Jump to content
Not connected, Your IP: 3.145.102.18
Staff

Eddie 2.11beta available

Recommended Posts

Eddie Beta version 2.11.2 is working with Fedora 24.

 

Yep, I can confirm that, works on my virtual machine (VMWare Workstation 12 Pro) with Fedora 24 KDE.

 

Huge thank you to staff for fixing it 

Share this post


Link to post

Just testing Eddie Beta version 2.11.2 on Arch Linux and it's working very well so far. Thanks!

Share this post


Link to post

It turns out I had forgotten to switch from Windows Firewall to WFP network lock mode. I am in fact still getting the same error. :/

Share this post


Link to post

It turns out I had forgotten to switch from Windows Firewall to WFP network lock mode. I am in fact still getting the same error. :/

Did you try Automatic??


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Just testing Eddie Beta version 2.11.2 on Arch Linux and it's working very well so far. Thanks!

Did you compile it yourself or did you downloaded it from the AUR?

Share this post


Link to post

Did you compile it yourself or did you downloaded it from the AUR?

 

I downloaded from the AUR.

Share this post


Link to post

problem with 2.11.2 on ubuntu running from terminal.

profile Azha not found.  command given used -server=Azha

 

sudo airvpn -cli -login=XXXXXX -password=XXXXXX -server=Azha -netlock -connect
 
I 2016.07.25 22:16:08 - Eddie client version: 2.11.2 / x86, System: Linux, Name: Ubuntu 14.04.4 LTS \n \l / x86
. 2016.07.25 22:16:08 - Reading options from /home/XXX/.airvpn/AirVPN.xml
I 2016.07.25 22:16:08 - Press 'X' to Cancel, 'N' to connect/reconnect to the best available server.
. 2016.07.25 22:16:08 - Data Path: /home/XXX/.airvpn
. 2016.07.25 22:16:08 - App Path: /usr/lib/AirVPN
. 2016.07.25 22:16:08 - Executable Path: /usr/lib/AirVPN/AirVPN.exe
. 2016.07.25 22:16:08 - Command line arguments (7): path="/home/XXX/.airvpn" cli="True" login="XXXXXX" password="XXXXXX" server="Azha" netlock="True" connect="True"
. 2016.07.25 22:16:08 - Operating System: Unix 3.13.0.65 - Linux RMedia 3.13.0-65-generic #106-Ubuntu SMP Fri Oct 2 22:12:08 UTC 2015 i686 i686 i686 GNU/Linux
I 2016.07.25 22:16:08 - OpenVPN Driver - Found, /dev/net/tun
I 2016.07.25 22:16:08 - OpenVPN - Version: OpenVPN 2.3.2 (/usr/sbin/openvpn)
I 2016.07.25 22:16:08 - SSH - Version: OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.7, OpenSSL 1.0.1f 6 Jan 2014 (/usr/bin/ssh)
I 2016.07.25 22:16:08 - SSL - Version: stunnel 4.53 (/usr/bin/stunnel4)
! 2016.07.25 22:16:08 - Activation of Network Lock - Linux IPTables
I 2016.07.25 22:16:08 - Checking login ...
. 2016.07.25 22:16:08 - Updating systems & servers data ...
! 2016.07.25 22:16:09 - Logged in.
I 2016.07.25 22:16:09 - Session starting.
W 2016.07.25 22:16:09 - Unable to understand if IPv6 is active.
. 2016.07.25 22:16:12 - Systems & servers data update completed
 
F 2016.07.25 22:16:14 - Requested profile 'Azha' not found.
 
F 2016.07.25 22:16:14 - No server available.
I 2016.07.25 22:16:14 - Cancel requested.

Share this post


Link to post

 

still says 2.10.3 after install

 

@vpro_

That's odd, it sounds like other people posting in this thread have been able to successfully download the new beta versions for Windows. Which Windows version (XP, Vista/7, 8/10) are you trying to install? Which AirVPN version (.exe Installer, .zip portable) are you trying to install? Have you tried checking the hash of version you are trying to install against it's hashes on the website, in order to confirm you have downloaded the correct version?

 

How to check hashes:  https://airvpn.org/faq/software_signatures/

 

Hashes for eddie 64 bit 2.11.2 beta:

 

Windows XP 64 bit

 

Windows XP 64 bit .exe Installer

https://airvpn.org/repository/experimental/airvpn_windows_xp_x64_installer.exe

MD5:  bd38b099b54f68b62e6d3078fb6fa014

SHA1:  a63f65e28299073e22131b94899ba097d842c0f3

SHA256:  059f02809aafbd4a847b8d95b3f5045a19c01d6048a47f99469eb9143e5f9e94

SHA512:  0b0931ff6bb375671c07349b15fc7c5cf16f3b853bc547dda478973c5e454e672f785fe09d8d5322b94a5937e7556611ce158787375068c442b8749e6d6fc2e6

 

 

Windows XP 64 bit .zip Portable

https://airvpn.org/repository/experimental/airvpn_windows_xp_x64_portable.zip

MD5:  d48434efffab71315c03b265ff52501c

SHA1:  592b2161f2c6af89376f1802e5d99b71bce8cc74

SHA256:  a8adf87805fdd4f7f8a6da9125b421312c3ad98f576e5557df0363a06f5b42d4

SHA512:  4d969587c83f6b78e190e051342b7a74e44d3290a445531dc2a1bd1f2f121572ba6fdcab4df88c863259024691da79af0a3a926b95cadbfc34c972839cfa69aa

 

Windows Vista/7 64 bit

 

 

Windows Vista/7 64 bit .exe Installer

https://airvpn.org/repository/experimental/airvpn_windows_x64_installer.exe

MD5:  4ebb09978a25366d04af9c6294f8d34e

SHA1:  5fb3588f37630b9b2e49c378e43ce6dffedb7788

SHA256:  40071b4ab5f8762414d606fbed8823d91d84a522b54818188c02e3d4407cf282

SHA512:  1cc88aa2dcebf325c2083151b3163b0414dd920248b184470f9b01d3a2f0c378208e9f3921aede035e8ece883565d52d8068257387cbab251b8240824ad462bd

 

 

Windows Vista/7 64 bit .zip Portable

https://airvpn.org/repository/experimental/airvpn_windows_x64_portable.zip

MD5:  42d586d66e560f55b7172c55e75633eb

SHA1:  717b150f1135298b851d8f066814ef5eb68999cb

SHA256:  8e189f127990b331598dc37c8425b071e92adc6e846616ae4e7a2d8f424f2d92

SHA512:  8999cce055ab096fa50b0f78759455441e70f94c66fddc995e4b55dd8d6a4e5afef3528eeaecfdf50fce902f8041252a44ff666eacc3d9378c51c21caa79d8b5

 

Windows 8/8.1/10 64 bit

 

Windows 8/8.1/10 64 bit .exe Installer

https://airvpn.org/repository/experimental/airvpn_windows8_x64_installer.exe

MD5:  8a8a320f9bb99dbd3e86683b8c5c2be7

SHA1:  992cc60d732811ddc95aa5c95944438866b3dc74

SHA256:  62531c44265e57f2a3bba38e8d44f48bdee65a511b448b15c60231bb2617549b

SHA512:  e0189fde0c4564f72b0c04c0782b8822791a9fb8d188e61e806df385c757fa8789c1e7ccf7f627a7902dba5ecd02ec68da6ed4dce2d3c886f4be81feb7d5b651

 

 

Windows 8/8.1/10 64 bit .zip Portable

https://airvpn.org/repository/experimental/airvpn_windows8_x64_portable.zip

MD5:  f25f3eb818896b2b02230c5c15ac9132

SHA1:  2c5293745868f49c07c77b62b2e6f208c0af76f0

SHA256:  20692b071a2ca3afef58e7ca337f60863358fa62add70aad55fda7ddfb07c107

SHA512:  639a181210795dd7f9ab4dd65d2bb28ce20d66f25ef46b4d7de6b9755aeb08c2935bc8b298981dc3fb581122f3141052f47d4c736e6abe6cc29a742f841b7500

 

 

-Uncle Hunto

 

Yeah I downloaded it with a different browser, through vpn and still installing old version .exe version.   Windows 10 64 bit.  

 

The MD5 is different:  865AB7BB6E06820559DDD0897AB8DEC6

 

I'm clicking experimental.

 

Edit: Forgot to disable ipv6 now via vpn it downloaded correctly then after enable because of the bug mentioned before.

Share this post


Link to post
Guest

Wow, thanks for the patch. Looks like I actually contributed into fixing the driver installation message.

 

Edit: Still unfixed, but restarting Windows solves it, so I guess it's no biggie.

 

For those having WebRTC leak, I don't know if I can say this here, but if you are using Chrome I would suggest a simple extension called "uBlock" which has a feature of "Prevent WebRTC from leaking local IP addresses". Don't know the specifics, but it works. I got the extension for dynamic filtering, but it had this option as well.

Share this post


Link to post

Hello!

 

New version 2.11.3beta is now available. Version 2.11.2beta is no more available and RC. Changelog from 2.11.2beta:

  • [bugfix] - Error "Unknown Interface ID" and related WFP errors
  • [new] - Added CLI edition to .deb, .rpm and Mono portable
  • [new] - Added Exit IP to title/status/tray message
  • [new] - Added "Reset to default settings" command in Settings
  • [new] - Windows/Linux - Added an option to start minimized
  • [change] - Tab Settings -> Proxy renamed to "Proxy / Tor"
  • [bugfix] - Windows - Bugfix rare situation when options are not saved at exit
  • [change] - Dump only change option in Support Logs
  • [new] - OS X - Options to show status/speed/server informations in status bar
  • [bugfix] - Windows/Linux - CLI -server option fixed
Kind regards

Share this post


Link to post

When I wake my Mac after it has been sleeping I Have many of theses errors in my log. It only seams to happen When my Mac is sleeping. Here is the error message I keep getting. 

I 2016.07.27 18:27:34 - Eddie client version: 2.11.3 / x86, System: OSX, Name: 10.12 / x64

 

. 2016.07.27 18:55:49 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #46587 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 18:55:49 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #46588 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 18:55:49 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #46590 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 18:55:49 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #46591 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 18:55:49 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #46592 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 18:55:49 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #46594 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 18:55:49 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #46595 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 18:55:49 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #46596 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

Share this post


Link to post

Quick follow-up. I'm experiencing massive DNS leaks with the new client. I advise others to check this at ipleak.net the moment they connect (I'm sure most people would, anyway!). IPv6 is disabled, so I'm not sure what's causing it.

Share this post


Link to post

Quick follow-up. I'm experiencing massive DNS leaks with the new client. I advise others to check this at ipleak.net the moment they connect (I'm sure most people would, anyway!). IPv6 is disabled, so I'm not sure what's causing it.

In Settings,

Ensure you have DNS -> "DNS Switch Mode" on "Automatic"

Ensure you have Advanced -> "Ensure DNS Lock" checked

and post a log and your OS, please.

 

After, try to enable Advanced -> "Force all network interfaces for DNS".

Thanks.

Share this post


Link to post

Installed 2.11.3 on Win 8.1 x64...

 

No more WFP errors and NO leaks, BUT

 

After booting my Computer there is a short Skype internet connection even BEFORE VPN Client is booting.... I thought with WFP Lock-mode, there is no internet connection possible without VPN client?

Share this post


Link to post

Installed 2.11.3 on Win 8.1 x64...

 

No more WFP errors and NO leaks, BUT

 

After booting my Computer there is a short Skype internet connection even BEFORE VPN Client is booting.... I thought with WFP Lock-mode, there is no internet connection psooible withoit vpn client?

 

Hello!

 

Note that when the client is not running there is NO Network Lock. The client restores WFP or firewall rules when it is shut down. Additionally, the rules do not survive a reboot. Both these features are intentional. If you wish a permanent Network Lock the solution is trivial, just block all the traffic with pemanent firewall rules and keep Network Lock enabled.

 

Then, you have a particular case. If Eddie crashes, or when it is killed without grace, the Network Lock remains "active" (this is of course essential), but as usual will not survive a reboot.

 

Kind regards

Share this post


Link to post

"Windows users, please be aware that the new Network Lock method uses the WFP in persistent mode, so the Network Lock settings will survive even a reboot, when Network Lock is not disabled properly in Eddie."

 

Thats why i was asking ;-)

Share this post


Link to post

 

"Windows users, please be aware that the new Network Lock method uses the WFP in persistent mode, so the Network Lock settings will survive even a reboot, when Network Lock is not disabled properly in Eddie."

 

Thats why i was asking ;-)

 

Hello!

 

A bad mistake, we did not edit this. That was a momentary behavior that needed a fix. Now it has been fixed but we did not edit the message, we apologize for the inconvenience.

 

Kind regards

Share this post


Link to post

What's the difference between WFP and the Firewall ? Which method should i use ? Or should i just choose "Automatic" and let Eddie handle it ?

 

Regards

 

Fox

Share this post


Link to post

Staff, it's normal behavior if it's cannot connect while Network Lock deactivated? Isn't because you have enabled this in settings, i.e. look to what you've enabled?

Share this post


Link to post

 

Quick follow-up. I'm experiencing massive DNS leaks with the new client. I advise others to check this at ipleak.net the moment they connect (I'm sure most people would, anyway!). IPv6 is disabled, so I'm not sure what's causing it.

In Settings,

Ensure you have DNS -> "DNS Switch Mode" on "Automatic"

Ensure you have Advanced -> "Ensure DNS Lock" checked

and post a log and your OS, please.

 

After, try to enable Advanced -> "Force all network interfaces for DNS".

Thanks.

I can confirm that there's a DNS leak in 2.11.3 on Win 10 Pro x64. "Force all network interfaces for DNS" fixed it.

Share this post


Link to post

Hello!

 

We're very glad to inform you that a new Eddie Air client version has been released: 2.11beta. This software has passed successfully internal alpha testing weeks ago, and finally passed internal beta testing now. It is ready for public beta testing and we consider it a Release Candidate of the 2.11 stable version. Anyway, remember that it's still a beta version, so if you don't feel adventurous you might like to stay with 2.10.3 (stable).

 

To download Eddie 2.11beta please select "Other versions" > "Experimental" from the download page.

 

UPDATE 24-Jul-16: version 2.11.2beta has been released. Please see all the updates here:

https://airvpn.org/topic/18625-eddie-211beta-available/page-3?do=findComment&comment=45795

 

UPDATE 28-Jul-16: version 2.11.3beta has been released. Please see all the updates here_

https://airvpn.org/topic/18625-eddie-211beta-available/page-5?do=findComment&comment=46114

 

 

The current Eddie status: a message from the chief developer

 

First of all, we apologize for the delay of this release.

 

We are working on two different versions of Eddie: 2.x and 3.x.

 

Eddie 3.x will have a new UI engine (also based on GTK+ under Linux, to drop Mono WinForms that are affected by a lot of unresolved bug) and a lot of new features. We plan to release Eddie 3.x soon, but it's not ready/stable yet, so we decided to port some of the new features back to Eddie 2.x edition. 

This was the cause of the delay: a lot of features are totally rewritten (for example the OpenVPN directives manager).

We promise that next releases and bugfixes will be faster.

 

Biggest changes in Eddie 2.11:

 

- Latest versions of OpenVPN (2.3.11) and stunnel (5.32), built with OpenSSL 1.0.2h.

- A new Network Lock method under Windows (Windows Firewall not used anymore)

- A new IPv6 lock method under Windows

- A new DNS lock method under Windows

- Built with Mono 4 under GNU/Linux

- New ports/protocols available

- DPI-Aware UI under Windows. System fonts used both in Windows and Linux.

- Various bug fixes

- And so many other internal changes and minor UI updates.

 

 

Please see the changelog:

https://airvpn.org/services/changelog.php?software=client&format=html

 

===

 

Windows users, please be aware that the new Network Lock method uses the WFP in persistent mode, so the Network Lock settings will survive even a reboot, when Network Lock is not disabled properly in Eddie. If you kill Eddie without grace, or Eddie crashes, just re-run it (even after a reboot) to cancel Network Lock. We might change this behavior according to your feedback.

 

Eddie 2.11beta for GNU Linux can be downloaded here: https://airvpn.org/linux

Eddie 2.11beta for Windows can be downloaded here: https://airvpn.org/windows

Eddie 2.11beta for OS X Mavericks, Yosemite and El Capitan only can be downloaded here: https://airvpn.org/macosx

PLEASE NOTE: Eddie 2.11beta package includes an OpenVPN version re-compiled by us from OpenVPN 2.3.11 source code with OpenSSL 1.0.2h for security reasons and to fix this bug: https://community.openvpn.net/openvpn/ticket/328

 

Eddie overview is available here: https://airvpn.org/software

Eddie includes a Network Lock feature: https://airvpn.org/faq/software_lock

Eddie 2.11 is free and open source software released under GPLv3. GitHub repository https://github.com/AirVPN/airvpn-client

 

 

Kind regards & datalove

AirVPN Staff

 

I read a post in the past that stated your future plans for Eddie include the ability to use it for any VPN configuration, not just AirVPN.  Is that still a goal?  Will it be in v. 3?

Share this post


Link to post

I was running eddie 2.11.2 for a couple days on my Manjaro 64-bit install, until the GUI disappeared. Here are the relevant logs:

 

. 2016.07.27 00:06:29 - Updating systems & servers data ...
. 2016.07.27 00:06:31 - Systems & servers data update completed
. 2016.07.27 00:16:31 - Updating systems & servers data ...
. 2016.07.27 00:16:33 - Systems & servers data update completed
. 2016.07.27 00:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=3081130173/0 pkts=3395232/0
. 2016.07.27 00:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 00:21:44 - OpenVPN > Validating certificate key usage
. 2016.07.27 00:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 00:21:44 - OpenVPN > VERIFY KU OK
. 2016.07.27 00:21:44 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 00:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 00:21:44 - OpenVPN > VERIFY EKU OK
. 2016.07.27 00:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 00:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 00:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 00:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 00:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 00:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 00:26:33 - Updating systems & servers data ...
. 2016.07.27 00:26:34 - Systems & servers data update completed
. 2016.07.27 00:36:35 - Updating systems & servers data ...
. 2016.07.27 00:36:36 - Systems & servers data update completed
. 2016.07.27 00:46:36 - Updating systems & servers data ...
. 2016.07.27 00:46:38 - Systems & servers data update completed
. 2016.07.27 00:56:38 - Updating systems & servers data ...
. 2016.07.27 00:56:40 - Systems & servers data update completed
. 2016.07.27 01:06:40 - Updating systems & servers data ...
. 2016.07.27 01:06:42 - Systems & servers data update completed
. 2016.07.27 01:16:42 - Updating systems & servers data ...
. 2016.07.27 01:16:44 - Systems & servers data update completed
. 2016.07.27 01:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=3091877706/0 pkts=3541997/0
. 2016.07.27 01:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 01:21:44 - OpenVPN > Validating certificate key usage
. 2016.07.27 01:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 01:21:44 - OpenVPN > VERIFY KU OK
. 2016.07.27 01:21:44 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 01:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 01:21:44 - OpenVPN > VERIFY EKU OK
. 2016.07.27 01:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 01:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 01:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 01:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 01:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 01:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 01:26:44 - Updating systems & servers data ...
. 2016.07.27 01:26:45 - Systems & servers data update completed
. 2016.07.27 01:36:46 - Updating systems & servers data ...
. 2016.07.27 01:36:47 - Systems & servers data update completed
. 2016.07.27 01:46:48 - Updating systems & servers data ...
. 2016.07.27 01:46:49 - Systems & servers data update completed
. 2016.07.27 01:49:35 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #780486 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 01:49:55 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #807073 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 01:56:49 - Updating systems & servers data ...
. 2016.07.27 01:56:51 - Systems & servers data update completed
. 2016.07.27 02:06:51 - Updating systems & servers data ...
. 2016.07.27 02:06:53 - Systems & servers data update completed
. 2016.07.27 02:16:53 - Updating systems & servers data ...
. 2016.07.27 02:16:55 - Systems & servers data update completed
. 2016.07.27 02:18:04 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1597635 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 02:18:04 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1597637 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 02:18:04 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1597640 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 02:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=4385000996/0 pkts=4799318/0
. 2016.07.27 02:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 02:21:44 - OpenVPN > Validating certificate key usage
. 2016.07.27 02:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 02:21:44 - OpenVPN > VERIFY KU OK
. 2016.07.27 02:21:44 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 02:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 02:21:44 - OpenVPN > VERIFY EKU OK
. 2016.07.27 02:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 02:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 02:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 02:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 02:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 02:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 02:26:55 - Updating systems & servers data ...
. 2016.07.27 02:26:57 - Systems & servers data update completed
. 2016.07.27 02:36:57 - Updating systems & servers data ...
. 2016.07.27 02:36:58 - Systems & servers data update completed
. 2016.07.27 02:37:34 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #304767 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 02:46:59 - Updating systems & servers data ...
. 2016.07.27 02:47:00 - Systems & servers data update completed
. 2016.07.27 02:51:03 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #561824 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 02:57:01 - Updating systems & servers data ...
. 2016.07.27 02:57:02 - Systems & servers data update completed
. 2016.07.27 03:07:02 - Updating systems & servers data ...
. 2016.07.27 03:07:04 - Systems & servers data update completed
. 2016.07.27 03:14:37 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1115554 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 03:17:04 - Updating systems & servers data ...
. 2016.07.27 03:17:06 - Systems & servers data update completed
. 2016.07.27 03:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=3063608659/0 pkts=3375487/0
. 2016.07.27 03:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 03:21:44 - OpenVPN > Validating certificate key usage
. 2016.07.27 03:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 03:21:44 - OpenVPN > VERIFY KU OK
. 2016.07.27 03:21:44 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 03:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 03:21:44 - OpenVPN > VERIFY EKU OK
. 2016.07.27 03:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 03:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 03:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 03:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 03:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 03:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 03:27:06 - Updating systems & servers data ...
. 2016.07.27 03:27:08 - Systems & servers data update completed
. 2016.07.27 03:30:07 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #113121 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 03:37:08 - Updating systems & servers data ...
. 2016.07.27 03:37:10 - Systems & servers data update completed
. 2016.07.27 03:47:10 - Updating systems & servers data ...
. 2016.07.27 03:47:11 - Systems & servers data update completed
. 2016.07.27 03:57:12 - Updating systems & servers data ...
. 2016.07.27 03:57:13 - Systems & servers data update completed
. 2016.07.27 04:07:13 - Updating systems & servers data ...
. 2016.07.27 04:07:15 - Systems & servers data update completed
. 2016.07.27 04:17:15 - Updating systems & servers data ...
. 2016.07.27 04:17:17 - Systems & servers data update completed
. 2016.07.27 04:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=2574863584/0 pkts=2849977/0
. 2016.07.27 04:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 04:21:44 - OpenVPN > Validating certificate key usage
. 2016.07.27 04:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 04:21:44 - OpenVPN > VERIFY KU OK
. 2016.07.27 04:21:44 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 04:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 04:21:44 - OpenVPN > VERIFY EKU OK
. 2016.07.27 04:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 04:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 04:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 04:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 04:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 04:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 04:27:17 - Updating systems & servers data ...
. 2016.07.27 04:27:19 - Systems & servers data update completed
. 2016.07.27 04:37:19 - Updating systems & servers data ...
. 2016.07.27 04:37:21 - Systems & servers data update completed
. 2016.07.27 04:45:53 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #406446 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 04:47:21 - Updating systems & servers data ...
. 2016.07.27 04:47:23 - Systems & servers data update completed
. 2016.07.27 04:52:35 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #509485 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 04:57:23 - Updating systems & servers data ...
. 2016.07.27 04:57:24 - Systems & servers data update completed
. 2016.07.27 05:07:25 - Updating systems & servers data ...
. 2016.07.27 05:07:26 - Systems & servers data update completed
. 2016.07.27 05:17:26 - Updating systems & servers data ...
. 2016.07.27 05:17:28 - Systems & servers data update completed
. 2016.07.27 05:17:40 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #889345 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 05:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=2066255490/0 pkts=2317473/0
. 2016.07.27 05:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 05:21:44 - OpenVPN > Validating certificate key usage
. 2016.07.27 05:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 05:21:44 - OpenVPN > VERIFY KU OK
. 2016.07.27 05:21:44 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 05:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 05:21:44 - OpenVPN > VERIFY EKU OK
. 2016.07.27 05:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 05:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 05:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 05:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 05:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 05:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 05:27:28 - Updating systems & servers data ...
. 2016.07.27 05:27:30 - Systems & servers data update completed
. 2016.07.27 05:37:30 - Updating systems & servers data ...
. 2016.07.27 05:37:32 - Systems & servers data update completed
. 2016.07.27 05:42:22 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #297672 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 05:47:32 - Updating systems & servers data ...
. 2016.07.27 05:47:34 - Systems & servers data update completed
. 2016.07.27 05:57:35 - Updating systems & servers data ...
. 2016.07.27 05:57:36 - Systems & servers data update completed
. 2016.07.27 06:07:36 - Updating systems & servers data ...
. 2016.07.27 06:07:50 - Systems & servers data update completed
. 2016.07.27 06:17:50 - Updating systems & servers data ...
. 2016.07.27 06:17:52 - Systems & servers data update completed
. 2016.07.27 06:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=1954723182/0 pkts=2245922/0
. 2016.07.27 06:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 06:21:44 - OpenVPN > Validating certificate key usage
. 2016.07.27 06:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 06:21:44 - OpenVPN > VERIFY KU OK
. 2016.07.27 06:21:44 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 06:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 06:21:44 - OpenVPN > VERIFY EKU OK
. 2016.07.27 06:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 06:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 06:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 06:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 06:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 06:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 06:27:52 - Updating systems & servers data ...
. 2016.07.27 06:27:54 - Systems & servers data update completed
. 2016.07.27 06:37:54 - Updating systems & servers data ...
. 2016.07.27 06:37:55 - Systems & servers data update completed
. 2016.07.27 06:47:56 - Updating systems & servers data ...
. 2016.07.27 06:47:57 - Systems & servers data update completed
. 2016.07.27 06:57:57 - Updating systems & servers data ...
. 2016.07.27 06:57:59 - Systems & servers data update completed
. 2016.07.27 07:07:59 - Updating systems & servers data ...
. 2016.07.27 07:08:01 - Systems & servers data update completed
. 2016.07.27 07:18:01 - Updating systems & servers data ...
. 2016.07.27 07:18:03 - Systems & servers data update completed
. 2016.07.27 07:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=2811236611/0 pkts=3873063/0
. 2016.07.27 07:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 07:21:44 - OpenVPN > Validating certificate key usage
. 2016.07.27 07:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 07:21:44 - OpenVPN > VERIFY KU OK
. 2016.07.27 07:21:44 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 07:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 07:21:44 - OpenVPN > VERIFY EKU OK
. 2016.07.27 07:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 07:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 07:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 07:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 07:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 07:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 07:28:03 - Updating systems & servers data ...
. 2016.07.27 07:28:05 - Systems & servers data update completed
. 2016.07.27 07:38:05 - Updating systems & servers data ...
. 2016.07.27 07:38:06 - Systems & servers data update completed
. 2016.07.27 07:41:47 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #325845 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 07:48:07 - Updating systems & servers data ...
. 2016.07.27 07:48:08 - Systems & servers data update completed
. 2016.07.27 07:51:11 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #537856 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 07:51:17 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #540845 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 07:58:08 - Updating systems & servers data ...
. 2016.07.27 07:58:10 - Systems & servers data update completed
. 2016.07.27 08:08:10 - Updating systems & servers data ...
. 2016.07.27 08:08:13 - Systems & servers data update completed
. 2016.07.27 08:18:13 - Updating systems & servers data ...
. 2016.07.27 08:18:15 - Systems & servers data update completed
. 2016.07.27 08:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=1944420698/0 pkts=2686956/0
. 2016.07.27 08:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 08:21:44 - OpenVPN > Validating certificate key usage
. 2016.07.27 08:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 08:21:44 - OpenVPN > VERIFY KU OK
. 2016.07.27 08:21:44 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 08:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 08:21:44 - OpenVPN > VERIFY EKU OK
. 2016.07.27 08:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 08:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 08:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 08:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 08:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 08:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 08:28:15 - Updating systems & servers data ...
. 2016.07.27 08:28:17 - Systems & servers data update completed
. 2016.07.27 08:38:17 - Updating systems & servers data ...
. 2016.07.27 08:38:19 - Systems & servers data update completed
. 2016.07.27 08:43:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #425662 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 08:48:19 - Updating systems & servers data ...
. 2016.07.27 08:48:20 - Systems & servers data update completed
. 2016.07.27 08:58:21 - Updating systems & servers data ...
. 2016.07.27 08:58:22 - Systems & servers data update completed
. 2016.07.27 09:08:23 - Updating systems & servers data ...
. 2016.07.27 09:08:24 - Systems & servers data update completed
. 2016.07.27 09:18:24 - Updating systems & servers data ...
. 2016.07.27 09:18:26 - Systems & servers data update completed
. 2016.07.27 09:18:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1284360 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 09:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=2614957705/0 pkts=3410895/0
. 2016.07.27 09:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 09:21:44 - OpenVPN > Validating certificate key usage
. 2016.07.27 09:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 09:21:44 - OpenVPN > VERIFY KU OK
. 2016.07.27 09:21:44 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 09:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 09:21:44 - OpenVPN > VERIFY EKU OK
. 2016.07.27 09:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 09:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 09:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 09:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 09:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 09:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 09:28:26 - Updating systems & servers data ...
. 2016.07.27 09:28:28 - Systems & servers data update completed
. 2016.07.27 09:38:28 - Updating systems & servers data ...
. 2016.07.27 09:38:30 - Systems & servers data update completed
. 2016.07.27 09:48:30 - Updating systems & servers data ...
. 2016.07.27 09:48:32 - Systems & servers data update completed
. 2016.07.27 09:58:32 - Updating systems & servers data ...
. 2016.07.27 09:58:34 - Systems & servers data update completed
. 2016.07.27 10:08:34 - Updating systems & servers data ...
. 2016.07.27 10:08:40 - Systems & servers data update completed
. 2016.07.27 10:18:41 - Updating systems & servers data ...
. 2016.07.27 10:18:42 - Systems & servers data update completed
. 2016.07.27 10:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=5274172042/0 pkts=6498192/0
. 2016.07.27 10:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 10:21:44 - OpenVPN > Validating certificate key usage
. 2016.07.27 10:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 10:21:44 - OpenVPN > VERIFY KU OK
. 2016.07.27 10:21:44 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 10:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 10:21:44 - OpenVPN > VERIFY EKU OK
. 2016.07.27 10:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 10:21:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 10:21:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 10:21:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 10:21:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 10:21:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 10:28:43 - Updating systems & servers data ...
. 2016.07.27 10:28:44 - Systems & servers data update completed
. 2016.07.27 10:30:35 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #212727 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 10:38:44 - Updating systems & servers data ...
. 2016.07.27 10:38:46 - Systems & servers data update completed
. 2016.07.27 10:44:03 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #655562 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 10:44:08 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #660353 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 10:44:08 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #660355 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 10:48:46 - Updating systems & servers data ...
. 2016.07.27 10:48:48 - Systems & servers data update completed
. 2016.07.27 10:58:48 - Updating systems & servers data ...
. 2016.07.27 10:58:50 - Systems & servers data update completed
. 2016.07.27 11:08:51 - Updating systems & servers data ...
. 2016.07.27 11:08:52 - Systems & servers data update completed
. 2016.07.27 11:18:53 - Updating systems & servers data ...
. 2016.07.27 11:18:54 - Systems & servers data update completed
. 2016.07.27 11:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=4104111581/0 pkts=4673197/0
. 2016.07.27 11:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 11:21:44 - OpenVPN > Validating certificate key usage
. 2016.07.27 11:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 11:21:44 - OpenVPN > VERIFY KU OK
. 2016.07.27 11:21:44 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 11:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 11:21:44 - OpenVPN > VERIFY EKU OK
. 2016.07.27 11:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 11:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 11:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 11:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 11:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 11:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 11:28:54 - Updating systems & servers data ...
. 2016.07.27 11:28:56 - Systems & servers data update completed
. 2016.07.27 11:38:56 - Updating systems & servers data ...
. 2016.07.27 11:38:58 - Systems & servers data update completed
. 2016.07.27 11:48:58 - Updating systems & servers data ...
. 2016.07.27 11:49:00 - Systems & servers data update completed
. 2016.07.27 11:59:00 - Updating systems & servers data ...
. 2016.07.27 11:59:01 - Systems & servers data update completed
. 2016.07.27 12:09:02 - Updating systems & servers data ...
. 2016.07.27 12:09:03 - Systems & servers data update completed
. 2016.07.27 12:19:04 - Updating systems & servers data ...
. 2016.07.27 12:19:05 - Systems & servers data update completed
. 2016.07.27 12:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=3472927897/0 pkts=4186858/0
. 2016.07.27 12:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 12:21:44 - OpenVPN > Validating certificate key usage
. 2016.07.27 12:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 12:21:44 - OpenVPN > VERIFY KU OK
. 2016.07.27 12:21:44 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 12:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 12:21:44 - OpenVPN > VERIFY EKU OK
. 2016.07.27 12:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 12:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 12:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 12:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 12:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 12:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 12:29:05 - Updating systems & servers data ...
. 2016.07.27 12:29:07 - Systems & servers data update completed
. 2016.07.27 12:31:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #211530 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 12:39:07 - Updating systems & servers data ...
. 2016.07.27 12:39:09 - Systems & servers data update completed
. 2016.07.27 12:49:09 - Updating systems & servers data ...
. 2016.07.27 12:49:11 - Systems & servers data update completed
. 2016.07.27 12:59:11 - Updating systems & servers data ...
. 2016.07.27 12:59:14 - Systems & servers data update completed
. 2016.07.27 13:09:14 - Updating systems & servers data ...
. 2016.07.27 13:09:15 - Systems & servers data update completed
. 2016.07.27 13:19:16 - Updating systems & servers data ...
. 2016.07.27 13:19:17 - Systems & servers data update completed
. 2016.07.27 13:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=1898161784/0 pkts=2336243/0
. 2016.07.27 13:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 13:21:44 - OpenVPN > Validating certificate key usage
. 2016.07.27 13:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 13:21:44 - OpenVPN > VERIFY KU OK
. 2016.07.27 13:21:44 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 13:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 13:21:44 - OpenVPN > VERIFY EKU OK
. 2016.07.27 13:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 13:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 13:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 13:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 13:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 13:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 13:28:34 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #89701 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 13:29:17 - Updating systems & servers data ...
. 2016.07.27 13:29:19 - Systems & servers data update completed
. 2016.07.27 13:39:19 - Updating systems & servers data ...
. 2016.07.27 13:39:21 - Systems & servers data update completed
. 2016.07.27 13:40:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #314556 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 13:49:21 - Updating systems & servers data ...
. 2016.07.27 13:49:23 - Systems & servers data update completed
. 2016.07.27 13:59:23 - Updating systems & servers data ...
. 2016.07.27 13:59:25 - Systems & servers data update completed
. 2016.07.27 14:09:25 - Updating systems & servers data ...
. 2016.07.27 14:09:31 - Systems & servers data update completed
. 2016.07.27 14:19:07 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1193536 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 14:19:32 - Updating systems & servers data ...
. 2016.07.27 14:19:33 - Systems & servers data update completed
. 2016.07.27 14:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=2266718558/0 pkts=2813421/0
. 2016.07.27 14:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 14:21:44 - OpenVPN > Validating certificate key usage
. 2016.07.27 14:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 14:21:44 - OpenVPN > VERIFY KU OK
. 2016.07.27 14:21:44 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 14:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 14:21:44 - OpenVPN > VERIFY EKU OK
. 2016.07.27 14:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 14:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 14:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 14:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 14:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 14:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 14:29:33 - Updating systems & servers data ...
. 2016.07.27 14:29:35 - Systems & servers data update completed
. 2016.07.27 14:39:35 - Updating systems & servers data ...
. 2016.07.27 14:39:37 - Systems & servers data update completed
. 2016.07.27 14:49:37 - Updating systems & servers data ...
. 2016.07.27 14:49:39 - Systems & servers data update completed
. 2016.07.27 14:59:39 - Updating systems & servers data ...
. 2016.07.27 14:59:41 - Systems & servers data update completed
. 2016.07.27 15:09:41 - Updating systems & servers data ...
. 2016.07.27 15:09:42 - Systems & servers data update completed
. 2016.07.27 15:10:33 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1467251 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 15:10:33 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1467289 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 15:19:43 - Updating systems & servers data ...
. 2016.07.27 15:19:44 - Systems & servers data update completed
. 2016.07.27 15:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=4163675254/0 pkts=4657009/0
. 2016.07.27 15:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 15:21:44 - OpenVPN > Validating certificate key usage
. 2016.07.27 15:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 15:21:44 - OpenVPN > VERIFY KU OK
. 2016.07.27 15:21:44 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 15:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 15:21:44 - OpenVPN > VERIFY EKU OK
. 2016.07.27 15:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 15:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 15:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 15:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 15:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 15:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 15:29:45 - Updating systems & servers data ...
. 2016.07.27 15:29:46 - Systems & servers data update completed
. 2016.07.27 15:39:46 - Updating systems & servers data ...
. 2016.07.27 15:39:48 - Systems & servers data update completed
. 2016.07.27 15:49:48 - Updating systems & servers data ...
. 2016.07.27 15:49:50 - Systems & servers data update completed
. 2016.07.27 15:50:21 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #720969 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 15:59:50 - Updating systems & servers data ...
. 2016.07.27 15:59:52 - Systems & servers data update completed
. 2016.07.27 16:01:06 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #936321 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 16:07:05 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1039031 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 16:09:52 - Updating systems & servers data ...
. 2016.07.27 16:09:54 - Systems & servers data update completed
. 2016.07.27 16:19:54 - Updating systems & servers data ...
. 2016.07.27 16:19:55 - Systems & servers data update completed
. 2016.07.27 16:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=2934976797/0 pkts=3117612/0
. 2016.07.27 16:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 16:21:44 - OpenVPN > Validating certificate key usage
. 2016.07.27 16:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 16:21:44 - OpenVPN > VERIFY KU OK
. 2016.07.27 16:21:44 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 16:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 16:21:44 - OpenVPN > VERIFY EKU OK
. 2016.07.27 16:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 16:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 16:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 16:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 16:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 16:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 16:29:56 - Updating systems & servers data ...
. 2016.07.27 16:29:57 - Systems & servers data update completed
. 2016.07.27 16:38:05 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #357851 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 16:39:58 - Updating systems & servers data ...
. 2016.07.27 16:39:59 - Systems & servers data update completed
. 2016.07.27 16:49:59 - Updating systems & servers data ...
. 2016.07.27 16:50:01 - Systems & servers data update completed
. 2016.07.27 17:00:01 - Updating systems & servers data ...
. 2016.07.27 17:00:03 - Systems & servers data update completed
. 2016.07.27 17:00:06 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #818442 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 17:00:06 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #818455 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 17:10:03 - Updating systems & servers data ...
. 2016.07.27 17:10:05 - Systems & servers data update completed
. 2016.07.27 17:20:05 - Updating systems & servers data ...
. 2016.07.27 17:20:07 - Systems & servers data update completed
. 2016.07.27 17:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=3123299588/0 pkts=3367755/0
. 2016.07.27 17:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 17:21:44 - OpenVPN > Validating certificate key usage
. 2016.07.27 17:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 17:21:44 - OpenVPN > VERIFY KU OK
. 2016.07.27 17:21:44 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 17:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 17:21:44 - OpenVPN > VERIFY EKU OK
. 2016.07.27 17:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 17:21:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 17:21:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 17:21:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 17:21:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 17:21:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 17:30:07 - Updating systems & servers data ...
. 2016.07.27 17:30:08 - Systems & servers data update completed
. 2016.07.27 17:35:40 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #272010 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 17:40:09 - Updating systems & servers data ...
. 2016.07.27 17:40:10 - Systems & servers data update completed
. 2016.07.27 17:41:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #380957 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 17:50:11 - Updating systems & servers data ...
. 2016.07.27 17:50:12 - Systems & servers data update completed
. 2016.07.27 18:00:12 - Updating systems & servers data ...
. 2016.07.27 18:00:14 - Systems & servers data update completed
. 2016.07.27 18:10:14 - Updating systems & servers data ...
. 2016.07.27 18:10:16 - Systems & servers data update completed
. 2016.07.27 18:12:59 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #839311 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 18:20:16 - Updating systems & servers data ...
. 2016.07.27 18:20:18 - Systems & servers data update completed
I 2016.07.27 18:21:44 - Renewing TLS key
. 2016.07.27 18:21:44 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.07.27 18:21:45 - OpenVPN > TLS: soft reset sec=0 bytes=1813230734/0 pkts=2031309/0
. 2016.07.27 18:21:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 18:21:45 - OpenVPN > Validating certificate key usage
. 2016.07.27 18:21:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 18:21:45 - OpenVPN > VERIFY KU OK
. 2016.07.27 18:21:45 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 18:21:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 18:21:45 - OpenVPN > VERIFY EKU OK
. 2016.07.27 18:21:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 18:21:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 18:21:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 18:21:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 18:21:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 18:21:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 18:30:18 - Updating systems & servers data ...
. 2016.07.27 18:30:20 - Systems & servers data update completed
. 2016.07.27 18:37:40 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #235205 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 18:40:20 - Updating systems & servers data ...
. 2016.07.27 18:40:21 - Systems & servers data update completed
. 2016.07.27 18:41:09 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #354762 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 18:50:22 - Updating systems & servers data ...
. 2016.07.27 18:50:23 - Systems & servers data update completed
. 2016.07.27 19:00:23 - Updating systems & servers data ...
. 2016.07.27 19:00:25 - Systems & servers data update completed
. 2016.07.27 19:00:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #627074 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 19:00:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #627075 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 19:03:58 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #666013 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 19:10:25 - Updating systems & servers data ...
. 2016.07.27 19:10:27 - Systems & servers data update completed
. 2016.07.27 19:11:08 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #790499 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 19:20:27 - Updating systems & servers data ...
. 2016.07.27 19:20:29 - Systems & servers data update completed
. 2016.07.27 19:21:45 - OpenVPN > TLS: soft reset sec=0 bytes=1770522842/0 pkts=2067518/0
. 2016.07.27 19:21:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.07.27 19:21:45 - OpenVPN > Validating certificate key usage
. 2016.07.27 19:21:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
. 2016.07.27 19:21:45 - OpenVPN > VERIFY KU OK
. 2016.07.27 19:21:45 - OpenVPN > Validating certificate extended key usage
. 2016.07.27 19:21:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.07.27 19:21:45 - OpenVPN > VERIFY EKU OK
. 2016.07.27 19:21:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.07.27 19:21:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 19:21:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 19:21:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.07.27 19:21:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.07.27 19:21:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.07.27 19:23:38 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #6251 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2016.07.27 19:30:29 - Updating systems & servers data ...
. 2016.07.27 19:30:31 - Systems & servers data update completed

DNS switching/checking has been quite touchy for me. I have only been successful using the renaming method of DNS switching. Using either the automatic or resolvconf method will resolve in the DNS check failing. sometimes it fails even if using the renaming method. I tried installing eddie 2.11.3, was able to get it to connect once, then after that it would always fail the DNS check even when I had the renaming method selected. I ended up having to uninstall eddie 2.11.3, downgrade mono back to 4.0.4.1, and install eddie 2.10.3 in order to connect again.

-Uncle Hunto

Share this post


Link to post
Guest
This topic is now closed to further replies.

×
×
  • Create New...