Jump to content
Not connected, Your IP: 34.226.141.207
Sign in to follow this  
g154880

No Internet Access

Recommended Posts

Hello:

 

eddie connects but then i have no internet access. have tried multiple canadian servers. logs below. any support would be appreciated, thank you.

 

 

Eddie System/Environment Report - 6/10/2018 8:08 PM UTC
 
Eddie version: 2.14.5
Eddie OS build: windows_x64
Eddie architecture: x64
OS type: Windows
OS name: Windows 10 Home
OS version: Microsoft Windows NT 10.0.17134.0
OS architecture: x64
Mono /.Net Framework: v4.0.30319
OpenVPN driver: 
OpenVPN: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
Profile path: C:\Users\j&a\AppData\Local\AirVPN\AirVPN.xml
Data path: C:\Users\j&a\AppData\Local\AirVPN
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\Eddie-UI.exe
Command line arguments: (1 args) path="home"
Network Lock Active: Yes, Windows Filtering Platform
Connected to VPN: Yes, Lesath
Detected DNS: 10.0.0.1, 10.4.0.1, 2001:4e8:0:4007::15, 2001:4e8:0:4009::11
Test DNS IPv4: Ok
Test DNS IPv6: Failed
Test Ping IPv4: 80 ms
Test Ping IPv6: -1 ms
Test HTTP IPv4: Ok
Test HTTP IPv6: Error:curl: (6) Could not resolve host: ipv6.eddie.website
Test HTTPS: Ok
----------------------------
Important options not at defaults:
 
login: (omissis)
password: (omissis)
remember: True
 
----------------------------
Logs:
 
. 2018.06.10 12:45:17 - Eddie version: 2.14.5 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.17134.0, Mono/.Net: v4.0.30319
. 2018.06.10 12:45:17 - Reading options from C:\Users\j&a\AppData\Local\AirVPN\AirVPN.xml
. 2018.06.10 12:45:17 - Profile options not found, using defaults.
. 2018.06.10 12:45:17 - Command line arguments (1): path="home"
. 2018.06.10 12:45:18 - Cannot find tunnel adapter.
E 2018.06.10 12:45:19 - OpenVPN Driver - Not available - Will be installed at next connection.
. 2018.06.10 12:45:19 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2018.06.10 12:45:19 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2018.06.10 12:45:19 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2018.06.10 12:45:19 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
. 2018.06.10 12:45:19 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem
. 2018.06.10 12:45:20 - Updating systems & servers data ...
I 2018.06.10 12:45:20 - Ready
. 2018.06.10 12:45:21 - Systems & servers data update completed
I 2018.06.10 12:46:04 - Checking login ...
! 2018.06.10 12:46:05 - Logged in.
! 2018.06.10 12:46:14 - Activation of Network Lock - Windows Filtering Platform
I 2018.06.10 12:46:18 - Session starting.
. 2018.06.10 12:46:18 - Cannot find tunnel adapter.
! 2018.06.10 12:46:18 - Installing tunnel driver
I 2018.06.10 12:46:22 - Checking authorization ...
. 2018.06.10 12:46:22 - IPv6 disabled with packet filtering.
! 2018.06.10 12:46:22 - Connecting to Gorgonea (Canada, Toronto, Ontario)
. 2018.06.10 12:46:23 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.06.10 12:46:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.06.10 12:46:23 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.06.10 12:46:23 - Connection to OpenVPN Management Interface
. 2018.06.10 12:46:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.06.10 12:46:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 12:46:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 12:46:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.250:443
. 2018.06.10 12:46:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.06.10 12:46:23 - OpenVPN > UDP link local: (not bound)
. 2018.06.10 12:46:23 - OpenVPN > UDP link remote: [AF_INET]104.254.90.250:443
. 2018.06.10 12:46:23 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.250:443, sid=01bc53b3 755548eb
. 2018.06.10 12:46:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.06.10 12:46:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.06.10 12:46:23 - OpenVPN > VERIFY KU OK
. 2018.06.10 12:46:23 - OpenVPN > Validating certificate extended key usage
. 2018.06.10 12:46:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.06.10 12:46:23 - OpenVPN > VERIFY EKU OK
. 2018.06.10 12:46:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.06.10 12:46:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.06.10 12:46:23 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.250:443
. 2018.06.10 12:46:24 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.06.10 12:46:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.115 255.255.0.0,peer-id 26,cipher AES-256-GCM'
. 2018.06.10 12:46:24 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.06.10 12:46:24 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.06.10 12:46:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.06.10 12:46:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.06.10 12:46:24 - OpenVPN > interactive service msg_channel=0
. 2018.06.10 12:46:24 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b
. 2018.06.10 12:46:24 - OpenVPN > open_tun
. 2018.06.10 12:46:24 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap
. 2018.06.10 12:46:24 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.06.10 12:46:24 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.115/255.255.0.0 [sUCCEEDED]
. 2018.06.10 12:46:24 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.115/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.06.10 12:46:24 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}
. 2018.06.10 12:46:24 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.06.10 12:46:29 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.06.10 12:46:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 104.254.90.250 MASK 255.255.255.255 10.0.0.1
. 2018.06.10 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 12:46:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 12:46:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 12:46:29 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.06.10 12:46:29 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.06.10 12:46:29 - DNS leak protection with packet filtering enabled.
. 2018.06.10 12:46:29 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1)
. 2018.06.10 12:46:29 - Routes, added a new route, 104.254.90.251 for gateway 10.4.0.1
. 2018.06.10 12:46:29 - Flushing DNS
I 2018.06.10 12:46:32 - Checking route IPv4
I 2018.06.10 12:46:33 - Checking DNS
! 2018.06.10 12:46:45 - Connected.
. 2018.06.10 12:46:45 - OpenVPN > Initialization Sequence Completed
. 2018.06.10 12:46:45 - OpenVpn Management > ENTER PASSWORD:
! 2018.06.10 12:47:31 - Disconnecting
. 2018.06.10 12:47:31 - Routes, removed a route previously added, 104.254.90.251 for gateway 10.4.0.1
. 2018.06.10 12:47:31 - Sending management termination signal
. 2018.06.10 12:47:31 - Management - Send 'signal SIGTERM'
. 2018.06.10 12:47:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.06.10 12:47:32 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.06.10 12:47:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 104.254.90.250 MASK 255.255.255.255 10.0.0.1
. 2018.06.10 12:47:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.06.10 12:47:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 12:47:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.06.10 12:47:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 12:47:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.06.10 12:47:36 - OpenVPN > Closing TUN/TAP interface
. 2018.06.10 12:47:36 - OpenVPN > TAP: DHCP address released
. 2018.06.10 12:47:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.06.10 12:47:36 - Connection terminated.
. 2018.06.10 12:47:36 - IPv6 restored with packet filtering.
. 2018.06.10 12:47:36 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic)
. 2018.06.10 12:47:36 - DNS leak protection with packet filtering disabled.
. 2018.06.10 12:47:36 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.06.10 12:47:36 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.06.10 12:47:36 - Flushing DNS
! 2018.06.10 12:47:39 - Session terminated.
! 2018.06.10 12:47:40 - Deactivation of Network Lock
I 2018.06.10 12:49:02 - Session starting.
I 2018.06.10 12:49:02 - Checking authorization ...
. 2018.06.10 12:49:02 - IPv6 disabled with packet filtering.
! 2018.06.10 12:49:02 - Connecting to Alwaid (Canada, Toronto, Ontario)
. 2018.06.10 12:49:03 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.06.10 12:49:03 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.06.10 12:49:03 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.06.10 12:49:03 - Connection to OpenVPN Management Interface
. 2018.06.10 12:49:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.06.10 12:49:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 12:49:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 12:49:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.114:443
. 2018.06.10 12:49:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.06.10 12:49:03 - OpenVPN > UDP link local: (not bound)
. 2018.06.10 12:49:03 - OpenVPN > UDP link remote: [AF_INET]184.75.221.114:443
. 2018.06.10 12:49:03 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.114:443, sid=820316e9 17d858a1
. 2018.06.10 12:49:03 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.06.10 12:49:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.06.10 12:49:03 - OpenVPN > VERIFY KU OK
. 2018.06.10 12:49:03 - OpenVPN > Validating certificate extended key usage
. 2018.06.10 12:49:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.06.10 12:49:03 - OpenVPN > VERIFY EKU OK
. 2018.06.10 12:49:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.06.10 12:49:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.06.10 12:49:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.114:443
. 2018.06.10 12:49:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.06.10 12:49:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.174 255.255.0.0'
. 2018.06.10 12:49:07 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.06.10 12:49:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.06.10 12:49:07 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 12:49:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.06.10 12:49:07 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 12:49:07 - OpenVPN > interactive service msg_channel=0
. 2018.06.10 12:49:07 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b
. 2018.06.10 12:49:07 - OpenVPN > open_tun
. 2018.06.10 12:49:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap
. 2018.06.10 12:49:07 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.06.10 12:49:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.174/255.255.0.0 [sUCCEEDED]
. 2018.06.10 12:49:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.174/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.06.10 12:49:07 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}
. 2018.06.10 12:49:07 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.06.10 12:49:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.06.10 12:49:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.114 MASK 255.255.255.255 10.0.0.1
. 2018.06.10 12:49:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 12:49:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 12:49:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 12:49:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 12:49:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 12:49:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 12:49:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 12:49:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 12:49:12 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.06.10 12:49:12 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.06.10 12:49:12 - DNS leak protection with packet filtering enabled.
. 2018.06.10 12:49:12 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1)
. 2018.06.10 12:49:12 - Routes, added a new route, 184.75.221.115 for gateway 10.4.0.1
. 2018.06.10 12:49:12 - Flushing DNS
I 2018.06.10 12:49:16 - Checking route IPv4
I 2018.06.10 12:49:16 - Checking DNS
! 2018.06.10 12:49:29 - Connected.
. 2018.06.10 12:49:29 - OpenVPN > Initialization Sequence Completed
. 2018.06.10 12:49:29 - OpenVpn Management > ENTER PASSWORD:
. 2018.06.10 12:56:00 - Updating systems & servers data ...
. 2018.06.10 12:56:01 - Systems & servers data update completed
. 2018.06.10 12:57:58 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #68630 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2018.06.10 13:00:59 - Above log line repeated 19 times more
! 2018.06.10 13:00:59 - Disconnecting
. 2018.06.10 13:00:59 - Routes, removed a route previously added, 184.75.221.115 for gateway 10.4.0.1
. 2018.06.10 13:00:59 - Sending management termination signal
. 2018.06.10 13:00:59 - Management - Send 'signal SIGTERM'
. 2018.06.10 13:00:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.06.10 13:00:59 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.06.10 13:01:04 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.221.114 MASK 255.255.255.255 10.0.0.1
. 2018.06.10 13:01:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.06.10 13:01:04 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 13:01:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.06.10 13:01:04 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 13:01:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.06.10 13:01:04 - OpenVPN > Closing TUN/TAP interface
. 2018.06.10 13:01:04 - OpenVPN > TAP: DHCP address released
. 2018.06.10 13:01:04 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.06.10 13:01:04 - Connection terminated.
. 2018.06.10 13:01:04 - IPv6 restored with packet filtering.
. 2018.06.10 13:01:04 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic)
. 2018.06.10 13:01:04 - DNS leak protection with packet filtering disabled.
. 2018.06.10 13:01:04 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.06.10 13:01:04 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.06.10 13:01:04 - Flushing DNS
! 2018.06.10 13:01:07 - Session terminated.
! 2018.06.10 13:01:09 - Activation of Network Lock - Windows Filtering Platform
I 2018.06.10 13:01:18 - Session starting.
I 2018.06.10 13:01:18 - Checking authorization ...
. 2018.06.10 13:01:18 - IPv6 disabled with packet filtering.
! 2018.06.10 13:01:18 - Connecting to Rotanev (Canada, Toronto, Ontario)
. 2018.06.10 13:01:19 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.06.10 13:01:19 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.06.10 13:01:19 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.06.10 13:01:19 - Connection to OpenVPN Management Interface
. 2018.06.10 13:01:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.06.10 13:01:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 13:01:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 13:01:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.186:443
. 2018.06.10 13:01:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.06.10 13:01:19 - OpenVPN > UDP link local: (not bound)
. 2018.06.10 13:01:19 - OpenVPN > UDP link remote: [AF_INET]104.254.90.186:443
. 2018.06.10 13:01:19 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.186:443, sid=047e9ced e53fae6b
. 2018.06.10 13:01:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.06.10 13:01:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.06.10 13:01:19 - OpenVPN > VERIFY KU OK
. 2018.06.10 13:01:19 - OpenVPN > Validating certificate extended key usage
. 2018.06.10 13:01:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.06.10 13:01:19 - OpenVPN > VERIFY EKU OK
. 2018.06.10 13:01:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.06.10 13:01:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.06.10 13:01:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.186:443
. 2018.06.10 13:01:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.06.10 13:01:25 - Above log line repeated 1 times more
. 2018.06.10 13:01:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.11.48 255.255.0.0'
. 2018.06.10 13:01:25 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.06.10 13:01:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.06.10 13:01:25 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 13:01:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.06.10 13:01:25 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 13:01:25 - OpenVPN > interactive service msg_channel=0
. 2018.06.10 13:01:25 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b
. 2018.06.10 13:01:25 - OpenVPN > open_tun
. 2018.06.10 13:01:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap
. 2018.06.10 13:01:25 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.06.10 13:01:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.11.48/255.255.0.0 [sUCCEEDED]
. 2018.06.10 13:01:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.11.48/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.06.10 13:01:25 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}
. 2018.06.10 13:01:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.06.10 13:01:31 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.06.10 13:01:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 104.254.90.186 MASK 255.255.255.255 10.0.0.1
. 2018.06.10 13:01:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 13:01:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 13:01:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 13:01:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 13:01:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 13:01:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 13:01:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 13:01:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 13:01:31 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.06.10 13:01:31 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.06.10 13:01:31 - DNS leak protection with packet filtering enabled.
. 2018.06.10 13:01:31 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1)
. 2018.06.10 13:01:31 - Routes, added a new route, 104.254.90.187 for gateway 10.4.0.1
. 2018.06.10 13:01:31 - Flushing DNS
I 2018.06.10 13:01:34 - Checking route IPv4
I 2018.06.10 13:01:35 - Checking DNS
! 2018.06.10 13:01:47 - Connected.
. 2018.06.10 13:01:47 - OpenVPN > Initialization Sequence Completed
. 2018.06.10 13:01:47 - OpenVpn Management > ENTER PASSWORD:
. 2018.06.10 13:06:36 - Updating systems & servers data ...
. 2018.06.10 13:06:38 - Systems & servers data update completed
! 2018.06.10 13:06:56 - Disconnecting
. 2018.06.10 13:06:56 - Routes, removed a route previously added, 104.254.90.187 for gateway 10.4.0.1
. 2018.06.10 13:06:56 - Sending management termination signal
. 2018.06.10 13:06:56 - Management - Send 'signal SIGTERM'
. 2018.06.10 13:06:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.06.10 13:06:56 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.06.10 13:07:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 104.254.90.186 MASK 255.255.255.255 10.0.0.1
. 2018.06.10 13:07:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.06.10 13:07:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 13:07:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.06.10 13:07:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 13:07:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.06.10 13:07:01 - OpenVPN > Closing TUN/TAP interface
. 2018.06.10 13:07:01 - OpenVPN > TAP: DHCP address released
. 2018.06.10 13:07:01 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.06.10 13:07:01 - Connection terminated.
. 2018.06.10 13:07:01 - IPv6 restored with packet filtering.
. 2018.06.10 13:07:01 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic)
. 2018.06.10 13:07:01 - DNS leak protection with packet filtering disabled.
. 2018.06.10 13:07:01 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.06.10 13:07:01 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
I 2018.06.10 13:07:01 - Checking authorization ...
. 2018.06.10 13:07:02 - IPv6 disabled with packet filtering.
! 2018.06.10 13:07:02 - Connecting to Lesath (Canada, Toronto, Ontario)
. 2018.06.10 13:07:02 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.06.10 13:07:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.06.10 13:07:02 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.06.10 13:07:02 - Connection to OpenVPN Management Interface
. 2018.06.10 13:07:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.06.10 13:07:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 13:07:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 13:07:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443
. 2018.06.10 13:07:02 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.06.10 13:07:02 - OpenVPN > UDP link local: (not bound)
. 2018.06.10 13:07:02 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443
. 2018.06.10 13:07:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=3f473ba1 678b1534
. 2018.06.10 13:07:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.06.10 13:07:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.06.10 13:07:02 - OpenVPN > VERIFY KU OK
. 2018.06.10 13:07:02 - OpenVPN > Validating certificate extended key usage
. 2018.06.10 13:07:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.06.10 13:07:02 - OpenVPN > VERIFY EKU OK
. 2018.06.10 13:07:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.06.10 13:07:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.06.10 13:07:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443
. 2018.06.10 13:07:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.06.10 13:07:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.129 255.255.0.0,peer-id 35,cipher AES-256-GCM'
. 2018.06.10 13:07:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.06.10 13:07:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.06.10 13:07:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.06.10 13:07:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.06.10 13:07:03 - OpenVPN > interactive service msg_channel=0
. 2018.06.10 13:07:03 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b
. 2018.06.10 13:07:03 - OpenVPN > open_tun
. 2018.06.10 13:07:03 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap
. 2018.06.10 13:07:03 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.06.10 13:07:03 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.129/255.255.0.0 [sUCCEEDED]
. 2018.06.10 13:07:03 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.129/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.06.10 13:07:03 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}
. 2018.06.10 13:07:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.06.10 13:07:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.06.10 13:07:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.2 MASK 255.255.255.255 10.0.0.1
. 2018.06.10 13:07:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 13:07:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 13:07:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 13:07:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 13:07:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 13:07:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 13:07:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 13:07:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 13:07:09 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.06.10 13:07:09 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.06.10 13:07:09 - DNS leak protection with packet filtering enabled.
. 2018.06.10 13:07:09 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1)
. 2018.06.10 13:07:09 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1
. 2018.06.10 13:07:09 - Flushing DNS
I 2018.06.10 13:07:12 - Checking route IPv4
I 2018.06.10 13:07:13 - Checking DNS
! 2018.06.10 13:07:25 - Connected.
. 2018.06.10 13:07:25 - OpenVPN > Initialization Sequence Completed
. 2018.06.10 13:07:25 - OpenVpn Management > ENTER PASSWORD:
 
----------------------------
Network Interfaces and Routes:
 
{
"support_ipv4": true,
"support_ipv6": true,
"routes": [
{
"address": "0.0.0.0\/0",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "10.0.0.1",
"metric": "35"
},
{
"address": "0.0.0.0\/1",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "10.4.0.1",
"metric": "3"
},
{
"address": "10.0.0.0\/24",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "10.0.0.28",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "10.0.0.255",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "10.4.0.0\/16",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "link",
"metric": "259"
},
{
"address": "10.4.12.129",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "link",
"metric": "259"
},
{
"address": "10.4.255.255",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "link",
"metric": "259"
},
{
"address": "127.0.0.0\/8",
"interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}",
"gateway": "link",
"metric": "331"
},
{
"address": "127.0.0.1",
"interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}",
"gateway": "link",
"metric": "331"
},
{
"address": "127.255.255.255",
"interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}",
"gateway": "link",
"metric": "331"
},
{
"address": "128.0.0.0\/1",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "10.4.0.1",
"metric": "3"
},
{
"address": "184.75.221.2",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "10.0.0.1",
"metric": "35"
},
{
"address": "184.75.221.3",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "10.4.0.1",
"metric": "4"
},
{
"address": "224.0.0.0\/4",
"interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}",
"gateway": "link",
"metric": "331"
},
{
"address": "224.0.0.0\/4",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "224.0.0.0\/4",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "link",
"metric": "259"
},
{
"address": "255.255.255.255",
"interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}",
"gateway": "link",
"metric": "331"
},
{
"address": "255.255.255.255",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "255.255.255.255",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "link",
"metric": "259"
},
{
"address": "::1",
"interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}",
"gateway": "link",
"metric": "331"
},
{
"address": "2604:3d08:807f:fff2::\/64",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "2604:3d08:807f:fff2::4b9b",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "2604:3d08:807f:fff2:d9a:651b:8f8c:3d75",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "2604:3d08:807f:fff2:6068:eaf3:7657:beff",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "fe80::\/64",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "fe80::\/64",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "link",
"metric": "259"
},
{
"address": "fe80::d9a:651b:8f8c:3d75",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "fe80::1923:642e:f94e:9d84",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "link",
"metric": "259"
},
{
"address": "ff00::\/8",
"interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}",
"gateway": "link",
"metric": "331"
},
{
"address": "ff00::\/8",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "ff00::\/8",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "link",
"metric": "259"
}
],
"interfaces": [
{
"friendly": "Ethernet 2",
"id": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"name": "Ethernet 2",
"description": "TAP-Windows Adapter V9",
"type": "Ethernet",
"status": "Up",
"bytes_received": "187651520",
"bytes_sent": "8967995",
"support_ipv4": true,
"support_ipv6": true,
"ips": [
"fe80::1923:642e:f94e:9d84",
"10.4.12.129"
],
"gateways": [
"10.4.0.1"
],
"bind": true,
"dns4": "10.4.0.1",
"dns6": ""
},
{
"friendly": "Ethernet",
"id": "{3734B147-25DA-4BF8-A5D2-DC0198F2AEDE}",
"name": "Ethernet",
"description": "Intel® Ethernet Connection (2) I219-V",
"type": "Ethernet",
"status": "Down",
"bytes_received": "0",
"bytes_sent": "0",
"support_ipv4": true,
"support_ipv6": true,
"ips": [
"fe80::9af:cbb8:5bf6:daf5",
"169.254.218.245"
],
"gateways": [],
"bind": true,
"dns4": "",
"dns6": ""
},
{
"friendly": "Local Area Connection* 1",
"id": "{CDE07587-CBC4-4511-98F0-1DE08E03741B}",
"name": "Local Area Connection* 1",
"description": "Microsoft Wi-Fi Direct Virtual Adapter",
"type": "Wireless80211",
"status": "Down",
"bytes_received": "0",
"bytes_sent": "0",
"support_ipv4": true,
"support_ipv6": true,
"ips": [
"fe80::1826:7eb5:c160:2961",
"169.254.41.97"
],
"gateways": [],
"bind": true,
"dns4": "",
"dns6": ""
},
{
"friendly": "Local Area Connection* 2",
"id": "{5D425C74-E6CB-4C46-B97E-37E055CB402F}",
"name": "Local Area Connection* 2",
"description": "Microsoft Wi-Fi Direct Virtual Adapter #2",
"type": "Wireless80211",
"status": "Down",
"bytes_received": "0",
"bytes_sent": "0",
"support_ipv4": true,
"support_ipv6": true,
"ips": [
"fe80::6cce:906e:581f:8776",
"169.254.135.118"
],
"gateways": [],
"bind": true,
"dns4": "",
"dns6": ""
},
{
"friendly": "Wi-Fi",
"id": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"name": "Wi-Fi",
"description": "D-Link DWA-582 Wireless AC1200 Dual Band PCI Express Adapter",
"type": "Wireless80211",
"status": "Up",
"bytes_received": "1266311438",
"bytes_sent": "38479803",
"support_ipv4": true,
"support_ipv6": true,
"ips": [
"2604:3d08:807f:fff2::4b9b",
"2604:3d08:807f:fff2:d9a:651b:8f8c:3d75",
"2604:3d08:807f:fff2:6068:eaf3:7657:beff",
"fe80::d9a:651b:8f8c:3d75",
"10.0.0.28"
],
"gateways": [
"10.0.0.1"
],
"bind": true,
"dns4": "",
"dns6": ""
},
{
"friendly": "Loopback Pseudo-Interface 1",
"id": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}",
"name": "Loopback Pseudo-Interface 1",
"description": "Software Loopback Interface 1",
"type": "Loopback",
"status": "Up",
"bytes_received": "0",
"bytes_sent": "0",
"support_ipv4": true,
"support_ipv6": true,
"ips": [
"::1",
"127.0.0.1"
],
"gateways": [],
"bind": true,
"dns4": "",
"dns6": null
}
],
"ipv4-default-gateway": "10.4.0.1",
"ipv4-default-interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}"
}
----------------------------
ipconfig /all:
 
Windows IP Configuration
 
   Host Name . . . . . . . . . . . . : DESKTOP-UP0BGVO
   Primary Dns Suffix  . . . . . . . : 
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : vc.shawcable.net
 
Ethernet adapter Ethernet 2:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : TAP-Windows Adapter V9
   Physical Address. . . . . . . . . : 00-FF-F8-AA-B3-0B
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::1923:642e:f94e:9d84%40(Preferred) 
   IPv4 Address. . . . . . . . . . . : 10.4.12.129(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.0.0
   Lease Obtained. . . . . . . . . . : Sunday, June 10, 2018 1:07:03 PM
   Lease Expires . . . . . . . . . . : Monday, June 10, 2019 1:07:03 PM
   Default Gateway . . . . . . . . . : 
   DHCP Server . . . . . . . . . . . : 10.4.255.254
   DHCPv6 IAID . . . . . . . . . . . : 671154168
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-22-AF-26-EA-40--5C-E5-42-9D
   DNS Servers . . . . . . . . . . . : 10.4.0.1
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Ethernet adapter Ethernet:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Intel® Ethernet Connection (2) I219-V
   Physical Address. . . . . . . . . : 40--5C-E5-42-9D
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Wireless LAN adapter Local Area Connection* 1:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter
   Physical Address. . . . . . . . . : 7A-32-1B-A9-F1-6B
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Wireless LAN adapter Local Area Connection* 2:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2
   Physical Address. . . . . . . . . : 78-32-1B-A9-F1-6B
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Wireless LAN adapter Wi-Fi:
 
   Connection-specific DNS Suffix  . : vc.shawcable.net
   Description . . . . . . . . . . . : D-Link DWA-582 Wireless AC1200 Dual Band PCI Express Adapter
   Physical Address. . . . . . . . . : 78-32-1B-A9-F1-6B
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : 2604:3d08:807f:fff2::4b9b(Preferred) 
   Lease Obtained. . . . . . . . . . : Sunday, June 10, 2018 11:52:40 AM
   Lease Expires . . . . . . . . . . : Sunday, June 17, 2018 11:31:47 AM
   IPv6 Address. . . . . . . . . . . : 2604:3d08:807f:fff2:d9a:651b:8f8c:3d75(Deprecated) 
   Temporary IPv6 Address. . . . . . : 2604:3d08:807f:fff2:6068:eaf3:7657:beff(Deprecated) 
   Link-local IPv6 Address . . . . . : fe80::d9a:651b:8f8c:3d75%17(Preferred) 
   IPv4 Address. . . . . . . . . . . : 10.0.0.28(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Sunday, June 10, 2018 11:52:35 AM
   Lease Expires . . . . . . . . . . : Sunday, June 17, 2018 11:52:35 AM
   Default Gateway . . . . . . . . . : 10.0.0.1
   DHCP Server . . . . . . . . . . . : 10.0.0.1
   DHCPv6 IAID . . . . . . . . . . . : 158872091
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-22-AF-26-EA-40--5C-E5-42-9D
   DNS Servers . . . . . . . . . . . : 2001:4e8:0:4009::11
                                       2001:4e8:0:4007::15
                                       10.0.0.1
   NetBIOS over Tcpip. . . . . . . . : Enabled

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...