway fde6:7a:7d20:5fa::1 
		. 2019.09.12 20:58:56 - Sending management termination signal 
		. 2019.09.12 20:58:56 - Management - Send 'signal SIGTERM' 
		. 2019.09.12 20:58:56 - OpenVPN &gt; MANAGEMENT: CMD 'signal SIGTERM' 
		. 2019.09.12 20:58:56 - OpenVPN &gt; SIGTERM received, sending exit notification to peer 
		. 2019.09.12 20:59:02 - OpenVPN &gt; C:\WINDOWS\system32\route.exe DELETE 184.75.221.214 MASK 255.255.255.255 192.168.0.1 
		. 2019.09.12 20:59:02 - OpenVPN &gt; Route deletion via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:59:02 - OpenVPN &gt; C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.9.250.1 
		. 2019.09.12 20:59:02 - OpenVPN &gt; Route deletion via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:59:02 - OpenVPN &gt; C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.9.250.1 
		. 2019.09.12 20:59:02 - OpenVPN &gt; Route deletion via IPAPI succeeded [adaptive] 
		. 2019.09.12 20:59:02 - OpenVPN &gt; delete_route_ipv6(::/3) 
		. 2019.09.12 20:59:02 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=23 fe80::8 store=active 
		. 2019.09.12 20:59:02 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:59:02 - OpenVPN &gt; delete_route_ipv6(2000::/4) 
		. 2019.09.12 20:59:02 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:59:02 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:59:02 - OpenVPN &gt; delete_route_ipv6(3000::/4) 
		. 2019.09.12 20:59:02 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 20:59:02 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:59:02 - OpenVPN &gt; delete_route_ipv6(fc00::/7) 
		. 2019.09.12 20:59:02 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=23 fe80::8 store=active 
		. 2019.09.12 20:59:02 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 20:59:02 - OpenVPN &gt; Closing TUN/TAP interface 
		. 2019.09.12 20:59:02 - OpenVPN &gt; delete_route_ipv6(fde6:7a:7d20:5fa::/64) 
		. 2019.09.12 20:59:02 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:5fa::/64 interface=23 fe80::8 store=active 
		. 2019.09.12 20:59:02 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 4 fde6:7a:7d20:5fa::10b9 store=active 
		. 2019.09.12 20:59:03 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 4 all 
		. 2019.09.12 20:59:03 - OpenVPN &gt; TAP: DHCP address released 
		. 2019.09.12 20:59:03 - OpenVPN &gt; SIGTERM[soft,exit-with-notification] received, process exiting 
		. 2019.09.12 20:59:03 - Connection terminated. 
		. 2019.09.12 20:59:03 - DNS IPv4 of a network adapter restored to original settings (Ethernet 4, to automatic) 
		. 2019.09.12 20:59:03 - DNS IPv6 of a network adapter restored to original settings (Ethernet 4, to automatic) 
		. 2019.09.12 20:59:03 - DNS leak protection with packet filtering disabled. 
		. 2019.09.12 20:59:03 - Interface Ethernet 4 metric restored from 3 to Automatic, layer IPv4 
		. 2019.09.12 20:59:03 - Interface Ethernet 4 metric restored from 3 to Automatic, layer IPv6 
		. 2019.09.12 20:59:03 - Flushing DNS 
		! 2019.09.12 20:59:07 - Session terminated. 
		I 2019.09.12 21:01:21 - Session starting. 
		I 2019.09.12 21:01:21 - Checking authorization ... 
		! 2019.09.12 21:01:22 - Connecting to Anser (Netherlands, Alblasserdam) 
		. 2019.09.12 21:01:22 - OpenVPN &gt; OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 
		. 2019.09.12 21:01:22 - OpenVPN &gt; Windows version 6.2 (Windows 8 or greater) 64bit 
		. 2019.09.12 21:01:22 - OpenVPN &gt; library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 
		. 2019.09.12 21:01:22 - Connection to OpenVPN Management Interface 
		. 2019.09.12 21:01:22 - OpenVPN &gt; MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 
		. 2019.09.12 21:01:22 - OpenVPN &gt; Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2019.09.12 21:01:22 - OpenVPN &gt; Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2019.09.12 21:01:22 - OpenVPN &gt; Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2019.09.12 21:01:22 - OpenVPN &gt; Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2019.09.12 21:01:22 - OpenVPN &gt; TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.103.173:443 
		. 2019.09.12 21:01:22 - OpenVPN &gt; Socket Buffers: R=[65536-&gt;65536] S=[65536-&gt;65536] 
		. 2019.09.12 21:01:22 - OpenVPN &gt; UDP link local: (not bound) 
		. 2019.09.12 21:01:22 - OpenVPN &gt; UDP link remote: [AF_INET]109.202.103.173:443 
		. 2019.09.12 21:01:22 - OpenVPN &gt; MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 
		. 2019.09.12 21:01:22 - OpenVPN &gt; TLS: Initial packet from [AF_INET]109.202.103.173:443, sid=b056651b dbe2b52c 
		. 2019.09.12 21:01:22 - OpenVPN &gt; VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org 
		. 2019.09.12 21:01:22 - OpenVPN &gt; VERIFY KU OK 
		. 2019.09.12 21:01:22 - OpenVPN &gt; Validating certificate extended key usage 
		. 2019.09.12 21:01:22 - OpenVPN &gt; ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 
		. 2019.09.12 21:01:22 - OpenVPN &gt; VERIFY EKU OK 
		. 2019.09.12 21:01:22 - OpenVPN &gt; VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org 
		. 2019.09.12 21:01:23 - OpenVPN &gt; Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA 
		. 2019.09.12 21:01:23 - OpenVPN &gt; [server] Peer Connection Initiated with [AF_INET]109.202.103.173:443 
		. 2019.09.12 21:01:24 - OpenVPN &gt; SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) 
		. 2019.09.12 21:01:24 - OpenVPN &gt; PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.9.90.1,dhcp-option DNS6 fde6:7a:7d20:55a::1,tun-ipv6,route-gateway 10.9.90.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:55a::10e1/64 fde6:7a:7d20:55a::1,ifconfig 10.9.90.227 255.255.255.0,peer-id 0,cipher AES-256-GCM' 
		. 2019.09.12 21:01:24 - OpenVPN &gt; Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' 
		. 2019.09.12 21:01:24 - OpenVPN &gt; OPTIONS IMPORT: timers and/or timeouts modified 
		. 2019.09.12 21:01:24 - OpenVPN &gt; OPTIONS IMPORT: compression parms modified 
		. 2019.09.12 21:01:24 - OpenVPN &gt; OPTIONS IMPORT: --ifconfig/up options modified 
		. 2019.09.12 21:01:24 - OpenVPN &gt; OPTIONS IMPORT: route-related options modified 
		. 2019.09.12 21:01:24 - OpenVPN &gt; OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified 
		. 2019.09.12 21:01:24 - OpenVPN &gt; OPTIONS IMPORT: peer-id set 
		. 2019.09.12 21:01:24 - OpenVPN &gt; OPTIONS IMPORT: adjusting link_mtu to 1625 
		. 2019.09.12 21:01:24 - OpenVPN &gt; OPTIONS IMPORT: data channel crypto options modified 
		. 2019.09.12 21:01:24 - OpenVPN &gt; Data Channel: using negotiated cipher 'AES-256-GCM' 
		. 2019.09.12 21:01:24 - OpenVPN &gt; Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2019.09.12 21:01:24 - OpenVPN &gt; Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2019.09.12 21:01:24 - OpenVPN &gt; interactive service msg_channel=0 
		. 2019.09.12 21:01:24 - OpenVPN &gt; ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=15 HWADDR=10:02:b5:86:59:5c 
		. 2019.09.12 21:01:24 - OpenVPN &gt; GDG6: remote_host_ipv6=n/a 
		. 2019.09.12 21:01:24 - OpenVPN &gt; NOTE: GetBestInterfaceEx returned error: Element not found.   (code=1168) 
		. 2019.09.12 21:01:24 - OpenVPN &gt; ROUTE6: default_gateway=UNDEF 
		. 2019.09.12 21:01:24 - OpenVPN &gt; open_tun 
		. 2019.09.12 21:01:24 - OpenVPN &gt; TAP-WIN32 device [Ethernet 4] opened: \\.\Global\{EC5D0326-55CA-4233-B026-CDC459606FF8}.tap 
		. 2019.09.12 21:01:24 - OpenVPN &gt; TAP-Windows Driver Version 9.21 
		. 2019.09.12 21:01:24 - OpenVPN &gt; Set TAP-Windows TUN subnet mode network/local/netmask = 10.9.90.0/10.9.90.227/255.255.255.0 [SUCCEEDED] 
		. 2019.09.12 21:01:24 - OpenVPN &gt; Notified TAP-Windows driver to set a DHCP IP/netmask of 10.9.90.227/255.255.255.0 on interface {EC5D0326-55CA-4233-B026-CDC459606FF8} [DHCP-serv: 10.9.90.254, lease-time: 31536000] 
		. 2019.09.12 21:01:24 - OpenVPN &gt; Successful ARP Flush on interface [23] {EC5D0326-55CA-4233-B026-CDC459606FF8} 
		. 2019.09.12 21:01:24 - OpenVPN &gt; do_ifconfig, tt-&gt;did_ifconfig_ipv6_setup=1 
		. 2019.09.12 21:01:25 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=23 fde6:7a:7d20:55a::10e1 store=active 
		. 2019.09.12 21:01:26 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 4 static fde6:7a:7d20:55a::1 validate=no 
		. 2019.09.12 21:01:27 - Detected an OpenVPN bug (On-Link route on VPN range), autofix. 
		. 2019.09.12 21:01:27 - OpenVPN &gt; add_route_ipv6(fde6:7a:7d20:55a::/64 -&gt; fde6:7a:7d20:55a::10e1 metric 0) dev Ethernet 4 
		. 2019.09.12 21:01:27 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:55a::/64 interface=23 fe80::8 store=active 
		. 2019.09.12 21:01:27 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 21:01:31 - OpenVPN &gt; TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up 
		. 2019.09.12 21:01:31 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 109.202.103.173 MASK 255.255.255.255 192.168.0.1 
		. 2019.09.12 21:01:31 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 
		. 2019.09.12 21:01:31 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 21:01:31 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.9.90.1 
		. 2019.09.12 21:01:31 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 
		. 2019.09.12 21:01:31 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 21:01:31 - OpenVPN &gt; C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.9.90.1 
		. 2019.09.12 21:01:31 - OpenVPN &gt; ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 
		. 2019.09.12 21:01:31 - OpenVPN &gt; Route addition via IPAPI succeeded [adaptive] 
		. 2019.09.12 21:01:31 - OpenVPN &gt; add_route_ipv6(::/3 -&gt; fde6:7a:7d20:55a::1 metric -1) dev Ethernet 4 
		. 2019.09.12 21:01:31 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=23 fe80::8 store=active 
		. 2019.09.12 21:01:31 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 21:01:31 - OpenVPN &gt; add_route_ipv6(2000::/4 -&gt; fde6:7a:7d20:55a::1 metric -1) dev Ethernet 4 
		. 2019.09.12 21:01:31 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 21:01:31 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 21:01:31 - OpenVPN &gt; add_route_ipv6(3000::/4 -&gt; fde6:7a:7d20:55a::1 metric -1) dev Ethernet 4 
		. 2019.09.12 21:01:31 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=23 fe80::8 store=active 
		. 2019.09.12 21:01:31 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 21:01:31 - OpenVPN &gt; add_route_ipv6(fc00::/7 -&gt; fde6:7a:7d20:55a::1 metric -1) dev Ethernet 4 
		. 2019.09.12 21:01:31 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=23 fe80::8 store=active 
		. 2019.09.12 21:01:31 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2019.09.12 21:01:31 - Interface Ethernet 4 metric changed from Automatic to 3, layer IPv4 
		. 2019.09.12 21:01:31 - Interface Ethernet 4 metric changed from Automatic to 3, layer IPv6 
		. 2019.09.12 21:01:31 - DNS leak protection with packet filtering enabled. 
		. 2019.09.12 21:01:32 - DNS IPv4 of a network adapter forced (Ethernet 4, from automatic to 10.9.90.1) 
		. 2019.09.12 21:01:32 - DNS IPv6 of a network adapter forced (Ethernet 4, from automatic to fde6:7a:7d20:55a::1) 
		. 2019.09.12 21:01:32 - Routes, added a new route, 109.202.103.170 for gateway 10.9.90.1 
		. 2019.09.12 21:01:33 - Routes, added a new route, 2a00:1678:2470:7:7265:24fc:ff33:113b for gateway fde6:7a:7d20:55a::1 
		. 2019.09.12 21:01:33 - Flushing DNS 
		I 2019.09.12 21:01:36 - Checking route IPv4 
		I 2019.09.12 21:01:37 - Checking route IPv6 
		I 2019.09.12 21:01:41 - Checking DNS 
		! 2019.09.12 21:01:41 - Connected. 
		. 2019.09.12 21:01:41 - OpenVPN &gt; Initialization Sequence Completed 
		. 2019.09.12 21:03:24 - Updating systems &amp; servers data ... 
		. 2019.09.12 21:03:26 - Systems &amp; servers data update completed  
		---------------------------- 
		Network Interfaces and Routes:  
		{ 
		    "support_ipv4": true, 
		    "support_ipv6": true, 
		    "routes": [ 
		        { 
		            "address": "0.0.0.0\/0", 
		            "interface": "{96F37CCE-DE3E-467F-A916-558F37FF4D42}", 
		            "gateway": "192.168.0.1", 
		            "metric": "55" 
		        }, 
		        { 
		            "address": "0.0.0.0\/1", 
		            "interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "gateway": "10.9.90.1", 
		            "metric": "3" 
		        }, 
		        { 
		            "address": "10.9.90.0\/24", 
		            "interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "gateway": "link", 
		            "metric": "259" 
		        }, 
		        { 
		            "address": "10.9.90.227", 
		            "interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "gateway": "link", 
		            "metric": "259" 
		        }, 
		        { 
		            "address": "10.9.90.255", 
		            "interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "gateway": "link", 
		            "metric": "259" 
		        }, 
		        { 
		            "address": "109.202.103.170", 
		            "interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "gateway": "10.9.90.1", 
		            "metric": "4" 
		        }, 
		        { 
		            "address": "109.202.103.173", 
		            "interface": "{96F37CCE-DE3E-467F-A916-558F37FF4D42}", 
		            "gateway": "192.168.0.1", 
		            "metric": "55" 
		        }, 
		        { 
		            "address": "127.0.0.0\/8", 
		            "interface": "{B62F1F46-D65B-11E7-B89A-806E6F6E6963}", 
		            "gateway": "link", 
		            "metric": "331" 
		        }, 
		        { 
		            "address": "127.0.0.1", 
		            "interface": "{B62F1F46-D65B-11E7-B89A-806E6F6E6963}", 
		            "gateway": "link", 
		            "metric": "331" 
		        }, 
		        { 
		            "address": "127.255.255.255", 
		            "interface": "{B62F1F46-D65B-11E7-B89A-806E6F6E6963}", 
		            "gateway": "link", 
		            "metric": "331" 
		        }, 
		        { 
		            "address": "128.0.0.0\/1", 
		            "interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "gateway": "10.9.90.1", 
		            "metric": "3" 
		        }, 
		        { 
		            "address": "192.168.0.0\/24", 
		            "interface": "{96F37CCE-DE3E-467F-A916-558F37FF4D42}", 
		            "gateway": "link", 
		            "metric": "311" 
		        }, 
		        { 
		            "address": "192.168.0.23", 
		            "interface": "{96F37CCE-DE3E-467F-A916-558F37FF4D42}", 
		            "gateway": "link", 
		            "metric": "311" 
		        }, 
		        { 
		            "address": "192.168.0.255", 
		            "interface": "{96F37CCE-DE3E-467F-A916-558F37FF4D42}", 
		            "gateway": "link", 
		            "metric": "311" 
		        }, 
		        { 
		            "address": "224.0.0.0\/4", 
		            "interface": "{B62F1F46-D65B-11E7-B89A-806E6F6E6963}", 
		            "gateway": "link", 
		            "metric": "331" 
		        }, 
		        { 
		            "address": "224.0.0.0\/4", 
		            "interface": "{96F37CCE-DE3E-467F-A916-558F37FF4D42}", 
		            "gateway": "link", 
		            "metric": "311" 
		        }, 
		        { 
		            "address": "224.0.0.0\/4", 
		            "interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "gateway": "link", 
		            "metric": "259" 
		        }, 
		        { 
		            "address": "255.255.255.255", 
		            "interface": "{B62F1F46-D65B-11E7-B89A-806E6F6E6963}", 
		            "gateway": "link", 
		            "metric": "331" 
		        }, 
		        { 
		            "address": "255.255.255.255", 
		            "interface": "{96F37CCE-DE3E-467F-A916-558F37FF4D42}", 
		            "gateway": "link", 
		            "metric": "311" 
		        }, 
		        { 
		            "address": "255.255.255.255", 
		            "interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "gateway": "link", 
		            "metric": "259" 
		        }, 
		        { 
		            "address": "::\/3", 
		            "interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "gateway": "fe80::8", 
		            "metric": "259" 
		        }, 
		        { 
		            "address": "::1", 
		            "interface": "{B62F1F46-D65B-11E7-B89A-806E6F6E6963}", 
		            "gateway": "link", 
		            "metric": "331" 
		        }, 
		        { 
		            "address": "2000::\/4", 
		            "interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "gateway": "fe80::8", 
		            "metric": "259" 
		        }, 
		        { 
		            "address": "2a00:1678:2470:7:7265:24fc:ff33:113b", 
		            "interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "gateway": "fde6:7a:7d20:55a::1", 
		            "metric": "259" 
		        }, 
		        { 
		            "address": "3000::\/4", 
		            "interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "gateway": "fe80::8", 
		            "metric": "259" 
		        }, 
		        { 
		            "address": "fc00::\/7", 
		            "interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "gateway": "fe80::8", 
		            "metric": "259" 
		        }, 
		        { 
		            "address": "fde6:7a:7d20:55a::\/64", 
		            "interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "gateway": "fe80::8", 
		            "metric": "259" 
		        }, 
		        { 
		            "address": "fde6:7a:7d20:55a::10e1", 
		            "interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "gateway": "link", 
		            "metric": "259" 
		        }, 
		        { 
		            "address": "fe80::\/64", 
		            "interface": "{96F37CCE-DE3E-467F-A916-558F37FF4D42}", 
		            "gateway": "link", 
		            "metric": "311" 
		        }, 
		        { 
		            "address": "fe80::\/64", 
		            "interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "gateway": "link", 
		            "metric": "259" 
		        }, 
		        { 
		            "address": "fe80::863:3369:2876:7ccd", 
		            "interface": "{96F37CCE-DE3E-467F-A916-558F37FF4D42}", 
		            "gateway": "link", 
		            "metric": "311" 
		        }, 
		        { 
		            "address": "fe80::148c:f372:cd1a:408b", 
		            "interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "gateway": "link", 
		            "metric": "259" 
		        }, 
		        { 
		            "address": "ff00::\/8", 
		            "interface": "{B62F1F46-D65B-11E7-B89A-806E6F6E6963}", 
		            "gateway": "link", 
		            "metric": "331" 
		        }, 
		        { 
		            "address": "ff00::\/8", 
		            "interface": "{96F37CCE-DE3E-467F-A916-558F37FF4D42}", 
		            "gateway": "link", 
		            "metric": "311" 
		        }, 
		        { 
		            "address": "ff00::\/8", 
		            "interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "gateway": "link", 
		            "metric": "259" 
		        }, 
		        { 
		            "address": "2a00:1678:2470:7:7265:24fc:ff33:113b", 
		            "gateway": "fde6:7a:7d20:55a::1", 
		            "metric": "4294967295" 
		        } 
		    ], 
		    "interfaces": [ 
		        { 
		            "friendly": "Ethernet 4", 
		            "id": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		            "name": "Ethernet 4", 
		            "description": "TAP-Windows Adapter V9 #2", 
		            "type": "Ethernet", 
		            "status": "Up", 
		            "bytes_received": "391059743", 
		            "bytes_sent": "47517729", 
		            "support_ipv4": true, 
		            "support_ipv6": true, 
		            "ips": [ 
		                "fde6:7a:7d20:55a::10e1", 
		                "fe80::148c:f372:cd1a:408b", 
		                "10.9.90.227" 
		            ], 
		            "gateways": [ 
		                "10.9.90.1", 
		                "fe80::8", 
		                "fde6:7a:7d20:55a::1" 
		            ], 
		            "bind": true, 
		            "dns4": "10.9.90.1", 
		            "dns6": null 
		        }, 
		        { 
		            "friendly": "Ethernet", 
		            "id": "{9F9254C8-24A3-451D-BCFB-21FFE65B2695}", 
		            "name": "Ethernet", 
		            "description": "Realtek PCIe GBE Family Controller", 
		            "type": "Ethernet", 
		            "status": "Down", 
		            "bytes_received": "0", 
		            "bytes_sent": "0", 
		            "support_ipv4": true, 
		            "support_ipv6": true, 
		            "ips": [ 
		                "fe80::9dc1:da73:2551:773e", 
		                "169.254.119.62" 
		            ], 
		            "gateways": [], 
		            "bind": true, 
		            "dns4": "", 
		            "dns6": null 
		        }, 
		        { 
		            "friendly": "Local Area Connection* 4", 
		            "id": "{5CD26EBB-CB31-4B69-AECF-A8F1F941C8E2}", 
		            "name": "Local Area Connection* 4", 
		            "description": "Microsoft Wi-Fi Direct Virtual Adapter #3", 
		            "type": "Wireless80211", 
		            "status": "Down", 
		            "bytes_received": "0", 
		            "bytes_sent": "0", 
		            "support_ipv4": true, 
		            "support_ipv6": true, 
		            "ips": [ 
		                "fe80::8ccc:8efc:1f66:3ee9", 
		                "169.254.62.233" 
		            ], 
		            "gateways": [], 
		            "bind": true, 
		            "dns4": "", 
		            "dns6": null 
		        }, 
		        { 
		            "friendly": "Local Area Connection* 5", 
		            "id": "{1E942638-C857-448D-956B-C5CDDF087D60}", 
		            "name": "Local Area Connection* 5", 
		            "description": "Microsoft Wi-Fi Direct Virtual Adapter #4", 
		            "type": "Wireless80211", 
		            "status": "Down", 
		            "bytes_received": "0", 
		            "bytes_sent": "0", 
		            "support_ipv4": true, 
		            "support_ipv6": true, 
		            "ips": [ 
		                "fe80::844c:ae3e:52b8:fa79", 
		                "169.254.250.121" 
		            ], 
		            "gateways": [], 
		            "bind": true, 
		            "dns4": "", 
		            "dns6": null 
		        }, 
		        { 
		            "friendly": "Wi-Fi", 
		            "id": "{96F37CCE-DE3E-467F-A916-558F37FF4D42}", 
		            "name": "Wi-Fi", 
		            "description": "Intel(R) Dual Band Wireless-AC 7265", 
		            "type": "Wireless80211", 
		            "status": "Up", 
		            "bytes_received": "5224550681", 
		            "bytes_sent": "2627593684", 
		            "support_ipv4": true, 
		            "support_ipv6": true, 
		            "ips": [ 
		                "fe80::863:3369:2876:7ccd", 
		                "192.168.0.23" 
		            ], 
		            "gateways": [ 
		                "192.168.0.1" 
		            ], 
		            "bind": true, 
		            "dns4": "", 
		            "dns6": null 
		        }, 
		        { 
		            "friendly": "Bluetooth Network Connection", 
		            "id": "{C54D0E32-B84A-401F-A3AF-A634C4F59CE6}", 
		            "name": "Bluetooth Network Connection", 
		            "description": "Bluetooth PAN HelpText", 
		            "type": "Ethernet", 
		            "status": "Down", 
		            "bytes_received": "0", 
		            "bytes_sent": "0", 
		            "support_ipv4": true, 
		            "support_ipv6": true, 
		            "ips": [ 
		                "fe80::eda9:c5e5:5465:1210", 
		                "169.254.18.16" 
		            ], 
		            "gateways": [], 
		            "bind": true, 
		            "dns4": "", 
		            "dns6": null 
		        }, 
		        { 
		            "friendly": "Loopback Pseudo-Interface 1", 
		            "id": "{B62F1F46-D65B-11E7-B89A-806E6F6E6963}", 
		            "name": "Loopback Pseudo-Interface 1", 
		            "description": "Software Loopback Interface 1", 
		            "type": "Loopback", 
		            "status": "Up", 
		            "bytes_received": "0", 
		            "bytes_sent": "0", 
		            "support_ipv4": true, 
		            "support_ipv6": true, 
		            "ips": [ 
		                "::1", 
		                "127.0.0.1" 
		            ], 
		            "gateways": [], 
		            "bind": true, 
		            "dns4": "", 
		            "dns6": null 
		        } 
		    ], 
		    "ipv4-default-gateway": "10.9.90.1", 
		    "ipv4-default-interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}", 
		    "ipv6-default-gateway": "fe80::8", 
		    "ipv6-default-interface": "{EC5D0326-55CA-4233-B026-CDC459606FF8}" 
		} 
		---------------------------- 
		ipconfig /all:  
		Windows IP Configuration  
		   Host Name . . . . . . . . . . . . : DESKTOP-V5L4NQO 
		   Primary Dns Suffix  . . . . . . . :  
		   Node Type . . . . . . . . . . . . : Hybrid 
		   IP Routing Enabled. . . . . . . . : No 
		   WINS Proxy Enabled. . . . . . . . : No 
		   DNS Suffix Search List. . . . . . : tds  
		Ethernet adapter Ethernet 4:  
		   Connection-specific DNS Suffix  . :  
		   Description . . . . . . . . . . . : TAP-Windows Adapter V9 #2 
		   Physical Address. . . . . . . . . : 00-FF-EC-5D-03-26 
		   DHCP Enabled. . . . . . . . . . . : Yes 
		   Autoconfiguration Enabled . . . . : Yes 
		   IPv6 Address. . . . . . . . . . . : fde6:7a:7d20:55a::10e1(Preferred)  
		   Link-local IPv6 Address . . . . . : fe80::148c:f372:cd1a:408b%23(Preferred)  
		   IPv4 Address. . . . . . . . . . . : 10.9.90.227(Preferred)  
		   Subnet Mask . . . . . . . . . . . : 255.255.255.0 
		   Lease Obtained. . . . . . . . . . : Thursday, September 12, 2019 9:01:24 PM 
		   Lease Expires . . . . . . . . . . : Friday, September 11, 2020 9:01:24 PM 
		   Default Gateway . . . . . . . . . :  
		   DHCP Server . . . . . . . . . . . : 10.9.90.254 
		   DHCPv6 IAID . . . . . . . . . . . : 755040236 
		   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1E-55-A9-6D-9C-5C-8E-37-17-9C 
		   DNS Servers . . . . . . . . . . . : fde6:7a:7d20:55a::1 
		                                       10.9.90.1 
		   NetBIOS over Tcpip. . . . . . . . : Enabled  
		Ethernet adapter Ethernet:  
		   Media State . . . . . . . . . . . : Media disconnected 
		   Connection-specific DNS Suffix  . :  
		   Description . . . . . . . . . . . : Realtek PCIe GBE Family Controller 
		   Physical Address. . . . . . . . . : 9C-5C-8E-37-17-9C 
		   DHCP Enabled. . . . . . . . . . . : Yes 
		   Autoconfiguration Enabled . . . . : Yes  
		Wireless LAN adapter Local Area Connection* 4:  
		   Media State . . . . . . . . . . . : Media disconnected 
		   Connection-specific DNS Suffix  . :  
		   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #3 
		   Physical Address. . . . . . . . . : 10-02-B5-86-59-5D 
		   DHCP Enabled. . . . . . . . . . . : Yes 
		   Autoconfiguration Enabled . . . . : Yes  
		Wireless LAN adapter Local Area Connection* 5:  
		   Media State . . . . . . . . . . . : Media disconnected 
		   Connection-specific DNS Suffix  . :  
		   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #4 
		   Physical Address. . . . . . . . . : 12-02-B5-86-59-5C 
		   DHCP Enabled. . . . . . . . . . . : Yes 
		   Autoconfiguration Enabled . . . . : Yes  
		Wireless LAN adapter Wi-Fi:  
		   Connection-specific DNS Suffix  . : tds 
		   Description . . . . . . . . . . . : Intel(R) Dual Band Wireless-AC 7265 
		   Physical Address. . . . . . . . . : 10-02-B5-86-59-5C 
		   DHCP Enabled. . . . . . . . . . . : Yes 
		   Autoconfiguration Enabled . . . . : Yes 
		   Link-local IPv6 Address . . . . . : fe80::863:3369:2876:7ccd%15(Preferred)  
		   IPv4 Address. . . . . . . . . . . : 192.168.0.23(Preferred)  
		   Subnet Mask . . . . . . . . . . . : 255.255.255.0 
		   Lease Obtained. . . . . . . . . . : Wednesday, September 11, 2019 8:57:31 PM 
		   Lease Expires . . . . . . . . . . : Friday, September 13, 2019 7:14:45 PM 
		   Default Gateway . . . . . . . . . : 192.168.0.1 
		   DHCP Server . . . . . . . . . . . : 192.168.0.1 
		   DHCPv6 IAID . . . . . . . . . . . : 84935349 
		   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1E-55-A9-6D-9C-5C-8E-37-17-9C 
		   DNS Servers . . . . . . . . . . . : 192.168.0.1 
		                                       216.170.153.146 
		   NetBIOS over Tcpip. . . . . . . . : Enabled  
		Ethernet adapter Bluetooth Network Connection:  
		   Media State . . . . . . . . . . . : Media disconnected 
		   Connection-specific DNS Suffix  . :  
		   Description . . . . . . . . . . . : Bluetooth PAN HelpText 
		   Physical Address. . . . . . . . . : 10-02-B5-86-59-60 
		   DHCP Enabled. . . . . . . . . . . : Yes 
		   Autoconfiguration Enabled . . . . : Yes
	 



	  
	Sorry if that's way too many logs, I don't really know what to include specifically]]></description><pubDate>Fri, 13 Sep 2019 02:09:30 +0000</pubDate></item><item><title>Target specific routing for Amazon Prime Video</title><link><![CDATA[https://airvpn.org/forums/topic/45358-target-specific-routing-for-amazon-prime-video/?do=findComment&comment=101230]]></link><description>I am trying to find a solution for the issue of blocked AirVPN servers by Amazon Prime Video. Could somebody help me out with an iptables based solution to circumvent vpn and connect directly to their (Amazons) servers (but still routing all other traffic through the vpn tunnel)? Currently I am using:
 
	iptables -I FORWARD -i br0 -o tun1 -j ACCEPT 
	iptables -I FORWARD -i tun1 -o br0 -j ACCEPT 
	iptables -I FORWARD -i br0 -o vlan2 -j DROP 
	iptables -I INPUT -i tun1 -j REJECT 
	iptables -t nat -A POSTROUTING -o tun1 -j MASQUERADE

vlan2 is my virtual interface for the wan port. What would be the best option to implement a target specific routing? I am running the AirVPN client on a ddwrt router.</description><pubDate>Thu, 12 Sep 2019 19:24:51 +0000</pubDate></item><item><title>New proxy service from Firefox</title><link><![CDATA[https://airvpn.org/forums/topic/45351-new-proxy-service-from-firefox/?do=findComment&comment=101214]]></link><description>https://private-network.firefox.com/  
Interesting concept. I suspect it will not be free after the beta, but not a bad idea.</description><pubDate>Thu, 12 Sep 2019 15:56:28 +0000</pubDate></item><item><title>Air VPN with 4th generation fire stick</title><link><![CDATA[https://airvpn.org/forums/topic/45330-air-vpn-with-4th-generation-fire-stick/?do=findComment&comment=101143]]></link><description>Hi there any help would be most appreciated I have a fire stick and I'm trying to put my airVPN onto my fire stick I have tried using OpenVPN when I copy the config files for Netherlands and United States it says the files are too long I thought it might mean the text is too long so I shortened the name but it didn't make any difference any help please regards Dave</description><pubDate>Wed, 11 Sep 2019 12:29:56 +0000</pubDate></item></channel></rss>
