Jump to content
Not connected, Your IP: 3.15.145.111

Search the Community

Showing results for tags 'Speed'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 101 results

  1. Hello, I've attached a couple of images containing the results from speedtest.net for two tests - one using my ISP (915Mbps max) and the other using AirVPN (82Mbps). As we can see, using an AirVPN server about 300 miles (about 480km) from my location means - at least according to speedtest.net - taking a speed drop by a magnitude of over ten. I was wondering what the AirVPN community had to see about such results. Are they of the magnitude expected? How reliable does the community think there are? Many thanks for any suggestions.
  2. Hello, I have been using AirVPN for quite some time now... I was previously using the Eddie client on a single machine, but decided to build a PFSense box and configure the VPN there. I am located in Canada, and setting a connection to a single VPN server in Toronto. It seems to give the best connection and reliability rather then going for the ca.airvpn (I seem to always end up at a BC server using this entry) My issue is.... I currently have a 150mbps connection with my ISP. Using PFSense without AirVPN I am able to reach my advertised speeds With AirVPN configured, I am only ever seeing a max of about 30mbps. My hardware setup is quite decent. Intel® Core i5 CPU 650 @ 3.20GHz 4gb DDR3 memory120gb SSD2 Intel NICs (both showing as igb) My speeds using Eddie were very very good, much better then the PFSense speeds; so I can only assume that I have a configuration error (my hardware seems to be quite good from what I have been reading) Some research from other posts did not help better my issue, so I am hoping that posting my own thread on this topic can being me closer to a conclusion with mine. I followed the guide by "pfSense_fan"https://airvpn.org/topic/17444-how-to-set-up-pfsense-23-for-airvpn/ I can post any diagnostics or logs as necessary, I just do not know what you guys would like to see. Any help with this would be appreactiated Regards
  3. Sorry for the lengthy log. I've had this issue in the past but can't seem to fix it this time. I'm not sure what the issue is, I've turned off my firewall and anti virus, but those werent it. What am I doing wrong? . 2023.11.17 06:12:43 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 42 all . 2023.11.17 06:12:43 - OpenVPN > IPv4 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:12:43 - OpenVPN > NETSH: C:\Windows\stem32\netsh.exe interface ipv6 set address 42 fde6:7a:7d20:1f27::1082/128 store=active . 2023.11.17 06:12:44 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1f27::/64 -> fde6:7a:7d20:1f27::1082 metric 0) dev Eddie . 2023.11.17 06:12:44 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1f27::/64 42 fe80::8 store=active . 2023.11.17 06:12:44 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2023.11.17 06:12:44 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 42 all . 2023.11.17 06:12:44 - OpenVPN > IPv6 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:12:44 - OpenVPN > Initialization Sequence Completed . 2023.11.17 06:12:44 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.11.17 06:12:44 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.11.17 06:12:44 - DNS leak protection with packet filtering enabled. . 2023.11.17 06:12:44 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.35.39.1) . 2023.11.17 06:12:44 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1f27::1) . 2023.11.17 06:12:45 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:12:45 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:12:45 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:12:46 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:12:46 - Routes, add 139.28.218.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:12:46 - Routes, add 2a0d:5600:9:3f:3a9b:a7b9:b7c1:498/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:12:46 - Flushing DNS ! 2023.11.17 06:12:46 - Connected. ! 2023.11.17 06:12:55 - Disconnecting . 2023.11.17 06:12:55 - Sending soft termination signal . 2023.11.17 06:12:58 - OpenVPN > Closing TUN/TAP interface . 2023.11.17 06:12:58 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1f27::/64) . 2023.11.17 06:12:59 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1f27::/64 42 fe80::8 store=active . 2023.11.17 06:12:59 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 42 fde6:7a:7d20:1f27::1082 store=active . 2023.11.17 06:12:59 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 42 10.35.39.132 store=active . 2023.11.17 06:12:59 - OpenVPN > SIGTERM[hard,] received, process exiting . 2023.11.17 06:12:59 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:13:00 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:13:00 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:13:01 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:13:01 - Routes, delete 139.28.218.237/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:13:02 - Routes, delete 139.28.218.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:13:02 - Routes, delete 2a0d:5600:9:3f:3a9b:a7b9:b7c1:498/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:13:03 - Routes, delete 139.28.218.237/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", not exists. . 2023.11.17 06:13:03 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:13:03 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:13:03 - DNS leak protection with packet filtering disabled. . 2023.11.17 06:13:03 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.11.17 06:13:03 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.11.17 06:13:03 - Connection terminated. . 2023.11.17 06:13:03 - Flushing DNS ! 2023.11.17 06:13:04 - Session terminated. I 2023.11.17 06:16:46 - Session starting. I 2023.11.17 06:16:48 - Checking authorization ... . 2023.11.17 06:16:50 - Added new network interface "Eddie", Wintun version 0.12 . 2023.11.17 06:16:50 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.11.17 06:16:50 - Connecting to Ross (Canada, Montreal) . 2023.11.17 06:16:50 - Routes, add 139.28.218.237/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:16:50 - Routes, add 139.28.218.237/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", already exists. . 2023.11.17 06:16:50 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.17 06:16:50 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.17 06:16:50 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.17 06:16:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:16:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:16:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:16:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:16:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]139.28.218.237:443 . 2023.11.17 06:16:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2023.11.17 06:16:50 - OpenVPN > Attempting to establish TCP connection with [AF_INET]139.28.218.237:443 [nonblock] . 2023.11.17 06:16:50 - OpenVPN > TCP connection established with [AF_INET]139.28.218.237:443 . 2023.11.17 06:16:50 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.11.17 06:16:50 - OpenVPN > TCP_CLIENT link remote: [AF_INET]139.28.218.237:443 . 2023.11.17 06:16:51 - OpenVPN > TLS: Initial packet from [AF_INET]139.28.218.237:443, sid=d9fe8bf0 6cf32c81 . 2023.11.17 06:16:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 06:16:51 - OpenVPN > VERIFY KU OK . 2023.11.17 06:16:51 - OpenVPN > Validating certificate extended key usage . 2023.11.17 06:16:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 06:16:51 - OpenVPN > VERIFY EKU OK . 2023.11.17 06:16:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ross, emailAddress=info@airvpn.org . 2023.11.17 06:16:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 06:16:51 - OpenVPN > [Ross] Peer Connection Initiated with [AF_INET]139.28.218.237:443 . 2023.11.17 06:16:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.35.39.1,dhcp-option DNS6 fde6:7a:7d20:1f27::1,tun-ipv6,route-gateway 10.35.39.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1f27::1082/64 fde6:7a:7d20:1f27::1,ifconfig 10.35.39.132 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.11.17 06:16:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.17 06:16:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.35.39.1' . 2023.11.17 06:16:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1f27::1' . 2023.11.17 06:16:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.17 06:16:51 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.17 06:16:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.17 06:16:51 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.17 06:16:51 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.17 06:16:51 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2023.11.17 06:16:51 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.17 06:16:51 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.17 06:16:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:16:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:16:51 - OpenVPN > interactive service msg_channel=0 . 2023.11.17 06:16:51 - OpenVPN > open_tun . 2023.11.17 06:16:51 - OpenVPN > wintun device [Eddie] opened . 2023.11.17 06:16:51 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 42 static 10.35.39.132 255.255.255.0 . 2023.11.17 06:16:52 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 42 all . 2023.11.17 06:16:52 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 42 all . 2023.11.17 06:16:52 - OpenVPN > IPv4 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:16:52 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 42 fde6:7a:7d20:1f27::1082/128 store=active . 2023.11.17 06:16:52 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1f27::/64 -> fde6:7a:7d20:1f27::1082 metric 0) dev Eddie . 2023.11.17 06:16:52 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1f27::/64 42 fe80::8 store=active . 2023.11.17 06:16:52 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2023.11.17 06:16:52 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 42 all . 2023.11.17 06:16:52 - OpenVPN > IPv6 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:16:52 - OpenVPN > Initialization Sequence Completed . 2023.11.17 06:16:52 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.11.17 06:16:52 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.11.17 06:16:52 - DNS leak protection with packet filtering enabled. . 2023.11.17 06:16:53 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.35.39.1) . 2023.11.17 06:16:53 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1f27::1) . 2023.11.17 06:16:53 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:16:54 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:16:54 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:16:54 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:16:54 - Routes, add 139.28.218.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:16:55 - Routes, add 2a0d:5600:9:3f:3a9b:a7b9:b7c1:498/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:16:55 - Flushing DNS I 2023.11.17 06:16:55 - Checking DNS . 2023.11.17 06:17:28 - OpenVPN > read TCP_CLIENT: Unknown error (code=10060) . 2023.11.17 06:17:28 - OpenVPN > Connection reset, restarting [-1] . 2023.11.17 06:17:28 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2023.11.17 06:17:28 - OpenVPN > Restart pause, 5 second(s) . 2023.11.17 06:17:28 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:17:28 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:17:28 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:17:28 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:17:28 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]139.28.218.237:443 . 2023.11.17 06:17:28 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2023.11.17 06:17:28 - OpenVPN > Attempting to establish TCP connection with [AF_INET]139.28.218.237:443 [nonblock] ! 2023.11.17 06:17:28 - Disconnecting . 2023.11.17 06:17:28 - Sending soft termination signal . 2023.11.17 06:17:31 - OpenVPN > Closing TUN/TAP interface . 2023.11.17 06:17:31 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1f27::/64) . 2023.11.17 06:17:31 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1f27::/64 42 fe80::8 store=active . 2023.11.17 06:17:31 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 42 fde6:7a:7d20:1f27::1082 store=active . 2023.11.17 06:17:31 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 42 10.35.39.132 store=active . 2023.11.17 06:17:31 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2023.11.17 06:17:31 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:17:32 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:17:32 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:17:32 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:17:33 - Routes, delete 139.28.218.237/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:17:33 - Routes, delete 139.28.218.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:17:33 - Routes, delete 2a0d:5600:9:3f:3a9b:a7b9:b7c1:498/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:17:34 - Routes, delete 139.28.218.237/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", not exists. . 2023.11.17 06:17:34 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:17:34 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:17:34 - DNS leak protection with packet filtering disabled. . 2023.11.17 06:17:34 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.11.17 06:17:34 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.11.17 06:17:34 - Connection terminated. I 2023.11.17 06:17:34 - Cancel requested. ! 2023.11.17 06:17:35 - Session terminated. I 2023.11.17 06:20:19 - Session starting. I 2023.11.17 06:20:21 - Checking authorization ... . 2023.11.17 06:20:23 - Added new network interface "Eddie", Wintun version 0.12 . 2023.11.17 06:20:23 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.11.17 06:20:23 - Connecting to Hercules (United States of America, Atlanta, Georgia) . 2023.11.17 06:20:23 - Routes, add 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:20:23 - Routes, add 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", already exists. . 2023.11.17 06:20:24 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.17 06:20:24 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.17 06:20:24 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.17 06:20:24 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:20:24 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:20:24 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:20:24 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:20:24 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.61:443 . 2023.11.17 06:20:24 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2023.11.17 06:20:24 - OpenVPN > UDP link local: (not bound) . 2023.11.17 06:20:24 - OpenVPN > UDP link remote: [AF_INET]64.42.179.61:443 . 2023.11.17 06:20:24 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.61:443, sid=2f3da7a1 4d52aef8 . 2023.11.17 06:20:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 06:20:24 - OpenVPN > VERIFY KU OK . 2023.11.17 06:20:24 - OpenVPN > Validating certificate extended key usage . 2023.11.17 06:20:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 06:20:24 - OpenVPN > VERIFY EKU OK . 2023.11.17 06:20:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hercules, emailAddress=info@airvpn.org . 2023.11.17 06:20:24 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 06:20:24 - OpenVPN > [Hercules] Peer Connection Initiated with [AF_INET]64.42.179.61:443 . 2023.11.17 06:20:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.230.1,dhcp-option DNS6 fde6:7a:7d20:12e6::1,tun-ipv6,route-gateway 10.22.230.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:12e6::108d/64 fde6:7a:7d20:12e6::1,ifconfig 10.22.230.143 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.11.17 06:20:24 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.17 06:20:24 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.230.1' . 2023.11.17 06:20:24 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:12e6::1' . 2023.11.17 06:20:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.17 06:20:24 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.17 06:20:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.17 06:20:24 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.17 06:20:24 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.17 06:20:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.17 06:20:24 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.17 06:20:24 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.17 06:20:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:20:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:20:24 - OpenVPN > interactive service msg_channel=0 . 2023.11.17 06:20:24 - OpenVPN > open_tun . 2023.11.17 06:20:24 - OpenVPN > wintun device [Eddie] opened . 2023.11.17 06:20:25 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 42 static 10.22.230.143 255.255.255.0 . 2023.11.17 06:20:25 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 42 all . 2023.11.17 06:20:25 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 42 all . 2023.11.17 06:20:25 - OpenVPN > IPv4 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:20:25 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 42 fde6:7a:7d20:12e6::108d/128 store=active . 2023.11.17 06:20:25 - OpenVPN > add_route_ipv6(fde6:7a:7d20:12e6::/64 -> fde6:7a:7d20:12e6::108d metric 0) dev Eddie . 2023.11.17 06:20:25 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:12e6::/64 42 fe80::8 store=active . 2023.11.17 06:20:25 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2023.11.17 06:20:25 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 42 all . 2023.11.17 06:20:25 - OpenVPN > IPv6 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:20:25 - OpenVPN > Initialization Sequence Completed . 2023.11.17 06:20:25 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.11.17 06:20:25 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.11.17 06:20:25 - DNS leak protection with packet filtering enabled. . 2023.11.17 06:20:25 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.22.230.1) . 2023.11.17 06:20:26 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:12e6::1) . 2023.11.17 06:20:26 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:20:26 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:20:27 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:20:27 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:20:27 - Routes, add 64.42.179.59/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:20:27 - Routes, add 2605:9f80:6000:80:fc8c:43ee:267e:97ab/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:20:27 - Flushing DNS ! 2023.11.17 06:20:28 - Connected. . 2023.11.17 06:20:28 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:20:28 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:20:28 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:21:18 - Above log line repeated 22 times more ! 2023.11.17 06:21:18 - Disconnecting . 2023.11.17 06:21:18 - Sending soft termination signal . 2023.11.17 06:21:21 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.11.17 06:21:23 - OpenVPN > Closing TUN/TAP interface . 2023.11.17 06:21:23 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:12e6::/64) . 2023.11.17 06:21:23 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:12e6::/64 42 fe80::8 store=active . 2023.11.17 06:21:23 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 42 fde6:7a:7d20:12e6::108d store=active . 2023.11.17 06:21:23 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 42 10.22.230.143 store=active . 2023.11.17 06:21:23 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.11.17 06:21:24 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:21:24 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:21:25 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:21:25 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:21:25 - Routes, delete 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:21:26 - Routes, delete 64.42.179.59/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:21:26 - Routes, delete 2605:9f80:6000:80:fc8c:43ee:267e:97ab/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:21:26 - Routes, delete 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", not exists. . 2023.11.17 06:21:26 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:21:27 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:21:27 - DNS leak protection with packet filtering disabled. . 2023.11.17 06:21:27 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.11.17 06:21:27 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.11.17 06:21:27 - Connection terminated. . 2023.11.17 06:21:27 - Flushing DNS ! 2023.11.17 06:21:27 - Session terminated. I 2023.11.17 06:21:55 - Session starting. I 2023.11.17 06:21:57 - Checking authorization ... . 2023.11.17 06:21:59 - Added new network interface "Eddie", Wintun version 0.12 . 2023.11.17 06:21:59 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.11.17 06:21:59 - Connecting to Hercules (United States of America, Atlanta, Georgia) . 2023.11.17 06:21:59 - Routes, add 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:21:59 - Routes, add 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", already exists. . 2023.11.17 06:22:00 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.17 06:22:00 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.17 06:22:00 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.17 06:22:00 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:22:00 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:22:00 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:22:00 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:22:00 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.61:443 . 2023.11.17 06:22:00 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2023.11.17 06:22:00 - OpenVPN > UDP link local: (not bound) . 2023.11.17 06:22:00 - OpenVPN > UDP link remote: [AF_INET]64.42.179.61:443 . 2023.11.17 06:22:00 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.61:443, sid=356fa76e cc842b70 . 2023.11.17 06:22:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 06:22:00 - OpenVPN > VERIFY KU OK . 2023.11.17 06:22:00 - OpenVPN > Validating certificate extended key usage . 2023.11.17 06:22:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 06:22:00 - OpenVPN > VERIFY EKU OK . 2023.11.17 06:22:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hercules, emailAddress=info@airvpn.org . 2023.11.17 06:22:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 06:22:00 - OpenVPN > [Hercules] Peer Connection Initiated with [AF_INET]64.42.179.61:443 . 2023.11.17 06:22:01 - OpenVPN > SENT CONTROL [Hercules]: 'PUSH_REQUEST' (status=1) . 2023.11.17 06:22:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.230.1,dhcp-option DNS6 fde6:7a:7d20:12e6::1,tun-ipv6,route-gateway 10.22.230.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:12e6::108d/64 fde6:7a:7d20:12e6::1,ifconfig 10.22.230.143 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.11.17 06:22:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.17 06:22:03 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.230.1' . 2023.11.17 06:22:03 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:12e6::1' . 2023.11.17 06:22:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.17 06:22:03 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.17 06:22:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.17 06:22:03 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.17 06:22:03 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.17 06:22:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.17 06:22:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.17 06:22:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.17 06:22:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:22:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:22:03 - OpenVPN > interactive service msg_channel=0 . 2023.11.17 06:22:03 - OpenVPN > open_tun . 2023.11.17 06:22:03 - OpenVPN > wintun device [Eddie] opened . 2023.11.17 06:22:03 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 42 static 10.22.230.143 255.255.255.0 . 2023.11.17 06:22:03 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 42 all . 2023.11.17 06:22:03 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 42 all . 2023.11.17 06:22:03 - OpenVPN > IPv4 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:22:03 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 42 fde6:7a:7d20:12e6::108d/128 store=active . 2023.11.17 06:22:04 - OpenVPN > add_route_ipv6(fde6:7a:7d20:12e6::/64 -> fde6:7a:7d20:12e6::108d metric 0) dev Eddie . 2023.11.17 06:22:04 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:12e6::/64 42 fe80::8 store=active . 2023.11.17 06:22:04 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2023.11.17 06:22:04 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 42 all . 2023.11.17 06:22:04 - OpenVPN > IPv6 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:22:04 - OpenVPN > Initialization Sequence Completed . 2023.11.17 06:22:04 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.11.17 06:22:04 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.11.17 06:22:04 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.22.230.1) . 2023.11.17 06:22:04 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:12e6::1) . 2023.11.17 06:22:05 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:22:05 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:22:06 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:22:06 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:22:06 - Routes, add 64.42.179.59/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:22:06 - Routes, add 2605:9f80:6000:80:fc8c:43ee:267e:97ab/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:22:06 - Flushing DNS ! 2023.11.17 06:22:06 - Connected. . 2023.11.17 06:22:06 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:22:06 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:22:06 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:22:21 - Above log line repeated 6 times more ! 2023.11.17 06:22:21 - Disconnecting . 2023.11.17 06:22:21 - Sending soft termination signal . 2023.11.17 06:22:24 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.11.17 06:22:26 - OpenVPN > Closing TUN/TAP interface . 2023.11.17 06:22:26 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:12e6::/64) . 2023.11.17 06:22:26 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:12e6::/64 42 fe80::8 store=active . 2023.11.17 06:22:26 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 42 fde6:7a:7d20:12e6::108d store=active . 2023.11.17 06:22:26 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 42 10.22.230.143 store=active . 2023.11.17 06:22:26 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.11.17 06:22:26 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:22:27 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:22:27 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:22:27 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:22:28 - Routes, delete 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:22:28 - Routes, delete 64.42.179.59/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:22:28 - Routes, delete 2605:9f80:6000:80:fc8c:43ee:267e:97ab/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:22:28 - Routes, delete 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", not exists. . 2023.11.17 06:22:29 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:22:29 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:22:29 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.11.17 06:22:29 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.11.17 06:22:29 - Connection terminated. . 2023.11.17 06:22:29 - Flushing DNS ! 2023.11.17 06:22:29 - Session terminated. I 2023.11.17 06:23:36 - Session starting. I 2023.11.17 06:23:38 - Checking authorization ... . 2023.11.17 06:23:40 - Added new network interface "Eddie", Wintun version 0.12 . 2023.11.17 06:23:40 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.11.17 06:23:40 - Connecting to Hercules (United States of America, Atlanta, Georgia) . 2023.11.17 06:23:40 - Routes, add 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:23:41 - Routes, add 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", already exists. . 2023.11.17 06:23:41 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.17 06:23:41 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.17 06:23:41 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.17 06:23:41 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:23:41 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:23:41 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:23:41 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:23:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.61:443 . 2023.11.17 06:23:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2023.11.17 06:23:41 - OpenVPN > UDP link local: (not bound) . 2023.11.17 06:23:41 - OpenVPN > UDP link remote: [AF_INET]64.42.179.61:443 . 2023.11.17 06:23:41 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.61:443, sid=cba05ea8 7bb3b596 . 2023.11.17 06:23:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 06:23:41 - OpenVPN > VERIFY KU OK . 2023.11.17 06:23:41 - OpenVPN > Validating certificate extended key usage . 2023.11.17 06:23:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 06:23:41 - OpenVPN > VERIFY EKU OK . 2023.11.17 06:23:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hercules, emailAddress=info@airvpn.org . 2023.11.17 06:23:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 06:23:41 - OpenVPN > [Hercules] Peer Connection Initiated with [AF_INET]64.42.179.61:443 . 2023.11.17 06:23:42 - OpenVPN > SENT CONTROL [Hercules]: 'PUSH_REQUEST' (status=1) . 2023.11.17 06:23:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.230.1,dhcp-option DNS6 fde6:7a:7d20:12e6::1,tun-ipv6,route-gateway 10.22.230.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:12e6::108d/64 fde6:7a:7d20:12e6::1,ifconfig 10.22.230.143 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.11.17 06:23:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.17 06:23:42 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.230.1' . 2023.11.17 06:23:42 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:12e6::1' . 2023.11.17 06:23:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.17 06:23:42 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.17 06:23:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.17 06:23:42 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.17 06:23:42 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.17 06:23:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.17 06:23:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.17 06:23:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.17 06:23:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:23:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:23:42 - OpenVPN > interactive service msg_channel=0 . 2023.11.17 06:23:42 - OpenVPN > open_tun . 2023.11.17 06:23:42 - OpenVPN > wintun device [Eddie] opened . 2023.11.17 06:23:42 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 42 static 10.22.230.143 255.255.255.0 . 2023.11.17 06:23:42 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 42 all . 2023.11.17 06:23:42 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 42 all . 2023.11.17 06:23:42 - OpenVPN > IPv4 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:23:42 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 42 fde6:7a:7d20:12e6::108d/128 store=active . 2023.11.17 06:23:42 - OpenVPN > add_route_ipv6(fde6:7a:7d20:12e6::/64 -> fde6:7a:7d20:12e6::108d metric 0) dev Eddie . 2023.11.17 06:23:42 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:12e6::/64 42 fe80::8 store=active . 2023.11.17 06:23:42 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2023.11.17 06:23:42 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 42 all . 2023.11.17 06:23:42 - OpenVPN > IPv6 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:23:42 - OpenVPN > Initialization Sequence Completed . 2023.11.17 06:23:43 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.11.17 06:23:43 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.11.17 06:23:43 - DNS leak protection with packet filtering enabled. . 2023.11.17 06:23:43 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.22.230.1) . 2023.11.17 06:23:43 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:12e6::1) . 2023.11.17 06:23:44 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:23:44 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:23:44 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:23:45 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:23:45 - Routes, add 64.42.179.59/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:23:45 - Routes, add 2605:9f80:6000:80:fc8c:43ee:267e:97ab/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:23:45 - Flushing DNS ! 2023.11.17 06:23:45 - Connected. . 2023.11.17 06:23:45 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:23:45 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:23:45 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:23:53 - Above log line repeated 9 times more ! 2023.11.17 06:23:53 - Disconnecting . 2023.11.17 06:23:53 - Sending soft termination signal . 2023.11.17 06:23:56 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.11.17 06:23:58 - OpenVPN > Closing TUN/TAP interface . 2023.11.17 06:23:58 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:12e6::/64) . 2023.11.17 06:23:58 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:12e6::/64 42 fe80::8 store=active . 2023.11.17 06:23:58 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 42 fde6:7a:7d20:12e6::108d store=active . 2023.11.17 06:23:58 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 42 10.22.230.143 store=active . 2023.11.17 06:23:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.11.17 06:23:59 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:23:59 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:24:00 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:24:00 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:24:00 - Routes, delete 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:24:00 - Routes, delete 64.42.179.59/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:24:01 - Routes, delete 2605:9f80:6000:80:fc8c:43ee:267e:97ab/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:24:01 - Routes, delete 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", not exists. . 2023.11.17 06:24:01 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:24:01 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:24:01 - DNS leak protection with packet filtering disabled. . 2023.11.17 06:24:01 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.11.17 06:24:01 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.11.17 06:24:01 - Connection terminated. . 2023.11.17 06:24:01 - Flushing DNS ! 2023.11.17 06:24:02 - Session terminated. I 2023.11.17 06:25:20 - Session starting. I 2023.11.17 06:25:22 - Checking authorization ... . 2023.11.17 06:25:23 - Added new network interface "Eddie", Wintun version 0.12 . 2023.11.17 06:25:23 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.11.17 06:25:23 - Connecting to Hercules (United States of America, Atlanta, Georgia) . 2023.11.17 06:25:24 - Routes, add 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:25:24 - Routes, add 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", already exists. . 2023.11.17 06:25:24 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.17 06:25:24 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.17 06:25:24 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.17 06:25:24 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:25:24 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:25:24 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:25:24 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:25:24 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.61:443 . 2023.11.17 06:25:24 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2023.11.17 06:25:24 - OpenVPN > UDP link local: (not bound) . 2023.11.17 06:25:24 - OpenVPN > UDP link remote: [AF_INET]64.42.179.61:443 . 2023.11.17 06:25:24 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.61:443, sid=4864b23e 69259586 . 2023.11.17 06:25:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 06:25:24 - OpenVPN > VERIFY KU OK . 2023.11.17 06:25:24 - OpenVPN > Validating certificate extended key usage . 2023.11.17 06:25:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 06:25:24 - OpenVPN > VERIFY EKU OK . 2023.11.17 06:25:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hercules, emailAddress=info@airvpn.org . 2023.11.17 06:25:24 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 06:25:24 - OpenVPN > [Hercules] Peer Connection Initiated with [AF_INET]64.42.179.61:443 . 2023.11.17 06:25:25 - OpenVPN > SENT CONTROL [Hercules]: 'PUSH_REQUEST' (status=1) . 2023.11.17 06:25:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.230.1,dhcp-option DNS6 fde6:7a:7d20:12e6::1,tun-ipv6,route-gateway 10.22.230.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:12e6::108d/64 fde6:7a:7d20:12e6::1,ifconfig 10.22.230.143 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.11.17 06:25:25 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.17 06:25:25 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.230.1' . 2023.11.17 06:25:25 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:12e6::1' . 2023.11.17 06:25:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.17 06:25:25 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.17 06:25:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.17 06:25:25 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.17 06:25:25 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.17 06:25:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.17 06:25:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.17 06:25:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.17 06:25:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:25:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:25:25 - OpenVPN > interactive service msg_channel=0 . 2023.11.17 06:25:25 - OpenVPN > open_tun . 2023.11.17 06:25:25 - OpenVPN > wintun device [Eddie] opened . 2023.11.17 06:25:25 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 42 static 10.22.230.143 255.255.255.0 . 2023.11.17 06:25:25 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 42 all . 2023.11.17 06:25:25 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 42 all . 2023.11.17 06:25:25 - OpenVPN > IPv4 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:25:25 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 42 fde6:7a:7d20:12e6::108d/128 store=active . 2023.11.17 06:25:25 - OpenVPN > add_route_ipv6(fde6:7a:7d20:12e6::/64 -> fde6:7a:7d20:12e6::108d metric 0) dev Eddie . 2023.11.17 06:25:26 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:12e6::/64 42 fe80::8 store=active . 2023.11.17 06:25:26 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2023.11.17 06:25:26 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 42 all . 2023.11.17 06:25:26 - OpenVPN > IPv6 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:25:26 - OpenVPN > Initialization Sequence Completed . 2023.11.17 06:25:26 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.11.17 06:25:26 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.11.17 06:25:26 - DNS leak protection with packet filtering enabled. . 2023.11.17 06:25:26 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.22.230.1) . 2023.11.17 06:25:26 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:12e6::1) . 2023.11.17 06:25:27 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:25:27 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:25:27 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:25:28 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:25:28 - Routes, add 64.42.179.59/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:25:28 - Routes, add 2605:9f80:6000:80:fc8c:43ee:267e:97ab/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:25:28 - Flushing DNS ! 2023.11.17 06:25:28 - Connected. . 2023.11.17 06:25:28 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:25:28 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:25:28 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:25:56 - Above log line repeated 13 times more ! 2023.11.17 06:25:56 - Disconnecting . 2023.11.17 06:25:56 - Sending soft termination signal . 2023.11.17 06:25:59 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.11.17 06:26:01 - OpenVPN > Closing TUN/TAP interface . 2023.11.17 06:26:01 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:12e6::/64) . 2023.11.17 06:26:01 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:12e6::/64 42 fe80::8 store=active . 2023.11.17 06:26:01 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 42 fde6:7a:7d20:12e6::108d store=active . 2023.11.17 06:26:01 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 42 10.22.230.143 store=active . 2023.11.17 06:26:01 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.11.17 06:26:01 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:26:02 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:26:02 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:26:03 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:26:03 - Routes, delete 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:26:03 - Routes, delete 64.42.179.59/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:26:04 - Routes, delete 2605:9f80:6000:80:fc8c:43ee:267e:97ab/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:26:04 - Routes, delete 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", not exists. . 2023.11.17 06:26:04 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:26:04 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:26:04 - DNS leak protection with packet filtering disabled. . 2023.11.17 06:26:04 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.11.17 06:26:04 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.11.17 06:26:04 - Connection terminated. . 2023.11.17 06:26:04 - Flushing DNS ! 2023.11.17 06:26:05 - Session terminated. I 2023.11.17 06:26:05 - Session starting. I 2023.11.17 06:26:07 - Checking authorization ... . 2023.11.17 06:26:09 - Added new network interface "Eddie", Wintun version 0.12 . 2023.11.17 06:26:09 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.11.17 06:26:09 - Connecting to Hercules (United States of America, Atlanta, Georgia) . 2023.11.17 06:26:10 - Routes, add 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:26:10 - Routes, add 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", already exists. . 2023.11.17 06:26:10 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.17 06:26:10 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.17 06:26:10 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.17 06:26:10 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:26:10 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:26:10 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:26:10 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:26:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.61:443 . 2023.11.17 06:26:10 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2023.11.17 06:26:10 - OpenVPN > UDP link local: (not bound) . 2023.11.17 06:26:10 - OpenVPN > UDP link remote: [AF_INET]64.42.179.61:443 . 2023.11.17 06:26:10 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.61:443, sid=4de424c3 dbb67ba4 . 2023.11.17 06:26:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 06:26:10 - OpenVPN > VERIFY KU OK . 2023.11.17 06:26:10 - OpenVPN > Validating certificate extended key usage . 2023.11.17 06:26:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 06:26:10 - OpenVPN > VERIFY EKU OK . 2023.11.17 06:26:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hercules, emailAddress=info@airvpn.org . 2023.11.17 06:26:10 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 06:26:10 - OpenVPN > [Hercules] Peer Connection Initiated with [AF_INET]64.42.179.61:443 . 2023.11.17 06:26:11 - OpenVPN > SENT CONTROL [Hercules]: 'PUSH_REQUEST' (status=1) . 2023.11.17 06:26:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.230.1,dhcp-option DNS6 fde6:7a:7d20:12e6::1,tun-ipv6,route-gateway 10.22.230.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:12e6::108d/64 fde6:7a:7d20:12e6::1,ifconfig 10.22.230.143 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.11.17 06:26:11 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.17 06:26:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.230.1' . 2023.11.17 06:26:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:12e6::1' . 2023.11.17 06:26:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.17 06:26:11 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.17 06:26:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.17 06:26:11 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.17 06:26:11 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.17 06:26:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.17 06:26:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.17 06:26:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.17 06:26:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:26:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:26:11 - OpenVPN > interactive service msg_channel=0 . 2023.11.17 06:26:11 - OpenVPN > open_tun . 2023.11.17 06:26:11 - OpenVPN > wintun device [Eddie] opened . 2023.11.17 06:26:11 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 42 static 10.22.230.143 255.255.255.0 . 2023.11.17 06:26:11 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 42 all . 2023.11.17 06:26:11 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 42 all . 2023.11.17 06:26:11 - OpenVPN > IPv4 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:26:11 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 42 fde6:7a:7d20:12e6::108d/128 store=active . 2023.11.17 06:26:12 - OpenVPN > add_route_ipv6(fde6:7a:7d20:12e6::/64 -> fde6:7a:7d20:12e6::108d metric 0) dev Eddie . 2023.11.17 06:26:12 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:12e6::/64 42 fe80::8 store=active . 2023.11.17 06:26:12 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2023.11.17 06:26:12 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 42 all . 2023.11.17 06:26:12 - OpenVPN > IPv6 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:26:12 - OpenVPN > Initialization Sequence Completed . 2023.11.17 06:26:12 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.11.17 06:26:12 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.11.17 06:26:12 - DNS leak protection with packet filtering enabled. . 2023.11.17 06:26:12 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.22.230.1) . 2023.11.17 06:26:12 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:12e6::1) . 2023.11.17 06:26:13 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:26:13 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:26:14 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:26:14 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:26:14 - Routes, add 64.42.179.59/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:26:14 - Routes, add 2605:9f80:6000:80:fc8c:43ee:267e:97ab/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:26:14 - Flushing DNS ! 2023.11.17 06:26:15 - Connected. . 2023.11.17 06:26:15 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:26:15 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:26:15 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:27:04 - Above log line repeated 34 times more ! 2023.11.17 06:27:04 - Disconnecting . 2023.11.17 06:27:04 - Sending soft termination signal . 2023.11.17 06:27:07 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.11.17 06:27:09 - OpenVPN > Closing TUN/TAP interface . 2023.11.17 06:27:09 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:12e6::/64) . 2023.11.17 06:27:09 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:12e6::/64 42 fe80::8 store=active . 2023.11.17 06:27:09 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 42 fde6:7a:7d20:12e6::108d store=active . 2023.11.17 06:27:09 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 42 10.22.230.143 store=active . 2023.11.17 06:27:09 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.11.17 06:27:09 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:27:10 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:27:10 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:27:11 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:27:11 - Routes, delete 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:27:11 - Routes, delete 64.42.179.59/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:27:12 - Routes, delete 2605:9f80:6000:80:fc8c:43ee:267e:97ab/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:27:12 - Routes, delete 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", not exists. . 2023.11.17 06:27:12 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:27:12 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:27:12 - DNS leak protection with packet filtering disabled. . 2023.11.17 06:27:12 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.11.17 06:27:12 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.11.17 06:27:12 - Connection terminated. . 2023.11.17 06:27:12 - Flushing DNS ! 2023.11.17 06:27:13 - Session terminated. I 2023.11.17 06:27:13 - Session starting. I 2023.11.17 06:27:16 - Checking authorization ... . 2023.11.17 06:27:18 - Added new network interface "Eddie", Wintun version 0.12 . 2023.11.17 06:27:18 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.11.17 06:27:18 - Connecting to Hercules (United States of America, Atlanta, Georgia) . 2023.11.17 06:27:18 - Routes, add 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:27:19 - Routes, add 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", already exists. . 2023.11.17 06:27:19 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.17 06:27:19 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.17 06:27:19 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.17 06:27:19 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:27:19 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:27:19 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:27:19 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:27:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.61:443 . 2023.11.17 06:27:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2023.11.17 06:27:19 - OpenVPN > UDP link local: (not bound) . 2023.11.17 06:27:19 - OpenVPN > UDP link remote: [AF_INET]64.42.179.61:443 . 2023.11.17 06:27:19 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.61:443, sid=ad130709 c4637ec7 . 2023.11.17 06:27:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 06:27:19 - OpenVPN > VERIFY KU OK . 2023.11.17 06:27:19 - OpenVPN > Validating certificate extended key usage . 2023.11.17 06:27:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 06:27:19 - OpenVPN > VERIFY EKU OK . 2023.11.17 06:27:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hercules, emailAddress=info@airvpn.org . 2023.11.17 06:27:19 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 06:27:19 - OpenVPN > [Hercules] Peer Connection Initiated with [AF_INET]64.42.179.61:443 . 2023.11.17 06:27:20 - OpenVPN > SENT CONTROL [Hercules]: 'PUSH_REQUEST' (status=1) . 2023.11.17 06:27:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.230.1,dhcp-option DNS6 fde6:7a:7d20:12e6::1,tun-ipv6,route-gateway 10.22.230.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:12e6::108d/64 fde6:7a:7d20:12e6::1,ifconfig 10.22.230.143 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.11.17 06:27:20 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.17 06:27:20 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.230.1' . 2023.11.17 06:27:20 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:12e6::1' . 2023.11.17 06:27:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.17 06:27:20 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.17 06:27:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.17 06:27:20 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.17 06:27:20 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.17 06:27:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.17 06:27:20 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.17 06:27:20 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.17 06:27:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:27:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:27:20 - OpenVPN > interactive service msg_channel=0 . 2023.11.17 06:27:20 - OpenVPN > open_tun . 2023.11.17 06:27:20 - OpenVPN > wintun device [Eddie] opened . 2023.11.17 06:27:20 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 42 static 10.22.230.143 255.255.255.0 . 2023.11.17 06:27:20 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 42 all . 2023.11.17 06:27:20 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 42 all . 2023.11.17 06:27:20 - OpenVPN > IPv4 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:27:20 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 42 fde6:7a:7d20:12e6::108d/128 store=active . 2023.11.17 06:27:20 - OpenVPN > add_route_ipv6(fde6:7a:7d20:12e6::/64 -> fde6:7a:7d20:12e6::108d metric 0) dev Eddie . 2023.11.17 06:27:20 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:12e6::/64 42 fe80::8 store=active . 2023.11.17 06:27:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2023.11.17 06:27:20 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 42 all . 2023.11.17 06:27:20 - OpenVPN > IPv6 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:27:20 - OpenVPN > Initialization Sequence Completed . 2023.11.17 06:27:20 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.11.17 06:27:20 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.11.17 06:27:21 - DNS leak protection with packet filtering enabled. . 2023.11.17 06:27:21 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.22.230.1) . 2023.11.17 06:27:21 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:12e6::1) . 2023.11.17 06:27:21 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:27:22 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:27:22 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:27:22 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:27:22 - Routes, add 64.42.179.59/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:27:23 - Routes, add 2605:9f80:6000:80:fc8c:43ee:267e:97ab/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:27:23 - Flushing DNS ! 2023.11.17 06:27:23 - Connected. . 2023.11.17 06:27:23 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:27:23 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:27:23 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:27:49 - Above log line repeated 18 times more ! 2023.11.17 06:27:49 - Disconnecting . 2023.11.17 06:27:49 - Sending soft termination signal . 2023.11.17 06:27:53 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.11.17 06:27:54 - OpenVPN > Closing TUN/TAP interface . 2023.11.17 06:27:54 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:12e6::/64) . 2023.11.17 06:27:54 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:12e6::/64 42 fe80::8 store=active . 2023.11.17 06:27:55 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 42 fde6:7a:7d20:12e6::108d store=active . 2023.11.17 06:27:55 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 42 10.22.230.143 store=active . 2023.11.17 06:27:55 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.11.17 06:27:56 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:27:56 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:27:56 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:27:57 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:27:57 - Routes, delete 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:27:57 - Routes, delete 64.42.179.59/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:27:58 - Routes, delete 2605:9f80:6000:80:fc8c:43ee:267e:97ab/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:27:58 - Routes, delete 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", not exists. . 2023.11.17 06:27:58 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:27:58 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:27:58 - DNS leak protection with packet filtering disabled. . 2023.11.17 06:27:58 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.11.17 06:27:58 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.11.17 06:27:58 - Connection terminated. . 2023.11.17 06:27:58 - Flushing DNS ! 2023.11.17 06:27:59 - Session terminated. I 2023.11.17 06:30:05 - Session starting. I 2023.11.17 06:30:07 - Checking authorization ... . 2023.11.17 06:30:08 - Added new network interface "Eddie", Wintun version 0.12 . 2023.11.17 06:30:08 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.11.17 06:30:08 - Connecting to Hercules (United States of America, Atlanta, Georgia) . 2023.11.17 06:30:08 - Routes, add 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:30:09 - Routes, add 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", already exists. . 2023.11.17 06:30:09 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.17 06:30:09 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.17 06:30:09 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.17 06:30:09 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:30:09 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:30:09 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:30:09 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:30:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.61:443 . 2023.11.17 06:30:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2023.11.17 06:30:09 - OpenVPN > Attempting to establish TCP connection with [AF_INET]64.42.179.61:443 [nonblock] . 2023.11.17 06:30:09 - OpenVPN > TCP connection established with [AF_INET]64.42.179.61:443 . 2023.11.17 06:30:09 - OpenVPN > TCP_CLIENT link local: (not bound) . 2023.11.17 06:30:09 - OpenVPN > TCP_CLIENT link remote: [AF_INET]64.42.179.61:443 . 2023.11.17 06:30:09 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.61:443, sid=707659d0 94ca8b93 . 2023.11.17 06:30:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 06:30:09 - OpenVPN > VERIFY KU OK . 2023.11.17 06:30:09 - OpenVPN > Validating certificate extended key usage . 2023.11.17 06:30:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 06:30:09 - OpenVPN > VERIFY EKU OK . 2023.11.17 06:30:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hercules, emailAddress=info@airvpn.org . 2023.11.17 06:30:09 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 06:30:09 - OpenVPN > [Hercules] Peer Connection Initiated with [AF_INET]64.42.179.61:443 . 2023.11.17 06:30:10 - OpenVPN > SENT CONTROL [Hercules]: 'PUSH_REQUEST' (status=1) . 2023.11.17 06:30:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.231.1,dhcp-option DNS6 fde6:7a:7d20:12e7::1,tun-ipv6,route-gateway 10.22.231.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:12e7::102e/64 fde6:7a:7d20:12e7::1,ifconfig 10.22.231.48 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.11.17 06:30:10 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.17 06:30:10 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.231.1' . 2023.11.17 06:30:10 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:12e7::1' . 2023.11.17 06:30:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.17 06:30:10 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.17 06:30:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.17 06:30:10 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.17 06:30:10 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.17 06:30:10 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2023.11.17 06:30:10 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.17 06:30:10 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.17 06:30:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:30:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:30:10 - OpenVPN > interactive service msg_channel=0 . 2023.11.17 06:30:10 - OpenVPN > open_tun . 2023.11.17 06:30:10 - OpenVPN > wintun device [Eddie] opened . 2023.11.17 06:30:10 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 42 static 10.22.231.48 255.255.255.0 . 2023.11.17 06:30:10 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 42 all . 2023.11.17 06:30:10 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 42 all . 2023.11.17 06:30:10 - OpenVPN > IPv4 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:30:10 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 42 fde6:7a:7d20:12e7::102e/128 store=active . 2023.11.17 06:30:10 - OpenVPN > add_route_ipv6(fde6:7a:7d20:12e7::/64 -> fde6:7a:7d20:12e7::102e metric 0) dev Eddie . 2023.11.17 06:30:10 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:12e7::/64 42 fe80::8 store=active . 2023.11.17 06:30:10 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2023.11.17 06:30:10 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 42 all . 2023.11.17 06:30:10 - OpenVPN > IPv6 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:30:10 - OpenVPN > Initialization Sequence Completed . 2023.11.17 06:30:11 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.11.17 06:30:11 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.11.17 06:30:11 - DNS leak protection with packet filtering enabled. . 2023.11.17 06:30:11 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.22.231.1) . 2023.11.17 06:30:11 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:12e7::1) . 2023.11.17 06:30:12 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:30:12 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:30:12 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:30:13 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:30:13 - Routes, add 64.42.179.59/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:30:13 - Routes, add 2605:9f80:6000:80:fc8c:43ee:267e:97ab/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:30:13 - Flushing DNS ! 2023.11.17 06:30:13 - Connected. ! 2023.11.17 06:30:23 - Disconnecting . 2023.11.17 06:30:23 - Sending soft termination signal . 2023.11.17 06:30:26 - OpenVPN > Closing TUN/TAP interface . 2023.11.17 06:30:26 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:12e7::/64) . 2023.11.17 06:30:26 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:12e7::/64 42 fe80::8 store=active . 2023.11.17 06:30:26 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 42 fde6:7a:7d20:12e7::102e store=active . 2023.11.17 06:30:26 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 42 10.22.231.48 store=active . 2023.11.17 06:30:26 - OpenVPN > SIGTERM[hard,] received, process exiting . 2023.11.17 06:30:26 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:30:26 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:30:27 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:30:27 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:30:27 - Routes, delete 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:30:28 - Routes, delete 64.42.179.59/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:30:28 - Routes, delete 2605:9f80:6000:80:fc8c:43ee:267e:97ab/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:30:28 - Routes, delete 64.42.179.61/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", not exists. . 2023.11.17 06:30:28 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:30:28 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:30:28 - DNS leak protection with packet filtering disabled. . 2023.11.17 06:30:28 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.11.17 06:30:28 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.11.17 06:30:28 - Connection terminated. . 2023.11.17 06:30:28 - Flushing DNS ! 2023.11.17 06:30:29 - Session terminated. I 2023.11.17 06:30:53 - Session starting. I 2023.11.17 06:30:55 - Checking authorization ... . 2023.11.17 06:30:57 - Added new network interface "Eddie", Wintun version 0.12 . 2023.11.17 06:30:57 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.11.17 06:30:57 - Connecting to Ross (Canada, Montreal) . 2023.11.17 06:30:57 - Routes, add 139.28.218.237/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:30:58 - Routes, add 139.28.218.237/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", already exists. . 2023.11.17 06:30:58 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.17 06:30:58 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.17 06:30:58 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.17 06:30:58 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:30:58 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:30:58 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:30:58 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:30:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]139.28.218.237:443 . 2023.11.17 06:30:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2023.11.17 06:30:58 - OpenVPN > UDP link local: (not bound) . 2023.11.17 06:30:58 - OpenVPN > UDP link remote: [AF_INET]139.28.218.237:443 . 2023.11.17 06:30:58 - OpenVPN > TLS: Initial packet from [AF_INET]139.28.218.237:443, sid=77199f20 e43975c0 . 2023.11.17 06:30:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 06:30:58 - OpenVPN > VERIFY KU OK . 2023.11.17 06:30:58 - OpenVPN > Validating certificate extended key usage . 2023.11.17 06:30:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 06:30:58 - OpenVPN > VERIFY EKU OK . 2023.11.17 06:30:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ross, emailAddress=info@airvpn.org . 2023.11.17 06:30:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 06:30:58 - OpenVPN > [Ross] Peer Connection Initiated with [AF_INET]139.28.218.237:443 . 2023.11.17 06:30:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.35.38.1,dhcp-option DNS6 fde6:7a:7d20:1f26::1,tun-ipv6,route-gateway 10.35.38.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1f26::108d/64 fde6:7a:7d20:1f26::1,ifconfig 10.35.38.143 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.11.17 06:30:58 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.17 06:30:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.35.38.1' . 2023.11.17 06:30:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1f26::1' . 2023.11.17 06:30:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.17 06:30:58 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.17 06:30:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.17 06:30:58 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.17 06:30:58 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.17 06:30:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.17 06:30:58 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.17 06:30:58 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.17 06:30:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:30:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:30:58 - OpenVPN > interactive service msg_channel=0 . 2023.11.17 06:30:58 - OpenVPN > open_tun . 2023.11.17 06:30:58 - OpenVPN > wintun device [Eddie] opened . 2023.11.17 06:30:59 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 42 static 10.35.38.143 255.255.255.0 . 2023.11.17 06:30:59 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 42 all . 2023.11.17 06:30:59 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 42 all . 2023.11.17 06:30:59 - OpenVPN > IPv4 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:30:59 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 42 fde6:7a:7d20:1f26::108d/128 store=active . 2023.11.17 06:30:59 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1f26::/64 -> fde6:7a:7d20:1f26::108d metric 0) dev Eddie . 2023.11.17 06:30:59 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1f26::/64 42 fe80::8 store=active . 2023.11.17 06:30:59 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2023.11.17 06:30:59 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 42 all . 2023.11.17 06:30:59 - OpenVPN > IPv6 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:30:59 - OpenVPN > Initialization Sequence Completed . 2023.11.17 06:30:59 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.11.17 06:30:59 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.11.17 06:30:59 - DNS leak protection with packet filtering enabled. . 2023.11.17 06:31:00 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.35.38.1) . 2023.11.17 06:31:00 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1f26::1) . 2023.11.17 06:31:00 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:31:01 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:31:01 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:31:01 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:31:01 - Routes, add 139.28.218.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:31:02 - Routes, add 2a0d:5600:9:3f:3a9b:a7b9:b7c1:498/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:31:02 - Flushing DNS I 2023.11.17 06:31:02 - Checking route IPv4 . 2023.11.17 06:31:24 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:31:24 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:31:24 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:31:24 - Above log line repeated 5 times more ! 2023.11.17 06:31:24 - Disconnecting . 2023.11.17 06:31:24 - Sending soft termination signal . 2023.11.17 06:31:27 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.11.17 06:31:29 - OpenVPN > Closing TUN/TAP interface . 2023.11.17 06:31:29 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1f26::/64) . 2023.11.17 06:31:29 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1f26::/64 42 fe80::8 store=active . 2023.11.17 06:31:29 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 42 fde6:7a:7d20:1f26::108d store=active . 2023.11.17 06:31:29 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 42 10.35.38.143 store=active . 2023.11.17 06:31:29 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.11.17 06:31:30 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:31:30 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:31:30 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:31:31 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:31:31 - Routes, delete 139.28.218.237/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:31:31 - Routes, delete 139.28.218.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:31:31 - Routes, delete 2a0d:5600:9:3f:3a9b:a7b9:b7c1:498/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:31:31 - Routes, delete 139.28.218.237/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", not exists. . 2023.11.17 06:31:32 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:31:32 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 06:31:32 - DNS leak protection with packet filtering disabled. . 2023.11.17 06:31:32 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.11.17 06:31:32 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.11.17 06:31:32 - Connection terminated. I 2023.11.17 06:31:32 - Cancel requested. ! 2023.11.17 06:31:32 - Session terminated. I 2023.11.17 06:32:08 - Session starting. I 2023.11.17 06:32:10 - Checking authorization ... . 2023.11.17 06:32:12 - Added new network interface "Eddie", Wintun version 0.12 . 2023.11.17 06:32:12 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.11.17 06:32:12 - Connecting to Ross (Canada, Montreal) . 2023.11.17 06:32:12 - Routes, add 139.28.218.237/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)". . 2023.11.17 06:32:12 - Routes, add 139.28.218.237/32 for interface "Ethernet (Intel(R) Ethernet Connection (13) I219-LM)", already exists. . 2023.11.17 06:32:12 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.17 06:32:12 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.17 06:32:12 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.17 06:32:12 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:32:12 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:32:12 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 06:32:12 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 06:32:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]139.28.218.237:443 . 2023.11.17 06:32:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2023.11.17 06:32:12 - OpenVPN > UDP link local: (not bound) . 2023.11.17 06:32:12 - OpenVPN > UDP link remote: [AF_INET]139.28.218.237:443 . 2023.11.17 06:32:13 - OpenVPN > TLS: Initial packet from [AF_INET]139.28.218.237:443, sid=6ce0bfa2 d229cd2e . 2023.11.17 06:32:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 06:32:13 - OpenVPN > VERIFY KU OK . 2023.11.17 06:32:13 - OpenVPN > Validating certificate extended key usage . 2023.11.17 06:32:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 06:32:13 - OpenVPN > VERIFY EKU OK . 2023.11.17 06:32:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ross, emailAddress=info@airvpn.org . 2023.11.17 06:32:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 06:32:13 - OpenVPN > [Ross] Peer Connection Initiated with [AF_INET]139.28.218.237:443 . 2023.11.17 06:32:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.35.38.1,dhcp-option DNS6 fde6:7a:7d20:1f26::1,tun-ipv6,route-gateway 10.35.38.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1f26::108d/64 fde6:7a:7d20:1f26::1,ifconfig 10.35.38.143 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2023.11.17 06:32:13 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.17 06:32:13 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.35.38.1' . 2023.11.17 06:32:13 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1f26::1' . 2023.11.17 06:32:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.17 06:32:13 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.17 06:32:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.17 06:32:13 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.17 06:32:13 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.17 06:32:13 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.17 06:32:13 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.17 06:32:13 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.17 06:32:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:32:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:32:13 - OpenVPN > interactive service msg_channel=0 . 2023.11.17 06:32:13 - OpenVPN > open_tun . 2023.11.17 06:32:13 - OpenVPN > wintun device [Eddie] opened . 2023.11.17 06:32:14 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 42 static 10.35.38.143 255.255.255.0 . 2023.11.17 06:32:14 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 42 all . 2023.11.17 06:32:14 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 42 all . 2023.11.17 06:32:14 - OpenVPN > IPv4 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:32:14 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 42 fde6:7a:7d20:1f26::108d/128 store=active . 2023.11.17 06:32:14 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1f26::/64 -> fde6:7a:7d20:1f26::108d metric 0) dev Eddie . 2023.11.17 06:32:14 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1f26::/64 42 fe80::8 store=active . 2023.11.17 06:32:14 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2023.11.17 06:32:14 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 42 all . 2023.11.17 06:32:14 - OpenVPN > IPv6 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.11.17 06:32:14 - OpenVPN > Initialization Sequence Completed . 2023.11.17 06:32:14 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.11.17 06:32:14 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.11.17 06:32:14 - DNS leak protection with packet filtering enabled. . 2023.11.17 06:32:15 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.35.38.1) . 2023.11.17 06:32:15 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1f26::1) . 2023.11.17 06:32:15 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:32:16 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:32:16 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:32:16 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:32:16 - Routes, add 139.28.218.235/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:32:17 - Routes, add 2a0d:5600:9:3f:3a9b:a7b9:b7c1:498/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 06:32:17 - Flushing DNS ! 2023.11.17 06:32:17 - Connected. . 2023.11.17 06:32:17 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:32:17 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.11.17 06:32:17 - OpenVPN > write UDP: Unknown error (code=10065)
  4. The 3 servers for Chicago, Illinois (US) seem to be pretty congested during peak times (Fang, Kruger & Sneden). There seems to be somewhere around 80-100 sessions on each of these servers most of the time, double that of almost every other 1gbit server according to the server status page https://airvpn.org/status/. During peak times these Chicago servers experience some heavy throttling. Right now (7/24/23 5:00PM) Sneden Chicago server is showing 1836 / 2000 Mbit/s and 83 sessions. Fang is showing 1810 / 2000 Mbit/s and 83 sessions, and Kruger is showing 1124 / 2000 Mbit/s with 85 sessions. In my test on a 500/500 connection I was only able to get 160 down/20 up during this period which is pretty abysmal. During non peak times I can usually get around 400-500 mbps up and down on these servers. I think these Chicago servers need atleast 1 or 2 more servers to help handle the load, or better yet an additional 10gbit server at this location would be ideal. Chicago is a vital server location in the US and an ideal location for people in the Midwest. Per City load balancing would be very beneficial here which AirVPN currently does not support. I made a separate post requesting that feature here: . Appreciate any feedback on this. Thanks!
  5. Hi, long time AirVPN user/supporter here. Lately, I've noticed that at times, nearly all Canadian servers are loaded to near capacity. I mean Canadian servers have always been some of the most loaded servers, often requiring me to surf around between servers to find one with good bandwidth, but as of late, it seems like most, if not all, of the Canadian servers are loaded to near max capacity. It is really frustrating not being able to find a single server (after trying 10-15 different servers) that I can achieve even 100Mbps downloads from. I guess my question is if y'all have any plans to add more Canadian servers (or add more bandwidth to the existing Canadian servers) at any point in the near future? Overall, I really like AirVPN and I think it is a great match for my needs but the bandwidth issues are really starting to become a thorn in my side. Hopefully there is some plan to overcome these issues as I really deplore the idea of having to switch to another provider. Thanks! I've included a screenshot of the entire list of Canadian servers as it appeared in the client app tonight (right before posting this msg). Definitely pretty overloaded...
  6. New user here, having some issues with the speeds. My internet IS always pretty slow (16MB DL/less than 1MG upload per speedtest, ISP is AT&T) but with AirVPN on it seems to spend its time at dial-up levels, like 40kpbs on download speed. I'm sure some setting or other just needs changed but I couldn't find the speed optimization guide that was mentioned a few times on the forums. (If anyone knows where that is, plz link!) I've tried switching the protocols from Automatic to UDP, TCP, and SSL to see if that helps, since I saw that recommended. But it didn't make any noticeable difference for me. I've included a screencap from the speed page, and will try to include the logs. . 2022.02.02 17:41:36 - Eddie version: 2.20.0 / windows_x64, System: Windows, Name: Windows 8, Version: Microsoft Windows NT 6.2.9200.0, Mono/.Net: v4.0.30319 . 2022.02.02 17:41:36 - Command line arguments (1): path="home" . 2022.02.02 17:41:36 - Raise system privileges . 2022.02.02 17:41:38 - Profile path: C:\Users\fluff\AppData\Local\Eddie\default.profile . 2022.02.02 17:41:39 - Reading options from C:\Users\fluff\AppData\Local\Eddie\default.profile . 2022.02.02 17:41:41 - Tun Driver - 0901: 9.24.2; wintun: Not found . 2022.02.02 17:41:41 - OpenVPN - Version: 2.5.1 - OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2022.02.02 17:41:41 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe) . 2022.02.02 17:41:41 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) I 2022.02.02 17:41:42 - Ready . 2022.02.02 17:41:43 - Collect information about AirVPN completed I 2022.02.02 17:41:48 - Session starting. . 2022.02.02 17:41:48 - Waiting for latency tests (146 to go) . 2022.02.02 17:41:49 - Waiting for latency tests (124 to go) . 2022.02.02 17:41:50 - Waiting for latency tests (110 to go) . 2022.02.02 17:41:51 - Waiting for latency tests (96 to go) . 2022.02.02 17:41:52 - Waiting for latency tests (74 to go) . 2022.02.02 17:41:53 - Waiting for latency tests (63 to go) . 2022.02.02 17:41:54 - Waiting for latency tests (46 to go) . 2022.02.02 17:41:55 - Waiting for latency tests (26 to go) . 2022.02.02 17:41:56 - Waiting for latency tests (15 to go) I 2022.02.02 17:41:57 - Checking authorization ... ! 2022.02.02 17:41:58 - Connecting to Angetenar (Canada, Toronto, Ontario) . 2022.02.02 17:41:58 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.02.02 17:41:58 - OpenVPN > Windows version 6.2 (Windows 8) 64bit . 2022.02.02 17:41:58 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.02.02 17:41:58 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.02 17:41:58 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.02 17:41:58 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.02 17:41:58 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.02 17:41:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.165:443 . 2022.02.02 17:41:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.02.02 17:41:58 - OpenVPN > UDP link local: (not bound) . 2022.02.02 17:41:58 - OpenVPN > UDP link remote: [AF_INET]184.75.221.165:443 . 2022.02.02 17:41:58 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.165:443, sid=524d3fa6 eda78764 . 2022.02.02 17:41:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.02 17:41:58 - OpenVPN > VERIFY KU OK . 2022.02.02 17:41:58 - OpenVPN > Validating certificate extended key usage . 2022.02.02 17:41:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.02 17:41:58 - OpenVPN > VERIFY EKU OK . 2022.02.02 17:41:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Angetenar, emailAddress=info@airvpn.org . 2022.02.02 17:41:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.02 17:41:59 - OpenVPN > [Angetenar] Peer Connection Initiated with [AF_INET]184.75.221.165:443 . 2022.02.02 17:41:59 - OpenVPN > SENT CONTROL [Angetenar]: 'PUSH_REQUEST' (status=1) . 2022.02.02 17:41:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.9.38.1,dhcp-option DNS6 fde6:7a:7d20:526::1,tun-ipv6,route-gateway 10.9.38.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:526::1059/64 fde6:7a:7d20:526::1,ifconfig 10.9.38.91 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2022.02.02 17:41:59 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.02.02 17:41:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.02.02 17:41:59 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.02.02 17:41:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.02.02 17:41:59 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.02.02 17:41:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.02.02 17:41:59 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.02.02 17:41:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.02.02 17:41:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.02.02 17:41:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.02.02 17:41:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.02 17:41:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.02 17:41:59 - OpenVPN > interactive service msg_channel=0 . 2022.02.02 17:41:59 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=12 HWADDR=74:e5:43:fd:72:e0 . 2022.02.02 17:41:59 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2022.02.02 17:41:59 - OpenVPN > GetBestInterfaceEx() returned if=12 . 2022.02.02 17:41:59 - OpenVPN > GDG6: II=12 DP=::/0 NH=fe80::a268:7eff:fe8b:7270 . 2022.02.02 17:41:59 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2022.02.02 17:41:59 - OpenVPN > ROUTE6_GATEWAY fe80::a268:7eff:fe8b:7270 I=12 . 2022.02.02 17:41:59 - OpenVPN > open_tun . 2022.02.02 17:42:00 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2022.02.02 17:42:00 - OpenVPN > TAP-Windows Driver Version 9.24 . 2022.02.02 17:42:00 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.9.38.0/10.9.38.91/255.255.255.0 [SUCCEEDED] . 2022.02.02 17:42:00 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.9.38.91/255.255.255.0 on interface {4FEC4B0D-994F-46C8-BF36-6E9BF01D4596} [DHCP-serv: 10.9.38.254, lease-time: 31536000] . 2022.02.02 17:42:00 - OpenVPN > Successful ARP Flush on interface [25] {4FEC4B0D-994F-46C8-BF36-6E9BF01D4596} . 2022.02.02 17:42:00 - OpenVPN > IPv4 MTU set to 1500 on interface 25 using SetIpInterfaceEntry() . 2022.02.02 17:42:00 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 25 fde6:7a:7d20:526::1059/128 store=active . 2022.02.02 17:42:00 - OpenVPN > add_route_ipv6(fde6:7a:7d20:526::/64 -> fde6:7a:7d20:526::1059 metric 0) dev Local Area Connection . 2022.02.02 17:42:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:526::/64 25 fe80::8 store=active . 2022.02.02 17:42:00 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 17:42:00 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 25 all . 2022.02.02 17:42:05 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns 25 static fde6:7a:7d20:526::1 validate=no . 2022.02.02 17:42:06 - OpenVPN > IPv6 MTU set to 1500 on interface 25 using SetIpInterfaceEntry() . 2022.02.02 17:42:11 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2022.02.02 17:42:11 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.165 MASK 255.255.255.255 192.168.1.254 . 2022.02.02 17:42:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.02.02 17:42:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.02 17:42:11 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.9.38.1 . 2022.02.02 17:42:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2022.02.02 17:42:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.02 17:42:11 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.9.38.1 . 2022.02.02 17:42:11 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2022.02.02 17:42:11 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.02 17:42:11 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:526::1 metric -1) dev Local Area Connection . 2022.02.02 17:42:11 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 25 fe80::8 store=active . 2022.02.02 17:42:11 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 17:42:11 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:526::1 metric -1) dev Local Area Connection . 2022.02.02 17:42:11 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 25 fe80::8 store=active . 2022.02.02 17:42:11 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 17:42:12 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:526::1 metric -1) dev Local Area Connection . 2022.02.02 17:42:12 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 25 fe80::8 store=active . 2022.02.02 17:42:12 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 17:42:12 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:526::1 metric -1) dev Local Area Connection . 2022.02.02 17:42:12 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 25 fe80::8 store=active . 2022.02.02 17:42:12 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 17:42:12 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2022.02.02 17:42:12 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2022.02.02 17:42:13 - DNS leak protection with packet filtering enabled. . 2022.02.02 17:42:13 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.9.38.1) . 2022.02.02 17:42:14 - DNS IPv6 of a network adapter forced (Local Area Connection, from automatic to fde6:7a:7d20:526::1) . 2022.02.02 17:42:14 - Routes, added a new route, 184.75.221.163 for gateway 10.9.38.1 . 2022.02.02 17:42:14 - Routes, added a new route, 2606:6080:1001:12:257a:8b87:f80d:7579 for gateway fde6:7a:7d20:526::1 . 2022.02.02 17:42:14 - Flushing DNS I 2022.02.02 17:42:17 - Checking route IPv4 I 2022.02.02 17:42:20 - Checking route IPv6 I 2022.02.02 17:42:24 - Checking DNS ! 2022.02.02 17:42:24 - Connected. . 2022.02.02 17:42:25 - OpenVPN > Initialization Sequence Completed ! 2022.02.02 17:42:52 - Disconnecting . 2022.02.02 17:42:52 - Routes, removed a route previously added, 184.75.221.163 for gateway 10.9.38.1 . 2022.02.02 17:42:52 - Routes, removed a route previously added, 2606:6080:1001:12:257a:8b87:f80d:7579 for gateway fde6:7a:7d20:526::1 . 2022.02.02 17:42:52 - Sending soft termination signal . 2022.02.02 17:42:55 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.02.02 17:42:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.221.165 MASK 255.255.255.255 192.168.1.254 . 2022.02.02 17:42:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.02 17:42:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.9.38.1 . 2022.02.02 17:42:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.02 17:42:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.9.38.1 . 2022.02.02 17:42:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.02 17:42:57 - OpenVPN > delete_route_ipv6(::/3) . 2022.02.02 17:42:57 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 25 fe80::8 store=active . 2022.02.02 17:42:57 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 17:42:57 - OpenVPN > delete_route_ipv6(2000::/4) . 2022.02.02 17:42:57 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 25 fe80::8 store=active . 2022.02.02 17:42:57 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 17:42:57 - OpenVPN > delete_route_ipv6(3000::/4) . 2022.02.02 17:42:57 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 25 fe80::8 store=active . 2022.02.02 17:42:57 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 17:42:57 - OpenVPN > delete_route_ipv6(fc00::/7) . 2022.02.02 17:42:57 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 25 fe80::8 store=active . 2022.02.02 17:42:57 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 17:42:57 - OpenVPN > Closing TUN/TAP interface . 2022.02.02 17:42:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 25 all . 2022.02.02 17:42:57 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:526::/64) . 2022.02.02 17:42:57 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:526::/64 25 fe80::8 store=active . 2022.02.02 17:42:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 25 fde6:7a:7d20:526::1059 store=active . 2022.02.02 17:42:59 - OpenVPN > TAP: DHCP address released . 2022.02.02 17:42:59 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.02.02 17:42:59 - Connection terminated. . 2022.02.02 17:43:01 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.02.02 17:43:03 - DNS IPv6 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.02.02 17:43:03 - DNS leak protection with packet filtering disabled. . 2022.02.02 17:43:03 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2022.02.02 17:43:03 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2022.02.02 17:43:03 - Flushing DNS ! 2022.02.02 17:43:07 - Session terminated. ! 2022.02.02 17:43:40 - Activation of Network Lock - Windows Filtering Platform I 2022.02.02 17:43:48 - Session starting. I 2022.02.02 17:43:48 - Checking authorization ... ! 2022.02.02 17:43:49 - Connecting to Angetenar (Canada, Toronto, Ontario) . 2022.02.02 17:43:49 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.02.02 17:43:49 - OpenVPN > Windows version 6.2 (Windows 8) 64bit . 2022.02.02 17:43:49 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.02.02 17:43:49 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.02 17:43:49 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.02 17:43:49 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.02 17:43:49 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.02 17:43:49 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.165:443 . 2022.02.02 17:43:49 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.02.02 17:43:49 - OpenVPN > UDP link local: (not bound) . 2022.02.02 17:43:49 - OpenVPN > UDP link remote: [AF_INET]184.75.221.165:443 . 2022.02.02 17:43:49 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.165:443, sid=3e14d9e7 989c82b9 . 2022.02.02 17:43:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.02 17:43:49 - OpenVPN > VERIFY KU OK . 2022.02.02 17:43:49 - OpenVPN > Validating certificate extended key usage . 2022.02.02 17:43:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.02 17:43:49 - OpenVPN > VERIFY EKU OK . 2022.02.02 17:43:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Angetenar, emailAddress=info@airvpn.org . 2022.02.02 17:43:49 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.02 17:43:49 - OpenVPN > [Angetenar] Peer Connection Initiated with [AF_INET]184.75.221.165:443 . 2022.02.02 17:43:50 - OpenVPN > SENT CONTROL [Angetenar]: 'PUSH_REQUEST' (status=1) . 2022.02.02 17:43:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.9.38.1,dhcp-option DNS6 fde6:7a:7d20:526::1,tun-ipv6,route-gateway 10.9.38.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:526::1059/64 fde6:7a:7d20:526::1,ifconfig 10.9.38.91 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2022.02.02 17:43:50 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.02.02 17:43:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.02.02 17:43:50 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.02.02 17:43:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.02.02 17:43:50 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.02.02 17:43:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.02.02 17:43:50 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.02.02 17:43:50 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.02.02 17:43:50 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.02.02 17:43:50 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.02.02 17:43:50 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.02 17:43:50 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.02 17:43:50 - OpenVPN > interactive service msg_channel=0 . 2022.02.02 17:43:50 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=12 HWADDR=74:e5:43:fd:72:e0 . 2022.02.02 17:43:50 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2022.02.02 17:43:50 - OpenVPN > GetBestInterfaceEx() returned if=12 . 2022.02.02 17:43:50 - OpenVPN > GDG6: II=12 DP=::/0 NH=fe80::a268:7eff:fe8b:7270 . 2022.02.02 17:43:50 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2022.02.02 17:43:50 - OpenVPN > ROUTE6_GATEWAY fe80::a268:7eff:fe8b:7270 I=12 . 2022.02.02 17:43:50 - OpenVPN > open_tun . 2022.02.02 17:43:50 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2022.02.02 17:43:50 - OpenVPN > TAP-Windows Driver Version 9.24 . 2022.02.02 17:43:50 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.9.38.0/10.9.38.91/255.255.255.0 [SUCCEEDED] . 2022.02.02 17:43:50 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.9.38.91/255.255.255.0 on interface {4FEC4B0D-994F-46C8-BF36-6E9BF01D4596} [DHCP-serv: 10.9.38.254, lease-time: 31536000] . 2022.02.02 17:43:50 - OpenVPN > Successful ARP Flush on interface [25] {4FEC4B0D-994F-46C8-BF36-6E9BF01D4596} . 2022.02.02 17:43:50 - OpenVPN > IPv4 MTU set to 1500 on interface 25 using SetIpInterfaceEntry() . 2022.02.02 17:43:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 25 fde6:7a:7d20:526::1059/128 store=active . 2022.02.02 17:43:50 - OpenVPN > add_route_ipv6(fde6:7a:7d20:526::/64 -> fde6:7a:7d20:526::1059 metric 0) dev Local Area Connection . 2022.02.02 17:43:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:526::/64 25 fe80::8 store=active . 2022.02.02 17:43:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 17:43:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 25 all . 2022.02.02 17:43:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns 25 static fde6:7a:7d20:526::1 validate=no . 2022.02.02 17:43:56 - OpenVPN > IPv6 MTU set to 1500 on interface 25 using SetIpInterfaceEntry() . 2022.02.02 17:43:59 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2022.02.02 17:43:59 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.165 MASK 255.255.255.255 192.168.1.254 . 2022.02.02 17:43:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.02.02 17:43:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.02 17:43:59 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.9.38.1 . 2022.02.02 17:43:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2022.02.02 17:43:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.02 17:43:59 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.9.38.1 . 2022.02.02 17:43:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2022.02.02 17:43:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.02 17:43:59 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:526::1 metric -1) dev Local Area Connection . 2022.02.02 17:43:59 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 25 fe80::8 store=active . 2022.02.02 17:43:59 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 17:43:59 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:526::1 metric -1) dev Local Area Connection . 2022.02.02 17:43:59 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 25 fe80::8 store=active . 2022.02.02 17:43:59 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 17:43:59 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:526::1 metric -1) dev Local Area Connection . 2022.02.02 17:43:59 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 25 fe80::8 store=active . 2022.02.02 17:43:59 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 17:43:59 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:526::1 metric -1) dev Local Area Connection . 2022.02.02 17:43:59 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 25 fe80::8 store=active . 2022.02.02 17:43:59 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 17:44:00 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2022.02.02 17:44:00 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2022.02.02 17:44:00 - DNS leak protection with packet filtering enabled. . 2022.02.02 17:44:00 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.9.38.1) . 2022.02.02 17:44:00 - DNS IPv6 of a network adapter forced (Local Area Connection, from automatic to fde6:7a:7d20:526::1) . 2022.02.02 17:44:00 - Routes, added a new route, 184.75.221.163 for gateway 10.9.38.1 . 2022.02.02 17:44:03 - Routes, added a new route, 2606:6080:1001:12:257a:8b87:f80d:7579 for gateway fde6:7a:7d20:526::1 . 2022.02.02 17:44:03 - Flushing DNS I 2022.02.02 17:44:03 - Checking route IPv4 I 2022.02.02 17:44:03 - Checking route IPv6 I 2022.02.02 17:44:07 - Checking DNS ! 2022.02.02 17:44:08 - Connected. . 2022.02.02 17:44:08 - OpenVPN > Initialization Sequence Completed . 2022.02.02 18:11:47 - Collect information about AirVPN completed . 2022.02.02 18:38:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.02 18:38:15 - OpenVPN > VERIFY KU OK . 2022.02.02 18:38:15 - OpenVPN > Validating certificate extended key usage . 2022.02.02 18:38:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.02 18:38:15 - OpenVPN > VERIFY EKU OK . 2022.02.02 18:38:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Angetenar, emailAddress=info@airvpn.org . 2022.02.02 18:38:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.02 18:38:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.02 18:38:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.02 18:41:54 - Collect information about AirVPN completed . 2022.02.02 19:21:01 - Above log line repeated 1 times more ! 2022.02.02 19:21:01 - Disconnecting . 2022.02.02 19:21:01 - Routes, removed a route previously added, 184.75.221.163 for gateway 10.9.38.1 . 2022.02.02 19:21:02 - Routes, removed a route previously added, 2606:6080:1001:12:257a:8b87:f80d:7579 for gateway fde6:7a:7d20:526::1 . 2022.02.02 19:21:02 - Sending soft termination signal . 2022.02.02 19:21:06 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.02.02 19:21:09 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.221.165 MASK 255.255.255.255 192.168.1.254 . 2022.02.02 19:21:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.02 19:21:09 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.9.38.1 . 2022.02.02 19:21:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.02 19:21:09 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.9.38.1 . 2022.02.02 19:21:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.02.02 19:21:09 - OpenVPN > delete_route_ipv6(::/3) . 2022.02.02 19:21:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 25 fe80::8 store=active . 2022.02.02 19:21:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 19:21:09 - OpenVPN > delete_route_ipv6(2000::/4) . 2022.02.02 19:21:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 25 fe80::8 store=active . 2022.02.02 19:21:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 19:21:09 - OpenVPN > delete_route_ipv6(3000::/4) . 2022.02.02 19:21:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 25 fe80::8 store=active . 2022.02.02 19:21:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 19:21:09 - OpenVPN > delete_route_ipv6(fc00::/7) . 2022.02.02 19:21:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 25 fe80::8 store=active . 2022.02.02 19:21:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 19:21:09 - OpenVPN > Closing TUN/TAP interface . 2022.02.02 19:21:09 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 25 all . 2022.02.02 19:21:09 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:526::/64) . 2022.02.02 19:21:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:526::/64 25 fe80::8 store=active . 2022.02.02 19:21:09 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 25 fde6:7a:7d20:526::1059 store=active . 2022.02.02 19:21:12 - Sending hard termination signal . 2022.02.02 19:21:12 - Connection terminated. . 2022.02.02 19:21:15 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.02.02 19:21:17 - DNS IPv6 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.02.02 19:21:17 - DNS leak protection with packet filtering disabled. . 2022.02.02 19:21:17 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2022.02.02 19:21:17 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2022.02.02 19:21:17 - Flushing DNS ! 2022.02.02 19:21:21 - Session terminated. I 2022.02.02 19:26:52 - Session starting. I 2022.02.02 19:26:52 - Checking authorization ... ! 2022.02.02 19:26:53 - Connecting to Enif (Canada, Toronto, Ontario) . 2022.02.02 19:26:53 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.02.02 19:26:53 - OpenVPN > Windows version 6.2 (Windows 8) 64bit . 2022.02.02 19:26:53 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.02.02 19:26:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.02 19:26:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.02 19:26:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.02 19:26:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.02 19:26:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.245:443 . 2022.02.02 19:26:53 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.02.02 19:26:53 - OpenVPN > UDP link local: (not bound) . 2022.02.02 19:26:53 - OpenVPN > UDP link remote: [AF_INET]104.254.90.245:443 . 2022.02.02 19:26:56 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.245:443, sid=c6781997 b597bca6 . 2022.02.02 19:27:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.02 19:27:03 - OpenVPN > VERIFY KU OK . 2022.02.02 19:27:03 - OpenVPN > Validating certificate extended key usage . 2022.02.02 19:27:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.02 19:27:03 - OpenVPN > VERIFY EKU OK . 2022.02.02 19:27:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2022.02.02 19:27:38 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.02 19:27:38 - OpenVPN > [Enif] Peer Connection Initiated with [AF_INET]104.254.90.245:443 . 2022.02.02 19:27:38 - OpenVPN > SENT CONTROL [Enif]: 'PUSH_REQUEST' (status=1) . 2022.02.02 19:27:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.70.1,dhcp-option DNS6 fde6:7a:7d20:c46::1,tun-ipv6,route-gateway 10.16.70.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:c46::10a6/64 fde6:7a:7d20:c46::1,ifconfig 10.16.70.168 255.255.255.0,peer-id 11,cipher AES-256-GCM' . 2022.02.02 19:27:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.02.02 19:27:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.02.02 19:27:38 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.02.02 19:27:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.02.02 19:27:38 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.02.02 19:27:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.02.02 19:27:38 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.02.02 19:27:38 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.02.02 19:27:38 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.02.02 19:27:38 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.02.02 19:27:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.02 19:27:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.02 19:27:38 - OpenVPN > interactive service msg_channel=0 . 2022.02.02 19:27:38 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=12 HWADDR=74:e5:43:fd:72:e0 . 2022.02.02 19:27:38 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2022.02.02 19:27:38 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found. (code=1168) . 2022.02.02 19:27:38 - OpenVPN > ROUTE6: default_gateway=UNDEF . 2022.02.02 19:27:38 - OpenVPN > open_tun . 2022.02.02 19:27:39 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2022.02.02 19:27:39 - OpenVPN > TAP-Windows Driver Version 9.24 . 2022.02.02 19:27:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.16.70.0/10.16.70.168/255.255.255.0 [SUCCEEDED] . 2022.02.02 19:27:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.16.70.168/255.255.255.0 on interface {4FEC4B0D-994F-46C8-BF36-6E9BF01D4596} [DHCP-serv: 10.16.70.254, lease-time: 31536000] . 2022.02.02 19:27:39 - OpenVPN > Successful ARP Flush on interface [25] {4FEC4B0D-994F-46C8-BF36-6E9BF01D4596} . 2022.02.02 19:27:39 - OpenVPN > IPv4 MTU set to 1500 on interface 25 using SetIpInterfaceEntry() . 2022.02.02 19:27:39 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 25 fde6:7a:7d20:c46::10a6/128 store=active . 2022.02.02 19:27:39 - OpenVPN > add_route_ipv6(fde6:7a:7d20:c46::/64 -> fde6:7a:7d20:c46::10a6 metric 0) dev Local Area Connection . 2022.02.02 19:27:39 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:c46::/64 25 fe80::8 store=active . 2022.02.02 19:27:39 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 19:27:39 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 25 all . 2022.02.02 19:27:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns 25 static fde6:7a:7d20:c46::1 validate=no . 2022.02.02 19:27:45 - OpenVPN > IPv6 MTU set to 1500 on interface 25 using SetIpInterfaceEntry() . 2022.02.02 19:27:49 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2022.02.02 19:27:49 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 104.254.90.245 MASK 255.255.255.255 192.168.1.254 . 2022.02.02 19:27:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.02.02 19:27:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.02 19:27:49 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.16.70.1 . 2022.02.02 19:27:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2022.02.02 19:27:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.02 19:27:49 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.16.70.1 . 2022.02.02 19:27:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2022.02.02 19:27:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.02 19:27:49 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:c46::1 metric -1) dev Local Area Connection . 2022.02.02 19:27:49 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 25 fe80::8 store=active . 2022.02.02 19:27:49 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 19:27:49 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:c46::1 metric -1) dev Local Area Connection . 2022.02.02 19:27:49 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 25 fe80::8 store=active . 2022.02.02 19:27:49 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 19:27:49 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:c46::1 metric -1) dev Local Area Connection . 2022.02.02 19:27:49 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 25 fe80::8 store=active . 2022.02.02 19:27:49 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 19:27:49 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:c46::1 metric -1) dev Local Area Connection . 2022.02.02 19:27:49 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 25 fe80::8 store=active . 2022.02.02 19:27:49 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.02 19:27:49 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2022.02.02 19:27:49 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2022.02.02 19:27:49 - DNS leak protection with packet filtering enabled. . 2022.02.02 19:27:50 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.16.70.1) . 2022.02.02 19:27:50 - DNS IPv6 of a network adapter forced (Local Area Connection, from automatic to fde6:7a:7d20:c46::1) . 2022.02.02 19:27:50 - Routes, added a new route, 104.254.90.243 for gateway 10.16.70.1 . 2022.02.02 19:27:52 - Routes, added a new route, 2606:6080:2001:9:2679:addd:655:8142 for gateway fde6:7a:7d20:c46::1 . 2022.02.02 19:27:52 - Flushing DNS I 2022.02.02 19:27:52 - Checking route IPv4 I 2022.02.02 19:28:29 - Checking route IPv6 I 2022.02.02 19:28:36 - Checking DNS ! 2022.02.02 19:28:46 - Connected. . 2022.02.02 19:28:46 - OpenVPN > Initialization Sequence Completed
  7. I just got a 100/10 Mbps connection, coming from a 50/10 Mbps one. Both machines run Win 10 2004. I have the most recent Eddie client and the same settings on each machine. Using the Ookla speedtest the desktop on WiFi is hitting @ 93 Mbps and the other is only getting @ 50 Mbps on Ethernet (sits next to router, gigabit NIC). Both max out at >100 Mbps with the VPN off, and I can't figure out why there's a difference with it on. I know that the CPU can make a difference, and that plus RAM is the difference in the setups: WiFi Desktop: AMD Phenom II X4 B65 @ 3.4 GHz | 8 GB DDR3-1866MHz Ethernet Desktop: Intel Pentium J2900 @ 2.41 GHz | 4 GB DDR3-1600MHz Does anyone think the CPU is the issue here, or have any other ideas/suggestions?
  8. Hey guys, I was wondering now that your other competitors are actively integrating Wireguard into their offerings, when do you think you'll have something ready for your customers?
  9. Greetings, Tried to find out the root cause from the forums a couple of times, but it's either not addressed or I'm just missing the point. Anyway: In a good moment, I get decent enough speeds. But regardless of the server (at least seems so), my network speed goes every once a while dramatically down, to 0 or just a couple of kbit/s, even if I'm downloading or streaming something. Today it's been so bad that can't really browse at all. Have tried to switch between UDP and TCP protocols, but no luck so far. So, in a nutshell, network speed goes up and down, randomly, but the connection to AirVPN server(s) is not lost. Any ideas? Cheers, T
  10. Hi,, I have been using AirVPN for two days now and I'm not really pleased with the Speed so far. I'm using DD-WRT firmware in my home router and configured the OpenVPN client in the router, so all devices at my home network are using the VPN connection. My internet speed at home is: Downlink: 250 Mbit/s Uplink: 100 Mbit/s Ping to a server in Stockholm 1-2 ms. When using AirVPN connected to the Swedish servers, I'm having a slowly 10-15 Mbit/s connection. Changing from TCP settings to UDP settings doesn't really make a difference. Ping about 7 ms. Connecting to the German AirVPN servers, the speed goes up to 30-35 Mbit/s in both directions. Just a comparison with other VPN vendors which I have been testing an configured as OpenVPN client on my DD-WRT router. ExpressVPN (connected to Swedish servers) ca. 70 Mbit/s in both directions. NordVPN (connected to Swedish servers get up to 150 Mbit/s down and 100 Mbit/s uplink. Huge difference here compared to the VPN servers used by AirVPN. Checking the details a bit, I see that AirVPN is using servers located in the north of Stockholm (Uppsala / Åkersberga), connected to the ISP Kustbandet AB which is connected to IP-Only. NordVPN is using for example Obenetwork AB for their VPN servers. Or is there anything wrong the your instructions for the configuration of DD-WRT when using AirVPN? Any comments on this?
  11. Pretty much what the title says. Running Debian sid with Eddie, connected to a bunch of servers with default settings and nothing seems to get it up. Any idea? Do you want me to send logs?
  12. Kenwell

    Just Great!

    Thats why i love AIRVPN on a 200/20 line, with a RT-AC86U
  13. Since I have a 400Mbit/s connection the VPN speed dropped significantly. The problems started after upgrading my internet connection to 200Mbit/s: https://airvpn.org/topic/23851-guide-fast-internet-connection-slow-vpn-speeds/ This could be solved by changing the MTU size. Now I have 400Mbit/s and the VPN speed is dropping and even changing MTU does not solve the issue. I started analyzing the issue with wireshark and found tons of "TCP retransmissions". Any idea that to do?
  14. Hello, my download speed while connect to Air has slowed down again. I have a 50 Mbps. A couple months ago I had huge issues with air and it worked only through SSL, but not that fast. I couldn't locate the issue so I've just wiped out my OS and install Win 10 pro 64bit weeks ago. Since today air worked fine and fast but only with TCP. Since yesterday Air connections are very slow, between 5 - 12 Mbps. I tried everything that I've found in this forum about speed issues, changing ports, from tcp to udp with different ports, also the network adapter issue with 25/15 ect.. but it won't work, the maximum speed I get is 13 Mbps, only on some Netherland servers. All other servers, even those in my country, are way below 10 Mbps. That is very dissapointing and frustrating, specially as I've renew my sub again through the black friday offer. Any ideas?
  15. I've started using torrents seriously for the first time. I can get 160-170Mbps downloading quite comfortably via my connection (3 AirVPN connections load balanced via pfsense on a 200/200 connection using this guide - https://nguvu.org/pfsense/pfsense-multi-vpn-wan/), but uploading I've never seen more than 2Mbps. This could be because I can't compete with seedboxes but I'm wondering now if I'm maxing out my AirVPN connection i.e. is the 160Mbps a total limit per user or is it each way i.e. if I'm downloading at 160Mbps does this mean I'll never be able to get good seeding speeds and should maybe limit downloads to 100Mbp? Or should I be able to get 160Mbps both ways? Or, given I'm using 3 connections at a time - is my theoretical max 3x160Mbps if I had the luxury of a better connection? Thanks
  16. Hi, I am using open vpn on a dd-wrt router. The non vpn connection is 100mbit and I get 70 to 80mbit without issue. With AirVPN I am getting 15mbit down and 5mbit up. Is this normal? I am sure a while ago I was getting 10mbit down. Thanks.
  17. Hello guys, I was wondering if there is a speed limitation while using OpenVPN with Router, technically it's AsusWRT, using Asus AC68. I saw some threads in AirVPN before, but I think they were dragged down to the bottom of the forum, since it's been quite some time. I'm upgrading to get better bandwidth, and I was wondering if this happens. Should it happen, does it have any fixes? Thank you in advance. Best Regards, J.Smith
  18. My AirVPN client takes forever to launch on startup, often a few minutes. The app is set to auto-launch, but still takes forever to actually execute, and I cannot connect to the internet during this time because of some other issue. It's getting very annoying, and is quite detrimental to the experience of AirVPN.
  19. Hi guys, running latest Eddie Client on a Win 10 x64 machine on an 400 Mbit connection. Without VPN, we get very nice bandwidth, as can be seen in this speedtest here: Using AirVPN with default settings, we get about 30-40 Mbit. That is less than 10% of the total bandwidth of the connection. I've followed one of the optimization guides posted here on the forum and done these steps, trying to increase the VPN throughput: (1) in Eddie client preferences, changed Protocol to TCP or SSL - this actually helped and we're now at 50-60 Mbit - but still way off. (2) in Eddie client preferences, increased buffer size to 512 KB/s for both TCP/UDP settings. No improvement. (3) in Eddie client preferences, applied mssfix. No improvement. (4) used SG TCP Optimizer tool - checked "Optimal" option and then applied new settings. No improvement. (5) Tried TAP adaper 9.9.2_3 as well as latest 9.21.2. See speedtest results here: using TAP 9.9.2_3 using TAP 9.21.2 No improvement. (6) Also tried the TAP adapter fix, setting "Media Status" to "always connected". No improvement. Actually with this setting, AirVPN fails to connect to server. As you can probably agree, 60 Mbit throughput for a 400+ Mbit connection is quite bad. What else should we change and/or configure in order to get better AirVPN throughput ? Thank you. - Pete P.S: All speedtest stats above were also confirmed with real file downloads. Same results.
  20. When I connect to Persei using UDP and the Eddie 2.14.2 my speeds decrease dramatically macOS 10.13.4 (17E202). Not connected to VPN connected to Persei
  21. Hello, Sorry for the very generic nature of the post. I've noticed that internet speeds have greatly reduced in the last few months, website timing out, etc. I've confirmed that the VPN speed of AirVPN's service reduces the speed of my ISP from about 120 Mb/s to between 5-15 Mb/s. Is there anything I can to improve this, regarding configuration, etc? I'm using a Windows 7, 64-bit machine Thanks
  22. Router Beeline operating system Linux Mint 18.3 has tried your VP for a long time to registration protection to settings 0 claims. But what the fuck is he just chopping speed up to 500 KB. In the end, all the desire simply repulsed to use again your AIRVPN. In general, what to do and how to set the normal speed is possible.
  23. Almost "cracked" 300mbps a few minutes ago on one server, pushing it to #1 in top speed. (Basically almost maxing out my line speed) Whatever magic AirVPN's servers are doing, it works bloody fast ! Another big THANK YOU from me ! So, not spending too many words. Here's two pictures.
  24. I believe my ISP is throttling OpenVPN. I have been a very satisfied AirVPN customer and until recently got good speeds. In the last month, since switching to Fibre, I have noticed that OpenVPN connections appear to be limited to 1 Mbps. I have tried changing ports (53/UPD, 80/TCP, 443/UPD, 443/tcp) to no effect. I normally run OpenVPN on my router, so to isolate the issue, tried my other router that gives me full 15 Meg unencrypted while running the AirVPN windows client. In every case, the best I get is 1 Meg down and 10% of that up while encrypted. The change seems to coincide with my ISP "resolving" evening congestion problems in my area. The evidence seems strong that this is a throttling issue and not a configuration problem. Is there a solution or am I condemned to take the slow lane?
  25. Hey all, I just set up my TP-link Archer C7 with DD-WRT, and my download speeds went from (no VPN) 25 Mbs to just over 2Mbs. I know I take some performance hit when going through VPN, but this is too much, unfortunately. One thing I didnt understand in the setup process that might be affecting it is "server entry-IP address". Am I "locked into" whatver server I chose when I set up the router? It seems like I am, because the server I chose at the time of config was "best" according to the "Status" page, but no longer is, yet *my* status still says I am still connected to the one I chose the IP of. I can provide more info if needed, but am not at this point b\c I feel like I kinda alreday know the answer, and will be going back to Eddie and stock firmware on my router....hoping against hope that the router can be set up to be faster than using Eddie. Thanks in advance.
×
×
  • Create New...