. 2020.07.16 00:33:42 - Above log line repeated 1 times more . 2020.07.16 00:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 00:33:42 - OpenVPN > VERIFY KU OK . 2020.07.16 00:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.16 00:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 00:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.16 00:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 00:33:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 00:33:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 00:33:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 00:48:18 - Collect information about AirVPN completed . 2020.07.16 01:33:42 - Above log line repeated 1 times more . 2020.07.16 01:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 01:33:42 - OpenVPN > VERIFY KU OK . 2020.07.16 01:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.16 01:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 01:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.16 01:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 01:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 01:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 01:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 01:48:18 - Collect information about AirVPN completed . 2020.07.16 02:33:42 - Above log line repeated 1 times more . 2020.07.16 02:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=2155535/-1 pkts=6117/0 . 2020.07.16 02:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 02:33:42 - OpenVPN > VERIFY KU OK . 2020.07.16 02:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.16 02:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 02:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.16 02:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 02:33:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 02:33:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 02:33:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 02:48:19 - Collect information about AirVPN completed . 2020.07.16 03:33:42 - Above log line repeated 1 times more . 2020.07.16 03:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 03:33:42 - OpenVPN > VERIFY KU OK . 2020.07.16 03:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.16 03:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 03:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.16 03:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 03:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 03:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 03:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 03:48:19 - Collect information about AirVPN completed . 2020.07.16 04:33:42 - Above log line repeated 1 times more . 2020.07.16 04:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 04:33:42 - OpenVPN > VERIFY KU OK . 2020.07.16 04:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.16 04:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 04:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.16 04:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 04:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 04:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 04:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 04:48:22 - Collect information about AirVPN completed . 2020.07.16 05:33:42 - Above log line repeated 1 times more . 2020.07.16 05:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=1807860/-1 pkts=5427/0 . 2020.07.16 05:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 05:33:42 - OpenVPN > VERIFY KU OK . 2020.07.16 05:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.16 05:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 05:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.16 05:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 05:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 05:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 05:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 05:48:40 - Collect information about AirVPN completed . 2020.07.16 06:33:42 - Above log line repeated 1 times more . 2020.07.16 06:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 06:33:42 - OpenVPN > VERIFY KU OK . 2020.07.16 06:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.16 06:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 06:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.16 06:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 06:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 06:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 06:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 06:48:41 - Collect information about AirVPN completed . 2020.07.16 07:33:42 - Above log line repeated 1 times more . 2020.07.16 07:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=2583148/-1 pkts=7121/0 . 2020.07.16 07:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 07:33:42 - OpenVPN > VERIFY KU OK . 2020.07.16 07:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.16 07:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 07:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.16 07:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 07:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 07:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 07:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 07:48:45 - Collect information about AirVPN completed . 2020.07.16 08:33:42 - Above log line repeated 1 times more . 2020.07.16 08:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 08:33:42 - OpenVPN > VERIFY KU OK . 2020.07.16 08:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.16 08:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 08:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.16 08:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 08:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 08:33:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 08:33:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 08:48:54 - Collect information about AirVPN completed . 2020.07.16 09:33:42 - Above log line repeated 1 times more . 2020.07.16 09:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=2204072/-1 pkts=6385/0 . 2020.07.16 09:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 09:33:43 - OpenVPN > VERIFY KU OK . 2020.07.16 09:33:43 - OpenVPN > Validating certificate extended key usage . 2020.07.16 09:33:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 09:33:43 - OpenVPN > VERIFY EKU OK . 2020.07.16 09:33:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 09:33:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 09:33:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 09:33:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 09:49:01 - Collect information about AirVPN completed . 2020.07.16 10:33:42 - Above log line repeated 1 times more . 2020.07.16 10:33:42 - Renewing TLS key . 2020.07.16 10:33:42 - OpenVPN > TLS: tls_process: killed expiring key . 2020.07.16 10:33:43 - OpenVPN > TLS: soft reset sec=0 bytes=1806935/-1 pkts=5502/0 . 2020.07.16 10:33:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 10:33:43 - OpenVPN > VERIFY KU OK . 2020.07.16 10:33:43 - OpenVPN > Validating certificate extended key usage . 2020.07.16 10:33:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 10:33:43 - OpenVPN > VERIFY EKU OK . 2020.07.16 10:33:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 10:33:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 10:33:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 10:33:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 10:49:04 - Collect information about AirVPN completed . 2020.07.16 11:33:43 - Above log line repeated 1 times more . 2020.07.16 11:33:43 - OpenVPN > TLS: soft reset sec=0 bytes=32713947/-1 pkts=45665/0 . 2020.07.16 11:33:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 11:33:43 - OpenVPN > VERIFY KU OK . 2020.07.16 11:33:43 - OpenVPN > Validating certificate extended key usage . 2020.07.16 11:33:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 11:33:43 - OpenVPN > VERIFY EKU OK . 2020.07.16 11:33:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 11:33:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 11:33:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 11:33:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 11:49:07 - Collect information about AirVPN completed . 2020.07.16 12:33:43 - Above log line repeated 1 times more . 2020.07.16 12:33:43 - OpenVPN > TLS: soft reset sec=0 bytes=12050176/-1 pkts=16826/0 . 2020.07.16 12:33:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 12:33:43 - OpenVPN > VERIFY KU OK . 2020.07.16 12:33:43 - OpenVPN > Validating certificate extended key usage . 2020.07.16 12:33:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 12:33:43 - OpenVPN > VERIFY EKU OK . 2020.07.16 12:33:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 12:33:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 12:33:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 12:33:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 12:49:10 - Collect information about AirVPN completed . 2020.07.16 13:33:43 - Above log line repeated 1 times more . 2020.07.16 13:33:43 - OpenVPN > TLS: soft reset sec=0 bytes=85994820/-1 pkts=103796/0 . 2020.07.16 13:33:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 13:33:43 - OpenVPN > VERIFY KU OK . 2020.07.16 13:33:43 - OpenVPN > Validating certificate extended key usage . 2020.07.16 13:33:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 13:33:43 - OpenVPN > VERIFY EKU OK . 2020.07.16 13:33:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 13:33:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 13:33:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 13:33:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 13:49:20 - Collect information about AirVPN completed . 2020.07.16 14:33:43 - Above log line repeated 1 times more . 2020.07.16 14:33:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 14:33:43 - OpenVPN > VERIFY KU OK . 2020.07.16 14:33:43 - OpenVPN > Validating certificate extended key usage . 2020.07.16 14:33:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 14:33:43 - OpenVPN > VERIFY EKU OK . 2020.07.16 14:33:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 14:33:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 14:33:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 14:33:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 14:49:32 - Collect information about AirVPN completed . 2020.07.16 15:33:43 - Above log line repeated 1 times more . 2020.07.16 15:33:43 - OpenVPN > TLS: soft reset sec=0 bytes=43984617/-1 pkts=55310/0 . 2020.07.16 15:33:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 15:33:43 - OpenVPN > VERIFY KU OK . 2020.07.16 15:33:43 - OpenVPN > Validating certificate extended key usage . 2020.07.16 15:33:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 15:33:43 - OpenVPN > VERIFY EKU OK . 2020.07.16 15:33:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 15:33:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 15:33:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 15:33:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 15:49:35 - Collect information about AirVPN completed . 2020.07.16 16:33:43 - Above log line repeated 1 times more . 2020.07.16 16:33:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 16:33:43 - OpenVPN > VERIFY KU OK . 2020.07.16 16:33:43 - OpenVPN > Validating certificate extended key usage . 2020.07.16 16:33:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 16:33:43 - OpenVPN > VERIFY EKU OK . 2020.07.16 16:33:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 16:33:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 16:33:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 16:33:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 16:49:38 - Collect information about AirVPN completed . 2020.07.16 17:33:43 - Above log line repeated 1 times more . 2020.07.16 17:33:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 17:33:43 - OpenVPN > VERIFY KU OK . 2020.07.16 17:33:43 - OpenVPN > Validating certificate extended key usage . 2020.07.16 17:33:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 17:33:43 - OpenVPN > VERIFY EKU OK . 2020.07.16 17:33:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 17:33:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 17:33:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 17:33:43 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 17:49:37 - Collect information about AirVPN completed . 2020.07.16 18:33:43 - Above log line repeated 1 times more . 2020.07.16 18:33:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 18:33:43 - OpenVPN > VERIFY KU OK . 2020.07.16 18:33:43 - OpenVPN > Validating certificate extended key usage . 2020.07.16 18:33:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 18:33:43 - OpenVPN > VERIFY EKU OK . 2020.07.16 18:33:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 18:33:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 18:33:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 18:33:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 18:49:40 - Collect information about AirVPN completed . 2020.07.16 19:33:44 - Above log line repeated 1 times more . 2020.07.16 19:33:44 - Renewing TLS key . 2020.07.16 19:33:44 - OpenVPN > TLS: tls_process: killed expiring key . 2020.07.16 19:33:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 19:33:44 - OpenVPN > VERIFY KU OK . 2020.07.16 19:33:44 - OpenVPN > Validating certificate extended key usage . 2020.07.16 19:33:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 19:33:44 - OpenVPN > VERIFY EKU OK . 2020.07.16 19:33:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 19:33:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 19:33:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 19:33:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 19:49:43 - Collect information about AirVPN completed . 2020.07.16 20:33:44 - Above log line repeated 1 times more . 2020.07.16 20:33:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 20:33:44 - OpenVPN > VERIFY KU OK . 2020.07.16 20:33:44 - OpenVPN > Validating certificate extended key usage . 2020.07.16 20:33:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 20:33:44 - OpenVPN > VERIFY EKU OK . 2020.07.16 20:33:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 20:33:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 20:33:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 20:33:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 20:49:47 - Collect information about AirVPN completed . 2020.07.16 21:33:44 - Above log line repeated 1 times more . 2020.07.16 21:33:44 - OpenVPN > TLS: soft reset sec=0 bytes=3804606/-1 pkts=8182/0 . 2020.07.16 21:33:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 21:33:44 - OpenVPN > VERIFY KU OK . 2020.07.16 21:33:44 - OpenVPN > Validating certificate extended key usage . 2020.07.16 21:33:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 21:33:44 - OpenVPN > VERIFY EKU OK . 2020.07.16 21:33:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 21:33:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 21:33:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 21:33:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 21:49:54 - Collect information about AirVPN completed . 2020.07.16 22:32:28 - Above log line repeated 1 times more . 2020.07.16 22:32:28 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2110976 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2020.07.16 22:32:28 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2110977 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2020.07.16 22:33:44 - Above log line repeated 3 times more . 2020.07.16 22:33:44 - OpenVPN > TLS: soft reset sec=0 bytes=2900642466/-1 pkts=4272851/0 . 2020.07.16 22:33:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 22:33:44 - OpenVPN > VERIFY KU OK . 2020.07.16 22:33:44 - OpenVPN > Validating certificate extended key usage . 2020.07.16 22:33:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 22:33:44 - OpenVPN > VERIFY EKU OK . 2020.07.16 22:33:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 22:33:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 22:33:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 22:33:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 22:50:00 - Collect information about AirVPN completed . 2020.07.16 22:59:47 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #4989504 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2020.07.16 23:20:05 - Above log line repeated 1 times more . 2020.07.16 23:20:05 - Collect information about AirVPN completed . 2020.07.16 23:32:29 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #11759391 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2020.07.16 23:33:44 - OpenVPN > TLS: soft reset sec=0 bytes=14758393931/-1 pkts=21539759/0 . 2020.07.16 23:33:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.16 23:33:44 - OpenVPN > VERIFY KU OK . 2020.07.16 23:33:44 - OpenVPN > Validating certificate extended key usage . 2020.07.16 23:33:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.16 23:33:44 - OpenVPN > VERIFY EKU OK . 2020.07.16 23:33:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.16 23:33:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 23:33:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.16 23:33:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.16 23:50:10 - Collect information about AirVPN completed