altae 22 Posted ... Eddie Beta version 2.11.2 is working with Fedora 24. Yep, I can confirm that, works on my virtual machine (VMWare Workstation 12 Pro) with Fedora 24 KDE. Huge thank you to staff for fixing it Share this post Link to post
wer 14 Posted ... Just testing Eddie Beta version 2.11.2 on Arch Linux and it's working very well so far. Thanks! Share this post Link to post
andeby 7 Posted ... It turns out I had forgotten to switch from Windows Firewall to WFP network lock mode. I am in fact still getting the same error. :/ Share this post Link to post
LZ1 672 Posted ... It turns out I had forgotten to switch from Windows Firewall to WFP network lock mode. I am in fact still getting the same error. :/Did you try Automatic?? Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
chucknorris 1 Posted ... Just testing Eddie Beta version 2.11.2 on Arch Linux and it's working very well so far. Thanks!Did you compile it yourself or did you downloaded it from the AUR? Share this post Link to post
wer 14 Posted ... Did you compile it yourself or did you downloaded it from the AUR? I downloaded from the AUR. Share this post Link to post
bayoumedic 2 Posted ... problem with 2.11.2 on ubuntu running from terminal.profile Azha not found. command given used -server=Azha sudo airvpn -cli -login=XXXXXX -password=XXXXXX -server=Azha -netlock -connect I 2016.07.25 22:16:08 - Eddie client version: 2.11.2 / x86, System: Linux, Name: Ubuntu 14.04.4 LTS \n \l / x86. 2016.07.25 22:16:08 - Reading options from /home/XXX/.airvpn/AirVPN.xmlI 2016.07.25 22:16:08 - Press 'X' to Cancel, 'N' to connect/reconnect to the best available server.. 2016.07.25 22:16:08 - Data Path: /home/XXX/.airvpn. 2016.07.25 22:16:08 - App Path: /usr/lib/AirVPN. 2016.07.25 22:16:08 - Executable Path: /usr/lib/AirVPN/AirVPN.exe. 2016.07.25 22:16:08 - Command line arguments (7): path="/home/XXX/.airvpn" cli="True" login="XXXXXX" password="XXXXXX" server="Azha" netlock="True" connect="True". 2016.07.25 22:16:08 - Operating System: Unix 3.13.0.65 - Linux RMedia 3.13.0-65-generic #106-Ubuntu SMP Fri Oct 2 22:12:08 UTC 2015 i686 i686 i686 GNU/LinuxI 2016.07.25 22:16:08 - OpenVPN Driver - Found, /dev/net/tunI 2016.07.25 22:16:08 - OpenVPN - Version: OpenVPN 2.3.2 (/usr/sbin/openvpn)I 2016.07.25 22:16:08 - SSH - Version: OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.7, OpenSSL 1.0.1f 6 Jan 2014 (/usr/bin/ssh)I 2016.07.25 22:16:08 - SSL - Version: stunnel 4.53 (/usr/bin/stunnel4)! 2016.07.25 22:16:08 - Activation of Network Lock - Linux IPTablesI 2016.07.25 22:16:08 - Checking login .... 2016.07.25 22:16:08 - Updating systems & servers data ...! 2016.07.25 22:16:09 - Logged in.I 2016.07.25 22:16:09 - Session starting.W 2016.07.25 22:16:09 - Unable to understand if IPv6 is active.. 2016.07.25 22:16:12 - Systems & servers data update completed F 2016.07.25 22:16:14 - Requested profile 'Azha' not found. F 2016.07.25 22:16:14 - No server available.I 2016.07.25 22:16:14 - Cancel requested. Share this post Link to post
vpro_ 0 Posted ... still says 2.10.3 after install @vpro_That's odd, it sounds like other people posting in this thread have been able to successfully download the new beta versions for Windows. Which Windows version (XP, Vista/7, 8/10) are you trying to install? Which AirVPN version (.exe Installer, .zip portable) are you trying to install? Have you tried checking the hash of version you are trying to install against it's hashes on the website, in order to confirm you have downloaded the correct version? How to check hashes: https://airvpn.org/faq/software_signatures/ Hashes for eddie 64 bit 2.11.2 beta: Windows XP 64 bit Windows XP 64 bit .exe Installerhttps://airvpn.org/repository/experimental/airvpn_windows_xp_x64_installer.exeMD5: bd38b099b54f68b62e6d3078fb6fa014SHA1: a63f65e28299073e22131b94899ba097d842c0f3SHA256: 059f02809aafbd4a847b8d95b3f5045a19c01d6048a47f99469eb9143e5f9e94SHA512: 0b0931ff6bb375671c07349b15fc7c5cf16f3b853bc547dda478973c5e454e672f785fe09d8d5322b94a5937e7556611ce158787375068c442b8749e6d6fc2e6 Windows XP 64 bit .zip Portablehttps://airvpn.org/repository/experimental/airvpn_windows_xp_x64_portable.zipMD5: d48434efffab71315c03b265ff52501cSHA1: 592b2161f2c6af89376f1802e5d99b71bce8cc74SHA256: a8adf87805fdd4f7f8a6da9125b421312c3ad98f576e5557df0363a06f5b42d4SHA512: 4d969587c83f6b78e190e051342b7a74e44d3290a445531dc2a1bd1f2f121572ba6fdcab4df88c863259024691da79af0a3a926b95cadbfc34c972839cfa69aa Windows Vista/7 64 bit Windows Vista/7 64 bit .exe Installerhttps://airvpn.org/repository/experimental/airvpn_windows_x64_installer.exeMD5: 4ebb09978a25366d04af9c6294f8d34eSHA1: 5fb3588f37630b9b2e49c378e43ce6dffedb7788SHA256: 40071b4ab5f8762414d606fbed8823d91d84a522b54818188c02e3d4407cf282SHA512: 1cc88aa2dcebf325c2083151b3163b0414dd920248b184470f9b01d3a2f0c378208e9f3921aede035e8ece883565d52d8068257387cbab251b8240824ad462bd Windows Vista/7 64 bit .zip Portablehttps://airvpn.org/repository/experimental/airvpn_windows_x64_portable.zipMD5: 42d586d66e560f55b7172c55e75633ebSHA1: 717b150f1135298b851d8f066814ef5eb68999cbSHA256: 8e189f127990b331598dc37c8425b071e92adc6e846616ae4e7a2d8f424f2d92SHA512: 8999cce055ab096fa50b0f78759455441e70f94c66fddc995e4b55dd8d6a4e5afef3528eeaecfdf50fce902f8041252a44ff666eacc3d9378c51c21caa79d8b5 Windows 8/8.1/10 64 bit Windows 8/8.1/10 64 bit .exe Installerhttps://airvpn.org/repository/experimental/airvpn_windows8_x64_installer.exeMD5: 8a8a320f9bb99dbd3e86683b8c5c2be7SHA1: 992cc60d732811ddc95aa5c95944438866b3dc74SHA256: 62531c44265e57f2a3bba38e8d44f48bdee65a511b448b15c60231bb2617549bSHA512: e0189fde0c4564f72b0c04c0782b8822791a9fb8d188e61e806df385c757fa8789c1e7ccf7f627a7902dba5ecd02ec68da6ed4dce2d3c886f4be81feb7d5b651 Windows 8/8.1/10 64 bit .zip Portablehttps://airvpn.org/repository/experimental/airvpn_windows8_x64_portable.zipMD5: f25f3eb818896b2b02230c5c15ac9132SHA1: 2c5293745868f49c07c77b62b2e6f208c0af76f0SHA256: 20692b071a2ca3afef58e7ca337f60863358fa62add70aad55fda7ddfb07c107SHA512: 639a181210795dd7f9ab4dd65d2bb28ce20d66f25ef46b4d7de6b9755aeb08c2935bc8b298981dc3fb581122f3141052f47d4c736e6abe6cc29a742f841b7500 -Uncle Hunto Yeah I downloaded it with a different browser, through vpn and still installing old version .exe version. Windows 10 64 bit. The MD5 is different: 865AB7BB6E06820559DDD0897AB8DEC6 I'm clicking experimental. Edit: Forgot to disable ipv6 now via vpn it downloaded correctly then after enable because of the bug mentioned before. Share this post Link to post
Guest Posted ... Wow, thanks for the patch. Looks like I actually contributed into fixing the driver installation message. Edit: Still unfixed, but restarting Windows solves it, so I guess it's no biggie. For those having WebRTC leak, I don't know if I can say this here, but if you are using Chrome I would suggest a simple extension called "uBlock" which has a feature of "Prevent WebRTC from leaking local IP addresses". Don't know the specifics, but it works. I got the extension for dynamic filtering, but it had this option as well. Share this post Link to post
Staff 9973 Posted ... Hello! New version 2.11.3beta is now available. Version 2.11.2beta is no more available and RC. Changelog from 2.11.2beta:[bugfix] - Error "Unknown Interface ID" and related WFP errors[new] - Added CLI edition to .deb, .rpm and Mono portable[new] - Added Exit IP to title/status/tray message[new] - Added "Reset to default settings" command in Settings[new] - Windows/Linux - Added an option to start minimized[change] - Tab Settings -> Proxy renamed to "Proxy / Tor"[bugfix] - Windows - Bugfix rare situation when options are not saved at exit[change] - Dump only change option in Support Logs[new] - OS X - Options to show status/speed/server informations in status bar[bugfix] - Windows/Linux - CLI -server option fixedKind regards 7 encrypted, bnrrteterstnjrsj45, snaggle and 4 others reacted to this Share this post Link to post
Keksjdjdke 35 Posted ... When I wake my Mac after it has been sleeping I Have many of theses errors in my log. It only seams to happen When my Mac is sleeping. Here is the error message I keep getting. I 2016.07.27 18:27:34 - Eddie client version: 2.11.3 / x86, System: OSX, Name: 10.12 / x64 . 2016.07.27 18:55:49 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #46587 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 18:55:49 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #46588 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 18:55:49 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #46590 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 18:55:49 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #46591 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 18:55:49 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #46592 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 18:55:49 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #46594 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 18:55:49 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #46595 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 18:55:49 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #46596 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings Share this post Link to post
lordbeau 8 Posted ... Wow! Really quick and snappy connect and disconnect! No crashes for me yet, and other problems apparently solved. Thanks! So far so good! 1 bnrrteterstnjrsj45 reacted to this Share this post Link to post
lordbeau 8 Posted ... Quick follow-up. I'm experiencing massive DNS leaks with the new client. I advise others to check this at ipleak.net the moment they connect (I'm sure most people would, anyway!). IPv6 is disabled, so I'm not sure what's causing it. Share this post Link to post
Clodo 176 Posted ... Quick follow-up. I'm experiencing massive DNS leaks with the new client. I advise others to check this at ipleak.net the moment they connect (I'm sure most people would, anyway!). IPv6 is disabled, so I'm not sure what's causing it.In Settings, Ensure you have DNS -> "DNS Switch Mode" on "Automatic" Ensure you have Advanced -> "Ensure DNS Lock" checked and post a log and your OS, please. After, try to enable Advanced -> "Force all network interfaces for DNS". Thanks. Share this post Link to post
H8SOCIETY 7 Posted ... Installed 2.11.3 on Win 8.1 x64... No more WFP errors and NO leaks, BUT After booting my Computer there is a short Skype internet connection even BEFORE VPN Client is booting.... I thought with WFP Lock-mode, there is no internet connection possible without VPN client? Share this post Link to post
Staff 9973 Posted ... Installed 2.11.3 on Win 8.1 x64... No more WFP errors and NO leaks, BUT After booting my Computer there is a short Skype internet connection even BEFORE VPN Client is booting.... I thought with WFP Lock-mode, there is no internet connection psooible withoit vpn client? Hello! Note that when the client is not running there is NO Network Lock. The client restores WFP or firewall rules when it is shut down. Additionally, the rules do not survive a reboot. Both these features are intentional. If you wish a permanent Network Lock the solution is trivial, just block all the traffic with pemanent firewall rules and keep Network Lock enabled. Then, you have a particular case. If Eddie crashes, or when it is killed without grace, the Network Lock remains "active" (this is of course essential), but as usual will not survive a reboot. Kind regards Share this post Link to post
H8SOCIETY 7 Posted ... "Windows users, please be aware that the new Network Lock method uses the WFP in persistent mode, so the Network Lock settings will survive even a reboot, when Network Lock is not disabled properly in Eddie." Thats why i was asking ;-) Share this post Link to post
Staff 9973 Posted ... "Windows users, please be aware that the new Network Lock method uses the WFP in persistent mode, so the Network Lock settings will survive even a reboot, when Network Lock is not disabled properly in Eddie." Thats why i was asking ;-) Hello! A bad mistake, we did not edit this. That was a momentary behavior that needed a fix. Now it has been fixed but we did not edit the message, we apologize for the inconvenience. Kind regards Share this post Link to post
foxmulder 43 Posted ... What's the difference between WFP and the Firewall ? Which method should i use ? Or should i just choose "Automatic" and let Eddie handle it ? Regards Fox Share this post Link to post
bnrrteterstnjrsj45 0 Posted ... Staff, it's normal behavior if it's cannot connect while Network Lock deactivated? Isn't because you have enabled this in settings, i.e. look to what you've enabled? Share this post Link to post
user0106390 1 Posted ... Quick follow-up. I'm experiencing massive DNS leaks with the new client. I advise others to check this at ipleak.net the moment they connect (I'm sure most people would, anyway!). IPv6 is disabled, so I'm not sure what's causing it.In Settings,Ensure you have DNS -> "DNS Switch Mode" on "Automatic"Ensure you have Advanced -> "Ensure DNS Lock" checkedand post a log and your OS, please. After, try to enable Advanced -> "Force all network interfaces for DNS".Thanks.I can confirm that there's a DNS leak in 2.11.3 on Win 10 Pro x64. "Force all network interfaces for DNS" fixed it. Share this post Link to post
go558a83nk 362 Posted ... Hello! We're very glad to inform you that a new Eddie Air client version has been released: 2.11beta. This software has passed successfully internal alpha testing weeks ago, and finally passed internal beta testing now. It is ready for public beta testing and we consider it a Release Candidate of the 2.11 stable version. Anyway, remember that it's still a beta version, so if you don't feel adventurous you might like to stay with 2.10.3 (stable). To download Eddie 2.11beta please select "Other versions" > "Experimental" from the download page. UPDATE 24-Jul-16: version 2.11.2beta has been released. Please see all the updates here:https://airvpn.org/topic/18625-eddie-211beta-available/page-3?do=findComment&comment=45795 UPDATE 28-Jul-16: version 2.11.3beta has been released. Please see all the updates here_https://airvpn.org/topic/18625-eddie-211beta-available/page-5?do=findComment&comment=46114 The current Eddie status: a message from the chief developer First of all, we apologize for the delay of this release. We are working on two different versions of Eddie: 2.x and 3.x. Eddie 3.x will have a new UI engine (also based on GTK+ under Linux, to drop Mono WinForms that are affected by a lot of unresolved bug) and a lot of new features. We plan to release Eddie 3.x soon, but it's not ready/stable yet, so we decided to port some of the new features back to Eddie 2.x edition. This was the cause of the delay: a lot of features are totally rewritten (for example the OpenVPN directives manager).We promise that next releases and bugfixes will be faster. Biggest changes in Eddie 2.11: - Latest versions of OpenVPN (2.3.11) and stunnel (5.32), built with OpenSSL 1.0.2h.- A new Network Lock method under Windows (Windows Firewall not used anymore)- A new IPv6 lock method under Windows- A new DNS lock method under Windows- Built with Mono 4 under GNU/Linux- New ports/protocols available- DPI-Aware UI under Windows. System fonts used both in Windows and Linux.- Various bug fixes- And so many other internal changes and minor UI updates. Please see the changelog:https://airvpn.org/services/changelog.php?software=client&format=html === Windows users, please be aware that the new Network Lock method uses the WFP in persistent mode, so the Network Lock settings will survive even a reboot, when Network Lock is not disabled properly in Eddie. If you kill Eddie without grace, or Eddie crashes, just re-run it (even after a reboot) to cancel Network Lock. We might change this behavior according to your feedback. Eddie 2.11beta for GNU Linux can be downloaded here: https://airvpn.org/linuxEddie 2.11beta for Windows can be downloaded here: https://airvpn.org/windowsEddie 2.11beta for OS X Mavericks, Yosemite and El Capitan only can be downloaded here: https://airvpn.org/macosxPLEASE NOTE: Eddie 2.11beta package includes an OpenVPN version re-compiled by us from OpenVPN 2.3.11 source code with OpenSSL 1.0.2h for security reasons and to fix this bug: https://community.openvpn.net/openvpn/ticket/328 Eddie overview is available here: https://airvpn.org/softwareEddie includes a Network Lock feature: https://airvpn.org/faq/software_lockEddie 2.11 is free and open source software released under GPLv3. GitHub repository https://github.com/AirVPN/airvpn-client Kind regards & dataloveAirVPN Staff I read a post in the past that stated your future plans for Eddie include the ability to use it for any VPN configuration, not just AirVPN. Is that still a goal? Will it be in v. 3? Share this post Link to post
UncleHunto 6 Posted ... I was running eddie 2.11.2 for a couple days on my Manjaro 64-bit install, until the GUI disappeared. Here are the relevant logs: . 2016.07.27 00:06:29 - Updating systems & servers data .... 2016.07.27 00:06:31 - Systems & servers data update completed. 2016.07.27 00:16:31 - Updating systems & servers data .... 2016.07.27 00:16:33 - Systems & servers data update completed. 2016.07.27 00:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=3081130173/0 pkts=3395232/0. 2016.07.27 00:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 00:21:44 - OpenVPN > Validating certificate key usage. 2016.07.27 00:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 00:21:44 - OpenVPN > VERIFY KU OK. 2016.07.27 00:21:44 - OpenVPN > Validating certificate extended key usage. 2016.07.27 00:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 00:21:44 - OpenVPN > VERIFY EKU OK. 2016.07.27 00:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 00:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 00:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 00:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 00:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 00:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 00:26:33 - Updating systems & servers data .... 2016.07.27 00:26:34 - Systems & servers data update completed. 2016.07.27 00:36:35 - Updating systems & servers data .... 2016.07.27 00:36:36 - Systems & servers data update completed. 2016.07.27 00:46:36 - Updating systems & servers data .... 2016.07.27 00:46:38 - Systems & servers data update completed. 2016.07.27 00:56:38 - Updating systems & servers data .... 2016.07.27 00:56:40 - Systems & servers data update completed. 2016.07.27 01:06:40 - Updating systems & servers data .... 2016.07.27 01:06:42 - Systems & servers data update completed. 2016.07.27 01:16:42 - Updating systems & servers data .... 2016.07.27 01:16:44 - Systems & servers data update completed. 2016.07.27 01:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=3091877706/0 pkts=3541997/0. 2016.07.27 01:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 01:21:44 - OpenVPN > Validating certificate key usage. 2016.07.27 01:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 01:21:44 - OpenVPN > VERIFY KU OK. 2016.07.27 01:21:44 - OpenVPN > Validating certificate extended key usage. 2016.07.27 01:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 01:21:44 - OpenVPN > VERIFY EKU OK. 2016.07.27 01:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 01:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 01:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 01:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 01:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 01:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 01:26:44 - Updating systems & servers data .... 2016.07.27 01:26:45 - Systems & servers data update completed. 2016.07.27 01:36:46 - Updating systems & servers data .... 2016.07.27 01:36:47 - Systems & servers data update completed. 2016.07.27 01:46:48 - Updating systems & servers data .... 2016.07.27 01:46:49 - Systems & servers data update completed. 2016.07.27 01:49:35 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #780486 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 01:49:55 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #807073 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 01:56:49 - Updating systems & servers data .... 2016.07.27 01:56:51 - Systems & servers data update completed. 2016.07.27 02:06:51 - Updating systems & servers data .... 2016.07.27 02:06:53 - Systems & servers data update completed. 2016.07.27 02:16:53 - Updating systems & servers data .... 2016.07.27 02:16:55 - Systems & servers data update completed. 2016.07.27 02:18:04 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1597635 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 02:18:04 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1597637 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 02:18:04 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1597640 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 02:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=4385000996/0 pkts=4799318/0. 2016.07.27 02:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 02:21:44 - OpenVPN > Validating certificate key usage. 2016.07.27 02:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 02:21:44 - OpenVPN > VERIFY KU OK. 2016.07.27 02:21:44 - OpenVPN > Validating certificate extended key usage. 2016.07.27 02:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 02:21:44 - OpenVPN > VERIFY EKU OK. 2016.07.27 02:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 02:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 02:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 02:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 02:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 02:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 02:26:55 - Updating systems & servers data .... 2016.07.27 02:26:57 - Systems & servers data update completed. 2016.07.27 02:36:57 - Updating systems & servers data .... 2016.07.27 02:36:58 - Systems & servers data update completed. 2016.07.27 02:37:34 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #304767 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 02:46:59 - Updating systems & servers data .... 2016.07.27 02:47:00 - Systems & servers data update completed. 2016.07.27 02:51:03 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #561824 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 02:57:01 - Updating systems & servers data .... 2016.07.27 02:57:02 - Systems & servers data update completed. 2016.07.27 03:07:02 - Updating systems & servers data .... 2016.07.27 03:07:04 - Systems & servers data update completed. 2016.07.27 03:14:37 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1115554 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 03:17:04 - Updating systems & servers data .... 2016.07.27 03:17:06 - Systems & servers data update completed. 2016.07.27 03:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=3063608659/0 pkts=3375487/0. 2016.07.27 03:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 03:21:44 - OpenVPN > Validating certificate key usage. 2016.07.27 03:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 03:21:44 - OpenVPN > VERIFY KU OK. 2016.07.27 03:21:44 - OpenVPN > Validating certificate extended key usage. 2016.07.27 03:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 03:21:44 - OpenVPN > VERIFY EKU OK. 2016.07.27 03:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 03:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 03:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 03:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 03:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 03:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 03:27:06 - Updating systems & servers data .... 2016.07.27 03:27:08 - Systems & servers data update completed. 2016.07.27 03:30:07 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #113121 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 03:37:08 - Updating systems & servers data .... 2016.07.27 03:37:10 - Systems & servers data update completed. 2016.07.27 03:47:10 - Updating systems & servers data .... 2016.07.27 03:47:11 - Systems & servers data update completed. 2016.07.27 03:57:12 - Updating systems & servers data .... 2016.07.27 03:57:13 - Systems & servers data update completed. 2016.07.27 04:07:13 - Updating systems & servers data .... 2016.07.27 04:07:15 - Systems & servers data update completed. 2016.07.27 04:17:15 - Updating systems & servers data .... 2016.07.27 04:17:17 - Systems & servers data update completed. 2016.07.27 04:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=2574863584/0 pkts=2849977/0. 2016.07.27 04:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 04:21:44 - OpenVPN > Validating certificate key usage. 2016.07.27 04:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 04:21:44 - OpenVPN > VERIFY KU OK. 2016.07.27 04:21:44 - OpenVPN > Validating certificate extended key usage. 2016.07.27 04:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 04:21:44 - OpenVPN > VERIFY EKU OK. 2016.07.27 04:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 04:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 04:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 04:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 04:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 04:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 04:27:17 - Updating systems & servers data .... 2016.07.27 04:27:19 - Systems & servers data update completed. 2016.07.27 04:37:19 - Updating systems & servers data .... 2016.07.27 04:37:21 - Systems & servers data update completed. 2016.07.27 04:45:53 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #406446 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 04:47:21 - Updating systems & servers data .... 2016.07.27 04:47:23 - Systems & servers data update completed. 2016.07.27 04:52:35 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #509485 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 04:57:23 - Updating systems & servers data .... 2016.07.27 04:57:24 - Systems & servers data update completed. 2016.07.27 05:07:25 - Updating systems & servers data .... 2016.07.27 05:07:26 - Systems & servers data update completed. 2016.07.27 05:17:26 - Updating systems & servers data .... 2016.07.27 05:17:28 - Systems & servers data update completed. 2016.07.27 05:17:40 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #889345 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 05:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=2066255490/0 pkts=2317473/0. 2016.07.27 05:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 05:21:44 - OpenVPN > Validating certificate key usage. 2016.07.27 05:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 05:21:44 - OpenVPN > VERIFY KU OK. 2016.07.27 05:21:44 - OpenVPN > Validating certificate extended key usage. 2016.07.27 05:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 05:21:44 - OpenVPN > VERIFY EKU OK. 2016.07.27 05:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 05:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 05:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 05:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 05:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 05:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 05:27:28 - Updating systems & servers data .... 2016.07.27 05:27:30 - Systems & servers data update completed. 2016.07.27 05:37:30 - Updating systems & servers data .... 2016.07.27 05:37:32 - Systems & servers data update completed. 2016.07.27 05:42:22 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #297672 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 05:47:32 - Updating systems & servers data .... 2016.07.27 05:47:34 - Systems & servers data update completed. 2016.07.27 05:57:35 - Updating systems & servers data .... 2016.07.27 05:57:36 - Systems & servers data update completed. 2016.07.27 06:07:36 - Updating systems & servers data .... 2016.07.27 06:07:50 - Systems & servers data update completed. 2016.07.27 06:17:50 - Updating systems & servers data .... 2016.07.27 06:17:52 - Systems & servers data update completed. 2016.07.27 06:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=1954723182/0 pkts=2245922/0. 2016.07.27 06:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 06:21:44 - OpenVPN > Validating certificate key usage. 2016.07.27 06:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 06:21:44 - OpenVPN > VERIFY KU OK. 2016.07.27 06:21:44 - OpenVPN > Validating certificate extended key usage. 2016.07.27 06:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 06:21:44 - OpenVPN > VERIFY EKU OK. 2016.07.27 06:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 06:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 06:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 06:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 06:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 06:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 06:27:52 - Updating systems & servers data .... 2016.07.27 06:27:54 - Systems & servers data update completed. 2016.07.27 06:37:54 - Updating systems & servers data .... 2016.07.27 06:37:55 - Systems & servers data update completed. 2016.07.27 06:47:56 - Updating systems & servers data .... 2016.07.27 06:47:57 - Systems & servers data update completed. 2016.07.27 06:57:57 - Updating systems & servers data .... 2016.07.27 06:57:59 - Systems & servers data update completed. 2016.07.27 07:07:59 - Updating systems & servers data .... 2016.07.27 07:08:01 - Systems & servers data update completed. 2016.07.27 07:18:01 - Updating systems & servers data .... 2016.07.27 07:18:03 - Systems & servers data update completed. 2016.07.27 07:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=2811236611/0 pkts=3873063/0. 2016.07.27 07:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 07:21:44 - OpenVPN > Validating certificate key usage. 2016.07.27 07:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 07:21:44 - OpenVPN > VERIFY KU OK. 2016.07.27 07:21:44 - OpenVPN > Validating certificate extended key usage. 2016.07.27 07:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 07:21:44 - OpenVPN > VERIFY EKU OK. 2016.07.27 07:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 07:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 07:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 07:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 07:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 07:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 07:28:03 - Updating systems & servers data .... 2016.07.27 07:28:05 - Systems & servers data update completed. 2016.07.27 07:38:05 - Updating systems & servers data .... 2016.07.27 07:38:06 - Systems & servers data update completed. 2016.07.27 07:41:47 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #325845 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 07:48:07 - Updating systems & servers data .... 2016.07.27 07:48:08 - Systems & servers data update completed. 2016.07.27 07:51:11 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #537856 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 07:51:17 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #540845 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 07:58:08 - Updating systems & servers data .... 2016.07.27 07:58:10 - Systems & servers data update completed. 2016.07.27 08:08:10 - Updating systems & servers data .... 2016.07.27 08:08:13 - Systems & servers data update completed. 2016.07.27 08:18:13 - Updating systems & servers data .... 2016.07.27 08:18:15 - Systems & servers data update completed. 2016.07.27 08:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=1944420698/0 pkts=2686956/0. 2016.07.27 08:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 08:21:44 - OpenVPN > Validating certificate key usage. 2016.07.27 08:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 08:21:44 - OpenVPN > VERIFY KU OK. 2016.07.27 08:21:44 - OpenVPN > Validating certificate extended key usage. 2016.07.27 08:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 08:21:44 - OpenVPN > VERIFY EKU OK. 2016.07.27 08:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 08:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 08:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 08:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 08:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 08:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 08:28:15 - Updating systems & servers data .... 2016.07.27 08:28:17 - Systems & servers data update completed. 2016.07.27 08:38:17 - Updating systems & servers data .... 2016.07.27 08:38:19 - Systems & servers data update completed. 2016.07.27 08:43:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #425662 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 08:48:19 - Updating systems & servers data .... 2016.07.27 08:48:20 - Systems & servers data update completed. 2016.07.27 08:58:21 - Updating systems & servers data .... 2016.07.27 08:58:22 - Systems & servers data update completed. 2016.07.27 09:08:23 - Updating systems & servers data .... 2016.07.27 09:08:24 - Systems & servers data update completed. 2016.07.27 09:18:24 - Updating systems & servers data .... 2016.07.27 09:18:26 - Systems & servers data update completed. 2016.07.27 09:18:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1284360 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 09:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=2614957705/0 pkts=3410895/0. 2016.07.27 09:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 09:21:44 - OpenVPN > Validating certificate key usage. 2016.07.27 09:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 09:21:44 - OpenVPN > VERIFY KU OK. 2016.07.27 09:21:44 - OpenVPN > Validating certificate extended key usage. 2016.07.27 09:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 09:21:44 - OpenVPN > VERIFY EKU OK. 2016.07.27 09:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 09:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 09:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 09:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 09:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 09:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 09:28:26 - Updating systems & servers data .... 2016.07.27 09:28:28 - Systems & servers data update completed. 2016.07.27 09:38:28 - Updating systems & servers data .... 2016.07.27 09:38:30 - Systems & servers data update completed. 2016.07.27 09:48:30 - Updating systems & servers data .... 2016.07.27 09:48:32 - Systems & servers data update completed. 2016.07.27 09:58:32 - Updating systems & servers data .... 2016.07.27 09:58:34 - Systems & servers data update completed. 2016.07.27 10:08:34 - Updating systems & servers data .... 2016.07.27 10:08:40 - Systems & servers data update completed. 2016.07.27 10:18:41 - Updating systems & servers data .... 2016.07.27 10:18:42 - Systems & servers data update completed. 2016.07.27 10:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=5274172042/0 pkts=6498192/0. 2016.07.27 10:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 10:21:44 - OpenVPN > Validating certificate key usage. 2016.07.27 10:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 10:21:44 - OpenVPN > VERIFY KU OK. 2016.07.27 10:21:44 - OpenVPN > Validating certificate extended key usage. 2016.07.27 10:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 10:21:44 - OpenVPN > VERIFY EKU OK. 2016.07.27 10:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 10:21:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 10:21:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 10:21:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 10:21:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 10:21:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 10:28:43 - Updating systems & servers data .... 2016.07.27 10:28:44 - Systems & servers data update completed. 2016.07.27 10:30:35 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #212727 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 10:38:44 - Updating systems & servers data .... 2016.07.27 10:38:46 - Systems & servers data update completed. 2016.07.27 10:44:03 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #655562 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 10:44:08 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #660353 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 10:44:08 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #660355 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 10:48:46 - Updating systems & servers data .... 2016.07.27 10:48:48 - Systems & servers data update completed. 2016.07.27 10:58:48 - Updating systems & servers data .... 2016.07.27 10:58:50 - Systems & servers data update completed. 2016.07.27 11:08:51 - Updating systems & servers data .... 2016.07.27 11:08:52 - Systems & servers data update completed. 2016.07.27 11:18:53 - Updating systems & servers data .... 2016.07.27 11:18:54 - Systems & servers data update completed. 2016.07.27 11:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=4104111581/0 pkts=4673197/0. 2016.07.27 11:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 11:21:44 - OpenVPN > Validating certificate key usage. 2016.07.27 11:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 11:21:44 - OpenVPN > VERIFY KU OK. 2016.07.27 11:21:44 - OpenVPN > Validating certificate extended key usage. 2016.07.27 11:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 11:21:44 - OpenVPN > VERIFY EKU OK. 2016.07.27 11:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 11:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 11:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 11:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 11:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 11:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 11:28:54 - Updating systems & servers data .... 2016.07.27 11:28:56 - Systems & servers data update completed. 2016.07.27 11:38:56 - Updating systems & servers data .... 2016.07.27 11:38:58 - Systems & servers data update completed. 2016.07.27 11:48:58 - Updating systems & servers data .... 2016.07.27 11:49:00 - Systems & servers data update completed. 2016.07.27 11:59:00 - Updating systems & servers data .... 2016.07.27 11:59:01 - Systems & servers data update completed. 2016.07.27 12:09:02 - Updating systems & servers data .... 2016.07.27 12:09:03 - Systems & servers data update completed. 2016.07.27 12:19:04 - Updating systems & servers data .... 2016.07.27 12:19:05 - Systems & servers data update completed. 2016.07.27 12:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=3472927897/0 pkts=4186858/0. 2016.07.27 12:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 12:21:44 - OpenVPN > Validating certificate key usage. 2016.07.27 12:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 12:21:44 - OpenVPN > VERIFY KU OK. 2016.07.27 12:21:44 - OpenVPN > Validating certificate extended key usage. 2016.07.27 12:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 12:21:44 - OpenVPN > VERIFY EKU OK. 2016.07.27 12:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 12:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 12:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 12:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 12:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 12:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 12:29:05 - Updating systems & servers data .... 2016.07.27 12:29:07 - Systems & servers data update completed. 2016.07.27 12:31:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #211530 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 12:39:07 - Updating systems & servers data .... 2016.07.27 12:39:09 - Systems & servers data update completed. 2016.07.27 12:49:09 - Updating systems & servers data .... 2016.07.27 12:49:11 - Systems & servers data update completed. 2016.07.27 12:59:11 - Updating systems & servers data .... 2016.07.27 12:59:14 - Systems & servers data update completed. 2016.07.27 13:09:14 - Updating systems & servers data .... 2016.07.27 13:09:15 - Systems & servers data update completed. 2016.07.27 13:19:16 - Updating systems & servers data .... 2016.07.27 13:19:17 - Systems & servers data update completed. 2016.07.27 13:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=1898161784/0 pkts=2336243/0. 2016.07.27 13:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 13:21:44 - OpenVPN > Validating certificate key usage. 2016.07.27 13:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 13:21:44 - OpenVPN > VERIFY KU OK. 2016.07.27 13:21:44 - OpenVPN > Validating certificate extended key usage. 2016.07.27 13:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 13:21:44 - OpenVPN > VERIFY EKU OK. 2016.07.27 13:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 13:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 13:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 13:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 13:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 13:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 13:28:34 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #89701 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 13:29:17 - Updating systems & servers data .... 2016.07.27 13:29:19 - Systems & servers data update completed. 2016.07.27 13:39:19 - Updating systems & servers data .... 2016.07.27 13:39:21 - Systems & servers data update completed. 2016.07.27 13:40:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #314556 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 13:49:21 - Updating systems & servers data .... 2016.07.27 13:49:23 - Systems & servers data update completed. 2016.07.27 13:59:23 - Updating systems & servers data .... 2016.07.27 13:59:25 - Systems & servers data update completed. 2016.07.27 14:09:25 - Updating systems & servers data .... 2016.07.27 14:09:31 - Systems & servers data update completed. 2016.07.27 14:19:07 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1193536 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 14:19:32 - Updating systems & servers data .... 2016.07.27 14:19:33 - Systems & servers data update completed. 2016.07.27 14:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=2266718558/0 pkts=2813421/0. 2016.07.27 14:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 14:21:44 - OpenVPN > Validating certificate key usage. 2016.07.27 14:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 14:21:44 - OpenVPN > VERIFY KU OK. 2016.07.27 14:21:44 - OpenVPN > Validating certificate extended key usage. 2016.07.27 14:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 14:21:44 - OpenVPN > VERIFY EKU OK. 2016.07.27 14:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 14:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 14:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 14:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 14:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 14:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 14:29:33 - Updating systems & servers data .... 2016.07.27 14:29:35 - Systems & servers data update completed. 2016.07.27 14:39:35 - Updating systems & servers data .... 2016.07.27 14:39:37 - Systems & servers data update completed. 2016.07.27 14:49:37 - Updating systems & servers data .... 2016.07.27 14:49:39 - Systems & servers data update completed. 2016.07.27 14:59:39 - Updating systems & servers data .... 2016.07.27 14:59:41 - Systems & servers data update completed. 2016.07.27 15:09:41 - Updating systems & servers data .... 2016.07.27 15:09:42 - Systems & servers data update completed. 2016.07.27 15:10:33 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1467251 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 15:10:33 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1467289 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 15:19:43 - Updating systems & servers data .... 2016.07.27 15:19:44 - Systems & servers data update completed. 2016.07.27 15:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=4163675254/0 pkts=4657009/0. 2016.07.27 15:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 15:21:44 - OpenVPN > Validating certificate key usage. 2016.07.27 15:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 15:21:44 - OpenVPN > VERIFY KU OK. 2016.07.27 15:21:44 - OpenVPN > Validating certificate extended key usage. 2016.07.27 15:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 15:21:44 - OpenVPN > VERIFY EKU OK. 2016.07.27 15:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 15:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 15:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 15:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 15:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 15:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 15:29:45 - Updating systems & servers data .... 2016.07.27 15:29:46 - Systems & servers data update completed. 2016.07.27 15:39:46 - Updating systems & servers data .... 2016.07.27 15:39:48 - Systems & servers data update completed. 2016.07.27 15:49:48 - Updating systems & servers data .... 2016.07.27 15:49:50 - Systems & servers data update completed. 2016.07.27 15:50:21 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #720969 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 15:59:50 - Updating systems & servers data .... 2016.07.27 15:59:52 - Systems & servers data update completed. 2016.07.27 16:01:06 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #936321 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 16:07:05 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1039031 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 16:09:52 - Updating systems & servers data .... 2016.07.27 16:09:54 - Systems & servers data update completed. 2016.07.27 16:19:54 - Updating systems & servers data .... 2016.07.27 16:19:55 - Systems & servers data update completed. 2016.07.27 16:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=2934976797/0 pkts=3117612/0. 2016.07.27 16:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 16:21:44 - OpenVPN > Validating certificate key usage. 2016.07.27 16:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 16:21:44 - OpenVPN > VERIFY KU OK. 2016.07.27 16:21:44 - OpenVPN > Validating certificate extended key usage. 2016.07.27 16:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 16:21:44 - OpenVPN > VERIFY EKU OK. 2016.07.27 16:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 16:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 16:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 16:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 16:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 16:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 16:29:56 - Updating systems & servers data .... 2016.07.27 16:29:57 - Systems & servers data update completed. 2016.07.27 16:38:05 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #357851 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 16:39:58 - Updating systems & servers data .... 2016.07.27 16:39:59 - Systems & servers data update completed. 2016.07.27 16:49:59 - Updating systems & servers data .... 2016.07.27 16:50:01 - Systems & servers data update completed. 2016.07.27 17:00:01 - Updating systems & servers data .... 2016.07.27 17:00:03 - Systems & servers data update completed. 2016.07.27 17:00:06 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #818442 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 17:00:06 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #818455 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 17:10:03 - Updating systems & servers data .... 2016.07.27 17:10:05 - Systems & servers data update completed. 2016.07.27 17:20:05 - Updating systems & servers data .... 2016.07.27 17:20:07 - Systems & servers data update completed. 2016.07.27 17:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=3123299588/0 pkts=3367755/0. 2016.07.27 17:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 17:21:44 - OpenVPN > Validating certificate key usage. 2016.07.27 17:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 17:21:44 - OpenVPN > VERIFY KU OK. 2016.07.27 17:21:44 - OpenVPN > Validating certificate extended key usage. 2016.07.27 17:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 17:21:44 - OpenVPN > VERIFY EKU OK. 2016.07.27 17:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 17:21:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 17:21:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 17:21:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 17:21:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 17:21:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 17:30:07 - Updating systems & servers data .... 2016.07.27 17:30:08 - Systems & servers data update completed. 2016.07.27 17:35:40 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #272010 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 17:40:09 - Updating systems & servers data .... 2016.07.27 17:40:10 - Systems & servers data update completed. 2016.07.27 17:41:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #380957 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 17:50:11 - Updating systems & servers data .... 2016.07.27 17:50:12 - Systems & servers data update completed. 2016.07.27 18:00:12 - Updating systems & servers data .... 2016.07.27 18:00:14 - Systems & servers data update completed. 2016.07.27 18:10:14 - Updating systems & servers data .... 2016.07.27 18:10:16 - Systems & servers data update completed. 2016.07.27 18:12:59 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #839311 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 18:20:16 - Updating systems & servers data .... 2016.07.27 18:20:18 - Systems & servers data update completedI 2016.07.27 18:21:44 - Renewing TLS key. 2016.07.27 18:21:44 - OpenVPN > TLS: tls_process: killed expiring key. 2016.07.27 18:21:45 - OpenVPN > TLS: soft reset sec=0 bytes=1813230734/0 pkts=2031309/0. 2016.07.27 18:21:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 18:21:45 - OpenVPN > Validating certificate key usage. 2016.07.27 18:21:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 18:21:45 - OpenVPN > VERIFY KU OK. 2016.07.27 18:21:45 - OpenVPN > Validating certificate extended key usage. 2016.07.27 18:21:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 18:21:45 - OpenVPN > VERIFY EKU OK. 2016.07.27 18:21:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 18:21:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 18:21:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 18:21:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 18:21:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 18:21:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 18:30:18 - Updating systems & servers data .... 2016.07.27 18:30:20 - Systems & servers data update completed. 2016.07.27 18:37:40 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #235205 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 18:40:20 - Updating systems & servers data .... 2016.07.27 18:40:21 - Systems & servers data update completed. 2016.07.27 18:41:09 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #354762 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 18:50:22 - Updating systems & servers data .... 2016.07.27 18:50:23 - Systems & servers data update completed. 2016.07.27 19:00:23 - Updating systems & servers data .... 2016.07.27 19:00:25 - Systems & servers data update completed. 2016.07.27 19:00:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #627074 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 19:00:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #627075 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 19:03:58 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #666013 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 19:10:25 - Updating systems & servers data .... 2016.07.27 19:10:27 - Systems & servers data update completed. 2016.07.27 19:11:08 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #790499 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 19:20:27 - Updating systems & servers data .... 2016.07.27 19:20:29 - Systems & servers data update completed. 2016.07.27 19:21:45 - OpenVPN > TLS: soft reset sec=0 bytes=1770522842/0 pkts=2067518/0. 2016.07.27 19:21:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.07.27 19:21:45 - OpenVPN > Validating certificate key usage. 2016.07.27 19:21:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.07.27 19:21:45 - OpenVPN > VERIFY KU OK. 2016.07.27 19:21:45 - OpenVPN > Validating certificate extended key usage. 2016.07.27 19:21:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.07.27 19:21:45 - OpenVPN > VERIFY EKU OK. 2016.07.27 19:21:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.07.27 19:21:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 19:21:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 19:21:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.07.27 19:21:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.07.27 19:21:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.07.27 19:23:38 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #6251 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2016.07.27 19:30:29 - Updating systems & servers data .... 2016.07.27 19:30:31 - Systems & servers data update completedDNS switching/checking has been quite touchy for me. I have only been successful using the renaming method of DNS switching. Using either the automatic or resolvconf method will resolve in the DNS check failing. sometimes it fails even if using the renaming method. I tried installing eddie 2.11.3, was able to get it to connect once, then after that it would always fail the DNS check even when I had the renaming method selected. I ended up having to uninstall eddie 2.11.3, downgrade mono back to 4.0.4.1, and install eddie 2.10.3 in order to connect again.-Uncle Hunto Share this post Link to post