Jump to content
Not connected, Your IP: 18.191.240.171

Search the Community

Showing results for tags 'windows 11'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 3 results

  1. I recently installed airVPN and Eddie client for Windows11. Everything works well when I use it while connected to my phone Access Point, but when I try to use it while connected to my school wifi (eduroam) it can't connect at all: it tries to connect for about 30 seconds, then times out and tries another (without success either)I I also use Eddie on my Android phone and it works fine, including on my school wifi. Do you know what is causing this problem? And how to fix it? Thank you Here are the logs I get on windows (for one connection trial): . 2024.08.19 19:01:17 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.22631.0, Mono/.Net: v4.0.30319 . 2024.08.19 19:01:17 - Command line arguments (1): path="home" . 2024.08.19 19:01:18 - Reading options from C:\Users\Aurélien\AppData\Local\Eddie\default.profile . 2024.08.19 19:01:20 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2024.08.19 19:01:20 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2024.08.19 19:01:20 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2024.08.19 19:01:21 - Ready . 2024.08.19 19:01:21 - Collect information about AirVPN completed I 2024.08.19 19:01:24 - Session starting. I 2024.08.19 19:01:25 - Checking authorization ... . 2024.08.19 19:01:27 - Added new network interface "Eddie", Wintun version 0.12 . 2024.08.19 19:01:27 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.08.19 19:01:27 - Connecting to Muscida (Netherlands, Alblasserdam) . 2024.08.19 19:01:27 - Routes, add 213.152.162.156/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.19 19:01:27 - Routes, add 213.152.162.156/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", already exists. . 2024.08.19 19:01:27 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.08.19 19:01:27 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.08.19 19:01:27 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.08.19 19:01:27 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.19 19:01:27 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.19 19:01:27 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.19 19:01:27 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.19 19:01:27 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.156:443 . 2024.08.19 19:01:27 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.08.19 19:01:27 - OpenVPN > UDP link local: (not bound) . 2024.08.19 19:01:27 - OpenVPN > UDP link remote: [AF_INET]213.152.162.156:443 . 2024.08.19 19:01:27 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.156:443, sid=0370627a 2fea8829 . 2024.08.19 19:01:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.08.19 19:01:27 - OpenVPN > VERIFY KU OK . 2024.08.19 19:01:27 - OpenVPN > Validating certificate extended key usage . 2024.08.19 19:01:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.08.19 19:01:27 - OpenVPN > VERIFY EKU OK . 2024.08.19 19:01:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Muscida, emailAddress=info@airvpn.org . 2024.08.19 19:01:59 - OpenVPN > [Muscida] Inactivity timeout (--ping-exit), exiting . 2024.08.19 19:01:59 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.08.19 19:02:05 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2024.08.19 19:02:05 - Disconnecting . 2024.08.19 19:02:05 - Routes, delete 213.152.162.156/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.19 19:02:05 - Routes, delete 213.152.162.156/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", not exists. . 2024.08.19 19:02:05 - Connection terminated. I 2024.08.19 19:02:08 - Checking authorization ... . 2024.08.19 19:02:09 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.08.19 19:02:09 - Connecting to Alrai (Netherlands, Alblasserdam) . 2024.08.19 19:02:09 - Routes, add 213.152.162.81/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.19 19:02:09 - Routes, add 213.152.162.81/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", already exists. . 2024.08.19 19:02:09 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.08.19 19:02:09 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.08.19 19:02:09 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.08.19 19:02:09 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.19 19:02:09 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.19 19:02:09 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.19 19:02:09 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.19 19:02:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.81:443 . 2024.08.19 19:02:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.08.19 19:02:09 - OpenVPN > UDP link local: (not bound) . 2024.08.19 19:02:09 - OpenVPN > UDP link remote: [AF_INET]213.152.162.81:443 . 2024.08.19 19:02:10 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.81:443, sid=40754da7 e4e67ebd . 2024.08.19 19:02:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.08.19 19:02:10 - OpenVPN > VERIFY KU OK . 2024.08.19 19:02:10 - OpenVPN > Validating certificate extended key usage . 2024.08.19 19:02:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.08.19 19:02:10 - OpenVPN > VERIFY EKU OK . 2024.08.19 19:02:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alrai, emailAddress=info@airvpn.org . 2024.08.19 19:02:41 - OpenVPN > [Alrai] Inactivity timeout (--ping-exit), exiting . 2024.08.19 19:02:41 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.08.19 19:02:47 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2024.08.19 19:02:47 - Disconnecting . 2024.08.19 19:02:47 - Routes, delete 213.152.162.81/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.19 19:02:47 - Routes, delete 213.152.162.81/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", not exists. . 2024.08.19 19:02:47 - Connection terminated. I 2024.08.19 19:02:50 - Checking authorization ... . 2024.08.19 19:02:51 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.08.19 19:02:51 - Connecting to Rukbat (Netherlands, Alblasserdam) . 2024.08.19 19:02:51 - Routes, add 213.152.162.86/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.19 19:02:51 - Routes, add 213.152.162.86/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", already exists. . 2024.08.19 19:02:51 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.08.19 19:02:51 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.08.19 19:02:51 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.08.19 19:02:51 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.19 19:02:51 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.19 19:02:51 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.19 19:02:51 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.19 19:02:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.86:443 . 2024.08.19 19:02:51 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.08.19 19:02:51 - OpenVPN > UDP link local: (not bound) . 2024.08.19 19:02:51 - OpenVPN > UDP link remote: [AF_INET]213.152.162.86:443 . 2024.08.19 19:02:51 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.86:443, sid=24f9ee8a 314c9cd5 . 2024.08.19 19:02:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.08.19 19:02:51 - OpenVPN > VERIFY KU OK . 2024.08.19 19:02:51 - OpenVPN > Validating certificate extended key usage . 2024.08.19 19:02:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.08.19 19:02:51 - OpenVPN > VERIFY EKU OK . 2024.08.19 19:02:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Rukbat, emailAddress=info@airvpn.org ! 2024.08.19 19:03:14 - Disconnecting . 2024.08.19 19:03:14 - Sending soft termination signal . 2024.08.19 19:03:17 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.08.19 19:03:20 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.08.19 19:03:20 - Routes, delete 213.152.162.86/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.19 19:03:20 - Routes, delete 213.152.162.86/32 for interface "Wi-Fi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", not exists. . 2024.08.19 19:03:20 - Connection terminated. I 2024.08.19 19:03:20 - Cancel requested. ! 2024.08.19 19:03:21 - Session terminated.
  2. When I'm trying to connect in eddie-ui its disconnecting and trying to connect to another server again and again. I can connect with protocol WireGuard (port 51820). I have only windows antivirus which is turned off. Tried log out and log in, renew device in client area, changing IPv4 only to IPv4/IPv6. Month ago everything was fine. I 2024.08.10 23:13:49 - Session starting. I 2024.08.10 23:13:49 - Checking authorization ... . 2024.08.10 23:13:50 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2024.08.10 23:13:50 - Connecting to Kajam (Netherlands, Alblasserdam) . 2024.08.10 23:13:51 - Routes, add 213.152.161.87/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.10 23:13:51 - Routes, add 213.152.161.87/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", already exists. . 2024.08.10 23:13:51 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.08.10 23:13:51 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.08.10 23:13:51 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.08.10 23:13:51 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.10 23:13:51 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.10 23:13:51 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.10 23:13:51 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.10 23:13:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.87:443 . 2024.08.10 23:13:51 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.08.10 23:13:51 - OpenVPN > UDP link local: (not bound) . 2024.08.10 23:13:51 - OpenVPN > UDP link remote: [AF_INET]213.152.161.87:443 . 2024.08.10 23:13:53 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.87:443, sid=56972f66 162c8d2a . 2024.08.10 23:13:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.08.10 23:13:54 - OpenVPN > VERIFY KU OK . 2024.08.10 23:13:54 - OpenVPN > Validating certificate extended key usage . 2024.08.10 23:13:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.08.10 23:13:54 - OpenVPN > VERIFY EKU OK . 2024.08.10 23:13:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kajam, emailAddress=info@airvpn.org . 2024.08.10 23:13:54 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.08.10 23:13:54 - OpenVPN > [Kajam] Peer Connection Initiated with [AF_INET]213.152.161.87:443 . 2024.08.10 23:13:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.234.1,dhcp-option DNS6 fde6:7a:7d20:fea::1,tun-ipv6,route-gateway 10.19.234.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:fea::10ee/64 fde6:7a:7d20:fea::1,ifconfig 10.19.234.240 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2024.08.10 23:13:54 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.08.10 23:13:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.234.1' . 2024.08.10 23:13:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:fea::1' . 2024.08.10 23:13:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.08.10 23:13:54 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.08.10 23:13:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.08.10 23:13:54 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.08.10 23:13:54 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.08.10 23:13:54 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.08.10 23:13:54 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.08.10 23:13:54 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.08.10 23:13:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.08.10 23:13:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.08.10 23:13:54 - OpenVPN > interactive service msg_channel=0 . 2024.08.10 23:13:54 - OpenVPN > open_tun . 2024.08.10 23:13:54 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.08.10 23:13:54 - OpenVPN > Exiting due to fatal error ! 2024.08.10 23:13:54 - Disconnecting . 2024.08.10 23:13:54 - Routes, delete 213.152.161.87/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.10 23:13:55 - Routes, delete 213.152.161.87/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", not exists. . 2024.08.10 23:13:55 - Connection terminated. I 2024.08.10 23:13:58 - Checking authorization ... . 2024.08.10 23:13:59 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2024.08.10 23:13:59 - Connecting to Canis (Netherlands, Alblasserdam) . 2024.08.10 23:13:59 - Routes, add 213.152.161.221/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.10 23:13:59 - Routes, add 213.152.161.221/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", already exists. . 2024.08.10 23:13:59 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.08.10 23:13:59 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.08.10 23:13:59 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.08.10 23:13:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.10 23:13:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.10 23:13:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.10 23:13:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.10 23:13:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.221:443 . 2024.08.10 23:13:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.08.10 23:13:59 - OpenVPN > UDP link local: (not bound) . 2024.08.10 23:13:59 - OpenVPN > UDP link remote: [AF_INET]213.152.161.221:443 . 2024.08.10 23:13:59 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.221:443, sid=cf04e6c4 8c75719d . 2024.08.10 23:14:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.08.10 23:14:00 - OpenVPN > VERIFY KU OK . 2024.08.10 23:14:00 - OpenVPN > Validating certificate extended key usage . 2024.08.10 23:14:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.08.10 23:14:00 - OpenVPN > VERIFY EKU OK . 2024.08.10 23:14:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Canis, emailAddress=info@airvpn.org . 2024.08.10 23:14:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.08.10 23:14:00 - OpenVPN > [Canis] Peer Connection Initiated with [AF_INET]213.152.161.221:443 . 2024.08.10 23:14:00 - OpenVPN > SENT CONTROL [Canis]: 'PUSH_REQUEST' (status=1) . 2024.08.10 23:14:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.12.106.1,dhcp-option DNS6 fde6:7a:7d20:86a::1,tun-ipv6,route-gateway 10.12.106.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:86a::10f6/64 fde6:7a:7d20:86a::1,ifconfig 10.12.106.248 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2024.08.10 23:14:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.08.10 23:14:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.12.106.1' . 2024.08.10 23:14:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:86a::1' . 2024.08.10 23:14:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.08.10 23:14:00 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.08.10 23:14:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.08.10 23:14:00 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.08.10 23:14:00 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.08.10 23:14:00 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.08.10 23:14:00 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.08.10 23:14:00 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.08.10 23:14:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.08.10 23:14:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.08.10 23:14:00 - OpenVPN > interactive service msg_channel=0 . 2024.08.10 23:14:00 - OpenVPN > open_tun . 2024.08.10 23:14:00 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.08.10 23:14:00 - OpenVPN > Exiting due to fatal error ! 2024.08.10 23:14:00 - Disconnecting . 2024.08.10 23:14:00 - Routes, delete 213.152.161.221/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.10 23:14:01 - Routes, delete 213.152.161.221/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", not exists. . 2024.08.10 23:14:01 - Connection terminated. I 2024.08.10 23:14:04 - Checking authorization ... . 2024.08.10 23:14:04 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2024.08.10 23:14:04 - Connecting to Elnath (Netherlands, Alblasserdam) . 2024.08.10 23:14:05 - Routes, add 213.152.186.42/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.10 23:14:05 - Routes, add 213.152.186.42/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", already exists. . 2024.08.10 23:14:05 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.08.10 23:14:05 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.08.10 23:14:05 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.08.10 23:14:05 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.10 23:14:05 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.10 23:14:05 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.10 23:14:05 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.10 23:14:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.186.42:443 . 2024.08.10 23:14:05 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.08.10 23:14:05 - OpenVPN > UDP link local: (not bound) . 2024.08.10 23:14:05 - OpenVPN > UDP link remote: [AF_INET]213.152.186.42:443 . 2024.08.10 23:14:05 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.186.42:443, sid=a0c9d2fb 0d8b8998 . 2024.08.10 23:14:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.08.10 23:14:05 - OpenVPN > VERIFY KU OK . 2024.08.10 23:14:05 - OpenVPN > Validating certificate extended key usage . 2024.08.10 23:14:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.08.10 23:14:05 - OpenVPN > VERIFY EKU OK . 2024.08.10 23:14:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Elnath, emailAddress=info@airvpn.org . 2024.08.10 23:14:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.08.10 23:14:05 - OpenVPN > [Elnath] Peer Connection Initiated with [AF_INET]213.152.186.42:443 . 2024.08.10 23:14:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.42.1,dhcp-option DNS6 fde6:7a:7d20:c2a::1,tun-ipv6,route-gateway 10.16.42.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:c2a::1041/64 fde6:7a:7d20:c2a::1,ifconfig 10.16.42.67 255.255.255.0,peer-id 9,cipher AES-256-GCM' . 2024.08.10 23:14:05 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.08.10 23:14:05 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.16.42.1' . 2024.08.10 23:14:05 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:c2a::1' . 2024.08.10 23:14:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.08.10 23:14:05 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.08.10 23:14:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.08.10 23:14:05 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.08.10 23:14:05 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.08.10 23:14:05 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.08.10 23:14:05 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.08.10 23:14:05 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.08.10 23:14:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.08.10 23:14:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.08.10 23:14:05 - OpenVPN > interactive service msg_channel=0 . 2024.08.10 23:14:05 - OpenVPN > open_tun . 2024.08.10 23:14:05 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.08.10 23:14:05 - OpenVPN > Exiting due to fatal error ! 2024.08.10 23:14:05 - Disconnecting . 2024.08.10 23:14:06 - Routes, delete 213.152.186.42/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.10 23:14:06 - Routes, delete 213.152.186.42/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", not exists. . 2024.08.10 23:14:06 - Connection terminated. I 2024.08.10 23:14:09 - Checking authorization ... . 2024.08.10 23:14:10 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2024.08.10 23:14:10 - Connecting to Musica (Netherlands, Alblasserdam) . 2024.08.10 23:14:10 - Routes, add 213.152.161.251/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.10 23:14:10 - Routes, add 213.152.161.251/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", already exists. . 2024.08.10 23:14:10 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.08.10 23:14:10 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.08.10 23:14:10 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.08.10 23:14:10 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.10 23:14:10 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.10 23:14:10 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.10 23:14:10 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.10 23:14:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.251:443 . 2024.08.10 23:14:10 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.08.10 23:14:10 - OpenVPN > UDP link local: (not bound) . 2024.08.10 23:14:10 - OpenVPN > UDP link remote: [AF_INET]213.152.161.251:443 . 2024.08.10 23:14:10 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.251:443, sid=0247972f 8a344ede . 2024.08.10 23:14:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.08.10 23:14:11 - OpenVPN > VERIFY KU OK . 2024.08.10 23:14:11 - OpenVPN > Validating certificate extended key usage . 2024.08.10 23:14:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.08.10 23:14:11 - OpenVPN > VERIFY EKU OK . 2024.08.10 23:14:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Musica, emailAddress=info@airvpn.org . 2024.08.10 23:14:11 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.08.10 23:14:11 - OpenVPN > [Musica] Peer Connection Initiated with [AF_INET]213.152.161.251:443 . 2024.08.10 23:14:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.170.1,dhcp-option DNS6 fde6:7a:7d20:14aa::1,tun-ipv6,route-gateway 10.24.170.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:14aa::10b5/64 fde6:7a:7d20:14aa::1,ifconfig 10.24.170.183 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.08.10 23:14:11 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.08.10 23:14:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.24.170.1' . 2024.08.10 23:14:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:14aa::1' . 2024.08.10 23:14:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.08.10 23:14:11 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.08.10 23:14:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.08.10 23:14:11 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.08.10 23:14:11 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.08.10 23:14:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.08.10 23:14:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.08.10 23:14:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.08.10 23:14:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.08.10 23:14:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.08.10 23:14:11 - OpenVPN > interactive service msg_channel=0 . 2024.08.10 23:14:11 - OpenVPN > open_tun . 2024.08.10 23:14:11 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.08.10 23:14:11 - OpenVPN > Exiting due to fatal error ! 2024.08.10 23:14:11 - Disconnecting . 2024.08.10 23:14:11 - Routes, delete 213.152.161.251/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.10 23:14:12 - Routes, delete 213.152.161.251/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", not exists. . 2024.08.10 23:14:12 - Connection terminated. I 2024.08.10 23:14:15 - Cancel requested. ! 2024.08.10 23:14:15 - Session terminated.
  3. When I try to connect to a server, my computer disconnects from the internet. My ISP is RCN. I'm on WiFi. I just did a factory reset of my modem and router, Arris s33 and TP-Link Ax6000, respectively. My connection is fine when the VPN is not connected to a server. . 2024.05.27 19:18:58 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.22631.0, Mono/.Net: v4.0.30319 . 2024.05.27 19:18:58 - Command line arguments (1): path="home" . 2024.05.27 19:18:58 - Raise system privileges . 2024.05.27 19:19:01 - Reading options from C:\Users\Acer\AppData\Local\Eddie\default.profile . 2024.05.27 19:19:02 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2024.05.27 19:19:02 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2024.05.27 19:19:02 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) W 2024.05.27 19:19:02 - Windows WFP, recovery of pending rules. . 2024.05.27 19:19:02 - Recovery. Unexpected crash? ! 2024.05.27 19:19:02 - Deactivation of Network Lock I 2024.05.27 19:19:02 - Ready . 2024.05.27 19:19:03 - Collect information about AirVPN completed ! 2024.05.27 19:19:04 - Logged out. I 2024.05.27 19:19:05 - Checking login ... ! 2024.05.27 19:19:05 - Logged in. I 2024.05.27 19:19:12 - Session starting. I 2024.05.27 19:19:13 - Checking authorization ... . 2024.05.27 19:19:14 - Added new network interface "Eddie", Wintun version 0.12 . 2024.05.27 19:19:14 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.05.27 19:19:14 - Connecting to Alnitak (Serbia, Belgrade) . 2024.05.27 19:19:14 - Routes, add 152.89.160.133/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)". . 2024.05.27 19:19:14 - Routes, add 152.89.160.133/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)", already exists. . 2024.05.27 19:19:14 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.05.27 19:19:14 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.05.27 19:19:14 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.05.27 19:19:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.27 19:19:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.27 19:19:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.27 19:19:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.27 19:19:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]152.89.160.133:443 . 2024.05.27 19:19:14 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.05.27 19:19:14 - OpenVPN > UDP link local: (not bound) . 2024.05.27 19:19:14 - OpenVPN > UDP link remote: [AF_INET]152.89.160.133:443 . 2024.05.27 19:19:14 - OpenVPN > TLS: Initial packet from [AF_INET]152.89.160.133:443, sid=3162c042 7accb1f0 . 2024.05.27 19:19:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.05.27 19:19:14 - OpenVPN > VERIFY KU OK . 2024.05.27 19:19:14 - OpenVPN > Validating certificate extended key usage . 2024.05.27 19:19:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.05.27 19:19:14 - OpenVPN > VERIFY EKU OK . 2024.05.27 19:19:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alnitak, emailAddress=info@airvpn.org . 2024.05.27 19:19:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.05.27 19:19:15 - OpenVPN > [Alnitak] Peer Connection Initiated with [AF_INET]152.89.160.133:443 . 2024.05.27 19:19:15 - OpenVPN > SENT CONTROL [Alnitak]: 'PUSH_REQUEST' (status=1) . 2024.05.27 19:19:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.11.146.1,dhcp-option DNS6 fde6:7a:7d20:792::1,tun-ipv6,route-gateway 10.11.146.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:792::1058/64 fde6:7a:7d20:792::1,ifconfig 10.11.146.90 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.05.27 19:19:15 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.05.27 19:19:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.11.146.1' . 2024.05.27 19:19:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:792::1' . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.05.27 19:19:15 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.05.27 19:19:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.05.27 19:19:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.05.27 19:19:15 - OpenVPN > interactive service msg_channel=0 . 2024.05.27 19:19:15 - OpenVPN > open_tun . 2024.05.27 19:19:15 - OpenVPN > wintun device [Eddie] opened . 2024.05.27 19:19:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 47 static 10.11.146.90 255.255.255.0 . 2024.05.27 19:19:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 47 all . 2024.05.27 19:19:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 47 all . 2024.05.27 19:19:15 - OpenVPN > IPv4 MTU set to 1500 on interface 47 using SetIpInterfaceEntry() . 2024.05.27 19:19:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 47 fde6:7a:7d20:792::1058/128 store=active . 2024.05.27 19:19:15 - OpenVPN > add_route_ipv6(fde6:7a:7d20:792::/64 -> fde6:7a:7d20:792::1058 metric 0) dev Eddie . 2024.05.27 19:19:15 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:792::/64 47 fe80::8 store=active . 2024.05.27 19:19:15 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.05.27 19:19:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 47 all . 2024.05.27 19:19:15 - OpenVPN > IPv6 MTU set to 1500 on interface 47 using SetIpInterfaceEntry() . 2024.05.27 19:19:15 - OpenVPN > Initialization Sequence Completed . 2024.05.27 19:19:15 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.05.27 19:19:15 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.05.27 19:19:15 - DNS leak protection with packet filtering enabled. . 2024.05.27 19:19:15 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.11.146.1) . 2024.05.27 19:19:16 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:792::1) . 2024.05.27 19:19:16 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:19:16 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:19:16 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:19:16 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:19:16 - Routes, add 152.89.160.131/32 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:19:17 - Routes, add 2001:ac8:7d:1e11:3b82:4ed7:b05:3386/128 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:19:17 - Flushing DNS I 2024.05.27 19:19:17 - Checking route IPv4 . 2024.05.27 19:19:44 - Checking route (4° try) . 2024.05.27 19:20:09 - Checking route (5° try) E 2024.05.27 19:20:30 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2024.05.27 19:20:30 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:20:30 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:20:30 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:20:30 - Above log line repeated 20 times more ! 2024.05.27 19:20:30 - Disconnecting . 2024.05.27 19:20:30 - Sending soft termination signal . 2024.05.27 19:20:33 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.05.27 19:20:35 - OpenVPN > Closing TUN/TAP interface . 2024.05.27 19:20:35 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:792::/64) . 2024.05.27 19:20:35 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:792::/64 47 fe80::8 store=active . 2024.05.27 19:20:35 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 47 fde6:7a:7d20:792::1058 store=active . 2024.05.27 19:20:35 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 47 10.11.146.90 store=active . 2024.05.27 19:20:35 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.05.27 19:20:35 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:36 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:36 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:36 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:36 - Routes, delete 152.89.160.133/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)". . 2024.05.27 19:20:36 - Routes, delete 152.89.160.131/32 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:36 - Routes, delete 2001:ac8:7d:1e11:3b82:4ed7:b05:3386/128 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:36 - Routes, delete 152.89.160.133/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)", not exists. . 2024.05.27 19:20:36 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.05.27 19:20:37 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.05.27 19:20:37 - DNS leak protection with packet filtering disabled. . 2024.05.27 19:20:37 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.05.27 19:20:37 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.05.27 19:20:37 - Connection terminated. I 2024.05.27 19:20:40 - Checking authorization ... . 2024.05.27 19:20:40 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.05.27 19:20:40 - Connecting to Sharatan (Canada, Toronto, Ontario) . 2024.05.27 19:20:40 - Routes, add 104.254.90.197/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)". . 2024.05.27 19:20:41 - Routes, add 104.254.90.197/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)", already exists. . 2024.05.27 19:20:41 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.05.27 19:20:41 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.05.27 19:20:41 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.05.27 19:20:41 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.27 19:20:41 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.27 19:20:41 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.27 19:20:41 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.27 19:20:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.197:443 . 2024.05.27 19:20:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.05.27 19:20:41 - OpenVPN > UDP link local: (not bound) . 2024.05.27 19:20:41 - OpenVPN > UDP link remote: [AF_INET]104.254.90.197:443 . 2024.05.27 19:20:41 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.197:443, sid=8b799069 f4142b47 . 2024.05.27 19:20:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.05.27 19:20:41 - OpenVPN > VERIFY KU OK . 2024.05.27 19:20:41 - OpenVPN > Validating certificate extended key usage . 2024.05.27 19:20:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.05.27 19:20:41 - OpenVPN > VERIFY EKU OK . 2024.05.27 19:20:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2024.05.27 19:20:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.05.27 19:20:41 - OpenVPN > [Sharatan] Peer Connection Initiated with [AF_INET]104.254.90.197:443 . 2024.05.27 19:20:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.242.1,dhcp-option DNS6 fde6:7a:7d20:19f2::1,tun-ipv6,route-gateway 10.29.242.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:19f2::1024/64 fde6:7a:7d20:19f2::1,ifconfig 10.29.242.38 255.255.255.0,peer-id 13,cipher AES-256-GCM' . 2024.05.27 19:20:41 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.05.27 19:20:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.29.242.1' . 2024.05.27 19:20:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:19f2::1' . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.05.27 19:20:41 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.05.27 19:20:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.05.27 19:20:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.05.27 19:20:41 - OpenVPN > interactive service msg_channel=0 . 2024.05.27 19:20:41 - OpenVPN > open_tun . 2024.05.27 19:20:41 - OpenVPN > wintun device [Eddie] opened . 2024.05.27 19:20:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 47 static 10.29.242.38 255.255.255.0 . 2024.05.27 19:20:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 47 all . 2024.05.27 19:20:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 47 all . 2024.05.27 19:20:41 - OpenVPN > IPv4 MTU set to 1500 on interface 47 using SetIpInterfaceEntry() . 2024.05.27 19:20:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 47 fde6:7a:7d20:19f2::1024/128 store=active . 2024.05.27 19:20:41 - OpenVPN > add_route_ipv6(fde6:7a:7d20:19f2::/64 -> fde6:7a:7d20:19f2::1024 metric 0) dev Eddie . 2024.05.27 19:20:41 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:19f2::/64 47 fe80::8 store=active . 2024.05.27 19:20:41 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.05.27 19:20:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 47 all . 2024.05.27 19:20:42 - OpenVPN > IPv6 MTU set to 1500 on interface 47 using SetIpInterfaceEntry() . 2024.05.27 19:20:42 - OpenVPN > Initialization Sequence Completed . 2024.05.27 19:20:42 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.05.27 19:20:42 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.05.27 19:20:42 - DNS leak protection with packet filtering enabled. . 2024.05.27 19:20:42 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.29.242.1) . 2024.05.27 19:20:42 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:19f2::1) . 2024.05.27 19:20:42 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:42 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:42 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:42 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:43 - Routes, add 104.254.90.195/32 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:43 - Routes, add 2606:6080:2001:6:e14e:c3f3:8562:6916/128 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:43 - Flushing DNS I 2024.05.27 19:20:43 - Checking route IPv4 . 2024.05.27 19:21:10 - Checking route (4° try) . 2024.05.27 19:21:35 - Checking route (5° try) E 2024.05.27 19:21:56 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2024.05.27 19:21:56 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:21:56 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:21:56 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:21:56 - Above log line repeated 15 times more ! 2024.05.27 19:21:56 - Disconnecting . 2024.05.27 19:21:56 - Sending soft termination signal . 2024.05.27 19:21:59 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.05.27 19:22:01 - OpenVPN > Closing TUN/TAP interface . 2024.05.27 19:22:01 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:19f2::/64) . 2024.05.27 19:22:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:19f2::/64 47 fe80::8 store=active . 2024.05.27 19:22:01 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 47 fde6:7a:7d20:19f2::1024 store=active . 2024.05.27 19:22:01 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 47 10.29.242.38 store=active . 2024.05.27 19:22:01 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.05.27 19:22:01 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:01 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:01 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:01 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:02 - Routes, delete 104.254.90.197/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)". . 2024.05.27 19:22:02 - Routes, delete 104.254.90.195/32 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:02 - Routes, delete 2606:6080:2001:6:e14e:c3f3:8562:6916/128 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:02 - Routes, delete 104.254.90.197/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)", not exists. . 2024.05.27 19:22:02 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.05.27 19:22:02 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.05.27 19:22:02 - DNS leak protection with packet filtering disabled. . 2024.05.27 19:22:02 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.05.27 19:22:02 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.05.27 19:22:02 - Connection terminated. I 2024.05.27 19:22:05 - Checking authorization ... . 2024.05.27 19:22:06 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.05.27 19:22:06 - Connecting to Enif (Canada, Toronto, Ontario) . 2024.05.27 19:22:06 - Routes, add 104.254.90.245/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)". . 2024.05.27 19:22:06 - Routes, add 104.254.90.245/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)", already exists. . 2024.05.27 19:22:06 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.05.27 19:22:06 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.05.27 19:22:06 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.05.27 19:22:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.27 19:22:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.27 19:22:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.27 19:22:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.27 19:22:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.245:443 . 2024.05.27 19:22:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.05.27 19:22:06 - OpenVPN > UDP link local: (not bound) . 2024.05.27 19:22:06 - OpenVPN > UDP link remote: [AF_INET]104.254.90.245:443 . 2024.05.27 19:22:06 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.245:443, sid=3683630a a2432df3 . 2024.05.27 19:22:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.05.27 19:22:06 - OpenVPN > VERIFY KU OK . 2024.05.27 19:22:06 - OpenVPN > Validating certificate extended key usage . 2024.05.27 19:22:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.05.27 19:22:06 - OpenVPN > VERIFY EKU OK . 2024.05.27 19:22:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2024.05.27 19:22:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.05.27 19:22:06 - OpenVPN > [Enif] Peer Connection Initiated with [AF_INET]104.254.90.245:443 . 2024.05.27 19:22:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.82.1,dhcp-option DNS6 fde6:7a:7d20:c52::1,tun-ipv6,route-gateway 10.16.82.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:c52::1016/64 fde6:7a:7d20:c52::1,ifconfig 10.16.82.24 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2024.05.27 19:22:06 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.05.27 19:22:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.16.82.1' . 2024.05.27 19:22:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:c52::1' . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.05.27 19:22:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.05.27 19:22:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.05.27 19:22:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.05.27 19:22:06 - OpenVPN > interactive service msg_channel=0 . 2024.05.27 19:22:06 - OpenVPN > open_tun . 2024.05.27 19:22:06 - OpenVPN > wintun device [Eddie] opened . 2024.05.27 19:22:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 47 static 10.16.82.24 255.255.255.0 . 2024.05.27 19:22:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 47 all . 2024.05.27 19:22:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 47 all . 2024.05.27 19:22:07 - OpenVPN > IPv4 MTU set to 1500 on interface 47 using SetIpInterfaceEntry() . 2024.05.27 19:22:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 47 fde6:7a:7d20:c52::1016/128 store=active . 2024.05.27 19:22:07 - OpenVPN > add_route_ipv6(fde6:7a:7d20:c52::/64 -> fde6:7a:7d20:c52::1016 metric 0) dev Eddie . 2024.05.27 19:22:07 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:c52::/64 47 fe80::8 store=active . 2024.05.27 19:22:07 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.05.27 19:22:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 47 all . 2024.05.27 19:22:07 - OpenVPN > IPv6 MTU set to 1500 on interface 47 using SetIpInterfaceEntry() . 2024.05.27 19:22:07 - OpenVPN > Initialization Sequence Completed . 2024.05.27 19:22:07 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.05.27 19:22:07 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.05.27 19:22:07 - DNS leak protection with packet filtering enabled. . 2024.05.27 19:22:07 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.16.82.1) . 2024.05.27 19:22:07 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:c52::1) . 2024.05.27 19:22:07 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:07 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:07 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:08 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:08 - Routes, add 104.254.90.243/32 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:08 - Routes, add 2606:6080:2001:9:2679:addd:655:8142/128 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:08 - Flushing DNS I 2024.05.27 19:22:08 - Checking route IPv4 . 2024.05.27 19:22:32 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:22:32 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:22:32 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:22:32 - Above log line repeated 11 times more ! 2024.05.27 19:22:32 - Disconnecting . 2024.05.27 19:22:32 - Sending soft termination signal . 2024.05.27 19:22:35 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.05.27 19:22:37 - OpenVPN > Closing TUN/TAP interface . 2024.05.27 19:22:37 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:c52::/64) . 2024.05.27 19:22:37 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:c52::/64 47 fe80::8 store=active . 2024.05.27 19:22:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 47 fde6:7a:7d20:c52::1016 store=active . 2024.05.27 19:22:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 47 10.16.82.24 store=active . 2024.05.27 19:22:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.05.27 19:22:37 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:38 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:38 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:38 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:38 - Routes, delete 104.254.90.245/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)". . 2024.05.27 19:22:38 - Routes, delete 104.254.90.243/32 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:38 - Routes, delete 2606:6080:2001:9:2679:addd:655:8142/128 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:38 - Routes, delete 104.254.90.245/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)", not exists. . 2024.05.27 19:22:39 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.05.27 19:22:39 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.05.27 19:22:39 - DNS leak protection with packet filtering disabled. . 2024.05.27 19:22:39 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.05.27 19:22:39 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.05.27 19:22:39 - Connection terminated. I 2024.05.27 19:22:39 - Cancel requested. ! 2024.05.27 19:22:39 - Session terminated.
×
×
  • Create New...