<?xml version="1.0"?>
<rss version="2.0"><channel><title>AirVPN Forums</title><link>https://airvpn.org/feed/forums/</link><description>Forums</description><language>en</language><item><title><![CDATA[WireGuard > Handshake timeout]]></title><link><![CDATA[https://airvpn.org/forums/topic/80190-wireguard-handshake-timeout/?do=findComment&comment=262729]]></link><description><![CDATA[Hello, 
For a while now, I’ve been getting “WireGuard &gt; Handshake timeout” errors, with the connection dropping and reconnecting several times a day. 
This has never happened to me before (I’ve been using AirVPN for several years). 
Any ideas? 
Thanks]]></description><pubDate>Fri, 08 May 2026 09:06:59 +0000</pubDate></item><item><title>VPN on Android doesn't work</title><link><![CDATA[https://airvpn.org/forums/topic/80187-vpn-on-android-doesnt-work/?do=findComment&comment=262725]]></link><description>Hi 
Wireguard client isn't working on Android; I had to disconnect the VPN to browse the web. I changed the tunnel, but it still didn't work. I installed Eddie, but that doesn't work either. I have to have VPN off. Any ideas?</description><pubDate>Fri, 08 May 2026 06:04:22 +0000</pubDate></item><item><title>DNS list taking long to download in USA servers via gluetun</title><link><![CDATA[https://airvpn.org/forums/topic/80172-dns-list-taking-long-to-download-in-usa-servers-via-gluetun/?do=findComment&comment=262705]]></link><description>INFO [dns] downloading hostnames and IP block lists
The step above is taking too long on USA servers, and it is dismantling my docker compose depedency and the container won't start. Using it with changedetection to monitor prices in other countries. My similar Japan's docker compose is working fine.</description><pubDate>Thu, 07 May 2026 02:42:56 +0000</pubDate></item><item><title>couple of questions for someone familiar with torrents</title><link><![CDATA[https://airvpn.org/forums/topic/80170-couple-of-questions-for-someone-familiar-with-torrents/?do=findComment&comment=262703]]></link><description>1) so i don't do a lot of torrenting but sometimes i'll download music torrents which not many people do these days so i'll seed for a bit longer than usual.  but sometimes i'll notice after it's been up for a while i'll see a peer trying to connect to me using the same port number that i use, which is weird because i use an oddball number that was assigned by air.  thing is it's always from china and i could see if maybe a coincidence that someone could be using the same port as me if it only happened once, but i've seen it happen quite a few times and it's always from china.   
	 
	i guess my question is, is it someone trying to hack me or something? i figure that would probably be next to impossible being i'm already using vpn and firewall and what not. but if you were using your actual ip adress and they knew which port you had open is that something they could use to get in to your system?  really i know it's probably no big deal, just bugs me when i see it.  
	 
	2) i also see people sometimes that will be using both ipv4 and ipv6 address and showing up as two peers i guess to speed up their downloads, but to me that's cheating so i'll usually just ban one of the addresses and they can get one connection like everyone else.  my upload slots are limited so like i said seems like they're cheating.  kind of wonder how they get that to work, but really i'm fine with waiting 30 min or whatever it takes to get my free product without being a pushy a-hole.  reminds me of people that go through the 10 item express lane at the grocery store with 25 items.</description><pubDate>Wed, 06 May 2026 22:31:35 +0000</pubDate></item><item><title>DNS broken when Wireguard VPN active</title><link><![CDATA[https://airvpn.org/forums/topic/80167-dns-broken-when-wireguard-vpn-active/?do=findComment&comment=262699]]></link><description>EDIT: Seems to currently be working again... but I still don't know if it was a problem on my end or AirVPN's. 
	 
	At first I thought this was maybe the service being down but it appears to be a deeper issue. 
	 
	I've used AirVPN for a number of months, but suddenly as of yesterday I can't access most of the internet with it on due to DNS resolution failing. For some reason, I can usually still access this website, even though running "resolvectl query airvpn.org" returns nothing. Other websites time out or fail immediately. If I run "resolvectl monitor", I can see timeouts, maximum attempts reached, and refused connections. 
	 
	I use systemd-resolved on Linux as a DNS resolver and haven't changed anything about my config recently; it hasn't updated recently either. For my config I use the client generator and copy the config file to /etc/wireguard/, because I could not get the AirVPN suite to work when I tried it ages ago. Here is my config: 
	 
 


[Interface]
Address = 10.129.110.36/32,fd7d:76ee:e68f:a993:1d7b:7f05:c3fe:9ea5/128
PrivateKey = [REDACTED]
MTU = 1320
DNS = 10.128.0.1, fd7d:76ee:e68f:a993::1

[Peer]
PublicKey = [REDACTED]
PresharedKey = [REDACTED]
Endpoint = america3.vpn.airdns.org:1637
AllowedIPs = 0.0.0.0/0,::/0
PersistentKeepalive = 15</description><pubDate>Wed, 06 May 2026 17:25:31 +0000</pubDate></item><item><title>VNC and Eddie</title><link><![CDATA[https://airvpn.org/forums/topic/80165-vnc-and-eddie/?do=findComment&comment=262697]]></link><description>So for years I have used Eddie to download with AirVPN, and it's been great. 
I also use VNC to access my server, normally I just open the ports on my router for VNC so it can connect without being tunnelled through AirVPN. 
My downloading needs to go through AirVPN, so I only ever opened ports for my bit torrent via the ports page specifically for AirVPN. 
 
This has worked for ages, but now I cant connect to VNC whilst Eddie is connected to a VPN server, it seems that everything is being tunnelled through Eddie 
I think this is called socks 5 ?, but I would like VNC to *not* go through the VPN. How do I do this again ? 
 
Thanks  
Ump.</description><pubDate>Wed, 06 May 2026 13:44:42 +0000</pubDate></item><item><title>Gluetun can no longer connect</title><link><![CDATA[https://airvpn.org/forums/topic/80151-gluetun-can-no-longer-connect/?do=findComment&comment=262678]]></link><description>Hello, I had a functioniong Gluetun setup, but it seems I can no longer functionally connect to the Server Achenar. I assume something is wrong with that server, somehow. I did not change anything on my side of the set up. 
Can any one of you confirm or deny? 
Thank you.</description><pubDate>Tue, 05 May 2026 16:21:35 +0000</pubDate></item><item><title>Issues with throttling(?)</title><link><![CDATA[https://airvpn.org/forums/topic/80141-issues-with-throttling/?do=findComment&comment=262653]]></link><description>Hello, Ive been using AirVPN for about a year now, but recently all servers have had extremely high latency and very low speeds, before I was capable of atleast 50mb or so now Im lucky to get into triple digits of kbits, Ive tried reinstalling and updating nothing worked.</description><pubDate>Mon, 04 May 2026 22:44:50 +0000</pubDate></item><item><title>Rotating outages today?</title><link><![CDATA[https://airvpn.org/forums/topic/80140-rotating-outages-today/?do=findComment&comment=262651]]></link><description>Is this a planned maintenance or something? I've got multiple paid accounts and am using 15 sessions on a variety of different VPNs. Over half of them have abruptly gone out at some point today.</description><pubDate>Mon, 04 May 2026 19:59:00 +0000</pubDate></item><item><title>Ratio (percentage) of IPv4 vs IPv6 peers in your torrents ?</title><link><![CDATA[https://airvpn.org/forums/topic/80136-ratio-percentage-of-ipv4-vs-ipv6-peers-in-your-torrents/?do=findComment&comment=262646]]></link><description>I have recently been able to add IPv6 to my LAN (but ULA only to avoid IPv6 leaks) and add a port forward in my OpenWrt router that acts as a Wireguard client for a Windows qBittorrent client in my Ethernet LAN. Everything seems to work fine and I've been able to reach the "Top User Speed" a few times while seeding to around 800 peers. 
	But the one thing that annoys me is that IPv6 traffic appears way too low compared to IPv4, usually between 5 to 10 % (90 % or more for IPv4). 
	 
	I have tried some online speed tests that can do both IPv4 and IPv6 and I saw no huge difference between the two. Then I tried to select IPv6 only in qBittorrent and restarted it. After a few minutes, I got only 80 peers (instead of 800; look at the graph). The AirVPN, forwarded ports, test open, confirms that both IPv4 and IPv6 port I selected for torrents are "Open!". 
	 
	I can't believe that only 5% of torrent users have IPv6 so there must be a problem in my installation. 
	For those who use a computer as a seed-box with both IPv4 and IPv6, how many peers do you see connected in IPv6 (compared to IPv4) ?</description><pubDate>Mon, 04 May 2026 08:41:23 +0000</pubDate></item><item><title>Getting profile updated with CLI only</title><link><![CDATA[https://airvpn.org/forums/topic/80113-getting-profile-updated-with-cli-only/?do=findComment&comment=262610]]></link><description>Hi there, 
I'm trying to get Eddie to run on a headless server. Instead of running -user=xx -pass=yy in the terminal, I'd like to get the profile to remember user/pass. 
 
However, this seems impossible: 
https://airvpn.org/forums/topic/79263-eddie-cli-remember-not-remembering/?tab=comments#comment-261130 
 
Did anyone find a workaround for this situation? Since the default.profile file is encrypted, copying it from another machine wont work.</description><pubDate>Fri, 01 May 2026 17:44:08 +0000</pubDate></item><item><title>Newbie Need Help - Rotating Servers</title><link><![CDATA[https://airvpn.org/forums/topic/80097-newbie-need-help-rotating-servers/?do=findComment&comment=262582]]></link><description>I tried many script found in this forum, but seems all not work for me 
 
1. I connected to a random server by using AirVPN UI 
2. Start the "ROTATING Script" 
3. I use what is my IP to check my public IP, every 24 hours, no change. 
 
Anything I did wrong ? How to make my AprVPN rotating server every 15 mins ? 
 
Please help !</description><pubDate>Thu, 30 Apr 2026 03:41:55 +0000</pubDate></item><item><title>[Unifi] Able to download but not upload torrents</title><link><![CDATA[https://airvpn.org/forums/topic/80095-unifi-able-to-download-but-not-upload-torrents/?do=findComment&comment=262578]]></link><description>I have a Unifi Dream Machine SE (UDM-SE), configured AirVPN with wireguard client inside of it. I am trying to force all traffic inbound/outbound of my qBittorent lxc through the wireguard client. 
	 
	I can download torrents just fine, but I am unable to seed and upload for anyone which is killing my tracker ratio.  
	 
	On the UDM-SE I have LAN-In firewall rule to allow anything from my AirVPN going to my qBittorrent, I have a DNAT from any traffic on the specific AirVPN port to be translated to the qBittorrent IP, I have a policy based route taking any traffic from my qbittorrent and sending through the wireguard client. I have qbittorrent listening on the forwarded port.  
	 
	I'm at a loss as to "Test Open" is failing for the forwarded port I have. 
	 
	I'd greatly appreciate a look over from anyone</description><pubDate>Wed, 29 Apr 2026 18:26:19 +0000</pubDate></item><item><title>upstream socks5?</title><link><![CDATA[https://airvpn.org/forums/topic/80090-upstream-socks5/?do=findComment&comment=262565]]></link><description>I'm in Iran. The only way I am able to connect to internet is through a socks5 proxy, though it's still censored. I wonder if AirVPN supports using a upstream socks5 proxy? 
The only other option is TOR, but I can't use it for many things, like downloading torrents.</description><pubDate>Wed, 29 Apr 2026 07:43:13 +0000</pubDate></item><item><title>Torrent Address detection IP overflows in UI</title><link><![CDATA[https://airvpn.org/forums/topic/80081-torrent-address-detection-ip-overflows-in-ui/?do=findComment&comment=262553]]></link><description>ignore the green block, that's my addition to the screenshot</description><pubDate>Wed, 29 Apr 2026 00:01:54 +0000</pubDate></item><item><title>Airvpn works in China?</title><link><![CDATA[https://airvpn.org/forums/topic/80075-airvpn-works-in-china/?do=findComment&comment=262544]]></link><description>In China, Airvpn can works well?  
Some one uses it in China?  
I want to use a VPN for long terms and don't expect it is blocked.</description><pubDate>Tue, 28 Apr 2026 14:41:46 +0000</pubDate></item><item><title>Why do AirVPN DNS servers hate the website usps.com so much?</title><link><![CDATA[https://airvpn.org/forums/topic/80068-why-do-airvpn-dns-servers-hate-the-website-uspscom-so-much/?do=findComment&comment=262533]]></link><description>Why do AirVPN DNS servers hate the website usps.com so much? At first, I couldn&#x2019;t figure out why I could load usps.com on my FreeBSD machine but not on my Android smartphone. Then I realized that, on FreeBSD, the DNS fallback mechanism configured in /etc/resolv.conf was causing a DNS leak: usps.com would load in Chromium because my ISP&#x2019;s DNS servers were being used. I had to make sure that resolv.conf was automatically configured to use AirVPN DNS first and, from now on, to fall back to Cloudflare DNS or Google DNS instead of my ISP&#x2019;s DNS. But I&#x2019;m curious: why can&#x2019;t AirVPN DNS resolve usps.com?</description><pubDate>Mon, 27 Apr 2026 17:14:00 +0000</pubDate></item><item><title>AirBL - AirVPN Companion</title><link><![CDATA[https://airvpn.org/forums/topic/80045-airbl-airvpn-companion/?do=findComment&comment=262489]]></link><description><![CDATA[Hi All, 
	 
	With the permission from the staff here, I'm releasing a project I've been working on these past few months, for myself, named AirBL. 
	 
	Fully hosted on GitHub for all to run via their preferred container deployment method, e.g. Docker, OrbStack, etc. 
	 
	The companion will help you with:
 


	
		
			Smart Gluetun Integration: Bypasses Gluetun's static logic by feeding it a dynamic servers.json, monitoring for DroneBL blocks and forcibly restart Gluetun if the server IP gets flagged (customizable behavior).
		 
	
	
		
			WireGuard Generation: Automatically generates perfected wg0.conf files (per the user choice, prioritizing speed, clean servers or both). It pulls data from internal speed tests and TCP verifiers to lock in clean IPs.
		 
	
	
		
			AUTO Entry Resolution: Use the "AUTO" setting to let AirBL analyze its local SQLite database and automatically map your configuration to the fastest historical route.
		 
	
	
		
			Multi-Day Discovery Engine: Cycles through different ports (1637, 47107, 51820) and Entry points, over several days to eliminate "fluke" speed tests and lock in proven performance, discovering the best possible route.
		 
	
	
		
			Dynamic Identity Ingestion: Just drop one AirVPN .conf file into the directory. AirBL extracts your keys and dynamically generates hundreds of optimized variants on the fly.
		 
	
	
		Abuse &amp; Performance Filtering: Automatically bans servers that drop below your Mbps floor, keeping your server list healthy.
	



	And more! 
	 
	Come check it out here https://github.com/xEsurient/AirBL | https://xesurient.github.io/AirBL/ 
	 
	Feedback and commits on the project are welcome, e.g. if there's things that you think could be done better such as abandoning the N*Speedtests logic via speedtest-cli for something more robust or indicative of the network's performance. 
	 
 


	Disclosures: 
 


	
		Wiki is AI fixed with references and proof checked after changes (to ensure the information is understandable and complete),
	
	
		README.md is completely AI generated based on the project itself, minus a few tweaks and fact checking changes,
	
	
		Index.html is a standard template (commonly used by whatever AI choice) that has been modified slightly (based on Jinja2).
	



	 
	 
	 
	Disclosures: 
 


	
		Wiki is AI fixed with references and proof checked after changes (to ensure the information is understandable and complete),
	
	
		README.md is completely AI generated based on the project itself, minus a few tweaks and fact checking changes,
	
	
		Index.html is a standard template (commonly used by whatever AI choice) that has been modified slightly (based on Jinja2).]]></description><pubDate>Sun, 26 Apr 2026 06:11:21 +0000</pubDate></item><item><title>Not able to connect</title><link><![CDATA[https://airvpn.org/forums/topic/80038-not-able-to-connect/?do=findComment&comment=262478]]></link><description><![CDATA[So I am unable to connect. 
	I don't know what is happening.     
	Here is the log. 
	Please help but understand that I am not versed on this and what it means. 
	 
	Regards. 
	 
	 
 


	
		. 2026.04.25 17:46:49 - Connection terminated. 
		I 2026.04.25 17:46:52 - Checking authorization ... 
		. 2026.04.25 17:46:53 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" 
		! 2026.04.25 17:46:53 - Connecting to Alhena (Canada, Toronto, Ontario) 
		. 2026.04.25 17:46:53 - Routes, skipped for 162.219.176.5 : IPv4 Net gateway not available. 
		. 2026.04.25 17:46:53 - Routes, skipped for 162.219.176.5 : IPv4 Net gateway not available. 
		. 2026.04.25 17:46:53 - OpenVPN &gt; OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 
		. 2026.04.25 17:46:53 - OpenVPN &gt; Windows version 10.0 (Windows 10 or greater) 64bit 
		. 2026.04.25 17:46:53 - OpenVPN &gt; library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10 
		. 2026.04.25 17:46:53 - OpenVPN &gt; Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 17:46:53 - OpenVPN &gt; Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 17:46:53 - OpenVPN &gt; Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 17:46:53 - OpenVPN &gt; Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 17:46:53 - OpenVPN &gt; TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.5:443 
		. 2026.04.25 17:46:53 - OpenVPN &gt; Socket Buffers: R=[65536-&gt;262144] S=[65536-&gt;262144] 
		. 2026.04.25 17:46:53 - OpenVPN &gt; UDP link local: (not bound) 
		. 2026.04.25 17:46:53 - OpenVPN &gt; UDP link remote: [AF_INET]162.219.176.5:443 
		. 2026.04.25 17:46:53 - OpenVPN &gt; TLS: Initial packet from [AF_INET]162.219.176.5:443, sid=f87b860c f4e11a67 
		. 2026.04.25 17:47:26 - OpenVPN &gt; [UNDEF] Inactivity timeout (--ping-exit), exiting 
		. 2026.04.25 17:47:26 - OpenVPN &gt; SIGTERM received, sending exit notification to peer 
		. 2026.04.25 17:47:31 - OpenVPN &gt; SIGTERM[soft,exit-with-notification] received, process exiting 
		! 2026.04.25 17:47:31 - Disconnecting 
		. 2026.04.25 17:47:31 - Routes, skipped for 162.219.176.5 : IPv4 Net gateway not available. 
		. 2026.04.25 17:47:31 - Routes, skipped for 162.219.176.5 : IPv4 Net gateway not available. 
		. 2026.04.25 17:47:31 - Connection terminated. 
		I 2026.04.25 17:47:34 - Checking authorization ... 
		. 2026.04.25 17:47:35 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" 
		! 2026.04.25 17:47:35 - Connecting to Regulus (Canada, Toronto, Ontario) 
		. 2026.04.25 17:47:35 - Routes, skipped for 184.75.221.37 : IPv4 Net gateway not available. 
		. 2026.04.25 17:47:35 - Routes, skipped for 184.75.221.37 : IPv4 Net gateway not available. 
		. 2026.04.25 17:47:35 - OpenVPN &gt; OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 
		. 2026.04.25 17:47:35 - OpenVPN &gt; Windows version 10.0 (Windows 10 or greater) 64bit 
		. 2026.04.25 17:47:35 - OpenVPN &gt; library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10 
		. 2026.04.25 17:47:35 - OpenVPN &gt; Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 17:47:35 - OpenVPN &gt; Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 17:47:35 - OpenVPN &gt; Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 17:47:35 - OpenVPN &gt; Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 17:47:35 - OpenVPN &gt; TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.37:443 
		. 2026.04.25 17:47:35 - OpenVPN &gt; Socket Buffers: R=[65536-&gt;262144] S=[65536-&gt;262144] 
		. 2026.04.25 17:47:35 - OpenVPN &gt; UDP link local: (not bound) 
		. 2026.04.25 17:47:35 - OpenVPN &gt; UDP link remote: [AF_INET]184.75.221.37:443 
		. 2026.04.25 17:47:35 - OpenVPN &gt; TLS: Initial packet from [AF_INET]184.75.221.37:443, sid=de4fdcd5 40e2b5fe 
		. 2026.04.25 17:47:35 - OpenVPN &gt; VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org 
		. 2026.04.25 17:47:35 - OpenVPN &gt; VERIFY KU OK 
		. 2026.04.25 17:47:35 - OpenVPN &gt; Validating certificate extended key usage 
		. 2026.04.25 17:47:35 - OpenVPN &gt; ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 
		. 2026.04.25 17:47:35 - OpenVPN &gt; VERIFY EKU OK 
		. 2026.04.25 17:47:35 - OpenVPN &gt; VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org 
		. 2026.04.25 17:47:35 - OpenVPN &gt; Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 
		. 2026.04.25 17:47:35 - OpenVPN &gt; [Regulus] Peer Connection Initiated with [AF_INET]184.75.221.37:443 
		. 2026.04.25 17:47:35 - OpenVPN &gt; PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.26.1,dhcp-option DNS6 fde6:7a:7d20:181a::1,tun-ipv6,route-gateway 10.28.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:181a::106d/64 fde6:7a:7d20:181a::1,ifconfig 10.28.26.111 255.255.255.0,peer-id 1,cipher AES-256-GCM' 
		. 2026.04.25 17:47:35 - OpenVPN &gt; Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' 
		. 2026.04.25 17:47:35 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS 10.28.26.1' 
		. 2026.04.25 17:47:35 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:181a::1' 
		. 2026.04.25 17:47:35 - OpenVPN &gt; OPTIONS IMPORT: timers and/or timeouts modified 
		. 2026.04.25 17:47:35 - OpenVPN &gt; OPTIONS IMPORT: compression parms modified 
		. 2026.04.25 17:47:35 - OpenVPN &gt; OPTIONS IMPORT: --ifconfig/up options modified 
		. 2026.04.25 17:47:35 - OpenVPN &gt; OPTIONS IMPORT: route-related options modified 
		. 2026.04.25 17:47:35 - OpenVPN &gt; OPTIONS IMPORT: peer-id set 
		. 2026.04.25 17:47:35 - OpenVPN &gt; OPTIONS IMPORT: adjusting link_mtu to 1625 
		. 2026.04.25 17:47:35 - OpenVPN &gt; OPTIONS IMPORT: data channel crypto options modified 
		. 2026.04.25 17:47:35 - OpenVPN &gt; Data Channel: using negotiated cipher 'AES-256-GCM' 
		. 2026.04.25 17:47:35 - OpenVPN &gt; Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 17:47:35 - OpenVPN &gt; Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 17:47:35 - OpenVPN &gt; interactive service msg_channel=0 
		. 2026.04.25 17:47:35 - OpenVPN &gt; open_tun 
		. 2026.04.25 17:47:35 - OpenVPN &gt; wintun device [Eddie] opened 
		. 2026.04.25 17:47:36 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.28.26.111 255.255.255.0 
		. 2026.04.25 17:47:36 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all 
		. 2026.04.25 17:47:36 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all 
		. 2026.04.25 17:47:36 - OpenVPN &gt; IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 17:47:36 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:181a::106d/128 store=active 
		. 2026.04.25 17:47:36 - OpenVPN &gt; add_route_ipv6(fde6:7a:7d20:181a::/64 -&gt; fde6:7a:7d20:181a::106d metric 0) dev Eddie 
		. 2026.04.25 17:47:36 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:181a::/64 51 fe80::8 store=active 
		. 2026.04.25 17:47:36 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2026.04.25 17:47:36 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all 
		. 2026.04.25 17:47:36 - OpenVPN &gt; IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 17:47:36 - OpenVPN &gt; Initialization Sequence Completed 
		. 2026.04.25 17:47:36 - Interface Eddie metric changed from Automatic to 3, layer IPv4 
		. 2026.04.25 17:47:36 - Interface Eddie metric changed from Automatic to 3, layer IPv6 
		. 2026.04.25 17:47:36 - DNS leak protection with packet filtering enabled. 
		. 2026.04.25 17:47:37 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.28.26.1) 
		. 2026.04.25 17:47:37 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:181a::1) 
		. 2026.04.25 17:47:37 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:47:38 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:47:38 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:47:38 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:47:39 - Routes, add 184.75.221.35/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:47:39 - Routes, add 2606:6080:1001:e:2e9c:bad5:dbdd:84ea/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:47:39 - Flushing DNS 
		I 2026.04.25 17:47:39 - Checking route IPv4 
		. 2026.04.25 17:48:49 - Checking route (4° try) 
		. 2026.04.25 17:49:14 - Checking route (5° try) 
		E 2026.04.25 17:49:35 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached 
		. 2026.04.25 17:49:35 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 17:49:35 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 17:49:35 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 17:49:35 - Above log line repeated 17 times more 
		! 2026.04.25 17:49:35 - Disconnecting 
		. 2026.04.25 17:49:35 - Sending soft termination signal 
		. 2026.04.25 17:49:38 - OpenVPN &gt; SIGTERM received, sending exit notification to peer 
		. 2026.04.25 17:49:39 - OpenVPN &gt; Closing TUN/TAP interface 
		. 2026.04.25 17:49:39 - OpenVPN &gt; delete_route_ipv6(fde6:7a:7d20:181a::/64) 
		. 2026.04.25 17:49:39 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:181a::/64 51 fe80::8 store=active 
		. 2026.04.25 17:49:39 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:181a::106d store=active 
		. 2026.04.25 17:49:39 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.28.26.111 store=active 
		. 2026.04.25 17:49:39 - OpenVPN &gt; SIGTERM[soft,exit-with-notification] received, process exiting 
		. 2026.04.25 17:49:40 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:49:40 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:49:41 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:49:41 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:49:41 - Routes, skipped for 184.75.221.37 : IPv4 Net gateway not available. 
		. 2026.04.25 17:49:41 - Routes, delete 184.75.221.35/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:49:42 - Routes, delete 2606:6080:1001:e:2e9c:bad5:dbdd:84ea/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:49:42 - Routes, skipped for 184.75.221.37 : IPv4 Net gateway not available. 
		. 2026.04.25 17:49:42 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 17:49:42 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 17:49:42 - DNS leak protection with packet filtering disabled. 
		. 2026.04.25 17:49:42 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 
		. 2026.04.25 17:49:42 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 
		. 2026.04.25 17:49:42 - Connection terminated. 
		I 2026.04.25 17:49:45 - Checking authorization ... 
		. 2026.04.25 17:49:46 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" 
		! 2026.04.25 17:49:46 - Connecting to Alkurhah (Canada, Toronto, Ontario) 
		. 2026.04.25 17:49:46 - Routes, skipped for 184.75.221.205 : IPv4 Net gateway not available. 
		. 2026.04.25 17:49:46 - Routes, skipped for 184.75.221.205 : IPv4 Net gateway not available. 
		. 2026.04.25 17:49:46 - OpenVPN &gt; OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 
		. 2026.04.25 17:49:46 - OpenVPN &gt; Windows version 10.0 (Windows 10 or greater) 64bit 
		. 2026.04.25 17:49:46 - OpenVPN &gt; library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10 
		. 2026.04.25 17:49:46 - OpenVPN &gt; Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 17:49:46 - OpenVPN &gt; Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 17:49:46 - OpenVPN &gt; Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 17:49:46 - OpenVPN &gt; Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 17:49:46 - OpenVPN &gt; TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.205:443 
		. 2026.04.25 17:49:46 - OpenVPN &gt; Socket Buffers: R=[65536-&gt;262144] S=[65536-&gt;262144] 
		. 2026.04.25 17:49:46 - OpenVPN &gt; UDP link local: (not bound) 
		. 2026.04.25 17:49:46 - OpenVPN &gt; UDP link remote: [AF_INET]184.75.221.205:443 
		. 2026.04.25 17:49:46 - OpenVPN &gt; TLS: Initial packet from [AF_INET]184.75.221.205:443, sid=966fa547 ffd42bce 
		. 2026.04.25 17:49:46 - OpenVPN &gt; VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org 
		. 2026.04.25 17:49:46 - OpenVPN &gt; VERIFY KU OK 
		. 2026.04.25 17:49:46 - OpenVPN &gt; Validating certificate extended key usage 
		. 2026.04.25 17:49:46 - OpenVPN &gt; ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 
		. 2026.04.25 17:49:46 - OpenVPN &gt; VERIFY EKU OK 
		. 2026.04.25 17:49:46 - OpenVPN &gt; VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org 
		. 2026.04.25 17:49:46 - OpenVPN &gt; Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 
		. 2026.04.25 17:49:46 - OpenVPN &gt; [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.205:443 
		. 2026.04.25 17:49:46 - OpenVPN &gt; PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.218.1,dhcp-option DNS6 fde6:7a:7d20:2da::1,tun-ipv6,route-gateway 10.6.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:2da::1099/64 fde6:7a:7d20:2da::1,ifconfig 10.6.218.155 255.255.255.0,peer-id 4,cipher AES-256-GCM' 
		. 2026.04.25 17:49:46 - OpenVPN &gt; Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' 
		. 2026.04.25 17:49:46 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS 10.6.218.1' 
		. 2026.04.25 17:49:46 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:2da::1' 
		. 2026.04.25 17:49:46 - OpenVPN &gt; OPTIONS IMPORT: timers and/or timeouts modified 
		. 2026.04.25 17:49:46 - OpenVPN &gt; OPTIONS IMPORT: compression parms modified 
		. 2026.04.25 17:49:46 - OpenVPN &gt; OPTIONS IMPORT: --ifconfig/up options modified 
		. 2026.04.25 17:49:46 - OpenVPN &gt; OPTIONS IMPORT: route-related options modified 
		. 2026.04.25 17:49:46 - OpenVPN &gt; OPTIONS IMPORT: peer-id set 
		. 2026.04.25 17:49:46 - OpenVPN &gt; OPTIONS IMPORT: adjusting link_mtu to 1625 
		. 2026.04.25 17:49:46 - OpenVPN &gt; OPTIONS IMPORT: data channel crypto options modified 
		. 2026.04.25 17:49:46 - OpenVPN &gt; Data Channel: using negotiated cipher 'AES-256-GCM' 
		. 2026.04.25 17:49:46 - OpenVPN &gt; Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 17:49:46 - OpenVPN &gt; Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 17:49:46 - OpenVPN &gt; interactive service msg_channel=0 
		. 2026.04.25 17:49:46 - OpenVPN &gt; open_tun 
		. 2026.04.25 17:49:46 - OpenVPN &gt; wintun device [Eddie] opened 
		. 2026.04.25 17:49:47 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.6.218.155 255.255.255.0 
		. 2026.04.25 17:49:47 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all 
		. 2026.04.25 17:49:47 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all 
		. 2026.04.25 17:49:47 - OpenVPN &gt; IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 17:49:47 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:2da::1099/128 store=active 
		. 2026.04.25 17:49:47 - OpenVPN &gt; add_route_ipv6(fde6:7a:7d20:2da::/64 -&gt; fde6:7a:7d20:2da::1099 metric 0) dev Eddie 
		. 2026.04.25 17:49:47 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:2da::/64 51 fe80::8 store=active 
		. 2026.04.25 17:49:47 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2026.04.25 17:49:47 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all 
		. 2026.04.25 17:49:47 - OpenVPN &gt; IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 17:49:47 - OpenVPN &gt; Initialization Sequence Completed 
		. 2026.04.25 17:49:47 - Interface Eddie metric changed from Automatic to 3, layer IPv4 
		. 2026.04.25 17:49:47 - Interface Eddie metric changed from Automatic to 3, layer IPv6 
		. 2026.04.25 17:49:47 - DNS leak protection with packet filtering enabled. 
		. 2026.04.25 17:49:48 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.6.218.1) 
		. 2026.04.25 17:49:48 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:2da::1) 
		. 2026.04.25 17:49:48 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:49:49 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:49:49 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:49:49 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:49:50 - Routes, add 184.75.221.203/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:49:50 - Routes, add 2606:6080:1001:16:3492:5f11:f1fb:66ae/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:49:50 - Flushing DNS 
		I 2026.04.25 17:49:50 - Checking route IPv4 
		. 2026.04.25 17:51:00 - Checking route (4° try) 
		. 2026.04.25 17:51:25 - Checking route (5° try) 
		E 2026.04.25 17:51:46 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached 
		. 2026.04.25 17:51:46 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 17:51:46 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 17:51:46 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 17:51:46 - Above log line repeated 10 times more 
		! 2026.04.25 17:51:46 - Disconnecting 
		. 2026.04.25 17:51:46 - Sending soft termination signal 
		. 2026.04.25 17:51:49 - OpenVPN &gt; SIGTERM received, sending exit notification to peer 
		. 2026.04.25 17:51:51 - OpenVPN &gt; Closing TUN/TAP interface 
		. 2026.04.25 17:51:51 - OpenVPN &gt; delete_route_ipv6(fde6:7a:7d20:2da::/64) 
		. 2026.04.25 17:51:51 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:2da::/64 51 fe80::8 store=active 
		. 2026.04.25 17:51:52 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:2da::1099 store=active 
		. 2026.04.25 17:51:52 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.6.218.155 store=active 
		. 2026.04.25 17:51:52 - OpenVPN &gt; SIGTERM[soft,exit-with-notification] received, process exiting 
		. 2026.04.25 17:51:52 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:51:53 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:51:53 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:51:53 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:51:53 - Routes, skipped for 184.75.221.205 : IPv4 Net gateway not available. 
		. 2026.04.25 17:51:54 - Routes, delete 184.75.221.203/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:51:54 - Routes, delete 2606:6080:1001:16:3492:5f11:f1fb:66ae/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:51:54 - Routes, skipped for 184.75.221.205 : IPv4 Net gateway not available. 
		. 2026.04.25 17:51:54 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 17:51:54 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 17:51:54 - DNS leak protection with packet filtering disabled. 
		. 2026.04.25 17:51:55 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 
		. 2026.04.25 17:51:55 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 
		. 2026.04.25 17:51:55 - Connection terminated. 
		. 2026.04.25 17:51:58 - Waiting for latency tests (254 to go) 
		. 2026.04.25 17:51:59 - Waiting for latency tests (14 to go) 
		. 2026.04.25 17:52:00 - Waiting for latency tests (5 to go) 
		I 2026.04.25 17:52:02 - Checking authorization ... 
		. 2026.04.25 17:52:02 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" 
		! 2026.04.25 17:52:02 - Connecting to Mintaka (Canada, Toronto, Ontario) 
		. 2026.04.25 17:52:02 - Routes, skipped for 184.75.223.221 : IPv4 Net gateway not available. 
		. 2026.04.25 17:52:02 - Routes, skipped for 184.75.223.221 : IPv4 Net gateway not available. 
		. 2026.04.25 17:52:03 - OpenVPN &gt; OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 
		. 2026.04.25 17:52:03 - OpenVPN &gt; Windows version 10.0 (Windows 10 or greater) 64bit 
		. 2026.04.25 17:52:03 - OpenVPN &gt; library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10 
		. 2026.04.25 17:52:03 - OpenVPN &gt; Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 17:52:03 - OpenVPN &gt; Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 17:52:03 - OpenVPN &gt; Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 17:52:03 - OpenVPN &gt; Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 17:52:03 - OpenVPN &gt; TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.221:443 
		. 2026.04.25 17:52:03 - OpenVPN &gt; Socket Buffers: R=[65536-&gt;262144] S=[65536-&gt;262144] 
		. 2026.04.25 17:52:03 - OpenVPN &gt; UDP link local: (not bound) 
		. 2026.04.25 17:52:03 - OpenVPN &gt; UDP link remote: [AF_INET]184.75.223.221:443 
		. 2026.04.25 17:52:03 - OpenVPN &gt; TLS: Initial packet from [AF_INET]184.75.223.221:443, sid=93757b47 272ec4cf 
		. 2026.04.25 17:52:03 - OpenVPN &gt; VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org 
		. 2026.04.25 17:52:03 - OpenVPN &gt; VERIFY KU OK 
		. 2026.04.25 17:52:03 - OpenVPN &gt; Validating certificate extended key usage 
		. 2026.04.25 17:52:03 - OpenVPN &gt; ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 
		. 2026.04.25 17:52:03 - OpenVPN &gt; VERIFY EKU OK 
		. 2026.04.25 17:52:03 - OpenVPN &gt; VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org 
		. 2026.04.25 17:52:03 - OpenVPN &gt; Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 
		. 2026.04.25 17:52:03 - OpenVPN &gt; [Mintaka] Peer Connection Initiated with [AF_INET]184.75.223.221:443 
		. 2026.04.25 17:52:03 - OpenVPN &gt; SENT CONTROL [Mintaka]: 'PUSH_REQUEST' (status=1) 
		. 2026.04.25 17:52:03 - OpenVPN &gt; PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.26.1,dhcp-option DNS6 fde6:7a:7d20:141a::1,tun-ipv6,route-gateway 10.24.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:141a::10cb/64 fde6:7a:7d20:141a::1,ifconfig 10.24.26.205 255.255.255.0,peer-id 3,cipher AES-256-GCM' 
		. 2026.04.25 17:52:03 - OpenVPN &gt; Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' 
		. 2026.04.25 17:52:03 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS 10.24.26.1' 
		. 2026.04.25 17:52:03 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:141a::1' 
		. 2026.04.25 17:52:03 - OpenVPN &gt; OPTIONS IMPORT: timers and/or timeouts modified 
		. 2026.04.25 17:52:03 - OpenVPN &gt; OPTIONS IMPORT: compression parms modified 
		. 2026.04.25 17:52:03 - OpenVPN &gt; OPTIONS IMPORT: --ifconfig/up options modified 
		. 2026.04.25 17:52:03 - OpenVPN &gt; OPTIONS IMPORT: route-related options modified 
		. 2026.04.25 17:52:03 - OpenVPN &gt; OPTIONS IMPORT: peer-id set 
		. 2026.04.25 17:52:03 - OpenVPN &gt; OPTIONS IMPORT: adjusting link_mtu to 1625 
		. 2026.04.25 17:52:03 - OpenVPN &gt; OPTIONS IMPORT: data channel crypto options modified 
		. 2026.04.25 17:52:03 - OpenVPN &gt; Data Channel: using negotiated cipher 'AES-256-GCM' 
		. 2026.04.25 17:52:03 - OpenVPN &gt; Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 17:52:03 - OpenVPN &gt; Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 17:52:03 - OpenVPN &gt; interactive service msg_channel=0 
		. 2026.04.25 17:52:03 - OpenVPN &gt; open_tun 
		. 2026.04.25 17:52:03 - OpenVPN &gt; wintun device [Eddie] opened 
		. 2026.04.25 17:52:04 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.24.26.205 255.255.255.0 
		. 2026.04.25 17:52:04 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all 
		. 2026.04.25 17:52:04 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all 
		. 2026.04.25 17:52:04 - OpenVPN &gt; IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 17:52:04 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:141a::10cb/128 store=active 
		. 2026.04.25 17:52:04 - OpenVPN &gt; add_route_ipv6(fde6:7a:7d20:141a::/64 -&gt; fde6:7a:7d20:141a::10cb metric 0) dev Eddie 
		. 2026.04.25 17:52:04 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:141a::/64 51 fe80::8 store=active 
		. 2026.04.25 17:52:04 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2026.04.25 17:52:04 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all 
		. 2026.04.25 17:52:04 - OpenVPN &gt; IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 17:52:04 - OpenVPN &gt; Initialization Sequence Completed 
		. 2026.04.25 17:52:04 - Interface Eddie metric changed from Automatic to 3, layer IPv4 
		. 2026.04.25 17:52:04 - Interface Eddie metric changed from Automatic to 3, layer IPv6 
		. 2026.04.25 17:52:04 - DNS leak protection with packet filtering enabled. 
		. 2026.04.25 17:52:04 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.24.26.1) 
		. 2026.04.25 17:52:04 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:141a::1) 
		. 2026.04.25 17:52:05 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:52:05 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:52:06 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:52:06 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:52:07 - Routes, add 184.75.223.219/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:52:07 - Routes, add 2606:6080:1002:7:def:437f:f6fa:7759/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:52:07 - Flushing DNS 
		I 2026.04.25 17:52:07 - Checking route IPv4 
		. 2026.04.25 17:53:16 - Checking route (4° try) 
		. 2026.04.25 17:53:41 - Checking route (5° try) 
		E 2026.04.25 17:54:02 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached 
		. 2026.04.25 17:54:02 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 17:54:02 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 17:54:02 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 17:54:02 - Above log line repeated 8 times more 
		! 2026.04.25 17:54:02 - Disconnecting 
		. 2026.04.25 17:54:02 - Sending soft termination signal 
		. 2026.04.25 17:54:06 - OpenVPN &gt; SIGTERM received, sending exit notification to peer 
		. 2026.04.25 17:54:07 - OpenVPN &gt; Closing TUN/TAP interface 
		. 2026.04.25 17:54:07 - OpenVPN &gt; delete_route_ipv6(fde6:7a:7d20:141a::/64) 
		. 2026.04.25 17:54:07 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:141a::/64 51 fe80::8 store=active 
		. 2026.04.25 17:54:07 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:141a::10cb store=active 
		. 2026.04.25 17:54:07 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.24.26.205 store=active 
		. 2026.04.25 17:54:08 - OpenVPN &gt; SIGTERM[soft,exit-with-notification] received, process exiting 
		. 2026.04.25 17:54:08 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:54:09 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:54:09 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:54:09 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:54:09 - Routes, skipped for 184.75.223.221 : IPv4 Net gateway not available. 
		. 2026.04.25 17:54:10 - Routes, delete 184.75.223.219/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:54:10 - Routes, delete 2606:6080:1002:7:def:437f:f6fa:7759/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:54:10 - Routes, skipped for 184.75.223.221 : IPv4 Net gateway not available. 
		. 2026.04.25 17:54:10 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 17:54:10 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 17:54:10 - DNS leak protection with packet filtering disabled. 
		. 2026.04.25 17:54:10 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 
		. 2026.04.25 17:54:10 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 
		. 2026.04.25 17:54:10 - Connection terminated. 
		I 2026.04.25 17:54:13 - Checking authorization ... 
		. 2026.04.25 17:54:14 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" 
		! 2026.04.25 17:54:14 - Connecting to Cephei (Canada, Toronto, Ontario) 
		. 2026.04.25 17:54:14 - Routes, skipped for 184.75.214.165 : IPv4 Net gateway not available. 
		. 2026.04.25 17:54:14 - Routes, skipped for 184.75.214.165 : IPv4 Net gateway not available. 
		. 2026.04.25 17:54:14 - OpenVPN &gt; OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 
		. 2026.04.25 17:54:14 - OpenVPN &gt; Windows version 10.0 (Windows 10 or greater) 64bit 
		. 2026.04.25 17:54:14 - OpenVPN &gt; library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10 
		. 2026.04.25 17:54:14 - OpenVPN &gt; Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 17:54:14 - OpenVPN &gt; Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 17:54:14 - OpenVPN &gt; Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 17:54:14 - OpenVPN &gt; Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 17:54:14 - OpenVPN &gt; TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.165:443 
		. 2026.04.25 17:54:14 - OpenVPN &gt; Socket Buffers: R=[65536-&gt;262144] S=[65536-&gt;262144] 
		. 2026.04.25 17:54:14 - OpenVPN &gt; UDP link local: (not bound) 
		. 2026.04.25 17:54:14 - OpenVPN &gt; UDP link remote: [AF_INET]184.75.214.165:443 
		. 2026.04.25 17:54:16 - OpenVPN &gt; TLS: Initial packet from [AF_INET]184.75.214.165:443, sid=84fd3333 e8f6710d 
		. 2026.04.25 17:54:17 - OpenVPN &gt; VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org 
		. 2026.04.25 17:54:17 - OpenVPN &gt; VERIFY KU OK 
		. 2026.04.25 17:54:17 - OpenVPN &gt; Validating certificate extended key usage 
		. 2026.04.25 17:54:17 - OpenVPN &gt; ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 
		. 2026.04.25 17:54:17 - OpenVPN &gt; VERIFY EKU OK 
		. 2026.04.25 17:54:17 - OpenVPN &gt; VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cephei, emailAddress=info@airvpn.org 
		. 2026.04.25 17:54:17 - OpenVPN &gt; Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 
		. 2026.04.25 17:54:17 - OpenVPN &gt; [Cephei] Peer Connection Initiated with [AF_INET]184.75.214.165:443 
		. 2026.04.25 17:54:17 - OpenVPN &gt; SENT CONTROL [Cephei]: 'PUSH_REQUEST' (status=1) 
		. 2026.04.25 17:54:17 - OpenVPN &gt; PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.13.122.1,dhcp-option DNS6 fde6:7a:7d20:97a::1,tun-ipv6,route-gateway 10.13.122.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:97a::1021/64 fde6:7a:7d20:97a::1,ifconfig 10.13.122.35 255.255.255.0,peer-id 2,cipher AES-256-GCM' 
		. 2026.04.25 17:54:17 - OpenVPN &gt; Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' 
		. 2026.04.25 17:54:17 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS 10.13.122.1' 
		. 2026.04.25 17:54:17 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:97a::1' 
		. 2026.04.25 17:54:17 - OpenVPN &gt; OPTIONS IMPORT: timers and/or timeouts modified 
		. 2026.04.25 17:54:17 - OpenVPN &gt; OPTIONS IMPORT: compression parms modified 
		. 2026.04.25 17:54:17 - OpenVPN &gt; OPTIONS IMPORT: --ifconfig/up options modified 
		. 2026.04.25 17:54:17 - OpenVPN &gt; OPTIONS IMPORT: route-related options modified 
		. 2026.04.25 17:54:17 - OpenVPN &gt; OPTIONS IMPORT: peer-id set 
		. 2026.04.25 17:54:17 - OpenVPN &gt; OPTIONS IMPORT: adjusting link_mtu to 1625 
		. 2026.04.25 17:54:17 - OpenVPN &gt; OPTIONS IMPORT: data channel crypto options modified 
		. 2026.04.25 17:54:17 - OpenVPN &gt; Data Channel: using negotiated cipher 'AES-256-GCM' 
		. 2026.04.25 17:54:17 - OpenVPN &gt; Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 17:54:17 - OpenVPN &gt; Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 17:54:17 - OpenVPN &gt; interactive service msg_channel=0 
		. 2026.04.25 17:54:17 - OpenVPN &gt; open_tun 
		. 2026.04.25 17:54:17 - OpenVPN &gt; wintun device [Eddie] opened 
		. 2026.04.25 17:54:17 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.13.122.35 255.255.255.0 
		. 2026.04.25 17:54:18 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all 
		. 2026.04.25 17:54:18 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all 
		. 2026.04.25 17:54:18 - OpenVPN &gt; IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 17:54:18 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:97a::1021/128 store=active 
		. 2026.04.25 17:54:18 - OpenVPN &gt; add_route_ipv6(fde6:7a:7d20:97a::/64 -&gt; fde6:7a:7d20:97a::1021 metric 0) dev Eddie 
		. 2026.04.25 17:54:18 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:97a::/64 51 fe80::8 store=active 
		. 2026.04.25 17:54:18 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2026.04.25 17:54:18 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all 
		. 2026.04.25 17:54:18 - OpenVPN &gt; IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 17:54:18 - OpenVPN &gt; Initialization Sequence Completed 
		. 2026.04.25 17:54:18 - Interface Eddie metric changed from Automatic to 3, layer IPv4 
		. 2026.04.25 17:54:18 - Interface Eddie metric changed from Automatic to 3, layer IPv6 
		. 2026.04.25 17:54:18 - DNS leak protection with packet filtering enabled. 
		. 2026.04.25 17:54:18 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.13.122.1) 
		. 2026.04.25 17:54:18 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:97a::1) 
		. 2026.04.25 17:54:19 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:54:19 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:54:20 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:54:20 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:54:20 - Routes, add 184.75.214.163/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:54:21 - Routes, add 2606:6080:1001:c:1d9a:8f36:e174:d7c5/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:54:21 - Flushing DNS 
		I 2026.04.25 17:54:21 - Checking route IPv4 
		. 2026.04.25 17:55:30 - Checking route (4° try) 
		. 2026.04.25 17:55:55 - Checking route (5° try) 
		E 2026.04.25 17:56:16 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached 
		. 2026.04.25 17:56:16 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 17:56:16 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 17:56:16 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 17:56:16 - Above log line repeated 16 times more 
		! 2026.04.25 17:56:16 - Disconnecting 
		. 2026.04.25 17:56:16 - Sending soft termination signal 
		. 2026.04.25 17:56:19 - OpenVPN &gt; SIGTERM received, sending exit notification to peer 
		. 2026.04.25 17:56:21 - OpenVPN &gt; Closing TUN/TAP interface 
		. 2026.04.25 17:56:21 - OpenVPN &gt; delete_route_ipv6(fde6:7a:7d20:97a::/64) 
		. 2026.04.25 17:56:21 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:97a::/64 51 fe80::8 store=active 
		. 2026.04.25 17:56:21 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:97a::1021 store=active 
		. 2026.04.25 17:56:21 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.13.122.35 store=active 
		. 2026.04.25 17:56:21 - OpenVPN &gt; SIGTERM[soft,exit-with-notification] received, process exiting 
		. 2026.04.25 17:56:22 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:56:22 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:56:23 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:56:23 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:56:23 - Routes, skipped for 184.75.214.165 : IPv4 Net gateway not available. 
		. 2026.04.25 17:56:24 - Routes, delete 184.75.214.163/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:56:24 - Routes, delete 2606:6080:1001:c:1d9a:8f36:e174:d7c5/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:56:24 - Routes, skipped for 184.75.214.165 : IPv4 Net gateway not available. 
		. 2026.04.25 17:56:24 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 17:56:24 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 17:56:24 - DNS leak protection with packet filtering disabled. 
		. 2026.04.25 17:56:24 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 
		. 2026.04.25 17:56:24 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 
		. 2026.04.25 17:56:24 - Connection terminated. 
		I 2026.04.25 17:56:27 - Checking authorization ... 
		. 2026.04.25 17:56:28 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" 
		! 2026.04.25 17:56:28 - Connecting to Agena (Canada, Toronto, Ontario) 
		. 2026.04.25 17:56:28 - Routes, skipped for 184.75.223.213 : IPv4 Net gateway not available. 
		. 2026.04.25 17:56:28 - Routes, skipped for 184.75.223.213 : IPv4 Net gateway not available. 
		. 2026.04.25 17:56:28 - OpenVPN &gt; OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 
		. 2026.04.25 17:56:28 - OpenVPN &gt; Windows version 10.0 (Windows 10 or greater) 64bit 
		. 2026.04.25 17:56:28 - OpenVPN &gt; library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10 
		. 2026.04.25 17:56:28 - OpenVPN &gt; Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 17:56:28 - OpenVPN &gt; Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 17:56:28 - OpenVPN &gt; Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 17:56:28 - OpenVPN &gt; Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 17:56:28 - OpenVPN &gt; TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.213:443 
		. 2026.04.25 17:56:28 - OpenVPN &gt; Socket Buffers: R=[65536-&gt;262144] S=[65536-&gt;262144] 
		. 2026.04.25 17:56:28 - OpenVPN &gt; UDP link local: (not bound) 
		. 2026.04.25 17:56:28 - OpenVPN &gt; UDP link remote: [AF_INET]184.75.223.213:443 
		. 2026.04.25 17:56:28 - OpenVPN &gt; TLS: Initial packet from [AF_INET]184.75.223.213:443, sid=e7171b53 5db86834 
		. 2026.04.25 17:56:28 - OpenVPN &gt; VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org 
		. 2026.04.25 17:56:28 - OpenVPN &gt; VERIFY KU OK 
		. 2026.04.25 17:56:28 - OpenVPN &gt; Validating certificate extended key usage 
		. 2026.04.25 17:56:28 - OpenVPN &gt; ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 
		. 2026.04.25 17:56:28 - OpenVPN &gt; VERIFY EKU OK 
		. 2026.04.25 17:56:28 - OpenVPN &gt; VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Agena, emailAddress=info@airvpn.org 
		. 2026.04.25 17:56:28 - OpenVPN &gt; Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 
		. 2026.04.25 17:56:28 - OpenVPN &gt; [Agena] Peer Connection Initiated with [AF_INET]184.75.223.213:443 
		. 2026.04.25 17:56:29 - OpenVPN &gt; SENT CONTROL [Agena]: 'PUSH_REQUEST' (status=1) 
		. 2026.04.25 17:56:29 - OpenVPN &gt; PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.4.218.1,dhcp-option DNS6 fde6:7a:7d20:da::1,tun-ipv6,route-gateway 10.4.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:da::1024/64 fde6:7a:7d20:da::1,ifconfig 10.4.218.38 255.255.255.0,peer-id 3,cipher AES-256-GCM' 
		. 2026.04.25 17:56:29 - OpenVPN &gt; Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' 
		. 2026.04.25 17:56:29 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS 10.4.218.1' 
		. 2026.04.25 17:56:29 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:da::1' 
		. 2026.04.25 17:56:29 - OpenVPN &gt; OPTIONS IMPORT: timers and/or timeouts modified 
		. 2026.04.25 17:56:29 - OpenVPN &gt; OPTIONS IMPORT: compression parms modified 
		. 2026.04.25 17:56:29 - OpenVPN &gt; OPTIONS IMPORT: --ifconfig/up options modified 
		. 2026.04.25 17:56:29 - OpenVPN &gt; OPTIONS IMPORT: route-related options modified 
		. 2026.04.25 17:56:29 - OpenVPN &gt; OPTIONS IMPORT: peer-id set 
		. 2026.04.25 17:56:29 - OpenVPN &gt; OPTIONS IMPORT: adjusting link_mtu to 1625 
		. 2026.04.25 17:56:29 - OpenVPN &gt; OPTIONS IMPORT: data channel crypto options modified 
		. 2026.04.25 17:56:29 - OpenVPN &gt; Data Channel: using negotiated cipher 'AES-256-GCM' 
		. 2026.04.25 17:56:29 - OpenVPN &gt; Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 17:56:29 - OpenVPN &gt; Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 17:56:29 - OpenVPN &gt; interactive service msg_channel=0 
		. 2026.04.25 17:56:29 - OpenVPN &gt; open_tun 
		. 2026.04.25 17:56:29 - OpenVPN &gt; wintun device [Eddie] opened 
		. 2026.04.25 17:56:30 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.4.218.38 255.255.255.0 
		. 2026.04.25 17:56:30 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all 
		. 2026.04.25 17:56:30 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all 
		. 2026.04.25 17:56:30 - OpenVPN &gt; IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 17:56:30 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:da::1024/128 store=active 
		. 2026.04.25 17:56:30 - OpenVPN &gt; add_route_ipv6(fde6:7a:7d20:da::/64 -&gt; fde6:7a:7d20:da::1024 metric 0) dev Eddie 
		. 2026.04.25 17:56:30 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:da::/64 51 fe80::8 store=active 
		. 2026.04.25 17:56:30 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2026.04.25 17:56:30 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all 
		. 2026.04.25 17:56:30 - OpenVPN &gt; IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 17:56:30 - OpenVPN &gt; Initialization Sequence Completed 
		. 2026.04.25 17:56:30 - Interface Eddie metric changed from Automatic to 3, layer IPv4 
		. 2026.04.25 17:56:30 - Interface Eddie metric changed from Automatic to 3, layer IPv6 
		. 2026.04.25 17:56:30 - DNS leak protection with packet filtering enabled. 
		. 2026.04.25 17:56:30 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.4.218.1) 
		. 2026.04.25 17:56:30 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:da::1) 
		. 2026.04.25 17:56:31 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:56:31 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:56:32 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:56:32 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:56:33 - Routes, add 184.75.223.211/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:56:33 - Routes, add 2606:6080:1002:6:f780:efa6:f9d2:3459/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:56:33 - Flushing DNS 
		I 2026.04.25 17:56:33 - Checking route IPv4 
		. 2026.04.25 17:57:42 - Checking route (4° try) 
		. 2026.04.25 17:58:07 - Checking route (5° try) 
		E 2026.04.25 17:58:28 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached 
		. 2026.04.25 17:58:28 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 17:58:28 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 17:58:28 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 17:58:28 - Above log line repeated 4 times more 
		! 2026.04.25 17:58:28 - Disconnecting 
		. 2026.04.25 17:58:28 - Sending soft termination signal 
		. 2026.04.25 17:58:32 - OpenVPN &gt; SIGTERM received, sending exit notification to peer 
		. 2026.04.25 17:58:33 - OpenVPN &gt; Closing TUN/TAP interface 
		. 2026.04.25 17:58:33 - OpenVPN &gt; delete_route_ipv6(fde6:7a:7d20:da::/64) 
		. 2026.04.25 17:58:33 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:da::/64 51 fe80::8 store=active 
		. 2026.04.25 17:58:33 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:da::1024 store=active 
		. 2026.04.25 17:58:33 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.4.218.38 store=active 
		. 2026.04.25 17:58:33 - OpenVPN &gt; SIGTERM[soft,exit-with-notification] received, process exiting 
		. 2026.04.25 17:58:34 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:58:34 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:58:35 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:58:35 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:58:35 - Routes, skipped for 184.75.223.213 : IPv4 Net gateway not available. 
		. 2026.04.25 17:58:36 - Routes, delete 184.75.223.211/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:58:36 - Routes, delete 2606:6080:1002:6:f780:efa6:f9d2:3459/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:58:36 - Routes, skipped for 184.75.223.213 : IPv4 Net gateway not available. 
		. 2026.04.25 17:58:36 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 17:58:36 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 17:58:36 - DNS leak protection with packet filtering disabled. 
		. 2026.04.25 17:58:36 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 
		. 2026.04.25 17:58:36 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 
		. 2026.04.25 17:58:36 - Connection terminated. 
		I 2026.04.25 17:58:39 - Checking authorization ... 
		. 2026.04.25 17:58:40 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" 
		! 2026.04.25 17:58:40 - Connecting to Alwaid (Canada, Toronto, Ontario) 
		. 2026.04.25 17:58:40 - Routes, skipped for 184.75.221.109 : IPv4 Net gateway not available. 
		. 2026.04.25 17:58:40 - Routes, skipped for 184.75.221.109 : IPv4 Net gateway not available. 
		. 2026.04.25 17:58:40 - OpenVPN &gt; OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 
		. 2026.04.25 17:58:40 - OpenVPN &gt; Windows version 10.0 (Windows 10 or greater) 64bit 
		. 2026.04.25 17:58:40 - OpenVPN &gt; library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10 
		. 2026.04.25 17:58:40 - OpenVPN &gt; Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 17:58:40 - OpenVPN &gt; Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 17:58:40 - OpenVPN &gt; Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 17:58:40 - OpenVPN &gt; Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 17:58:40 - OpenVPN &gt; TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.109:443 
		. 2026.04.25 17:58:40 - OpenVPN &gt; Socket Buffers: R=[65536-&gt;262144] S=[65536-&gt;262144] 
		. 2026.04.25 17:58:40 - OpenVPN &gt; UDP link local: (not bound) 
		. 2026.04.25 17:58:40 - OpenVPN &gt; UDP link remote: [AF_INET]184.75.221.109:443 
		. 2026.04.25 17:58:40 - OpenVPN &gt; TLS: Initial packet from [AF_INET]184.75.221.109:443, sid=cdbde049 11285cce 
		. 2026.04.25 17:58:40 - OpenVPN &gt; VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org 
		. 2026.04.25 17:58:40 - OpenVPN &gt; VERIFY KU OK 
		. 2026.04.25 17:58:40 - OpenVPN &gt; Validating certificate extended key usage 
		. 2026.04.25 17:58:40 - OpenVPN &gt; ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 
		. 2026.04.25 17:58:40 - OpenVPN &gt; VERIFY EKU OK 
		. 2026.04.25 17:58:40 - OpenVPN &gt; VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org 
		. 2026.04.25 17:58:40 - OpenVPN &gt; Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 
		. 2026.04.25 17:58:40 - OpenVPN &gt; [Alwaid] Peer Connection Initiated with [AF_INET]184.75.221.109:443 
		. 2026.04.25 17:58:41 - OpenVPN &gt; PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.154.1,dhcp-option DNS6 fde6:7a:7d20:49a::1,tun-ipv6,route-gateway 10.8.154.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:49a::1061/64 fde6:7a:7d20:49a::1,ifconfig 10.8.154.99 255.255.255.0,peer-id 0,cipher AES-256-GCM' 
		. 2026.04.25 17:58:41 - OpenVPN &gt; Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' 
		. 2026.04.25 17:58:41 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS 10.8.154.1' 
		. 2026.04.25 17:58:41 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:49a::1' 
		. 2026.04.25 17:58:41 - OpenVPN &gt; OPTIONS IMPORT: timers and/or timeouts modified 
		. 2026.04.25 17:58:41 - OpenVPN &gt; OPTIONS IMPORT: compression parms modified 
		. 2026.04.25 17:58:41 - OpenVPN &gt; OPTIONS IMPORT: --ifconfig/up options modified 
		. 2026.04.25 17:58:41 - OpenVPN &gt; OPTIONS IMPORT: route-related options modified 
		. 2026.04.25 17:58:41 - OpenVPN &gt; OPTIONS IMPORT: peer-id set 
		. 2026.04.25 17:58:41 - OpenVPN &gt; OPTIONS IMPORT: adjusting link_mtu to 1625 
		. 2026.04.25 17:58:41 - OpenVPN &gt; OPTIONS IMPORT: data channel crypto options modified 
		. 2026.04.25 17:58:41 - OpenVPN &gt; Data Channel: using negotiated cipher 'AES-256-GCM' 
		. 2026.04.25 17:58:41 - OpenVPN &gt; Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 17:58:41 - OpenVPN &gt; Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 17:58:41 - OpenVPN &gt; interactive service msg_channel=0 
		. 2026.04.25 17:58:41 - OpenVPN &gt; open_tun 
		. 2026.04.25 17:58:41 - OpenVPN &gt; wintun device [Eddie] opened 
		. 2026.04.25 17:58:41 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.8.154.99 255.255.255.0 
		. 2026.04.25 17:58:41 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all 
		. 2026.04.25 17:58:41 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all 
		. 2026.04.25 17:58:41 - OpenVPN &gt; IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 17:58:41 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:49a::1061/128 store=active 
		. 2026.04.25 17:58:41 - OpenVPN &gt; add_route_ipv6(fde6:7a:7d20:49a::/64 -&gt; fde6:7a:7d20:49a::1061 metric 0) dev Eddie 
		. 2026.04.25 17:58:41 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:49a::/64 51 fe80::8 store=active 
		. 2026.04.25 17:58:41 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2026.04.25 17:58:41 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all 
		. 2026.04.25 17:58:41 - OpenVPN &gt; IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 17:58:41 - OpenVPN &gt; Initialization Sequence Completed 
		. 2026.04.25 17:58:42 - Interface Eddie metric changed from Automatic to 3, layer IPv4 
		. 2026.04.25 17:58:42 - Interface Eddie metric changed from Automatic to 3, layer IPv6 
		. 2026.04.25 17:58:42 - DNS leak protection with packet filtering enabled. 
		. 2026.04.25 17:58:42 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.8.154.1) 
		. 2026.04.25 17:58:42 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:49a::1) 
		. 2026.04.25 17:58:42 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:58:43 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:58:43 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:58:44 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:58:44 - Routes, add 184.75.221.107/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:58:44 - Routes, add 2606:6080:1001:30:5f94:f242:c829:1017/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 17:58:44 - Flushing DNS 
		I 2026.04.25 17:58:45 - Checking route IPv4 
		. 2026.04.25 17:59:54 - Checking route (4° try) 
		. 2026.04.25 18:00:19 - Checking route (5° try) 
		E 2026.04.25 18:00:40 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached 
		. 2026.04.25 18:00:40 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 18:00:40 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 18:00:40 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 18:00:40 - Above log line repeated 8 times more 
		! 2026.04.25 18:00:40 - Disconnecting 
		. 2026.04.25 18:00:40 - Sending soft termination signal 
		. 2026.04.25 18:00:43 - OpenVPN &gt; SIGTERM received, sending exit notification to peer 
		. 2026.04.25 18:00:45 - OpenVPN &gt; Closing TUN/TAP interface 
		. 2026.04.25 18:00:45 - OpenVPN &gt; delete_route_ipv6(fde6:7a:7d20:49a::/64) 
		. 2026.04.25 18:00:45 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:49a::/64 51 fe80::8 store=active 
		. 2026.04.25 18:00:45 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:49a::1061 store=active 
		. 2026.04.25 18:00:45 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.8.154.99 store=active 
		. 2026.04.25 18:00:45 - OpenVPN &gt; SIGTERM[soft,exit-with-notification] received, process exiting 
		. 2026.04.25 18:00:46 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:00:46 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:00:47 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:00:47 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:00:47 - Routes, skipped for 184.75.221.109 : IPv4 Net gateway not available. 
		. 2026.04.25 18:00:47 - Routes, delete 184.75.221.107/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:00:48 - Routes, delete 2606:6080:1001:30:5f94:f242:c829:1017/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:00:48 - Routes, skipped for 184.75.221.109 : IPv4 Net gateway not available. 
		. 2026.04.25 18:00:48 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 18:00:48 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 18:00:48 - DNS leak protection with packet filtering disabled. 
		. 2026.04.25 18:00:48 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 
		. 2026.04.25 18:00:48 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 
		. 2026.04.25 18:00:48 - Connection terminated. 
		I 2026.04.25 18:00:51 - Checking authorization ... 
		. 2026.04.25 18:00:52 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" 
		! 2026.04.25 18:00:52 - Connecting to Avior (Canada, Toronto, Ontario) 
		. 2026.04.25 18:00:52 - Routes, skipped for 184.75.223.237 : IPv4 Net gateway not available. 
		. 2026.04.25 18:00:52 - Routes, skipped for 184.75.223.237 : IPv4 Net gateway not available. 
		. 2026.04.25 18:00:52 - OpenVPN &gt; OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 
		. 2026.04.25 18:00:52 - OpenVPN &gt; Windows version 10.0 (Windows 10 or greater) 64bit 
		. 2026.04.25 18:00:52 - OpenVPN &gt; library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10 
		. 2026.04.25 18:00:52 - OpenVPN &gt; Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 18:00:52 - OpenVPN &gt; Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 18:00:52 - OpenVPN &gt; Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 18:00:52 - OpenVPN &gt; Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 18:00:52 - OpenVPN &gt; TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.237:443 
		. 2026.04.25 18:00:52 - OpenVPN &gt; Socket Buffers: R=[65536-&gt;262144] S=[65536-&gt;262144] 
		. 2026.04.25 18:00:52 - OpenVPN &gt; UDP link local: (not bound) 
		. 2026.04.25 18:00:52 - OpenVPN &gt; UDP link remote: [AF_INET]184.75.223.237:443 
		. 2026.04.25 18:00:54 - OpenVPN &gt; TLS: Initial packet from [AF_INET]184.75.223.237:443, sid=87d0561d 83d8c7d9 
		. 2026.04.25 18:00:54 - OpenVPN &gt; VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org 
		. 2026.04.25 18:00:54 - OpenVPN &gt; VERIFY KU OK 
		. 2026.04.25 18:00:54 - OpenVPN &gt; Validating certificate extended key usage 
		. 2026.04.25 18:00:54 - OpenVPN &gt; ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 
		. 2026.04.25 18:00:54 - OpenVPN &gt; VERIFY EKU OK 
		. 2026.04.25 18:00:54 - OpenVPN &gt; VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org 
		. 2026.04.25 18:00:54 - OpenVPN &gt; Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 
		. 2026.04.25 18:00:54 - OpenVPN &gt; [Avior] Peer Connection Initiated with [AF_INET]184.75.223.237:443 
		. 2026.04.25 18:00:55 - OpenVPN &gt; PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.250.1,dhcp-option DNS6 fde6:7a:7d20:6fa::1,tun-ipv6,route-gateway 10.10.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6fa::106f/64 fde6:7a:7d20:6fa::1,ifconfig 10.10.250.113 255.255.255.0,peer-id 0,cipher AES-256-GCM' 
		. 2026.04.25 18:00:55 - OpenVPN &gt; Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' 
		. 2026.04.25 18:00:55 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS 10.10.250.1' 
		. 2026.04.25 18:00:55 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6fa::1' 
		. 2026.04.25 18:00:55 - OpenVPN &gt; OPTIONS IMPORT: timers and/or timeouts modified 
		. 2026.04.25 18:00:55 - OpenVPN &gt; OPTIONS IMPORT: compression parms modified 
		. 2026.04.25 18:00:55 - OpenVPN &gt; OPTIONS IMPORT: --ifconfig/up options modified 
		. 2026.04.25 18:00:55 - OpenVPN &gt; OPTIONS IMPORT: route-related options modified 
		. 2026.04.25 18:00:55 - OpenVPN &gt; OPTIONS IMPORT: peer-id set 
		. 2026.04.25 18:00:55 - OpenVPN &gt; OPTIONS IMPORT: adjusting link_mtu to 1625 
		. 2026.04.25 18:00:55 - OpenVPN &gt; OPTIONS IMPORT: data channel crypto options modified 
		. 2026.04.25 18:00:55 - OpenVPN &gt; Data Channel: using negotiated cipher 'AES-256-GCM' 
		. 2026.04.25 18:00:55 - OpenVPN &gt; Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 18:00:55 - OpenVPN &gt; Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 18:00:55 - OpenVPN &gt; interactive service msg_channel=0 
		. 2026.04.25 18:00:55 - OpenVPN &gt; open_tun 
		. 2026.04.25 18:00:55 - OpenVPN &gt; wintun device [Eddie] opened 
		. 2026.04.25 18:00:55 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.10.250.113 255.255.255.0 
		. 2026.04.25 18:00:55 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all 
		. 2026.04.25 18:00:55 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all 
		. 2026.04.25 18:00:55 - OpenVPN &gt; IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 18:00:55 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:6fa::106f/128 store=active 
		. 2026.04.25 18:00:55 - OpenVPN &gt; add_route_ipv6(fde6:7a:7d20:6fa::/64 -&gt; fde6:7a:7d20:6fa::106f metric 0) dev Eddie 
		. 2026.04.25 18:00:56 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:6fa::/64 51 fe80::8 store=active 
		. 2026.04.25 18:00:56 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2026.04.25 18:00:56 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all 
		. 2026.04.25 18:00:56 - OpenVPN &gt; IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 18:00:56 - OpenVPN &gt; Initialization Sequence Completed 
		. 2026.04.25 18:00:56 - Interface Eddie metric changed from Automatic to 3, layer IPv4 
		. 2026.04.25 18:00:56 - Interface Eddie metric changed from Automatic to 3, layer IPv6 
		. 2026.04.25 18:00:56 - DNS leak protection with packet filtering enabled. 
		. 2026.04.25 18:00:56 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.10.250.1) 
		. 2026.04.25 18:00:56 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:6fa::1) 
		. 2026.04.25 18:00:57 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:00:57 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:00:58 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:00:58 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:00:59 - Routes, add 184.75.223.235/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:00:59 - Routes, add 2606:6080:1002:9:ffc4:b9c1:20ad:82f9/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:00:59 - Flushing DNS 
		I 2026.04.25 18:00:59 - Checking route IPv4 
		. 2026.04.25 18:02:08 - Checking route (4° try) 
		. 2026.04.25 18:02:34 - Checking route (5° try) 
		E 2026.04.25 18:02:55 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached 
		. 2026.04.25 18:02:55 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 18:02:55 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 18:02:55 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 18:02:55 - Above log line repeated 18 times more 
		! 2026.04.25 18:02:55 - Disconnecting 
		. 2026.04.25 18:02:55 - Sending soft termination signal 
		. 2026.04.25 18:02:58 - OpenVPN &gt; SIGTERM received, sending exit notification to peer 
		. 2026.04.25 18:02:59 - OpenVPN &gt; Closing TUN/TAP interface 
		. 2026.04.25 18:02:59 - OpenVPN &gt; delete_route_ipv6(fde6:7a:7d20:6fa::/64) 
		. 2026.04.25 18:02:59 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:6fa::/64 51 fe80::8 store=active 
		. 2026.04.25 18:02:59 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:6fa::106f store=active 
		. 2026.04.25 18:02:59 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.10.250.113 store=active 
		. 2026.04.25 18:02:59 - OpenVPN &gt; SIGTERM[soft,exit-with-notification] received, process exiting 
		. 2026.04.25 18:03:00 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:03:00 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:03:01 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:03:01 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:03:01 - Routes, skipped for 184.75.223.237 : IPv4 Net gateway not available. 
		. 2026.04.25 18:03:01 - Routes, delete 184.75.223.235/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:03:02 - Routes, delete 2606:6080:1002:9:ffc4:b9c1:20ad:82f9/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:03:02 - Routes, skipped for 184.75.223.237 : IPv4 Net gateway not available. 
		. 2026.04.25 18:03:02 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 18:03:02 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 18:03:02 - DNS leak protection with packet filtering disabled. 
		. 2026.04.25 18:03:02 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 
		. 2026.04.25 18:03:02 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 
		. 2026.04.25 18:03:02 - Connection terminated. 
		I 2026.04.25 18:03:05 - Checking authorization ... 
		. 2026.04.25 18:03:06 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" 
		! 2026.04.25 18:03:06 - Connecting to Tyl (Canada, Toronto, Ontario) 
		. 2026.04.25 18:03:06 - Routes, skipped for 184.75.223.205 : IPv4 Net gateway not available. 
		. 2026.04.25 18:03:06 - Routes, skipped for 184.75.223.205 : IPv4 Net gateway not available. 
		. 2026.04.25 18:03:06 - OpenVPN &gt; OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 
		. 2026.04.25 18:03:06 - OpenVPN &gt; Windows version 10.0 (Windows 10 or greater) 64bit 
		. 2026.04.25 18:03:06 - OpenVPN &gt; library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10 
		. 2026.04.25 18:03:06 - OpenVPN &gt; Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 18:03:06 - OpenVPN &gt; Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 18:03:06 - OpenVPN &gt; Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 18:03:06 - OpenVPN &gt; Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 18:03:06 - OpenVPN &gt; TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.205:443 
		. 2026.04.25 18:03:06 - OpenVPN &gt; Socket Buffers: R=[65536-&gt;262144] S=[65536-&gt;262144] 
		. 2026.04.25 18:03:06 - OpenVPN &gt; UDP link local: (not bound) 
		. 2026.04.25 18:03:06 - OpenVPN &gt; UDP link remote: [AF_INET]184.75.223.205:443 
		. 2026.04.25 18:03:06 - OpenVPN &gt; TLS: Initial packet from [AF_INET]184.75.223.205:443, sid=a12a8735 887deafc 
		. 2026.04.25 18:03:06 - OpenVPN &gt; VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org 
		. 2026.04.25 18:03:06 - OpenVPN &gt; VERIFY KU OK 
		. 2026.04.25 18:03:06 - OpenVPN &gt; Validating certificate extended key usage 
		. 2026.04.25 18:03:06 - OpenVPN &gt; ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 
		. 2026.04.25 18:03:06 - OpenVPN &gt; VERIFY EKU OK 
		. 2026.04.25 18:03:06 - OpenVPN &gt; VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tyl, emailAddress=info@airvpn.org 
		. 2026.04.25 18:03:06 - OpenVPN &gt; Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 
		. 2026.04.25 18:03:06 - OpenVPN &gt; [Tyl] Peer Connection Initiated with [AF_INET]184.75.223.205:443 
		. 2026.04.25 18:03:06 - OpenVPN &gt; SENT CONTROL [Tyl]: 'PUSH_REQUEST' (status=1) 
		. 2026.04.25 18:03:06 - OpenVPN &gt; PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.218.1,dhcp-option DNS6 fde6:7a:7d20:1bda::1,tun-ipv6,route-gateway 10.31.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1bda::1053/64 fde6:7a:7d20:1bda::1,ifconfig 10.31.218.85 255.255.255.0,peer-id 5,cipher AES-256-GCM' 
		. 2026.04.25 18:03:06 - OpenVPN &gt; Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' 
		. 2026.04.25 18:03:06 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS 10.31.218.1' 
		. 2026.04.25 18:03:06 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1bda::1' 
		. 2026.04.25 18:03:06 - OpenVPN &gt; OPTIONS IMPORT: timers and/or timeouts modified 
		. 2026.04.25 18:03:06 - OpenVPN &gt; OPTIONS IMPORT: compression parms modified 
		. 2026.04.25 18:03:06 - OpenVPN &gt; OPTIONS IMPORT: --ifconfig/up options modified 
		. 2026.04.25 18:03:06 - OpenVPN &gt; OPTIONS IMPORT: route-related options modified 
		. 2026.04.25 18:03:06 - OpenVPN &gt; OPTIONS IMPORT: peer-id set 
		. 2026.04.25 18:03:06 - OpenVPN &gt; OPTIONS IMPORT: adjusting link_mtu to 1625 
		. 2026.04.25 18:03:06 - OpenVPN &gt; OPTIONS IMPORT: data channel crypto options modified 
		. 2026.04.25 18:03:06 - OpenVPN &gt; Data Channel: using negotiated cipher 'AES-256-GCM' 
		. 2026.04.25 18:03:06 - OpenVPN &gt; Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 18:03:06 - OpenVPN &gt; Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 18:03:06 - OpenVPN &gt; interactive service msg_channel=0 
		. 2026.04.25 18:03:06 - OpenVPN &gt; open_tun 
		. 2026.04.25 18:03:06 - OpenVPN &gt; wintun device [Eddie] opened 
		. 2026.04.25 18:03:07 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.31.218.85 255.255.255.0 
		. 2026.04.25 18:03:07 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all 
		. 2026.04.25 18:03:07 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all 
		. 2026.04.25 18:03:07 - OpenVPN &gt; IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 18:03:07 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:1bda::1053/128 store=active 
		. 2026.04.25 18:03:07 - OpenVPN &gt; add_route_ipv6(fde6:7a:7d20:1bda::/64 -&gt; fde6:7a:7d20:1bda::1053 metric 0) dev Eddie 
		. 2026.04.25 18:03:07 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1bda::/64 51 fe80::8 store=active 
		. 2026.04.25 18:03:07 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2026.04.25 18:03:07 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all 
		. 2026.04.25 18:03:07 - OpenVPN &gt; IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 18:03:07 - OpenVPN &gt; Initialization Sequence Completed 
		. 2026.04.25 18:03:07 - Interface Eddie metric changed from Automatic to 3, layer IPv4 
		. 2026.04.25 18:03:07 - Interface Eddie metric changed from Automatic to 3, layer IPv6 
		. 2026.04.25 18:03:07 - DNS leak protection with packet filtering enabled. 
		. 2026.04.25 18:03:08 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.31.218.1) 
		. 2026.04.25 18:03:08 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1bda::1) 
		. 2026.04.25 18:03:08 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:03:09 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:03:09 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:03:09 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:03:10 - Routes, add 184.75.223.203/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:03:10 - Routes, add 2606:6080:1002:5:a1ba:b510:7908:829e/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:03:10 - Flushing DNS 
		I 2026.04.25 18:03:10 - Checking route IPv4 
		. 2026.04.25 18:04:20 - Checking route (4° try) 
		. 2026.04.25 18:04:45 - Checking route (5° try) 
		E 2026.04.25 18:05:06 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached 
		. 2026.04.25 18:05:06 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 18:05:06 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 18:05:06 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 18:05:06 - Above log line repeated 18 times more 
		! 2026.04.25 18:05:06 - Disconnecting 
		. 2026.04.25 18:05:06 - Sending soft termination signal 
		. 2026.04.25 18:05:09 - OpenVPN &gt; SIGTERM received, sending exit notification to peer 
		. 2026.04.25 18:05:10 - OpenVPN &gt; Closing TUN/TAP interface 
		. 2026.04.25 18:05:10 - OpenVPN &gt; delete_route_ipv6(fde6:7a:7d20:1bda::/64) 
		. 2026.04.25 18:05:10 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1bda::/64 51 fe80::8 store=active 
		. 2026.04.25 18:05:11 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:1bda::1053 store=active 
		. 2026.04.25 18:05:11 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.31.218.85 store=active 
		. 2026.04.25 18:05:11 - OpenVPN &gt; SIGTERM[soft,exit-with-notification] received, process exiting 
		. 2026.04.25 18:05:11 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:05:12 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:05:12 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:05:13 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:05:13 - Routes, skipped for 184.75.223.205 : IPv4 Net gateway not available. 
		. 2026.04.25 18:05:13 - Routes, delete 184.75.223.203/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:05:13 - Routes, delete 2606:6080:1002:5:a1ba:b510:7908:829e/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:05:13 - Routes, skipped for 184.75.223.205 : IPv4 Net gateway not available. 
		. 2026.04.25 18:05:13 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 18:05:13 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 18:05:13 - DNS leak protection with packet filtering disabled. 
		. 2026.04.25 18:05:14 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 
		. 2026.04.25 18:05:14 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 
		. 2026.04.25 18:05:14 - Connection terminated. 
		I 2026.04.25 18:05:17 - Checking authorization ... 
		. 2026.04.25 18:05:17 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" 
		! 2026.04.25 18:05:17 - Connecting to Elgafar (Canada, Toronto, Ontario) 
		. 2026.04.25 18:05:17 - Routes, skipped for 198.44.157.61 : IPv4 Net gateway not available. 
		. 2026.04.25 18:05:17 - Routes, skipped for 198.44.157.61 : IPv4 Net gateway not available. 
		. 2026.04.25 18:05:18 - OpenVPN &gt; OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 
		. 2026.04.25 18:05:18 - OpenVPN &gt; Windows version 10.0 (Windows 10 or greater) 64bit 
		. 2026.04.25 18:05:18 - OpenVPN &gt; library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10 
		. 2026.04.25 18:05:18 - OpenVPN &gt; Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 18:05:18 - OpenVPN &gt; Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 18:05:18 - OpenVPN &gt; Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 18:05:18 - OpenVPN &gt; Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 18:05:18 - OpenVPN &gt; TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.157.61:443 
		. 2026.04.25 18:05:18 - OpenVPN &gt; Socket Buffers: R=[65536-&gt;262144] S=[65536-&gt;262144] 
		. 2026.04.25 18:05:18 - OpenVPN &gt; UDP link local: (not bound) 
		. 2026.04.25 18:05:18 - OpenVPN &gt; UDP link remote: [AF_INET]198.44.157.61:443 
		. 2026.04.25 18:05:18 - OpenVPN &gt; TLS: Initial packet from [AF_INET]198.44.157.61:443, sid=937a0ab1 4fefae6f 
		. 2026.04.25 18:05:18 - OpenVPN &gt; VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org 
		. 2026.04.25 18:05:18 - OpenVPN &gt; VERIFY KU OK 
		. 2026.04.25 18:05:18 - OpenVPN &gt; Validating certificate extended key usage 
		. 2026.04.25 18:05:18 - OpenVPN &gt; ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 
		. 2026.04.25 18:05:18 - OpenVPN &gt; VERIFY EKU OK 
		. 2026.04.25 18:05:18 - OpenVPN &gt; VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Elgafar, emailAddress=info@airvpn.org 
		. 2026.04.25 18:05:18 - OpenVPN &gt; Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 
		. 2026.04.25 18:05:18 - OpenVPN &gt; [Elgafar] Peer Connection Initiated with [AF_INET]198.44.157.61:443 
		. 2026.04.25 18:05:18 - OpenVPN &gt; SENT CONTROL [Elgafar]: 'PUSH_REQUEST' (status=1) 
		. 2026.04.25 18:05:18 - OpenVPN &gt; PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.78.154.1,dhcp-option DNS6 fde6:7a:7d20:4a9a::1,tun-ipv6,route-gateway 10.78.154.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:4a9a::106f/64 fde6:7a:7d20:4a9a::1,ifconfig 10.78.154.113 255.255.255.0,peer-id 0,cipher AES-256-GCM' 
		. 2026.04.25 18:05:18 - OpenVPN &gt; Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' 
		. 2026.04.25 18:05:18 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS 10.78.154.1' 
		. 2026.04.25 18:05:18 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:4a9a::1' 
		. 2026.04.25 18:05:18 - OpenVPN &gt; OPTIONS IMPORT: timers and/or timeouts modified 
		. 2026.04.25 18:05:18 - OpenVPN &gt; OPTIONS IMPORT: compression parms modified 
		. 2026.04.25 18:05:18 - OpenVPN &gt; OPTIONS IMPORT: --ifconfig/up options modified 
		. 2026.04.25 18:05:18 - OpenVPN &gt; OPTIONS IMPORT: route-related options modified 
		. 2026.04.25 18:05:18 - OpenVPN &gt; OPTIONS IMPORT: peer-id set 
		. 2026.04.25 18:05:18 - OpenVPN &gt; OPTIONS IMPORT: adjusting link_mtu to 1625 
		. 2026.04.25 18:05:18 - OpenVPN &gt; OPTIONS IMPORT: data channel crypto options modified 
		. 2026.04.25 18:05:18 - OpenVPN &gt; Data Channel: using negotiated cipher 'AES-256-GCM' 
		. 2026.04.25 18:05:18 - OpenVPN &gt; Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 18:05:18 - OpenVPN &gt; Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 18:05:18 - OpenVPN &gt; interactive service msg_channel=0 
		. 2026.04.25 18:05:18 - OpenVPN &gt; open_tun 
		. 2026.04.25 18:05:18 - OpenVPN &gt; wintun device [Eddie] opened 
		. 2026.04.25 18:05:19 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.78.154.113 255.255.255.0 
		. 2026.04.25 18:05:19 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all 
		. 2026.04.25 18:05:19 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all 
		. 2026.04.25 18:05:19 - OpenVPN &gt; IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 18:05:19 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:4a9a::106f/128 store=active 
		. 2026.04.25 18:05:19 - OpenVPN &gt; add_route_ipv6(fde6:7a:7d20:4a9a::/64 -&gt; fde6:7a:7d20:4a9a::106f metric 0) dev Eddie 
		. 2026.04.25 18:05:19 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:4a9a::/64 51 fe80::8 store=active 
		. 2026.04.25 18:05:19 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2026.04.25 18:05:19 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all 
		. 2026.04.25 18:05:19 - OpenVPN &gt; IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 18:05:19 - OpenVPN &gt; Initialization Sequence Completed 
		. 2026.04.25 18:05:19 - Interface Eddie metric changed from Automatic to 3, layer IPv4 
		. 2026.04.25 18:05:19 - Interface Eddie metric changed from Automatic to 3, layer IPv6 
		. 2026.04.25 18:05:19 - DNS leak protection with packet filtering enabled. 
		. 2026.04.25 18:05:19 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.78.154.1) 
		. 2026.04.25 18:05:20 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:4a9a::1) 
		. 2026.04.25 18:05:20 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:05:20 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:05:21 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:05:21 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:05:22 - Routes, add 198.44.157.162/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:05:22 - Routes, add 2607:9000:600:22:ac5e:c05a:ff67:b587/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:05:22 - Flushing DNS 
		I 2026.04.25 18:05:22 - Checking route IPv4 
		. 2026.04.25 18:06:31 - Checking route (4° try) 
		. 2026.04.25 18:06:57 - Checking route (5° try) 
		E 2026.04.25 18:07:18 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached 
		. 2026.04.25 18:07:18 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 18:07:18 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 18:07:18 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 18:07:18 - Above log line repeated 20 times more 
		! 2026.04.25 18:07:18 - Disconnecting 
		. 2026.04.25 18:07:18 - Sending soft termination signal 
		. 2026.04.25 18:07:21 - OpenVPN &gt; SIGTERM received, sending exit notification to peer 
		. 2026.04.25 18:07:23 - OpenVPN &gt; Closing TUN/TAP interface 
		. 2026.04.25 18:07:23 - OpenVPN &gt; delete_route_ipv6(fde6:7a:7d20:4a9a::/64) 
		. 2026.04.25 18:07:23 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:4a9a::/64 51 fe80::8 store=active 
		. 2026.04.25 18:07:23 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:4a9a::106f store=active 
		. 2026.04.25 18:07:23 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.78.154.113 store=active 
		. 2026.04.25 18:07:23 - OpenVPN &gt; SIGTERM[soft,exit-with-notification] received, process exiting 
		. 2026.04.25 18:07:24 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:07:24 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:07:24 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:07:25 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:07:25 - Routes, skipped for 198.44.157.61 : IPv4 Net gateway not available. 
		. 2026.04.25 18:07:25 - Routes, delete 198.44.157.162/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:07:26 - Routes, delete 2607:9000:600:22:ac5e:c05a:ff67:b587/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:07:26 - Routes, skipped for 198.44.157.61 : IPv4 Net gateway not available. 
		. 2026.04.25 18:07:26 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 18:07:26 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 18:07:26 - DNS leak protection with packet filtering disabled. 
		. 2026.04.25 18:07:26 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 
		. 2026.04.25 18:07:26 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 
		. 2026.04.25 18:07:26 - Connection terminated. 
		. 2026.04.25 18:07:29 - Waiting for latency tests (254 to go) 
		. 2026.04.25 18:07:30 - Waiting for latency tests (228 to go) 
		. 2026.04.25 18:07:31 - Waiting for latency tests (2 to go) 
		I 2026.04.25 18:07:33 - Checking authorization ... 
		. 2026.04.25 18:07:34 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" 
		! 2026.04.25 18:07:34 - Connecting to Chamukuy (Canada, Toronto, Ontario) 
		. 2026.04.25 18:07:34 - Routes, skipped for 198.44.157.133 : IPv4 Net gateway not available. 
		. 2026.04.25 18:07:34 - Routes, skipped for 198.44.157.133 : IPv4 Net gateway not available. 
		. 2026.04.25 18:07:34 - OpenVPN &gt; OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 
		. 2026.04.25 18:07:34 - OpenVPN &gt; Windows version 10.0 (Windows 10 or greater) 64bit 
		. 2026.04.25 18:07:34 - OpenVPN &gt; library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10 
		. 2026.04.25 18:07:34 - OpenVPN &gt; Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 18:07:34 - OpenVPN &gt; Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 18:07:34 - OpenVPN &gt; Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 
		. 2026.04.25 18:07:34 - OpenVPN &gt; Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication 
		. 2026.04.25 18:07:34 - OpenVPN &gt; TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.157.133:443 
		. 2026.04.25 18:07:34 - OpenVPN &gt; Socket Buffers: R=[65536-&gt;262144] S=[65536-&gt;262144] 
		. 2026.04.25 18:07:34 - OpenVPN &gt; UDP link local: (not bound) 
		. 2026.04.25 18:07:34 - OpenVPN &gt; UDP link remote: [AF_INET]198.44.157.133:443 
		. 2026.04.25 18:07:34 - OpenVPN &gt; TLS: Initial packet from [AF_INET]198.44.157.133:443, sid=c7565b12 5e4a2a33 
		. 2026.04.25 18:07:34 - OpenVPN &gt; VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org 
		. 2026.04.25 18:07:34 - OpenVPN &gt; VERIFY KU OK 
		. 2026.04.25 18:07:34 - OpenVPN &gt; Validating certificate extended key usage 
		. 2026.04.25 18:07:34 - OpenVPN &gt; ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 
		. 2026.04.25 18:07:34 - OpenVPN &gt; VERIFY EKU OK 
		. 2026.04.25 18:07:34 - OpenVPN &gt; VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chamukuy, emailAddress=info@airvpn.org 
		. 2026.04.25 18:07:34 - OpenVPN &gt; Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 
		. 2026.04.25 18:07:34 - OpenVPN &gt; [Chamukuy] Peer Connection Initiated with [AF_INET]198.44.157.133:443 
		. 2026.04.25 18:07:34 - OpenVPN &gt; PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.68.154.1,dhcp-option DNS6 fde6:7a:7d20:409a::1,tun-ipv6,route-gateway 10.68.154.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:409a::1081/64 fde6:7a:7d20:409a::1,ifconfig 10.68.154.131 255.255.255.0,peer-id 7,cipher AES-256-GCM' 
		. 2026.04.25 18:07:34 - OpenVPN &gt; Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' 
		. 2026.04.25 18:07:34 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS 10.68.154.1' 
		. 2026.04.25 18:07:34 - OpenVPN &gt; Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:409a::1' 
		. 2026.04.25 18:07:34 - OpenVPN &gt; OPTIONS IMPORT: timers and/or timeouts modified 
		. 2026.04.25 18:07:34 - OpenVPN &gt; OPTIONS IMPORT: compression parms modified 
		. 2026.04.25 18:07:34 - OpenVPN &gt; OPTIONS IMPORT: --ifconfig/up options modified 
		. 2026.04.25 18:07:34 - OpenVPN &gt; OPTIONS IMPORT: route-related options modified 
		. 2026.04.25 18:07:34 - OpenVPN &gt; OPTIONS IMPORT: peer-id set 
		. 2026.04.25 18:07:34 - OpenVPN &gt; OPTIONS IMPORT: adjusting link_mtu to 1625 
		. 2026.04.25 18:07:34 - OpenVPN &gt; OPTIONS IMPORT: data channel crypto options modified 
		. 2026.04.25 18:07:34 - OpenVPN &gt; Data Channel: using negotiated cipher 'AES-256-GCM' 
		. 2026.04.25 18:07:34 - OpenVPN &gt; Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 18:07:34 - OpenVPN &gt; Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 
		. 2026.04.25 18:07:34 - OpenVPN &gt; interactive service msg_channel=0 
		. 2026.04.25 18:07:34 - OpenVPN &gt; open_tun 
		. 2026.04.25 18:07:34 - OpenVPN &gt; wintun device [Eddie] opened 
		. 2026.04.25 18:07:35 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.68.154.131 255.255.255.0 
		. 2026.04.25 18:07:35 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all 
		. 2026.04.25 18:07:35 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all 
		. 2026.04.25 18:07:35 - OpenVPN &gt; IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 18:07:35 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:409a::1081/128 store=active 
		. 2026.04.25 18:07:35 - OpenVPN &gt; add_route_ipv6(fde6:7a:7d20:409a::/64 -&gt; fde6:7a:7d20:409a::1081 metric 0) dev Eddie 
		. 2026.04.25 18:07:35 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:409a::/64 51 fe80::8 store=active 
		. 2026.04.25 18:07:35 - OpenVPN &gt; env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem 
		. 2026.04.25 18:07:35 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all 
		. 2026.04.25 18:07:35 - OpenVPN &gt; IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() 
		. 2026.04.25 18:07:35 - OpenVPN &gt; Initialization Sequence Completed 
		. 2026.04.25 18:07:35 - Interface Eddie metric changed from Automatic to 3, layer IPv4 
		. 2026.04.25 18:07:35 - Interface Eddie metric changed from Automatic to 3, layer IPv6 
		. 2026.04.25 18:07:35 - DNS leak protection with packet filtering enabled. 
		. 2026.04.25 18:07:36 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.68.154.1) 
		. 2026.04.25 18:07:36 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:409a::1) 
		. 2026.04.25 18:07:36 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:07:37 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:07:37 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:07:37 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:07:38 - Routes, add 198.44.157.178/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:07:38 - Routes, add 2607:9000:600:23:4ad4:e968:c493:fc24/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:07:38 - Flushing DNS 
		I 2026.04.25 18:07:38 - Checking route IPv4 
		. 2026.04.25 18:08:48 - Checking route (4° try) 
		. 2026.04.25 18:09:09 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 18:09:09 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 18:09:09 - OpenVPN &gt; write UDP: Unknown error (code=10065) 
		. 2026.04.25 18:09:09 - Above log line repeated 13 times more 
		! 2026.04.25 18:09:09 - Disconnecting 
		. 2026.04.25 18:09:09 - Sending soft termination signal 
		. 2026.04.25 18:09:12 - OpenVPN &gt; SIGTERM received, sending exit notification to peer 
		. 2026.04.25 18:09:13 - OpenVPN &gt; Closing TUN/TAP interface 
		. 2026.04.25 18:09:13 - OpenVPN &gt; delete_route_ipv6(fde6:7a:7d20:409a::/64) 
		. 2026.04.25 18:09:13 - OpenVPN &gt; C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:409a::/64 51 fe80::8 store=active 
		. 2026.04.25 18:09:13 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:409a::1081 store=active 
		. 2026.04.25 18:09:13 - OpenVPN &gt; NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.68.154.131 store=active 
		. 2026.04.25 18:09:13 - OpenVPN &gt; SIGTERM[soft,exit-with-notification] received, process exiting 
		. 2026.04.25 18:09:14 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:09:14 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:09:14 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:09:15 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:09:15 - Routes, skipped for 198.44.157.133 : IPv4 Net gateway not available. 
		. 2026.04.25 18:09:15 - Routes, delete 198.44.157.178/32 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:09:15 - Routes, delete 2607:9000:600:23:4ad4:e968:c493:fc24/128 for interface "Eddie (Wintun Userspace Tunnel #2)". 
		. 2026.04.25 18:09:15 - Routes, skipped for 198.44.157.133 : IPv4 Net gateway not available. 
		. 2026.04.25 18:09:15 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 18:09:15 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) 
		. 2026.04.25 18:09:15 - DNS leak protection with packet filtering disabled. 
		. 2026.04.25 18:09:16 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 
		. 2026.04.25 18:09:16 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 
		. 2026.04.25 18:09:16 - Connection terminated. 
		I 2026.04.25 18:09:16 - Cancel requested. 
		! 2026.04.25 18:09:16 - Session terminated. 
		. 2026.04.25 18:16:10 - Collect information about AirVPN completed 
		. 2026.04.25 18:46:12 - Collect information about AirVPN completed 
		! 2026.04.25 18:57:05 - Deactivation of Network Lock]]></description><pubDate>Sat, 25 Apr 2026 23:06:22 +0000</pubDate></item><item><title>Singapore servers, what happened?</title><link><![CDATA[https://airvpn.org/forums/topic/80036-singapore-servers-what-happened/?do=findComment&comment=262476]]></link><description>Hello Guys, 
 
 I've been an satisfied AirVPN client for over 10 years, this past month I've noticed that the Singapore servers which I mainly use now have a latency that's very poor (I'm in S.E Asia) 
The Eddie client is showing that Japan is better for Latency so I connect to them. 
While connecting to a few Singapore nodes I'm also noticing that my 1st, 2nd and 3rd hops are coming out of Romania. 
vlan12.as06-10g.wco1.sg.m247.ro  
irb-1906.agg1v.wco1.sg.m247.ro 
be-2-3111.bb1n.wco1.sg.m247.ro 
 
While that would explain the latency issue if I'm actually connecting to Romanian servers but I'm supposed to be using Singapore. 
Hopefully someone can explain the issue I'm having. 
 
Thanks</description><pubDate>Sat, 25 Apr 2026 16:43:01 +0000</pubDate></item><item><title>"Test Port" gives me a "Connection Refused" error</title><link><![CDATA[https://airvpn.org/forums/topic/80027-test-port-gives-me-a-connection-refused-error/?do=findComment&comment=262457]]></link><description>Hello. I'm new to AirVPN. So I'm trying to set up Airvpn + Qbittorrent and I'm having some troubles. I get a "Connection Refused" error when testing the port. I have opened the port in my firewall (30105) and It's also set in qbittorrent. Network Interface is also set to airvpn. I'm using the OpenVPN UDP config from the generator on the website. Continent: Europe, OS: Linux CachyOS.</description><pubDate>Fri, 24 Apr 2026 10:32:26 +0000</pubDate></item><item><title>WireGuard AmneziaWG Converter</title><link><![CDATA[https://airvpn.org/forums/topic/79991-wireguard-amneziawg-converter/?do=findComment&comment=262387]]></link><description>I stumbled upon this online WG converter.  Is it safe to use?  Is so, which settings are recommended?  I'm using WG configs with Wiresock because Eddie drastically slows boot-up speeds, often not loading and connected before the wifi disconnects.  AmneziaWG supports obfuscation that Eddie does not.</description><pubDate>Wed, 22 Apr 2026 01:25:54 +0000</pubDate></item><item><title>Throughput Drop on IPTV (Strong8k) with WireGuard/OpenVPN</title><link><![CDATA[https://airvpn.org/forums/topic/79986-throughput-drop-on-iptv-strong8k-with-wireguardopenvpn/?do=findComment&comment=262373]]></link><description>Hello all, relatively new user here loving the service, but I&#x2019;ve hit a specific wall regarding IPTV performance. 
 
Google TV Streamer 4K (hardwired 1GBps) connected to AirVPN via VPN Fusion on ASUS router (WireGuard/OpenVPN), analiti (speed test) shows speed of 400Mbps with and without VPN enabled. However, the moment I launch a stream, the bitrate collapses to below 100kBps. Without the VPN, the stream sustains 2-3Mbps without issue. 
 
Appreciate any help I could get, thanks!</description><pubDate>Tue, 21 Apr 2026 16:02:11 +0000</pubDate></item><item><title>AirVPN Additional Proxy</title><link><![CDATA[https://airvpn.org/forums/topic/79983-airvpn-additional-proxy/?do=findComment&comment=262370]]></link><description>Currently, AirVPN only has three options for bypassing the block: SSH SSL and AmneziaWG, which is already quite excellent for a VPN provider. 
 
However, these options are still insufficient in the face of the ever-evolving GFW and other national firewalls. 
 
Perhaps we can outsource the protocol obfuscation part to other proxy providers, while leaving the basic privacy protection part to AirVPN. 
 
I have implemented the addition of dedicated proxies from other vendors in Eddie. I set a hybrid proxy port x in the Clash software and set a SOCKS proxy 127.0.0.1:x in Eddie. This way, traffic goes through the proxy first and then is forwarded to the AirVPN server. I can use the obfuscation performance of the proxy protocol to obfuscate AirVPN traffic. 
 
This makes a wide variety of obfuscation protocols available, such as Vless, AnyTLS, Hysteria2, Shadowsocks, Trojan, and Vmess. Using a proxy provider combined with a VPN provider allows me to bypass internet censorship smoothly, which is a good idea.</description><pubDate>Tue, 21 Apr 2026 12:46:11 +0000</pubDate></item><item><title>Gluetun + qbittorrent trough airvpn speeds</title><link><![CDATA[https://airvpn.org/forums/topic/79982-gluetun-qbittorrent-trough-airvpn-speeds/?do=findComment&comment=262369]]></link><description>Helllo everyone, 
	 
	I run a NAS Qnap TS-464-8g. 
	I mainly use it for torrenting and media server. 
	Currently it runs docker image that containes qbittorrent + gluetun with airvpn configuration. 
	 
	It works fine and connected easily, however, I see slow speeds. Since I tried another vpn , the speeds are way better. 
	I chose closes servers to me, which are Latvia and Estonia. 
	Could someone tell me if avg speeds of 2mb/s is what expected with airvpn? I seed quite a lot of torrents, about 30active all the time, and speeds should be way higher since i've seen greated with different provider. Thanks. 
	 
	EDIT: I've added - WIREGUARD_MTU=1280 after I created the thread. with no impact to speeds. still avg 2mb/s upload. 
	EDIT2: While docker exec'd into gluetun container, and running flat downloadi get 300-350 (40mb/s) mbps speeds 
	EDIT3: I've noticed that just after starting the container with qbit+gluetun+airvpn(wireguard) i see my torrents uploading at 10mb/s, which would indicate the speeds can be higher, but after a minute, the speed drops to 2mb/s 
	 
 

 


services:
  # =====================
  #  VPN
  # =====================
  gluetun:
    image: qmcgaw/gluetun:latest
    container_name: gluetun
    cap_add:
      - NET_ADMIN
    devices:
      - /dev/net/tun:/dev/net/tun
    ports:
      - 8081:8081   # qBittorrent WebUI
      - 6881:6881
      - 6881:6881/udp
    volumes:
      - /share/CACHEDEV1_DATA/Container/gluetun/config:/config
      - /share/CACHEDEV1_DATA/Container/gluetun:/gluetun
    environment:
      - VPN_SERVICE_PROVIDER=airvpn
      - VPN_TYPE=wireguard
      - TZ=redacted
      - WIREGUARD_PRIVATE_KEY=redacted
      - WIREGUARD_PRESHARED_KEY=redacted
      - WIREGUARD_ADDRESSES=redacted
      - WIREGUARD_MTU=1280
      - SERVER_COUNTRIES=Latvia,Estonia
      - FIREWALL_VPN_INPUT_PORTS=3228
      - LOGLEVEL=debug
      - LOCAL_NETWORK=192.168.0.0/24
      - FIREWALL_INPUT_PORTS=8081
      - PUID=0
      - PGID=0
    networks:
      - proxy
    restart: unless-stopped

  # =====================
  #  QBITTORRENT
  # =====================
  qbittorrent:
    image: lscr.io/linuxserver/qbittorrent:latest
    container_name: qbittorrent
    network_mode: "service:gluetun"
    depends_on:
      gluetun:
        condition: service_healthy
        restart: true 
    environment:
      - PUID=0
      - PGID=0
      - TZ=redacted
      - WEBUI_PORT=8081
    volumes:
      - /share/CACHEDEV1_DATA/'redacted'/qbittorrent:/config
      - /share/CACHEDEV2_DATA/'redacted':/downloads
      - /share/CACHEDEV3_DATA/'redacted':/downloads2
      - /share/CACHEDEV4_DATA/'redacted':/downloads3
    restart: unless-stopped
    
networks:
  proxy:
    external: true</description><pubDate>Tue, 21 Apr 2026 09:25:53 +0000</pubDate></item></channel></rss>
