Jump to content
Not connected, Your IP: 3.16.212.203
Staff

Eddie 2.11beta available

Recommended Posts

I was running eddie 2.11.2 for a couple days on my Manjaro 64-bit install, until the GUI disappeared. Here are the relevant logs:

 

. 2016.07.27 00:06:29 - Updating systems & servers data ...

. 2016.07.27 00:06:31 - Systems & servers data update completed

. 2016.07.27 00:16:31 - Updating systems & servers data ...

. 2016.07.27 00:16:33 - Systems & servers data update completed

. 2016.07.27 00:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=3081130173/0 pkts=3395232/0

. 2016.07.27 00:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 00:21:44 - OpenVPN > Validating certificate key usage

. 2016.07.27 00:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 00:21:44 - OpenVPN > VERIFY KU OK

. 2016.07.27 00:21:44 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 00:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 00:21:44 - OpenVPN > VERIFY EKU OK

. 2016.07.27 00:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 00:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 00:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 00:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 00:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 00:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 00:26:33 - Updating systems & servers data ...

. 2016.07.27 00:26:34 - Systems & servers data update completed

. 2016.07.27 00:36:35 - Updating systems & servers data ...

. 2016.07.27 00:36:36 - Systems & servers data update completed

. 2016.07.27 00:46:36 - Updating systems & servers data ...

. 2016.07.27 00:46:38 - Systems & servers data update completed

. 2016.07.27 00:56:38 - Updating systems & servers data ...

. 2016.07.27 00:56:40 - Systems & servers data update completed

. 2016.07.27 01:06:40 - Updating systems & servers data ...

. 2016.07.27 01:06:42 - Systems & servers data update completed

. 2016.07.27 01:16:42 - Updating systems & servers data ...

. 2016.07.27 01:16:44 - Systems & servers data update completed

. 2016.07.27 01:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=3091877706/0 pkts=3541997/0

. 2016.07.27 01:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 01:21:44 - OpenVPN > Validating certificate key usage

. 2016.07.27 01:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 01:21:44 - OpenVPN > VERIFY KU OK

. 2016.07.27 01:21:44 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 01:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 01:21:44 - OpenVPN > VERIFY EKU OK

. 2016.07.27 01:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 01:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 01:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 01:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 01:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 01:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 01:26:44 - Updating systems & servers data ...

. 2016.07.27 01:26:45 - Systems & servers data update completed

. 2016.07.27 01:36:46 - Updating systems & servers data ...

. 2016.07.27 01:36:47 - Systems & servers data update completed

. 2016.07.27 01:46:48 - Updating systems & servers data ...

. 2016.07.27 01:46:49 - Systems & servers data update completed

. 2016.07.27 01:49:35 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #780486 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 01:49:55 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #807073 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 01:56:49 - Updating systems & servers data ...

. 2016.07.27 01:56:51 - Systems & servers data update completed

. 2016.07.27 02:06:51 - Updating systems & servers data ...

. 2016.07.27 02:06:53 - Systems & servers data update completed

. 2016.07.27 02:16:53 - Updating systems & servers data ...

. 2016.07.27 02:16:55 - Systems & servers data update completed

. 2016.07.27 02:18:04 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1597635 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 02:18:04 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1597637 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 02:18:04 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1597640 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 02:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=4385000996/0 pkts=4799318/0

. 2016.07.27 02:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 02:21:44 - OpenVPN > Validating certificate key usage

. 2016.07.27 02:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 02:21:44 - OpenVPN > VERIFY KU OK

. 2016.07.27 02:21:44 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 02:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 02:21:44 - OpenVPN > VERIFY EKU OK

. 2016.07.27 02:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 02:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 02:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 02:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 02:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 02:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 02:26:55 - Updating systems & servers data ...

. 2016.07.27 02:26:57 - Systems & servers data update completed

. 2016.07.27 02:36:57 - Updating systems & servers data ...

. 2016.07.27 02:36:58 - Systems & servers data update completed

. 2016.07.27 02:37:34 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #304767 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 02:46:59 - Updating systems & servers data ...

. 2016.07.27 02:47:00 - Systems & servers data update completed

. 2016.07.27 02:51:03 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #561824 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 02:57:01 - Updating systems & servers data ...

. 2016.07.27 02:57:02 - Systems & servers data update completed

. 2016.07.27 03:07:02 - Updating systems & servers data ...

. 2016.07.27 03:07:04 - Systems & servers data update completed

. 2016.07.27 03:14:37 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1115554 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 03:17:04 - Updating systems & servers data ...

. 2016.07.27 03:17:06 - Systems & servers data update completed

. 2016.07.27 03:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=3063608659/0 pkts=3375487/0

. 2016.07.27 03:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 03:21:44 - OpenVPN > Validating certificate key usage

. 2016.07.27 03:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 03:21:44 - OpenVPN > VERIFY KU OK

. 2016.07.27 03:21:44 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 03:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 03:21:44 - OpenVPN > VERIFY EKU OK

. 2016.07.27 03:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 03:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 03:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 03:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 03:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 03:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 03:27:06 - Updating systems & servers data ...

. 2016.07.27 03:27:08 - Systems & servers data update completed

. 2016.07.27 03:30:07 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #113121 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 03:37:08 - Updating systems & servers data ...

. 2016.07.27 03:37:10 - Systems & servers data update completed

. 2016.07.27 03:47:10 - Updating systems & servers data ...

. 2016.07.27 03:47:11 - Systems & servers data update completed

. 2016.07.27 03:57:12 - Updating systems & servers data ...

. 2016.07.27 03:57:13 - Systems & servers data update completed

. 2016.07.27 04:07:13 - Updating systems & servers data ...

. 2016.07.27 04:07:15 - Systems & servers data update completed

. 2016.07.27 04:17:15 - Updating systems & servers data ...

. 2016.07.27 04:17:17 - Systems & servers data update completed

. 2016.07.27 04:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=2574863584/0 pkts=2849977/0

. 2016.07.27 04:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 04:21:44 - OpenVPN > Validating certificate key usage

. 2016.07.27 04:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 04:21:44 - OpenVPN > VERIFY KU OK

. 2016.07.27 04:21:44 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 04:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 04:21:44 - OpenVPN > VERIFY EKU OK

. 2016.07.27 04:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 04:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 04:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 04:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 04:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 04:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 04:27:17 - Updating systems & servers data ...

. 2016.07.27 04:27:19 - Systems & servers data update completed

. 2016.07.27 04:37:19 - Updating systems & servers data ...

. 2016.07.27 04:37:21 - Systems & servers data update completed

. 2016.07.27 04:45:53 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #406446 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 04:47:21 - Updating systems & servers data ...

. 2016.07.27 04:47:23 - Systems & servers data update completed

. 2016.07.27 04:52:35 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #509485 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 04:57:23 - Updating systems & servers data ...

. 2016.07.27 04:57:24 - Systems & servers data update completed

. 2016.07.27 05:07:25 - Updating systems & servers data ...

. 2016.07.27 05:07:26 - Systems & servers data update completed

. 2016.07.27 05:17:26 - Updating systems & servers data ...

. 2016.07.27 05:17:28 - Systems & servers data update completed

. 2016.07.27 05:17:40 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #889345 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 05:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=2066255490/0 pkts=2317473/0

. 2016.07.27 05:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 05:21:44 - OpenVPN > Validating certificate key usage

. 2016.07.27 05:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 05:21:44 - OpenVPN > VERIFY KU OK

. 2016.07.27 05:21:44 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 05:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 05:21:44 - OpenVPN > VERIFY EKU OK

. 2016.07.27 05:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 05:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 05:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 05:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 05:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 05:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 05:27:28 - Updating systems & servers data ...

. 2016.07.27 05:27:30 - Systems & servers data update completed

. 2016.07.27 05:37:30 - Updating systems & servers data ...

. 2016.07.27 05:37:32 - Systems & servers data update completed

. 2016.07.27 05:42:22 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #297672 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 05:47:32 - Updating systems & servers data ...

. 2016.07.27 05:47:34 - Systems & servers data update completed

. 2016.07.27 05:57:35 - Updating systems & servers data ...

. 2016.07.27 05:57:36 - Systems & servers data update completed

. 2016.07.27 06:07:36 - Updating systems & servers data ...

. 2016.07.27 06:07:50 - Systems & servers data update completed

. 2016.07.27 06:17:50 - Updating systems & servers data ...

. 2016.07.27 06:17:52 - Systems & servers data update completed

. 2016.07.27 06:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=1954723182/0 pkts=2245922/0

. 2016.07.27 06:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 06:21:44 - OpenVPN > Validating certificate key usage

. 2016.07.27 06:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 06:21:44 - OpenVPN > VERIFY KU OK

. 2016.07.27 06:21:44 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 06:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 06:21:44 - OpenVPN > VERIFY EKU OK

. 2016.07.27 06:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 06:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 06:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 06:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 06:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 06:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 06:27:52 - Updating systems & servers data ...

. 2016.07.27 06:27:54 - Systems & servers data update completed

. 2016.07.27 06:37:54 - Updating systems & servers data ...

. 2016.07.27 06:37:55 - Systems & servers data update completed

. 2016.07.27 06:47:56 - Updating systems & servers data ...

. 2016.07.27 06:47:57 - Systems & servers data update completed

. 2016.07.27 06:57:57 - Updating systems & servers data ...

. 2016.07.27 06:57:59 - Systems & servers data update completed

. 2016.07.27 07:07:59 - Updating systems & servers data ...

. 2016.07.27 07:08:01 - Systems & servers data update completed

. 2016.07.27 07:18:01 - Updating systems & servers data ...

. 2016.07.27 07:18:03 - Systems & servers data update completed

. 2016.07.27 07:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=2811236611/0 pkts=3873063/0

. 2016.07.27 07:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 07:21:44 - OpenVPN > Validating certificate key usage

. 2016.07.27 07:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 07:21:44 - OpenVPN > VERIFY KU OK

. 2016.07.27 07:21:44 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 07:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 07:21:44 - OpenVPN > VERIFY EKU OK

. 2016.07.27 07:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 07:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 07:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 07:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 07:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 07:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 07:28:03 - Updating systems & servers data ...

. 2016.07.27 07:28:05 - Systems & servers data update completed

. 2016.07.27 07:38:05 - Updating systems & servers data ...

. 2016.07.27 07:38:06 - Systems & servers data update completed

. 2016.07.27 07:41:47 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #325845 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 07:48:07 - Updating systems & servers data ...

. 2016.07.27 07:48:08 - Systems & servers data update completed

. 2016.07.27 07:51:11 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #537856 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 07:51:17 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #540845 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 07:58:08 - Updating systems & servers data ...

. 2016.07.27 07:58:10 - Systems & servers data update completed

. 2016.07.27 08:08:10 - Updating systems & servers data ...

. 2016.07.27 08:08:13 - Systems & servers data update completed

. 2016.07.27 08:18:13 - Updating systems & servers data ...

. 2016.07.27 08:18:15 - Systems & servers data update completed

. 2016.07.27 08:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=1944420698/0 pkts=2686956/0

. 2016.07.27 08:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 08:21:44 - OpenVPN > Validating certificate key usage

. 2016.07.27 08:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 08:21:44 - OpenVPN > VERIFY KU OK

. 2016.07.27 08:21:44 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 08:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 08:21:44 - OpenVPN > VERIFY EKU OK

. 2016.07.27 08:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 08:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 08:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 08:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 08:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 08:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 08:28:15 - Updating systems & servers data ...

. 2016.07.27 08:28:17 - Systems & servers data update completed

. 2016.07.27 08:38:17 - Updating systems & servers data ...

. 2016.07.27 08:38:19 - Systems & servers data update completed

. 2016.07.27 08:43:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #425662 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 08:48:19 - Updating systems & servers data ...

. 2016.07.27 08:48:20 - Systems & servers data update completed

. 2016.07.27 08:58:21 - Updating systems & servers data ...

. 2016.07.27 08:58:22 - Systems & servers data update completed

. 2016.07.27 09:08:23 - Updating systems & servers data ...

. 2016.07.27 09:08:24 - Systems & servers data update completed

. 2016.07.27 09:18:24 - Updating systems & servers data ...

. 2016.07.27 09:18:26 - Systems & servers data update completed

. 2016.07.27 09:18:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1284360 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 09:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=2614957705/0 pkts=3410895/0

. 2016.07.27 09:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 09:21:44 - OpenVPN > Validating certificate key usage

. 2016.07.27 09:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 09:21:44 - OpenVPN > VERIFY KU OK

. 2016.07.27 09:21:44 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 09:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 09:21:44 - OpenVPN > VERIFY EKU OK

. 2016.07.27 09:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 09:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 09:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 09:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 09:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 09:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 09:28:26 - Updating systems & servers data ...

. 2016.07.27 09:28:28 - Systems & servers data update completed

. 2016.07.27 09:38:28 - Updating systems & servers data ...

. 2016.07.27 09:38:30 - Systems & servers data update completed

. 2016.07.27 09:48:30 - Updating systems & servers data ...

. 2016.07.27 09:48:32 - Systems & servers data update completed

. 2016.07.27 09:58:32 - Updating systems & servers data ...

. 2016.07.27 09:58:34 - Systems & servers data update completed

. 2016.07.27 10:08:34 - Updating systems & servers data ...

. 2016.07.27 10:08:40 - Systems & servers data update completed

. 2016.07.27 10:18:41 - Updating systems & servers data ...

. 2016.07.27 10:18:42 - Systems & servers data update completed

. 2016.07.27 10:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=5274172042/0 pkts=6498192/0

. 2016.07.27 10:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 10:21:44 - OpenVPN > Validating certificate key usage

. 2016.07.27 10:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 10:21:44 - OpenVPN > VERIFY KU OK

. 2016.07.27 10:21:44 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 10:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 10:21:44 - OpenVPN > VERIFY EKU OK

. 2016.07.27 10:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 10:21:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 10:21:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 10:21:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 10:21:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 10:21:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 10:28:43 - Updating systems & servers data ...

. 2016.07.27 10:28:44 - Systems & servers data update completed

. 2016.07.27 10:30:35 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #212727 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 10:38:44 - Updating systems & servers data ...

. 2016.07.27 10:38:46 - Systems & servers data update completed

. 2016.07.27 10:44:03 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #655562 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 10:44:08 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #660353 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 10:44:08 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #660355 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 10:48:46 - Updating systems & servers data ...

. 2016.07.27 10:48:48 - Systems & servers data update completed

. 2016.07.27 10:58:48 - Updating systems & servers data ...

. 2016.07.27 10:58:50 - Systems & servers data update completed

. 2016.07.27 11:08:51 - Updating systems & servers data ...

. 2016.07.27 11:08:52 - Systems & servers data update completed

. 2016.07.27 11:18:53 - Updating systems & servers data ...

. 2016.07.27 11:18:54 - Systems & servers data update completed

. 2016.07.27 11:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=4104111581/0 pkts=4673197/0

. 2016.07.27 11:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 11:21:44 - OpenVPN > Validating certificate key usage

. 2016.07.27 11:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 11:21:44 - OpenVPN > VERIFY KU OK

. 2016.07.27 11:21:44 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 11:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 11:21:44 - OpenVPN > VERIFY EKU OK

. 2016.07.27 11:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 11:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 11:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 11:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 11:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 11:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 11:28:54 - Updating systems & servers data ...

. 2016.07.27 11:28:56 - Systems & servers data update completed

. 2016.07.27 11:38:56 - Updating systems & servers data ...

. 2016.07.27 11:38:58 - Systems & servers data update completed

. 2016.07.27 11:48:58 - Updating systems & servers data ...

. 2016.07.27 11:49:00 - Systems & servers data update completed

. 2016.07.27 11:59:00 - Updating systems & servers data ...

. 2016.07.27 11:59:01 - Systems & servers data update completed

. 2016.07.27 12:09:02 - Updating systems & servers data ...

. 2016.07.27 12:09:03 - Systems & servers data update completed

. 2016.07.27 12:19:04 - Updating systems & servers data ...

. 2016.07.27 12:19:05 - Systems & servers data update completed

. 2016.07.27 12:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=3472927897/0 pkts=4186858/0

. 2016.07.27 12:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 12:21:44 - OpenVPN > Validating certificate key usage

. 2016.07.27 12:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 12:21:44 - OpenVPN > VERIFY KU OK

. 2016.07.27 12:21:44 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 12:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 12:21:44 - OpenVPN > VERIFY EKU OK

. 2016.07.27 12:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 12:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 12:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 12:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 12:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 12:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 12:29:05 - Updating systems & servers data ...

. 2016.07.27 12:29:07 - Systems & servers data update completed

. 2016.07.27 12:31:24 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #211530 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 12:39:07 - Updating systems & servers data ...

. 2016.07.27 12:39:09 - Systems & servers data update completed

. 2016.07.27 12:49:09 - Updating systems & servers data ...

. 2016.07.27 12:49:11 - Systems & servers data update completed

. 2016.07.27 12:59:11 - Updating systems & servers data ...

. 2016.07.27 12:59:14 - Systems & servers data update completed

. 2016.07.27 13:09:14 - Updating systems & servers data ...

. 2016.07.27 13:09:15 - Systems & servers data update completed

. 2016.07.27 13:19:16 - Updating systems & servers data ...

. 2016.07.27 13:19:17 - Systems & servers data update completed

. 2016.07.27 13:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=1898161784/0 pkts=2336243/0

. 2016.07.27 13:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 13:21:44 - OpenVPN > Validating certificate key usage

. 2016.07.27 13:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 13:21:44 - OpenVPN > VERIFY KU OK

. 2016.07.27 13:21:44 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 13:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 13:21:44 - OpenVPN > VERIFY EKU OK

. 2016.07.27 13:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 13:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 13:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 13:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 13:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 13:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 13:28:34 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #89701 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 13:29:17 - Updating systems & servers data ...

. 2016.07.27 13:29:19 - Systems & servers data update completed

. 2016.07.27 13:39:19 - Updating systems & servers data ...

. 2016.07.27 13:39:21 - Systems & servers data update completed

. 2016.07.27 13:40:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #314556 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 13:49:21 - Updating systems & servers data ...

. 2016.07.27 13:49:23 - Systems & servers data update completed

. 2016.07.27 13:59:23 - Updating systems & servers data ...

. 2016.07.27 13:59:25 - Systems & servers data update completed

. 2016.07.27 14:09:25 - Updating systems & servers data ...

. 2016.07.27 14:09:31 - Systems & servers data update completed

. 2016.07.27 14:19:07 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1193536 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 14:19:32 - Updating systems & servers data ...

. 2016.07.27 14:19:33 - Systems & servers data update completed

. 2016.07.27 14:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=2266718558/0 pkts=2813421/0

. 2016.07.27 14:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 14:21:44 - OpenVPN > Validating certificate key usage

. 2016.07.27 14:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 14:21:44 - OpenVPN > VERIFY KU OK

. 2016.07.27 14:21:44 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 14:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 14:21:44 - OpenVPN > VERIFY EKU OK

. 2016.07.27 14:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 14:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 14:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 14:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 14:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 14:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 14:29:33 - Updating systems & servers data ...

. 2016.07.27 14:29:35 - Systems & servers data update completed

. 2016.07.27 14:39:35 - Updating systems & servers data ...

. 2016.07.27 14:39:37 - Systems & servers data update completed

. 2016.07.27 14:49:37 - Updating systems & servers data ...

. 2016.07.27 14:49:39 - Systems & servers data update completed

. 2016.07.27 14:59:39 - Updating systems & servers data ...

. 2016.07.27 14:59:41 - Systems & servers data update completed

. 2016.07.27 15:09:41 - Updating systems & servers data ...

. 2016.07.27 15:09:42 - Systems & servers data update completed

. 2016.07.27 15:10:33 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1467251 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 15:10:33 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1467289 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 15:19:43 - Updating systems & servers data ...

. 2016.07.27 15:19:44 - Systems & servers data update completed

. 2016.07.27 15:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=4163675254/0 pkts=4657009/0

. 2016.07.27 15:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 15:21:44 - OpenVPN > Validating certificate key usage

. 2016.07.27 15:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 15:21:44 - OpenVPN > VERIFY KU OK

. 2016.07.27 15:21:44 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 15:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 15:21:44 - OpenVPN > VERIFY EKU OK

. 2016.07.27 15:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 15:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 15:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 15:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 15:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 15:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 15:29:45 - Updating systems & servers data ...

. 2016.07.27 15:29:46 - Systems & servers data update completed

. 2016.07.27 15:39:46 - Updating systems & servers data ...

. 2016.07.27 15:39:48 - Systems & servers data update completed

. 2016.07.27 15:49:48 - Updating systems & servers data ...

. 2016.07.27 15:49:50 - Systems & servers data update completed

. 2016.07.27 15:50:21 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #720969 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 15:59:50 - Updating systems & servers data ...

. 2016.07.27 15:59:52 - Systems & servers data update completed

. 2016.07.27 16:01:06 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #936321 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 16:07:05 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1039031 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 16:09:52 - Updating systems & servers data ...

. 2016.07.27 16:09:54 - Systems & servers data update completed

. 2016.07.27 16:19:54 - Updating systems & servers data ...

. 2016.07.27 16:19:55 - Systems & servers data update completed

. 2016.07.27 16:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=2934976797/0 pkts=3117612/0

. 2016.07.27 16:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 16:21:44 - OpenVPN > Validating certificate key usage

. 2016.07.27 16:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 16:21:44 - OpenVPN > VERIFY KU OK

. 2016.07.27 16:21:44 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 16:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 16:21:44 - OpenVPN > VERIFY EKU OK

. 2016.07.27 16:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 16:21:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 16:21:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 16:21:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 16:21:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 16:21:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 16:29:56 - Updating systems & servers data ...

. 2016.07.27 16:29:57 - Systems & servers data update completed

. 2016.07.27 16:38:05 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #357851 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 16:39:58 - Updating systems & servers data ...

. 2016.07.27 16:39:59 - Systems & servers data update completed

. 2016.07.27 16:49:59 - Updating systems & servers data ...

. 2016.07.27 16:50:01 - Systems & servers data update completed

. 2016.07.27 17:00:01 - Updating systems & servers data ...

. 2016.07.27 17:00:03 - Systems & servers data update completed

. 2016.07.27 17:00:06 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #818442 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 17:00:06 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #818455 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 17:10:03 - Updating systems & servers data ...

. 2016.07.27 17:10:05 - Systems & servers data update completed

. 2016.07.27 17:20:05 - Updating systems & servers data ...

. 2016.07.27 17:20:07 - Systems & servers data update completed

. 2016.07.27 17:21:44 - OpenVPN > TLS: soft reset sec=0 bytes=3123299588/0 pkts=3367755/0

. 2016.07.27 17:21:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 17:21:44 - OpenVPN > Validating certificate key usage

. 2016.07.27 17:21:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 17:21:44 - OpenVPN > VERIFY KU OK

. 2016.07.27 17:21:44 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 17:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 17:21:44 - OpenVPN > VERIFY EKU OK

. 2016.07.27 17:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 17:21:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 17:21:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 17:21:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 17:21:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 17:21:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 17:30:07 - Updating systems & servers data ...

. 2016.07.27 17:30:08 - Systems & servers data update completed

. 2016.07.27 17:35:40 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #272010 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 17:40:09 - Updating systems & servers data ...

. 2016.07.27 17:40:10 - Systems & servers data update completed

. 2016.07.27 17:41:44 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #380957 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 17:50:11 - Updating systems & servers data ...

. 2016.07.27 17:50:12 - Systems & servers data update completed

. 2016.07.27 18:00:12 - Updating systems & servers data ...

. 2016.07.27 18:00:14 - Systems & servers data update completed

. 2016.07.27 18:10:14 - Updating systems & servers data ...

. 2016.07.27 18:10:16 - Systems & servers data update completed

. 2016.07.27 18:12:59 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #839311 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 18:20:16 - Updating systems & servers data ...

. 2016.07.27 18:20:18 - Systems & servers data update completed

I 2016.07.27 18:21:44 - Renewing TLS key

. 2016.07.27 18:21:44 - OpenVPN > TLS: tls_process: killed expiring key

. 2016.07.27 18:21:45 - OpenVPN > TLS: soft reset sec=0 bytes=1813230734/0 pkts=2031309/0

. 2016.07.27 18:21:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 18:21:45 - OpenVPN > Validating certificate key usage

. 2016.07.27 18:21:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 18:21:45 - OpenVPN > VERIFY KU OK

. 2016.07.27 18:21:45 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 18:21:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 18:21:45 - OpenVPN > VERIFY EKU OK

. 2016.07.27 18:21:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 18:21:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 18:21:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 18:21:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 18:21:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 18:21:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 18:30:18 - Updating systems & servers data ...

. 2016.07.27 18:30:20 - Systems & servers data update completed

. 2016.07.27 18:37:40 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #235205 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 18:40:20 - Updating systems & servers data ...

. 2016.07.27 18:40:21 - Systems & servers data update completed

. 2016.07.27 18:41:09 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #354762 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 18:50:22 - Updating systems & servers data ...

. 2016.07.27 18:50:23 - Systems & servers data update completed

. 2016.07.27 19:00:23 - Updating systems & servers data ...

. 2016.07.27 19:00:25 - Systems & servers data update completed

. 2016.07.27 19:00:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #627074 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 19:00:36 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #627075 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 19:03:58 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #666013 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 19:10:25 - Updating systems & servers data ...

. 2016.07.27 19:10:27 - Systems & servers data update completed

. 2016.07.27 19:11:08 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #790499 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 19:20:27 - Updating systems & servers data ...

. 2016.07.27 19:20:29 - Systems & servers data update completed

. 2016.07.27 19:21:45 - OpenVPN > TLS: soft reset sec=0 bytes=1770522842/0 pkts=2067518/0

. 2016.07.27 19:21:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.07.27 19:21:45 - OpenVPN > Validating certificate key usage

. 2016.07.27 19:21:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.07.27 19:21:45 - OpenVPN > VERIFY KU OK

. 2016.07.27 19:21:45 - OpenVPN > Validating certificate extended key usage

. 2016.07.27 19:21:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.07.27 19:21:45 - OpenVPN > VERIFY EKU OK

. 2016.07.27 19:21:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.07.27 19:21:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 19:21:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 19:21:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.07.27 19:21:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.07.27 19:21:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.07.27 19:23:38 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #6251 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

. 2016.07.27 19:30:29 - Updating systems & servers data ...

. 2016.07.27 19:30:31 - Systems & servers data update completed

DNS switching/checking has been quite touchy for me. I have only been successful using the renaming method of DNS switching. Using either the automatic or resolvconf method will resolve in the DNS check failing. sometimes it fails even if using the renaming method. I tried installing eddie 2.11.3, was able to get it to connect once, then after that it would always fail the DNS check even when I had the renaming method selected. I ended up having to uninstall eddie 2.11.3, downgrade mono back to 4.0.4.1, and install eddie 2.10.3 in order to connect again.

-Uncle Hunto

I'm seeing very similar behavoir in Antegros.

Eddie fails to connect at the DNS check.

When DNS check isnt active Eddie connects fine and I can't find any leaks.

Log attached.

 

Edit: Thanks for the new releases, fantastic work

Share this post


Link to post

 

Quick follow-up. I'm experiencing massive DNS leaks with the new client. I advise others to check this at ipleak.net the moment they connect (I'm sure most people would, anyway!). IPv6 is disabled, so I'm not sure what's causing it.

In Settings,

Ensure you have DNS -> "DNS Switch Mode" on "Automatic"

Ensure you have Advanced -> "Ensure DNS Lock" checked

and post a log and your OS, please.

 

After, try to enable Advanced -> "Force all network interfaces for DNS".

Thanks.

This worked, thanks. No more leaks.

Share this post


Link to post

Beta 3 is running nicely on Windows 10 64bit. There are no more dns leaks I experienced on Eddie 2.10. I will be switching back from openvpn-gui now.

 

Thanks for the good work on the new client!

Share this post


Link to post
Guest

The DNS settings are checked by default, no need to touch them. 

Share this post


Link to post

The DNS settings are checked by default, no need to touch them. 

 

Not on 2.11.3 beta which by default has "Force all network interfaces...." de-selected, because we expected (and tested) that a new approach to prevent DNS leaks worked properly. However, according to various reports, this might not be the case. We're investigating to try to understand the source of the issue.

 

Maybe you had a previous AirVPN.xml which has that option enabled.

 

Kind regards

Share this post


Link to post

I read a post in the past that stated your future plans for Eddie include the ability to use it for any VPN configuration, not just AirVPN. Is that still a goal? Will it be in v. 3?

 

Eddie 2.11 final edition will have the 'hidden' feature to run any VPN OpenVPN configuration, not just AirVPN. 'Hidden feature' because the UI will not include it yet. It will remain usable in manual configuration, mainly for beta-testing and skilled users. We will post a guide about that soon.

Eddie 3 will feature a full UI interface for that.

 

Kind regards

Share this post


Link to post

I must have the old .xml file from just doing a regular uninstall and installing of the beta since I have all those DNS setings checked. So far had no issues and seems stable for app/connection. Great job!

Share this post


Link to post
Guest

 

The DNS settings are checked by default, no need to touch them. 

 

Not on 2.11.3 beta which by default has "Force all network interfaces...." de-selected, because we expected (and tested) that a new approach to prevent DNS leaks worked properly. However, according to various reports, this might not be the case. We're investigating to try to understand the source of the issue.

 

Maybe you had a previous AirVPN.xml which has that option enabled.

 

Kind regards

Ah, you are right. Did not install before seeing that. However, no DNS leaks here. The windows size is also saved now, thanks for fixing that.

Share this post


Link to post

Just wanna let you folks know that the beta client of AirVPN somehow managed to irreversibly alter my system's proxy settings, making me unable to gain internet access through web browsers.

 

The first thing I tried was to clear the proxy settings in Windows, something which never worked and resulted in things immediately reverting back to how they were. Next thing I tried was uninstalling AirVPN, something which also never worked. After trying a multitude of things—all without luck—I, unfortunately, had no choice but to re-install Windows (which I had been planning on doing for quite some time, but still).

 

I'm guessing this problem has something to do with the new Network Lock.

 

My question is: if I'm to run into this problem again, what can I do to rid myself of it?

Share this post


Link to post

Just wanna let you folks know that the beta client of AirVPN somehow managed to irreversibly alter my system's proxy settings, making me unable to gain internet access through web browsers.

 

The software has no code to alter the system proxy settings.

 

 

The first thing I tried was to clear the proxy settings in Windows, something which never worked and resulted in things immediately reverting back to how they were.

 

You were probably working on the wrong assumed cause.

 

 

I'm guessing this problem has something to do with the new Network Lock.

 

My question is: if I'm to run into this problem again, what can I do to rid myself of it?

Don't jump to early conclusions about the causes of the problem and send a complete report ("Logs", then click the life belt icon and paste into your message) to the support team (open a ticket).

 

Kind regards

Share this post


Link to post
Guest
Posted ... (edited)

I updated to latest beta version, I appreciate you guys taking my suggestion about saving how you modify the servers list =)

 

EDIT: Wow... I just noticed it was addressed further up I'm sorry about that.

Edited ... by EdensSpire

Share this post


Link to post

I get stuck at checking route after I restart the app and have network lock enabled. Im on OS X 10.11.6 and eddie 2.11.3

Share this post


Link to post

doesn't work with the 4.7 kernel in Mint for me. hangs on latency check and never connects.

 

rock solid on 4.6.5 however.

Share this post


Link to post

I get stuck at checking route after I restart the app and have network lock enabled. Im on OS X 10.11.6 and eddie 2.11.3

 

I can confirm this issue, OSX 10.11.6 happend with eddie 2.11.1 and 2.11.3. When I disable the "check if tunnel works correctly" the client will get stuck on DNS check instead, if I disable both I have no internet access anymore.

 

While the "check if tunnel is working correctly" is running I have normal access through the vpn protected connection though!

Share this post


Link to post

The portable version downloaded fine.

So, I am glad to be testing 2.11.3 beta.

SSH for some reason did not load but I only use that on occasions.

Share this post


Link to post

 

I get stuck at checking route after I restart the app and have network lock enabled. Im on OS X 10.11.6 and eddie 2.11.3

 

I can confirm this issue, OSX 10.11.6 happend with eddie 2.11.1 and 2.11.3. When I disable the "check if tunnel works correctly" the client will get stuck on DNS check instead, if I disable both I have no internet access anymore.

 

While the "check if tunnel is working correctly" is running I have normal access through the vpn protected connection though!

 

I had this problem , my workaround is to go to AIRVPN - Preferences - DNS and add the AirVPN dns manually " for me it was 10.5.0.1 , 10.4.0.1 " , check dns ON , network lock ON , check if the tunnel ON , and I can connect now without any problem

Share this post


Link to post

Hello!

 

ONLY FOR WINDOWS USERS

 

Previous Eddie editions (Eddie 2.11 adopts a new method that prevents DNS Leaks, so in theory it's not necessary anymore to force network interfaces DNS.
For this reason, the option "Settings -> Advanced -> Force all network interfaces for DNS" is disabled by default.
But some of you report DNS Leak. We can't reproduce the issue on any of our machines in our labs.

So, anyone wishing to collaborate will be welcome.

Please ensure:
- Settings -> DNS -> DNS Switch Mode: Automatic
- Settings -> DNS -> DNS Servers: empty
- Settings -> Advanced -> IPv6: Disable
- Settings -> Advanced -> Force all network interfaces for DNS: DISABLED
- Settings -> Advanced -> Ensure DNS lock: enabled
- Settings -> Advanced -> WFP: enabled

All the options above are set to the default settings.

Please report:
- Your Windows version
- Whether you have IPv6 or not.
- If you have DNS leaks. If so, please generate a report by clicking life belt icon in Logs tabs, and copy it at least up to the "Default gateways:" line. Please post it in "spoiler" tag.

 

Kind regards

Share this post


Link to post

Hi, can you please implement simple counting numbers in the lists at Servers/Countries tabs? Also waiting fixes for correct stats in the Countries tab, thanks a lot.

Share this post


Link to post

Hi, can you please implement simple counting numbers in the lists at Servers/Countries tabs? Also waiting fixes for correct stats in the Countries tab, thanks a lot.

 

These issues have already been fixed in v2.11.3.

 

Regards

 

Fox

Share this post


Link to post

V2.11.3 on Fedora 24:

 

There is something fishy with the DNS: 8 times the client failed with "DNS checking failed", then it succeded the 9th time.

Once it succeded once, I can select whatever server I want, including one which failed at first.

 

As "Eddie 2.11 adopts a new method that prevents DNS Leaks", it seems to me it is buggy on my system for some reason.

Share this post


Link to post

Staff, here is my testing about DNS leaking, with settings mentioned.

 

Please report:
- Your Windows version
- Whether you have IPv6 or not.
- If you have DNS leaks. If so, please generate a report by clicking life belt icon in Logs tabs, and copy it at least up to the "Default gateways:" line. Please post it in "spoiler" tag.

 

64-bit Microsoft Windows 10 Enterprise 10.0.10586.494 (Win10 TH2)

- Currently not

- No any unexpected DNS leaks according to https://www.dnsleaktest.com/https://ipleak.net/ 

 

2016-08-04_142547-DNS_leak_test.th.png FireShot_Capture_5_-_IPDNS_Detect_-_What

Share this post


Link to post
Guest
This topic is now closed to further replies.

×
×
  • Create New...