. 2020.07.14 00:33:42 - Above log line repeated 1 times more . 2020.07.14 00:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 00:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 00:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 00:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 00:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 00:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 00:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 00:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 00:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 00:44:30 - Collect information about AirVPN completed . 2020.07.14 01:33:41 - Above log line repeated 1 times more . 2020.07.14 01:33:41 - Renewing TLS key . 2020.07.14 01:33:41 - OpenVPN > TLS: tls_process: killed expiring key . 2020.07.14 01:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=18556544/-1 pkts=48189/0 . 2020.07.14 01:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 01:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 01:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 01:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 01:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 01:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 01:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 01:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 01:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 01:44:31 - Collect information about AirVPN completed . 2020.07.14 02:33:42 - Above log line repeated 1 times more . 2020.07.14 02:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=11014871/-1 pkts=38915/0 . 2020.07.14 02:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 02:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 02:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 02:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 02:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 02:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 02:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 02:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 02:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 02:44:32 - Collect information about AirVPN completed . 2020.07.14 03:33:42 - Above log line repeated 1 times more . 2020.07.14 03:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=11625953/-1 pkts=42822/0 . 2020.07.14 03:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 03:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 03:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 03:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 03:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 03:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 03:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 03:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 03:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 03:44:41 - Collect information about AirVPN completed . 2020.07.14 04:33:42 - Above log line repeated 1 times more . 2020.07.14 04:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=13404770/-1 pkts=49001/0 . 2020.07.14 04:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 04:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 04:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 04:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 04:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 04:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 04:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 04:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 04:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 04:44:42 - Collect information about AirVPN completed . 2020.07.14 05:33:42 - Above log line repeated 1 times more . 2020.07.14 05:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=17720298/-1 pkts=66241/0 . 2020.07.14 05:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 05:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 05:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 05:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 05:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 05:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 05:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 05:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 05:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 05:44:52 - Collect information about AirVPN completed . 2020.07.14 06:33:42 - Above log line repeated 1 times more . 2020.07.14 06:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=14020241/-1 pkts=49837/0 . 2020.07.14 06:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 06:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 06:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 06:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 06:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 06:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 06:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 06:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 06:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 06:45:01 - Collect information about AirVPN completed . 2020.07.14 07:33:42 - Above log line repeated 1 times more . 2020.07.14 07:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=19365787/-1 pkts=67146/0 . 2020.07.14 07:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 07:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 07:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 07:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 07:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 07:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 07:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 07:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 07:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 07:45:01 - Collect information about AirVPN completed . 2020.07.14 08:33:42 - Above log line repeated 1 times more . 2020.07.14 08:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=14222630/-1 pkts=50881/0 . 2020.07.14 08:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 08:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 08:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 08:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 08:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 08:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 08:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 08:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 08:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 08:45:10 - Collect information about AirVPN completed . 2020.07.14 09:33:42 - Above log line repeated 1 times more . 2020.07.14 09:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=16927618/-1 pkts=60454/0 . 2020.07.14 09:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 09:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 09:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 09:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 09:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 09:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 09:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 09:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 09:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 09:45:11 - Collect information about AirVPN completed . 2020.07.14 10:33:42 - Above log line repeated 1 times more . 2020.07.14 10:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=14524957/-1 pkts=49351/0 . 2020.07.14 10:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 10:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 10:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 10:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 10:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 10:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 10:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 10:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 10:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 10:45:13 - Collect information about AirVPN completed . 2020.07.14 11:33:42 - Above log line repeated 1 times more . 2020.07.14 11:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=17385292/-1 pkts=60876/0 . 2020.07.14 11:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 11:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 11:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 11:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 11:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 11:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 11:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 11:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 11:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 11:45:13 - Collect information about AirVPN completed . 2020.07.14 12:33:42 - Above log line repeated 1 times more . 2020.07.14 12:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=220989497/-1 pkts=292899/0 . 2020.07.14 12:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 12:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 12:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 12:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 12:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 12:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 12:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 12:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 12:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 12:45:14 - Collect information about AirVPN completed . 2020.07.14 13:33:42 - Above log line repeated 1 times more . 2020.07.14 13:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=149835662/-1 pkts=213427/0 . 2020.07.14 13:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 13:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 13:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 13:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 13:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 13:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 13:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 13:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 13:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 13:45:16 - Collect information about AirVPN completed . 2020.07.14 14:33:42 - Above log line repeated 1 times more . 2020.07.14 14:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=14371828/-1 pkts=52699/0 . 2020.07.14 14:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 14:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 14:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 14:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 14:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 14:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 14:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 14:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 14:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 14:45:22 - Collect information about AirVPN completed . 2020.07.14 15:33:42 - Above log line repeated 1 times more . 2020.07.14 15:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=15953245/-1 pkts=56743/0 . 2020.07.14 15:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 15:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 15:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 15:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 15:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 15:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 15:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 15:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 15:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 15:45:31 - Collect information about AirVPN completed . 2020.07.14 16:33:42 - Above log line repeated 1 times more . 2020.07.14 16:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=148918453/-1 pkts=194502/0 . 2020.07.14 16:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 16:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 16:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 16:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 16:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 16:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 16:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 16:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 16:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 16:45:33 - Collect information about AirVPN completed . 2020.07.14 17:33:42 - Above log line repeated 1 times more . 2020.07.14 17:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=22492310/-1 pkts=64460/0 . 2020.07.14 17:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 17:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 17:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 17:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 17:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 17:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 17:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 17:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 17:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 17:45:34 - Collect information about AirVPN completed . 2020.07.14 18:33:42 - Above log line repeated 1 times more . 2020.07.14 18:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=21213479/-1 pkts=59998/0 . 2020.07.14 18:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 18:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 18:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 18:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 18:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 18:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 18:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 18:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 18:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 18:45:36 - Collect information about AirVPN completed . 2020.07.14 19:33:42 - Above log line repeated 1 times more . 2020.07.14 19:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=15338218/-1 pkts=54388/0 . 2020.07.14 19:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 19:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 19:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 19:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 19:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 19:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 19:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 19:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 19:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 19:45:37 - Collect information about AirVPN completed . 2020.07.14 20:33:42 - Above log line repeated 1 times more . 2020.07.14 20:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=25904421/-1 pkts=65796/0 . 2020.07.14 20:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 20:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 20:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 20:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 20:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 20:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 20:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 20:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 20:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 20:45:38 - Collect information about AirVPN completed . 2020.07.14 21:33:42 - Above log line repeated 1 times more . 2020.07.14 21:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=17421674/-1 pkts=59680/0 . 2020.07.14 21:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 21:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 21:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 21:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 21:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 21:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 21:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 21:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 21:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 21:45:40 - Collect information about AirVPN completed . 2020.07.14 22:33:42 - Above log line repeated 1 times more . 2020.07.14 22:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=29455320/-1 pkts=81567/0 . 2020.07.14 22:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 22:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 22:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 22:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 22:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 22:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 22:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 22:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 22:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 22:45:45 - Collect information about AirVPN completed . 2020.07.14 23:33:42 - Above log line repeated 1 times more . 2020.07.14 23:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=21773769/-1 pkts=65790/0 . 2020.07.14 23:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.14 23:33:42 - OpenVPN > VERIFY KU OK . 2020.07.14 23:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.14 23:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.14 23:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.14 23:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.14 23:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 23:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.14 23:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.14 23:45:47 - Collect information about AirVPN completed