Jump to content
Not connected, Your IP: 34.203.242.200

Search the Community

Showing results for tags 'dropped connection'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 5 results

  1. The UI doesn't display any latencies of the servers and no matter which serve I'm on, the internet connection will drop often when I'm connected to the VPN. I've tried reinstalling more than once and the problem persists. That's the best I can explain it. . 2023.02.27 23:40:42 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.22621.0, Mono/.Net: v4.0.30319 . 2023.02.27 23:40:43 - Command line arguments (1): path="home" . 2023.02.27 23:40:44 - Reading options from C:\Users\omarr\AppData\Local\Eddie\default.profile . 2023.02.27 23:40:46 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2023.02.27 23:40:46 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2023.02.27 23:40:46 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2023.02.27 23:40:47 - Ready . 2023.02.27 23:40:48 - Collect information about AirVPN completed I 2023.02.27 23:40:56 - Checking login ... ! 2023.02.27 23:40:57 - Logged in. I 2023.02.27 23:41:11 - Session starting. I 2023.02.27 23:41:12 - Checking authorization ... . 2023.02.27 23:41:13 - Added new network interface "Eddie", Wintun version 0.12 . 2023.02.27 23:41:13 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2023.02.27 23:41:13 - Connecting to Sculptor (United States of America, Atlanta, Georgia) . 2023.02.27 23:41:14 - Routes, add 64.42.179.37/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.02.27 23:41:14 - Routes, add 64.42.179.37/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists. . 2023.02.27 23:41:14 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.02.27 23:41:14 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.02.27 23:41:14 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.02.27 23:41:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.02.27 23:41:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.02.27 23:41:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.02.27 23:41:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.02.27 23:41:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.37:443 . 2023.02.27 23:41:14 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.02.27 23:41:14 - OpenVPN > UDP link local: (not bound) . 2023.02.27 23:41:14 - OpenVPN > UDP link remote: [AF_INET]64.42.179.37:443 . 2023.02.27 23:41:14 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.37:443, sid=c166c72a 3c7e4a7c . 2023.02.27 23:41:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.27 23:41:14 - OpenVPN > VERIFY KU OK . 2023.02.27 23:41:14 - OpenVPN > Validating certificate extended key usage . 2023.02.27 23:41:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.27 23:41:14 - OpenVPN > VERIFY EKU OK . 2023.02.27 23:41:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sculptor, emailAddress=info@airvpn.org . 2023.02.27 23:41:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.27 23:41:14 - OpenVPN > [Sculptor] Peer Connection Initiated with [AF_INET]64.42.179.37:443 . 2023.02.27 23:41:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.82.1,dhcp-option DNS6 fde6:7a:7d20:1352::1,tun-ipv6,route-gateway 10.23.82.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1352::10c7/64 fde6:7a:7d20:1352::1,ifconfig 10.23.82.201 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.02.27 23:41:15 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.02.27 23:41:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.82.1' . 2023.02.27 23:41:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1352::1' . 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.02.27 23:41:15 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.02.27 23:41:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.27 23:41:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.27 23:41:15 - OpenVPN > interactive service msg_channel=0 . 2023.02.27 23:41:15 - OpenVPN > open_tun . 2023.02.27 23:41:15 - OpenVPN > wintun device [Eddie] opened . 2023.02.27 23:41:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.23.82.201 255.255.255.0 . 2023.02.27 23:41:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all . 2023.02.27 23:41:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all . 2023.02.27 23:41:15 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.02.27 23:41:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 44 fde6:7a:7d20:1352::10c7/128 store=active . 2023.02.27 23:41:15 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1352::/64 -> fde6:7a:7d20:1352::10c7 metric 0) dev Eddie . 2023.02.27 23:41:16 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1352::/64 44 fe80::8 store=active . 2023.02.27 23:41:16 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.02.27 23:41:16 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 44 all . 2023.02.27 23:41:16 - OpenVPN > IPv6 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.02.27 23:41:16 - OpenVPN > Initialization Sequence Completed . 2023.02.27 23:41:16 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.02.27 23:41:16 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.02.27 23:41:16 - DNS leak protection with packet filtering enabled. . 2023.02.27 23:41:16 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.82.1) . 2023.02.27 23:41:16 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1352::1) . 2023.02.27 23:41:17 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:41:17 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:41:18 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:41:18 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:41:18 - Routes, add 64.42.179.35/32 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:41:19 - Routes, add 2605:9f80:6000:77:25ba:81d8:c17b:536b/128 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:41:19 - Flushing DNS I 2023.02.27 23:41:19 - Checking route IPv4 I 2023.02.27 23:41:19 - Checking route IPv6 I 2023.02.27 23:41:20 - Checking DNS ! 2023.02.27 23:41:20 - Connected. ! 2023.02.27 23:53:39 - Disconnecting . 2023.02.27 23:53:39 - Sending soft termination signal . 2023.02.27 23:53:43 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.02.27 23:53:44 - OpenVPN > Closing TUN/TAP interface . 2023.02.27 23:53:44 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1352::/64) . 2023.02.27 23:53:44 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1352::/64 44 fe80::8 store=active . 2023.02.27 23:53:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 44 fde6:7a:7d20:1352::10c7 store=active . 2023.02.27 23:53:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 44 10.23.82.201 store=active . 2023.02.27 23:53:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.02.27 23:53:46 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:46 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:46 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:47 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:47 - Routes, delete 64.42.179.37/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.02.27 23:53:47 - Routes, delete 64.42.179.35/32 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:48 - Routes, delete 2605:9f80:6000:77:25ba:81d8:c17b:536b/128 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:48 - Routes, delete 64.42.179.37/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", not exists. . 2023.02.27 23:53:48 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.02.27 23:53:48 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.02.27 23:53:48 - DNS leak protection with packet filtering disabled. . 2023.02.27 23:53:48 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.02.27 23:53:48 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.02.27 23:53:48 - Connection terminated. I 2023.02.27 23:53:48 - Checking authorization ... . 2023.02.27 23:53:49 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2023.02.27 23:53:49 - Connecting to Ursa (United States of America, Atlanta, Georgia) . 2023.02.27 23:53:50 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.02.27 23:53:50 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists. . 2023.02.27 23:53:50 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.02.27 23:53:50 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.02.27 23:53:50 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.02.27 23:53:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.02.27 23:53:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.02.27 23:53:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.02.27 23:53:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.02.27 23:53:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.53:443 . 2023.02.27 23:53:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.02.27 23:53:50 - OpenVPN > UDP link local: (not bound) . 2023.02.27 23:53:50 - OpenVPN > UDP link remote: [AF_INET]64.42.179.53:443 . 2023.02.27 23:53:50 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.53:443, sid=2f491c10 4764d9bd . 2023.02.27 23:53:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.27 23:53:51 - OpenVPN > VERIFY KU OK . 2023.02.27 23:53:51 - OpenVPN > Validating certificate extended key usage . 2023.02.27 23:53:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.27 23:53:51 - OpenVPN > VERIFY EKU OK . 2023.02.27 23:53:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.27 23:53:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.27 23:53:51 - OpenVPN > [Ursa] Peer Connection Initiated with [AF_INET]64.42.179.53:443 . 2023.02.27 23:53:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.146.1,dhcp-option DNS6 fde6:7a:7d20:1392::1,tun-ipv6,route-gateway 10.23.146.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1392::100a/64 fde6:7a:7d20:1392::1,ifconfig 10.23.146.12 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2023.02.27 23:53:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.02.27 23:53:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.146.1' . 2023.02.27 23:53:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1392::1' . 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.02.27 23:53:51 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.02.27 23:53:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.27 23:53:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.27 23:53:51 - OpenVPN > interactive service msg_channel=0 . 2023.02.27 23:53:51 - OpenVPN > open_tun . 2023.02.27 23:53:51 - OpenVPN > wintun device [Eddie] opened . 2023.02.27 23:53:51 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.23.146.12 255.255.255.0 . 2023.02.27 23:53:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all . 2023.02.27 23:53:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all . 2023.02.27 23:53:52 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.02.27 23:53:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 44 fde6:7a:7d20:1392::100a/128 store=active . 2023.02.27 23:53:52 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1392::/64 -> fde6:7a:7d20:1392::100a metric 0) dev Eddie . 2023.02.27 23:53:52 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1392::/64 44 fe80::8 store=active . 2023.02.27 23:53:52 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.02.27 23:53:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 44 all . 2023.02.27 23:53:53 - OpenVPN > IPv6 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.02.27 23:53:53 - OpenVPN > Initialization Sequence Completed . 2023.02.27 23:53:53 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.02.27 23:53:53 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.02.27 23:53:53 - DNS leak protection with packet filtering enabled. . 2023.02.27 23:53:54 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.146.1) . 2023.02.27 23:53:54 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1392::1) . 2023.02.27 23:53:54 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:55 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:55 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:56 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:56 - Routes, add 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:56 - Routes, add 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:56 - Flushing DNS I 2023.02.27 23:53:57 - Checking route IPv4 I 2023.02.27 23:53:57 - Checking route IPv6 I 2023.02.27 23:53:57 - Checking DNS ! 2023.02.27 23:53:58 - Connected. . 2023.02.28 00:10:56 - Collect information about AirVPN completed . 2023.02.28 00:41:02 - Collect information about AirVPN completed . 2023.02.28 00:53:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 00:53:47 - OpenVPN > VERIFY KU OK . 2023.02.28 00:53:47 - OpenVPN > Validating certificate extended key usage . 2023.02.28 00:53:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 00:53:47 - OpenVPN > VERIFY EKU OK . 2023.02.28 00:53:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 00:53:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 00:53:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 00:53:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 01:11:04 - Collect information about AirVPN completed . 2023.02.28 01:41:07 - Collect information about AirVPN completed . 2023.02.28 01:53:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 01:53:44 - OpenVPN > VERIFY KU OK . 2023.02.28 01:53:44 - OpenVPN > Validating certificate extended key usage . 2023.02.28 01:53:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 01:53:44 - OpenVPN > VERIFY EKU OK . 2023.02.28 01:53:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 01:53:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 01:53:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 01:53:44 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 02:11:10 - Collect information about AirVPN completed . 2023.02.28 02:41:16 - Collect information about AirVPN completed . 2023.02.28 02:53:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 02:53:41 - OpenVPN > VERIFY KU OK . 2023.02.28 02:53:41 - OpenVPN > Validating certificate extended key usage . 2023.02.28 02:53:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 02:53:41 - OpenVPN > VERIFY EKU OK . 2023.02.28 02:53:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 02:53:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 02:53:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 02:53:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 03:11:18 - Collect information about AirVPN completed . 2023.02.28 03:41:20 - Collect information about AirVPN completed . 2023.02.28 03:53:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 03:53:38 - OpenVPN > VERIFY KU OK . 2023.02.28 03:53:38 - OpenVPN > Validating certificate extended key usage . 2023.02.28 03:53:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 03:53:38 - OpenVPN > VERIFY EKU OK . 2023.02.28 03:53:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 03:53:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 03:53:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 03:53:38 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 04:11:24 - Collect information about AirVPN completed . 2023.02.28 04:41:31 - Collect information about AirVPN completed . 2023.02.28 04:53:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 04:53:35 - OpenVPN > VERIFY KU OK . 2023.02.28 04:53:35 - OpenVPN > Validating certificate extended key usage . 2023.02.28 04:53:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 04:53:35 - OpenVPN > VERIFY EKU OK . 2023.02.28 04:53:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 04:53:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 04:53:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 04:53:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 05:11:38 - Collect information about AirVPN completed . 2023.02.28 05:41:45 - Collect information about AirVPN completed . 2023.02.28 05:53:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 05:53:32 - OpenVPN > VERIFY KU OK . 2023.02.28 05:53:32 - OpenVPN > Validating certificate extended key usage . 2023.02.28 05:53:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 05:53:32 - OpenVPN > VERIFY EKU OK . 2023.02.28 05:53:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 05:53:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 05:53:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 05:53:32 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 06:11:53 - Collect information about AirVPN completed . 2023.02.28 06:41:53 - Collect information about AirVPN completed . 2023.02.28 06:51:38 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #251174 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 06:53:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 06:53:29 - OpenVPN > VERIFY KU OK . 2023.02.28 06:53:29 - OpenVPN > Validating certificate extended key usage . 2023.02.28 06:53:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 06:53:29 - OpenVPN > VERIFY EKU OK . 2023.02.28 06:53:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 06:53:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 06:53:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 06:53:29 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 07:11:55 - Collect information about AirVPN completed . 2023.02.28 07:42:01 - Collect information about AirVPN completed . 2023.02.28 07:53:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 07:53:25 - OpenVPN > VERIFY KU OK . 2023.02.28 07:53:25 - OpenVPN > Validating certificate extended key usage . 2023.02.28 07:53:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 07:53:25 - OpenVPN > VERIFY EKU OK . 2023.02.28 07:53:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 07:53:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 07:53:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 07:53:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 08:12:02 - Collect information about AirVPN completed ! 2023.02.28 08:41:33 - Disconnecting . 2023.02.28 08:41:33 - Sending soft termination signal . 2023.02.28 08:41:36 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.02.28 08:41:37 - OpenVPN > Closing TUN/TAP interface . 2023.02.28 08:41:37 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1392::/64) . 2023.02.28 08:41:37 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1392::/64 44 fe80::8 store=active . 2023.02.28 08:41:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 44 fde6:7a:7d20:1392::100a store=active . 2023.02.28 08:41:38 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 44 10.23.146.12 store=active . 2023.02.28 08:41:38 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.02.28 08:41:38 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:39 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:39 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:39 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:40 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.02.28 08:41:40 - Routes, delete 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:40 - Routes, delete 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:40 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", not exists. . 2023.02.28 08:41:40 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.02.28 08:41:41 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.02.28 08:41:41 - DNS leak protection with packet filtering disabled. . 2023.02.28 08:41:41 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.02.28 08:41:41 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.02.28 08:41:41 - Connection terminated. I 2023.02.28 08:41:41 - Checking authorization ... . 2023.02.28 08:41:49 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2023.02.28 08:41:49 - Connecting to Ursa (United States of America, Atlanta, Georgia) . 2023.02.28 08:41:49 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.02.28 08:41:50 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists. . 2023.02.28 08:41:50 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.02.28 08:41:50 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.02.28 08:41:50 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.02.28 08:41:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.02.28 08:41:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.02.28 08:41:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.02.28 08:41:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.02.28 08:41:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.53:443 . 2023.02.28 08:41:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.02.28 08:41:50 - OpenVPN > UDP link local: (not bound) . 2023.02.28 08:41:50 - OpenVPN > UDP link remote: [AF_INET]64.42.179.53:443 . 2023.02.28 08:41:50 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.53:443, sid=4f3556fe 72618fe9 . 2023.02.28 08:41:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 08:41:50 - OpenVPN > VERIFY KU OK . 2023.02.28 08:41:50 - OpenVPN > Validating certificate extended key usage . 2023.02.28 08:41:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 08:41:50 - OpenVPN > VERIFY EKU OK . 2023.02.28 08:41:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 08:41:50 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 08:41:50 - OpenVPN > [Ursa] Peer Connection Initiated with [AF_INET]64.42.179.53:443 . 2023.02.28 08:41:51 - OpenVPN > SENT CONTROL [Ursa]: 'PUSH_REQUEST' (status=1) . 2023.02.28 08:41:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.146.1,dhcp-option DNS6 fde6:7a:7d20:1392::1,tun-ipv6,route-gateway 10.23.146.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1392::100a/64 fde6:7a:7d20:1392::1,ifconfig 10.23.146.12 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.02.28 08:41:52 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.02.28 08:41:52 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.146.1' . 2023.02.28 08:41:52 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1392::1' . 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.02.28 08:41:52 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.02.28 08:41:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 08:41:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 08:41:52 - OpenVPN > interactive service msg_channel=0 . 2023.02.28 08:41:52 - OpenVPN > open_tun . 2023.02.28 08:41:52 - OpenVPN > wintun device [Eddie] opened . 2023.02.28 08:41:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.23.146.12 255.255.255.0 . 2023.02.28 08:41:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all . 2023.02.28 08:41:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all . 2023.02.28 08:41:53 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.02.28 08:41:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 44 fde6:7a:7d20:1392::100a/128 store=active . 2023.02.28 08:41:53 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1392::/64 -> fde6:7a:7d20:1392::100a metric 0) dev Eddie . 2023.02.28 08:41:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1392::/64 44 fe80::8 store=active . 2023.02.28 08:41:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.02.28 08:41:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 44 all . 2023.02.28 08:41:54 - OpenVPN > IPv6 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.02.28 08:41:54 - OpenVPN > Initialization Sequence Completed . 2023.02.28 08:41:54 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.02.28 08:41:54 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.02.28 08:41:54 - DNS leak protection with packet filtering enabled. . 2023.02.28 08:41:55 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.146.1) . 2023.02.28 08:41:55 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1392::1) . 2023.02.28 08:41:56 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:56 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:57 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:58 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:59 - Routes, add 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:42:00 - Routes, add 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:42:00 - Flushing DNS I 2023.02.28 08:42:00 - Checking route IPv4 I 2023.02.28 08:42:00 - Checking route IPv6 I 2023.02.28 08:42:07 - Checking DNS ! 2023.02.28 08:42:09 - Connected. . 2023.02.28 08:42:15 - Collect information about AirVPN completed . 2023.02.28 09:12:05 - Collect information about AirVPN completed . 2023.02.28 09:35:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #559128 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 09:35:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #559129 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 09:35:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #559130 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 09:41:38 - Above log line repeated 1 times more . 2023.02.28 09:41:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 09:41:38 - OpenVPN > VERIFY KU OK . 2023.02.28 09:41:38 - OpenVPN > Validating certificate extended key usage . 2023.02.28 09:41:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 09:41:38 - OpenVPN > VERIFY EKU OK . 2023.02.28 09:41:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 09:41:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 09:41:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 09:41:38 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 09:42:09 - Collect information about AirVPN completed . 2023.02.28 10:07:45 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #7714700 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 10:12:13 - Collect information about AirVPN completed . 2023.02.28 10:41:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 10:41:25 - OpenVPN > VERIFY KU OK . 2023.02.28 10:41:25 - OpenVPN > Validating certificate extended key usage . 2023.02.28 10:41:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 10:41:25 - OpenVPN > VERIFY EKU OK . 2023.02.28 10:41:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 10:41:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 10:41:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 10:41:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 10:42:23 - Collect information about AirVPN completed . 2023.02.28 11:12:28 - Collect information about AirVPN completed . 2023.02.28 11:41:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 11:41:12 - OpenVPN > VERIFY KU OK . 2023.02.28 11:41:12 - OpenVPN > Validating certificate extended key usage . 2023.02.28 11:41:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 11:41:12 - OpenVPN > VERIFY EKU OK . 2023.02.28 11:41:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 11:41:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 11:41:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 11:41:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 11:42:31 - Collect information about AirVPN completed . 2023.02.28 11:50:49 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2803532 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 11:50:49 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2803533 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 11:50:49 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2803534 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 12:12:35 - Above log line repeated 22 times more . 2023.02.28 12:12:35 - Collect information about AirVPN completed . 2023.02.28 12:41:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 12:41:01 - OpenVPN > VERIFY KU OK . 2023.02.28 12:41:01 - OpenVPN > Validating certificate extended key usage . 2023.02.28 12:41:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 12:41:01 - OpenVPN > VERIFY EKU OK . 2023.02.28 12:41:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 12:41:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 12:41:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 12:41:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 12:42:39 - Collect information about AirVPN completed . 2023.02.28 13:12:43 - Collect information about AirVPN completed . 2023.02.28 13:21:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1802111 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 13:21:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1802112 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 13:21:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1802113 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 13:40:48 - Above log line repeated 1 times more . 2023.02.28 13:40:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 13:40:48 - OpenVPN > VERIFY KU OK . 2023.02.28 13:40:48 - OpenVPN > Validating certificate extended key usage . 2023.02.28 13:40:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 13:40:48 - OpenVPN > VERIFY EKU OK . 2023.02.28 13:40:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 13:40:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 13:40:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 13:40:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 13:42:47 - Collect information about AirVPN completed . 2023.02.28 14:12:51 - Collect information about AirVPN completed . 2023.02.28 14:24:47 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1669588 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 14:24:47 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1669589 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 14:24:47 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1669590 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 14:40:35 - Above log line repeated 1 times more . 2023.02.28 14:40:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 14:40:35 - OpenVPN > VERIFY KU OK . 2023.02.28 14:40:35 - OpenVPN > Validating certificate extended key usage . 2023.02.28 14:40:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 14:40:35 - OpenVPN > VERIFY EKU OK . 2023.02.28 14:40:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 14:40:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 14:40:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 14:40:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 14:42:55 - Collect information about AirVPN completed . 2023.02.28 15:12:59 - Collect information about AirVPN completed . 2023.02.28 15:40:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 15:40:22 - OpenVPN > VERIFY KU OK . 2023.02.28 15:40:22 - OpenVPN > Validating certificate extended key usage . 2023.02.28 15:40:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 15:40:22 - OpenVPN > VERIFY EKU OK . 2023.02.28 15:40:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 15:40:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 15:40:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 15:40:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 15:43:03 - Collect information about AirVPN completed . 2023.02.28 15:49:18 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3467510 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 15:49:18 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3467511 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 15:49:18 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3467512 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 16:13:06 - Above log line repeated 1593 times more . 2023.02.28 16:13:06 - Collect information about AirVPN completed . 2023.02.28 16:19:00 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #15034958 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 16:19:00 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #15034960 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 16:19:00 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #15034961 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 16:40:09 - Above log line repeated 7428 times more . 2023.02.28 16:40:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 16:40:09 - OpenVPN > VERIFY KU OK . 2023.02.28 16:40:09 - OpenVPN > Validating certificate extended key usage . 2023.02.28 16:40:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 16:40:09 - OpenVPN > VERIFY EKU OK . 2023.02.28 16:40:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 16:40:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 16:40:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 16:40:09 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 16:43:09 - Collect information about AirVPN completed . 2023.02.28 16:48:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2306925 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 16:48:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2306926 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 16:48:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2306927 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 17:13:13 - Above log line repeated 6178 times more . 2023.02.28 17:13:13 - Collect information about AirVPN completed . 2023.02.28 17:39:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 17:39:56 - OpenVPN > VERIFY KU OK . 2023.02.28 17:39:56 - OpenVPN > Validating certificate extended key usage . 2023.02.28 17:39:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 17:39:56 - OpenVPN > VERIFY EKU OK . 2023.02.28 17:39:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 17:39:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 17:39:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 17:39:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 17:40:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #19175705 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 17:40:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #19175706 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 17:40:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #19175707 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 17:43:18 - Above log line repeated 6087 times more . 2023.02.28 17:43:18 - Collect information about AirVPN completed . 2023.02.28 17:43:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #435124 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 17:43:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #435125 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 17:43:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #435126 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 18:13:19 - Above log line repeated 59064 times more . 2023.02.28 18:13:19 - Collect information about AirVPN completed . 2023.02.28 18:32:40 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #12467559 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 18:32:40 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #12467560 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 18:32:40 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #12467561 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 18:39:43 - Above log line repeated 3177 times more . 2023.02.28 18:39:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 18:39:43 - OpenVPN > VERIFY KU OK . 2023.02.28 18:39:43 - OpenVPN > Validating certificate extended key usage . 2023.02.28 18:39:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 18:39:43 - OpenVPN > VERIFY EKU OK . 2023.02.28 18:39:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 18:39:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 18:39:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 18:39:43 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 18:43:20 - Collect information about AirVPN completed . 2023.02.28 19:13:25 - Collect information about AirVPN completed . 2023.02.28 19:39:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 19:39:30 - OpenVPN > VERIFY KU OK . 2023.02.28 19:39:30 - OpenVPN > Validating certificate extended key usage . 2023.02.28 19:39:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 19:39:30 - OpenVPN > VERIFY EKU OK . 2023.02.28 19:39:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 19:39:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 19:39:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 19:39:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 19:43:27 - Collect information about AirVPN completed . 2023.02.28 20:13:28 - Collect information about AirVPN completed . 2023.02.28 20:39:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 20:39:17 - OpenVPN > VERIFY KU OK . 2023.02.28 20:39:17 - OpenVPN > Validating certificate extended key usage . 2023.02.28 20:39:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 20:39:17 - OpenVPN > VERIFY EKU OK . 2023.02.28 20:39:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 20:39:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 20:39:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 20:39:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 20:43:30 - Collect information about AirVPN completed . 2023.02.28 21:13:39 - Collect information about AirVPN completed . 2023.02.28 21:39:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 21:39:05 - OpenVPN > VERIFY KU OK . 2023.02.28 21:39:05 - OpenVPN > Validating certificate extended key usage . 2023.02.28 21:39:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 21:39:05 - OpenVPN > VERIFY EKU OK . 2023.02.28 21:39:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 21:39:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 21:39:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 21:39:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 21:43:47 - Collect information about AirVPN completed . 2023.02.28 22:13:48 - Collect information about AirVPN completed . 2023.02.28 22:38:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 22:38:52 - OpenVPN > VERIFY KU OK . 2023.02.28 22:38:52 - OpenVPN > Validating certificate extended key usage . 2023.02.28 22:38:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 22:38:52 - OpenVPN > VERIFY EKU OK . 2023.02.28 22:38:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 22:38:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 22:38:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 22:38:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 22:43:48 - Collect information about AirVPN completed . 2023.02.28 23:13:57 - Collect information about AirVPN completed . 2023.02.28 23:38:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 23:38:39 - OpenVPN > VERIFY KU OK . 2023.02.28 23:38:39 - OpenVPN > Validating certificate extended key usage . 2023.02.28 23:38:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 23:38:39 - OpenVPN > VERIFY EKU OK . 2023.02.28 23:38:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 23:38:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 23:38:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 23:38:39 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 23:43:57 - Collect information about AirVPN completed . 2023.03.01 00:13:57 - Collect information about AirVPN completed ! 2023.03.01 00:38:38 - Disconnecting . 2023.03.01 00:38:38 - Sending soft termination signal . 2023.03.01 00:38:41 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.03.01 00:38:42 - OpenVPN > Closing TUN/TAP interface . 2023.03.01 00:38:42 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1392::/64) . 2023.03.01 00:38:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1392::/64 44 fe80::8 store=active . 2023.03.01 00:38:43 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 44 fde6:7a:7d20:1392::100a store=active . 2023.03.01 00:38:43 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 44 10.23.146.12 store=active . 2023.03.01 00:38:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.03.01 00:38:43 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:38:44 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:38:44 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:38:44 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:38:45 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.03.01 00:38:45 - Routes, delete 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:38:45 - Routes, delete 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:38:45 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", not exists. . 2023.03.01 00:38:45 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.03.01 00:38:46 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.03.01 00:38:46 - DNS leak protection with packet filtering disabled. . 2023.03.01 00:38:46 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.03.01 00:38:46 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.03.01 00:38:46 - Connection terminated. I 2023.03.01 00:38:46 - Checking authorization ... . 2023.03.01 00:38:54 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2023.03.01 00:38:54 - Connecting to Ursa (United States of America, Atlanta, Georgia) . 2023.03.01 00:38:55 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.03.01 00:38:55 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists. . 2023.03.01 00:38:55 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.03.01 00:38:55 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.03.01 00:38:55 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.03.01 00:38:55 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.01 00:38:55 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.01 00:38:55 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.01 00:38:55 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.01 00:38:55 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.53:443 . 2023.03.01 00:38:55 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.03.01 00:38:55 - OpenVPN > UDP link local: (not bound) . 2023.03.01 00:38:55 - OpenVPN > UDP link remote: [AF_INET]64.42.179.53:443 . 2023.03.01 00:38:55 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.53:443, sid=650cbd35 586318cc . 2023.03.01 00:38:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.03.01 00:38:55 - OpenVPN > VERIFY KU OK . 2023.03.01 00:38:55 - OpenVPN > Validating certificate extended key usage . 2023.03.01 00:38:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.03.01 00:38:55 - OpenVPN > VERIFY EKU OK . 2023.03.01 00:38:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.03.01 00:38:55 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.03.01 00:38:55 - OpenVPN > [Ursa] Peer Connection Initiated with [AF_INET]64.42.179.53:443 . 2023.03.01 00:38:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.146.1,dhcp-option DNS6 fde6:7a:7d20:1392::1,tun-ipv6,route-gateway 10.23.146.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1392::100a/64 fde6:7a:7d20:1392::1,ifconfig 10.23.146.12 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2023.03.01 00:38:56 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.03.01 00:38:56 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.146.1' . 2023.03.01 00:38:56 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1392::1' . 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.03.01 00:38:56 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.03.01 00:38:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.01 00:38:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.01 00:38:56 - OpenVPN > interactive service msg_channel=0 . 2023.03.01 00:38:56 - OpenVPN > open_tun . 2023.03.01 00:38:56 - OpenVPN > wintun device [Eddie] opened . 2023.03.01 00:38:56 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.23.146.12 255.255.255.0 . 2023.03.01 00:38:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all . 2023.03.01 00:38:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all . 2023.03.01 00:38:57 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.03.01 00:38:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 44 fde6:7a:7d20:1392::100a/128 store=active . 2023.03.01 00:38:58 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1392::/64 -> fde6:7a:7d20:1392::100a metric 0) dev Eddie . 2023.03.01 00:38:58 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1392::/64 44 fe80::8 store=active . 2023.03.01 00:38:58 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.03.01 00:38:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 44 all . 2023.03.01 00:38:58 - OpenVPN > IPv6 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.03.01 00:38:58 - OpenVPN > Initialization Sequence Completed . 2023.03.01 00:38:58 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.03.01 00:38:58 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.03.01 00:38:58 - DNS leak protection with packet filtering enabled. . 2023.03.01 00:38:59 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.146.1) . 2023.03.01 00:38:59 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1392::1) . 2023.03.01 00:38:59 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:39:00 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:39:01 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:39:01 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:39:02 - Routes, add 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:39:02 - Routes, add 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:39:02 - Flushing DNS I 2023.03.01 00:39:03 - Checking route IPv4 I 2023.03.01 00:39:03 - Checking route IPv6 I 2023.03.01 00:39:03 - Checking DNS ! 2023.03.01 00:39:04 - Connected. ! 2023.03.01 00:41:22 - Disconnecting . 2023.03.01 00:41:22 - Sending soft termination signal . 2023.03.01 00:41:26 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.03.01 00:41:27 - OpenVPN > Closing TUN/TAP interface . 2023.03.01 00:41:27 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1392::/64) . 2023.03.01 00:41:27 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1392::/64 44 fe80::8 store=active . 2023.03.01 00:41:28 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 44 fde6:7a:7d20:1392::100a store=active . 2023.03.01 00:41:28 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 44 10.23.146.12 store=active . 2023.03.01 00:41:28 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.03.01 00:41:29 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:29 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:29 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:30 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:30 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.03.01 00:41:30 - Routes, delete 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:31 - Routes, delete 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:31 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", not exists. . 2023.03.01 00:41:31 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.03.01 00:41:31 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.03.01 00:41:31 - DNS leak protection with packet filtering disabled. . 2023.03.01 00:41:31 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.03.01 00:41:31 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.03.01 00:41:31 - Connection terminated. I 2023.03.01 00:41:31 - Checking authorization ... . 2023.03.01 00:41:47 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2023.03.01 00:41:47 - Connecting to Ursa (United States of America, Atlanta, Georgia) . 2023.03.01 00:41:48 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.03.01 00:41:48 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists. . 2023.03.01 00:41:48 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.03.01 00:41:48 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.03.01 00:41:48 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.03.01 00:41:48 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.01 00:41:48 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.01 00:41:48 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.01 00:41:48 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.01 00:41:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.53:443 . 2023.03.01 00:41:48 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.03.01 00:41:48 - OpenVPN > UDP link local: (not bound) . 2023.03.01 00:41:48 - OpenVPN > UDP link remote: [AF_INET]64.42.179.53:443 . 2023.03.01 00:41:48 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.53:443, sid=d74da7f2 3bbc66d0 . 2023.03.01 00:41:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.03.01 00:41:48 - OpenVPN > VERIFY KU OK . 2023.03.01 00:41:48 - OpenVPN > Validating certificate extended key usage . 2023.03.01 00:41:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.03.01 00:41:48 - OpenVPN > VERIFY EKU OK . 2023.03.01 00:41:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.03.01 00:41:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.03.01 00:41:48 - OpenVPN > [Ursa] Peer Connection Initiated with [AF_INET]64.42.179.53:443 . 2023.03.01 00:41:49 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.146.1,dhcp-option DNS6 fde6:7a:7d20:1392::1,tun-ipv6,route-gateway 10.23.146.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1392::100a/64 fde6:7a:7d20:1392::1,ifconfig 10.23.146.12 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.03.01 00:41:49 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.03.01 00:41:49 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.146.1' . 2023.03.01 00:41:49 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1392::1' . 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.03.01 00:41:49 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.03.01 00:41:49 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.01 00:41:49 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.01 00:41:49 - OpenVPN > interactive service msg_channel=0 . 2023.03.01 00:41:49 - OpenVPN > open_tun . 2023.03.01 00:41:49 - OpenVPN > wintun device [Eddie] opened . 2023.03.01 00:41:49 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.23.146.12 255.255.255.0 . 2023.03.01 00:41:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all . 2023.03.01 00:41:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all . 2023.03.01 00:41:50 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.03.01 00:41:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 44 fde6:7a:7d20:1392::100a/128 store=active . 2023.03.01 00:41:50 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1392::/64 -> fde6:7a:7d20:1392::100a metric 0) dev Eddie . 2023.03.01 00:41:51 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1392::/64 44 fe80::8 store=active . 2023.03.01 00:41:51 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.03.01 00:41:51 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 44 all . 2023.03.01 00:41:51 - OpenVPN > IPv6 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.03.01 00:41:51 - OpenVPN > Initialization Sequence Completed . 2023.03.01 00:41:51 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.03.01 00:41:51 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.03.01 00:41:51 - DNS leak protection with packet filtering enabled. . 2023.03.01 00:41:52 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.146.1) . 2023.03.01 00:41:52 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1392::1) . 2023.03.01 00:41:53 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:53 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:54 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:54 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:55 - Routes, add 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:56 - Routes, add 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:56 - Flushing DNS I 2023.03.01 00:41:57 - Checking route IPv4 I 2023.03.01 00:41:58 - Checking route IPv6 I 2023.03.01 00:41:58 - Checking DNS ! 2023.03.01 00:41:59 - Connected. . 2023.03.01 00:42:15 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #9960 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.03.01 00:42:15 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #9961 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.03.01 00:42:15 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #9962 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.03.01 00:42:52 - Above log line repeated 5 times more ! 2023.03.01 00:42:52 - Disconnecting . 2023.03.01 00:42:52 - Sending soft termination signal . 2023.03.01 00:42:55 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.03.01 00:42:56 - OpenVPN > Closing TUN/TAP interface . 2023.03.01 00:42:56 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1392::/64) . 2023.03.01 00:42:56 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1392::/64 44 fe80::8 store=active . 2023.03.01 00:42:56 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 44 fde6:7a:7d20:1392::100a store=active . 2023.03.01 00:42:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 44 10.23.146.12 store=active . 2023.03.01 00:42:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.03.01 00:42:57 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:42:58 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:42:59 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:42:59 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:43:00 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.03.01 00:43:00 - Routes, delete 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:43:01 - Routes, delete 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:43:01 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", not exists. . 2023.03.01 00:43:01 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.03.01 00:43:01 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.03.01 00:43:01 - DNS leak protection with packet filtering disabled. . 2023.03.01 00:43:01 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.03.01 00:43:01 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.03.01 00:43:01 - Connection terminated. I 2023.03.01 00:43:01 - Checking authorization ... . 2023.03.01 00:43:30 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2023.03.01 00:43:30 - Connecting to Musca (United States of America, Atlanta, Georgia) . 2023.03.01 00:43:31 - Routes, add 64.42.179.45/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.03.01 00:43:31 - Routes, add 64.42.179.45/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists. . 2023.03.01 00:43:31 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.03.01 00:43:31 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.03.01 00:43:31 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.03.01 00:43:31 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.01 00:43:31 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.01 00:43:31 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.01 00:43:31 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.01 00:43:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.45:443 . 2023.03.01 00:43:31 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.03.01 00:43:31 - OpenVPN > UDP link local: (not bound) . 2023.03.01 00:43:31 - OpenVPN > UDP link remote: [AF_INET]64.42.179.45:443 . 2023.03.01 00:43:31 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.45:443, sid=956ffbce 7f1a3e2f . 2023.03.01 00:43:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.03.01 00:43:31 - OpenVPN > VERIFY KU OK . 2023.03.01 00:43:31 - OpenVPN > Validating certificate extended key usage . 2023.03.01 00:43:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.03.01 00:43:31 - OpenVPN > VERIFY EKU OK . 2023.03.01 00:43:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Musca, emailAddress=info@airvpn.org . 2023.03.01 00:43:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.03.01 00:43:31 - OpenVPN > [Musca] Peer Connection Initiated with [AF_INET]64.42.179.45:443 . 2023.03.01 00:43:31 - OpenVPN > SENT CONTROL [Musca]: 'PUSH_REQUEST' (status=1) . 2023.03.01 00:43:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.50.1,dhcp-option DNS6 fde6:7a:7d20:1332::1,tun-ipv6,route-gateway 10.23.50.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1332::10b1/64 fde6:7a:7d20:1332::1,ifconfig 10.23.50.179 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2023.03.01 00:43:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.03.01 00:43:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.50.1' . 2023.03.01 00:43:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1332::1' . 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.03.01 00:43:31 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.03.01 00:43:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.01 00:43:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.01 00:43:31 - OpenVPN > interactive service msg_channel=0 . 2023.03.01 00:43:31 - OpenVPN > open_tun . 2023.03.01 00:43:31 - OpenVPN > wintun device [Eddie] opened . 2023.03.01 00:43:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.23.50.179 255.255.255.0 . 2023.03.01 00:43:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all . 2023.03.01 00:43:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all . 2023.03.01 00:43:32 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.03.01 00:43:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 44 fde6:7a:7d20:1332::10b1/128 store=active . 2023.03.01 00:43:33 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1332::/64 -> fde6:7a:7d20:1332::10b1 metric 0) dev Eddie . 2023.03.01 00:43:33 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1332::/64 44 fe80::8 store=active . 2023.03.01 00:43:33 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.03.01 00:43:33 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 44 all . 2023.03.01 00:43:33 - OpenVPN > IPv6 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.03.01 00:43:33 - OpenVPN > Initialization Sequence Completed . 2023.03.01 00:43:33 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.03.01 00:43:33 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.03.01 00:43:33 - DNS leak protection with packet filtering enabled. . 2023.03.01 00:43:34 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.50.1) . 2023.03.01 00:43:34 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1332::1) . 2023.03.01 00:43:34 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:43:35 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:43:35 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:43:36 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:43:36 - Routes, add 64.42.179.43/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:43:37 - Routes, add 2605:9f80:6000:78:848d:e3b5:8bc8:34f/128 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:43:37 - Flushing DNS I 2023.03.01 00:43:37 - Checking route IPv4 I 2023.03.01 00:43:37 - Checking route IPv6 I 2023.03.01 00:43:38 - Checking DNS ! 2023.03.01 00:43:38 - Connected. ! 2023.03.01 00:45:57 - Disconnecting . 2023.03.01 00:45:57 - Sending soft termination signal . 2023.03.01 00:46:00 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.03.01 00:46:01 - OpenVPN > Closing TUN/TAP interface . 2023.03.01 00:46:01 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1332::/64) . 2023.03.01 00:46:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1332::/64 44 fe80::8 store=active . 2023.03.01 00:46:02 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 44 fde6:7a:7d20:1332::10b1 store=active . 2023.03.01 00:46:02 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 44 10.23.50.179 store=active . 2023.03.01 00:46:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.03.01 00:46:03 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:46:03 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:46:03 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:46:04 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:46:04 - Routes, delete 64.42.179.45/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.03.01 00:46:04 - Routes, delete 64.42.179.43/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:46:05 - Routes, delete 2605:9f80:6000:78:848d:e3b5:8bc8:34f/128 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:46:05 - Routes, delete 64.42.179.45/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", not exists. . 2023.03.01 00:46:05 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.03.01 00:46:05 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.03.01 00:46:05 - DNS leak protection with packet filtering disabled. . 2023.03.01 00:46:05 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.03.01 00:46:05 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.03.01 00:46:05 - Connection terminated. I 2023.03.01 00:46:05 - Checking authorization ... . 2023.03.01 00:46:30 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2023.03.01 00:46:30 - IPv6 disabled with packet filtering. ! 2023.03.01 00:46:30 - Connecting to Metallah (United States of America, Pennsylvania) . 2023.03.01 00:46:31 - Routes, add 156.96.151.134/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.03.01 00:46:31 - Routes, add 156.96.151.134/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists. . 2023.03.01 00:46:31 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.03.01 00:46:31 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.03.01 00:46:31 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.03.01 00:46:31 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.01 00:46:31 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.01 00:46:31 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.01 00:46:31 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.01 00:46:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]156.96.151.134:443 . 2023.03.01 00:46:31 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.03.01 00:46:31 - OpenVPN > UDP link local: (not bound) . 2023.03.01 00:46:31 - OpenVPN > UDP link remote: [AF_INET]156.96.151.134:443 . 2023.03.01 00:46:31 - OpenVPN > TLS: Initial packet from [AF_INET]156.96.151.134:443, sid=8ce2686b 932e2e2a . 2023.03.01 00:46:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.03.01 00:46:31 - OpenVPN > VERIFY KU OK . 2023.03.01 00:46:31 - OpenVPN > Validating certificate extended key usage . 2023.03.01 00:46:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.03.01 00:46:31 - OpenVPN > VERIFY EKU OK . 2023.03.01 00:46:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Metallah, emailAddress=info@airvpn.org . 2023.03.01 00:46:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.03.01 00:46:31 - OpenVPN > [Metallah] Peer Connection Initiated with [AF_INET]156.96.151.134:443 . 2023.03.01 00:46:31 - OpenVPN > SENT CONTROL [Metallah]: 'PUSH_REQUEST' (status=1) . 2023.03.01 00:46:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.22.146.1,route-gateway 10.22.146.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.22.146.18 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2023.03.01 00:46:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp' . 2023.03.01 00:46:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.146.1' . 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.03.01 00:46:31 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.03.01 00:46:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.01 00:46:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.01 00:46:31 - OpenVPN > interactive service msg_channel=0 . 2023.03.01 00:46:31 - OpenVPN > open_tun . 2023.03.01 00:46:31 - OpenVPN > wintun device [Eddie] opened . 2023.03.01 00:46:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.22.146.18 255.255.255.0 . 2023.03.01 00:46:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all . 2023.03.01 00:46:32 - Collect information about AirVPN completed . 2023.03.01 00:46:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all . 2023.03.01 00:46:32 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.03.01 00:46:32 - OpenVPN > Initialization Sequence Completed . 2023.03.01 00:46:33 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.03.01 00:46:33 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.03.01 00:46:33 - DNS leak protection with packet filtering enabled. . 2023.03.01 00:46:33 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.22.146.1) . 2023.03.01 00:46:34 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:46:34 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:46:35 - Routes, add 156.96.151.132/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:46:35 - Flushing DNS I 2023.03.01 00:46:35 - Checking route IPv4 I 2023.03.01 00:46:37 - Checking DNS ! 2023.03.01 00:46:37 - Connected.
  2. Hi everyone I don't understand this problem but it's really frustrating me now! I'll try and summarise: If the connection is idle it's rock solid - 13 hours uptime when I've just tested Standard traffic - I tried browsing the net / playing Youtube videos etc., all fine. Load Tixati - within a minute the connection disconnects and will then be trapped in a connection/disconnection cycle without ever establishing a connection again. I have to reboot the computer to make it connect again, and then it'll do the same thing. I don't know if any of this information will be useful: I'm running Windows 7 64bitI do have network lock on (at least I should do)I have followed the Tixati guide to make sure if the connection drops Tixati does as well Here's my latest logs. Any logs before this set are just the standard checks and updates as the connection was idle. 2017.06.02 22:52:42 - Updating systems & servers data .... 2017.06.02 22:52:43 - Systems & servers data update completed. 2017.06.02 23:02:43 - Updating systems & servers data .... 2017.06.02 23:02:44 - Systems & servers data update completed. 2017.06.02 23:13:44 - Updating systems & servers data .... 2017.06.02 23:13:48 - Systems & servers data update completed. 2017.06.02 23:23:48 - Updating systems & servers data .... 2017.06.02 23:23:53 - Systems & servers data update completed. 2017.06.02 23:33:53 - Updating systems & servers data .... 2017.06.02 23:33:54 - Systems & servers data update completed. 2017.06.02 23:43:54 - Updating systems & servers data .... 2017.06.02 23:43:56 - Systems & servers data update completedI 2017.06.02 23:51:44 - Renewing TLS key. 2017.06.02 23:51:44 - OpenVPN > TLS: tls_process: killed expiring key. 2017.06.02 23:51:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.06.02 23:51:45 - OpenVPN > Validating certificate key usage. 2017.06.02 23:51:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.06.02 23:51:45 - OpenVPN > VERIFY KU OK. 2017.06.02 23:51:45 - OpenVPN > Validating certificate extended key usage. 2017.06.02 23:51:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.06.02 23:51:45 - OpenVPN > VERIFY EKU OK. 2017.06.02 23:51:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.06.02 23:51:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.06.02 23:51:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.06.02 23:51:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.06.02 23:51:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.06.02 23:51:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.06.02 23:53:57 - Updating systems & servers data .... 2017.06.02 23:53:57 - Systems & servers data update completed. 2017.06.03 00:03:58 - Updating systems & servers data .... 2017.06.03 00:03:58 - Systems & servers data update completed. 2017.06.03 00:13:58 - Updating systems & servers data .... 2017.06.03 00:14:26 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2017.06.03 00:14:26 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2017.06.03 00:14:26 - OpenVPN > Restart pause, 5 second(s)! 2017.06.03 00:14:26 - Disconnecting. 2017.06.03 00:14:26 - Management - Send 'signal SIGTERM'. 2017.06.03 00:14:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.06.03 00:14:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 109.202.103.169 MASK 255.255.255.255 192.168.1.1. 2017.06.03 00:14:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.06.03 00:14:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.06.03 00:14:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.06.03 00:14:26 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.06.03 00:14:26 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.06.03 00:14:26 - OpenVPN > Closing TUN/TAP interface. 2017.06.03 00:14:34 - Systems & servers data update completed. 2017.06.03 00:14:36 - Management - Send 'signal SIGTERM'. 2017.06.03 00:14:36 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2017.06.03 00:14:46 - Management - Send 'signal SIGTERM' Thanks to anyone who writes a reply. I'm not very technical in all honesty so these errors etc., are far out of my league of understanding!
  3. Hey there, as of late, I experience regular drops of any connection to any given server. The client (eddie's beta variant) will then begin recurring cicles of failed authentication checks until it eventually reconnects. This can take up to 10 minutes and is prone to fail completely. No connection can than be established without a complete reboot of the system. I'm running Win10 with all the forced updates. Also, the network lock really locks all the machine's internet connection on the network (e. g. smart phones connected to the router via Wifi, etc...), not just on the one machine the client is running on. Eddie also notifies me of a failed rule implementation upon connecting with network lock engaged. I have forwarded the ports my p2p-clients are using and have played with different countries/servers but to no avail. Air-VPN used to be very reliable in the past, with a dropped connections being rare. Any suggestions are highly appreciated!
  4. I have a lot of problems with dropped connections after coming back from hibernation on my MacBook. Eddie tries to reconnect before I get a new wifi connection. Somehow, it seems like that this process slows down the process of finding and logging into a wifi. Maybe that is just a feeling, but as soon as I press the cancel button in Eddie, my MacBook will connect to a wifi. A feature that would prevent Eddie from reconnecting after a dropped connection would solve that. A similar problem is also described in this thread: https://airvpn.org/topic/16143-restart-problem/?p=34601 Anyway, a feature like that would be advantages in other circumstances: Imagine I close (hibernate) my MacBook at home. I go to another wifi and open my MacBook. It will connect to the wifi and Eddie would try to connect immediately. I may not want that the owner of that wifi knows that I use AirVPN. Just applying NetLock after a dropped connection would prevent that... What do you think? Is that a possible solution? Could it be implemented?
  5. Hi everyone I'm a new user to AirVPN and haven't used it for a week or so. When I was last using it, it ran absolutely perfectly, no trouble at all, in fact, I was playing an online game without even realising I was an a VPN, so full marks to AirVPN there! But...(always a but)... The last couple of days when I try and connect to the VPN it will connect and then drop connection after a couple of minutes, it'll try to re-establish connection and fail, which trips out my whole internet so I just have to exit the program. Can anyone provide any explaination as to what can be happening? I'm absolutely clueless! Also please note, I may be a little while replying with my first reply as my posts are still being moderator approved (I said I was new! ) Thanks guys!
×
×
  • Create New...