. 2020.07.13 00:33:39 - Above log line repeated 1 times more . 2020.07.13 00:33:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 00:33:39 - OpenVPN > VERIFY KU OK . 2020.07.13 00:33:39 - OpenVPN > Validating certificate extended key usage . 2020.07.13 00:33:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 00:33:39 - OpenVPN > VERIFY EKU OK . 2020.07.13 00:33:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 00:33:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 00:33:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 00:33:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 00:42:27 - Collect information about AirVPN completed . 2020.07.13 01:33:39 - Above log line repeated 1 times more . 2020.07.13 01:33:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 01:33:39 - OpenVPN > VERIFY KU OK . 2020.07.13 01:33:39 - OpenVPN > Validating certificate extended key usage . 2020.07.13 01:33:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 01:33:39 - OpenVPN > VERIFY EKU OK . 2020.07.13 01:33:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 01:33:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 01:33:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 01:33:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 01:42:32 - Collect information about AirVPN completed . 2020.07.13 02:33:39 - Above log line repeated 1 times more . 2020.07.13 02:33:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 02:33:39 - OpenVPN > VERIFY KU OK . 2020.07.13 02:33:39 - OpenVPN > Validating certificate extended key usage . 2020.07.13 02:33:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 02:33:39 - OpenVPN > VERIFY EKU OK . 2020.07.13 02:33:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 02:33:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 02:33:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 02:33:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 02:42:38 - Collect information about AirVPN completed . 2020.07.13 03:33:39 - Above log line repeated 1 times more . 2020.07.13 03:33:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 03:33:39 - OpenVPN > VERIFY KU OK . 2020.07.13 03:33:39 - OpenVPN > Validating certificate extended key usage . 2020.07.13 03:33:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 03:33:39 - OpenVPN > VERIFY EKU OK . 2020.07.13 03:33:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 03:33:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 03:33:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 03:33:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 03:42:45 - Collect information about AirVPN completed . 2020.07.13 04:33:39 - Above log line repeated 1 times more . 2020.07.13 04:33:39 - OpenVPN > TLS: soft reset sec=0 bytes=1927307/-1 pkts=5872/0 . 2020.07.13 04:33:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 04:33:39 - OpenVPN > VERIFY KU OK . 2020.07.13 04:33:39 - OpenVPN > Validating certificate extended key usage . 2020.07.13 04:33:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 04:33:39 - OpenVPN > VERIFY EKU OK . 2020.07.13 04:33:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 04:33:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 04:33:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 04:33:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 04:42:51 - Collect information about AirVPN completed . 2020.07.13 05:33:39 - Above log line repeated 1 times more . 2020.07.13 05:33:39 - OpenVPN > TLS: soft reset sec=0 bytes=2661010/-1 pkts=7076/0 . 2020.07.13 05:33:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 05:33:39 - OpenVPN > VERIFY KU OK . 2020.07.13 05:33:39 - OpenVPN > Validating certificate extended key usage . 2020.07.13 05:33:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 05:33:39 - OpenVPN > VERIFY EKU OK . 2020.07.13 05:33:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 05:33:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 05:33:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 05:33:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 05:42:58 - Collect information about AirVPN completed . 2020.07.13 06:33:40 - Above log line repeated 1 times more . 2020.07.13 06:33:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 06:33:40 - OpenVPN > VERIFY KU OK . 2020.07.13 06:33:40 - OpenVPN > Validating certificate extended key usage . 2020.07.13 06:33:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 06:33:40 - OpenVPN > VERIFY EKU OK . 2020.07.13 06:33:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 06:33:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 06:33:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 06:33:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 06:43:06 - Collect information about AirVPN completed . 2020.07.13 07:33:39 - Above log line repeated 1 times more . 2020.07.13 07:33:39 - Renewing TLS key . 2020.07.13 07:33:39 - OpenVPN > TLS: tls_process: killed expiring key . 2020.07.13 07:33:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 07:33:40 - OpenVPN > VERIFY KU OK . 2020.07.13 07:33:40 - OpenVPN > Validating certificate extended key usage . 2020.07.13 07:33:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 07:33:40 - OpenVPN > VERIFY EKU OK . 2020.07.13 07:33:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 07:33:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 07:33:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 07:33:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 07:43:13 - Collect information about AirVPN completed . 2020.07.13 08:33:40 - Above log line repeated 1 times more . 2020.07.13 08:33:40 - Renewing TLS key . 2020.07.13 08:33:40 - OpenVPN > TLS: tls_process: killed expiring key . 2020.07.13 08:33:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 08:33:40 - OpenVPN > VERIFY KU OK . 2020.07.13 08:33:40 - OpenVPN > Validating certificate extended key usage . 2020.07.13 08:33:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 08:33:40 - OpenVPN > VERIFY EKU OK . 2020.07.13 08:33:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 08:33:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 08:33:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 08:33:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 08:43:19 - Collect information about AirVPN completed . 2020.07.13 09:33:40 - Above log line repeated 1 times more . 2020.07.13 09:33:40 - OpenVPN > TLS: soft reset sec=0 bytes=10257174/-1 pkts=40397/0 . 2020.07.13 09:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 09:33:42 - OpenVPN > VERIFY KU OK . 2020.07.13 09:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.13 09:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 09:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.13 09:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 09:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 09:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 09:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 09:43:27 - Collect information about AirVPN completed . 2020.07.13 10:33:40 - Above log line repeated 1 times more . 2020.07.13 10:33:40 - Renewing TLS key . 2020.07.13 10:33:40 - OpenVPN > TLS: tls_process: killed expiring key . 2020.07.13 10:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=10076324/-1 pkts=30663/0 . 2020.07.13 10:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 10:33:42 - OpenVPN > VERIFY KU OK . 2020.07.13 10:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.13 10:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 10:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.13 10:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 10:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 10:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 10:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 10:43:34 - Collect information about AirVPN completed . 2020.07.13 11:33:42 - Above log line repeated 1 times more . 2020.07.13 11:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=6839669/-1 pkts=24527/0 . 2020.07.13 11:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 11:33:42 - OpenVPN > VERIFY KU OK . 2020.07.13 11:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.13 11:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 11:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.13 11:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 11:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 11:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 11:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 11:43:41 - Collect information about AirVPN completed . 2020.07.13 12:33:42 - Above log line repeated 1 times more . 2020.07.13 12:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=8498766/-1 pkts=30042/0 . 2020.07.13 12:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 12:33:42 - OpenVPN > VERIFY KU OK . 2020.07.13 12:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.13 12:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 12:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.13 12:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 12:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 12:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 12:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 12:43:51 - Collect information about AirVPN completed . 2020.07.13 13:33:42 - Above log line repeated 1 times more . 2020.07.13 13:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=97031706/-1 pkts=129483/0 . 2020.07.13 13:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 13:33:42 - OpenVPN > VERIFY KU OK . 2020.07.13 13:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.13 13:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 13:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.13 13:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 13:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 13:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 13:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 13:43:58 - Collect information about AirVPN completed . 2020.07.13 14:33:42 - Above log line repeated 1 times more . 2020.07.13 14:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=16304581/-1 pkts=41913/0 . 2020.07.13 14:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 14:33:42 - OpenVPN > VERIFY KU OK . 2020.07.13 14:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.13 14:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 14:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.13 14:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 14:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 14:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 14:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 14:44:01 - Collect information about AirVPN completed . 2020.07.13 15:33:42 - Above log line repeated 1 times more . 2020.07.13 15:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=11324997/-1 pkts=40586/0 . 2020.07.13 15:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 15:33:42 - OpenVPN > VERIFY KU OK . 2020.07.13 15:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.13 15:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 15:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.13 15:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 15:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 15:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 15:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 15:44:06 - Collect information about AirVPN completed . 2020.07.13 16:33:42 - Above log line repeated 1 times more . 2020.07.13 16:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=8632847/-1 pkts=34379/0 . 2020.07.13 16:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 16:33:42 - OpenVPN > VERIFY KU OK . 2020.07.13 16:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.13 16:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 16:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.13 16:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 16:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 16:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 16:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 16:44:09 - Collect information about AirVPN completed . 2020.07.13 17:33:42 - Above log line repeated 1 times more . 2020.07.13 17:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=9767114/-1 pkts=37807/0 . 2020.07.13 17:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 17:33:42 - OpenVPN > VERIFY KU OK . 2020.07.13 17:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.13 17:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 17:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.13 17:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 17:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 17:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 17:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 17:44:15 - Collect information about AirVPN completed . 2020.07.13 18:33:42 - Above log line repeated 1 times more . 2020.07.13 18:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=7873585/-1 pkts=28079/0 . 2020.07.13 18:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 18:33:42 - OpenVPN > VERIFY KU OK . 2020.07.13 18:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.13 18:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 18:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.13 18:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 18:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 18:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 18:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 18:44:18 - Collect information about AirVPN completed . 2020.07.13 19:33:42 - Above log line repeated 1 times more . 2020.07.13 19:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=9597368/-1 pkts=35523/0 . 2020.07.13 19:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 19:33:42 - OpenVPN > VERIFY KU OK . 2020.07.13 19:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.13 19:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 19:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.13 19:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 19:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 19:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 19:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 19:44:22 - Collect information about AirVPN completed . 2020.07.13 20:33:42 - Above log line repeated 1 times more . 2020.07.13 20:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=10835716/-1 pkts=39181/0 . 2020.07.13 20:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 20:33:42 - OpenVPN > VERIFY KU OK . 2020.07.13 20:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.13 20:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 20:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.13 20:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 20:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 20:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 20:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 20:44:23 - Collect information about AirVPN completed . 2020.07.13 21:33:42 - Above log line repeated 1 times more . 2020.07.13 21:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=10002997/-1 pkts=36029/0 . 2020.07.13 21:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 21:33:42 - OpenVPN > VERIFY KU OK . 2020.07.13 21:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.13 21:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 21:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.13 21:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 21:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 21:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 21:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 21:44:25 - Collect information about AirVPN completed . 2020.07.13 22:33:42 - Above log line repeated 1 times more . 2020.07.13 22:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=23189383/-1 pkts=53394/0 . 2020.07.13 22:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 22:33:42 - OpenVPN > VERIFY KU OK . 2020.07.13 22:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.13 22:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 22:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.13 22:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 22:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 22:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 22:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 22:44:27 - Collect information about AirVPN completed . 2020.07.13 23:33:42 - Above log line repeated 1 times more . 2020.07.13 23:33:42 - OpenVPN > TLS: soft reset sec=0 bytes=13754652/-1 pkts=45526/0 . 2020.07.13 23:33:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.07.13 23:33:42 - OpenVPN > VERIFY KU OK . 2020.07.13 23:33:42 - OpenVPN > Validating certificate extended key usage . 2020.07.13 23:33:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.07.13 23:33:42 - OpenVPN > VERIFY EKU OK . 2020.07.13 23:33:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2020.07.13 23:33:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 23:33:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.07.13 23:33:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.07.13 23:44:29 - Collect information about AirVPN completed