Jump to content
Not connected, Your IP: 3.144.102.43

Recommended Posts

I have a very weird issue.  When I am connected to Airvpn I either can't reach airvpn.org at all or I can and it shows my real ip address.  If I click on Your IP at the top of the page ipleak shows the server IP and DNS and no leak under WebRTC detection.  Using Vuze, I've used torguard's Check My Torrent IP Address and all seems well there.  I've rolled back the tap adapter and that does not help.  Any help would be appreciated as I have 83 days left on my subscription.  I've been using Air for at least a year or two now and I don't know what I may have done that broke it.

Share this post


Link to post

Here are my log files.  Thanks!

 

I 2016.07.09 11:34:00 - AirVPN client version: 2.7, System: Windows, Architecture: x64
. 2016.07.09 11:34:00 - Reading options from C:\Program Files\AirVPN\AirVPN.xml
. 2016.07.09 11:34:00 - Data Path: C:\Program Files\AirVPN
. 2016.07.09 11:34:00 - App Path: C:\Program Files\AirVPN
. 2016.07.09 11:34:00 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.07.09 11:34:00 - Command line arguments:
. 2016.07.09 11:34:00 - Operating System: Microsoft Windows NT 6.1.7600.0
. 2016.07.09 11:34:00 - Updating systems & servers data ...
I 2016.07.09 11:34:00 - OpenVPN Driver - TAP-Windows Adapter V9
I 2016.07.09 11:34:00 - OpenVPN - Version: OpenVPN 2.3.4 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.07.09 11:34:00 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.07.09 11:34:00 - SSL - Version: stunnel 4.56 (C:\Program Files\AirVPN\stunnel.exe)
I 2016.07.09 11:34:00 - IPV6: Available
! 2016.07.09 11:34:00 - Ready
. 2016.07.09 11:34:01 - Systems & servers data update completed
! 2016.07.09 11:34:02 - Checking login ...
! 2016.07.09 11:34:02 - Logged in.
I 2016.07.09 11:34:14 - Session starting.
! 2016.07.09 11:34:14 - Checking environment
! 2016.07.09 11:34:14 - Checking authorization ...
! 2016.07.09 11:34:14 - Connecting to Enif (Canada, Toronto, Ontario)
. 2016.07.09 11:34:14 - SSH > Looking up host "104.254.90.244"
. 2016.07.09 11:34:14 - SSH > Connecting to 104.254.90.244 port 53
. 2016.07.09 11:34:14 - SSH > Server version: SSH-2.0-OpenSSH_6.7p1 Debian-5+deb8u1
. 2016.07.09 11:34:14 - SSH > Using SSH protocol version 2
. 2016.07.09 11:34:14 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.63
. 2016.07.09 11:34:14 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.09 11:34:15 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.09 11:34:15 - SSH > Host key fingerprint is:
. 2016.07.09 11:34:15 - SSH > ssh-rsa 2048 71:e2:73:38:9b:63:7b:53:a6:cc:44:7a:c3:70:25:f8
. 2016.07.09 11:34:15 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.09 11:34:15 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.09 11:34:15 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.09 11:34:15 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
. 2016.07.09 11:34:15 - SSH > Reading private key file "C:\Program Files\AirVPN\f5f5d273b223b7e14eea3e235655662099773cbd113023cfcf1aa89510f7994a.tmp.ppk"
. 2016.07.09 11:34:16 - SSH > Using username "sshtunnel".
. 2016.07.09 11:34:16 - SSH > Offered public key
. 2016.07.09 11:34:16 - SSH > Offer of public key accepted
. 2016.07.09 11:34:16 - SSH > Authenticating with public key ""
. 2016.07.09 11:34:16 - SSH > Sent public key signature
. 2016.07.09 11:34:16 - SSH > Access granted
. 2016.07.09 11:34:16 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Oct 18 2014
. 2016.07.09 11:34:16 - SSH > Local port 9983 forwarding to 127.0.0.1:2018
. 2016.07.09 11:34:16 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05
. 2016.07.09 11:34:17 - SSH > Opening connection to 127.0.0.1:2018 for forwarding
. 2016.07.09 11:34:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.07.09 11:34:17 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.07.09 11:34:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 11:34:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 11:34:17 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192]
. 2016.07.09 11:34:17 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:9983 [nonblock]
. 2016.07.09 11:34:17 - SSH > Remote debug message: Pty allocation disabled.
. 2016.07.09 11:34:17 - SSH > Remote debug message: X11 forwarding disabled.
. 2016.07.09 11:34:17 - SSH > Remote debug message: Forced command.
. 2016.07.09 11:34:17 - SSH > Remote debug message: Pty allocation disabled.
. 2016.07.09 11:34:17 - SSH > Remote debug message: X11 forwarding disabled.
. 2016.07.09 11:34:17 - SSH > Remote debug message: Forced command.
. 2016.07.09 11:34:18 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:9983
. 2016.07.09 11:34:18 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.07.09 11:34:18 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:9983
. 2016.07.09 11:34:18 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:9983, sid=02a0d6b0 a4dbc9d6
. 2016.07.09 11:34:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.09 11:34:18 - OpenVPN > Validating certificate key usage
. 2016.07.09 11:34:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.09 11:34:18 - OpenVPN > VERIFY KU OK
. 2016.07.09 11:34:18 - OpenVPN > Validating certificate extended key usage
. 2016.07.09 11:34:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.09 11:34:18 - OpenVPN > VERIFY EKU OK
. 2016.07.09 11:34:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.09 11:34:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 11:34:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 11:34:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 11:34:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 11:34:19 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.09 11:34:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:9983
. 2016.07.09 11:34:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.07.09 11:34:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.244 255.255.0.0'
. 2016.07.09 11:34:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.07.09 11:34:22 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.07.09 11:34:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.07.09 11:34:22 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.07.09 11:34:22 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.07.09 11:34:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.07.09 11:34:22 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.07.09 11:34:22 - OpenVPN > open_tun, tt->ipv6=0
. 2016.07.09 11:34:22 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{306D6B16-DEEA-4362-AC54-F105398AE1D6}.tap
. 2016.07.09 11:34:22 - OpenVPN > TAP-Windows Driver Version 9.9
. 2016.07.09 11:34:22 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.244/255.255.0.0 [sUCCEEDED]
. 2016.07.09 11:34:22 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.244/255.255.0.0 on interface {306D6B16-DEEA-4362-AC54-F105398AE1D6} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.07.09 11:34:22 - OpenVPN > Successful ARP Flush on interface [14] {306D6B16-DEEA-4362-AC54-F105398AE1D6}
. 2016.07.09 11:34:27 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.07.09 11:34:27 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.07.09 11:34:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.09 11:34:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.09 11:34:27 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 11
. 2016.07.09 11:34:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.09 11:34:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.09 11:34:27 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.07.09 11:34:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.07.09 11:34:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.09 11:34:27 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.07.09 11:34:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2016.07.09 11:34:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.09 11:34:27 - OpenVPN > C:\Windows\system32\route.exe ADD 104.254.90.244 MASK 255.255.255.255 192.168.1.1
. 2016.07.09 11:34:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2016.07.09 11:34:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.07.09 11:34:27 - Starting Management Interface
. 2016.07.09 11:34:27 - OpenVPN > Initialization Sequence Completed
! 2016.07.09 11:34:27 - Flushing DNS
! 2016.07.09 11:34:27 - Checking route
! 2016.07.09 11:34:28 - Connected.
. 2016.07.09 11:34:28 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.07.09 11:34:28 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.07.09 12:04:30 - Updating systems & servers data ...
. 2016.07.09 12:04:31 - Systems & servers data update completed
. 2016.07.09 12:34:15 - SSH > Initiating key re-exchange (timeout)
. 2016.07.09 12:34:15 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.09 12:34:15 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.09 12:34:16 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.09 12:34:16 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.09 12:34:16 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.09 12:34:16 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
. 2016.07.09 12:34:19 - OpenVPN > TLS: soft reset sec=0 bytes=420269906/0 pkts=585356/0
. 2016.07.09 12:34:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.09 12:34:19 - OpenVPN > Validating certificate key usage
. 2016.07.09 12:34:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.09 12:34:19 - OpenVPN > VERIFY KU OK
. 2016.07.09 12:34:19 - OpenVPN > Validating certificate extended key usage
. 2016.07.09 12:34:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.09 12:34:19 - OpenVPN > VERIFY EKU OK
. 2016.07.09 12:34:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.09 12:34:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 12:34:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 12:34:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 12:34:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 12:34:20 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.09 12:34:57 - Updating systems & servers data ...
. 2016.07.09 12:34:58 - Systems & servers data update completed
. 2016.07.09 13:06:00 - Updating systems & servers data ...
. 2016.07.09 13:06:01 - Systems & servers data update completed
. 2016.07.09 13:34:16 - SSH > Initiating key re-exchange (timeout)
. 2016.07.09 13:34:16 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.09 13:34:16 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.09 13:34:16 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.09 13:34:16 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.09 13:34:16 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.09 13:34:16 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
I 2016.07.09 13:34:19 - Renewing TLS key
. 2016.07.09 13:34:19 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.09 13:34:20 - OpenVPN > TLS: soft reset sec=0 bytes=234376740/0 pkts=345399/0
. 2016.07.09 13:34:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.09 13:34:20 - OpenVPN > Validating certificate key usage
. 2016.07.09 13:34:20 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.09 13:34:20 - OpenVPN > VERIFY KU OK
. 2016.07.09 13:34:20 - OpenVPN > Validating certificate extended key usage
. 2016.07.09 13:34:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.09 13:34:20 - OpenVPN > VERIFY EKU OK
. 2016.07.09 13:34:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.09 13:34:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 13:34:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 13:34:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 13:34:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 13:34:21 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.09 13:37:02 - Updating systems & servers data ...
. 2016.07.09 13:37:03 - Systems & servers data update completed
. 2016.07.09 14:08:04 - Updating systems & servers data ...
. 2016.07.09 14:08:06 - Systems & servers data update completed
. 2016.07.09 14:34:16 - SSH > Initiating key re-exchange (timeout)
. 2016.07.09 14:34:16 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.09 14:34:16 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.09 14:34:17 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.09 14:34:17 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.09 14:34:17 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.09 14:34:17 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
I 2016.07.09 14:34:20 - Renewing TLS key
. 2016.07.09 14:34:20 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.09 14:34:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.09 14:34:21 - OpenVPN > Validating certificate key usage
. 2016.07.09 14:34:21 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.09 14:34:21 - OpenVPN > VERIFY KU OK
. 2016.07.09 14:34:21 - OpenVPN > Validating certificate extended key usage
. 2016.07.09 14:34:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.09 14:34:21 - OpenVPN > VERIFY EKU OK
. 2016.07.09 14:34:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.09 14:34:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 14:34:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 14:34:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 14:34:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 14:34:22 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.09 14:39:07 - Updating systems & servers data ...
. 2016.07.09 14:39:08 - Systems & servers data update completed
. 2016.07.09 15:10:09 - Updating systems & servers data ...
. 2016.07.09 15:10:11 - Systems & servers data update completed
. 2016.07.09 15:34:17 - SSH > Initiating key re-exchange (timeout)
. 2016.07.09 15:34:17 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.09 15:34:17 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.09 15:34:18 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.09 15:34:18 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.09 15:34:18 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.09 15:34:18 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
I 2016.07.09 15:34:20 - Renewing TLS key
. 2016.07.09 15:34:20 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.09 15:34:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.09 15:34:22 - OpenVPN > Validating certificate key usage
. 2016.07.09 15:34:22 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.09 15:34:22 - OpenVPN > VERIFY KU OK
. 2016.07.09 15:34:22 - OpenVPN > Validating certificate extended key usage
. 2016.07.09 15:34:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.09 15:34:22 - OpenVPN > VERIFY EKU OK
. 2016.07.09 15:34:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.09 15:34:23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 15:34:23 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 15:34:23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 15:34:23 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 15:34:23 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.09 15:41:12 - Updating systems & servers data ...
. 2016.07.09 15:41:13 - Systems & servers data update completed
. 2016.07.09 16:12:15 - Updating systems & servers data ...
. 2016.07.09 16:12:16 - Systems & servers data update completed
. 2016.07.09 16:34:18 - SSH > Initiating key re-exchange (timeout)
. 2016.07.09 16:34:18 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.09 16:34:18 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.09 16:34:18 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.09 16:34:18 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.09 16:34:18 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.09 16:34:18 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
I 2016.07.09 16:34:21 - Renewing TLS key
. 2016.07.09 16:34:21 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.09 16:34:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.09 16:34:22 - OpenVPN > Validating certificate key usage
. 2016.07.09 16:34:22 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.09 16:34:22 - OpenVPN > VERIFY KU OK
. 2016.07.09 16:34:22 - OpenVPN > Validating certificate extended key usage
. 2016.07.09 16:34:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.09 16:34:22 - OpenVPN > VERIFY EKU OK
. 2016.07.09 16:34:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.09 16:34:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 16:34:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 16:34:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 16:34:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 16:34:24 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.09 16:43:17 - Updating systems & servers data ...
. 2016.07.09 16:43:19 - Systems & servers data update completed
. 2016.07.09 17:14:20 - Updating systems & servers data ...
. 2016.07.09 17:14:21 - Systems & servers data update completed
. 2016.07.09 17:34:18 - SSH > Initiating key re-exchange (timeout)
. 2016.07.09 17:34:18 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.09 17:34:18 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.09 17:34:19 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.09 17:34:19 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.09 17:34:19 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.09 17:34:19 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
I 2016.07.09 17:34:22 - Renewing TLS key
. 2016.07.09 17:34:22 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.09 17:34:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.09 17:34:23 - OpenVPN > Validating certificate key usage
. 2016.07.09 17:34:23 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.09 17:34:23 - OpenVPN > VERIFY KU OK
. 2016.07.09 17:34:23 - OpenVPN > Validating certificate extended key usage
. 2016.07.09 17:34:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.09 17:34:23 - OpenVPN > VERIFY EKU OK
. 2016.07.09 17:34:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.09 17:34:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 17:34:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 17:34:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 17:34:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 17:34:25 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.09 17:45:22 - Updating systems & servers data ...
. 2016.07.09 17:45:24 - Systems & servers data update completed
. 2016.07.09 18:16:25 - Updating systems & servers data ...
. 2016.07.09 18:16:26 - Systems & servers data update completed
. 2016.07.09 18:34:19 - SSH > Initiating key re-exchange (timeout)
. 2016.07.09 18:34:19 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.09 18:34:19 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.09 18:34:20 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.09 18:34:20 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.09 18:34:20 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.09 18:34:20 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
I 2016.07.09 18:34:23 - Renewing TLS key
. 2016.07.09 18:34:23 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.09 18:34:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.09 18:34:24 - OpenVPN > Validating certificate key usage
. 2016.07.09 18:34:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.09 18:34:24 - OpenVPN > VERIFY KU OK
. 2016.07.09 18:34:24 - OpenVPN > Validating certificate extended key usage
. 2016.07.09 18:34:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.09 18:34:24 - OpenVPN > VERIFY EKU OK
. 2016.07.09 18:34:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.09 18:34:25 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 18:34:25 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 18:34:25 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 18:34:25 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 18:34:25 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.09 18:47:28 - Updating systems & servers data ...
. 2016.07.09 18:47:29 - Systems & servers data update completed
. 2016.07.09 19:18:31 - Updating systems & servers data ...
. 2016.07.09 19:18:32 - Systems & servers data update completed
. 2016.07.09 19:34:20 - SSH > Initiating key re-exchange (timeout)
. 2016.07.09 19:34:20 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.09 19:34:20 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.09 19:34:20 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.09 19:34:20 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.09 19:34:20 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.09 19:34:20 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
I 2016.07.09 19:34:24 - Renewing TLS key
. 2016.07.09 19:34:24 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.09 19:34:25 - OpenVPN > TLS: soft reset sec=0 bytes=504056221/0 pkts=653649/0
. 2016.07.09 19:34:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.09 19:34:25 - OpenVPN > Validating certificate key usage
. 2016.07.09 19:34:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.09 19:34:25 - OpenVPN > VERIFY KU OK
. 2016.07.09 19:34:25 - OpenVPN > Validating certificate extended key usage
. 2016.07.09 19:34:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.09 19:34:25 - OpenVPN > VERIFY EKU OK
. 2016.07.09 19:34:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.09 19:34:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 19:34:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 19:34:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 19:34:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 19:34:26 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.09 19:49:33 - Updating systems & servers data ...
. 2016.07.09 19:49:35 - Systems & servers data update completed
. 2016.07.09 20:20:36 - Updating systems & servers data ...
. 2016.07.09 20:20:37 - Systems & servers data update completed
. 2016.07.09 20:34:20 - SSH > Initiating key re-exchange (timeout)
. 2016.07.09 20:34:20 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.09 20:34:20 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.09 20:34:21 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.09 20:34:21 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.09 20:34:21 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.09 20:34:21 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
I 2016.07.09 20:34:25 - Renewing TLS key
. 2016.07.09 20:34:25 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.09 20:34:26 - OpenVPN > TLS: soft reset sec=0 bytes=245085930/0 pkts=382138/0
. 2016.07.09 20:34:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.09 20:34:26 - OpenVPN > Validating certificate key usage
. 2016.07.09 20:34:26 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.09 20:34:26 - OpenVPN > VERIFY KU OK
. 2016.07.09 20:34:26 - OpenVPN > Validating certificate extended key usage
. 2016.07.09 20:34:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.09 20:34:26 - OpenVPN > VERIFY EKU OK
. 2016.07.09 20:34:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.09 20:34:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 20:34:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 20:34:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 20:34:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 20:34:27 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.09 20:51:39 - Updating systems & servers data ...
. 2016.07.09 20:51:40 - Systems & servers data update completed
. 2016.07.09 21:22:41 - Updating systems & servers data ...
. 2016.07.09 21:22:43 - Systems & servers data update completed
. 2016.07.09 21:34:21 - SSH > Initiating key re-exchange (timeout)
. 2016.07.09 21:34:21 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.09 21:34:21 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.09 21:34:21 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.09 21:34:21 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.09 21:34:21 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.09 21:34:21 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
I 2016.07.09 21:34:26 - Renewing TLS key
. 2016.07.09 21:34:26 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.09 21:34:27 - OpenVPN > TLS: soft reset sec=0 bytes=184257994/0 pkts=302811/0
. 2016.07.09 21:34:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.09 21:34:27 - OpenVPN > Validating certificate key usage
. 2016.07.09 21:34:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.09 21:34:27 - OpenVPN > VERIFY KU OK
. 2016.07.09 21:34:27 - OpenVPN > Validating certificate extended key usage
. 2016.07.09 21:34:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.09 21:34:27 - OpenVPN > VERIFY EKU OK
. 2016.07.09 21:34:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.09 21:34:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 21:34:28 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 21:34:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 21:34:28 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 21:34:28 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.09 21:53:44 - Updating systems & servers data ...
. 2016.07.09 21:53:45 - Systems & servers data update completed
. 2016.07.09 22:24:46 - Updating systems & servers data ...
. 2016.07.09 22:24:48 - Systems & servers data update completed
. 2016.07.09 22:34:21 - SSH > Initiating key re-exchange (timeout)
. 2016.07.09 22:34:22 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.09 22:34:22 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.09 22:34:22 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.09 22:34:22 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.09 22:34:22 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.09 22:34:22 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
I 2016.07.09 22:34:27 - Renewing TLS key
. 2016.07.09 22:34:27 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.09 22:34:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.09 22:34:28 - OpenVPN > Validating certificate key usage
. 2016.07.09 22:34:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.09 22:34:28 - OpenVPN > VERIFY KU OK
. 2016.07.09 22:34:28 - OpenVPN > Validating certificate extended key usage
. 2016.07.09 22:34:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.09 22:34:28 - OpenVPN > VERIFY EKU OK
. 2016.07.09 22:34:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.09 22:34:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 22:34:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 22:34:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 22:34:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 22:34:29 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.09 22:55:49 - Updating systems & servers data ...
. 2016.07.09 22:55:50 - Systems & servers data update completed
. 2016.07.09 23:26:51 - Updating systems & servers data ...
. 2016.07.09 23:26:53 - Systems & servers data update completed
. 2016.07.09 23:34:22 - SSH > Initiating key re-exchange (timeout)
. 2016.07.09 23:34:22 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.09 23:34:22 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.09 23:34:23 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.09 23:34:23 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.09 23:34:23 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.09 23:34:23 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
I 2016.07.09 23:34:27 - Renewing TLS key
. 2016.07.09 23:34:27 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.09 23:34:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.09 23:34:29 - OpenVPN > Validating certificate key usage
. 2016.07.09 23:34:29 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.09 23:34:29 - OpenVPN > VERIFY KU OK
. 2016.07.09 23:34:29 - OpenVPN > Validating certificate extended key usage
. 2016.07.09 23:34:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.09 23:34:29 - OpenVPN > VERIFY EKU OK
. 2016.07.09 23:34:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.09 23:34:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 23:34:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 23:34:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.09 23:34:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.09 23:34:30 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.09 23:57:54 - Updating systems & servers data ...
. 2016.07.09 23:57:56 - Systems & servers data update completed
. 2016.07.10 00:19:39 - SSH > Initiating key re-exchange (too much data received)
. 2016.07.10 00:19:39 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.10 00:19:39 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.10 00:19:39 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.10 00:19:39 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.10 00:19:39 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.10 00:19:39 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
. 2016.07.10 00:28:58 - Updating systems & servers data ...
. 2016.07.10 00:28:59 - Systems & servers data update completed
I 2016.07.10 00:34:28 - Renewing TLS key
. 2016.07.10 00:34:28 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.10 00:34:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.10 00:34:30 - OpenVPN > Validating certificate key usage
. 2016.07.10 00:34:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.10 00:34:30 - OpenVPN > VERIFY KU OK
. 2016.07.10 00:34:30 - OpenVPN > Validating certificate extended key usage
. 2016.07.10 00:34:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.10 00:34:30 - OpenVPN > VERIFY EKU OK
. 2016.07.10 00:34:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.10 00:34:31 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 00:34:31 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 00:34:31 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 00:34:31 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 00:34:31 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.10 01:00:00 - Updating systems & servers data ...
. 2016.07.10 01:00:01 - Systems & servers data update completed
. 2016.07.10 01:19:57 - SSH > Initiating key re-exchange (timeout)
. 2016.07.10 01:19:57 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.10 01:19:57 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.10 01:19:58 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.10 01:19:58 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.10 01:19:58 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.10 01:19:58 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
. 2016.07.10 01:30:20 - Updating systems & servers data ...
. 2016.07.10 01:30:22 - Systems & servers data update completed
I 2016.07.10 01:34:29 - Renewing TLS key
. 2016.07.10 01:34:29 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.10 01:34:31 - OpenVPN > TLS: soft reset sec=0 bytes=475008103/0 pkts=659508/0
. 2016.07.10 01:34:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.10 01:34:31 - OpenVPN > Validating certificate key usage
. 2016.07.10 01:34:31 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.10 01:34:31 - OpenVPN > VERIFY KU OK
. 2016.07.10 01:34:31 - OpenVPN > Validating certificate extended key usage
. 2016.07.10 01:34:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.10 01:34:31 - OpenVPN > VERIFY EKU OK
. 2016.07.10 01:34:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.10 01:34:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 01:34:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 01:34:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 01:34:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 01:34:32 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.10 02:00:23 - Updating systems & servers data ...
. 2016.07.10 02:00:25 - Systems & servers data update completed
. 2016.07.10 02:19:58 - SSH > Initiating key re-exchange (timeout)
. 2016.07.10 02:19:58 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.10 02:19:58 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.10 02:19:58 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.10 02:19:58 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.10 02:19:58 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.10 02:19:58 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
. 2016.07.10 02:30:25 - Updating systems & servers data ...
. 2016.07.10 02:30:27 - Systems & servers data update completed
I 2016.07.10 02:34:31 - Renewing TLS key
. 2016.07.10 02:34:31 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.10 02:34:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.10 02:34:32 - OpenVPN > Validating certificate key usage
. 2016.07.10 02:34:32 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.10 02:34:32 - OpenVPN > VERIFY KU OK
. 2016.07.10 02:34:32 - OpenVPN > Validating certificate extended key usage
. 2016.07.10 02:34:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.10 02:34:32 - OpenVPN > VERIFY EKU OK
. 2016.07.10 02:34:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.10 02:34:33 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 02:34:33 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 02:34:33 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 02:34:33 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 02:34:33 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.10 03:00:28 - Updating systems & servers data ...
. 2016.07.10 03:00:29 - Systems & servers data update completed
. 2016.07.10 03:19:58 - SSH > Initiating key re-exchange (timeout)
. 2016.07.10 03:19:58 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.10 03:19:59 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.10 03:19:59 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.10 03:19:59 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.10 03:19:59 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.10 03:19:59 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
. 2016.07.10 03:30:31 - Updating systems & servers data ...
. 2016.07.10 03:30:32 - Systems & servers data update completed
I 2016.07.10 03:34:31 - Renewing TLS key
. 2016.07.10 03:34:31 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.10 03:34:33 - OpenVPN > TLS: soft reset sec=0 bytes=332904610/0 pkts=486429/0
. 2016.07.10 03:34:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.10 03:34:33 - OpenVPN > Validating certificate key usage
. 2016.07.10 03:34:33 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.10 03:34:33 - OpenVPN > VERIFY KU OK
. 2016.07.10 03:34:33 - OpenVPN > Validating certificate extended key usage
. 2016.07.10 03:34:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.10 03:34:33 - OpenVPN > VERIFY EKU OK
. 2016.07.10 03:34:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.10 03:34:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 03:34:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 03:34:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 03:34:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 03:34:34 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.10 04:00:34 - Updating systems & servers data ...
. 2016.07.10 04:00:35 - Systems & servers data update completed
. 2016.07.10 04:19:59 - SSH > Initiating key re-exchange (timeout)
. 2016.07.10 04:19:59 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.10 04:19:59 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.10 04:20:00 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.10 04:20:00 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.10 04:20:00 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.10 04:20:00 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
. 2016.07.10 04:30:36 - Updating systems & servers data ...
. 2016.07.10 04:30:38 - Systems & servers data update completed
I 2016.07.10 04:34:33 - Renewing TLS key
. 2016.07.10 04:34:33 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.10 04:34:34 - OpenVPN > TLS: soft reset sec=0 bytes=528686120/0 pkts=695078/0
. 2016.07.10 04:34:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.10 04:34:34 - OpenVPN > Validating certificate key usage
. 2016.07.10 04:34:34 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.10 04:34:34 - OpenVPN > VERIFY KU OK
. 2016.07.10 04:34:34 - OpenVPN > Validating certificate extended key usage
. 2016.07.10 04:34:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.10 04:34:34 - OpenVPN > VERIFY EKU OK
. 2016.07.10 04:34:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.10 04:34:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 04:34:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 04:34:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 04:34:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 04:34:35 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.10 05:00:40 - Updating systems & servers data ...
. 2016.07.10 05:00:42 - Systems & servers data update completed
. 2016.07.10 05:20:00 - SSH > Initiating key re-exchange (timeout)
. 2016.07.10 05:20:00 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.10 05:20:00 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.10 05:20:00 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.10 05:20:00 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.10 05:20:00 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.10 05:20:00 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
. 2016.07.10 05:30:44 - Updating systems & servers data ...
. 2016.07.10 05:30:46 - Systems & servers data update completed
I 2016.07.10 05:34:34 - Renewing TLS key
. 2016.07.10 05:34:34 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.10 05:34:35 - OpenVPN > TLS: soft reset sec=0 bytes=354963566/0 pkts=502407/0
. 2016.07.10 05:34:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.10 05:34:35 - OpenVPN > Validating certificate key usage
. 2016.07.10 05:34:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.10 05:34:35 - OpenVPN > VERIFY KU OK
. 2016.07.10 05:34:35 - OpenVPN > Validating certificate extended key usage
. 2016.07.10 05:34:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.10 05:34:35 - OpenVPN > VERIFY EKU OK
. 2016.07.10 05:34:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.10 05:34:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 05:34:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 05:34:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 05:34:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 05:34:36 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.10 06:00:47 - Updating systems & servers data ...
. 2016.07.10 06:00:49 - Systems & servers data update completed
. 2016.07.10 06:20:00 - SSH > Initiating key re-exchange (timeout)
. 2016.07.10 06:20:01 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.10 06:20:01 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.10 06:20:01 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.10 06:20:01 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.10 06:20:01 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.10 06:20:01 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
. 2016.07.10 06:30:50 - Updating systems & servers data ...
. 2016.07.10 06:30:52 - Systems & servers data update completed
I 2016.07.10 06:34:35 - Renewing TLS key
. 2016.07.10 06:34:35 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.10 06:34:36 - OpenVPN > TLS: soft reset sec=0 bytes=242854043/0 pkts=385753/0
. 2016.07.10 06:34:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.10 06:34:36 - OpenVPN > Validating certificate key usage
. 2016.07.10 06:34:36 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.10 06:34:36 - OpenVPN > VERIFY KU OK
. 2016.07.10 06:34:36 - OpenVPN > Validating certificate extended key usage
. 2016.07.10 06:34:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.10 06:34:36 - OpenVPN > VERIFY EKU OK
. 2016.07.10 06:34:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.10 06:34:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 06:34:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 06:34:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 06:34:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 06:34:37 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.10 07:00:53 - Updating systems & servers data ...
. 2016.07.10 07:00:54 - Systems & servers data update completed
. 2016.07.10 07:20:01 - SSH > Initiating key re-exchange (timeout)
. 2016.07.10 07:20:01 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.10 07:20:01 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.10 07:20:02 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.10 07:20:02 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.10 07:20:02 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.10 07:20:02 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
. 2016.07.10 07:30:55 - Updating systems & servers data ...
. 2016.07.10 07:30:56 - Systems & servers data update completed
I 2016.07.10 07:34:36 - Renewing TLS key
. 2016.07.10 07:34:36 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.10 07:34:37 - OpenVPN > TLS: soft reset sec=0 bytes=160817875/0 pkts=292448/0
. 2016.07.10 07:34:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.10 07:34:37 - OpenVPN > Validating certificate key usage
. 2016.07.10 07:34:37 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.10 07:34:37 - OpenVPN > VERIFY KU OK
. 2016.07.10 07:34:37 - OpenVPN > Validating certificate extended key usage
. 2016.07.10 07:34:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.10 07:34:37 - OpenVPN > VERIFY EKU OK
. 2016.07.10 07:34:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.10 07:34:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 07:34:38 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 07:34:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 07:34:38 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 07:34:38 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.10 08:00:57 - Updating systems & servers data ...
. 2016.07.10 08:00:58 - Systems & servers data update completed
. 2016.07.10 08:20:02 - SSH > Initiating key re-exchange (timeout)
. 2016.07.10 08:20:02 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.10 08:20:02 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.10 08:20:03 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.10 08:20:03 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.10 08:20:03 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.10 08:20:03 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
. 2016.07.10 08:30:59 - Updating systems & servers data ...
. 2016.07.10 08:31:01 - Systems & servers data update completed
I 2016.07.10 08:34:37 - Renewing TLS key
. 2016.07.10 08:34:37 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.10 08:34:38 - OpenVPN > TLS: soft reset sec=0 bytes=168450898/0 pkts=304183/0
. 2016.07.10 08:34:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.10 08:34:38 - OpenVPN > Validating certificate key usage
. 2016.07.10 08:34:38 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.10 08:34:38 - OpenVPN > VERIFY KU OK
. 2016.07.10 08:34:38 - OpenVPN > Validating certificate extended key usage
. 2016.07.10 08:34:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.10 08:34:38 - OpenVPN > VERIFY EKU OK
. 2016.07.10 08:34:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.10 08:34:40 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 08:34:40 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 08:34:40 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 08:34:40 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 08:34:40 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2016.07.10 09:01:02 - Updating systems & servers data ...
. 2016.07.10 09:01:03 - Systems & servers data update completed
. 2016.07.10 09:20:03 - SSH > Initiating key re-exchange (timeout)
. 2016.07.10 09:20:03 - SSH > Doing Diffie-Hellman group exchange
. 2016.07.10 09:20:03 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.07.10 09:20:03 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.07.10 09:20:03 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.07.10 09:20:03 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.07.10 09:20:03 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
. 2016.07.10 09:31:07 - Updating systems & servers data ...
. 2016.07.10 09:31:09 - Systems & servers data update completed
I 2016.07.10 09:34:38 - Renewing TLS key
. 2016.07.10 09:34:38 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.10 09:34:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.10 09:34:40 - OpenVPN > Validating certificate key usage
. 2016.07.10 09:34:40 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.10 09:34:40 - OpenVPN > VERIFY KU OK
. 2016.07.10 09:34:40 - OpenVPN > Validating certificate extended key usage
. 2016.07.10 09:34:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.10 09:34:40 - OpenVPN > VERIFY EKU OK
. 2016.07.10 09:34:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.10 09:34:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 09:34:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 09:34:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.10 09:34:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.10 09:34:41 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA

 

 

Share this post


Link to post

Thank you, I'll update.  I'm just one of those, if it ain't broke, don't fix it people.  But I guess it's broke, so it's time to fix it.  I appreciate the help!

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...