Search the Community
Showing results for tags 'answered'.
Found 8 results
-
answered WARNING: 'cipher' is used inconsistently
fts501 posted a topic in Troubleshooting and Problems
Hi, I recently moved to the experimental version 2.23.1 of Eddie. Each time I connect to a server I get the following: OpenVPN > WARNING: 'cipher' is used inconsistently, local='cipher AES-256-GCM', remote='cipher AES-256-CBC' I suppose that the connection is finaly done using the local cipher. Is is fine to not consider the warning and to assume that Eddie is working normally? Thanks for your reply. -
I have Eddie version 2.21.8 installed on 4 PCs: 3 Dell desktop PCs still running Windows 8.1 (with Kaspersky or Avast free AV), and 1 Acer laptop running Windows 10. They are all stand-alone, not in a network. Two of the Dells (Inspirons) are side by side. One is still running Eddie perfectly. The other developed a "failure to login" problem about a week ago. There are two pop-up error messages - first, "Eddie - Bootstrap Failed", then "Eddie - Message" - as shown in the attached screen cap. Today's log, same as earlier ones, shows: . 2023.01.16 09:44:12 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 8.1, Version: Microsoft Windows NT 6.3.9600.0, Mono/.Net: v4.0.30319 . 2023.01.16 09:44:12 - Command line arguments (1): path="home" . 2023.01.16 09:44:13 - Reading options from C:\Users\xxxx\AppData\Local\Eddie\default.profile . 2023.01.16 09:44:13 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2023.01.16 09:44:13 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2023.01.16 09:44:13 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2023.01.16 09:44:14 - Ready I 2023.01.16 09:44:38 - Checking login ... . 2023.01.16 09:45:30 - Cannot retrieve information about AirVPN: Fetch url error:Failure when receiving data from the peer F 2023.01.16 09:45:54 - Cannot login. (Fetch url error:Failure when receiving data from the peer) I suspected a virus, because access to some sites, e.g. avg.com, is blocked, even after a DNS flush. But Bleeping Computers' Rkill, Malwarebytes, MS Autoruns14 and Kasperky (deep scan) haven't found anything. I've also uninstalled and reinstalled Eddie. Any suggestions before I raise a support ticket? BTW, the same problem has now cropped up on my Acer laptop!
-
Hello there, Since several days eddie doesn't anymore connect to the "best" server automatically (in few seconds) and so doesn't connect at all since I have the setting "enable latency test" enabled (of course). It performs latency tests during few minutes and stuck for the last 3, 4, or 5 last servers which are in maintenance. So i have to manually connect to one of the already tested servers with few latency. Se below the screenchot of latency test and the system report. Why this change ? Thanks for your help. sysreport.txt
-
Cable-Router: Vodafone Station VPN-Router: Glinet Router GL-MT300N-V2 Firmware: 3.211 based on OpenWrt 19.07.8 Client: Raspberry Pi 2 Model B Rev 1.1 with dyndns ( ddclient) Hello folks, Im running an server module on my raspberry successfull over an vpn client over openvpn on the Glinet Router. But if i switch to wireguard, no connections are able to connecting from outside to the Ras Atm im use for connecting through wireguard the Customized Glinet Interface and not the Luci One which is based on that. But i have some custom iptables commands, to forward my ports: iptables -A INPUT -i tun0 -p tcp --dport 51813 -m state --state NEW,ESTABLISHED -j ACCEPT iptables -A OUTPUT -o tun0 -p tcp --dport 51813 -m state --state NEW,ESTABLISHED -j ACCEPT iptables -A INPUT -i tun0 -p udp --dport 51813 -m state --state NEW,ESTABLISHED -j ACCEPT iptables -A OUTPUT -o tun0 -p udp --dport 51813 -m state --state NEW,ESTABLISHED -j ACCEPT iptables -I FORWARD -i tun0 -p udp -d 192.168.2.12 --dport 51813 -j ACCEPT iptables -I FORWARD -i tun0 -p tcp -d 192.168.2.12 --dport 51813 -j ACCEPT iptables -t nat -I PREROUTING -i tun0 -p tcp --dport 51813 -j DNAT --to-destination 192.168.2.12:45345 iptables -t nat -I PREROUTING -i tun0 -p udp --dport 51813 -j DNAT --to-destination 192.168.2.12:45345 iptables -t nat -A PREROUTING -i tun -p udp --dport 51813 -j REDIRECT --to-ports 45345 iptables -t nat -A PREROUTING -i tun -p udp --dport 51813 -j REDIRECT --to-ports 45345 So I'm not quite sure, why openvpn works but with WG it doesnt. May someone has a clue, or know an approach to figure out on which point i have to take action. best regards
-
Hi I connected to the same server with two devices that are connected to the same router (the router does NAT). I noticed that one device disconnected the other, and as the other was trying to connect again it would disconnect the first one. So basically the two devices were connecting and disconnecting non stop. I am wondering why this is happening. Is it because 1. AirVPN does not allow for to devices from the same account connecting to the same server, or 2. since the router has one IP in the internet and it is NAT'ing the two devices, the AirVPN server can not differentiate between the two devices (since it sees only the router internet IP), so from the AirVPN server PoV it looks like the same device is trying to connect again so it drops the previous connection. 3. Something else? I am assuming it is 2) but I would welcome confirmation.
-
Is it possible to set up Foxy Proxy or something similar using AirVPN? If so, how exactly? Notably, I'm wondering about GNU+Linux (Ubuntu) and Brave and Firefox. Particularly, I want certain browser profiles to use a proxy while the OS connects via OpenVPN CLI / Eddie.
-
I have a 2015 macbook air running high sierra. Im not sure what version of Eddie I am using for but i downloaded a new version less than a month ago. My computer was running eddie/vpn just fine when ithe computer abruptly shut down (i have battery problems long story). From what I remember of this client if Eddie is shut down improperly it has a tendency to block any internet upon restarting and the solution is to start up Eddie close it properly then restart the computer. I have done this many times to no avail. Interestingly I am only ever allowed to even get to the eddie window upon startup. I have it so that the computer starts up eddie upon startup and this is the only way I can even attempt to connect. If i decline the prompt to begin a connection at startup, then later on start up eddie, i get the error message: "Unable to obtain elevated privileges (required) Unable to start (Client not allowed Unable to obtain signature of local) i have no idea what this means, or how it came about, or how to prevent it and an explanation would be very much appreciated. When I do try to connect, here are the logs: I 2017.12.31 19:26:20 - Eddie version: 2.13.6 / macos_x64, System: MacOS, Name: 10.13.6, Version: Darwin MrButtonss-MacBook-Air.local 17.7.0 Darwin Kernel Version 17.7.0: Thu Jun 21 22:53:14 PDT 2018; root:xnu-4570.71.2~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319 . 2017.12.31 19:26:20 - Reading options from /Users/MrButtons/.airvpn/AirVPN.xml . 2017.12.31 19:26:21 - Command line arguments (1): gui.osx.style="dark" I 2017.12.31 19:26:23 - OpenVPN Driver - Expected I 2017.12.31 19:26:23 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (/Applications/VPN/Eddie.app/Contents/MacOS/openvpn) I 2017.12.31 19:26:23 - SSH - Version: OpenSSH_7.6p1, LibreSSL 2.6.2 (/usr/bin/ssh) I 2017.12.31 19:26:23 - SSL - Version: stunnel 5.40 (/Applications/VPN/Eddie.app/Contents/MacOS/stunnel) I 2017.12.31 19:26:23 - curl - Version: 7.54.0 (/usr/bin/curl) I 2017.12.31 19:26:23 - Certification Authorities: /Applications/VPN/Eddie.app/Contents/MacOS/cacert.pem ! 2017.12.31 19:26:23 - Activation of Network Lock - OS X - PF . 2017.12.31 19:26:23 - OS X - PF rules updated, reloading . 2017.12.31 19:26:23 - Updating systems & servers data ... . 2017.12.31 19:26:23 - OS X - PF rules updated, reloading ! 2017.12.31 19:26:23 - Ready . 2017.12.31 19:26:24 - Systems & servers data update completed ! 2017.12.31 19:26:30 - Deactivation of Network Lock I 2017.12.31 19:26:43 - Checking login ... ! 2017.12.31 19:26:44 - Logged in. ! 2017.12.31 19:27:59 - Logged out. I 2017.12.31 19:28:00 - Checking login ... ! 2017.12.31 19:28:00 - Logged in. I 2017.12.31 19:28:09 - Session starting. . 2017.12.31 19:28:09 - IPv6 disabled on network adapter (Wi-Fi) . 2017.12.31 19:28:09 - IPv6 disabled on network adapter (Bluetooth PAN) . 2017.12.31 19:28:09 - IPv6 disabled on network adapter (Thunderbolt Bridge) I 2017.12.31 19:28:09 - Checking authorization ... ! 2017.12.31 19:28:10 - Connecting to Alya (Canada, Toronto, Ontario) . 2017.12.31 19:28:10 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017 . 2017.12.31 19:28:10 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2017.12.31 19:28:10 - Connection to OpenVPN Management Interface . 2017.12.31 19:28:10 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 W 2017.12.31 19:28:10 - OpenVPN > WARNING: Your certificate is not yet valid! . 2017.12.31 19:28:10 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.12.31 19:28:10 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.12.31 19:28:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.170:443 . 2017.12.31 19:28:10 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144] . 2017.12.31 19:28:10 - OpenVPN > UDP link local: (not bound) . 2017.12.31 19:28:10 - OpenVPN > UDP link remote: [AF_INET]184.75.221.170:443 . 2017.12.31 19:28:10 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=55eb7001 7e8347e0 . 2017.12.31 19:28:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.12.31 19:28:10 - OpenVPN > VERIFY KU OK . 2017.12.31 19:28:10 - OpenVPN > Validating certificate extended key usage . 2017.12.31 19:28:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.12.31 19:28:10 - OpenVPN > VERIFY EKU OK . 2017.12.31 19:28:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alya, emailAddress=info@airvpn.org . 2017.12.31 19:28:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.12.31 19:28:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.12.31 19:28:10 - OpenVPN > [Alya] Peer Connection Initiated with [AF_INET]184.75.221.170:443 . 2017.12.31 19:28:11 - OpenVPN > SENT CONTROL [Alya]: 'PUSH_REQUEST' (status=1) . 2017.12.31 19:28:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.8.164.1,route-gateway 10.8.164.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.8.164.137 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2017.12.31 19:28:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.12.31 19:28:11 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.12.31 19:28:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.12.31 19:28:11 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.12.31 19:28:11 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.12.31 19:28:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.12.31 19:28:11 - OpenVPN > OPTIONS IMPORT: peer-id set . 2017.12.31 19:28:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2017.12.31 19:28:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2017.12.31 19:28:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2017.12.31 19:28:11 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.12.31 19:28:11 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.12.31 19:28:11 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 IFACE=en0 HWADDR=c4:b3:01:90:16:e2 . 2017.12.31 19:28:11 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy . 2017.12.31 19:28:11 - OpenVPN > Opened utun device utun1 . 2017.12.31 19:28:11 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.12.31 19:28:11 - OpenVPN > /sbin/ifconfig utun1 delete . 2017.12.31 19:28:11 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2017.12.31 19:28:11 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2017.12.31 19:28:11 - OpenVPN > /sbin/ifconfig utun1 10.8.164.137 10.8.164.137 netmask 255.255.255.0 mtu 1500 up . 2017.12.31 19:28:11 - OpenVPN > /sbin/route add -net 10.8.164.0 10.8.164.137 255.255.255.0 . 2017.12.31 19:28:12 - OpenVPN > add net 10.8.164.0: gateway 10.8.164.137 . 2017.12.31 19:28:12 - OpenVPN > /sbin/route add -net 184.75.221.170 10.0.0.1 255.255.255.255 . 2017.12.31 19:28:12 - OpenVPN > add net 184.75.221.170: gateway 10.0.0.1 . 2017.12.31 19:28:12 - OpenVPN > /sbin/route add -net 0.0.0.0 10.8.164.1 128.0.0.0 . 2017.12.31 19:28:12 - OpenVPN > add net 0.0.0.0: gateway 10.8.164.1 . 2017.12.31 19:28:12 - OpenVPN > /sbin/route add -net 128.0.0.0 10.8.164.1 128.0.0.0 . 2017.12.31 19:28:12 - OpenVPN > add net 128.0.0.0: gateway 10.8.164.1 . 2017.12.31 19:28:12 - DNS of a network adapter forced (Wi-Fi, from 10.6.198.1, fde6:7a:7d20:2c6::1 to 10.8.164.1) . 2017.12.31 19:28:12 - DNS of a network adapter forced (Bluetooth PAN, from 10.6.198.1, fde6:7a:7d20:2c6::1 to 10.8.164.1) . 2017.12.31 19:28:12 - DNS of a network adapter forced (Thunderbolt Bridge, from 10.6.198.1, fde6:7a:7d20:2c6::1 to 10.8.164.1) . 2017.12.31 19:28:12 - Flushing DNS I 2017.12.31 19:28:12 - Checking route . 2017.12.31 19:28:12 - curl: (60) SSL certificate problem: certificate is not yet valid . 2017.12.31 19:28:12 - More details here: https://curl.haxx.se/docs/sslcerts.html . 2017.12.31 19:28:12 - curl performs SSL certificate verification by default, using a "bundle" . 2017.12.31 19:28:12 - of Certificate Authority (CA) public keys (CA certs). If the default . 2017.12.31 19:28:12 - bundle file isn't adequate, you can specify an alternate file . 2017.12.31 19:28:12 - using the --cacert option. . 2017.12.31 19:28:12 - If this HTTPS server uses a certificate signed by a CA represented in . 2017.12.31 19:28:12 - the bundle, the certificate verification probably failed due to a . 2017.12.31 19:28:12 - problem with the certificate (it might be expired, or the name might . 2017.12.31 19:28:12 - not match the domain name in the URL). . 2017.12.31 19:28:12 - If you'd like to turn off curl's verification of the certificate, use . 2017.12.31 19:28:12 - the -k (or --insecure) option. . 2017.12.31 19:28:12 - HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure. . 2017.12.31 19:28:12 - Checking route (2° try) . 2017.12.31 19:28:14 - curl: (60) SSL certificate problem: certificate is not yet valid . 2017.12.31 19:28:14 - More details here: https://curl.haxx.se/docs/sslcerts.html . 2017.12.31 19:28:14 - curl performs SSL certificate verification by default, using a "bundle" . 2017.12.31 19:28:14 - of Certificate Authority (CA) public keys (CA certs). If the default . 2017.12.31 19:28:14 - bundle file isn't adequate, you can specify an alternate file . 2017.12.31 19:28:14 - using the --cacert option. . 2017.12.31 19:28:14 - If this HTTPS server uses a certificate signed by a CA represented in . 2017.12.31 19:28:14 - the bundle, the certificate verification probably failed due to a . 2017.12.31 19:28:14 - problem with the certificate (it might be expired, or the name might . 2017.12.31 19:28:14 - not match the domain name in the URL). . 2017.12.31 19:28:14 - If you'd like to turn off curl's verification of the certificate, use . 2017.12.31 19:28:14 - the -k (or --insecure) option. . 2017.12.31 19:28:14 - HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure. . 2017.12.31 19:28:14 - Checking route (3° try) . 2017.12.31 19:28:16 - curl: (60) SSL certificate problem: certificate is not yet valid . 2017.12.31 19:28:16 - More details here: https://curl.haxx.se/docs/sslcerts.html . 2017.12.31 19:28:16 - curl performs SSL certificate verification by default, using a "bundle" . 2017.12.31 19:28:16 - of Certificate Authority (CA) public keys (CA certs). If the default . 2017.12.31 19:28:16 - bundle file isn't adequate, you can specify an alternate file . 2017.12.31 19:28:16 - using the --cacert option. . 2017.12.31 19:28:16 - If this HTTPS server uses a certificate signed by a CA represented in . 2017.12.31 19:28:16 - the bundle, the certificate verification probably failed due to a . 2017.12.31 19:28:16 - problem with the certificate (it might be expired, or the name might . 2017.12.31 19:28:16 - not match the domain name in the URL). . 2017.12.31 19:28:16 - If you'd like to turn off curl's verification of the certificate, use . 2017.12.31 19:28:16 - the -k (or --insecure) option. . 2017.12.31 19:28:16 - HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure. E 2017.12.31 19:28:16 - Checking route failed. . 2017.12.31 19:28:16 - OpenVPN > Initialization Sequence Completed ! 2017.12.31 19:28:16 - Disconnecting . 2017.12.31 19:28:16 - Sending management termination signal . 2017.12.31 19:28:16 - Management - Send 'signal SIGTERM' . 2017.12.31 19:28:21 - Connection terminated. . 2017.12.31 19:28:21 - DNS of a network adapter restored to original settings (Wi-Fi, to 10.6.198.1, fde6:7a:7d20:2c6::1) . 2017.12.31 19:28:21 - DNS of a network adapter restored to original settings (Bluetooth PAN, to 10.6.198.1, fde6:7a:7d20:2c6::1) . 2017.12.31 19:28:21 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to 10.6.198.1, fde6:7a:7d20:2c6::1) I 2017.12.31 19:28:24 - Checking authorization ... ! 2017.12.31 19:28:24 - Connecting to Tejat (Canada, Toronto, Ontario) . 2017.12.31 19:28:24 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017 . 2017.12.31 19:28:24 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2017.12.31 19:28:24 - Connection to OpenVPN Management Interface . 2017.12.31 19:28:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 W 2017.12.31 19:28:25 - OpenVPN > WARNING: Your certificate is not yet valid! . 2017.12.31 19:28:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.12.31 19:28:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.12.31 19:28:25 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.194:443 . 2017.12.31 19:28:25 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144] . 2017.12.31 19:28:25 - OpenVPN > UDP link local: (not bound) . 2017.12.31 19:28:25 - OpenVPN > UDP link remote: [AF_INET]184.75.221.194:443 . 2017.12.31 19:28:25 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.194:443, sid=f6ab9f4c eb631b45 . 2017.12.31 19:28:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.12.31 19:28:25 - OpenVPN > VERIFY KU OK . 2017.12.31 19:28:25 - OpenVPN > Validating certificate extended key usage . 2017.12.31 19:28:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.12.31 19:28:25 - OpenVPN > VERIFY EKU OK . 2017.12.31 19:28:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2017.12.31 19:28:25 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.12.31 19:28:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.12.31 19:28:25 - OpenVPN > [Tejat] Peer Connection Initiated with [AF_INET]184.75.221.194:443 . 2017.12.31 19:28:26 - OpenVPN > SENT CONTROL [Tejat]: 'PUSH_REQUEST' (status=1) . 2017.12.31 19:28:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.31.100.1,route-gateway 10.31.100.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.31.100.248 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2017.12.31 19:28:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2017.12.31 19:28:26 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2017.12.31 19:28:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2017.12.31 19:28:26 - OpenVPN > OPTIONS IMPORT: route options modified . 2017.12.31 19:28:26 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2017.12.31 19:28:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2017.12.31 19:28:26 - OpenVPN > OPTIONS IMPORT: peer-id set . 2017.12.31 19:28:26 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2017.12.31 19:28:26 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2017.12.31 19:28:26 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2017.12.31 19:28:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.12.31 19:28:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2017.12.31 19:28:26 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 IFACE=en0 HWADDR=c4:b3:01:90:16:e2 . 2017.12.31 19:28:26 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy . 2017.12.31 19:28:26 - OpenVPN > Opened utun device utun1 . 2017.12.31 19:28:26 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2017.12.31 19:28:26 - OpenVPN > /sbin/ifconfig utun1 delete . 2017.12.31 19:28:26 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2017.12.31 19:28:26 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2017.12.31 19:28:26 - OpenVPN > /sbin/ifconfig utun1 10.31.100.248 10.31.100.248 netmask 255.255.255.0 mtu 1500 up . 2017.12.31 19:28:26 - OpenVPN > /sbin/route add -net 10.31.100.0 10.31.100.248 255.255.255.0 . 2017.12.31 19:28:26 - OpenVPN > add net 10.31.100.0: gateway 10.31.100.248 . 2017.12.31 19:28:26 - OpenVPN > /sbin/route add -net 184.75.221.194 10.0.0.1 255.255.255.255 . 2017.12.31 19:28:26 - OpenVPN > add net 184.75.221.194: gateway 10.0.0.1 . 2017.12.31 19:28:26 - OpenVPN > /sbin/route add -net 0.0.0.0 10.31.100.1 128.0.0.0 . 2017.12.31 19:28:26 - OpenVPN > add net 0.0.0.0: gateway 10.31.100.1 . 2017.12.31 19:28:26 - OpenVPN > /sbin/route add -net 128.0.0.0 10.31.100.1 128.0.0.0 . 2017.12.31 19:28:26 - OpenVPN > add net 128.0.0.0: gateway 10.31.100.1 . 2017.12.31 19:28:26 - DNS of a network adapter forced (Wi-Fi, from 10.6.198.1, fde6:7a:7d20:2c6::1 to 10.31.100.1) . 2017.12.31 19:28:26 - DNS of a network adapter forced (Bluetooth PAN, from 10.6.198.1, fde6:7a:7d20:2c6::1 to 10.31.100.1) . 2017.12.31 19:28:26 - DNS of a network adapter forced (Thunderbolt Bridge, from 10.6.198.1, fde6:7a:7d20:2c6::1 to 10.31.100.1) . 2017.12.31 19:28:26 - Flushing DNS I 2017.12.31 19:28:26 - Checking route . 2017.12.31 19:28:27 - curl: (60) SSL certificate problem: certificate is not yet valid . 2017.12.31 19:28:27 - More details here: https://curl.haxx.se/docs/sslcerts.html . 2017.12.31 19:28:27 - curl performs SSL certificate verification by default, using a "bundle" . 2017.12.31 19:28:27 - of Certificate Authority (CA) public keys (CA certs). If the default . 2017.12.31 19:28:27 - bundle file isn't adequate, you can specify an alternate file . 2017.12.31 19:28:27 - using the --cacert option. . 2017.12.31 19:28:27 - If this HTTPS server uses a certificate signed by a CA represented in . 2017.12.31 19:28:27 - the bundle, the certificate verification probably failed due to a . 2017.12.31 19:28:27 - problem with the certificate (it might be expired, or the name might . 2017.12.31 19:28:27 - not match the domain name in the URL). . 2017.12.31 19:28:27 - If you'd like to turn off curl's verification of the certificate, use . 2017.12.31 19:28:27 - the -k (or --insecure) option. . 2017.12.31 19:28:27 - HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure. . 2017.12.31 19:28:27 - Checking route (2° try) . 2017.12.31 19:28:28 - curl: (60) SSL certificate problem: certificate is not yet valid . 2017.12.31 19:28:28 - More details here: https://curl.haxx.se/docs/sslcerts.html . 2017.12.31 19:28:28 - curl performs SSL certificate verification by default, using a "bundle" . 2017.12.31 19:28:28 - of Certificate Authority (CA) public keys (CA certs). If the default . 2017.12.31 19:28:28 - bundle file isn't adequate, you can specify an alternate file . 2017.12.31 19:28:28 - using the --cacert option. . 2017.12.31 19:28:28 - If this HTTPS server uses a certificate signed by a CA represented in . 2017.12.31 19:28:28 - the bundle, the certificate verification probably failed due to a . 2017.12.31 19:28:28 - problem with the certificate (it might be expired, or the name might . 2017.12.31 19:28:28 - not match the domain name in the URL). . 2017.12.31 19:28:28 - If you'd like to turn off curl's verification of the certificate, use . 2017.12.31 19:28:28 - the -k (or --insecure) option. . 2017.12.31 19:28:28 - HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure. . 2017.12.31 19:28:28 - Checking route (3° try) I am at a loss as to how to proceed. Any help is appreciated. Please and thank you. Id also like to add that all other devices connect to the network just fine.
-
ANSWERED Never connects, just keeps attempting
sandytooth posted a topic in Troubleshooting and Problems
Heya, it just won't work. Tried rebooting router, computer etc but nothing works. Not really sure what else to do. Lifebelt Log: AirVPN Support Report - Generated 29/05/2020 22:29 UTC -- Environment -- Eddie version: 2.12.4 Eddie OS build: windows_x64 OS type: Windows OS name: Microsoft Windows NT 10.0.18362.0 OS description: Microsoft Windows NT 10.0.18362.0 Mono /.Net Framework: v4.0.30319 OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2 OpenVPN: 2.4.0 - OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 (C:\Program Files\AirVPN\openvpn.exe) SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) curl: 7.34.0 (C:\Program Files\AirVPN\curl.exe) Profile path: C:\Users\grrrb\AppData\Local\AirVPN\AirVPN.xml Data path: C:\Users\grrrb\AppData\Local\AirVPN Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\AirVPN.exe Command line arguments (1): path="home" -- Important options not at defaults -- login: sandytooth password: (omissis) remember: True connect: True servers.blacklist: d8ea2860327c51d8da0b4f4c2be351314cb68a61aaf0ee1019c787517e3f9c8f,c9faaf87eacb69850882d01708368a30601bad56a487cfcdc9654622112be54a gui.windows.start_minimized: True gui.windows.tray: False -- Logs -- . 2020.05.29 23:20:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:20:40 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:20:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kocab, emailAddress=info@airvpn.org . 2020.05.29 23:20:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:20:40 - OpenVPN > [Kocab] Peer Connection Initiated with [AF_INET]213.152.162.180:443 . 2020.05.29 23:20:42 - OpenVPN > SENT CONTROL [Kocab]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:20:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.20.104.1,route-gateway 10.20.104.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.20.104.97 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:20:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:20:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:20:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:20:42 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:20:42 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:20:42 - OpenVPN > open_tun . 2020.05.29 23:20:42 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:20:42 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:20:42 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.20.104.0/10.20.104.97/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:20:42 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.20.104.97/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.20.104.254, lease-time: 31536000] . 2020.05.29 23:20:42 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:20:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:20:47 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:20:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.180 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:20:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:20:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:20:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.20.104.1 . 2020.05.29 23:20:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:20:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:20:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.20.104.1 . 2020.05.29 23:20:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:20:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:20:47 - Starting Management Interface . 2020.05.29 23:20:47 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:20:47 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:20:47 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.12.232.1) to 10.20.104.1) . 2020.05.29 23:20:47 - Flushing DNS I 2020.05.29 23:20:51 - Checking route E 2020.05.29 23:20:52 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:20:52 - Checking route (2° try) E 2020.05.29 23:20:53 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:20:53 - Checking route (3° try) E 2020.05.29 23:20:56 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:20:56 - Routing checking failed. . 2020.05.29 23:20:56 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:20:56 - Disconnecting . 2020.05.29 23:20:56 - Management - Send 'signal SIGTERM' . 2020.05.29 23:20:56 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:20:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:20:56 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:21:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.180 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:21:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:21:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.20.104.1 . 2020.05.29 23:21:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:21:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.20.104.1 . 2020.05.29 23:21:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:21:01 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:21:01 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:21:01 - Connection terminated. . 2020.05.29 23:21:01 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.12.232.1) . 2020.05.29 23:21:01 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:21:04 - Checking authorization ... ! 2020.05.29 23:21:05 - Connecting to Crater (Netherlands, Alblasserdam) . 2020.05.29 23:21:05 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:21:05 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:21:05 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:21:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:21:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:21:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:21:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.14:443 . 2020.05.29 23:21:05 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:21:05 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:21:05 - OpenVPN > UDP link remote: [AF_INET]213.152.162.14:443 . 2020.05.29 23:21:05 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.14:443, sid=86b01962 5bbf0290 . 2020.05.29 23:21:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:21:05 - OpenVPN > Validating certificate key usage . 2020.05.29 23:21:05 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:21:05 - OpenVPN > VERIFY KU OK . 2020.05.29 23:21:05 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:21:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:21:05 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:21:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Crater, emailAddress=info@airvpn.org . 2020.05.29 23:21:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:21:05 - OpenVPN > [Crater] Peer Connection Initiated with [AF_INET]213.152.162.14:443 . 2020.05.29 23:21:07 - OpenVPN > SENT CONTROL [Crater]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:21:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.14.168.1,route-gateway 10.14.168.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.14.168.232 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:21:07 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:21:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:21:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:21:07 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:21:07 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:21:07 - OpenVPN > open_tun . 2020.05.29 23:21:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:21:07 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:21:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.14.168.0/10.14.168.232/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:21:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.14.168.232/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.14.168.254, lease-time: 31536000] . 2020.05.29 23:21:07 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:21:07 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:21:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:21:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.14 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:21:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:21:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:21:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.14.168.1 . 2020.05.29 23:21:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:21:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:21:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.14.168.1 . 2020.05.29 23:21:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:21:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:21:12 - Starting Management Interface . 2020.05.29 23:21:12 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:21:12 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:21:12 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.20.104.1) to 10.14.168.1) . 2020.05.29 23:21:12 - Flushing DNS I 2020.05.29 23:21:16 - Checking route E 2020.05.29 23:21:16 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:21:16 - Checking route (2° try) E 2020.05.29 23:21:18 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:21:18 - Checking route (3° try) E 2020.05.29 23:21:20 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:21:20 - Routing checking failed. . 2020.05.29 23:21:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:21:20 - Disconnecting . 2020.05.29 23:21:20 - Management - Send 'signal SIGTERM' . 2020.05.29 23:21:20 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:21:20 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:21:20 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:21:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.14 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:21:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:21:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.14.168.1 . 2020.05.29 23:21:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:21:25 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.14.168.1 . 2020.05.29 23:21:25 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:21:25 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:21:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:21:25 - Connection terminated. . 2020.05.29 23:21:25 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.20.104.1) . 2020.05.29 23:21:25 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:21:28 - Checking authorization ... ! 2020.05.29 23:21:29 - Connecting to Norma (Sweden, Stockholm) . 2020.05.29 23:21:29 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:21:29 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:21:29 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:21:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:21:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:21:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:21:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]31.3.152.99:443 . 2020.05.29 23:21:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:21:29 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:21:29 - OpenVPN > UDP link remote: [AF_INET]31.3.152.99:443 . 2020.05.29 23:21:29 - OpenVPN > TLS: Initial packet from [AF_INET]31.3.152.99:443, sid=8df01cbf c76a3173 . 2020.05.29 23:21:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:21:29 - OpenVPN > Validating certificate key usage . 2020.05.29 23:21:29 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:21:29 - OpenVPN > VERIFY KU OK . 2020.05.29 23:21:29 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:21:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:21:29 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:21:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org . 2020.05.29 23:21:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:21:29 - OpenVPN > [Norma] Peer Connection Initiated with [AF_INET]31.3.152.99:443 . 2020.05.29 23:21:30 - OpenVPN > SENT CONTROL [Norma]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:21:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.25.72.1,route-gateway 10.25.72.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.25.72.152 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:21:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:21:31 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:21:31 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:21:31 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:21:31 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:21:31 - OpenVPN > open_tun . 2020.05.29 23:21:31 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:21:31 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:21:31 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.25.72.0/10.25.72.152/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:21:31 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.25.72.152/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.25.72.254, lease-time: 31536000] . 2020.05.29 23:21:31 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:21:31 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:21:36 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:21:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 31.3.152.99 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:21:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:21:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:21:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.25.72.1 . 2020.05.29 23:21:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:21:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:21:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.25.72.1 . 2020.05.29 23:21:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:21:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:21:36 - Starting Management Interface . 2020.05.29 23:21:36 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:21:36 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:21:36 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.14.168.1) to 10.25.72.1) . 2020.05.29 23:21:36 - Flushing DNS I 2020.05.29 23:21:40 - Checking route E 2020.05.29 23:21:40 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:21:40 - Checking route (2° try) E 2020.05.29 23:21:42 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:21:42 - Checking route (3° try) E 2020.05.29 23:21:44 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:21:44 - Routing checking failed. . 2020.05.29 23:21:44 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:21:45 - Disconnecting . 2020.05.29 23:21:45 - Management - Send 'signal SIGTERM' . 2020.05.29 23:21:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:21:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:21:45 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:21:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 31.3.152.99 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:21:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:21:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.25.72.1 . 2020.05.29 23:21:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:21:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.25.72.1 . 2020.05.29 23:21:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:21:50 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:21:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:21:50 - Connection terminated. . 2020.05.29 23:21:50 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.14.168.1) . 2020.05.29 23:21:50 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:21:53 - Checking authorization ... ! 2020.05.29 23:21:54 - Connecting to Asellus (Netherlands, Alblasserdam) . 2020.05.29 23:21:54 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:21:54 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:21:54 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:21:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:21:55 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:21:55 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:21:55 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.19:443 . 2020.05.29 23:21:55 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:21:55 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:21:55 - OpenVPN > UDP link remote: [AF_INET]109.202.107.19:443 . 2020.05.29 23:21:55 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.19:443, sid=10450bd8 07610100 . 2020.05.29 23:21:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:21:55 - OpenVPN > Validating certificate key usage . 2020.05.29 23:21:55 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:21:55 - OpenVPN > VERIFY KU OK . 2020.05.29 23:21:55 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:21:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:21:55 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:21:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Asellus, emailAddress=info@airvpn.org . 2020.05.29 23:21:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:21:55 - OpenVPN > [Asellus] Peer Connection Initiated with [AF_INET]109.202.107.19:443 . 2020.05.29 23:21:56 - OpenVPN > SENT CONTROL [Asellus]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:21:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.10.8.1,route-gateway 10.10.8.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.10.8.120 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:21:56 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:21:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:21:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:21:56 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:21:56 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:21:56 - OpenVPN > open_tun . 2020.05.29 23:21:56 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:21:56 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:21:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.10.8.0/10.10.8.120/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:21:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.10.8.120/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.10.8.254, lease-time: 31536000] . 2020.05.29 23:21:56 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:21:56 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:22:01 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:22:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.19 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:22:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:22:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:22:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.10.8.1 . 2020.05.29 23:22:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:22:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:22:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.10.8.1 . 2020.05.29 23:22:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:22:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:22:01 - Starting Management Interface . 2020.05.29 23:22:01 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:22:01 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:22:01 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.25.72.1) to 10.10.8.1) . 2020.05.29 23:22:01 - Flushing DNS I 2020.05.29 23:22:06 - Checking route E 2020.05.29 23:22:07 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:22:07 - Checking route (2° try) E 2020.05.29 23:22:08 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:22:08 - Checking route (3° try) E 2020.05.29 23:22:11 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:22:11 - Routing checking failed. . 2020.05.29 23:22:11 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:22:11 - Disconnecting . 2020.05.29 23:22:11 - Management - Send 'signal SIGTERM' . 2020.05.29 23:22:11 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:22:11 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:22:11 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:22:11 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2020.05.29 23:22:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.202.107.19 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:22:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:22:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.10.8.1 . 2020.05.29 23:22:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:22:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.10.8.1 . 2020.05.29 23:22:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:22:16 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:22:16 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:22:16 - Connection terminated. . 2020.05.29 23:22:16 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.25.72.1) . 2020.05.29 23:22:16 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:22:19 - Checking authorization ... ! 2020.05.29 23:22:20 - Connecting to Larawag (Netherlands, Alblasserdam) . 2020.05.29 23:22:20 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:22:20 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:22:20 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:22:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:22:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:22:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:22:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.178:443 . 2020.05.29 23:22:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:22:20 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:22:20 - OpenVPN > UDP link remote: [AF_INET]134.19.179.178:443 . 2020.05.29 23:22:20 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.178:443, sid=536472f0 61544dba . 2020.05.29 23:22:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:22:21 - OpenVPN > Validating certificate key usage . 2020.05.29 23:22:21 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:22:21 - OpenVPN > VERIFY KU OK . 2020.05.29 23:22:21 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:22:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:22:21 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:22:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Larawag, emailAddress=info@airvpn.org . 2020.05.29 23:22:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:22:21 - OpenVPN > [Larawag] Peer Connection Initiated with [AF_INET]134.19.179.178:443 . 2020.05.29 23:22:22 - OpenVPN > SENT CONTROL [Larawag]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:22:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.33.232.1,route-gateway 10.33.232.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.33.232.79 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:22:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:22:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:22:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:22:22 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:22:22 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:22:22 - OpenVPN > open_tun . 2020.05.29 23:22:23 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:22:23 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:22:23 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.33.232.0/10.33.232.79/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:22:23 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.33.232.79/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.33.232.254, lease-time: 31536000] . 2020.05.29 23:22:23 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:22:23 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:22:27 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:22:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 134.19.179.178 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:22:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:22:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:22:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.33.232.1 . 2020.05.29 23:22:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:22:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:22:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.33.232.1 . 2020.05.29 23:22:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:22:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:22:27 - Starting Management Interface . 2020.05.29 23:22:27 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:22:27 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:22:27 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.10.8.1) to 10.33.232.1) . 2020.05.29 23:22:28 - Flushing DNS I 2020.05.29 23:22:32 - Checking route E 2020.05.29 23:22:32 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:22:32 - Checking route (2° try) E 2020.05.29 23:22:34 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:22:34 - Checking route (3° try) E 2020.05.29 23:22:36 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:22:36 - Routing checking failed. . 2020.05.29 23:22:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:22:37 - Disconnecting . 2020.05.29 23:22:37 - Management - Send 'signal SIGTERM' . 2020.05.29 23:22:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:22:37 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:22:37 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:22:37 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2020.05.29 23:22:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 134.19.179.178 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:22:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:22:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.33.232.1 . 2020.05.29 23:22:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:22:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.33.232.1 . 2020.05.29 23:22:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:22:42 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:22:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:22:42 - Connection terminated. . 2020.05.29 23:22:42 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.10.8.1) . 2020.05.29 23:22:42 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:22:45 - Checking authorization ... ! 2020.05.29 23:22:46 - Connecting to Chara (Netherlands, Alblasserdam) . 2020.05.29 23:22:46 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:22:46 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:22:46 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:22:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:22:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:22:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:22:46 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.232.227.132:443 . 2020.05.29 23:22:46 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:22:46 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:22:46 - OpenVPN > UDP link remote: [AF_INET]109.232.227.132:443 . 2020.05.29 23:22:46 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.132:443, sid=877f1d99 0b1717b0 . 2020.05.29 23:22:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:22:46 - OpenVPN > Validating certificate key usage . 2020.05.29 23:22:46 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:22:46 - OpenVPN > VERIFY KU OK . 2020.05.29 23:22:46 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:22:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:22:46 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:22:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chara, emailAddress=info@airvpn.org . 2020.05.29 23:22:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:22:47 - OpenVPN > [Chara] Peer Connection Initiated with [AF_INET]109.232.227.132:443 . 2020.05.29 23:22:48 - OpenVPN > SENT CONTROL [Chara]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:22:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.14.8.1,route-gateway 10.14.8.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.14.8.157 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:22:48 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:22:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:22:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:22:48 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:22:48 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:22:48 - OpenVPN > open_tun . 2020.05.29 23:22:48 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:22:48 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:22:48 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.14.8.0/10.14.8.157/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:22:48 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.14.8.157/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.14.8.254, lease-time: 31536000] . 2020.05.29 23:22:48 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:22:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:22:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:22:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.232.227.132 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:22:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:22:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:22:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.14.8.1 . 2020.05.29 23:22:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:22:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:22:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.14.8.1 . 2020.05.29 23:22:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:22:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:22:53 - Starting Management Interface . 2020.05.29 23:22:53 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:22:53 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:22:53 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.33.232.1) to 10.14.8.1) . 2020.05.29 23:22:53 - Flushing DNS I 2020.05.29 23:22:57 - Checking route E 2020.05.29 23:22:58 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:22:58 - Checking route (2° try) E 2020.05.29 23:22:59 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:22:59 - Checking route (3° try) E 2020.05.29 23:23:02 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:23:02 - Routing checking failed. . 2020.05.29 23:23:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:23:02 - Disconnecting . 2020.05.29 23:23:02 - Management - Send 'signal SIGTERM' . 2020.05.29 23:23:02 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:23:02 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:23:02 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:23:07 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.232.227.132 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:23:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:23:07 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.14.8.1 . 2020.05.29 23:23:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:23:07 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.14.8.1 . 2020.05.29 23:23:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:23:07 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:23:07 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:23:07 - Connection terminated. . 2020.05.29 23:23:07 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.33.232.1) . 2020.05.29 23:23:07 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:23:10 - Checking authorization ... ! 2020.05.29 23:23:11 - Connecting to Alphard (Netherlands, Alblasserdam) . 2020.05.29 23:23:11 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:23:11 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:23:11 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:23:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:23:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:23:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:23:11 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.9:443 . 2020.05.29 23:23:11 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:23:11 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:23:11 - OpenVPN > UDP link remote: [AF_INET]109.202.107.9:443 . 2020.05.29 23:23:11 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.9:443, sid=8070cd2d bd316afa . 2020.05.29 23:23:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:23:12 - OpenVPN > Validating certificate key usage . 2020.05.29 23:23:12 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:23:12 - OpenVPN > VERIFY KU OK . 2020.05.29 23:23:12 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:23:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:23:12 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:23:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alphard, emailAddress=info@airvpn.org . 2020.05.29 23:23:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:23:12 - OpenVPN > [Alphard] Peer Connection Initiated with [AF_INET]109.202.107.9:443 . 2020.05.29 23:23:13 - OpenVPN > SENT CONTROL [Alphard]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:23:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.7.40.1,route-gateway 10.7.40.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.7.40.178 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:23:13 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:23:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:23:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:23:13 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:23:13 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:23:13 - OpenVPN > open_tun . 2020.05.29 23:23:13 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:23:13 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:23:13 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.7.40.0/10.7.40.178/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:23:13 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.7.40.178/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.7.40.254, lease-time: 31536000] . 2020.05.29 23:23:13 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:23:13 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:23:18 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:23:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.9 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:23:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:23:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:23:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.7.40.1 . 2020.05.29 23:23:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:23:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:23:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.7.40.1 . 2020.05.29 23:23:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:23:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:23:18 - Starting Management Interface . 2020.05.29 23:23:18 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:23:18 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:23:18 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.14.8.1) to 10.7.40.1) . 2020.05.29 23:23:19 - Flushing DNS I 2020.05.29 23:23:23 - Checking route E 2020.05.29 23:23:23 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:23:23 - Checking route (2° try) E 2020.05.29 23:23:25 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:23:25 - Checking route (3° try) E 2020.05.29 23:23:27 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:23:27 - Routing checking failed. . 2020.05.29 23:23:27 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:23:27 - Disconnecting . 2020.05.29 23:23:27 - Management - Send 'signal SIGTERM' . 2020.05.29 23:23:27 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:23:27 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:23:27 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:23:27 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2020.05.29 23:23:32 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.202.107.9 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:23:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:23:32 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.7.40.1 . 2020.05.29 23:23:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:23:32 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.7.40.1 . 2020.05.29 23:23:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:23:32 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:23:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:23:32 - Connection terminated. . 2020.05.29 23:23:32 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.14.8.1) . 2020.05.29 23:23:32 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:23:35 - Checking authorization ... ! 2020.05.29 23:23:36 - Connecting to Jabbah (Netherlands, Alblasserdam) . 2020.05.29 23:23:36 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:23:36 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:23:36 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:23:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:23:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:23:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:23:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.108:443 . 2020.05.29 23:23:36 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:23:36 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:23:36 - OpenVPN > UDP link remote: [AF_INET]213.152.162.108:443 . 2020.05.29 23:23:36 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.108:443, sid=7d32a323 d6ec22b0 . 2020.05.29 23:23:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:23:36 - OpenVPN > Validating certificate key usage . 2020.05.29 23:23:36 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:23:36 - OpenVPN > VERIFY KU OK . 2020.05.29 23:23:36 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:23:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:23:36 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:23:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Jabbah, emailAddress=info@airvpn.org . 2020.05.29 23:23:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:23:36 - OpenVPN > [Jabbah] Peer Connection Initiated with [AF_INET]213.152.162.108:443 . 2020.05.29 23:23:37 - OpenVPN > SENT CONTROL [Jabbah]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:23:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.19.200.1,route-gateway 10.19.200.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.19.200.138 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:23:37 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:23:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:23:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:23:37 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:23:37 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:23:37 - OpenVPN > open_tun . 2020.05.29 23:23:38 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:23:38 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:23:38 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.19.200.0/10.19.200.138/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:23:38 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.19.200.138/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.19.200.254, lease-time: 31536000] . 2020.05.29 23:23:38 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:23:38 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:23:43 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:23:43 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.108 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:23:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:23:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:23:43 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.19.200.1 . 2020.05.29 23:23:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:23:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:23:43 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.19.200.1 . 2020.05.29 23:23:43 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:23:43 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:23:43 - Starting Management Interface . 2020.05.29 23:23:43 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:23:43 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:23:43 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.7.40.1) to 10.19.200.1) . 2020.05.29 23:23:43 - Flushing DNS I 2020.05.29 23:23:47 - Checking route E 2020.05.29 23:23:48 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:23:48 - Checking route (2° try) E 2020.05.29 23:23:49 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:23:49 - Checking route (3° try) E 2020.05.29 23:23:52 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:23:52 - Routing checking failed. . 2020.05.29 23:23:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:23:52 - Disconnecting . 2020.05.29 23:23:52 - Management - Send 'signal SIGTERM' . 2020.05.29 23:23:52 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:23:52 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:23:52 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:23:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.108 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:23:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:23:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.19.200.1 . 2020.05.29 23:23:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:23:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.19.200.1 . 2020.05.29 23:23:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:23:57 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:23:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:23:57 - Connection terminated. . 2020.05.29 23:23:57 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.7.40.1) . 2020.05.29 23:23:57 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:24:00 - Checking authorization ... ! 2020.05.29 23:24:01 - Connecting to Capella (Netherlands, Alblasserdam) . 2020.05.29 23:24:01 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:24:01 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:24:01 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:24:01 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:24:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:24:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:24:01 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.138:443 . 2020.05.29 23:24:01 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:24:01 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:24:01 - OpenVPN > UDP link remote: [AF_INET]134.19.179.138:443 . 2020.05.29 23:24:01 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.138:443, sid=f9a8ab1f d5a5c516 . 2020.05.29 23:24:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:24:01 - OpenVPN > Validating certificate key usage . 2020.05.29 23:24:01 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:24:01 - OpenVPN > VERIFY KU OK . 2020.05.29 23:24:01 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:24:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:24:01 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:24:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Capella, emailAddress=info@airvpn.org . 2020.05.29 23:24:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:24:02 - OpenVPN > [Capella] Peer Connection Initiated with [AF_INET]134.19.179.138:443 . 2020.05.29 23:24:03 - OpenVPN > SENT CONTROL [Capella]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:24:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.33.168.1,route-gateway 10.33.168.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.33.168.173 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:24:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:24:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:24:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:24:03 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:24:03 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:24:03 - OpenVPN > open_tun . 2020.05.29 23:24:03 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:24:03 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:24:03 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.33.168.0/10.33.168.173/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:24:03 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.33.168.173/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.33.168.254, lease-time: 31536000] . 2020.05.29 23:24:03 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:24:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:24:08 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:24:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 134.19.179.138 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:24:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:24:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:24:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.33.168.1 . 2020.05.29 23:24:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:24:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:24:08 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.33.168.1 . 2020.05.29 23:24:08 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:24:08 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:24:08 - Starting Management Interface . 2020.05.29 23:24:08 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:24:08 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:24:08 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.19.200.1) to 10.33.168.1) . 2020.05.29 23:24:08 - Flushing DNS I 2020.05.29 23:24:12 - Checking route E 2020.05.29 23:24:13 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:24:13 - Checking route (2° try) E 2020.05.29 23:24:15 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:24:15 - Checking route (3° try) E 2020.05.29 23:24:17 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:24:17 - Routing checking failed. . 2020.05.29 23:24:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:24:17 - Disconnecting . 2020.05.29 23:24:17 - Management - Send 'signal SIGTERM' . 2020.05.29 23:24:17 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:24:17 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:24:17 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:24:22 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 134.19.179.138 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:24:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:24:22 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.33.168.1 . 2020.05.29 23:24:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:24:22 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.33.168.1 . 2020.05.29 23:24:22 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:24:22 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:24:22 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:24:22 - Connection terminated. . 2020.05.29 23:24:22 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.19.200.1) . 2020.05.29 23:24:22 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:24:25 - Checking authorization ... ! 2020.05.29 23:24:26 - Connecting to Alphirk (Netherlands, Alblasserdam) . 2020.05.29 23:24:26 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:24:26 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:24:26 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:24:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:24:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:24:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:24:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.146:443 . 2020.05.29 23:24:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:24:26 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:24:26 - OpenVPN > UDP link remote: [AF_INET]109.202.107.146:443 . 2020.05.29 23:24:26 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.146:443, sid=af04fa78 1692de97 . 2020.05.29 23:24:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:24:26 - OpenVPN > Validating certificate key usage . 2020.05.29 23:24:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:24:26 - OpenVPN > VERIFY KU OK . 2020.05.29 23:24:26 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:24:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:24:26 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:24:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alphirk, emailAddress=info@airvpn.org . 2020.05.29 23:24:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:24:26 - OpenVPN > [Alphirk] Peer Connection Initiated with [AF_INET]109.202.107.146:443 . 2020.05.29 23:24:28 - OpenVPN > SENT CONTROL [Alphirk]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:24:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.7.104.1,route-gateway 10.7.104.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.7.104.185 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:24:30 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:24:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:24:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:24:30 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:24:30 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:24:30 - OpenVPN > open_tun . 2020.05.29 23:24:31 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:24:31 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:24:31 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.7.104.0/10.7.104.185/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:24:31 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.7.104.185/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.7.104.254, lease-time: 31536000] . 2020.05.29 23:24:31 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:24:31 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:24:36 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:24:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.202.107.146 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:24:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:24:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:24:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.7.104.1 . 2020.05.29 23:24:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:24:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:24:36 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.7.104.1 . 2020.05.29 23:24:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:24:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:24:36 - Starting Management Interface . 2020.05.29 23:24:36 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:24:36 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:24:36 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.33.168.1) to 10.7.104.1) . 2020.05.29 23:24:36 - Flushing DNS I 2020.05.29 23:24:40 - Checking route E 2020.05.29 23:24:41 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:24:41 - Checking route (2° try) E 2020.05.29 23:24:42 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:24:42 - Checking route (3° try) E 2020.05.29 23:24:45 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:24:45 - Routing checking failed. . 2020.05.29 23:24:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:24:45 - Disconnecting . 2020.05.29 23:24:45 - Management - Send 'signal SIGTERM' . 2020.05.29 23:24:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:24:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:24:45 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2020.05.29 23:24:45 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:24:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.202.107.146 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:24:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:24:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.7.104.1 . 2020.05.29 23:24:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:24:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.7.104.1 . 2020.05.29 23:24:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:24:50 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:24:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:24:50 - Connection terminated. . 2020.05.29 23:24:50 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.33.168.1) . 2020.05.29 23:24:50 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:24:53 - Checking authorization ... ! 2020.05.29 23:24:54 - Connecting to Musica (Netherlands, Alblasserdam) . 2020.05.29 23:24:54 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:24:54 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:24:54 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:24:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:24:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:24:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:24:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.248:443 . 2020.05.29 23:24:54 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:24:54 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:24:54 - OpenVPN > UDP link remote: [AF_INET]213.152.161.248:443 . 2020.05.29 23:24:54 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.248:443, sid=e28198b6 5e8347e3 . 2020.05.29 23:24:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:24:54 - OpenVPN > Validating certificate key usage . 2020.05.29 23:24:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:24:54 - OpenVPN > VERIFY KU OK . 2020.05.29 23:24:54 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:24:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:24:54 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:24:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Musica, emailAddress=info@airvpn.org . 2020.05.29 23:24:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:24:54 - OpenVPN > [Musica] Peer Connection Initiated with [AF_INET]213.152.161.248:443 . 2020.05.29 23:24:56 - OpenVPN > SENT CONTROL [Musica]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:24:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.24.168.1,route-gateway 10.24.168.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.24.168.137 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:24:56 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:24:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:24:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:24:56 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:24:56 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:24:56 - OpenVPN > open_tun . 2020.05.29 23:24:56 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:24:56 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:24:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.24.168.0/10.24.168.137/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:24:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.24.168.137/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.24.168.254, lease-time: 31536000] . 2020.05.29 23:24:56 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:24:56 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:25:01 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:25:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.248 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:25:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:25:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:25:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.24.168.1 . 2020.05.29 23:25:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:25:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:25:01 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.24.168.1 . 2020.05.29 23:25:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:25:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:25:01 - Starting Management Interface . 2020.05.29 23:25:01 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:25:01 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:25:01 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.7.104.1) to 10.24.168.1) . 2020.05.29 23:25:01 - Flushing DNS I 2020.05.29 23:25:05 - Checking route E 2020.05.29 23:25:06 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:25:06 - Checking route (2° try) E 2020.05.29 23:25:07 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:25:07 - Checking route (3° try) E 2020.05.29 23:25:10 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version E 2020.05.29 23:25:10 - Routing checking failed. . 2020.05.29 23:25:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2020.05.29 23:25:10 - Disconnecting . 2020.05.29 23:25:10 - Management - Send 'signal SIGTERM' . 2020.05.29 23:25:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:25:10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:25:10 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:25:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.248 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:25:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:25:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.24.168.1 . 2020.05.29 23:25:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:25:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.24.168.1 . 2020.05.29 23:25:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:25:15 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:25:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:25:15 - Connection terminated. . 2020.05.29 23:25:15 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.7.104.1) . 2020.05.29 23:25:15 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:25:18 - Checking authorization ... ! 2020.05.29 23:25:19 - Connecting to Talitha (Netherlands, Alblasserdam) . 2020.05.29 23:25:19 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017 . 2020.05.29 23:25:19 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.29 23:25:19 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 . 2020.05.29 23:25:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.05.29 23:25:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:25:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.05.29 23:25:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.137:443 . 2020.05.29 23:25:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2020.05.29 23:25:19 - OpenVPN > UDP link local: (not bound) . 2020.05.29 23:25:19 - OpenVPN > UDP link remote: [AF_INET]213.152.161.137:443 . 2020.05.29 23:25:19 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.137:443, sid=78e71c1c f58fe524 . 2020.05.29 23:25:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.29 23:25:19 - OpenVPN > Validating certificate key usage . 2020.05.29 23:25:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.05.29 23:25:19 - OpenVPN > VERIFY KU OK . 2020.05.29 23:25:19 - OpenVPN > Validating certificate extended key usage . 2020.05.29 23:25:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.29 23:25:19 - OpenVPN > VERIFY EKU OK . 2020.05.29 23:25:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Talitha, emailAddress=info@airvpn.org . 2020.05.29 23:25:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.29 23:25:19 - OpenVPN > [Talitha] Peer Connection Initiated with [AF_INET]213.152.161.137:443 . 2020.05.29 23:25:20 - OpenVPN > SENT CONTROL [Talitha]: 'PUSH_REQUEST' (status=1) . 2020.05.29 23:25:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.31.8.1,route-gateway 10.31.8.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.31.8.86 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.29 23:25:20 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.29 23:25:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:25:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.29 23:25:20 - OpenVPN > interactive service msg_channel=0 . 2020.05.29 23:25:20 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=8 HWADDR=a0:f3:c1:24:eb:a7 . 2020.05.29 23:25:21 - OpenVPN > open_tun . 2020.05.29 23:25:21 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}.tap . 2020.05.29 23:25:21 - OpenVPN > TAP-Windows Driver Version 9.21 . 2020.05.29 23:25:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.31.8.0/10.31.8.86/255.255.255.0 [SUCCEEDED] . 2020.05.29 23:25:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.31.8.86/255.255.255.0 on interface {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} [DHCP-serv: 10.31.8.254, lease-time: 31536000] . 2020.05.29 23:25:21 - OpenVPN > Successful ARP Flush on interface [10] {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} . 2020.05.29 23:25:21 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2020.05.29 23:25:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.29 23:25:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.137 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:25:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2020.05.29 23:25:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:25:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.31.8.1 . 2020.05.29 23:25:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:25:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:25:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.31.8.1 . 2020.05.29 23:25:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2020.05.29 23:25:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.29 23:25:26 - Starting Management Interface . 2020.05.29 23:25:26 - OpenVPN > Initialization Sequence Completed . 2020.05.29 23:25:26 - DNS leak protection with packet filtering enabled. . 2020.05.29 23:25:26 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.24.168.1) to 10.31.8.1) . 2020.05.29 23:25:26 - Flushing DNS I 2020.05.29 23:25:30 - Checking route E 2020.05.29 23:25:30 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:25:30 - Checking route (2° try) E 2020.05.29 23:25:32 - curl: (35) error:1407742E:SSL routines:SSL23_GET_SERVER_HELLO:tlsv1 alert protocol version . 2020.05.29 23:25:32 - Checking route (3° try) ! 2020.05.29 23:25:34 - Disconnecting . 2020.05.29 23:25:34 - Management - Send 'signal SIGTERM' . 2020.05.29 23:25:34 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.05.29 23:25:39 - Connection terminated. . 2020.05.29 23:25:39 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.24.168.1) . 2020.05.29 23:25:39 - DNS leak protection with packet filtering disabled. I 2020.05.29 23:25:39 - Cancel requested. . 2020.05.29 23:25:39 - IPv6 restored with packet filtering. . 2020.05.29 23:25:39 - Flushing DNS ! 2020.05.29 23:25:43 - Session terminated. E 2020.05.29 23:25:44 - curl: (28) Connection timed out after 10047 milliseconds . 2020.05.29 23:25:44 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2020.05.29 23:25:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.05.29 23:25:44 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.05.29 23:25:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.137 MASK 255.255.255.255 192.168.0.1 . 2020.05.29 23:25:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:25:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.31.8.1 . 2020.05.29 23:25:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:25:44 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.31.8.1 . 2020.05.29 23:25:44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.05.29 23:25:44 - OpenVPN > Closing TUN/TAP interface . 2020.05.29 23:25:44 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.05.29 23:29:14 - Updating systems & servers data ... . 2020.05.29 23:29:15 - Systems & servers data update completed -- System -- Operating System: Microsoft Windows NT 10.0.18362.0 Network Interface: Ethernet (Realtek PCIe GbE Family Controller, ID:{198A4B88-7AC3-4DA2-A5C1-795D8721E02F}) - Ethernet - Down Network Interface: Local Area Connection* 1 (Microsoft Wi-Fi Direct Virtual Adapter, ID:{F6255F87-D147-4715-8733-049D327C9F4B}) - Wireless80211 - Down Network Interface: Local Area Connection* 11 (Microsoft Wi-Fi Direct Virtual Adapter #2, ID:{E9667F7F-5B0B-4621-8B26-A407F18A2A9A}) - Wireless80211 - Down Network Interface: Ethernet 2 (TAP-Windows Adapter V9, ID:{726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B}) - Ethernet - Down Network Interface: WiFi (Qualcomm Atheros AR938x Wireless Network Adapter, ID:{4134EE65-8265-43FD-974E-8D81DCF65BAF}) - Wireless80211 - Up Network Interface: Loopback Pseudo-Interface 1 (Software Loopback Interface 1, ID:{F5EF2E9E-DB15-11E7-81B0-806E6F6E6963}) - Loopback - Up Routing: Address: 0.0.0.0, Mask: 0.0.0.0, Gateway: 192.168.0.1, Interface: 8, Metrics: 40, Flags: , Mss: , Window: , Irtt: Address: 169.254.0.0, Mask: 255.255.0.0, Gateway: 192.168.0.50, Interface: 8, Metrics: 41, Flags: , Mss: , Window: , Irtt: Default gateways: 192.168.0.1, Qualcomm Atheros AR938x Wireless Network Adapter -- Windows -- ipconfig /all Windows IP Configuration Host Name . . . . . . . . . . . . : HOME8 Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek PCIe GbE Family Controller Physical Address. . . . . . . . . : 94-DE-80-78-BC-66 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 12-F3-C1-24-EB-A7 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 11: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2 Physical Address. . . . . . . . . : 22-F3-C1-24-EB-A7 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Ethernet adapter Ethernet 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-72-6F-12-3E DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter WiFi: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Qualcomm Atheros AR938x Wireless Network Adapter Physical Address. . . . . . . . . : A0-F3-C1-24-EB-A7 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::ec64:e7c9:828c:6b6f%8(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.0.4(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : 29 May 2020 15:16:37 Lease Expires . . . . . . . . . . : 30 May 2020 15:16:37 Default Gateway . . . . . . . . . : 192.168.0.1 DHCP Server . . . . . . . . . . . : 192.168.0.1 DHCPv6 IAID . . . . . . . . . . . : 111211457 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-37-78-12-94-DE-80-78-BC-66 DNS Servers . . . . . . . . . . . : 192.168.0.1 NetBIOS over Tcpip. . . . . . . . : Enabled -- NetworkAdapterConfiguration Network Adapter: [00000000] Microsoft Kernel Debug Network Adapter DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000000] Microsoft Kernel Debug Network Adapter DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: Microsoft Kernel Debug Network Adapter DHCPEnabled: true DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 0 InterfaceIndex: 11 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: null MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: kdnic SettingID: {7CBE7845-FCCA-430B-9043-466612618A25} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000001] TAP-Windows Adapter V9 DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000001] TAP-Windows Adapter V9 DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: TAP-Windows Adapter V9 DHCPEnabled: true DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 1 InterfaceIndex: 10 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: 00:FF:72:6F:12:3E MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: tap0901 SettingID: {726F123E-C2F3-49ED-B8C7-AD3FB73D1A8B} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000002] Qualcomm Atheros AR938x Wireless Network Adapter DNS: 192.168.0.1 Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000002] Qualcomm Atheros AR938x Wireless Network Adapter DatabasePath: %SystemRoot%\System32\drivers\etc DeadGWDetectEnabled: null DefaultIPGateway: 192.168.0.1 DefaultTOS: null DefaultTTL: null Description: Qualcomm Atheros AR938x Wireless Network Adapter DHCPEnabled: true DHCPLeaseExpires: 20200530151637.000000+060 DHCPLeaseObtained: 20200529151637.000000+060 DHCPServer: 192.168.0.1 DNSDomain: null DNSDomainSuffixSearchOrder: DNSEnabledForWINSResolution: false DNSHostName: HOME8 DNSServerSearchOrder: 192.168.0.1 DomainDNSRegistrationEnabled: false ForwardBufferMemory: null FullDNSRegistrationEnabled: true GatewayCostMetric: System.UInt16[] IGMPLevel: null Index: 2 InterfaceIndex: 8 IPAddress: 192.168.0.4,fe80::ec64:e7c9:828c:6b6f IPConnectionMetric: 40 IPEnabled: true IPFilterSecurityEnabled: false IPPortSecurityEnabled: null IPSecPermitIPProtocols: IPSecPermitTCPPorts: IPSecPermitUDPPorts: IPSubnet: 255.255.255.0,64 IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: A0:F3:C1:24:EB:A7 MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: athr SettingID: {4134EE65-8265-43FD-974E-8D81DCF65BAF} TcpipNetbiosOptions: 0 TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: true WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: WINSSecondaryServer: null Network Adapter: [00000003] Realtek PCIe GbE Family Controller DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000003] Realtek PCIe GbE Family Controller DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: Realtek PCIe GbE Family Controller DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 3 InterfaceIndex: 5 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: 94:DE:80:78:BC:66 MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: rt640x64 SettingID: {198A4B88-7AC3-4DA2-A5C1-795D8721E02F} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000004] Microsoft Wi-Fi Direct Virtual Adapter DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000004] Microsoft Wi-Fi Direct Virtual Adapter DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: Microsoft Wi-Fi Direct Virtual Adapter DHCPEnabled: true DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 4 InterfaceIndex: 22 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: 12:F3:C1:24:EB:A7 MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: vwifimp SettingID: {F6255F87-D147-4715-8733-049D327C9F4B} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000005] WAN Miniport (SSTP) DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000005] WAN Miniport (SSTP) DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: WAN Miniport (SSTP) DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 5 InterfaceIndex: 4 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: null MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: RasSstp SettingID: {14F63973-417D-430A-913A-8FDF5B6395CF} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000006] WAN Miniport (IKEv2) DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000006] WAN Miniport (IKEv2) DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: WAN Miniport (IKEv2) DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 6 InterfaceIndex: 6 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: null MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: RasAgileVpn SettingID: {2300350F-D959-4B5B-B4C5-9AA99B34C746} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000007] WAN Miniport (L2TP) DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000007] WAN Miniport (L2TP) DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: WAN Miniport (L2TP) DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 7 InterfaceIndex: 13 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: null MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: Rasl2tp SettingID: {9D8B3855-0B7D-4060-AA05-D6929934CE73} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000008] WAN Miniport (PPTP) DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000008] WAN Miniport (PPTP) DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: WAN Miniport (PPTP) DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 8 InterfaceIndex: 19 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: null MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: PptpMiniport SettingID: {CF0B200C-11BD-4FBE-82B3-CE7C4AAED1E8} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000009] WAN Miniport (PPPOE) DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000009] WAN Miniport (PPPOE) DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: WAN Miniport (PPPOE) DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 9 InterfaceIndex: 16 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: null MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: RasPppoe SettingID: {C05E5A13-D325-4A71-9B0D-E5603725C6E1} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000010] WAN Miniport (IP) DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000010] WAN Miniport (IP) DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: WAN Miniport (IP) DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 10 InterfaceIndex: 17 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: 28:F2:20:52:41:53 MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: NdisWan SettingID: {C3B10829-0AB9-45B3-82DF-BA08165DA79F} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000011] WAN Miniport (IPv6) DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000011] WAN Miniport (IPv6) DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: WAN Miniport (IPv6) DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 11 InterfaceIndex: 18 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: 28:E7:20:52:41:53 MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: NdisWan SettingID: {C8472531-96BD-4975-904C-6C5C216BF348} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000012] WAN Miniport (Network Monitor) DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000012] WAN Miniport (Network Monitor) DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: WAN Miniport (Network Monitor) DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 12 InterfaceIndex: 15 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: 2A:7D:20:52:41:53 MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: NdisWan SettingID: {A5329D43-8399-4F6E-B937-1ADE604C3D02} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000013] Microsoft Wi-Fi Direct Virtual Adapter DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000013] Microsoft Wi-Fi Direct Virtual Adapter DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: Microsoft Wi-Fi Direct Virtual Adapter DHCPEnabled: true DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 13 InterfaceIndex: 21 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: 22:F3:C1:24:EB:A7 MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: vwifimp SettingID: {E9667F7F-5B0B-4621-8B26-A407F18A2A9A} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000014] RAS Async Adapter DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000014] RAS Async Adapter DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: RAS Async Adapter DHCPEnabled: false DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 14 InterfaceIndex: 45 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: null MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: AsyncMac SettingID: {00770D0D-DD7E-43DA-9DF8-29D74507141C} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null Network Adapter: [00000015] Realtek 8812BU Wireless LAN 802.11ac USB NIC DNS: null Details: ArpAlwaysSourceRoute: null ArpUseEtherSNAP: null Caption: [00000015] Realtek 8812BU Wireless LAN 802.11ac USB NIC DatabasePath: null DeadGWDetectEnabled: null DefaultIPGateway: null DefaultTOS: null DefaultTTL: null Description: Realtek 8812BU Wireless LAN 802.11ac USB NIC DHCPEnabled: true DHCPLeaseExpires: null DHCPLeaseObtained: null DHCPServer: null DNSDomain: null DNSDomainSuffixSearchOrder: null DNSEnabledForWINSResolution: null DNSHostName: null DNSServerSearchOrder: null DomainDNSRegistrationEnabled: null ForwardBufferMemory: null FullDNSRegistrationEnabled: null GatewayCostMetric: null IGMPLevel: null Index: 15 InterfaceIndex: 9 IPAddress: null IPConnectionMetric: null IPEnabled: false IPFilterSecurityEnabled: null IPPortSecurityEnabled: null IPSecPermitIPProtocols: null IPSecPermitTCPPorts: null IPSecPermitUDPPorts: null IPSubnet: null IPUseZeroBroadcast: null IPXAddress: null IPXEnabled: null IPXFrameType: null IPXMediaType: null IPXNetworkNumber: null IPXVirtualNetNumber: null KeepAliveInterval: null KeepAliveTime: null MACAddress: null MTU: null NumForwardPackets: null PMTUBHDetectEnabled: null PMTUDiscoveryEnabled: null ServiceName: RtlWlanu SettingID: {6D602A89-D067-4467-BF7C-24A8543E929D} TcpipNetbiosOptions: null TcpMaxConnectRetransmissions: null TcpMaxDataRetransmissions: null TcpNumConnections: null TcpUseRFC1122UrgentPointer: null TcpWindowSize: null WINSEnableLMHostsLookup: null WINSHostLookupFile: null WINSPrimaryServer: null WINSScopeID: null WINSSecondaryServer: null