. 2023.11.16 22:39:52 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.19044.0, Mono/.Net: v4.0.30319 . 2023.11.16 22:39:52 - Command line arguments (1): path="home" . 2023.11.16 22:39:54 - Reading options from C:\Users\Olivia\AppData\Local\Eddie\default.profile . 2023.11.16 22:39:55 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2023.11.16 22:39:55 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2023.11.16 22:39:55 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) ! 2023.11.16 22:39:56 - Activation of Network Lock - Windows Filtering Platform I 2023.11.16 22:39:56 - Ready . 2023.11.16 22:39:57 - Collect information about AirVPN completed I 2023.11.16 22:39:57 - Session starting. I 2023.11.16 22:39:58 - Checking authorization ... . 2023.11.16 22:39:58 - Collect information about AirVPN completed . 2023.11.16 22:39:59 - Added new network interface "Eddie", Wintun version 0.14 . 2023.11.16 22:39:59 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.11.16 22:39:59 - Connecting to Nahn (Canada, Vancouver) . 2023.11.16 22:39:59 - Routes, add 192.30.89.69/32 for interface "Ethernet 2 (Realtek PCIe 2.5GbE Family Controller)". . 2023.11.16 22:39:59 - Routes, add 192.30.89.69/32 for interface "Ethernet 2 (Realtek PCIe 2.5GbE Family Controller)", already exists. . 2023.11.16 22:39:59 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.16 22:39:59 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.16 22:39:59 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.16 22:39:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.16 22:39:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.16 22:39:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.16 22:39:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.16 22:39:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.69:443 . 2023.11.16 22:39:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.16 22:39:59 - OpenVPN > UDP link local: (not bound) . 2023.11.16 22:39:59 - OpenVPN > UDP link remote: [AF_INET]192.30.89.69:443 . 2023.11.16 22:39:59 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.69:443, sid=2ae2f750 190372aa . 2023.11.16 22:39:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.16 22:39:59 - OpenVPN > VERIFY KU OK . 2023.11.16 22:39:59 - OpenVPN > Validating certificate extended key usage . 2023.11.16 22:39:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.16 22:39:59 - OpenVPN > VERIFY EKU OK . 2023.11.16 22:39:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nahn, emailAddress=info@airvpn.org . 2023.11.16 22:39:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.16 22:39:59 - OpenVPN > [Nahn] Peer Connection Initiated with [AF_INET]192.30.89.69:443 . 2023.11.16 22:40:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.35.74.1,dhcp-option DNS6 fde6:7a:7d20:1f4a::1,tun-ipv6,route-gateway 10.35.74.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1f4a::1035/64 fde6:7a:7d20:1f4a::1,ifconfig 10.35.74.55 255.255.255.0,peer-id 9,cipher AES-256-GCM' . 2023.11.16 22:40:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.16 22:40:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.35.74.1' . 2023.11.16 22:40:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1f4a::1' . 2023.11.16 22:40:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.16 22:40:00 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.16 22:40:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.16 22:40:00 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.16 22:40:00 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.16 22:40:00 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.16 22:40:00 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.16 22:40:00 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.16 22:40:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.16 22:40:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.16 22:40:00 - OpenVPN > interactive service msg_channel=0 . 2023.11.16 22:40:00 - OpenVPN > open_tun . 2023.11.16 22:40:00 - OpenVPN > wintun device [Eddie] opened . 2023.11.16 22:40:00 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 10 static 10.35.74.55 255.255.255.0 . 2023.11.16 22:40:00 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 10 all . 2023.11.16 22:40:00 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 10 all . 2023.11.16 22:40:00 - OpenVPN > IPv4 MTU set to 1500 on interface 10 using SetIpInterfaceEntry() . 2023.11.16 22:40:00 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 10 fde6:7a:7d20:1f4a::1035/128 store=active . 2023.11.16 22:40:00 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1f4a::/64 -> fde6:7a:7d20:1f4a::1035 metric 0) dev Eddie . 2023.11.16 22:40:00 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1f4a::/64 10 fe80::8 store=active . 2023.11.16 22:40:00 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2023.11.16 22:40:00 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 10 all . 2023.11.16 22:40:00 - OpenVPN > IPv6 MTU set to 1500 on interface 10 using SetIpInterfaceEntry() . 2023.11.16 22:40:00 - OpenVPN > Initialization Sequence Completed . 2023.11.16 22:40:00 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.11.16 22:40:00 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.11.16 22:40:00 - DNS leak protection with packet filtering enabled. . 2023.11.16 22:40:00 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.35.74.1) . 2023.11.16 22:40:00 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1f4a::1) . 2023.11.16 22:40:00 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.35.74.1) . 2023.11.16 22:40:00 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:1f4a::1) . 2023.11.16 22:40:00 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.16 22:40:01 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.16 22:40:01 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.16 22:40:01 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.16 22:40:01 - Routes, add 192.30.89.67/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.16 22:40:01 - Routes, add 2606:9580:100:e:d075:a67e:1f9c:139d/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.16 22:40:01 - Flushing DNS I 2023.11.16 22:40:01 - Checking route IPv4 I 2023.11.16 22:40:04 - Checking route IPv6 I 2023.11.16 22:40:05 - Checking DNS ! 2023.11.16 22:40:05 - Connected. . 2023.11.16 22:40:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2235 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.16 22:40:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2234 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.16 22:40:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2233 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.16 23:10:02 - Above log line repeated 3414 times more . 2023.11.16 23:10:02 - Collect information about AirVPN completed . 2023.11.16 23:10:02 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #10735389 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.16 23:10:02 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #10735390 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.16 23:10:02 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #10735391 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.16 23:38:59 - Above log line repeated 1104 times more . 2023.11.16 23:38:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.16 23:38:59 - OpenVPN > VERIFY KU OK . 2023.11.16 23:38:59 - OpenVPN > Validating certificate extended key usage . 2023.11.16 23:38:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.16 23:38:59 - OpenVPN > VERIFY EKU OK . 2023.11.16 23:38:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nahn, emailAddress=info@airvpn.org . 2023.11.16 23:38:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.16 23:38:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.16 23:38:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.16 23:39:58 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #18948442 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.16 23:40:04 - Collect information about AirVPN completed . 2023.11.16 23:46:41 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #257633 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.16 23:46:42 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #259114 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.16 23:47:02 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #290395 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 00:10:06 - Above log line repeated 17 times more . 2023.11.17 00:10:06 - Collect information about AirVPN completed . 2023.11.17 00:14:59 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1809326 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 00:15:01 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1812726 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 00:15:03 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1814162 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 00:37:59 - Above log line repeated 15 times more . 2023.11.17 00:37:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 00:37:59 - OpenVPN > VERIFY KU OK . 2023.11.17 00:37:59 - OpenVPN > Validating certificate extended key usage . 2023.11.17 00:37:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 00:37:59 - OpenVPN > VERIFY EKU OK . 2023.11.17 00:37:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nahn, emailAddress=info@airvpn.org . 2023.11.17 00:37:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 00:37:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 00:37:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 00:40:06 - Collect information about AirVPN completed . 2023.11.17 01:10:08 - Collect information about AirVPN completed . 2023.11.17 01:34:13 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2398940 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 01:36:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 01:36:59 - OpenVPN > VERIFY KU OK . 2023.11.17 01:36:59 - OpenVPN > Validating certificate extended key usage . 2023.11.17 01:36:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 01:36:59 - OpenVPN > VERIFY EKU OK . 2023.11.17 01:36:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nahn, emailAddress=info@airvpn.org . 2023.11.17 01:36:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 01:36:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 01:36:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 01:40:10 - Collect information about AirVPN completed . 2023.11.17 02:05:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #580258 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 02:10:14 - Collect information about AirVPN completed . 2023.11.17 02:35:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 02:35:59 - OpenVPN > VERIFY KU OK . 2023.11.17 02:35:59 - OpenVPN > Validating certificate extended key usage . 2023.11.17 02:35:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 02:35:59 - OpenVPN > VERIFY EKU OK . 2023.11.17 02:35:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nahn, emailAddress=info@airvpn.org . 2023.11.17 02:35:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 02:35:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 02:35:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 02:40:17 - Collect information about AirVPN completed . 2023.11.17 02:40:48 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #106682 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 02:45:28 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #262045 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 02:54:15 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #557374 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 03:10:21 - Above log line repeated 3 times more . 2023.11.17 03:10:21 - Collect information about AirVPN completed . 2023.11.17 03:12:05 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1208167 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 03:14:30 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1371369 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 03:14:55 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1393725 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 03:35:01 - Above log line repeated 8 times more . 2023.11.17 03:35:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 03:35:01 - OpenVPN > VERIFY KU OK . 2023.11.17 03:35:01 - OpenVPN > Validating certificate extended key usage . 2023.11.17 03:35:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 03:35:01 - OpenVPN > VERIFY EKU OK . 2023.11.17 03:35:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nahn, emailAddress=info@airvpn.org . 2023.11.17 03:35:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 03:35:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 03:35:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 03:40:22 - Collect information about AirVPN completed . 2023.11.17 03:47:03 - OpenVPN > [Nahn] Inactivity timeout (--ping-restart), restarting . 2023.11.17 03:47:03 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2023.11.17 03:47:03 - OpenVPN > Restart pause, 5 second(s) ! 2023.11.17 03:47:03 - Disconnecting . 2023.11.17 03:47:03 - Sending soft termination signal . 2023.11.17 03:47:08 - OpenVPN > Closing TUN/TAP interface . 2023.11.17 03:47:08 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1f4a::/64) . 2023.11.17 03:47:08 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1f4a::/64 10 fe80::8 store=active . 2023.11.17 03:47:08 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 10 fde6:7a:7d20:1f4a::1035 store=active . 2023.11.17 03:47:08 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 10 10.35.74.55 store=active . 2023.11.17 03:47:08 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2023.11.17 03:47:08 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 03:47:08 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 03:47:08 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 03:47:08 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 03:47:09 - Routes, delete 192.30.89.69/32 for interface "Ethernet 2 (Realtek PCIe 2.5GbE Family Controller)". . 2023.11.17 03:47:09 - Routes, delete 192.30.89.67/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 03:47:09 - Routes, delete 2606:9580:100:e:d075:a67e:1f9c:139d/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 03:47:09 - Routes, delete 192.30.89.69/32 for interface "Ethernet 2 (Realtek PCIe 2.5GbE Family Controller)", not exists. . 2023.11.17 03:47:09 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 03:47:09 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.11.17 03:47:09 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.11.17 03:47:09 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2023.11.17 03:47:09 - DNS leak protection with packet filtering disabled. . 2023.11.17 03:47:09 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.11.17 03:47:09 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.11.17 03:47:09 - Connection terminated. . 2023.11.17 03:47:12 - Waiting for latency tests (248 to go) I 2023.11.17 03:47:16 - Checking authorization ... W 2023.11.17 03:48:40 - Authorization check failed, continue anyway (Fetch url error:Timeout was reached) . 2023.11.17 03:48:40 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.11.17 03:48:40 - Connecting to Titawin (Canada, Vancouver) . 2023.11.17 03:48:41 - Routes, add 192.30.89.61/32 for interface "Ethernet 2 (Realtek PCIe 2.5GbE Family Controller)". . 2023.11.17 03:48:41 - Routes, add 192.30.89.61/32 for interface "Ethernet 2 (Realtek PCIe 2.5GbE Family Controller)", already exists. . 2023.11.17 03:48:41 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.17 03:48:41 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.17 03:48:41 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.17 03:48:41 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 03:48:41 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 03:48:41 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 03:48:41 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 03:48:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.61:443 . 2023.11.17 03:48:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.17 03:48:41 - OpenVPN > UDP link local: (not bound) . 2023.11.17 03:48:41 - OpenVPN > UDP link remote: [AF_INET]192.30.89.61:443 . 2023.11.17 03:49:12 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2023.11.17 03:49:12 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.11.17 03:49:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2023.11.17 03:49:17 - Disconnecting . 2023.11.17 03:49:18 - Routes, delete 192.30.89.61/32 for interface "Ethernet 2 (Realtek PCIe 2.5GbE Family Controller)". . 2023.11.17 03:49:18 - Routes, delete 192.30.89.61/32 for interface "Ethernet 2 (Realtek PCIe 2.5GbE Family Controller)", not exists. . 2023.11.17 03:49:18 - Connection terminated. I 2023.11.17 03:49:21 - Checking authorization ... . 2023.11.17 03:49:21 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.11.17 03:49:21 - Connecting to Pisces (Canada, Vancouver) . 2023.11.17 03:49:21 - Routes, add 192.30.89.29/32 for interface "Ethernet 2 (Realtek PCIe 2.5GbE Family Controller)". . 2023.11.17 03:49:21 - Routes, add 192.30.89.29/32 for interface "Ethernet 2 (Realtek PCIe 2.5GbE Family Controller)", already exists. . 2023.11.17 03:49:21 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.11.17 03:49:21 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.11.17 03:49:21 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.11.17 03:49:21 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 03:49:21 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 03:49:21 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.11.17 03:49:21 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.11.17 03:49:21 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.29:443 . 2023.11.17 03:49:21 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.11.17 03:49:21 - OpenVPN > UDP link local: (not bound) . 2023.11.17 03:49:21 - OpenVPN > UDP link remote: [AF_INET]192.30.89.29:443 . 2023.11.17 03:49:21 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.29:443, sid=7bec31f7 e864fc20 . 2023.11.17 03:49:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 03:49:22 - OpenVPN > VERIFY KU OK . 2023.11.17 03:49:22 - OpenVPN > Validating certificate extended key usage . 2023.11.17 03:49:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 03:49:22 - OpenVPN > VERIFY EKU OK . 2023.11.17 03:49:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org . 2023.11.17 03:49:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 03:49:22 - OpenVPN > [Pisces] Peer Connection Initiated with [AF_INET]192.30.89.29:443 . 2023.11.17 03:49:22 - OpenVPN > SENT CONTROL [Pisces]: 'PUSH_REQUEST' (status=1) . 2023.11.17 03:49:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.234.1,dhcp-option DNS6 fde6:7a:7d20:bea::1,tun-ipv6,route-gateway 10.15.234.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:bea::10ab/64 fde6:7a:7d20:bea::1,ifconfig 10.15.234.173 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2023.11.17 03:49:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.11.17 03:49:22 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.15.234.1' . 2023.11.17 03:49:22 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:bea::1' . 2023.11.17 03:49:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.11.17 03:49:22 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.11.17 03:49:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.11.17 03:49:22 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.11.17 03:49:22 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.11.17 03:49:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.11.17 03:49:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.11.17 03:49:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.11.17 03:49:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 03:49:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 03:49:22 - OpenVPN > interactive service msg_channel=0 . 2023.11.17 03:49:22 - OpenVPN > open_tun . 2023.11.17 03:49:22 - OpenVPN > wintun device [Eddie] opened . 2023.11.17 03:49:22 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 10 static 10.15.234.173 255.255.255.0 . 2023.11.17 03:49:22 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 10 all . 2023.11.17 03:49:22 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 10 all . 2023.11.17 03:49:22 - OpenVPN > IPv4 MTU set to 1500 on interface 10 using SetIpInterfaceEntry() . 2023.11.17 03:49:22 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 10 fde6:7a:7d20:bea::10ab/128 store=active . 2023.11.17 03:49:22 - OpenVPN > add_route_ipv6(fde6:7a:7d20:bea::/64 -> fde6:7a:7d20:bea::10ab metric 0) dev Eddie . 2023.11.17 03:49:22 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:bea::/64 10 fe80::8 store=active . 2023.11.17 03:49:22 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2023.11.17 03:49:23 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 10 all . 2023.11.17 03:49:23 - OpenVPN > IPv6 MTU set to 1500 on interface 10 using SetIpInterfaceEntry() . 2023.11.17 03:49:23 - OpenVPN > Initialization Sequence Completed . 2023.11.17 03:49:23 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.11.17 03:49:23 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.11.17 03:49:23 - DNS leak protection with packet filtering enabled. . 2023.11.17 03:49:23 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.15.234.1) . 2023.11.17 03:49:23 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:bea::1) . 2023.11.17 03:49:23 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.15.234.1) . 2023.11.17 03:49:23 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:bea::1) . 2023.11.17 03:49:23 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 03:49:23 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 03:49:23 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 03:49:23 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 03:49:23 - Routes, add 192.30.89.27/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 03:49:23 - Routes, add 2606:9580:103:a:fda7:1f4c:8c40:8c3e/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.11.17 03:49:23 - Flushing DNS I 2023.11.17 03:49:23 - Checking route IPv4 I 2023.11.17 03:49:27 - Checking route IPv6 I 2023.11.17 03:49:27 - Checking DNS ! 2023.11.17 03:49:28 - Connected. . 2023.11.17 03:54:16 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #103782 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 04:06:18 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #745107 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 04:08:50 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #900156 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 04:10:21 - Collect information about AirVPN completed . 2023.11.17 04:15:13 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1288026 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 04:38:05 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2237980 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 04:39:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2313212 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 04:40:23 - Above log line repeated 2 times more . 2023.11.17 04:40:23 - Collect information about AirVPN completed . 2023.11.17 04:40:30 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2400900 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 04:40:53 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2443029 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 04:40:53 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2443038 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 04:44:11 - Above log line repeated 9 times more . 2023.11.17 04:44:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 04:44:11 - OpenVPN > VERIFY KU OK . 2023.11.17 04:44:11 - OpenVPN > Validating certificate extended key usage . 2023.11.17 04:44:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 04:44:11 - OpenVPN > VERIFY EKU OK . 2023.11.17 04:44:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org . 2023.11.17 04:44:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 04:44:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 04:44:11 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 04:46:46 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #94319 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 05:10:32 - Collect information about AirVPN completed . 2023.11.17 05:12:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1900861 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 05:12:26 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1905508 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 05:12:26 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1905521 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 05:39:01 - Above log line repeated 15 times more . 2023.11.17 05:39:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 05:39:01 - OpenVPN > VERIFY KU OK . 2023.11.17 05:39:01 - OpenVPN > Validating certificate extended key usage . 2023.11.17 05:39:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 05:39:01 - OpenVPN > VERIFY EKU OK . 2023.11.17 05:39:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org . 2023.11.17 05:39:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 05:39:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 05:39:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 05:40:29 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #28197 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 05:40:32 - Collect information about AirVPN completed . 2023.11.17 05:43:06 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #177960 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 05:43:06 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #177944 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 05:43:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #179362 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 06:10:32 - Above log line repeated 2 times more . 2023.11.17 06:10:32 - Collect information about AirVPN completed . 2023.11.17 06:15:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1693038 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 06:15:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1693039 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 06:15:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1693040 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 06:33:51 - Above log line repeated 112 times more . 2023.11.17 06:33:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 06:33:51 - OpenVPN > VERIFY KU OK . 2023.11.17 06:33:51 - OpenVPN > Validating certificate extended key usage . 2023.11.17 06:33:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 06:33:51 - OpenVPN > VERIFY EKU OK . 2023.11.17 06:33:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org . 2023.11.17 06:33:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:33:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 06:33:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 06:40:33 - Collect information about AirVPN completed . 2023.11.17 07:10:33 - Collect information about AirVPN completed . 2023.11.17 07:25:33 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2485189 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 07:28:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.11.17 07:28:41 - OpenVPN > VERIFY KU OK . 2023.11.17 07:28:41 - OpenVPN > Validating certificate extended key usage . 2023.11.17 07:28:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.11.17 07:28:41 - OpenVPN > VERIFY EKU OK . 2023.11.17 07:28:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org . 2023.11.17 07:28:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 07:28:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.11.17 07:28:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.11.17 07:37:53 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #466552 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 07:37:53 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #466551 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.11.17 07:40:34 - Collect information about AirVPN completed . 2023.11.17 07:43:57 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #714487 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings