Eddie System/Environment Report - 5/25/2024 12:19 AM UTC Eddie version: 2.16.3 Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: Ubuntu 22.04.4 LTS \n \l OS version: Linux Alpha-Wild-Dog-Pro 6.8.0-76060800daily20240311-generic #202403110203~1715181801~22.04~aba43ee~dev-Ubuntu SMP PREEMPT_DY x86_64 x86_64 x86_64 GNU/Linux OS architecture: x64 Mono /.Net Framework: 6.8.0.105 (Debian 6.8.0.105+dfsg-3.2 Wed Jun 30 05:34:49 UTC 2021); Framework: v4.0.30319 OpenVPN driver: Found, /dev/net/tun OpenVPN: 2.5.9 - OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 (/usr/sbin/openvpn) SSH: OpenSSH_8.9p1 Ubuntu-3ubuntu0.7, OpenSSL 3.0.2 15 Mar 2022 (/usr/bin/ssh) SSL: Initializing (/usr/bin/stunnel4) curl: 7.81.0 (/usr/bin/curl) Profile path: /home/ironmike/.airvpn/default.xml Data path: /home/ironmike/.airvpn Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/Eddie-UI.exe Command line arguments: (5 args) path="/home/ironmike/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus" Network Lock Active: No Connected to VPN: No Detected DNS: 127.0.0.53 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 38 ms Test Ping IPv6: -1 ms Test HTTP IPv4: Ok Test HTTP IPv6: Error:curl: (7) Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True key: (omissis) network.ipv6.mode: in ---------------------------- Logs: . 2024.05.24 19:08:12 - Eddie version: 2.16.3 / linux_x64, System: Linux, Name: Ubuntu 22.04.4 LTS \n \l, Version: Linux Alpha-Wild-Dog-Pro 6.8.0-76060800daily20240311-generic #202403110203~1715181801~22.04~aba43ee~dev-Ubuntu SMP PREEMPT_DY x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 6.8.0.105 (Debian 6.8.0.105+dfsg-3.2 Wed Jun 30 05:34:49 UTC 2021); Framework: v4.0.30319 . 2024.05.24 19:08:12 - Reading options from /home/ironmike/.airvpn/default.xml . 2024.05.24 19:08:13 - Command line arguments (5): path="/home/ironmike/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus" . 2024.05.24 19:08:13 - Profile path: /home/ironmike/.airvpn/default.xml . 2024.05.24 19:08:14 - OpenVPN Driver - Found, /dev/net/tun . 2024.05.24 19:08:14 - OpenVPN - Version: 2.5.9 - OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 (/usr/sbin/openvpn) . 2024.05.24 19:08:14 - SSH - Version: OpenSSH_8.9p1 Ubuntu-3ubuntu0.7, OpenSSL 3.0.2 15 Mar 2022 (/usr/bin/ssh) . 2024.05.24 19:08:14 - SSL - Version: Initializing (/usr/bin/stunnel4) . 2024.05.24 19:08:14 - curl - Version: 7.81.0 (/usr/bin/curl) . 2024.05.24 19:08:14 - Certification Authorities: /usr/share/eddie-ui/cacert.pem . 2024.05.24 19:08:14 - Updating systems & servers data ... I 2024.05.24 19:08:14 - Ready . 2024.05.24 19:08:15 - Systems & servers data update completed I 2024.05.24 19:08:20 - Session starting. I 2024.05.24 19:08:20 - Checking authorization ... ! 2024.05.24 19:08:21 - Connecting to Wurren (Canada, Toronto, Ontario) . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 TCP/UDP: Preserving recently used remote address: [AF_INET]199.189.27.125:443 . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 UDP link local: (not bound) . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 UDP link remote: [AF_INET]199.189.27.125:443 . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 TLS: Initial packet from [AF_INET]199.189.27.125:443, sid=9815248c 4d4183bf . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 TLS Error: TLS handshake failed . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 Restart pause, 5 second(s) ! 2024.05.24 19:08:21 - Disconnecting . 2024.05.24 19:08:21 - Sending soft termination signal . 2024.05.24 19:08:21 - OpenVPN > 2024-05-24 19:08:21 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:08:21 - Connection terminated. I 2024.05.24 19:08:24 - Checking authorization ... ! 2024.05.24 19:08:24 - Connecting to Cephei (Canada, Toronto, Ontario) . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:24 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:24 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:24 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:24 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:24 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:24 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:24 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:24 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:24 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.165:443 . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:24 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:24 UDP link local: (not bound) . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:24 UDP link remote: [AF_INET]184.75.214.165:443 . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:25 TLS: Initial packet from [AF_INET]184.75.214.165:443, sid=ac197e15 34b119fe . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:25 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:25 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:25 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:25 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:25 TLS Error: TLS handshake failed . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:25 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:25 Restart pause, 5 second(s) ! 2024.05.24 19:08:25 - Disconnecting . 2024.05.24 19:08:25 - Sending soft termination signal . 2024.05.24 19:08:25 - OpenVPN > 2024-05-24 19:08:25 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:08:25 - Connection terminated. I 2024.05.24 19:08:28 - Checking authorization ... ! 2024.05.24 19:08:28 - Connecting to Lesath (Canada, Toronto, Ontario) . 2024.05.24 19:08:28 - OpenVPN > 2024-05-24 19:08:28 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:08:28 - OpenVPN > 2024-05-24 19:08:28 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:08:28 - OpenVPN > 2024-05-24 19:08:28 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:08:28 - OpenVPN > 2024-05-24 19:08:28 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:08:28 - OpenVPN > 2024-05-24 19:08:28 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:28 - OpenVPN > 2024-05-24 19:08:28 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:28 - OpenVPN > 2024-05-24 19:08:28 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:28 - OpenVPN > 2024-05-24 19:08:28 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:28 - OpenVPN > 2024-05-24 19:08:28 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.5:443 . 2024.05.24 19:08:28 - OpenVPN > 2024-05-24 19:08:28 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:08:28 - OpenVPN > 2024-05-24 19:08:28 UDP link local: (not bound) . 2024.05.24 19:08:28 - OpenVPN > 2024-05-24 19:08:28 UDP link remote: [AF_INET]184.75.221.5:443 . 2024.05.24 19:08:28 - OpenVPN > 2024-05-24 19:08:28 TLS: Initial packet from [AF_INET]184.75.221.5:443, sid=dbca7817 c3fe71e9 . 2024.05.24 19:08:29 - OpenVPN > 2024-05-24 19:08:29 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:08:29 - OpenVPN > 2024-05-24 19:08:29 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:08:29 - OpenVPN > 2024-05-24 19:08:29 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:08:29 - OpenVPN > 2024-05-24 19:08:29 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:08:29 - OpenVPN > 2024-05-24 19:08:29 TLS Error: TLS handshake failed . 2024.05.24 19:08:29 - OpenVPN > 2024-05-24 19:08:29 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:08:29 - OpenVPN > 2024-05-24 19:08:29 Restart pause, 5 second(s) ! 2024.05.24 19:08:29 - Disconnecting . 2024.05.24 19:08:29 - Sending soft termination signal . 2024.05.24 19:08:29 - OpenVPN > 2024-05-24 19:08:29 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:08:29 - Connection terminated. I 2024.05.24 19:08:32 - Checking authorization ... ! 2024.05.24 19:08:32 - Connecting to Alhena (Canada, Toronto, Ontario) . 2024.05.24 19:08:32 - OpenVPN > 2024-05-24 19:08:32 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:08:32 - OpenVPN > 2024-05-24 19:08:32 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:08:32 - OpenVPN > 2024-05-24 19:08:32 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:08:32 - OpenVPN > 2024-05-24 19:08:32 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:08:32 - OpenVPN > 2024-05-24 19:08:32 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:32 - OpenVPN > 2024-05-24 19:08:32 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:32 - OpenVPN > 2024-05-24 19:08:32 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:32 - OpenVPN > 2024-05-24 19:08:32 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:32 - OpenVPN > 2024-05-24 19:08:32 TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.5:443 . 2024.05.24 19:08:32 - OpenVPN > 2024-05-24 19:08:32 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:08:32 - OpenVPN > 2024-05-24 19:08:32 UDP link local: (not bound) . 2024.05.24 19:08:32 - OpenVPN > 2024-05-24 19:08:32 UDP link remote: [AF_INET]162.219.176.5:443 . 2024.05.24 19:08:32 - OpenVPN > 2024-05-24 19:08:32 TLS: Initial packet from [AF_INET]162.219.176.5:443, sid=dce0fe12 27cad01a . 2024.05.24 19:08:33 - OpenVPN > 2024-05-24 19:08:32 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:08:33 - OpenVPN > 2024-05-24 19:08:32 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:08:33 - OpenVPN > 2024-05-24 19:08:32 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:08:33 - OpenVPN > 2024-05-24 19:08:32 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:08:33 - OpenVPN > 2024-05-24 19:08:32 TLS Error: TLS handshake failed . 2024.05.24 19:08:33 - OpenVPN > 2024-05-24 19:08:32 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:08:33 - OpenVPN > 2024-05-24 19:08:32 Restart pause, 5 second(s) ! 2024.05.24 19:08:33 - Disconnecting . 2024.05.24 19:08:33 - Sending soft termination signal . 2024.05.24 19:08:33 - OpenVPN > 2024-05-24 19:08:33 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:08:33 - Connection terminated. I 2024.05.24 19:08:36 - Checking authorization ... ! 2024.05.24 19:08:36 - Connecting to Agena (Canada, Toronto, Ontario) . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.213:443 . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 UDP link local: (not bound) . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 UDP link remote: [AF_INET]184.75.223.213:443 . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 TLS: Initial packet from [AF_INET]184.75.223.213:443, sid=567a23e0 fdce91bf . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 TLS Error: TLS handshake failed . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 Restart pause, 5 second(s) ! 2024.05.24 19:08:36 - Disconnecting . 2024.05.24 19:08:36 - Sending soft termination signal . 2024.05.24 19:08:36 - OpenVPN > 2024-05-24 19:08:36 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:08:36 - Connection terminated. I 2024.05.24 19:08:40 - Checking authorization ... ! 2024.05.24 19:08:40 - Connecting to Mintaka (Canada, Toronto, Ontario) . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.221:443 . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 UDP link local: (not bound) . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 UDP link remote: [AF_INET]184.75.223.221:443 . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 TLS: Initial packet from [AF_INET]184.75.223.221:443, sid=8be04ade 1f21e93d . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 TLS Error: TLS handshake failed . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 Restart pause, 5 second(s) ! 2024.05.24 19:08:40 - Disconnecting . 2024.05.24 19:08:40 - Sending soft termination signal . 2024.05.24 19:08:40 - OpenVPN > 2024-05-24 19:08:40 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:08:40 - Connection terminated. I 2024.05.24 19:08:43 - Checking authorization ... ! 2024.05.24 19:08:44 - Connecting to Sualocin (Canada, Toronto, Ontario) . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.45:443 . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 UDP link local: (not bound) . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 UDP link remote: [AF_INET]184.75.221.45:443 . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 TLS: Initial packet from [AF_INET]184.75.221.45:443, sid=30cc0af3 108e06df . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 TLS Error: TLS handshake failed . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 Restart pause, 5 second(s) ! 2024.05.24 19:08:44 - Disconnecting . 2024.05.24 19:08:44 - Sending soft termination signal . 2024.05.24 19:08:44 - OpenVPN > 2024-05-24 19:08:44 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:08:44 - Connection terminated. I 2024.05.24 19:08:47 - Checking authorization ... ! 2024.05.24 19:08:48 - Connecting to Nahn (Canada, Vancouver) . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.69:443 . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 UDP link local: (not bound) . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 UDP link remote: [AF_INET]192.30.89.69:443 . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 TLS: Initial packet from [AF_INET]192.30.89.69:443, sid=61723e3c 12cecd62 . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 TLS Error: TLS handshake failed . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 Restart pause, 5 second(s) ! 2024.05.24 19:08:48 - Disconnecting . 2024.05.24 19:08:48 - Sending soft termination signal . 2024.05.24 19:08:48 - OpenVPN > 2024-05-24 19:08:48 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:08:48 - Connection terminated. I 2024.05.24 19:08:51 - Checking authorization ... ! 2024.05.24 19:08:52 - Connecting to Ukdah (Canada, Toronto, Ontario) . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.61:443 . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 UDP link local: (not bound) . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 UDP link remote: [AF_INET]184.75.221.61:443 . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 TLS: Initial packet from [AF_INET]184.75.221.61:443, sid=83c002fe 8bc1edfd . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 TLS Error: TLS handshake failed . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 Restart pause, 5 second(s) ! 2024.05.24 19:08:52 - Disconnecting . 2024.05.24 19:08:52 - Sending soft termination signal . 2024.05.24 19:08:52 - OpenVPN > 2024-05-24 19:08:52 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:08:52 - Connection terminated. I 2024.05.24 19:08:55 - Checking authorization ... ! 2024.05.24 19:08:56 - Connecting to Sham (Canada, Vancouver) . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.77:443 . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 UDP link local: (not bound) . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 UDP link remote: [AF_INET]192.30.89.77:443 . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 TLS: Initial packet from [AF_INET]192.30.89.77:443, sid=2dbb7b6e b859f444 . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 TLS Error: TLS handshake failed . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 Restart pause, 5 second(s) ! 2024.05.24 19:08:56 - Disconnecting . 2024.05.24 19:08:56 - Sending soft termination signal . 2024.05.24 19:08:56 - OpenVPN > 2024-05-24 19:08:56 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:08:56 - Connection terminated. I 2024.05.24 19:08:59 - Checking authorization ... ! 2024.05.24 19:09:00 - Connecting to Pisces (Canada, Vancouver) . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.29:443 . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 UDP link local: (not bound) . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 UDP link remote: [AF_INET]192.30.89.29:443 . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 TLS: Initial packet from [AF_INET]192.30.89.29:443, sid=94fe694e f5f20533 . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 TLS Error: TLS handshake failed . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 Restart pause, 5 second(s) ! 2024.05.24 19:09:00 - Disconnecting . 2024.05.24 19:09:00 - Sending soft termination signal . 2024.05.24 19:09:00 - OpenVPN > 2024-05-24 19:09:00 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:09:00 - Connection terminated. I 2024.05.24 19:09:03 - Checking authorization ... ! 2024.05.24 19:09:04 - Connecting to Telescopium (Canada, Vancouver) . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:443 . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 UDP link local: (not bound) . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 UDP link remote: [AF_INET]192.30.89.53:443 . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 TLS: Initial packet from [AF_INET]192.30.89.53:443, sid=f7bb1a96 46c9b6b8 . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 TLS Error: TLS handshake failed . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 Restart pause, 5 second(s) ! 2024.05.24 19:09:04 - Disconnecting . 2024.05.24 19:09:04 - Sending soft termination signal . 2024.05.24 19:09:04 - OpenVPN > 2024-05-24 19:09:04 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:09:04 - Connection terminated. I 2024.05.24 19:09:07 - Checking authorization ... ! 2024.05.24 19:09:08 - Connecting to Avior (Canada, Toronto, Ontario) . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.237:443 . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 UDP link local: (not bound) . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 UDP link remote: [AF_INET]184.75.223.237:443 . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 TLS: Initial packet from [AF_INET]184.75.223.237:443, sid=3c6849cf 7c1cf761 . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 TLS Error: TLS handshake failed . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 Restart pause, 5 second(s) ! 2024.05.24 19:09:08 - Disconnecting . 2024.05.24 19:09:08 - Sending soft termination signal . 2024.05.24 19:09:08 - OpenVPN > 2024-05-24 19:09:08 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:09:08 - Connection terminated. I 2024.05.24 19:09:11 - Checking authorization ... ! 2024.05.24 19:09:12 - Connecting to Titawin (Canada, Vancouver) . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.61:443 . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 UDP link local: (not bound) . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 UDP link remote: [AF_INET]192.30.89.61:443 . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 TLS: Initial packet from [AF_INET]192.30.89.61:443, sid=cd4260e4 24c3e361 . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 TLS Error: TLS handshake failed . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 Restart pause, 5 second(s) ! 2024.05.24 19:09:12 - Disconnecting . 2024.05.24 19:09:12 - Sending soft termination signal . 2024.05.24 19:09:12 - OpenVPN > 2024-05-24 19:09:12 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:09:12 - Connection terminated. I 2024.05.24 19:09:15 - Checking authorization ... ! 2024.05.24 19:09:16 - Connecting to Lacerta (Canada, Montreal) . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 TCP/UDP: Preserving recently used remote address: [AF_INET]87.101.92.173:443 . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 UDP link local: (not bound) . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 UDP link remote: [AF_INET]87.101.92.173:443 . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 TLS: Initial packet from [AF_INET]87.101.92.173:443, sid=b0060cd0 7aa2f99d . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 TLS Error: TLS handshake failed . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 Restart pause, 5 second(s) ! 2024.05.24 19:09:16 - Disconnecting . 2024.05.24 19:09:16 - Sending soft termination signal . 2024.05.24 19:09:16 - OpenVPN > 2024-05-24 19:09:16 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:09:16 - Connection terminated. I 2024.05.24 19:09:19 - Checking authorization ... ! 2024.05.24 19:09:20 - Connecting to Regulus (Canada, Toronto, Ontario) . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.37:443 . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 UDP link local: (not bound) . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 UDP link remote: [AF_INET]184.75.221.37:443 . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 TLS: Initial packet from [AF_INET]184.75.221.37:443, sid=0858cc32 00cad6b7 . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 TLS Error: TLS handshake failed . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 Restart pause, 5 second(s) ! 2024.05.24 19:09:20 - Disconnecting . 2024.05.24 19:09:20 - Sending soft termination signal . 2024.05.24 19:09:20 - OpenVPN > 2024-05-24 19:09:20 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:09:20 - Connection terminated. I 2024.05.24 19:09:23 - Checking authorization ... ! 2024.05.24 19:09:24 - Connecting to Diadema (Belgium, Brussels) . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.165:443 . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 UDP link local: (not bound) . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 UDP link remote: [AF_INET]194.187.251.165:443 . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 TLS: Initial packet from [AF_INET]194.187.251.165:443, sid=7501f99c 54552267 . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 TLS Error: TLS handshake failed . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 Restart pause, 5 second(s) ! 2024.05.24 19:09:24 - Disconnecting . 2024.05.24 19:09:24 - Sending soft termination signal . 2024.05.24 19:09:24 - OpenVPN > 2024-05-24 19:09:24 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:09:24 - Connection terminated. I 2024.05.24 19:09:27 - Checking authorization ... ! 2024.05.24 19:09:28 - Connecting to Mebsuta (Belgium, Brussels) . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.157:443 . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 UDP link local: (not bound) . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 UDP link remote: [AF_INET]194.187.251.157:443 . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 TLS: Initial packet from [AF_INET]194.187.251.157:443, sid=f18cef07 4da0e343 . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 TLS Error: TLS handshake failed . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 Restart pause, 5 second(s) ! 2024.05.24 19:09:28 - Disconnecting . 2024.05.24 19:09:28 - Sending soft termination signal . 2024.05.24 19:09:28 - OpenVPN > 2024-05-24 19:09:28 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:09:28 - Connection terminated. I 2024.05.24 19:09:31 - Checking authorization ... ! 2024.05.24 19:09:32 - Connecting to Dalim (Netherlands, Alblasserdam) . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.213:443 . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 UDP link local: (not bound) . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 UDP link remote: [AF_INET]134.19.179.213:443 . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 TLS: Initial packet from [AF_INET]134.19.179.213:443, sid=60d493b9 83ef3c79 . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 TLS Error: TLS handshake failed . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 Restart pause, 5 second(s) ! 2024.05.24 19:09:32 - Disconnecting . 2024.05.24 19:09:32 - Sending soft termination signal . 2024.05.24 19:09:32 - OpenVPN > 2024-05-24 19:09:32 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:09:32 - Connection terminated. I 2024.05.24 19:09:35 - Checking authorization ... ! 2024.05.24 19:09:36 - Connecting to Piautos (Netherlands, Alblasserdam) . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.178.169:443 . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 UDP link local: (not bound) . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 UDP link remote: [AF_INET]134.19.178.169:443 . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 TLS: Initial packet from [AF_INET]134.19.178.169:443, sid=0860e800 b896be35 . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 TLS Error: TLS handshake failed . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 Restart pause, 5 second(s) ! 2024.05.24 19:09:36 - Disconnecting . 2024.05.24 19:09:36 - Sending soft termination signal . 2024.05.24 19:09:36 - OpenVPN > 2024-05-24 19:09:36 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:09:36 - Connection terminated. I 2024.05.24 19:09:39 - Checking authorization ... ! 2024.05.24 19:09:40 - Connecting to Tyl (Canada, Toronto, Ontario) . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.205:443 . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 UDP link local: (not bound) . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 UDP link remote: [AF_INET]184.75.223.205:443 . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 TLS: Initial packet from [AF_INET]184.75.223.205:443, sid=64b337ac 7da1f249 . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 TLS Error: TLS handshake failed . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 Restart pause, 5 second(s) ! 2024.05.24 19:09:40 - Disconnecting . 2024.05.24 19:09:40 - Sending soft termination signal . 2024.05.24 19:09:40 - OpenVPN > 2024-05-24 19:09:40 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:09:40 - Connection terminated. I 2024.05.24 19:09:43 - Checking authorization ... ! 2024.05.24 19:09:44 - Connecting to Castor (Belgium, Brussels) . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 TCP/UDP: Preserving recently used remote address: [AF_INET]91.207.57.117:443 . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 UDP link local: (not bound) . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 UDP link remote: [AF_INET]91.207.57.117:443 . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 TLS: Initial packet from [AF_INET]91.207.57.117:443, sid=c461490f 1553af68 . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 TLS Error: TLS handshake failed . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 Restart pause, 5 second(s) ! 2024.05.24 19:09:44 - Disconnecting . 2024.05.24 19:09:44 - Sending soft termination signal . 2024.05.24 19:09:44 - OpenVPN > 2024-05-24 19:09:44 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:09:44 - Connection terminated. I 2024.05.24 19:09:47 - Checking authorization ... ! 2024.05.24 19:09:48 - Connecting to Canis (Netherlands, Alblasserdam) . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.221:443 . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 UDP link local: (not bound) . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 UDP link remote: [AF_INET]213.152.161.221:443 . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 TLS: Initial packet from [AF_INET]213.152.161.221:443, sid=c30f074f 1d544eb1 . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 TLS Error: TLS handshake failed . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 Restart pause, 5 second(s) ! 2024.05.24 19:09:48 - Disconnecting . 2024.05.24 19:09:48 - Sending soft termination signal . 2024.05.24 19:09:48 - OpenVPN > 2024-05-24 19:09:48 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:09:48 - Connection terminated. I 2024.05.24 19:09:51 - Checking authorization ... ! 2024.05.24 19:09:52 - Connecting to Musica (Netherlands, Alblasserdam) . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.251:443 . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 UDP link local: (not bound) . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 UDP link remote: [AF_INET]213.152.161.251:443 . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 TLS: Initial packet from [AF_INET]213.152.161.251:443, sid=3b3731e5 5a4876d4 . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 TLS Error: TLS handshake failed . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 Restart pause, 5 second(s) ! 2024.05.24 19:09:52 - Disconnecting . 2024.05.24 19:09:52 - Sending soft termination signal . 2024.05.24 19:09:52 - OpenVPN > 2024-05-24 19:09:52 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:09:52 - Connection terminated. I 2024.05.24 19:09:55 - Checking authorization ... ! 2024.05.24 19:09:56 - Connecting to Menkent (Netherlands, Alblasserdam) . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.176.140:443 . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 UDP link local: (not bound) . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 UDP link remote: [AF_INET]213.152.176.140:443 . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 TLS: Initial packet from [AF_INET]213.152.176.140:443, sid=62eb667c 70b6be66 . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 TLS Error: TLS handshake failed . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 Restart pause, 5 second(s) ! 2024.05.24 19:09:56 - Disconnecting . 2024.05.24 19:09:56 - Sending soft termination signal . 2024.05.24 19:09:56 - OpenVPN > 2024-05-24 19:09:56 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:09:56 - Connection terminated. I 2024.05.24 19:09:59 - Checking authorization ... ! 2024.05.24 19:10:00 - Connecting to Suhail (Netherlands, Alblasserdam) . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.189:443 . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 UDP link local: (not bound) . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 UDP link remote: [AF_INET]134.19.179.189:443 . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 TLS: Initial packet from [AF_INET]134.19.179.189:443, sid=f5eb5e22 c14451af . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 TLS Error: TLS handshake failed . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:10:00 - OpenVPN > 2024-05-24 19:10:00 Restart pause, 5 second(s) ! 2024.05.24 19:10:00 - Disconnecting . 2024.05.24 19:10:00 - Sending soft termination signal . 2024.05.24 19:10:01 - OpenVPN > 2024-05-24 19:10:00 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:10:01 - Connection terminated. I 2024.05.24 19:10:04 - Checking authorization ... ! 2024.05.24 19:10:04 - Connecting to Miram (Netherlands, Alblasserdam) . 2024.05.24 19:10:04 - OpenVPN > 2024-05-24 19:10:04 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:10:04 - OpenVPN > 2024-05-24 19:10:04 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:10:04 - OpenVPN > 2024-05-24 19:10:04 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:10:04 - OpenVPN > 2024-05-24 19:10:04 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:10:04 - OpenVPN > 2024-05-24 19:10:04 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:10:04 - OpenVPN > 2024-05-24 19:10:04 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:10:04 - OpenVPN > 2024-05-24 19:10:04 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:10:04 - OpenVPN > 2024-05-24 19:10:04 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:10:04 - OpenVPN > 2024-05-24 19:10:04 TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.91:443 . 2024.05.24 19:10:04 - OpenVPN > 2024-05-24 19:10:04 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:10:04 - OpenVPN > 2024-05-24 19:10:04 UDP link local: (not bound) . 2024.05.24 19:10:04 - OpenVPN > 2024-05-24 19:10:04 UDP link remote: [AF_INET]213.152.162.91:443 . 2024.05.24 19:10:04 - OpenVPN > 2024-05-24 19:10:04 TLS: Initial packet from [AF_INET]213.152.162.91:443, sid=565dafb4 b409870b . 2024.05.24 19:10:05 - OpenVPN > 2024-05-24 19:10:04 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:10:05 - OpenVPN > 2024-05-24 19:10:04 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:10:05 - OpenVPN > 2024-05-24 19:10:04 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:10:05 - OpenVPN > 2024-05-24 19:10:04 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:10:05 - OpenVPN > 2024-05-24 19:10:04 TLS Error: TLS handshake failed . 2024.05.24 19:10:05 - OpenVPN > 2024-05-24 19:10:04 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:10:05 - OpenVPN > 2024-05-24 19:10:04 Restart pause, 5 second(s) ! 2024.05.24 19:10:05 - Disconnecting . 2024.05.24 19:10:05 - Sending soft termination signal . 2024.05.24 19:10:05 - OpenVPN > 2024-05-24 19:10:05 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:10:05 - Connection terminated. I 2024.05.24 19:10:06 - Cancel requested. ! 2024.05.24 19:10:06 - Session terminated. . 2024.05.24 19:10:36 - Updating systems & servers data ... . 2024.05.24 19:10:37 - Systems & servers data update completed I 2024.05.24 19:11:27 - Session starting. I 2024.05.24 19:11:27 - Checking authorization ... ! 2024.05.24 19:11:28 - Connecting to Angetenar (Canada, Toronto, Ontario) . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.165:443 . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 UDP link local: (not bound) . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 UDP link remote: [AF_INET]184.75.221.165:443 . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 TLS: Initial packet from [AF_INET]184.75.221.165:443, sid=2c2054e0 e03c02d1 . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 TLS Error: TLS handshake failed . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 Restart pause, 5 second(s) ! 2024.05.24 19:11:28 - Disconnecting . 2024.05.24 19:11:28 - Sending soft termination signal . 2024.05.24 19:11:28 - OpenVPN > 2024-05-24 19:11:28 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:11:28 - Connection terminated. I 2024.05.24 19:11:31 - Checking authorization ... ! 2024.05.24 19:11:31 - Connecting to Alwaid (Canada, Toronto, Ontario) . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:31 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:31 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:31 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:31 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:32 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:32 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:32 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:32 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:32 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.109:443 . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:32 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:32 UDP link local: (not bound) . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:32 UDP link remote: [AF_INET]184.75.221.109:443 . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:32 TLS: Initial packet from [AF_INET]184.75.221.109:443, sid=56b4c093 7cdbdc84 . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:32 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:32 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:32 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:32 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:32 TLS Error: TLS handshake failed . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:32 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:32 Restart pause, 5 second(s) ! 2024.05.24 19:11:32 - Disconnecting . 2024.05.24 19:11:32 - Sending soft termination signal . 2024.05.24 19:11:32 - OpenVPN > 2024-05-24 19:11:32 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:11:32 - Connection terminated. I 2024.05.24 19:11:35 - Checking authorization ... ! 2024.05.24 19:11:35 - Connecting to Arkab (Canada, Toronto, Ontario) . 2024.05.24 19:11:35 - OpenVPN > 2024-05-24 19:11:35 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:11:35 - OpenVPN > 2024-05-24 19:11:35 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:11:35 - OpenVPN > 2024-05-24 19:11:35 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:11:35 - OpenVPN > 2024-05-24 19:11:35 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:11:35 - OpenVPN > 2024-05-24 19:11:35 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:11:35 - OpenVPN > 2024-05-24 19:11:35 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:11:35 - OpenVPN > 2024-05-24 19:11:35 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:11:35 - OpenVPN > 2024-05-24 19:11:35 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:11:35 - OpenVPN > 2024-05-24 19:11:35 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.213:443 . 2024.05.24 19:11:35 - OpenVPN > 2024-05-24 19:11:35 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:11:35 - OpenVPN > 2024-05-24 19:11:35 UDP link local: (not bound) . 2024.05.24 19:11:35 - OpenVPN > 2024-05-24 19:11:35 UDP link remote: [AF_INET]184.75.221.213:443 . 2024.05.24 19:11:35 - OpenVPN > 2024-05-24 19:11:35 TLS: Initial packet from [AF_INET]184.75.221.213:443, sid=7962a7da 56acfc62 . 2024.05.24 19:11:36 - OpenVPN > 2024-05-24 19:11:36 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:11:36 - OpenVPN > 2024-05-24 19:11:36 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:11:36 - OpenVPN > 2024-05-24 19:11:36 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:11:36 - OpenVPN > 2024-05-24 19:11:36 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:11:36 - OpenVPN > 2024-05-24 19:11:36 TLS Error: TLS handshake failed . 2024.05.24 19:11:36 - OpenVPN > 2024-05-24 19:11:36 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:11:36 - OpenVPN > 2024-05-24 19:11:36 Restart pause, 5 second(s) ! 2024.05.24 19:11:36 - Disconnecting . 2024.05.24 19:11:36 - Sending soft termination signal . 2024.05.24 19:11:36 - OpenVPN > 2024-05-24 19:11:36 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:11:36 - Connection terminated. I 2024.05.24 19:11:39 - Checking authorization ... ! 2024.05.24 19:11:39 - Connecting to Sargas (Canada, Toronto, Ontario) . 2024.05.24 19:11:39 - OpenVPN > 2024-05-24 19:11:39 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:11:39 - OpenVPN > 2024-05-24 19:11:39 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:11:39 - OpenVPN > 2024-05-24 19:11:39 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:11:39 - OpenVPN > 2024-05-24 19:11:39 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:11:39 - OpenVPN > 2024-05-24 19:11:39 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:11:39 - OpenVPN > 2024-05-24 19:11:39 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:11:39 - OpenVPN > 2024-05-24 19:11:39 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:11:39 - OpenVPN > 2024-05-24 19:11:39 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:11:39 - OpenVPN > 2024-05-24 19:11:39 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.197:443 . 2024.05.24 19:11:39 - OpenVPN > 2024-05-24 19:11:39 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:11:39 - OpenVPN > 2024-05-24 19:11:39 UDP link local: (not bound) . 2024.05.24 19:11:39 - OpenVPN > 2024-05-24 19:11:39 UDP link remote: [AF_INET]184.75.223.197:443 . 2024.05.24 19:11:39 - OpenVPN > 2024-05-24 19:11:39 TLS: Initial packet from [AF_INET]184.75.223.197:443, sid=3e9228bc 2f1af776 . 2024.05.24 19:11:40 - OpenVPN > 2024-05-24 19:11:40 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:11:40 - OpenVPN > 2024-05-24 19:11:40 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:11:40 - OpenVPN > 2024-05-24 19:11:40 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:11:40 - OpenVPN > 2024-05-24 19:11:40 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:11:40 - OpenVPN > 2024-05-24 19:11:40 TLS Error: TLS handshake failed . 2024.05.24 19:11:40 - OpenVPN > 2024-05-24 19:11:40 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:11:40 - OpenVPN > 2024-05-24 19:11:40 Restart pause, 5 second(s) ! 2024.05.24 19:11:40 - Disconnecting . 2024.05.24 19:11:40 - Sending soft termination signal . 2024.05.24 19:11:40 - OpenVPN > 2024-05-24 19:11:40 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:11:40 - Connection terminated. I 2024.05.24 19:11:42 - Cancel requested. ! 2024.05.24 19:11:42 - Session terminated. I 2024.05.24 19:18:09 - Session starting. I 2024.05.24 19:18:09 - Checking authorization ... ! 2024.05.24 19:18:10 - Connecting to Alya (Canada, Toronto, Ontario) . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.173:443 . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 UDP link local: (not bound) . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 UDP link remote: [AF_INET]184.75.221.173:443 . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 TLS: Initial packet from [AF_INET]184.75.221.173:443, sid=6f132409 a9649605 . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 TLS Error: TLS handshake failed . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 Restart pause, 5 second(s) ! 2024.05.24 19:18:10 - Disconnecting . 2024.05.24 19:18:10 - Sending soft termination signal . 2024.05.24 19:18:10 - OpenVPN > 2024-05-24 19:18:10 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:18:10 - Connection terminated. I 2024.05.24 19:18:13 - Checking authorization ... ! 2024.05.24 19:18:14 - Connecting to Saiph (Canada, Toronto, Ontario) . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning. . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.229:443 . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 UDP link local: (not bound) . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 UDP link remote: [AF_INET]184.75.223.229:443 . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 TLS: Initial packet from [AF_INET]184.75.223.229:443, sid=aa73e1a7 1002b983 . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 VERIFY ERROR: depth=1, error=certificate has expired: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org, serial=10148936457887096835 . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 OpenSSL: error:0A000086:SSL routines::certificate verify failed . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 TLS_ERROR: BIO read tls_read_plaintext error . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 TLS Error: TLS object -> incoming plaintext read error . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 TLS Error: TLS handshake failed . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 SIGUSR1[soft,tls-error] received, process restarting . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 Restart pause, 5 second(s) ! 2024.05.24 19:18:14 - Disconnecting . 2024.05.24 19:18:14 - Sending soft termination signal . 2024.05.24 19:18:14 - OpenVPN > 2024-05-24 19:18:14 SIGTERM[hard,init_instance] received, process exiting . 2024.05.24 19:18:14 - Connection terminated. I 2024.05.24 19:18:17 - Checking authorization ... I 2024.05.24 19:18:18 - Cancel requested. ! 2024.05.24 19:18:18 - Session terminated. ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "gateway": "192.168.1.254", "interface": "enp0s31f6", "metric": "100" } ], "interfaces": [ { "friendly": "lo", "id": "lo", "name": "lo", "description": "lo", "type": "Loopback", "status": "Unknown", "bytes_received": "626097", "bytes_sent": "626097", "support_ipv4": true, "support_ipv6": true, "ips": [ "127.0.0.1", "::1" ], "gateways": [], "bind": true }, { "friendly": "enp0s31f6", "id": "enp0s31f6", "name": "enp0s31f6", "description": "enp0s31f6", "type": "Ethernet", "status": "Up", "bytes_received": "6229787", "bytes_sent": "984626", "support_ipv4": true, "support_ipv6": true, "ips": [ "192.168.1.88", "2600:1700:a9c0:3580::48", "2600:1700:a9c0:3580:df1a:6021:a93:f84e", "2600:1700:a9c0:3580:b5bc:522e:ec8c:1159", "fe80::1dfd:2174:2b11:4d15" ], "gateways": [ "192.168.1.254" ], "bind": true } ], "ipv4-default-gateway": "192.168.1.254", "ipv4-default-interface": "enp0s31f6" } ---------------------------- UID: 0 Run as normal user: True; ID:1000; Name:ironmike ---------------------------- ip addr show: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: enp0s31f6: mtu 1500 qdisc fq_codel state UP group default qlen 1000 link/ether 1c:1b:0d:61:9a:d9 brd ff:ff:ff:ff:ff:ff inet 192.168.1.88/24 brd 192.168.1.255 scope global dynamic noprefixroute enp0s31f6 valid_lft 84967sec preferred_lft 84967sec inet6 2600:1700:a9c0:3580::48/128 scope global dynamic noprefixroute valid_lft 2590567sec preferred_lft 603367sec inet6 2600:1700:a9c0:3580:df1a:6021:a93:f84e/64 scope global temporary dynamic valid_lft 603367sec preferred_lft 84735sec inet6 2600:1700:a9c0:3580:b5bc:522e:ec8c:1159/64 scope global dynamic mngtmpaddr noprefixroute valid_lft 2591836sec preferred_lft 604636sec inet6 fe80::1dfd:2174:2b11:4d15/64 scope link noprefixroute valid_lft forever preferred_lft forever ---------------------------- ip link show: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: enp0s31f6: mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether 1c:1b:0d:61:9a:d9 brd ff:ff:ff:ff:ff:ff ---------------------------- ip -4 route show: default via 192.168.1.254 dev enp0s31f6 proto dhcp metric 100 169.254.0.0/16 dev enp0s31f6 scope link metric 1000 192.168.1.0/24 dev enp0s31f6 proto kernel scope link src 192.168.1.88 metric 100 ---------------------------- ip -6 route show: ::1 dev lo proto kernel metric 256 pref medium 2600:1700:a9c0:3580::48 dev enp0s31f6 proto kernel metric 100 pref medium fe80::/64 dev enp0s31f6 proto kernel metric 1024 pref medium