Jump to content


Photo

Eddie Fails To Connect After Months of Use


  • Please log in to reply
3 replies to this topic

#1 anonassurance

anonassurance

    Newbie

  • Members
  • Pip
  • 8 posts

Posted 04 October 2018 - 03:32 AM

Greets,

 

  Been member here a few years now and have had little issues.  I once ran it on my DD-WRT router so I could protect my entire LAN but my son's got tired of having me add in exceptions, port forwards, etc. so I started running Eddie on my Win10 PC.  All has been good for most of this years subscription until today.

 

  I have my router reset each morning at 5am and at 6 when I got on the PC for work, I found Eddie disconnected and the Network Lock on which is how it's configured.  Thought maybe something odd happened so exited Eddie and restarted and retried the connection.  This is when it goes through it's latency checks, etc and tries to connect to the US servers as normal but instantly disconnected.  I thought nothing and ran up to grab my coffee.  Several minutes later it's still not connecting so I stop and retry.  The same issues are occurring.

 

  It makes auth and then tries to connect to a server on the allow list but near instantly says 'disconnecting' and sits there for 3-4 seconds and tries another doing the same exact thing.  It's as if it's not even trying. 

 

  Checking the logs I see errors about 'an attempt was made to access a socket in a way forbidden by it's access permissions 127.0.0.1:3100; and others such as 'OpenVPN -> ERROR : Windows route add ipv6 command failed: returned error code 1', and 'Eddie: SSL is missing'. It repeats these sequence of events over and over and over until I cancel.  Returning the network lock to OFF, I have network and internet as I normally do.  I've uninstalled TAP and Eddie client several times, reset winsock stack using 'netsh' commands as I have had to do over the years when Windows blows it's load all over thing, as well disabled all Antivirus, Malware, and other things that might block an outgoing connection.  Nothing seems to work and I'm at my wits end.  Thing is, this just started today without me changing anything (that I'm aware of) and without configuration changes.

 

Help!?  I'm an IT guy of 25 years and know what I know but this has me stumped.  I know, it's Windows and yes I agree but nothing updated, no Windows, no drivers, no software add; nothing.  

 

Signed,

Confused and Anon..

 

PS. I've attached a few of the error notifications as they popup in the post. Captured log is just below in text

 

I 2018.10.03 22:59:34 - Session starting.
I 2018.10.03 22:59:34 - Checking authorization ...
! 2018.10.03 22:59:35 - Connecting to Sculptor (United States, Atlanta, Georgia)
. 2018.10.03 22:59:35 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.10.03 22:59:35 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.10.03 22:59:35 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.10.03 22:59:35 - Connection to OpenVPN Management Interface
W 2018.10.03 22:59:35 - An attempt was made to access a socket in a way forbidden by its access permissions 127.0.0.1:3100
. 2018.10.03 22:59:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.10.03 22:59:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.10.03 22:59:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.34:443
. 2018.10.03 22:59:35 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.10.03 22:59:35 - OpenVPN > UDP link local: (not bound)
. 2018.10.03 22:59:35 - OpenVPN > UDP link remote: [AF_INET]64.42.179.34:443
! 2018.10.03 22:59:35 - Disconnecting
. 2018.10.03 22:59:35 - Sending soft termination signal
. 2018.10.03 22:59:35 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.34:443, sid=ee3ce486 e7520d4d
. 2018.10.03 22:59:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.10.03 22:59:35 - OpenVPN > VERIFY KU OK
. 2018.10.03 22:59:35 - OpenVPN > Validating certificate extended key usage
. 2018.10.03 22:59:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.10.03 22:59:35 - OpenVPN > VERIFY EKU OK
. 2018.10.03 22:59:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sculptor, emailAddress=info@airvpn.org
. 2018.10.03 22:59:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.10.03 22:59:35 - OpenVPN > [Sculptor] Peer Connection Initiated with [AF_INET]64.42.179.34:443
. 2018.10.03 22:59:36 - OpenVPN > SENT CONTROL [Sculptor]: 'PUSH_REQUEST' (status=1)
. 2018.10.03 22:59:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.76.1,dhcp-option DNS6 fde6:7a:7d20:134c::1,tun-ipv6,route-gateway 10.23.76.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:134c::101d/64 fde6:7a:7d20:134c::1,ifconfig 10.23.76.31 255.255.255.0,peer-id 6,cipher AES-256-GCM'
. 2018.10.03 22:59:36 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2018.10.03 22:59:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.10.03 22:59:36 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.10.03 22:59:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.10.03 22:59:36 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.10.03 22:59:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.10.03 22:59:36 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.10.03 22:59:36 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.10.03 22:59:36 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.10.03 22:59:36 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.10.03 22:59:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.10.03 22:59:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.10.03 22:59:36 - OpenVPN > interactive service msg_channel=0
. 2018.10.03 22:59:36 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=9 HWADDR=ac:22:0b:51:b4:69
. 2018.10.03 22:59:36 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2018.10.03 22:59:36 - OpenVPN > GetBestInterfaceEx() returned if=50
. 2018.10.03 22:59:36 - OpenVPN > GDG6: II=50 DP=::/3 NH=fe80::8
. 2018.10.03 22:59:36 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0
. 2018.10.03 22:59:36 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=50
. 2018.10.03 22:59:36 - OpenVPN > open_tun
. 2018.10.03 22:59:37 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{A848E49B-D253-412C-A6E7-6B01E9C07D18}.tap
. 2018.10.03 22:59:37 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.10.03 22:59:37 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.23.76.0/10.23.76.31/255.255.255.0 [SUCCEEDED]
. 2018.10.03 22:59:37 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.23.76.31/255.255.255.0 on interface {A848E49B-D253-412C-A6E7-6B01E9C07D18} [DHCP-serv: 10.23.76.254, lease-time: 31536000]
. 2018.10.03 22:59:37 - OpenVPN > Successful ARP Flush on interface [50] {A848E49B-D253-412C-A6E7-6B01E9C07D18}
. 2018.10.03 22:59:37 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2018.10.03 22:59:38 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=50 fde6:7a:7d20:134c::101d store=active
. 2018.10.03 22:59:39 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:134c::1 validate=no
. 2018.10.03 22:59:39 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.
. 2018.10.03 22:59:39 - OpenVPN > add_route_ipv6(fde6:7a:7d20:134c::/64 -> fde6:7a:7d20:134c::101d metric 0) dev Ethernet 2
. 2018.10.03 22:59:39 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:134c::/64 interface=50 fe80::8 store=active
. 2018.10.03 22:59:39 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.03 22:59:44 - Sending hard termination signal
. 2018.10.03 22:59:44 - Connection terminated.
I 2018.10.03 22:59:46 - Cancel requested.
! 2018.10.03 22:59:46 - Session terminated. 

 

screenshot.1508868332.jpg

screenshot.1508868333.jpg

 



#2 gillor

gillor

    Newbie

  • New Members
  • Pip
  • 3 posts
  • LocationUK

Posted 04 October 2018 - 06:35 AM

The problem “'OpenVPN -> ERROR : Windows route add ipv6 command failed: returned error code 1'” seems like the problem I had.
 
Not sure about  your other error messages but take a look at this thread and see whether this helps…
 


#3 anonassurance

anonassurance

    Newbie

  • Members
  • Pip
  • 8 posts

Posted 04 October 2018 - 03:21 PM

Thanks @gilor for the reply!

 

I tried much of what was in that thread and didn't seem to help my cause.  Not finding much info online, about Eddie itself or OpenVPN being used; I just went and did a Win 10 RESET and blew all my config and apps away.

 

I am back now installing all my apps again and first one was Eddie which is now connected and working.  Still not sure how this happens but found out that even though I was an 'Administrator' account; I still had security issues and could not change UAC and other settings.  This obviously, in my case twice now, is a Windows issue and not Eddie that I can see.  Sometimes, taking the poison pill is easier and while I have to re-install everything; I did keep my profile and files and everything is back working.

 

Cheers and thanks!

 

Finale: Issue was resolved by doing a Windows 10 RESET (keeping files and profile but removing all apps)



#4 alchemy420

alchemy420

    Newbie

  • New Members
  • Pip
  • 3 posts

Posted 18 October 2018 - 08:37 PM

Suddenly having the same/similar errors: Windows route add ipv6 command failed: returned error code 1 AND Checking route IPv4 failed. Disconnecting loop when I don't get the errors. Deleted default.xml file Uninstalled and reinstalled. 
 
. 2018.10.18 14:54:57 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.17134.0, Mono/.Net: v4.0.30319
. 2018.10.18 14:54:57 - Reading options from C:\Users\dixon\AppData\Local\AirVPN\default.xml
. 2018.10.18 14:54:57 - Command line arguments (1): path="home"
. 2018.10.18 14:54:57 - Profile path: C:\Users\dixon\AppData\Local\AirVPN\default.xml
. 2018.10.18 14:54:57 - Shell(1) of 'cmd.exe', 2 args: '/c';'route -4 PRINT';
. 2018.10.18 14:54:57 - Shell(1) done in 157 ms, exit: 0, out: '===========================================================================
. 2018.10.18 14:54:57 -     Interface List
. 2018.10.18 14:54:57 -     17...fc 45 96 28 3a c9 ......Realtek PCIe GbE Family Controller
. 2018.10.18 14:54:57 -     8...58 fb 84 fb e1 d2 ......Microsoft Wi-Fi Direct Virtual Adapter #4
. 2018.10.18 14:54:57 -     15...5a fb 84 fb e1 d1 ......Microsoft Wi-Fi Direct Virtual Adapter #5
. 2018.10.18 14:54:57 -     10...00 ff 89 3d 30 60 ......TAP-Windows Adapter V9
. 2018.10.18 14:54:57 -     16...58 fb 84 fb e1 d1 ......Intel® Dual Band Wireless-AC 3165
. 2018.10.18 14:54:57 -     23...58 fb 84 fb e1 d5 ......Bluetooth Device (Personal Area Network)
. 2018.10.18 14:54:57 -     1...........................Software Loopback Interface 1
. 2018.10.18 14:54:57 -     ===========================================================================
. 2018.10.18 14:54:57 -     IPv4 Route Table
. 2018.10.18 14:54:57 -     ===========================================================================
. 2018.10.18 14:54:57 -     Active Routes:
. 2018.10.18 14:54:57 -     Network Destination        Netmask          Gateway       Interface  Metric
. 2018.10.18 14:54:57 -     0.0.0.0          0.0.0.0    192.168.1.254     192.168.1.70     36
. 2018.10.18 14:54:57 -     127.0.0.0        255.0.0.0         On-link         127.0.0.1    331
. 2018.10.18 14:54:57 -     127.0.0.1  255.255.255.255         On-link         127.0.0.1    331
. 2018.10.18 14:54:57 -     127.255.255.255  255.255.255.255         On-link         127.0.0.1    331
. 2018.10.18 14:54:57 -     192.168.1.0    255.255.255.0         On-link      192.168.1.70    291
. 2018.10.18 14:54:57 -     192.168.1.70  255.255.255.255         On-link      192.168.1.70    291
. 2018.10.18 14:54:57 -     192.168.1.255  255.255.255.255         On-link      192.168.1.70    291
. 2018.10.18 14:54:57 -     224.0.0.0        240.0.0.0         On-link         127.0.0.1    331
. 2018.10.18 14:54:57 -     224.0.0.0        240.0.0.0         On-link      192.168.1.70    291
. 2018.10.18 14:54:57 -     255.255.255.255  255.255.255.255         On-link         127.0.0.1    331
. 2018.10.18 14:54:57 -     255.255.255.255  255.255.255.255         On-link      192.168.1.70    291
. 2018.10.18 14:54:57 -     ===========================================================================
. 2018.10.18 14:54:57 -     Persistent Routes:
. 2018.10.18 14:54:57 -     None'
. 2018.10.18 14:54:57 - Shell(2) of 'cmd.exe', 2 args: '/c';'route -6 PRINT';
. 2018.10.18 14:54:58 - Shell(2) done in 109 ms, exit: 0, out: '===========================================================================
. 2018.10.18 14:54:58 -     Interface List
. 2018.10.18 14:54:58 -     17...fc 45 96 28 3a c9 ......Realtek PCIe GbE Family Controller
. 2018.10.18 14:54:58 -     8...58 fb 84 fb e1 d2 ......Microsoft Wi-Fi Direct Virtual Adapter #4
. 2018.10.18 14:54:58 -     15...5a fb 84 fb e1 d1 ......Microsoft Wi-Fi Direct Virtual Adapter #5
. 2018.10.18 14:54:58 -     10...00 ff 89 3d 30 60 ......TAP-Windows Adapter V9
. 2018.10.18 14:54:58 -     16...58 fb 84 fb e1 d1 ......Intel® Dual Band Wireless-AC 3165
. 2018.10.18 14:54:58 -     23...58 fb 84 fb e1 d5 ......Bluetooth Device (Personal Area Network)
. 2018.10.18 14:54:58 -     1...........................Software Loopback Interface 1
. 2018.10.18 14:54:58 -     ===========================================================================
. 2018.10.18 14:54:58 -     IPv6 Route Table
. 2018.10.18 14:54:58 -     ===========================================================================
. 2018.10.18 14:54:58 -     Active Routes:
. 2018.10.18 14:54:58 -     If Metric Network Destination      Gateway
. 2018.10.18 14:54:58 -     1    331 ::1/128                  On-link
. 2018.10.18 14:54:58 -     16    291 fe80::/64                On-link
. 2018.10.18 14:54:58 -     16    291 fe80::3d7b:26aa:db6a:441e/128
. 2018.10.18 14:54:58 -     On-link
. 2018.10.18 14:54:58 -     1    331 ff00::/8                 On-link
. 2018.10.18 14:54:58 -     16    291 ff00::/8                 On-link
. 2018.10.18 14:54:58 -     ===========================================================================
. 2018.10.18 14:54:58 -     Persistent Routes:
. 2018.10.18 14:54:58 -     If Metric Network Destination      Gateway
. 2018.10.18 14:54:58 -     0    262 ::/3                     fe80::8
. 2018.10.18 14:54:58 -     ==========================================================================='
. 2018.10.18 14:54:59 - Shell(3) of 'C:\Program Files\AirVPN\openvpn.exe', 1 args: '--version';
. 2018.10.18 14:54:59 - Shell(3) done in 62 ms, exit: 1, out: 'OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.10.18 14:54:59 -     library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.10.18 14:54:59 -     Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.10.18 14:54:59 -     Originally developed by James Yonan
. 2018.10.18 14:54:59 -     Copyright © 2002-2018 OpenVPN Inc <sales@openvpn.net>
. 2018.10.18 14:54:59 -     Compile time defines: enable_async_push=no enable_comp_stub=no enable_crypto=yes enable_crypto_ofb_cfb=yes enable_debug=yes enable_def_auth=yes enable_dlopen=unknown enable_dlopen_self=unknown enable_dlopen_self_static=unknown enable_fast_install=needless enable_fragment=yes enable_iproute2=no enable_libtool_lock=yes enable_lz4=yes enable_lzo=yes enable_management=yes enable_multihome=yes enable_pam_dlopen=no enable_pedantic=no enable_pf=yes enable_pkcs11=yes enable_plugin_auth_pam=no enable_plugin_down_root=no enable_plugins=yes enable_port_share=yes enable_selinux=no enable_server=yes enable_shared=yes enable_shared_with_static_runtimes=yes enable_small=no enable_static=yes enable_strict=no enable_strict_options=no enable_systemd=no enable_werror=no enable_win32_dll=yes enable_x509_alt_username=no with_aix_soname=aix with_crypto_library=openssl with_gnu_ld=yes with_mem_check=no with_special_build= with_sysroot=no'
. 2018.10.18 14:54:59 - Shell(4) of 'C:\Program Files\AirVPN\plink.exe', 1 args: '-V';
. 2018.10.18 14:54:59 - Shell(4) done in 47 ms, exit: 1, out: 'plink: Release 0.67'
. 2018.10.18 14:54:59 - Shell(5) of 'C:\Program Files\AirVPN\stunnel.exe', 1 args: '-version';
. 2018.10.18 14:54:59 - Shell(5) done in 78 ms, exit: 0, err: 'stunnel 5.40 on x86-pc-mingw32-gnu platform
. 2018.10.18 14:54:59 -     Compiled/running with OpenSSL 1.0.2k  26 Jan 2017
. 2018.10.18 14:54:59 -     Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2018.10.18 14:54:59 -     Global options:
. 2018.10.18 14:54:59 -     RNDbytes               = 64
. 2018.10.18 14:54:59 -     RNDoverwrite           = yes
. 2018.10.18 14:54:59 -     taskbar                = yes
. 2018.10.18 14:54:59 -     Service-level options:
. 2018.10.18 14:54:59 -     ciphers                = HIGH:!DH:!aNULL:!SSLv2
. 2018.10.18 14:54:59 -     curve                  = prime256v1
. 2018.10.18 14:54:59 -     debug                  = notice
. 2018.10.18 14:54:59 -     logId                  = sequential
. 2018.10.18 14:54:59 -     options                = NO_SSLv2
. 2018.10.18 14:54:59 -     options                = NO_SSLv3
. 2018.10.18 14:54:59 -     sessionCacheSize       = 1000
. 2018.10.18 14:54:59 -     sessionCacheTimeout    = 300 seconds
. 2018.10.18 14:54:59 -     stack                  = 65536 bytes
. 2018.10.18 14:54:59 -     TIMEOUTbusy            = 300 seconds
. 2018.10.18 14:54:59 -     TIMEOUTclose           = 60 seconds
. 2018.10.18 14:54:59 -     TIMEOUTconnect         = 10 seconds
. 2018.10.18 14:54:59 -     TIMEOUTidle            = 43200 seconds
. 2018.10.18 14:54:59 -     verify                 = none'
. 2018.10.18 14:54:59 - Shell(6) of 'C:\Program Files\AirVPN\curl.exe', 1 args: '--version';
. 2018.10.18 14:54:59 - Shell(6) done in 78 ms, exit: 0, out: 'curl 7.54.1 (x86_64-pc-win32) libcurl/7.54.1 OpenSSL/1.1.0f zlib/1.2.11 WinIDN libssh2/1.8.0 nghttp2/1.23.1
. 2018.10.18 14:54:59 -     Release-Date: 2017-06-14
. 2018.10.18 14:54:59 -     Protocols: dict file ftp ftps gopher http https imap imaps ldap ldaps pop3 pop3s rtsp scp sftp smtp smtps telnet tftp
. 2018.10.18 14:54:59 -     Features: AsynchDNS IDN IPv6 Largefile SSPI Kerberos SPNEGO NTLM SSL libz TLS-SRP HTTP2 HTTPS-proxy'
. 2018.10.18 14:54:59 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
. 2018.10.18 14:54:59 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2018.10.18 14:54:59 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2018.10.18 14:54:59 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2018.10.18 14:54:59 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
. 2018.10.18 14:54:59 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem
! 2018.10.18 14:54:59 - Activation of Network Lock - Windows Filtering Platform
. 2018.10.18 14:55:00 - Updating systems & servers data ...
I 2018.10.18 14:55:00 - Session starting.
I 2018.10.18 14:55:02 - Checking authorization ...
! 2018.10.18 14:55:03 - Connecting to Alhena (Canada, Toronto, Ontario)
. 2018.10.18 14:55:03 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.10.18 14:55:03 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.10.18 14:55:03 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.10.18 14:55:03 - Connection to OpenVPN Management Interface
. 2018.10.18 14:55:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.10.18 14:55:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.10.18 14:55:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.10.18 14:55:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.2:443
. 2018.10.18 14:55:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.10.18 14:55:03 - OpenVPN > UDP link local: (not bound)
. 2018.10.18 14:55:03 - OpenVPN > UDP link remote: [AF_INET]162.219.176.2:443
. 2018.10.18 14:55:03 - OpenVPN > TLS: Initial packet from [AF_INET]162.219.176.2:443, sid=3dac8095 3074377d
. 2018.10.18 14:55:03 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.10.18 14:55:03 - Systems & servers data update completed
. 2018.10.18 14:55:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.10.18 14:55:03 - OpenVPN > VERIFY KU OK
. 2018.10.18 14:55:03 - OpenVPN > Validating certificate extended key usage
. 2018.10.18 14:55:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.10.18 14:55:03 - OpenVPN > VERIFY EKU OK
. 2018.10.18 14:55:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.10.18 14:55:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.10.18 14:55:04 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]162.219.176.2:443
. 2018.10.18 14:55:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.10.18 14:55:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.96.1,dhcp-option DNS6 fde6:7a:7d20:260::1,tun-ipv6,route-gateway 10.6.96.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:260::10f6/64 fde6:7a:7d20:260::1,ifconfig 10.6.96.248 255.255.255.0,peer-id 1,cipher AES-256-GCM'
. 2018.10.18 14:55:05 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2018.10.18 14:55:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.10.18 14:55:05 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.10.18 14:55:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.10.18 14:55:05 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.10.18 14:55:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.10.18 14:55:05 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.10.18 14:55:05 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.10.18 14:55:05 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.10.18 14:55:05 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.10.18 14:55:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.10.18 14:55:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.10.18 14:55:05 - OpenVPN > interactive service msg_channel=0
. 2018.10.18 14:55:05 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=16 HWADDR=58:fb:84:fb:e1:d1
. 2018.10.18 14:55:05 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2018.10.18 14:55:05 - OpenVPN > GetBestInterfaceEx() returned if=10
. 2018.10.18 14:55:05 - OpenVPN > GDG6: II=10 DP=::/3 NH=fe80::8
. 2018.10.18 14:55:05 - OpenVPN > GDG6: Metric=262, Loopback=0, AA=1, I=0
. 2018.10.18 14:55:05 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=10
. 2018.10.18 14:55:05 - OpenVPN > open_tun
. 2018.10.18 14:55:06 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{893D3060-3C80-4F8C-BC19-3D6449E3EFF6}.tap
. 2018.10.18 14:55:06 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.10.18 14:55:06 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.96.0/10.6.96.248/255.255.255.0 [SUCCEEDED]
. 2018.10.18 14:55:06 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.96.248/255.255.255.0 on interface {893D3060-3C80-4F8C-BC19-3D6449E3EFF6} [DHCP-serv: 10.6.96.254, lease-time: 31536000]
. 2018.10.18 14:55:06 - OpenVPN > Successful ARP Flush on interface [10] {893D3060-3C80-4F8C-BC19-3D6449E3EFF6}
. 2018.10.18 14:55:06 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2018.10.18 14:55:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=10 fde6:7a:7d20:260::10f6 store=active
. 2018.10.18 14:55:08 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 3 static fde6:7a:7d20:260::1 validate=no
. 2018.10.18 14:55:08 - Shell(7) of 'cmd.exe', 2 args: '/c';'route -6 print';
. 2018.10.18 14:55:08 - Shell(7) done in 156 ms, exit: 0, out: '===========================================================================
. 2018.10.18 14:55:08 -     Interface List
. 2018.10.18 14:55:08 -     17...fc 45 96 28 3a c9 ......Realtek PCIe GbE Family Controller
. 2018.10.18 14:55:08 -     8...58 fb 84 fb e1 d2 ......Microsoft Wi-Fi Direct Virtual Adapter #4
. 2018.10.18 14:55:08 -     15...5a fb 84 fb e1 d1 ......Microsoft Wi-Fi Direct Virtual Adapter #5
. 2018.10.18 14:55:08 -     10...00 ff 89 3d 30 60 ......TAP-Windows Adapter V9
. 2018.10.18 14:55:08 -     16...58 fb 84 fb e1 d1 ......Intel® Dual Band Wireless-AC 3165
. 2018.10.18 14:55:08 -     23...58 fb 84 fb e1 d5 ......Bluetooth Device (Personal Area Network)
. 2018.10.18 14:55:08 -     1...........................Software Loopback Interface 1
. 2018.10.18 14:55:08 -     ===========================================================================
. 2018.10.18 14:55:08 -     IPv6 Route Table
. 2018.10.18 14:55:08 -     ===========================================================================
. 2018.10.18 14:55:08 -     Active Routes:
. 2018.10.18 14:55:08 -     If Metric Network Destination      Gateway
. 2018.10.18 14:55:08 -     10    297 ::/3                     fe80::8
. 2018.10.18 14:55:08 -     1    331 ::1/128                  On-link
. 2018.10.18 14:55:08 -     10    291 fde6:7a:7d20:260::/64    On-link
. 2018.10.18 14:55:08 -     10    291 fde6:7a:7d20:260::/64    fe80::8
. 2018.10.18 14:55:08 -     10    291 fde6:7a:7d20:260::10f6/128
. 2018.10.18 14:55:08 -     On-link
. 2018.10.18 14:55:08 -     10    291 fe80::/64                On-link
. 2018.10.18 14:55:08 -     16    291 fe80::/64                On-link
. 2018.10.18 14:55:08 -     16    291 fe80::3d7b:26aa:db6a:441e/128
. 2018.10.18 14:55:08 -     On-link
. 2018.10.18 14:55:08 -     10    291 fe80::eda8:50fe:32d4:98e7/128
. 2018.10.18 14:55:08 -     On-link
. 2018.10.18 14:55:08 -     1    331 ff00::/8                 On-link
. 2018.10.18 14:55:08 -     10    291 ff00::/8                 On-link
. 2018.10.18 14:55:08 -     16    291 ff00::/8                 On-link
. 2018.10.18 14:55:08 -     ===========================================================================
. 2018.10.18 14:55:08 -     Persistent Routes:
. 2018.10.18 14:55:08 -     If Metric Network Destination      Gateway
. 2018.10.18 14:55:08 -     0    262 ::/3                     fe80::8
. 2018.10.18 14:55:08 -     ==========================================================================='
. 2018.10.18 14:55:08 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.
. 2018.10.18 14:55:08 - Shell(8) of 'C:\WINDOWS\system32\netsh.exe', 1 args: 'interface ipv6 del route "fde6:7a:7d20:260::/64" interface="10"';
. 2018.10.18 14:55:08 - Shell(8) done in 141 ms, exit: 0, out: 'Ok.'
. 2018.10.18 14:55:08 - OpenVPN > add_route_ipv6(fde6:7a:7d20:260::/64 -> fde6:7a:7d20:260::10f6 metric 0) dev Ethernet 3
. 2018.10.18 14:55:08 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:260::/64 interface=10 fe80::8 store=active
. 2018.10.18 14:55:08 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:55:13 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.10.18 14:55:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 162.219.176.2 MASK 255.255.255.255 192.168.1.254
. 2018.10.18 14:55:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.10.18 14:55:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.10.18 14:55:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.96.1
. 2018.10.18 14:55:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.10.18 14:55:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.10.18 14:55:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.96.1
. 2018.10.18 14:55:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.10.18 14:55:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.10.18 14:55:13 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:260::1 metric -1) dev Ethernet 3
. 2018.10.18 14:55:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=10 fe80::8 store=active
. 2018.10.18 14:55:13 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
E 2018.10.18 14:55:13 - OpenVPN > ERROR: Windows route add ipv6 command failed: returned error code 1
. 2018.10.18 14:55:13 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:260::1 metric -1) dev Ethernet 3
. 2018.10.18 14:55:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=10 fe80::8 store=active
. 2018.10.18 14:55:13 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:55:14 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:260::1 metric -1) dev Ethernet 3
. 2018.10.18 14:55:14 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=10 fe80::8 store=active
. 2018.10.18 14:55:14 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:55:14 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:260::1 metric -1) dev Ethernet 3
. 2018.10.18 14:55:14 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=10 fe80::8 store=active
. 2018.10.18 14:55:14 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:55:14 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv4
. 2018.10.18 14:55:14 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv6
. 2018.10.18 14:55:14 - DNS leak protection with packet filtering enabled.
. 2018.10.18 14:55:14 - Shell(9) of 'cmd.exe', 2 args: '/c';'route -4 PRINT';
. 2018.10.18 14:55:14 - Shell(9) done in 187 ms, exit: 0, out: '===========================================================================
. 2018.10.18 14:55:14 -     Interface List
. 2018.10.18 14:55:14 -     10...00 ff 89 3d 30 60 ......TAP-Windows Adapter V9
. 2018.10.18 14:55:14 -     17...fc 45 96 28 3a c9 ......Realtek PCIe GbE Family Controller
. 2018.10.18 14:55:14 -     8...58 fb 84 fb e1 d2 ......Microsoft Wi-Fi Direct Virtual Adapter #4
. 2018.10.18 14:55:14 -     15...5a fb 84 fb e1 d1 ......Microsoft Wi-Fi Direct Virtual Adapter #5
. 2018.10.18 14:55:14 -     16...58 fb 84 fb e1 d1 ......Intel® Dual Band Wireless-AC 3165
. 2018.10.18 14:55:14 -     23...58 fb 84 fb e1 d5 ......Bluetooth Device (Personal Area Network)
. 2018.10.18 14:55:14 -     1...........................Software Loopback Interface 1
. 2018.10.18 14:55:14 -     ===========================================================================
. 2018.10.18 14:55:14 -     IPv4 Route Table
. 2018.10.18 14:55:14 -     ===========================================================================
. 2018.10.18 14:55:14 -     Active Routes:
. 2018.10.18 14:55:14 -     Network Destination        Netmask          Gateway       Interface  Metric
. 2018.10.18 14:55:14 -     0.0.0.0          0.0.0.0    192.168.1.254     192.168.1.70     36
. 2018.10.18 14:55:14 -     0.0.0.0        128.0.0.0      10.30.160.1      10.6.96.248      4
. 2018.10.18 14:55:14 -     0.0.0.0        128.0.0.0        10.6.96.1      10.6.96.248      3
. 2018.10.18 14:55:14 -     10.6.96.0    255.255.255.0         On-link       10.6.96.248    259
. 2018.10.18 14:55:14 -     10.6.96.248  255.255.255.255         On-link       10.6.96.248    259
. 2018.10.18 14:55:14 -     10.6.96.255  255.255.255.255         On-link       10.6.96.248    259
. 2018.10.18 14:55:14 -     127.0.0.0        255.0.0.0         On-link         127.0.0.1    331
. 2018.10.18 14:55:14 -     127.0.0.1  255.255.255.255         On-link         127.0.0.1    331
. 2018.10.18 14:55:14 -     127.255.255.255  255.255.255.255         On-link         127.0.0.1    331
. 2018.10.18 14:55:14 -     128.0.0.0        128.0.0.0        10.6.96.1      10.6.96.248      3
. 2018.10.18 14:55:14 -     162.219.176.2  255.255.255.255    192.168.1.254     192.168.1.70     35
. 2018.10.18 14:55:14 -     192.168.1.0    255.255.255.0         On-link      192.168.1.70    291
. 2018.10.18 14:55:14 -     192.168.1.70  255.255.255.255         On-link      192.168.1.70    291
. 2018.10.18 14:55:14 -     192.168.1.255  255.255.255.255         On-link      192.168.1.70    291
. 2018.10.18 14:55:14 -     224.0.0.0        240.0.0.0         On-link         127.0.0.1    331
. 2018.10.18 14:55:14 -     224.0.0.0        240.0.0.0         On-link       10.6.96.248    259
. 2018.10.18 14:55:14 -     224.0.0.0        240.0.0.0         On-link      192.168.1.70    291
. 2018.10.18 14:55:14 -     255.255.255.255  255.255.255.255         On-link         127.0.0.1    331
. 2018.10.18 14:55:14 -     255.255.255.255  255.255.255.255         On-link       10.6.96.248    259
. 2018.10.18 14:55:14 -     255.255.255.255  255.255.255.255         On-link      192.168.1.70    291
. 2018.10.18 14:55:14 -     ===========================================================================
. 2018.10.18 14:55:14 -     Persistent Routes:
. 2018.10.18 14:55:14 -     None'
. 2018.10.18 14:55:14 - Shell(10) of 'cmd.exe', 2 args: '/c';'route -6 PRINT';
. 2018.10.18 14:55:15 - Shell(10) done in 125 ms, exit: 0, out: '===========================================================================
. 2018.10.18 14:55:15 -     Interface List
. 2018.10.18 14:55:15 -     10...00 ff 89 3d 30 60 ......TAP-Windows Adapter V9
. 2018.10.18 14:55:15 -     17...fc 45 96 28 3a c9 ......Realtek PCIe GbE Family Controller
. 2018.10.18 14:55:15 -     8...58 fb 84 fb e1 d2 ......Microsoft Wi-Fi Direct Virtual Adapter #4
. 2018.10.18 14:55:15 -     15...5a fb 84 fb e1 d1 ......Microsoft Wi-Fi Direct Virtual Adapter #5
. 2018.10.18 14:55:15 -     16...58 fb 84 fb e1 d1 ......Intel® Dual Band Wireless-AC 3165
. 2018.10.18 14:55:15 -     23...58 fb 84 fb e1 d5 ......Bluetooth Device (Personal Area Network)
. 2018.10.18 14:55:15 -     1...........................Software Loopback Interface 1
. 2018.10.18 14:55:15 -     ===========================================================================
. 2018.10.18 14:55:15 -     IPv6 Route Table
. 2018.10.18 14:55:15 -     ===========================================================================
. 2018.10.18 14:55:15 -     Active Routes:
. 2018.10.18 14:55:15 -     If Metric Network Destination      Gateway
. 2018.10.18 14:55:15 -     10    265 ::/3                     fe80::8
. 2018.10.18 14:55:15 -     1    331 ::1/128                  On-link
. 2018.10.18 14:55:15 -     10    259 2000::/4                 fe80::8
. 2018.10.18 14:55:15 -     10    259 3000::/4                 fe80::8
. 2018.10.18 14:55:15 -     10    259 fc00::/7                 fe80::8
. 2018.10.18 14:55:15 -     10    259 fde6:7a:7d20:260::/64    fe80::8
. 2018.10.18 14:55:15 -     10    259 fde6:7a:7d20:260::10f6/128
. 2018.10.18 14:55:15 -     On-link
. 2018.10.18 14:55:15 -     10    259 fe80::/64                On-link
. 2018.10.18 14:55:15 -     16    291 fe80::/64                On-link
. 2018.10.18 14:55:15 -     16    291 fe80::3d7b:26aa:db6a:441e/128
. 2018.10.18 14:55:15 -     On-link
. 2018.10.18 14:55:15 -     10    259 fe80::eda8:50fe:32d4:98e7/128
. 2018.10.18 14:55:15 -     On-link
. 2018.10.18 14:55:15 -     1    331 ff00::/8                 On-link
. 2018.10.18 14:55:15 -     10    259 ff00::/8                 On-link
. 2018.10.18 14:55:15 -     16    291 ff00::/8                 On-link
. 2018.10.18 14:55:15 -     ===========================================================================
. 2018.10.18 14:55:15 -     Persistent Routes:
. 2018.10.18 14:55:15 -     If Metric Network Destination      Gateway
. 2018.10.18 14:55:15 -     0    262 ::/3                     fe80::8
. 2018.10.18 14:55:15 -     ==========================================================================='
. 2018.10.18 14:55:15 - Shell(11) of 'cmd.exe', 2 args: '/c';'netsh interface ipv4 set dns name="Ethernet 3" source=static address=10.6.96.1 register=primary validate=no';
. 2018.10.18 14:55:15 - Shell(11) done in 250 ms, exit: 0
. 2018.10.18 14:55:15 - DNS IPv4 of a network adapter forced (Ethernet 3, from manual (10.4.0.1) to 10.6.96.1)
. 2018.10.18 14:55:15 - Shell(12) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 set dns name="Ethernet 3" source=static address=fde6:7a:7d20:260::1 register=primary validate=no';
. 2018.10.18 14:55:15 - Shell(12) done in 218 ms, exit: 0
. 2018.10.18 14:55:15 - DNS IPv6 of a network adapter forced (Ethernet 3, from automatic to fde6:7a:7d20:260::1)
. 2018.10.18 14:55:15 - Shell(13) of 'cmd.exe', 2 args: '/c';'route add 162.219.176.3 mask 255.255.255.255 10.6.96.1 if 10';
. 2018.10.18 14:55:15 - Shell(13) done in 109 ms, exit: 0, out: 'OK!'
. 2018.10.18 14:55:15 - Routes, added a new route, 162.219.176.3 for gateway 10.6.96.1
. 2018.10.18 14:55:15 - Shell(14) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="2606:6080:1002:3:1da3:d12a:3e5:ae70/128" interface="10" nexthop="fde6:7a:7d20:260::1"';
. 2018.10.18 14:55:16 - Shell(14) done in 219 ms, exit: 0, out: 'Ok.'
. 2018.10.18 14:55:16 - Routes, added a new route, 2606:6080:1002:3:1da3:d12a:3e5:ae70 for gateway fde6:7a:7d20:260::1
. 2018.10.18 14:55:16 - Flushing DNS
. 2018.10.18 14:55:16 - Shell(15) of 'cmd.exe', 2 args: '/c';'ipconfig /flushdns';
. 2018.10.18 14:55:16 - Shell(15) done in 125 ms, exit: 0, out: 'Windows IP Configuration
. 2018.10.18 14:55:16 -     Successfully flushed the DNS Resolver Cache.'
. 2018.10.18 14:55:16 - Shell(16) of 'cmd.exe', 2 args: '/c';'ipconfig /registerdns';
. 2018.10.18 14:55:19 - Shell(16) done in 3125 ms, exit: 0, out: 'Windows IP Configuration
. 2018.10.18 14:55:19 -     Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer in 15 minutes.'
I 2018.10.18 14:55:19 - Checking route IPv4
. 2018.10.18 14:55:19 - curl: (60) SSL certificate problem: self signed certificate in certificate chain
. 2018.10.18 14:55:19 -     More details here: https://curl.haxx.se/docs/sslcerts.html
. 2018.10.18 14:55:19 -     curl performs SSL certificate verification by default, using a "bundle"
. 2018.10.18 14:55:19 -     of Certificate Authority (CA) public keys (CA certs). If the default
. 2018.10.18 14:55:19 -     bundle file isn't adequate, you can specify an alternate file
. 2018.10.18 14:55:19 -     using the --cacert option.
. 2018.10.18 14:55:19 -     If this HTTPS server uses a certificate signed by a CA represented in
. 2018.10.18 14:55:19 -     the bundle, the certificate verification probably failed due to a
. 2018.10.18 14:55:19 -     problem with the certificate (it might be expired, or the name might
. 2018.10.18 14:55:19 -     not match the domain name in the URL).
. 2018.10.18 14:55:19 -     If you'd like to turn off curl's verification of the certificate, use
. 2018.10.18 14:55:19 -     the -k (or --insecure) option.
. 2018.10.18 14:55:19 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure. - Stack:    at Eddie.Core.Tools.Curl.Fetch(HttpRequest request)
. 2018.10.18 14:55:19 -     at Eddie.Core.Engine.FetchUrlXml(HttpRequest request)
. 2018.10.18 14:55:19 -     at Eddie.Core.Threads.Session.ConnectedStep()
. 2018.10.18 14:55:19 - Checking route (2° try)
. 2018.10.18 14:55:21 - curl: (60) SSL certificate problem: self signed certificate in certificate chain
. 2018.10.18 14:55:21 -     More details here: https://curl.haxx.se/docs/sslcerts.html
. 2018.10.18 14:55:21 -     curl performs SSL certificate verification by default, using a "bundle"
. 2018.10.18 14:55:21 -     of Certificate Authority (CA) public keys (CA certs). If the default
. 2018.10.18 14:55:21 -     bundle file isn't adequate, you can specify an alternate file
. 2018.10.18 14:55:21 -     using the --cacert option.
. 2018.10.18 14:55:21 -     If this HTTPS server uses a certificate signed by a CA represented in
. 2018.10.18 14:55:21 -     the bundle, the certificate verification probably failed due to a
. 2018.10.18 14:55:21 -     problem with the certificate (it might be expired, or the name might
. 2018.10.18 14:55:21 -     not match the domain name in the URL).
. 2018.10.18 14:55:21 -     If you'd like to turn off curl's verification of the certificate, use
. 2018.10.18 14:55:21 -     the -k (or --insecure) option.
. 2018.10.18 14:55:21 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure. - Stack:    at Eddie.Core.Tools.Curl.Fetch(HttpRequest request)
. 2018.10.18 14:55:21 -     at Eddie.Core.Engine.FetchUrlXml(HttpRequest request)
. 2018.10.18 14:55:21 -     at Eddie.Core.Threads.Session.ConnectedStep()
. 2018.10.18 14:55:21 - Checking route (3° try)
. 2018.10.18 14:55:23 - curl: (60) SSL certificate problem: self signed certificate in certificate chain
. 2018.10.18 14:55:23 -     More details here: https://curl.haxx.se/docs/sslcerts.html
. 2018.10.18 14:55:23 -     curl performs SSL certificate verification by default, using a "bundle"
. 2018.10.18 14:55:23 -     of Certificate Authority (CA) public keys (CA certs). If the default
. 2018.10.18 14:55:23 -     bundle file isn't adequate, you can specify an alternate file
. 2018.10.18 14:55:23 -     using the --cacert option.
. 2018.10.18 14:55:23 -     If this HTTPS server uses a certificate signed by a CA represented in
. 2018.10.18 14:55:23 -     the bundle, the certificate verification probably failed due to a
. 2018.10.18 14:55:23 -     problem with the certificate (it might be expired, or the name might
. 2018.10.18 14:55:23 -     not match the domain name in the URL).
. 2018.10.18 14:55:23 -     If you'd like to turn off curl's verification of the certificate, use
. 2018.10.18 14:55:23 -     the -k (or --insecure) option.
. 2018.10.18 14:55:23 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure. - Stack:    at Eddie.Core.Tools.Curl.Fetch(HttpRequest request)
. 2018.10.18 14:55:23 -     at Eddie.Core.Engine.FetchUrlXml(HttpRequest request)
. 2018.10.18 14:55:23 -     at Eddie.Core.Threads.Session.ConnectedStep()
E 2018.10.18 14:55:23 - Checking route IPv4 failed.
. 2018.10.18 14:55:23 - OpenVPN > Initialization Sequence Completed
! 2018.10.18 14:55:23 - Disconnecting
. 2018.10.18 14:55:23 - Shell(17) of 'cmd.exe', 2 args: '/c';'route delete 162.219.176.3 mask 255.255.255.255 10.6.96.1 if 10';
. 2018.10.18 14:55:23 - Shell(17) done in 188 ms, exit: 0, out: 'OK!'
. 2018.10.18 14:55:23 - Routes, removed a route previously added, 162.219.176.3 for gateway 10.6.96.1
. 2018.10.18 14:55:23 - Shell(18) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 del route prefix="2606:6080:1002:3:1da3:d12a:3e5:ae70/128" interface="10" nexthop="fde6:7a:7d20:260::1"';
. 2018.10.18 14:55:24 - Shell(18) done in 219 ms, exit: 0, out: 'Ok.'
. 2018.10.18 14:55:24 - Routes, removed a route previously added, 2606:6080:1002:3:1da3:d12a:3e5:ae70 for gateway fde6:7a:7d20:260::1
. 2018.10.18 14:55:24 - Sending management termination signal
. 2018.10.18 14:55:24 - Management - Send 'signal SIGTERM'
. 2018.10.18 14:55:24 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.10.18 14:55:24 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.10.18 14:55:29 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 162.219.176.2 MASK 255.255.255.255 192.168.1.254
. 2018.10.18 14:55:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.10.18 14:55:29 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.6.96.1
. 2018.10.18 14:55:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.10.18 14:55:29 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.6.96.1
. 2018.10.18 14:55:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.10.18 14:55:29 - OpenVPN > delete_route_ipv6(2000::/4)
. 2018.10.18 14:55:29 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=10 fe80::8 store=active
. 2018.10.18 14:55:29 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:55:29 - OpenVPN > delete_route_ipv6(3000::/4)
. 2018.10.18 14:55:29 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=10 fe80::8 store=active
. 2018.10.18 14:55:29 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:55:30 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2018.10.18 14:55:30 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=10 fe80::8 store=active
. 2018.10.18 14:55:30 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:55:30 - OpenVPN > Closing TUN/TAP interface
. 2018.10.18 14:55:30 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:260::/64)
. 2018.10.18 14:55:30 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:260::/64 interface=10 fe80::8 store=active
. 2018.10.18 14:55:30 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 3 fde6:7a:7d20:260::10f6 store=active
. 2018.10.18 14:55:30 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 3 all
. 2018.10.18 14:55:31 - OpenVPN > TAP: DHCP address released
. 2018.10.18 14:55:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.10.18 14:55:31 - Connection terminated.
. 2018.10.18 14:55:31 - Shell(19) of 'cmd.exe', 2 args: '/c';'netsh interface ipv4 set dns name="Ethernet 3" source=static address=10.4.0.1 register=primary validate=no';
. 2018.10.18 14:55:32 - Shell(19) done in 1015 ms, exit: 0
. 2018.10.18 14:55:32 - DNS IPv4 of a network adapter restored to original settings (Ethernet 3, to 10.4.0.1)
. 2018.10.18 14:55:32 - Shell(20) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 set dns name="Ethernet 3" source=dhcp register=primary validate=no';
. 2018.10.18 14:55:32 - Shell(20) done in 235 ms, exit: 0
. 2018.10.18 14:55:32 - DNS IPv6 of a network adapter restored to original settings (Ethernet 3, to automatic)
. 2018.10.18 14:55:32 - DNS leak protection with packet filtering disabled.
. 2018.10.18 14:55:32 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv4
. 2018.10.18 14:55:32 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv6
I 2018.10.18 14:55:39 - Checking authorization ...
! 2018.10.18 14:55:40 - Connecting to Spica (Canada, Toronto, Ontario)
. 2018.10.18 14:55:40 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.10.18 14:55:40 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.10.18 14:55:40 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.10.18 14:55:40 - Connection to OpenVPN Management Interface
. 2018.10.18 14:55:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.10.18 14:55:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.10.18 14:55:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.10.18 14:55:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.19.94.19:443
. 2018.10.18 14:55:40 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.10.18 14:55:40 - OpenVPN > UDP link local: (not bound)
. 2018.10.18 14:55:40 - OpenVPN > UDP link remote: [AF_INET]199.19.94.19:443
. 2018.10.18 14:55:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.10.18 14:55:40 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.94.19:443, sid=32dde48e 041ce29d
. 2018.10.18 14:55:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.10.18 14:55:40 - OpenVPN > VERIFY KU OK
. 2018.10.18 14:55:40 - OpenVPN > Validating certificate extended key usage
. 2018.10.18 14:55:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.10.18 14:55:40 - OpenVPN > VERIFY EKU OK
. 2018.10.18 14:55:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Spica, emailAddress=info@airvpn.org
. 2018.10.18 14:55:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.10.18 14:55:41 - OpenVPN > [Spica] Peer Connection Initiated with [AF_INET]199.19.94.19:443
. 2018.10.18 14:55:42 - OpenVPN > SENT CONTROL [Spica]: 'PUSH_REQUEST' (status=1)
. 2018.10.18 14:55:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.30.160.1,dhcp-option DNS6 fde6:7a:7d20:1aa0::1,tun-ipv6,route-gateway 10.30.160.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1aa0::1016/64 fde6:7a:7d20:1aa0::1,ifconfig 10.30.160.24 255.255.255.0,peer-id 16,cipher AES-256-GCM'
. 2018.10.18 14:55:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2018.10.18 14:55:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.10.18 14:55:42 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.10.18 14:55:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.10.18 14:55:42 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.10.18 14:55:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.10.18 14:55:42 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.10.18 14:55:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.10.18 14:55:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.10.18 14:55:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.10.18 14:55:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.10.18 14:55:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.10.18 14:55:42 - OpenVPN > interactive service msg_channel=0
. 2018.10.18 14:55:42 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=16 HWADDR=58:fb:84:fb:e1:d1
. 2018.10.18 14:55:42 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2018.10.18 14:55:42 - OpenVPN > GetBestInterfaceEx() returned if=10
. 2018.10.18 14:55:42 - OpenVPN > GDG6: II=10 DP=::/3 NH=fe80::8
. 2018.10.18 14:55:42 - OpenVPN > GDG6: Metric=262, Loopback=0, AA=1, I=0
. 2018.10.18 14:55:42 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=10
. 2018.10.18 14:55:42 - OpenVPN > open_tun
. 2018.10.18 14:55:43 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{893D3060-3C80-4F8C-BC19-3D6449E3EFF6}.tap
. 2018.10.18 14:55:43 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.10.18 14:55:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.30.160.0/10.30.160.24/255.255.255.0 [SUCCEEDED]
. 2018.10.18 14:55:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.30.160.24/255.255.255.0 on interface {893D3060-3C80-4F8C-BC19-3D6449E3EFF6} [DHCP-serv: 10.30.160.254, lease-time: 31536000]
. 2018.10.18 14:55:43 - OpenVPN > Successful ARP Flush on interface [10] {893D3060-3C80-4F8C-BC19-3D6449E3EFF6}
. 2018.10.18 14:55:43 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2018.10.18 14:55:43 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=10 fde6:7a:7d20:1aa0::1016 store=active
. 2018.10.18 14:55:44 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 3 static fde6:7a:7d20:1aa0::1 validate=no
. 2018.10.18 14:55:44 - Shell(21) of 'cmd.exe', 2 args: '/c';'route -6 print';
. 2018.10.18 14:55:45 - Shell(21) done in 125 ms, exit: 0, out: '===========================================================================
. 2018.10.18 14:55:45 -     Interface List
. 2018.10.18 14:55:45 -     17...fc 45 96 28 3a c9 ......Realtek PCIe GbE Family Controller
. 2018.10.18 14:55:45 -     8...58 fb 84 fb e1 d2 ......Microsoft Wi-Fi Direct Virtual Adapter #4
. 2018.10.18 14:55:45 -     15...5a fb 84 fb e1 d1 ......Microsoft Wi-Fi Direct Virtual Adapter #5
. 2018.10.18 14:55:45 -     10...00 ff 89 3d 30 60 ......TAP-Windows Adapter V9
. 2018.10.18 14:55:45 -     16...58 fb 84 fb e1 d1 ......Intel® Dual Band Wireless-AC 3165
. 2018.10.18 14:55:45 -     23...58 fb 84 fb e1 d5 ......Bluetooth Device (Personal Area Network)
. 2018.10.18 14:55:45 -     1...........................Software Loopback Interface 1
. 2018.10.18 14:55:45 -     ===========================================================================
. 2018.10.18 14:55:45 -     IPv6 Route Table
. 2018.10.18 14:55:45 -     ===========================================================================
. 2018.10.18 14:55:45 -     Active Routes:
. 2018.10.18 14:55:45 -     If Metric Network Destination      Gateway
. 2018.10.18 14:55:45 -     10    297 ::/3                     fe80::8
. 2018.10.18 14:55:45 -     1    331 ::1/128                  On-link
. 2018.10.18 14:55:45 -     10    291 fde6:7a:7d20:1aa0::/64   On-link
. 2018.10.18 14:55:45 -     10    291 fde6:7a:7d20:1aa0::/64   fe80::8
. 2018.10.18 14:55:45 -     10    291 fde6:7a:7d20:1aa0::1016/128
. 2018.10.18 14:55:45 -     On-link
. 2018.10.18 14:55:45 -     10    291 fe80::/64                On-link
. 2018.10.18 14:55:45 -     16    291 fe80::/64                On-link
. 2018.10.18 14:55:45 -     16    291 fe80::3d7b:26aa:db6a:441e/128
. 2018.10.18 14:55:45 -     On-link
. 2018.10.18 14:55:45 -     10    291 fe80::eda8:50fe:32d4:98e7/128
. 2018.10.18 14:55:45 -     On-link
. 2018.10.18 14:55:45 -     1    331 ff00::/8                 On-link
. 2018.10.18 14:55:45 -     10    291 ff00::/8                 On-link
. 2018.10.18 14:55:45 -     16    291 ff00::/8                 On-link
. 2018.10.18 14:55:45 -     ===========================================================================
. 2018.10.18 14:55:45 -     Persistent Routes:
. 2018.10.18 14:55:45 -     If Metric Network Destination      Gateway
. 2018.10.18 14:55:45 -     0    262 ::/3                     fe80::8
. 2018.10.18 14:55:45 -     ==========================================================================='
. 2018.10.18 14:55:45 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.
. 2018.10.18 14:55:45 - Shell(22) of 'C:\WINDOWS\system32\netsh.exe', 1 args: 'interface ipv6 del route "fde6:7a:7d20:1aa0::/64" interface="10"';
. 2018.10.18 14:55:45 - Shell(22) done in 140 ms, exit: 0, out: 'Ok.'
. 2018.10.18 14:55:45 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1aa0::/64 -> fde6:7a:7d20:1aa0::1016 metric 0) dev Ethernet 3
. 2018.10.18 14:55:45 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1aa0::/64 interface=10 fe80::8 store=active
. 2018.10.18 14:55:45 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:55:50 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.10.18 14:55:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 199.19.94.19 MASK 255.255.255.255 192.168.1.254
. 2018.10.18 14:55:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.10.18 14:55:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.10.18 14:55:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.30.160.1
. 2018.10.18 14:55:50 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=10]
. 2018.10.18 14:55:50 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2018.10.18 14:55:50 - OpenVPN > Route addition fallback to route.exe
. 2018.10.18 14:55:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:55:50 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.30.160.1
. 2018.10.18 14:55:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.10.18 14:55:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.10.18 14:55:50 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1aa0::1 metric -1) dev Ethernet 3
. 2018.10.18 14:55:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=10 fe80::8 store=active
. 2018.10.18 14:55:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
E 2018.10.18 14:55:50 - OpenVPN > ERROR: Windows route add ipv6 command failed: returned error code 1
. 2018.10.18 14:55:50 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1aa0::1 metric -1) dev Ethernet 3
. 2018.10.18 14:55:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=10 fe80::8 store=active
. 2018.10.18 14:55:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:55:50 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1aa0::1 metric -1) dev Ethernet 3
. 2018.10.18 14:55:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=10 fe80::8 store=active
. 2018.10.18 14:55:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:55:51 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1aa0::1 metric -1) dev Ethernet 3
. 2018.10.18 14:55:51 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=10 fe80::8 store=active
. 2018.10.18 14:55:51 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:55:51 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv4
. 2018.10.18 14:55:51 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv6
. 2018.10.18 14:55:51 - DNS leak protection with packet filtering enabled.
. 2018.10.18 14:55:51 - Shell(23) of 'cmd.exe', 2 args: '/c';'route -4 PRINT';
. 2018.10.18 14:55:51 - Shell(23) done in 172 ms, exit: 0, out: '===========================================================================
. 2018.10.18 14:55:51 -     Interface List
. 2018.10.18 14:55:51 -     10...00 ff 89 3d 30 60 ......TAP-Windows Adapter V9
. 2018.10.18 14:55:51 -     17...fc 45 96 28 3a c9 ......Realtek PCIe GbE Family Controller
. 2018.10.18 14:55:51 -     8...58 fb 84 fb e1 d2 ......Microsoft Wi-Fi Direct Virtual Adapter #4
. 2018.10.18 14:55:51 -     15...5a fb 84 fb e1 d1 ......Microsoft Wi-Fi Direct Virtual Adapter #5
. 2018.10.18 14:55:51 -     16...58 fb 84 fb e1 d1 ......Intel® Dual Band Wireless-AC 3165
. 2018.10.18 14:55:51 -     23...58 fb 84 fb e1 d5 ......Bluetooth Device (Personal Area Network)
. 2018.10.18 14:55:51 -     1...........................Software Loopback Interface 1
. 2018.10.18 14:55:51 -     ===========================================================================
. 2018.10.18 14:55:51 -     IPv4 Route Table
. 2018.10.18 14:55:51 -     ===========================================================================
. 2018.10.18 14:55:51 -     Active Routes:
. 2018.10.18 14:55:51 -     Network Destination        Netmask          Gateway       Interface  Metric
. 2018.10.18 14:55:51 -     0.0.0.0          0.0.0.0    192.168.1.254     192.168.1.70     36
. 2018.10.18 14:55:51 -     0.0.0.0        128.0.0.0      10.30.160.1     10.30.160.24      4
. 2018.10.18 14:55:51 -     10.30.160.0    255.255.255.0         On-link      10.30.160.24    259
. 2018.10.18 14:55:51 -     10.30.160.24  255.255.255.255         On-link      10.30.160.24    259
. 2018.10.18 14:55:51 -     10.30.160.255  255.255.255.255         On-link      10.30.160.24    259
. 2018.10.18 14:55:51 -     127.0.0.0        255.0.0.0         On-link         127.0.0.1    331
. 2018.10.18 14:55:51 -     127.0.0.1  255.255.255.255         On-link         127.0.0.1    331
. 2018.10.18 14:55:51 -     127.255.255.255  255.255.255.255         On-link         127.0.0.1    331
. 2018.10.18 14:55:51 -     128.0.0.0        128.0.0.0      10.30.160.1     10.30.160.24      3
. 2018.10.18 14:55:51 -     192.168.1.0    255.255.255.0         On-link      192.168.1.70    291
. 2018.10.18 14:55:51 -     192.168.1.70  255.255.255.255         On-link      192.168.1.70    291
. 2018.10.18 14:55:51 -     192.168.1.255  255.255.255.255         On-link      192.168.1.70    291
. 2018.10.18 14:55:51 -     199.19.94.19  255.255.255.255    192.168.1.254     192.168.1.70     35
. 2018.10.18 14:55:51 -     224.0.0.0        240.0.0.0         On-link         127.0.0.1    331
. 2018.10.18 14:55:51 -     224.0.0.0        240.0.0.0         On-link      10.30.160.24    259
. 2018.10.18 14:55:51 -     224.0.0.0        240.0.0.0         On-link      192.168.1.70    291
. 2018.10.18 14:55:51 -     255.255.255.255  255.255.255.255         On-link         127.0.0.1    331
. 2018.10.18 14:55:51 -     255.255.255.255  255.255.255.255         On-link      10.30.160.24    259
. 2018.10.18 14:55:51 -     255.255.255.255  255.255.255.255         On-link      192.168.1.70    291
. 2018.10.18 14:55:51 -     ===========================================================================
. 2018.10.18 14:55:51 -     Persistent Routes:
. 2018.10.18 14:55:51 -     None'
. 2018.10.18 14:55:51 - Shell(24) of 'cmd.exe', 2 args: '/c';'route -6 PRINT';
. 2018.10.18 14:55:51 - Shell(24) done in 156 ms, exit: 0, out: '===========================================================================
. 2018.10.18 14:55:51 -     Interface List
. 2018.10.18 14:55:51 -     10...00 ff 89 3d 30 60 ......TAP-Windows Adapter V9
. 2018.10.18 14:55:51 -     17...fc 45 96 28 3a c9 ......Realtek PCIe GbE Family Controller
. 2018.10.18 14:55:51 -     8...58 fb 84 fb e1 d2 ......Microsoft Wi-Fi Direct Virtual Adapter #4
. 2018.10.18 14:55:51 -     15...5a fb 84 fb e1 d1 ......Microsoft Wi-Fi Direct Virtual Adapter #5
. 2018.10.18 14:55:51 -     16...58 fb 84 fb e1 d1 ......Intel® Dual Band Wireless-AC 3165
. 2018.10.18 14:55:51 -     23...58 fb 84 fb e1 d5 ......Bluetooth Device (Personal Area Network)
. 2018.10.18 14:55:51 -     1...........................Software Loopback Interface 1
. 2018.10.18 14:55:51 -     ===========================================================================
. 2018.10.18 14:55:51 -     IPv6 Route Table
. 2018.10.18 14:55:51 -     ===========================================================================
. 2018.10.18 14:55:51 -     Active Routes:
. 2018.10.18 14:55:51 -     If Metric Network Destination      Gateway
. 2018.10.18 14:55:51 -     10    265 ::/3                     fe80::8
. 2018.10.18 14:55:51 -     1    331 ::1/128                  On-link
. 2018.10.18 14:55:51 -     10    259 2000::/4                 fe80::8
. 2018.10.18 14:55:51 -     10    259 3000::/4                 fe80::8
. 2018.10.18 14:55:51 -     10    259 fc00::/7                 fe80::8
. 2018.10.18 14:55:51 -     10    259 fde6:7a:7d20:1aa0::/64   fe80::8
. 2018.10.18 14:55:51 -     10    259 fde6:7a:7d20:1aa0::1016/128
. 2018.10.18 14:55:51 -     On-link
. 2018.10.18 14:55:51 -     10    259 fe80::/64                On-link
. 2018.10.18 14:55:51 -     16    291 fe80::/64                On-link
. 2018.10.18 14:55:51 -     16    291 fe80::3d7b:26aa:db6a:441e/128
. 2018.10.18 14:55:51 -     On-link
. 2018.10.18 14:55:51 -     10    259 fe80::eda8:50fe:32d4:98e7/128
. 2018.10.18 14:55:51 -     On-link
. 2018.10.18 14:55:51 -     1    331 ff00::/8                 On-link
. 2018.10.18 14:55:51 -     10    259 ff00::/8                 On-link
. 2018.10.18 14:55:51 -     16    291 ff00::/8                 On-link
. 2018.10.18 14:55:51 -     ===========================================================================
. 2018.10.18 14:55:51 -     Persistent Routes:
. 2018.10.18 14:55:51 -     If Metric Network Destination      Gateway
. 2018.10.18 14:55:51 -     0    262 ::/3                     fe80::8
. 2018.10.18 14:55:51 -     ==========================================================================='
. 2018.10.18 14:55:51 - Shell(25) of 'cmd.exe', 2 args: '/c';'netsh interface ipv4 set dns name="Ethernet 3" source=static address=10.30.160.1 register=primary validate=no';
. 2018.10.18 14:55:52 - Shell(25) done in 234 ms, exit: 0
. 2018.10.18 14:55:52 - DNS IPv4 of a network adapter forced (Ethernet 3, from manual (10.4.0.1) to 10.30.160.1)
. 2018.10.18 14:55:52 - Shell(26) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 set dns name="Ethernet 3" source=static address=fde6:7a:7d20:1aa0::1 register=primary validate=no';
. 2018.10.18 14:55:52 - Shell(26) done in 203 ms, exit: 0
. 2018.10.18 14:55:52 - DNS IPv6 of a network adapter forced (Ethernet 3, from automatic to fde6:7a:7d20:1aa0::1)
. 2018.10.18 14:55:52 - Shell(27) of 'cmd.exe', 2 args: '/c';'route add 199.19.94.193 mask 255.255.255.255 10.30.160.1 if 10';
. 2018.10.18 14:55:52 - Shell(27) done in 125 ms, exit: 0, out: 'OK!'
. 2018.10.18 14:55:52 - Routes, added a new route, 199.19.94.193 for gateway 10.30.160.1
. 2018.10.18 14:55:52 - Shell(28) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="2604:6880:c713:5e13:a196:b899:41c7:3787/128" interface="10" nexthop="fde6:7a:7d20:1aa0::1"';
. 2018.10.18 14:55:52 - Shell(28) done in 219 ms, exit: 0, out: 'Ok.'
. 2018.10.18 14:55:52 - Routes, added a new route, 2604:6880:c713:5e13:a196:b899:41c7:3787 for gateway fde6:7a:7d20:1aa0::1
. 2018.10.18 14:55:52 - Flushing DNS
. 2018.10.18 14:55:52 - Shell(29) of 'cmd.exe', 2 args: '/c';'ipconfig /flushdns';
. 2018.10.18 14:55:53 - Shell(29) done in 141 ms, exit: 0, out: 'Windows IP Configuration
. 2018.10.18 14:55:53 -     Successfully flushed the DNS Resolver Cache.'
. 2018.10.18 14:55:53 - Shell(30) of 'cmd.exe', 2 args: '/c';'ipconfig /registerdns';
. 2018.10.18 14:55:56 - Shell(30) done in 3109 ms, exit: 0, out: 'Windows IP Configuration
. 2018.10.18 14:55:56 -     Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer in 15 minutes.'
I 2018.10.18 14:55:56 - Checking route IPv4
. 2018.10.18 14:55:56 - curl: (60) SSL certificate problem: self signed certificate in certificate chain
. 2018.10.18 14:55:56 -     More details here: https://curl.haxx.se/docs/sslcerts.html
. 2018.10.18 14:55:56 -     curl performs SSL certificate verification by default, using a "bundle"
. 2018.10.18 14:55:56 -     of Certificate Authority (CA) public keys (CA certs). If the default
. 2018.10.18 14:55:56 -     bundle file isn't adequate, you can specify an alternate file
. 2018.10.18 14:55:56 -     using the --cacert option.
. 2018.10.18 14:55:56 -     If this HTTPS server uses a certificate signed by a CA represented in
. 2018.10.18 14:55:56 -     the bundle, the certificate verification probably failed due to a
. 2018.10.18 14:55:56 -     problem with the certificate (it might be expired, or the name might
. 2018.10.18 14:55:56 -     not match the domain name in the URL).
. 2018.10.18 14:55:56 -     If you'd like to turn off curl's verification of the certificate, use
. 2018.10.18 14:55:56 -     the -k (or --insecure) option.
. 2018.10.18 14:55:56 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure. - Stack:    at Eddie.Core.Tools.Curl.Fetch(HttpRequest request)
. 2018.10.18 14:55:56 -     at Eddie.Core.Engine.FetchUrlXml(HttpRequest request)
. 2018.10.18 14:55:56 -     at Eddie.Core.Threads.Session.ConnectedStep()
. 2018.10.18 14:55:56 - Checking route (2° try)
. 2018.10.18 14:55:57 - curl: (60) SSL certificate problem: self signed certificate in certificate chain
. 2018.10.18 14:55:57 -     More details here: https://curl.haxx.se/docs/sslcerts.html
. 2018.10.18 14:55:57 -     curl performs SSL certificate verification by default, using a "bundle"
. 2018.10.18 14:55:57 -     of Certificate Authority (CA) public keys (CA certs). If the default
. 2018.10.18 14:55:57 -     bundle file isn't adequate, you can specify an alternate file
. 2018.10.18 14:55:57 -     using the --cacert option.
. 2018.10.18 14:55:57 -     If this HTTPS server uses a certificate signed by a CA represented in
. 2018.10.18 14:55:57 -     the bundle, the certificate verification probably failed due to a
. 2018.10.18 14:55:57 -     problem with the certificate (it might be expired, or the name might
. 2018.10.18 14:55:57 -     not match the domain name in the URL).
. 2018.10.18 14:55:57 -     If you'd like to turn off curl's verification of the certificate, use
. 2018.10.18 14:55:57 -     the -k (or --insecure) option.
. 2018.10.18 14:55:57 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure. - Stack:    at Eddie.Core.Tools.Curl.Fetch(HttpRequest request)
. 2018.10.18 14:55:57 -     at Eddie.Core.Engine.FetchUrlXml(HttpRequest request)
. 2018.10.18 14:55:57 -     at Eddie.Core.Threads.Session.ConnectedStep()
. 2018.10.18 14:55:57 - Checking route (3° try)
. 2018.10.18 14:56:00 - curl: (60) SSL certificate problem: self signed certificate in certificate chain
. 2018.10.18 14:56:00 -     More details here: https://curl.haxx.se/docs/sslcerts.html
. 2018.10.18 14:56:00 -     curl performs SSL certificate verification by default, using a "bundle"
. 2018.10.18 14:56:00 -     of Certificate Authority (CA) public keys (CA certs). If the default
. 2018.10.18 14:56:00 -     bundle file isn't adequate, you can specify an alternate file
. 2018.10.18 14:56:00 -     using the --cacert option.
. 2018.10.18 14:56:00 -     If this HTTPS server uses a certificate signed by a CA represented in
. 2018.10.18 14:56:00 -     the bundle, the certificate verification probably failed due to a
. 2018.10.18 14:56:00 -     problem with the certificate (it might be expired, or the name might
. 2018.10.18 14:56:00 -     not match the domain name in the URL).
. 2018.10.18 14:56:00 -     If you'd like to turn off curl's verification of the certificate, use
. 2018.10.18 14:56:00 -     the -k (or --insecure) option.
. 2018.10.18 14:56:00 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure. - Stack:    at Eddie.Core.Tools.Curl.Fetch(HttpRequest request)
. 2018.10.18 14:56:00 -     at Eddie.Core.Engine.FetchUrlXml(HttpRequest request)
. 2018.10.18 14:56:00 -     at Eddie.Core.Threads.Session.ConnectedStep()
E 2018.10.18 14:56:00 - Checking route IPv4 failed.
. 2018.10.18 14:56:00 - OpenVPN > Initialization Sequence Completed
! 2018.10.18 14:56:00 - Disconnecting
. 2018.10.18 14:56:00 - Shell(31) of 'cmd.exe', 2 args: '/c';'route delete 199.19.94.193 mask 255.255.255.255 10.30.160.1 if 10';
. 2018.10.18 14:56:00 - Shell(31) done in 234 ms, exit: 0, out: 'OK!'
. 2018.10.18 14:56:00 - Routes, removed a route previously added, 199.19.94.193 for gateway 10.30.160.1
. 2018.10.18 14:56:00 - Shell(32) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 del route prefix="2604:6880:c713:5e13:a196:b899:41c7:3787/128" interface="10" nexthop="fde6:7a:7d20:1aa0::1"';
. 2018.10.18 14:56:00 - Shell(32) done in 265 ms, exit: 0, out: 'Ok.'
. 2018.10.18 14:56:00 - Routes, removed a route previously added, 2604:6880:c713:5e13:a196:b899:41c7:3787 for gateway fde6:7a:7d20:1aa0::1
. 2018.10.18 14:56:00 - Sending management termination signal
. 2018.10.18 14:56:00 - Management - Send 'signal SIGTERM'
. 2018.10.18 14:56:00 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.10.18 14:56:00 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.10.18 14:56:00 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2018.10.18 14:56:05 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 199.19.94.19 MASK 255.255.255.255 192.168.1.254
. 2018.10.18 14:56:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.10.18 14:56:05 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.30.160.1
. 2018.10.18 14:56:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.10.18 14:56:05 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.30.160.1
. 2018.10.18 14:56:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.10.18 14:56:05 - OpenVPN > delete_route_ipv6(2000::/4)
. 2018.10.18 14:56:05 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=10 fe80::8 store=active
. 2018.10.18 14:56:05 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:56:05 - OpenVPN > delete_route_ipv6(3000::/4)
. 2018.10.18 14:56:05 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=10 fe80::8 store=active
. 2018.10.18 14:56:05 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:56:05 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2018.10.18 14:56:05 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=10 fe80::8 store=active
. 2018.10.18 14:56:05 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:56:06 - OpenVPN > Closing TUN/TAP interface
. 2018.10.18 14:56:06 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1aa0::/64)
. 2018.10.18 14:56:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1aa0::/64 interface=10 fe80::8 store=active
. 2018.10.18 14:56:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 3 fde6:7a:7d20:1aa0::1016 store=active
. 2018.10.18 14:56:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 3 all
. 2018.10.18 14:56:07 - OpenVPN > TAP: DHCP address released
. 2018.10.18 14:56:07 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.10.18 14:56:07 - Connection terminated.
. 2018.10.18 14:56:07 - Shell(33) of 'cmd.exe', 2 args: '/c';'netsh interface ipv4 set dns name="Ethernet 3" source=static address=10.4.0.1 register=primary validate=no';
. 2018.10.18 14:56:08 - Shell(33) done in 1156 ms, exit: 0
. 2018.10.18 14:56:08 - DNS IPv4 of a network adapter restored to original settings (Ethernet 3, to 10.4.0.1)
. 2018.10.18 14:56:08 - Shell(34) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 set dns name="Ethernet 3" source=dhcp register=primary validate=no';
. 2018.10.18 14:56:08 - Shell(34) done in 218 ms, exit: 0
. 2018.10.18 14:56:08 - DNS IPv6 of a network adapter restored to original settings (Ethernet 3, to automatic)
. 2018.10.18 14:56:08 - DNS leak protection with packet filtering disabled.
. 2018.10.18 14:56:08 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv4
. 2018.10.18 14:56:08 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv6
I 2018.10.18 14:56:12 - Checking authorization ...
! 2018.10.18 14:56:13 - Connecting to Alwaid (Canada, Toronto, Ontario)
. 2018.10.18 14:56:13 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.10.18 14:56:13 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.10.18 14:56:13 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.10.18 14:56:13 - Connection to OpenVPN Management Interface
. 2018.10.18 14:56:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.10.18 14:56:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.10.18 14:56:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.10.18 14:56:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.114:443
. 2018.10.18 14:56:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.10.18 14:56:13 - OpenVPN > UDP link local: (not bound)
. 2018.10.18 14:56:13 - OpenVPN > UDP link remote: [AF_INET]184.75.221.114:443
. 2018.10.18 14:56:13 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.10.18 14:56:13 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.114:443, sid=7e3cfed4 958cbad3
. 2018.10.18 14:56:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.10.18 14:56:13 - OpenVPN > VERIFY KU OK
. 2018.10.18 14:56:13 - OpenVPN > Validating certificate extended key usage
. 2018.10.18 14:56:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.10.18 14:56:13 - OpenVPN > VERIFY EKU OK
. 2018.10.18 14:56:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.10.18 14:56:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.10.18 14:56:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.114:443
. 2018.10.18 14:56:15 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.10.18 14:56:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.128.1,dhcp-option DNS6 fde6:7a:7d20:480::1,tun-ipv6,route-gateway 10.8.128.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:480::10c3/64 fde6:7a:7d20:480::1,ifconfig 10.8.128.197 255.255.255.0,peer-id 6,cipher AES-256-GCM'
. 2018.10.18 14:56:15 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2018.10.18 14:56:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.10.18 14:56:15 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.10.18 14:56:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.10.18 14:56:15 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.10.18 14:56:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.10.18 14:56:15 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.10.18 14:56:15 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.10.18 14:56:15 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.10.18 14:56:15 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.10.18 14:56:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.10.18 14:56:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.10.18 14:56:15 - OpenVPN > interactive service msg_channel=0
. 2018.10.18 14:56:15 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=16 HWADDR=58:fb:84:fb:e1:d1
. 2018.10.18 14:56:15 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2018.10.18 14:56:15 - OpenVPN > GetBestInterfaceEx() returned if=10
. 2018.10.18 14:56:15 - OpenVPN > GDG6: II=10 DP=::/3 NH=fe80::8
. 2018.10.18 14:56:15 - OpenVPN > GDG6: Metric=262, Loopback=0, AA=1, I=0
. 2018.10.18 14:56:15 - OpenVPN > ROUTE6_GATEWAY fe80::8 I=10
. 2018.10.18 14:56:15 - OpenVPN > open_tun
. 2018.10.18 14:56:15 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{893D3060-3C80-4F8C-BC19-3D6449E3EFF6}.tap
. 2018.10.18 14:56:15 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.10.18 14:56:15 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.128.0/10.8.128.197/255.255.255.0 [SUCCEEDED]
. 2018.10.18 14:56:15 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.128.197/255.255.255.0 on interface {893D3060-3C80-4F8C-BC19-3D6449E3EFF6} [DHCP-serv: 10.8.128.254, lease-time: 31536000]
. 2018.10.18 14:56:15 - OpenVPN > Successful ARP Flush on interface [10] {893D3060-3C80-4F8C-BC19-3D6449E3EFF6}
. 2018.10.18 14:56:15 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2018.10.18 14:56:16 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=10 fde6:7a:7d20:480::10c3 store=active
. 2018.10.18 14:56:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 3 static fde6:7a:7d20:480::1 validate=no
. 2018.10.18 14:56:17 - Shell(35) of 'cmd.exe', 2 args: '/c';'route -6 print';
. 2018.10.18 14:56:17 - Shell(35) done in 172 ms, exit: 0, out: '===========================================================================
. 2018.10.18 14:56:17 -     Interface List
. 2018.10.18 14:56:17 -     17...fc 45 96 28 3a c9 ......Realtek PCIe GbE Family Controller
. 2018.10.18 14:56:17 -     8...58 fb 84 fb e1 d2 ......Microsoft Wi-Fi Direct Virtual Adapter #4
. 2018.10.18 14:56:17 -     15...5a fb 84 fb e1 d1 ......Microsoft Wi-Fi Direct Virtual Adapter #5
. 2018.10.18 14:56:17 -     10...00 ff 89 3d 30 60 ......TAP-Windows Adapter V9
. 2018.10.18 14:56:17 -     16...58 fb 84 fb e1 d1 ......Intel® Dual Band Wireless-AC 3165
. 2018.10.18 14:56:17 -     23...58 fb 84 fb e1 d5 ......Bluetooth Device (Personal Area Network)
. 2018.10.18 14:56:17 -     1...........................Software Loopback Interface 1
. 2018.10.18 14:56:17 -     ===========================================================================
. 2018.10.18 14:56:17 -     IPv6 Route Table
. 2018.10.18 14:56:17 -     ===========================================================================
. 2018.10.18 14:56:17 -     Active Routes:
. 2018.10.18 14:56:17 -     If Metric Network Destination      Gateway
. 2018.10.18 14:56:17 -     10    297 ::/3                     fe80::8
. 2018.10.18 14:56:17 -     1    331 ::1/128                  On-link
. 2018.10.18 14:56:17 -     10    291 fde6:7a:7d20:480::/64    On-link
. 2018.10.18 14:56:17 -     10    291 fde6:7a:7d20:480::10c3/128
. 2018.10.18 14:56:17 -     On-link
. 2018.10.18 14:56:17 -     10    291 fe80::/64                On-link
. 2018.10.18 14:56:17 -     16    291 fe80::/64                On-link
. 2018.10.18 14:56:17 -     16    291 fe80::3d7b:26aa:db6a:441e/128
. 2018.10.18 14:56:17 -     On-link
. 2018.10.18 14:56:17 -     10    291 fe80::eda8:50fe:32d4:98e7/128
. 2018.10.18 14:56:17 -     On-link
. 2018.10.18 14:56:17 -     1    331 ff00::/8                 On-link
. 2018.10.18 14:56:17 -     10    291 ff00::/8                 On-link
. 2018.10.18 14:56:17 -     16    291 ff00::/8                 On-link
. 2018.10.18 14:56:17 -     ===========================================================================
. 2018.10.18 14:56:17 -     Persistent Routes:
. 2018.10.18 14:56:17 -     If Metric Network Destination      Gateway
. 2018.10.18 14:56:17 -     0    262 ::/3                     fe80::8
. 2018.10.18 14:56:17 -     ==========================================================================='
. 2018.10.18 14:56:17 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.
. 2018.10.18 14:56:17 - Shell(36) of 'C:\WINDOWS\system32\netsh.exe', 1 args: 'interface ipv6 del route "fde6:7a:7d20:480::/64" interface="10"';
. 2018.10.18 14:56:18 - Shell(36) done in 172 ms, exit: 0, out: 'Ok.'
. 2018.10.18 14:56:18 - OpenVPN > add_route_ipv6(fde6:7a:7d20:480::/64 -> fde6:7a:7d20:480::10c3 metric 0) dev Ethernet 3
. 2018.10.18 14:56:18 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:480::/64 interface=10 fe80::8 store=active
. 2018.10.18 14:56:18 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:56:23 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.10.18 14:56:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.114 MASK 255.255.255.255 192.168.1.254
. 2018.10.18 14:56:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.10.18 14:56:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.10.18 14:56:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.128.1
. 2018.10.18 14:56:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.10.18 14:56:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.10.18 14:56:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.128.1
. 2018.10.18 14:56:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.10.18 14:56:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.10.18 14:56:23 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:480::1 metric -1) dev Ethernet 3
. 2018.10.18 14:56:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=10 fe80::8 store=active
. 2018.10.18 14:56:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
E 2018.10.18 14:56:23 - OpenVPN > ERROR: Windows route add ipv6 command failed: returned error code 1
. 2018.10.18 14:56:23 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:480::1 metric -1) dev Ethernet 3
. 2018.10.18 14:56:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=10 fe80::8 store=active
. 2018.10.18 14:56:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:56:23 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:480::1 metric -1) dev Ethernet 3
. 2018.10.18 14:56:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=10 fe80::8 store=active
. 2018.10.18 14:56:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:56:24 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:480::1 metric -1) dev Ethernet 3
. 2018.10.18 14:56:24 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=10 fe80::8 store=active
. 2018.10.18 14:56:24 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:56:24 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv4
. 2018.10.18 14:56:24 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv6
. 2018.10.18 14:56:24 - DNS leak protection with packet filtering enabled.
. 2018.10.18 14:56:24 - Shell(37) of 'cmd.exe', 2 args: '/c';'route -4 PRINT';
. 2018.10.18 14:56:24 - Shell(37) done in 203 ms, exit: 0, out: '===========================================================================
. 2018.10.18 14:56:24 -     Interface List
. 2018.10.18 14:56:24 -     10...00 ff 89 3d 30 60 ......TAP-Windows Adapter V9
. 2018.10.18 14:56:24 -     17...fc 45 96 28 3a c9 ......Realtek PCIe GbE Family Controller
. 2018.10.18 14:56:24 -     8...58 fb 84 fb e1 d2 ......Microsoft Wi-Fi Direct Virtual Adapter #4
. 2018.10.18 14:56:24 -     15...5a fb 84 fb e1 d1 ......Microsoft Wi-Fi Direct Virtual Adapter #5
. 2018.10.18 14:56:24 -     16...58 fb 84 fb e1 d1 ......Intel® Dual Band Wireless-AC 3165
. 2018.10.18 14:56:24 -     23...58 fb 84 fb e1 d5 ......Bluetooth Device (Personal Area Network)
. 2018.10.18 14:56:24 -     1...........................Software Loopback Interface 1
. 2018.10.18 14:56:24 -     ===========================================================================
. 2018.10.18 14:56:24 -     IPv4 Route Table
. 2018.10.18 14:56:24 -     ===========================================================================
. 2018.10.18 14:56:24 -     Active Routes:
. 2018.10.18 14:56:24 -     Network Destination        Netmask          Gateway       Interface  Metric
. 2018.10.18 14:56:24 -     0.0.0.0          0.0.0.0    192.168.1.254     192.168.1.70     36
. 2018.10.18 14:56:24 -     0.0.0.0        128.0.0.0       10.8.128.1     10.8.128.197      3
. 2018.10.18 14:56:24 -     10.8.128.0    255.255.255.0         On-link      10.8.128.197    259
. 2018.10.18 14:56:24 -     10.8.128.197  255.255.255.255         On-link      10.8.128.197    259
. 2018.10.18 14:56:24 -     10.8.128.255  255.255.255.255         On-link      10.8.128.197    259
. 2018.10.18 14:56:24 -     127.0.0.0        255.0.0.0         On-link         127.0.0.1    331
. 2018.10.18 14:56:24 -     127.0.0.1  255.255.255.255         On-link         127.0.0.1    331
. 2018.10.18 14:56:24 -     127.255.255.255  255.255.255.255         On-link         127.0.0.1    331
. 2018.10.18 14:56:24 -     128.0.0.0        128.0.0.0       10.8.128.1     10.8.128.197      3
. 2018.10.18 14:56:24 -     184.75.221.114  255.255.255.255    192.168.1.254     192.168.1.70     35
. 2018.10.18 14:56:24 -     192.168.1.0    255.255.255.0         On-link      192.168.1.70    291
. 2018.10.18 14:56:24 -     192.168.1.70  255.255.255.255         On-link      192.168.1.70    291
. 2018.10.18 14:56:24 -     192.168.1.255  255.255.255.255         On-link      192.168.1.70    291
. 2018.10.18 14:56:24 -     224.0.0.0        240.0.0.0         On-link         127.0.0.1    331
. 2018.10.18 14:56:24 -     224.0.0.0        240.0.0.0         On-link      10.8.128.197    259
. 2018.10.18 14:56:24 -     224.0.0.0        240.0.0.0         On-link      192.168.1.70    291
. 2018.10.18 14:56:24 -     255.255.255.255  255.255.255.255         On-link         127.0.0.1    331
. 2018.10.18 14:56:24 -     255.255.255.255  255.255.255.255         On-link      10.8.128.197    259
. 2018.10.18 14:56:24 -     255.255.255.255  255.255.255.255         On-link      192.168.1.70    291
. 2018.10.18 14:56:24 -     ===========================================================================
. 2018.10.18 14:56:24 -     Persistent Routes:
. 2018.10.18 14:56:24 -     None'
. 2018.10.18 14:56:24 - Shell(38) of 'cmd.exe', 2 args: '/c';'route -6 PRINT';
. 2018.10.18 14:56:24 - Shell(38) done in 156 ms, exit: 0, out: '===========================================================================
. 2018.10.18 14:56:24 -     Interface List
. 2018.10.18 14:56:24 -     10...00 ff 89 3d 30 60 ......TAP-Windows Adapter V9
. 2018.10.18 14:56:24 -     17...fc 45 96 28 3a c9 ......Realtek PCIe GbE Family Controller
. 2018.10.18 14:56:24 -     8...58 fb 84 fb e1 d2 ......Microsoft Wi-Fi Direct Virtual Adapter #4
. 2018.10.18 14:56:24 -     15...5a fb 84 fb e1 d1 ......Microsoft Wi-Fi Direct Virtual Adapter #5
. 2018.10.18 14:56:24 -     16...58 fb 84 fb e1 d1 ......Intel® Dual Band Wireless-AC 3165
. 2018.10.18 14:56:24 -     23...58 fb 84 fb e1 d5 ......Bluetooth Device (Personal Area Network)
. 2018.10.18 14:56:24 -     1...........................Software Loopback Interface 1
. 2018.10.18 14:56:24 -     ===========================================================================
. 2018.10.18 14:56:24 -     IPv6 Route Table
. 2018.10.18 14:56:24 -     ===========================================================================
. 2018.10.18 14:56:24 -     Active Routes:
. 2018.10.18 14:56:24 -     If Metric Network Destination      Gateway
. 2018.10.18 14:56:24 -     10    265 ::/3                     fe80::8
. 2018.10.18 14:56:24 -     1    331 ::1/128                  On-link
. 2018.10.18 14:56:24 -     10    259 2000::/4                 fe80::8
. 2018.10.18 14:56:24 -     10    259 3000::/4                 fe80::8
. 2018.10.18 14:56:24 -     10    259 fc00::/7                 fe80::8
. 2018.10.18 14:56:24 -     10    259 fde6:7a:7d20:480::/64    fe80::8
. 2018.10.18 14:56:24 -     10    259 fde6:7a:7d20:480::10c3/128
. 2018.10.18 14:56:24 -     On-link
. 2018.10.18 14:56:24 -     10    259 fe80::/64                On-link
. 2018.10.18 14:56:24 -     16    291 fe80::/64                On-link
. 2018.10.18 14:56:24 -     16    291 fe80::3d7b:26aa:db6a:441e/128
. 2018.10.18 14:56:24 -     On-link
. 2018.10.18 14:56:24 -     10    259 fe80::eda8:50fe:32d4:98e7/128
. 2018.10.18 14:56:24 -     On-link
. 2018.10.18 14:56:24 -     1    331 ff00::/8                 On-link
. 2018.10.18 14:56:24 -     10    259 ff00::/8                 On-link
. 2018.10.18 14:56:24 -     16    291 ff00::/8                 On-link
. 2018.10.18 14:56:24 -     ===========================================================================
. 2018.10.18 14:56:24 -     Persistent Routes:
. 2018.10.18 14:56:24 -     If Metric Network Destination      Gateway
. 2018.10.18 14:56:24 -     0    262 ::/3                     fe80::8
. 2018.10.18 14:56:24 -     ==========================================================================='
. 2018.10.18 14:56:24 - Shell(39) of 'cmd.exe', 2 args: '/c';'netsh interface ipv4 set dns name="Ethernet 3" source=static address=10.8.128.1 register=primary validate=no';
. 2018.10.18 14:56:25 - Shell(39) done in 234 ms, exit: 0
. 2018.10.18 14:56:25 - DNS IPv4 of a network adapter forced (Ethernet 3, from manual (10.4.0.1) to 10.8.128.1)
. 2018.10.18 14:56:25 - Shell(40) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 set dns name="Ethernet 3" source=static address=fde6:7a:7d20:480::1 register=primary validate=no';
. 2018.10.18 14:56:25 - Shell(40) done in 234 ms, exit: 0
. 2018.10.18 14:56:25 - DNS IPv6 of a network adapter forced (Ethernet 3, from automatic to fde6:7a:7d20:480::1)
. 2018.10.18 14:56:25 - Shell(41) of 'cmd.exe', 2 args: '/c';'route add 184.75.221.115 mask 255.255.255.255 10.8.128.1 if 10';
. 2018.10.18 14:56:25 - Shell(41) done in 125 ms, exit: 0, out: 'OK!'
. 2018.10.18 14:56:25 - Routes, added a new route, 184.75.221.115 for gateway 10.8.128.1
. 2018.10.18 14:56:25 - Shell(42) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 add route prefix="2606:6080:1001:11:60bc:461c:1305:bb4b/128" interface="10" nexthop="fde6:7a:7d20:480::1"';
. 2018.10.18 14:56:25 - Shell(42) done in 219 ms, exit: 0, out: 'Ok.'
. 2018.10.18 14:56:25 - Routes, added a new route, 2606:6080:1001:11:60bc:461c:1305:bb4b for gateway fde6:7a:7d20:480::1
. 2018.10.18 14:56:25 - Flushing DNS
. 2018.10.18 14:56:25 - Shell(43) of 'cmd.exe', 2 args: '/c';'ipconfig /flushdns';
. 2018.10.18 14:56:26 - Shell(43) done in 156 ms, exit: 0, out: 'Windows IP Configuration
. 2018.10.18 14:56:26 -     Successfully flushed the DNS Resolver Cache.'
. 2018.10.18 14:56:26 - Shell(44) of 'cmd.exe', 2 args: '/c';'ipconfig /registerdns';
. 2018.10.18 14:56:29 - Shell(44) done in 3125 ms, exit: 0, out: 'Windows IP Configuration
. 2018.10.18 14:56:29 -     Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer in 15 minutes.'
I 2018.10.18 14:56:29 - Checking route IPv4
. 2018.10.18 14:56:29 - curl: (60) SSL certificate problem: self signed certificate in certificate chain
. 2018.10.18 14:56:29 -     More details here: https://curl.haxx.se/docs/sslcerts.html
. 2018.10.18 14:56:29 -     curl performs SSL certificate verification by default, using a "bundle"
. 2018.10.18 14:56:29 -     of Certificate Authority (CA) public keys (CA certs). If the default
. 2018.10.18 14:56:29 -     bundle file isn't adequate, you can specify an alternate file
. 2018.10.18 14:56:29 -     using the --cacert option.
. 2018.10.18 14:56:29 -     If this HTTPS server uses a certificate signed by a CA represented in
. 2018.10.18 14:56:29 -     the bundle, the certificate verification probably failed due to a
. 2018.10.18 14:56:29 -     problem with the certificate (it might be expired, or the name might
. 2018.10.18 14:56:29 -     not match the domain name in the URL).
. 2018.10.18 14:56:29 -     If you'd like to turn off curl's verification of the certificate, use
. 2018.10.18 14:56:29 -     the -k (or --insecure) option.
. 2018.10.18 14:56:29 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure. - Stack:    at Eddie.Core.Tools.Curl.Fetch(HttpRequest request)
. 2018.10.18 14:56:29 -     at Eddie.Core.Engine.FetchUrlXml(HttpRequest request)
. 2018.10.18 14:56:29 -     at Eddie.Core.Threads.Session.ConnectedStep()
. 2018.10.18 14:56:29 - Checking route (2° try)
. 2018.10.18 14:56:30 - curl: (60) SSL certificate problem: self signed certificate in certificate chain
. 2018.10.18 14:56:30 -     More details here: https://curl.haxx.se/docs/sslcerts.html
. 2018.10.18 14:56:30 -     curl performs SSL certificate verification by default, using a "bundle"
. 2018.10.18 14:56:30 -     of Certificate Authority (CA) public keys (CA certs). If the default
. 2018.10.18 14:56:30 -     bundle file isn't adequate, you can specify an alternate file
. 2018.10.18 14:56:30 -     using the --cacert option.
. 2018.10.18 14:56:30 -     If this HTTPS server uses a certificate signed by a CA represented in
. 2018.10.18 14:56:30 -     the bundle, the certificate verification probably failed due to a
. 2018.10.18 14:56:30 -     problem with the certificate (it might be expired, or the name might
. 2018.10.18 14:56:30 -     not match the domain name in the URL).
. 2018.10.18 14:56:30 -     If you'd like to turn off curl's verification of the certificate, use
. 2018.10.18 14:56:30 -     the -k (or --insecure) option.
. 2018.10.18 14:56:30 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure. - Stack:    at Eddie.Core.Tools.Curl.Fetch(HttpRequest request)
. 2018.10.18 14:56:30 -     at Eddie.Core.Engine.FetchUrlXml(HttpRequest request)
. 2018.10.18 14:56:30 -     at Eddie.Core.Threads.Session.ConnectedStep()
. 2018.10.18 14:56:30 - Checking route (3° try)
. 2018.10.18 14:56:33 - curl: (60) SSL certificate problem: self signed certificate in certificate chain
. 2018.10.18 14:56:33 -     More details here: https://curl.haxx.se/docs/sslcerts.html
. 2018.10.18 14:56:33 -     curl performs SSL certificate verification by default, using a "bundle"
. 2018.10.18 14:56:33 -     of Certificate Authority (CA) public keys (CA certs). If the default
. 2018.10.18 14:56:33 -     bundle file isn't adequate, you can specify an alternate file
. 2018.10.18 14:56:33 -     using the --cacert option.
. 2018.10.18 14:56:33 -     If this HTTPS server uses a certificate signed by a CA represented in
. 2018.10.18 14:56:33 -     the bundle, the certificate verification probably failed due to a
. 2018.10.18 14:56:33 -     problem with the certificate (it might be expired, or the name might
. 2018.10.18 14:56:33 -     not match the domain name in the URL).
. 2018.10.18 14:56:33 -     If you'd like to turn off curl's verification of the certificate, use
. 2018.10.18 14:56:33 -     the -k (or --insecure) option.
. 2018.10.18 14:56:33 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure. - Stack:    at Eddie.Core.Tools.Curl.Fetch(HttpRequest request)
. 2018.10.18 14:56:33 -     at Eddie.Core.Engine.FetchUrlXml(HttpRequest request)
. 2018.10.18 14:56:33 -     at Eddie.Core.Threads.Session.ConnectedStep()
E 2018.10.18 14:56:33 - Checking route IPv4 failed.
. 2018.10.18 14:56:33 - OpenVPN > Initialization Sequence Completed
! 2018.10.18 14:56:33 - Disconnecting
. 2018.10.18 14:56:33 - Shell(45) of 'cmd.exe', 2 args: '/c';'route delete 184.75.221.115 mask 255.255.255.255 10.8.128.1 if 10';
. 2018.10.18 14:56:33 - Shell(45) done in 203 ms, exit: 0, out: 'OK!'
. 2018.10.18 14:56:33 - Routes, removed a route previously added, 184.75.221.115 for gateway 10.8.128.1
. 2018.10.18 14:56:33 - Shell(46) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 del route prefix="2606:6080:1001:11:60bc:461c:1305:bb4b/128" interface="10" nexthop="fde6:7a:7d20:480::1"';
. 2018.10.18 14:56:33 - Shell(46) done in 234 ms, exit: 0, out: 'Ok.'
. 2018.10.18 14:56:33 - Routes, removed a route previously added, 2606:6080:1001:11:60bc:461c:1305:bb4b for gateway fde6:7a:7d20:480::1
. 2018.10.18 14:56:33 - Sending management termination signal
. 2018.10.18 14:56:33 - Management - Send 'signal SIGTERM'
. 2018.10.18 14:56:34 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.10.18 14:56:34 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.10.18 14:56:38 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.221.114 MASK 255.255.255.255 192.168.1.254
. 2018.10.18 14:56:38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.10.18 14:56:38 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.128.1
. 2018.10.18 14:56:38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.10.18 14:56:38 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.8.128.1
. 2018.10.18 14:56:38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.10.18 14:56:38 - OpenVPN > delete_route_ipv6(2000::/4)
. 2018.10.18 14:56:38 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=10 fe80::8 store=active
. 2018.10.18 14:56:38 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:56:39 - OpenVPN > delete_route_ipv6(3000::/4)
. 2018.10.18 14:56:39 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=10 fe80::8 store=active
. 2018.10.18 14:56:39 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:56:39 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2018.10.18 14:56:39 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=10 fe80::8 store=active
. 2018.10.18 14:56:39 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.10.18 14:56:39 - OpenVPN > Closing TUN/TAP interface
. 2018.10.18 14:56:39 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:480::/64)
. 2018.10.18 14:56:39 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:480::/64 interface=10 fe80::8 store=active
. 2018.10.18 14:56:39 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 3 fde6:7a:7d20:480::10c3 store=active
. 2018.10.18 14:56:40 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 3 all
. 2018.10.18 14:56:40 - OpenVPN > TAP: DHCP address released
. 2018.10.18 14:56:40 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.10.18 14:56:40 - Connection terminated.
. 2018.10.18 14:56:40 - Shell(47) of 'cmd.exe', 2 args: '/c';'netsh interface ipv4 set dns name="Ethernet 3" source=static address=10.4.0.1 register=primary validate=no';
. 2018.10.18 14:56:42 - Shell(47) done in 1328 ms, exit: 0
. 2018.10.18 14:56:42 - DNS IPv4 of a network adapter restored to original settings (Ethernet 3, to 10.4.0.1)
. 2018.10.18 14:56:42 - Shell(48) of 'cmd.exe', 2 args: '/c';'netsh interface ipv6 set dns name="Ethernet 3" source=dhcp register=primary validate=no';
. 2018.10.18 14:56:42 - Shell(48) done in 250 ms, exit: 0
. 2018.10.18 14:56:42 - DNS IPv6 of a network adapter restored to original settings (Ethernet 3, to automatic)
. 2018.10.18 14:56:42 - DNS leak protection with packet filtering disabled.
. 2018.10.18 14:56:42 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv4
. 2018.10.18 14:56:42 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv6
I 2018.10.18 14:56:45 - Checking authorization ...
. 2018.10.18 14:56:46 - IPv6 disabled with packet filtering.
! 2018.10.18 14:56:46 - Connecting to Regulus (Canada, Toronto, Ontario)
. 2018.10.18 14:56:46 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.10.18 14:56:46 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.10.18 14:56:46 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.10.18 14:56:46 - Connection to OpenVPN Management Interface
. 2018.10.18 14:56:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.10.18 14:56:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.10.18 14:56:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.10.18 14:56:46 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.34:443
. 2018.10.18 14:56:46 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.10.18 14:56:46 - OpenVPN > UDP link local: (not bound)
. 2018.10.18 14:56:46 - OpenVPN > UDP link remote: [AF_INET]184.75.221.34:443
. 2018.10.18 14:56:46 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.10.18 14:56:46 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.34:443, sid=0448c055 a5e6ab9c
. 2018.10.18 14:56:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.10.18 14:56:46 - OpenVPN > VERIFY KU OK
. 2018.10.18 14:56:46 - OpenVPN > Validating certificate extended key usage
. 2018.10.18 14:56:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.10.18 14:56:46 - OpenVPN > VERIFY EKU OK
. 2018.10.18 14:56:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.10.18 14:56:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.10.18 14:56:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.34:443
. 2018.10.18 14:56:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.10.18 14:56:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.0.1,dhcp-option DNS6 fde6:7a:7d20:1800::1,tun-ipv6,route-gateway 10.28.0.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1800::1070/64 fde6:7a:7d20:1800::1,ifconfig 10.28.0.114 255.255.255.0,peer-id 3,cipher AES-256-GCM'
. 2018.10.18 14:56:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2018.10.18 14:56:48 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1800::1'
. 2018.10.18 14:56:48 - OpenVPN > Pushed option removed by filter: 'tun-ipv6'
. 2018.10.18 14:56:48 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1800::1070/64 fde6:7a:7d20:1800::1'
. 2018.10.18 14:56:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.10.18 14:56:48 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.10.18 14:56:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.10.18 14:56:48 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.10.18 14:56:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.10.18 14:56:48 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.10.18 14:56:48 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.10.18 14:56:48 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.10.18 14:56:48 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.10.18 14:56:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.10.18 14:56:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.10.18 14:56:48 - OpenVPN > interactive service msg_channel=0
. 2018.10.18 14:56:48 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=16 HWADDR=58:fb:84:fb:e1:d1
. 2018.10.18 14:56:48 - OpenVPN > open_tun
. 2018.10.18 14:56:48 - OpenVPN > TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{893D3060-3C80-4F8C-BC19-3D6449E3EFF6}.tap
. 2018.10.18 14:56:48 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.10.18 14:56:48 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.28.0.0/10.28.0.114/255.255.255.0 [SUCCEEDED]
. 2018.10.18 14:56:48 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.28.0.114/255.255.255.0 on interface {893D3060-3C80-4F8C-BC19-3D6449E3EFF6} [DHCP-serv: 10.28.0.254, lease-time: 31536000]
. 2018.10.18 14:56:48 - OpenVPN > Successful ARP Flush on interface [10] {893D3060-3C80-4F8C-BC19-3D6449E3EFF6}
. 2018.10.18 14:56:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.10.18 14:56:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.10.18 14:56:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.34 MASK 255.255.255.255 192.168.1.254
. 2018.10.18 14:56:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.10.18 14:56:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.10.18 14:56:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.28.0.1
. 2018.10.18 14:56:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.10.18 14:56:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.10.18 14:56:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.28.0.1
. 2018.10.18 14:56:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.10.18 14:56:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.10.18 14:56:53 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv4
. 2018.10.18 14:56:53 - Interface Ethernet 3 metric changed from Automatic to 3, layer IPv6
. 2018.10.18 14:56:53 - DNS leak protection with packet filtering enabled.
. 2018.10.18 14:56:53 - Shell(49) of 'cmd.exe', 2 args: '/c';'route -4 PRINT';
. 2018.10.18 14:56:53 - Shell(49) done in 172 ms, exit: 0, out: '===========================================================================
. 2018.10.18 14:56:53 -     Interface List
. 2018.10.18 14:56:53 -     10...00 ff 89 3d 30 60 ......TAP-Windows Adapter V9
. 2018.10.18 14:56:53 -     17...fc 45 96 28 3a c9 ......Realtek PCIe GbE Family Controller
. 2018.10.18 14:56:53 -     8...58 fb 84 fb e1 d2 ......Microsoft Wi-Fi Direct Virtual Adapter #4
. 2018.10.18 14:56:53 -     15...5a fb 84 fb e1 d1 ......Microsoft Wi-Fi Direct Virtual Adapter #5
. 2018.10.18 14:56:53 -     16...58 fb 84 fb e1 d1 ......Intel® Dual Band Wireless-AC 3165
. 2018.10.18 14:56:53 -     23...58 fb 84 fb e1 d5 ......Bluetooth Device (Personal Area Network)
. 2018.10.18 14:56:53 -     1...........................Software Loopback Interface 1
. 2018.10.18 14:56:53 -     ===========================================================================
. 2018.10.18 14:56:53 -     IPv4 Route Table
. 2018.10.18 14:56:53 -     ===========================================================================
. 2018.10.18 14:56:53 -     Active Routes:
. 2018.10.18 14:56:53 -     Network Destination        Netmask          Gateway       Interface  Metric
. 2018.10.18 14:56:53 -     0.0.0.0          0.0.0.0    192.168.1.254     192.168.1.70     36
. 2018.10.18 14:56:53 -     0.0.0.0        128.0.0.0        10.28.0.1      10.28.0.114      3
. 2018.10.18 14:56:53 -     10.28.0.0    255.255.255.0         On-link       10.28.0.114    259
. 2018.10.18 14:56:53 -     10.28.0.114  255.255.255.255         On-link       10.28.0.114    259
. 2018.10.18 14:56:53 -     10.28.0.255  255.255.255.255         On-link       10.28.0.114    259
. 2018.10.18 14:56:53 -     127.0.0.0        255.0.0.0         On-link         127.0.0.1    331
. 2018.10.18 14:56:53 -     127.0.0.1  255.255.255.255         On-link         127.0.0.1    331
. 2018.10.18 14:56:53 -     127.255.255.255  255.255.255.255         On-link         127.0.0.1    331
. 2018.10.18 14:56:53 -     128.0.0.0        128.0.0.0        10.28.0.1      10.28.0.114      3
. 2018.10.18 14:56:53 -     184.75.221.34  255.255.255.255    192.168.1.254     192.168.1.70     35
. 2018.10.18 14:56:53 -     192.168.1.0    255.255.255.0         On-link      192.168.1.70    291
. 2018.10.18 14:56:53 -     192.168.1.70  255.255.255.255         On-link      192.168.1.70    291
. 2018.10.18 14:56:53 -     192.168.1.255  255.255.255.255         On-link      192.168.1.70    291
. 2018.10.18 14:56:53 -     224.0.0.0        240.0.0.0         On-link         127.0.0.1    331
. 2018.10.18 14:56:53 -     224.0.0.0        240.0.0.0         On-link       10.28.0.114    259
. 2018.10.18 14:56:53 -     224.0.0.0        240.0.0.0         On-link      192.168.1.70    291
. 2018.10.18 14:56:53 -     255.255.255.255  255.255.255.255         On-link         127.0.0.1    331
. 2018.10.18 14:56:53 -     255.255.255.255  255.255.255.255         On-link       10.28.0.114    259
. 2018.10.18 14:56:53 -     255.255.255.255  255.255.255.255         On-link      192.168.1.70    291
. 2018.10.18 14:56:53 -     ===========================================================================
. 2018.10.18 14:56:53 -     Persistent Routes:
. 2018.10.18 14:56:53 -     None'
. 2018.10.18 14:56:53 - Shell(50) of 'cmd.exe', 2 args: '/c';'route -6 PRINT';
. 2018.10.18 14:56:53 - Shell(50) done in 109 ms, exit: 0, out: '===========================================================================
. 2018.10.18 14:56:53 -     Interface List
. 2018.10.18 14:56:53 -     10...00 ff 89 3d 30 60 ......TAP-Windows Adapter V9
. 2018.10.18 14:56:53 -     17...fc 45 96 28 3a c9 ......Realtek PCIe GbE Family Controller
. 2018.10.18 14:56:53 -     8...58 fb 84 fb e1 d2 ......Microsoft Wi-Fi Direct Virtual Adapter #4
. 2018.10.18 14:56:53 -     15...5a fb 84 fb e1 d1 ......Microsoft Wi-Fi Direct Virtual Adapter #5
. 2018.10.18 14:56:53 -     16...58 fb 84 fb e1 d1 ......Intel® Dual Band Wireless-AC 3165
. 2018.10.18 14:56:53 -     23...58 fb 84 fb e1 d5 ......Bluetooth Device (Personal Area Network)
. 2018.10.18 14:56:53 -     1...........................Software Loopback Interface 1
. 2018.10.18 14:56:53 -     ===========================================================================
. 2018.10.18 14:56:53 -     IPv6 Route Table
. 2018.10.18 14:56:53 -     ===========================================================================
. 2018.10.18 14:56:53 -     Active Routes:
. 2018.10.18 14:56:53 -     If Metric Network Destination      Gateway
. 2018.10.18 14:56:53 -     10    265 ::/3                     fe80::8
. 2018.10.18 14:56:53 -     1    331 ::1/128                  On-link
. 2018.10.18 14:56:53 -     10    259 fe80::/64                On-link
. 2018.10.18 14:56:53 -     16    291 fe80::/64                On-link
. 2018.10.18 14:56:53 -     16    291 fe80::3d7b:26aa:db6a:441e/128
. 2018.10.18 14:56:53 -     On-link
. 2018.10.18 14:56:53 -     10    259 fe80::eda8:50fe:32d4:98e7/128
. 2018.10.18 14:56:53 -     On-link
. 2018.10.18 14:56:53 -     1    331 ff00::/8                 On-link
. 2018.10.18 14:56:53 -     10    259 ff00::/8                 On-link
. 2018.10.18 14:56:53 -     16    291 ff00::/8                 On-link
. 2018.10.18 14:56:53 -     ===========================================================================
. 2018.10.18 14:56:53 -     Persistent Routes:
. 2018.10.18 14:56:53 -     If Metric Network Destination      Gateway
. 2018.10.18 14:56:53 -     0    262 ::/3                     fe80::8
. 2018.10.18 14:56:53 -     ==========================================================================='
. 2018.10.18 14:56:54 - Shell(51) of 'cmd.exe', 2 args: '/c';'netsh interface ipv4 set dns name="Ethernet 3" source=static address=10.28.0.1 register=primary validate=no';
. 2018.10.18 14:56:54 - Shell(51) done in 234 ms, exit: 0
. 2018.10.18 14:56:54 - DNS IPv4 of a network adapter forced (Ethernet 3, from manual (10.4.0.1) to 10.28.0.1)
. 2018.10.18 14:56:54 - Shell(52) of 'cmd.exe', 2 args: '/c';'route add 184.75.221.35 mask 255.255.255.255 10.28.0.1 if 10';
. 2018.10.18 14:56:54 - Shell(52) done in 125 ms, exit: 0, out: 'OK!'
. 2018.10.18 14:56:54 - Routes, added a new route, 184.75.221.35 for gateway 10.28.0.1
. 2018.10.18 14:56:54 - Unable to compute route for 2606:6080:1001:e:2e9c:bad5:dbdd:84ea: IPv6 VPN gateway not available.
. 2018.10.18 14:56:54 - Flushing DNS
. 2018.10.18 14:56:54 - Shell(53) of 'cmd.exe', 2 args: '/c';'ipconfig /flushdns';
. 2018.10.18 14:56:54 - Shell(53) done in 157 ms, exit: 0, out: 'Windows IP Configuration
. 2018.10.18 14:56:54 -     Successfully flushed the DNS Resolver Cache.'
. 2018.10.18 14:56:54 - Shell(54) of 'cmd.exe', 2 args: '/c';'ipconfig /registerdns';
. 2018.10.18 14:56:57 - Shell(54) done in 3125 ms, exit: 0, out: 'Windows IP Configuration
. 2018.10.18 14:56:57 -     Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer in 15 minutes.'
I 2018.10.18 14:56:57 - Checking route IPv4
. 2018.10.18 14:56:58 - curl: (60) SSL certificate problem: self signed certificate in certificate chain
. 2018.10.18 14:56:58 -     More details here: https://curl.haxx.se/docs/sslcerts.html
. 2018.10.18 14:56:58 -     curl performs SSL certificate verification by default, using a "bundle"
. 2018.10.18 14:56:58 -     of Certificate Authority (CA) public keys (CA certs). If the default
. 2018.10.18 14:56:58 -     bundle file isn't adequate, you can specify an alternate file
. 2018.10.18 14:56:58 -     using the --cacert option.
. 2018.10.18 14:56:58 -     If this HTTPS server uses a certificate signed by a CA represented in
. 2018.10.18 14:56:58 -     the bundle, the certificate verification probably failed due to a
. 2018.10.18 14:56:58 -     problem with the certificate (it might be expired, or the name might
. 2018.10.18 14:56:58 -     not match the domain name in the URL).
. 2018.10.18 14:56:58 -     If you'd like to turn off curl's verification of the certificate, use
. 2018.10.18 14:56:58 -     the -k (or --insecure) option.
. 2018.10.18 14:56:58 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure. - Stack:    at Eddie.Core.Tools.Curl.Fetch(HttpRequest request)
. 2018.10.18 14:56:58 -     at Eddie.Core.Engine.FetchUrlXml(HttpRequest request)
. 2018.10.18 14:56:58 -     at Eddie.Core.Threads.Session.ConnectedStep()
. 2018.10.18 14:56:58 - Checking route (2° try)
. 2018.10.18 14:56:59 - curl: (60) SSL certificate problem: self signed certificate in certificate chain
. 2018.10.18 14:56:59 -     More details here: https://curl.haxx.se/docs/sslcerts.html
. 2018.10.18 14:56:59 -     curl performs SSL certificate verification by default, using a "bundle"
. 2018.10.18 14:56:59 -     of Certificate Authority (CA) public keys (CA certs). If the default
. 2018.10.18 14:56:59 -     bundle file isn't adequate, you can specify an alternate file
. 2018.10.18 14:56:59 -     using the --cacert option.
. 2018.10.18 14:56:59 -     If this HTTPS server uses a certificate signed by a CA represented in
. 2018.10.18 14:56:59 -     the bundle, the certificate verification probably failed due to a
. 2018.10.18 14:56:59 -     problem with the certificate (it might be expired, or the name might
. 2018.10.18 14:56:59 -     not match the domain name in the URL).
. 2018.10.18 14:56:59 -     If you'd like to turn off curl's verification of the certificate, use
. 2018.10.18 14:56:59 -     the -k (or --insecure) option.
. 2018.10.18 14:56:59 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure. - Stack:    at Eddie.Core.Tools.Curl.Fetch(HttpRequest request)
. 2018.10.18 14:56:59 -     at Eddie.Core.Engine.FetchUrlXml(HttpRequest request)
. 2018.10.18 14:56:59 -     at Eddie.Core.Threads.Session.ConnectedStep()
. 2018.10.18 14:56:59 - Checking route (3° try)
. 2018.10.18 14:57:01 - curl: (60) SSL certificate problem: self signed certificate in certificate chain
. 2018.10.18 14:57:01 -     More details here: https://curl.haxx.se/docs/sslcerts.html
. 2018.10.18 14:57:01 -     curl performs SSL certificate verification by default, using a "bundle"
. 2018.10.18 14:57:01 -     of Certificate Authority (CA) public keys (CA certs). If the default
. 2018.10.18 14:57:01 -     bundle file isn't adequate, you can specify an alternate file
. 2018.10.18 14:57:01 -     using the --cacert option.
. 2018.10.18 14:57:01 -     If this HTTPS server uses a certificate signed by a CA represented in
. 2018.10.18 14:57:01 -     the bundle, the certificate verification probably failed due to a
. 2018.10.18 14:57:01 -     problem with the certificate (it might be expired, or the name might
. 2018.10.18 14:57:01 -     not match the domain name in the URL).
. 2018.10.18 14:57:01 -     If you'd like to turn off curl's verification of the certificate, use
. 2018.10.18 14:57:01 -     the -k (or --insecure) option.
. 2018.10.18 14:57:01 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure. - Stack:    at Eddie.Core.Tools.Curl.Fetch(HttpRequest request)
. 2018.10.18 14:57:01 -     at Eddie.Core.Engine.FetchUrlXml(HttpRequest request)
. 2018.10.18 14:57:01 -     at Eddie.Core.Threads.Session.ConnectedStep()
E 2018.10.18 14:57:01 - Checking route IPv4 failed.
. 2018.10.18 14:57:01 - OpenVPN > Initialization Sequence Completed
! 2018.10.18 14:57:01 - Disconnecting
. 2018.10.18 14:57:01 - Shell(55) of 'cmd.exe', 2 args: '/c';'route delete 184.75.221.35 mask 255.255.255.255 10.28.0.1 if 10';
. 2018.10.18 14:57:02 - Shell(55) done in 234 ms, exit: 0, out: 'OK!'
. 2018.10.18 14:57:02 - Routes, removed a route previously added, 184.75.221.35 for gateway 10.28.0.1
. 2018.10.18 14:57:02 - Sending management termination signal
. 2018.10.18 14:57:02 - Management - Send 'signal SIGTERM'
. 2018.10.18 14:57:02 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.10.18 14:57:02 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.10.18 14:57:07 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.221.34 MASK 255.255.255.255 192.168.1.254
. 2018.10.18 14:57:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.10.18 14:57:07 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.28.0.1
. 2018.10.18 14:57:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.10.18 14:57:07 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.28.0.1
. 2018.10.18 14:57:07 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.10.18 14:57:07 - OpenVPN > Closing TUN/TAP interface
. 2018.10.18 14:57:07 - OpenVPN > TAP: DHCP address released
. 2018.10.18 14:57:07 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.10.18 14:57:07 - Connection terminated.
. 2018.10.18 14:57:08 - IPv6 restored with packet filtering.
. 2018.10.18 14:57:08 - Shell(56) of 'cmd.exe', 2 args: '/c';'netsh interface ipv4 set dns name="Ethernet 3" source=static address=10.4.0.1 register=primary validate=no';
. 2018.10.18 14:57:09 - Shell(56) done in 1031 ms, exit: 0
. 2018.10.18 14:57:09 - DNS IPv4 of a network adapter restored to original settings (Ethernet 3, to 10.4.0.1)
. 2018.10.18 14:57:09 - DNS leak protection with packet filtering disabled.
. 2018.10.18 14:57:09 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv4
. 2018.10.18 14:57:09 - Interface Ethernet 3 metric restored from 3 to Automatic, layer IPv6
I 2018.10.18 14:57:12 - Checking authorization ...
. 2018.10.18 14:57:12 - IPv6 disabled with packet filtering.
! 2018.10.18 14:57:12 - Connecting to Saiph (Canada, Toronto, Ontario)
. 2018.10.18 14:57:13 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.10.18 14:57:13 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.10.18 14:57:13 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.10.18 14:57:13 - Connection to OpenVPN Management Interface
. 2018.10.18 14:57:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.10.18 14:57:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.10.18 14:57:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.10.18 14:57:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.226:443
. 2018.10.18 14:57:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.10.18 14:57:13 - OpenVPN > UDP link local: (not bound)
. 2018.10.18 14:57:13 - OpenVPN > UDP link remote: [AF_INET]184.75.223.226:443
. 2018.10.18 14:57:13 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.10.18 14:57:13 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.226:443, sid=d0754d9c 5f340fd9
. 2018.10.18 14:57:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.10.18 14:57:13 - OpenVPN > VERIFY KU OK
. 2018.10.18 14:57:13 - OpenVPN > Validating certificate extended key usage
. 2018.10.18 14:57:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.10.18 14:57:13 - OpenVPN > VERIFY EKU OK
. 2018.10.18 14:57:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2018.10.18 14:57:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.10.18 14:57:13 - OpenVPN > [Saiph] Peer Connection Initiated with [AF_INET]184.75.223.226:443
. 2018.10.18 14:57:14 - OpenVPN > SENT CONTROL [Saiph]: 'PUSH_REQUEST' (status=1)
. 2018.10.18 14:57:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.224.1,dhcp-option DNS6 fde6:7a:7d20:18e0::1,tun-ipv6,route-gateway 10.28.224.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:18e0::10a2/64 fde6:7a:7d20:18e0::1,ifconfig 10.28.224.164 255.255.255.0,peer-id 2,cipher AES-256-GCM'
. 2018.10.18 14:57:14 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2018.10.18 14:57:14 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:18e0::1'
. 2018.10.18 14:57:14 - OpenVPN > Pushed option removed by filter: 'tun-ipv6'
. 2018.10.18 14:57:14 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:18e0::10a2/64 fde6:7a:7d20:18e0::1'
. 2018.10.18 14:57:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.10.18 14:57:14 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.10.18 14:57:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.10.18 14:57:14 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.10.18 14:57:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.10.18 14:57:14 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.10.18 14:57:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.10.18 14:57:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.10.18 14:57:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.10.18 14:57:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.10.18 14:57:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.10.18 14:57:14 - OpenVPN > interactive service msg_channel=0
. 2018.10.18 14:57:14 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=16 HWADDR=58:fb:84:fb:e1:d1
. 2018.10.18 14:57:15 - OpenVPN > open_tun
 






Similar Topics Collapse

1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users

Servers online. Online Sessions: 12930 - BW: 43566 Mbit/sYour IP: 54.145.83.79Guest Access.