Titums 1 Posted ... I have Eddie 2.18.9, on windows server 2016. I got this vpn so I could have port forwarding on my torrents; so the vpn is connected 24/7. It's running with default settings and network lock enabled. After a few days of running my browser can no longer connect to the internet. It just say 'no internet' with the chrome dinosaur, but torrents still work. Sometimes pages I already had open will still refresh but new pages fail. Disconnecting, turning off network lock, and closing Eddie do not resolve the issue. Only thing I've found that resolves the issue is rebooting the computer. Then it's good few a few days till it happens again. Any help would be great, thanks. Quote Share this post Link to post
OpenSourcerer 1441 Posted ... I suspect it's something with DNS. It might get reset at some point, but since NetLock does not allow detected DNS, the browser can't connect with domain names after the reset but the torrent client, which is using IP addresses, still can. You could let it run as usual and when it happens, in Eddie > Logs, click the lifebelt icon and paste or upload the output here. That way we can confirm it. Or you simply set the DNS server of your primary network interface to the addresses on Specs page. Also, disable SmartDNS to prevent leaks if you have multiple physical network interfaces. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
Titums 1 Posted ... >Or you simply set the DNS server of your primary network interface to the addresses on Specs page. If I do this, that means that DNS won't work if I'm not connected to the VPN right? I'll post the logs Next time it happens, it's been connected for 2 days now, so it'll probably be in the next day or two. Quote Share this post Link to post
OpenSourcerer 1441 Posted ... 10 minutes ago, Titums said: If I do this, that means that DNS won't work if I'm not connected to the VPN right? No, it won't. Neat side effect is that most programs will think you don't have an internet connection, sort of like an unreliable Network Lock Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
Flx 76 Posted ... On 5/23/2020 at 3:24 AM, giganerd said: I suspect it's something with DNS. It might get reset at some point, Exactly that started 2-3 days ago. By what magic I still don't know. On reconnect nothing would work(webpages etc.) Exact date: May 21, 2020 Quote Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
Titums 1 Posted ... (edited) Here is the log. It would be nice to have a solution to this that doesn't break browsing while disconnected. Eddie System/Environment Report - 5/24/2020 - 3:12 PM UTC Eddie version: 2.18.9 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows Server 2016 Standard OS version: Microsoft Windows NT 10.0.14393.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN driver: 0901: 9.24.2; wintun: 0.6 OpenVPN: 2.4.8 - OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: () SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) curl: 7.68.0 (C:\Program Files\AirVPN\curl.exe) Profile path: C:\Users\dsmith\AppData\Local\Eddie\default.profile Data path: C:\Users\dsmith\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (1 args) path="home" Network Lock Active: Yes, Windows Filtering Platform Connected to VPN: Yes, Saiph Detected DNS: 10.28.246.1, 192.168.1.1, fde6:7a:7d20:18f6::1 Test DNS IPv4: Failed Test DNS IPv6: Failed Test Ping IPv4: 140 ms Test Ping IPv6: 140 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Error:curl: (6) Could not resolve host: eddie.website ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True netlock: True ---------------------------- Logs: . 2020.05.21 10:16:47 - Eddie version: 2.18.9 / windows_x64, System: Windows, Name: Windows Server 2016 Standard, Version: Microsoft Windows NT 10.0.14393.0, Mono/.Net: v4.0.30319 . 2020.05.21 10:16:47 - Command line arguments (1): path="home" . 2020.05.21 10:16:48 - Raise system privileges . 2020.05.21 10:16:51 - Profile path: C:\Users\dsmith\AppData\Local\Eddie\default.profile . 2020.05.21 10:16:52 - Reading options from C:\Users\dsmith\AppData\Local\Eddie\default.profile . 2020.05.21 10:16:57 - Tun Driver - 0901: 9.24.2; wintun: 0.6 . 2020.05.21 10:16:57 - OpenVPN - Version: 2.4.8 - OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2020.05.21 10:16:57 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe) . 2020.05.21 10:16:57 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) . 2020.05.21 10:16:57 - curl - Version: 7.68.0 (C:\Program Files\AirVPN\curl.exe) . 2020.05.21 10:16:57 - Recovery. Unexpected crash? . 2020.05.21 10:16:57 - Routes, removed an existing route, 184.75.221.195 for gateway 10.31.118.1 . 2020.05.21 10:16:58 - Routes, removed an existing route, 2606:6080:1001:15:45d:2b31:f931:2e2 for gateway fde6:7a:7d20:1b76::1 . 2020.05.21 10:16:58 - Routes, added a new route, 104.254.90.243 for gateway 10.16.86.1 . 2020.05.21 10:16:58 - Routes, added a new route, 192.30.89.75 for gateway 10.35.102.1 ! 2020.05.21 10:16:58 - Activation of Network Lock - Windows Filtering Platform I 2020.05.21 10:16:59 - Ready . 2020.05.21 10:17:00 - Collect information about AirVPN completed ! 2020.05.21 10:18:05 - Deactivation of Network Lock . 2020.05.21 10:47:02 - Collect information about AirVPN completed . 2020.05.21 11:25:48 - Above log line repeated 1 times more ! 2020.05.21 11:25:48 - Activation of Network Lock - Windows Filtering Platform I 2020.05.21 11:25:50 - Session starting. I 2020.05.21 11:25:50 - Checking authorization ... ! 2020.05.21 11:25:51 - Connecting to Saiph (Canada, Toronto, Ontario) . 2020.05.21 11:25:51 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.05.21 11:25:51 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.05.21 11:25:51 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.05.21 11:25:51 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.05.21 11:25:51 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.05.21 11:25:51 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.05.21 11:25:51 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.05.21 11:25:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.229:443 . 2020.05.21 11:25:51 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.05.21 11:25:51 - OpenVPN > UDP link local: (not bound) . 2020.05.21 11:25:51 - OpenVPN > UDP link remote: [AF_INET]184.75.223.229:443 . 2020.05.21 11:25:51 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.229:443, sid=ab5181b8 658ddede . 2020.05.21 11:25:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.21 11:25:51 - OpenVPN > VERIFY KU OK . 2020.05.21 11:25:51 - OpenVPN > Validating certificate extended key usage . 2020.05.21 11:25:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.21 11:25:51 - OpenVPN > VERIFY EKU OK . 2020.05.21 11:25:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.21 11:25:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.21 11:25:52 - OpenVPN > [Saiph] Peer Connection Initiated with [AF_INET]184.75.223.229:443 . 2020.05.21 11:25:53 - OpenVPN > SENT CONTROL [Saiph]: 'PUSH_REQUEST' (status=1) . 2020.05.21 11:25:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.246.1,dhcp-option DNS6 fde6:7a:7d20:18f6::1,tun-ipv6,route-gateway 10.28.246.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:18f6::101c/64 fde6:7a:7d20:18f6::1,ifconfig 10.28.246.30 255.255.255.0,peer-id 9,cipher AES-256-GCM' . 2020.05.21 11:25:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.05.21 11:25:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.05.21 11:25:53 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.05.21 11:25:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.05.21 11:25:53 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.05.21 11:25:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.05.21 11:25:53 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.05.21 11:25:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.05.21 11:25:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.05.21 11:25:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.05.21 11:25:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 11:25:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 11:25:53 - OpenVPN > interactive service msg_channel=0 . 2020.05.21 11:25:53 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=6 HWADDR=00:25:90:fb:a2:1c . 2020.05.21 11:25:53 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.05.21 11:25:53 - OpenVPN > GetBestInterfaceEx() returned if=21 . 2020.05.21 11:25:53 - OpenVPN > GDG6: II=21 DP=::/0 NH=:: . 2020.05.21 11:25:53 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2020.05.21 11:25:53 - OpenVPN > ROUTE6_GATEWAY :: ON_LINK I=21 . 2020.05.21 11:25:53 - OpenVPN > open_tun . 2020.05.21 11:25:53 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}.tap . 2020.05.21 11:25:53 - OpenVPN > TAP-Windows Driver Version 9.24 . 2020.05.21 11:25:53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.28.246.0/10.28.246.30/255.255.255.0 [SUCCEEDED] . 2020.05.21 11:25:53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.28.246.30/255.255.255.0 on interface {61920DA2-D3D6-4DD8-97F3-4B7AB6295376} [DHCP-serv: 10.28.246.254, lease-time: 31536000] . 2020.05.21 11:25:53 - OpenVPN > Successful ARP Flush on interface [10] {61920DA2-D3D6-4DD8-97F3-4B7AB6295376} . 2020.05.21 11:25:54 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=10 fde6:7a:7d20:18f6::101c store=active . 2020.05.21 11:25:56 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns Local Area Connection static fde6:7a:7d20:18f6::1 validate=no . 2020.05.21 11:25:56 - OpenVPN > add_route_ipv6(fde6:7a:7d20:18f6::/64 -> fde6:7a:7d20:18f6::101c metric 0) dev Local Area Connection . 2020.05.21 11:25:56 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:18f6::/64 interface=10 fe80::8 store=active . 2020.05.21 11:25:56 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.05.21 11:26:01 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.05.21 11:26:01 - OpenVPN > C:\Windows\system32\route.exe ADD 184.75.223.229 MASK 255.255.255.255 192.168.1.1 . 2020.05.21 11:26:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.05.21 11:26:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.21 11:26:01 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.28.246.1 . 2020.05.21 11:26:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4 . 2020.05.21 11:26:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.21 11:26:01 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.28.246.1 . 2020.05.21 11:26:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4 . 2020.05.21 11:26:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.05.21 11:26:01 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:18f6::1 metric -1) dev Local Area Connection . 2020.05.21 11:26:01 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route ::/3 interface=10 fe80::8 store=active . 2020.05.21 11:26:01 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.05.21 11:26:01 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:18f6::1 metric -1) dev Local Area Connection . 2020.05.21 11:26:01 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 2000::/4 interface=10 fe80::8 store=active . 2020.05.21 11:26:01 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.05.21 11:26:01 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:18f6::1 metric -1) dev Local Area Connection . 2020.05.21 11:26:01 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 3000::/4 interface=10 fe80::8 store=active . 2020.05.21 11:26:01 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.05.21 11:26:01 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:18f6::1 metric -1) dev Local Area Connection . 2020.05.21 11:26:01 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fc00::/7 interface=10 fe80::8 store=active . 2020.05.21 11:26:01 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.05.21 11:26:01 - Interface Local Area Connection metric changed from 6 to 3, layer IPv4 . 2020.05.21 11:26:01 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2020.05.21 11:26:01 - DNS leak protection with packet filtering enabled. . 2020.05.21 11:26:02 - Routes, added a new route, 184.75.223.227 for gateway 10.28.246.1 . 2020.05.21 11:26:02 - Routes, added a new route, 2606:6080:1002:8:3285:30e:de43:8809 for gateway fde6:7a:7d20:18f6::1 . 2020.05.21 11:26:02 - Flushing DNS I 2020.05.21 11:26:02 - Checking route IPv4 I 2020.05.21 11:26:02 - Checking route IPv6 I 2020.05.21 11:26:06 - Checking DNS ! 2020.05.21 11:26:06 - Connected. . 2020.05.21 11:26:06 - OpenVPN > Initialization Sequence Completed . 2020.05.21 11:47:12 - Collect information about AirVPN completed . 2020.05.21 12:25:52 - Above log line repeated 1 times more . 2020.05.21 12:25:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.21 12:25:52 - OpenVPN > VERIFY KU OK . 2020.05.21 12:25:52 - OpenVPN > Validating certificate extended key usage . 2020.05.21 12:25:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.21 12:25:52 - OpenVPN > VERIFY EKU OK . 2020.05.21 12:25:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.21 12:25:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 12:25:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 12:25:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.21 12:47:25 - Collect information about AirVPN completed . 2020.05.21 13:25:52 - Above log line repeated 1 times more . 2020.05.21 13:25:52 - Renewing TLS key . 2020.05.21 13:25:52 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.21 13:25:54 - OpenVPN > TLS: soft reset sec=-1 bytes=4583158/-1 pkts=9110/0 . 2020.05.21 13:25:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.21 13:25:54 - OpenVPN > VERIFY KU OK . 2020.05.21 13:25:54 - OpenVPN > Validating certificate extended key usage . 2020.05.21 13:25:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.21 13:25:54 - OpenVPN > VERIFY EKU OK . 2020.05.21 13:25:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.21 13:25:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 13:25:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 13:25:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.21 13:47:37 - Collect information about AirVPN completed . 2020.05.21 14:25:54 - Above log line repeated 1 times more . 2020.05.21 14:25:54 - OpenVPN > TLS: soft reset sec=0 bytes=2018215/-1 pkts=5437/0 . 2020.05.21 14:25:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.21 14:25:54 - OpenVPN > VERIFY KU OK . 2020.05.21 14:25:54 - OpenVPN > Validating certificate extended key usage . 2020.05.21 14:25:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.21 14:25:54 - OpenVPN > VERIFY EKU OK . 2020.05.21 14:25:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.21 14:25:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 14:25:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 14:25:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.21 14:47:50 - Collect information about AirVPN completed . 2020.05.21 15:25:54 - Above log line repeated 1 times more . 2020.05.21 15:25:54 - Renewing TLS key . 2020.05.21 15:25:54 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.21 15:25:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.21 15:25:55 - OpenVPN > VERIFY KU OK . 2020.05.21 15:25:55 - OpenVPN > Validating certificate extended key usage . 2020.05.21 15:25:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.21 15:25:55 - OpenVPN > VERIFY EKU OK . 2020.05.21 15:25:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.21 15:25:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 15:25:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 15:25:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.21 15:48:05 - Collect information about AirVPN completed . 2020.05.21 16:25:55 - Above log line repeated 1 times more . 2020.05.21 16:25:55 - Renewing TLS key . 2020.05.21 16:25:55 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.21 16:25:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.21 16:25:56 - OpenVPN > VERIFY KU OK . 2020.05.21 16:25:56 - OpenVPN > Validating certificate extended key usage . 2020.05.21 16:25:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.21 16:25:56 - OpenVPN > VERIFY EKU OK . 2020.05.21 16:25:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.21 16:25:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 16:25:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 16:25:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.21 16:48:19 - Collect information about AirVPN completed . 2020.05.21 17:25:56 - Above log line repeated 1 times more . 2020.05.21 17:25:56 - OpenVPN > TLS: soft reset sec=0 bytes=9527825/-1 pkts=13558/0 . 2020.05.21 17:25:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.21 17:25:56 - OpenVPN > VERIFY KU OK . 2020.05.21 17:25:56 - OpenVPN > Validating certificate extended key usage . 2020.05.21 17:25:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.21 17:25:56 - OpenVPN > VERIFY EKU OK . 2020.05.21 17:25:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.21 17:25:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 17:25:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 17:25:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.21 17:48:32 - Collect information about AirVPN completed . 2020.05.21 18:25:56 - Above log line repeated 1 times more . 2020.05.21 18:25:56 - Renewing TLS key . 2020.05.21 18:25:56 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.21 18:25:57 - OpenVPN > TLS: soft reset sec=0 bytes=8874388/-1 pkts=12618/0 . 2020.05.21 18:25:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.21 18:25:57 - OpenVPN > VERIFY KU OK . 2020.05.21 18:25:57 - OpenVPN > Validating certificate extended key usage . 2020.05.21 18:25:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.21 18:25:57 - OpenVPN > VERIFY EKU OK . 2020.05.21 18:25:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.21 18:25:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 18:25:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 18:25:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.21 18:48:46 - Collect information about AirVPN completed . 2020.05.21 19:25:58 - Above log line repeated 1 times more . 2020.05.21 19:25:58 - Renewing TLS key . 2020.05.21 19:25:58 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.21 19:25:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.21 19:25:58 - OpenVPN > VERIFY KU OK . 2020.05.21 19:25:58 - OpenVPN > Validating certificate extended key usage . 2020.05.21 19:25:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.21 19:25:58 - OpenVPN > VERIFY EKU OK . 2020.05.21 19:25:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.21 19:25:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 19:25:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 19:25:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.21 19:48:59 - Collect information about AirVPN completed . 2020.05.21 20:25:58 - Above log line repeated 1 times more . 2020.05.21 20:25:58 - Renewing TLS key . 2020.05.21 20:25:58 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.21 20:25:59 - OpenVPN > TLS: soft reset sec=0 bytes=3665348/-1 pkts=6906/0 . 2020.05.21 20:25:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.21 20:25:59 - OpenVPN > VERIFY KU OK . 2020.05.21 20:25:59 - OpenVPN > Validating certificate extended key usage . 2020.05.21 20:25:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.21 20:25:59 - OpenVPN > VERIFY EKU OK . 2020.05.21 20:25:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.21 20:26:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 20:26:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 20:26:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.21 20:49:13 - Collect information about AirVPN completed . 2020.05.21 21:25:59 - Above log line repeated 1 times more . 2020.05.21 21:25:59 - Renewing TLS key . 2020.05.21 21:25:59 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.21 21:26:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.21 21:26:00 - OpenVPN > VERIFY KU OK . 2020.05.21 21:26:00 - OpenVPN > Validating certificate extended key usage . 2020.05.21 21:26:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.21 21:26:00 - OpenVPN > VERIFY EKU OK . 2020.05.21 21:26:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.21 21:26:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 21:26:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 21:26:01 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.21 21:49:26 - Collect information about AirVPN completed . 2020.05.21 22:26:00 - Above log line repeated 1 times more . 2020.05.21 22:26:00 - Renewing TLS key . 2020.05.21 22:26:00 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.21 22:26:01 - OpenVPN > TLS: soft reset sec=0 bytes=9496612/-1 pkts=14493/0 . 2020.05.21 22:26:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.21 22:26:01 - OpenVPN > VERIFY KU OK . 2020.05.21 22:26:01 - OpenVPN > Validating certificate extended key usage . 2020.05.21 22:26:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.21 22:26:01 - OpenVPN > VERIFY EKU OK . 2020.05.21 22:26:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.21 22:26:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 22:26:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 22:26:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.21 22:49:40 - Collect information about AirVPN completed . 2020.05.21 23:26:01 - Above log line repeated 1 times more . 2020.05.21 23:26:01 - Renewing TLS key . 2020.05.21 23:26:01 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.21 23:26:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.21 23:26:02 - OpenVPN > VERIFY KU OK . 2020.05.21 23:26:02 - OpenVPN > Validating certificate extended key usage . 2020.05.21 23:26:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.21 23:26:02 - OpenVPN > VERIFY EKU OK . 2020.05.21 23:26:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.21 23:26:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 23:26:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.21 23:26:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.21 23:49:54 - Collect information about AirVPN completed . 2020.05.22 00:26:02 - Above log line repeated 1 times more . 2020.05.22 00:26:02 - OpenVPN > TLS: soft reset sec=0 bytes=3539064/-1 pkts=6955/0 . 2020.05.22 00:26:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 00:26:02 - OpenVPN > VERIFY KU OK . 2020.05.22 00:26:02 - OpenVPN > Validating certificate extended key usage . 2020.05.22 00:26:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 00:26:02 - OpenVPN > VERIFY EKU OK . 2020.05.22 00:26:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 00:26:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 00:26:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 00:26:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 00:50:08 - Collect information about AirVPN completed . 2020.05.22 01:26:02 - Above log line repeated 1 times more . 2020.05.22 01:26:02 - OpenVPN > TLS: soft reset sec=0 bytes=6934550/-1 pkts=11075/0 . 2020.05.22 01:26:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 01:26:02 - OpenVPN > VERIFY KU OK . 2020.05.22 01:26:02 - OpenVPN > Validating certificate extended key usage . 2020.05.22 01:26:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 01:26:02 - OpenVPN > VERIFY EKU OK . 2020.05.22 01:26:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 01:26:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 01:26:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 01:26:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 01:50:22 - Collect information about AirVPN completed . 2020.05.22 02:26:02 - Above log line repeated 1 times more . 2020.05.22 02:26:02 - Renewing TLS key . 2020.05.22 02:26:02 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.22 02:26:03 - OpenVPN > TLS: soft reset sec=0 bytes=17410122/-1 pkts=24218/0 . 2020.05.22 02:26:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 02:26:03 - OpenVPN > VERIFY KU OK . 2020.05.22 02:26:03 - OpenVPN > Validating certificate extended key usage . 2020.05.22 02:26:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 02:26:03 - OpenVPN > VERIFY EKU OK . 2020.05.22 02:26:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 02:26:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 02:26:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 02:26:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 02:50:36 - Collect information about AirVPN completed . 2020.05.22 03:26:03 - Above log line repeated 1 times more . 2020.05.22 03:26:03 - Renewing TLS key . 2020.05.22 03:26:03 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.22 03:26:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 03:26:04 - OpenVPN > VERIFY KU OK . 2020.05.22 03:26:04 - OpenVPN > Validating certificate extended key usage . 2020.05.22 03:26:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 03:26:04 - OpenVPN > VERIFY EKU OK . 2020.05.22 03:26:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 03:26:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 03:26:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 03:26:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 03:50:49 - Collect information about AirVPN completed . 2020.05.22 04:26:04 - Above log line repeated 1 times more . 2020.05.22 04:26:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 04:26:04 - OpenVPN > VERIFY KU OK . 2020.05.22 04:26:04 - OpenVPN > Validating certificate extended key usage . 2020.05.22 04:26:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 04:26:04 - OpenVPN > VERIFY EKU OK . 2020.05.22 04:26:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 04:26:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 04:26:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 04:26:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 04:51:02 - Collect information about AirVPN completed . 2020.05.22 05:26:04 - Above log line repeated 1 times more . 2020.05.22 05:26:04 - OpenVPN > TLS: soft reset sec=0 bytes=16547315/-1 pkts=21129/0 . 2020.05.22 05:26:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 05:26:04 - OpenVPN > VERIFY KU OK . 2020.05.22 05:26:04 - OpenVPN > Validating certificate extended key usage . 2020.05.22 05:26:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 05:26:04 - OpenVPN > VERIFY EKU OK . 2020.05.22 05:26:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 05:26:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 05:26:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 05:26:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 05:51:16 - Collect information about AirVPN completed . 2020.05.22 06:26:05 - Above log line repeated 1 times more . 2020.05.22 06:26:05 - OpenVPN > TLS: soft reset sec=0 bytes=4915261/-1 pkts=8874/0 . 2020.05.22 06:26:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 06:26:05 - OpenVPN > VERIFY KU OK . 2020.05.22 06:26:05 - OpenVPN > Validating certificate extended key usage . 2020.05.22 06:26:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 06:26:05 - OpenVPN > VERIFY EKU OK . 2020.05.22 06:26:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 06:26:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 06:26:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 06:26:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 06:51:29 - Collect information about AirVPN completed . 2020.05.22 07:26:05 - Above log line repeated 1 times more . 2020.05.22 07:26:05 - OpenVPN > TLS: soft reset sec=0 bytes=2141809/-1 pkts=5837/0 . 2020.05.22 07:26:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 07:26:05 - OpenVPN > VERIFY KU OK . 2020.05.22 07:26:05 - OpenVPN > Validating certificate extended key usage . 2020.05.22 07:26:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 07:26:05 - OpenVPN > VERIFY EKU OK . 2020.05.22 07:26:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 07:26:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 07:26:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 07:26:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 07:51:43 - Collect information about AirVPN completed . 2020.05.22 08:26:05 - Above log line repeated 1 times more . 2020.05.22 08:26:05 - Renewing TLS key . 2020.05.22 08:26:05 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.22 08:26:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 08:26:06 - OpenVPN > VERIFY KU OK . 2020.05.22 08:26:06 - OpenVPN > Validating certificate extended key usage . 2020.05.22 08:26:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 08:26:06 - OpenVPN > VERIFY EKU OK . 2020.05.22 08:26:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 08:26:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 08:26:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 08:26:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 08:51:56 - Collect information about AirVPN completed . 2020.05.22 09:26:06 - Above log line repeated 1 times more . 2020.05.22 09:26:06 - Renewing TLS key . 2020.05.22 09:26:06 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.22 09:26:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 09:26:07 - OpenVPN > VERIFY KU OK . 2020.05.22 09:26:07 - OpenVPN > Validating certificate extended key usage . 2020.05.22 09:26:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 09:26:07 - OpenVPN > VERIFY EKU OK . 2020.05.22 09:26:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 09:26:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 09:26:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 09:26:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 09:52:11 - Collect information about AirVPN completed . 2020.05.22 10:26:07 - Above log line repeated 1 times more . 2020.05.22 10:26:07 - Renewing TLS key . 2020.05.22 10:26:07 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.22 10:26:08 - OpenVPN > TLS: soft reset sec=0 bytes=68845925/-1 pkts=92098/0 . 2020.05.22 10:26:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 10:26:08 - OpenVPN > VERIFY KU OK . 2020.05.22 10:26:08 - OpenVPN > Validating certificate extended key usage . 2020.05.22 10:26:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 10:26:08 - OpenVPN > VERIFY EKU OK . 2020.05.22 10:26:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 10:26:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 10:26:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 10:26:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 10:52:25 - Collect information about AirVPN completed . 2020.05.22 11:26:08 - Above log line repeated 1 times more . 2020.05.22 11:26:08 - Renewing TLS key . 2020.05.22 11:26:08 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.22 11:26:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 11:26:09 - OpenVPN > VERIFY KU OK . 2020.05.22 11:26:09 - OpenVPN > Validating certificate extended key usage . 2020.05.22 11:26:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 11:26:09 - OpenVPN > VERIFY EKU OK . 2020.05.22 11:26:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 11:26:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 11:26:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 11:26:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 11:52:38 - Collect information about AirVPN completed . 2020.05.22 12:26:09 - Above log line repeated 1 times more . 2020.05.22 12:26:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 12:26:09 - OpenVPN > VERIFY KU OK . 2020.05.22 12:26:09 - OpenVPN > Validating certificate extended key usage . 2020.05.22 12:26:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 12:26:09 - OpenVPN > VERIFY EKU OK . 2020.05.22 12:26:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 12:26:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 12:26:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 12:26:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 12:52:52 - Collect information about AirVPN completed . 2020.05.22 13:26:09 - Above log line repeated 1 times more . 2020.05.22 13:26:09 - OpenVPN > TLS: soft reset sec=0 bytes=550200551/-1 pkts=598843/0 . 2020.05.22 13:26:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 13:26:09 - OpenVPN > VERIFY KU OK . 2020.05.22 13:26:09 - OpenVPN > Validating certificate extended key usage . 2020.05.22 13:26:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 13:26:09 - OpenVPN > VERIFY EKU OK . 2020.05.22 13:26:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 13:26:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 13:26:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 13:26:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 13:53:06 - Collect information about AirVPN completed . 2020.05.22 14:26:09 - Above log line repeated 1 times more . 2020.05.22 14:26:09 - Renewing TLS key . 2020.05.22 14:26:09 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.22 14:26:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 14:26:10 - OpenVPN > VERIFY KU OK . 2020.05.22 14:26:10 - OpenVPN > Validating certificate extended key usage . 2020.05.22 14:26:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 14:26:10 - OpenVPN > VERIFY EKU OK . 2020.05.22 14:26:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 14:26:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 14:26:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 14:26:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 14:53:14 - Collect information about AirVPN completed . 2020.05.22 15:26:10 - Above log line repeated 1 times more . 2020.05.22 15:26:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 15:26:10 - OpenVPN > VERIFY KU OK . 2020.05.22 15:26:10 - OpenVPN > Validating certificate extended key usage . 2020.05.22 15:26:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 15:26:10 - OpenVPN > VERIFY EKU OK . 2020.05.22 15:26:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 15:26:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 15:26:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 15:26:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 15:53:24 - Collect information about AirVPN completed . 2020.05.22 16:26:10 - Above log line repeated 1 times more . 2020.05.22 16:26:10 - OpenVPN > TLS: soft reset sec=0 bytes=42192701/-1 pkts=70497/0 . 2020.05.22 16:26:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 16:26:10 - OpenVPN > VERIFY KU OK . 2020.05.22 16:26:10 - OpenVPN > Validating certificate extended key usage . 2020.05.22 16:26:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 16:26:10 - OpenVPN > VERIFY EKU OK . 2020.05.22 16:26:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 16:26:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 16:26:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 16:26:11 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 16:53:31 - Collect information about AirVPN completed . 2020.05.22 17:26:10 - Above log line repeated 1 times more . 2020.05.22 17:26:10 - Renewing TLS key . 2020.05.22 17:26:10 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.22 17:26:11 - OpenVPN > TLS: soft reset sec=0 bytes=6678601/-1 pkts=13685/0 . 2020.05.22 17:26:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 17:26:11 - OpenVPN > VERIFY KU OK . 2020.05.22 17:26:11 - OpenVPN > Validating certificate extended key usage . 2020.05.22 17:26:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 17:26:11 - OpenVPN > VERIFY EKU OK . 2020.05.22 17:26:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 17:26:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 17:26:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 17:26:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 17:53:47 - Collect information about AirVPN completed . 2020.05.22 18:26:12 - Above log line repeated 1 times more . 2020.05.22 18:26:12 - Renewing TLS key . 2020.05.22 18:26:12 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.22 18:26:12 - OpenVPN > TLS: soft reset sec=0 bytes=11629770/-1 pkts=17422/0 . 2020.05.22 18:26:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 18:26:12 - OpenVPN > VERIFY KU OK . 2020.05.22 18:26:12 - OpenVPN > Validating certificate extended key usage . 2020.05.22 18:26:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 18:26:12 - OpenVPN > VERIFY EKU OK . 2020.05.22 18:26:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 18:26:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 18:26:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 18:26:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 18:54:03 - Collect information about AirVPN completed . 2020.05.22 19:26:12 - Above log line repeated 1 times more . 2020.05.22 19:26:12 - OpenVPN > TLS: soft reset sec=0 bytes=3699542/-1 pkts=8513/0 . 2020.05.22 19:26:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 19:26:12 - OpenVPN > VERIFY KU OK . 2020.05.22 19:26:12 - OpenVPN > Validating certificate extended key usage . 2020.05.22 19:26:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 19:26:12 - OpenVPN > VERIFY EKU OK . 2020.05.22 19:26:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 19:26:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 19:26:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 19:26:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 19:54:19 - Collect information about AirVPN completed . 2020.05.22 20:26:12 - Above log line repeated 1 times more . 2020.05.22 20:26:12 - Renewing TLS key . 2020.05.22 20:26:12 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.22 20:26:13 - OpenVPN > TLS: soft reset sec=0 bytes=10692877/-1 pkts=16552/0 . 2020.05.22 20:26:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 20:26:13 - OpenVPN > VERIFY KU OK . 2020.05.22 20:26:13 - OpenVPN > Validating certificate extended key usage . 2020.05.22 20:26:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 20:26:13 - OpenVPN > VERIFY EKU OK . 2020.05.22 20:26:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 20:26:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 20:26:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 20:26:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 20:54:35 - Collect information about AirVPN completed . 2020.05.22 21:26:14 - Above log line repeated 1 times more . 2020.05.22 21:26:14 - OpenVPN > TLS: soft reset sec=-1 bytes=116283133/-1 pkts=124514/0 . 2020.05.22 21:26:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 21:26:14 - OpenVPN > VERIFY KU OK . 2020.05.22 21:26:14 - OpenVPN > Validating certificate extended key usage . 2020.05.22 21:26:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 21:26:14 - OpenVPN > VERIFY EKU OK . 2020.05.22 21:26:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 21:26:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 21:26:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 21:26:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 21:54:50 - Collect information about AirVPN completed . 2020.05.22 22:26:14 - Above log line repeated 1 times more . 2020.05.22 22:26:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 22:26:14 - OpenVPN > VERIFY KU OK . 2020.05.22 22:26:14 - OpenVPN > Validating certificate extended key usage . 2020.05.22 22:26:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 22:26:14 - OpenVPN > VERIFY EKU OK . 2020.05.22 22:26:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 22:26:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 22:26:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 22:26:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 22:55:06 - Collect information about AirVPN completed . 2020.05.22 23:26:14 - Above log line repeated 1 times more . 2020.05.22 23:26:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.22 23:26:14 - OpenVPN > VERIFY KU OK . 2020.05.22 23:26:14 - OpenVPN > Validating certificate extended key usage . 2020.05.22 23:26:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.22 23:26:14 - OpenVPN > VERIFY EKU OK . 2020.05.22 23:26:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.22 23:26:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 23:26:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.22 23:26:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.22 23:55:20 - Collect information about AirVPN completed . 2020.05.23 00:26:14 - Above log line repeated 1 times more . 2020.05.23 00:26:14 - Renewing TLS key . 2020.05.23 00:26:14 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.23 00:26:15 - OpenVPN > TLS: soft reset sec=0 bytes=196893255/-1 pkts=215645/0 . 2020.05.23 00:26:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 00:26:15 - OpenVPN > VERIFY KU OK . 2020.05.23 00:26:15 - OpenVPN > Validating certificate extended key usage . 2020.05.23 00:26:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 00:26:15 - OpenVPN > VERIFY EKU OK . 2020.05.23 00:26:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 00:26:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 00:26:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 00:26:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 00:55:36 - Collect information about AirVPN completed . 2020.05.23 01:26:15 - Above log line repeated 1 times more . 2020.05.23 01:26:15 - Renewing TLS key . 2020.05.23 01:26:15 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.23 01:26:16 - OpenVPN > TLS: soft reset sec=0 bytes=2609204/-1 pkts=7099/0 . 2020.05.23 01:26:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 01:26:16 - OpenVPN > VERIFY KU OK . 2020.05.23 01:26:16 - OpenVPN > Validating certificate extended key usage . 2020.05.23 01:26:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 01:26:16 - OpenVPN > VERIFY EKU OK . 2020.05.23 01:26:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 01:26:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 01:26:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 01:26:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 01:55:51 - Collect information about AirVPN completed . 2020.05.23 02:26:16 - Above log line repeated 1 times more . 2020.05.23 02:26:16 - Renewing TLS key . 2020.05.23 02:26:16 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.23 02:26:17 - OpenVPN > TLS: soft reset sec=0 bytes=3854122/-1 pkts=8649/0 . 2020.05.23 02:26:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 02:26:17 - OpenVPN > VERIFY KU OK . 2020.05.23 02:26:17 - OpenVPN > Validating certificate extended key usage . 2020.05.23 02:26:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 02:26:17 - OpenVPN > VERIFY EKU OK . 2020.05.23 02:26:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 02:26:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 02:26:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 02:26:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 02:56:06 - Collect information about AirVPN completed . 2020.05.23 03:26:17 - Above log line repeated 1 times more . 2020.05.23 03:26:17 - Renewing TLS key . 2020.05.23 03:26:17 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.23 03:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 03:26:18 - OpenVPN > VERIFY KU OK . 2020.05.23 03:26:18 - OpenVPN > Validating certificate extended key usage . 2020.05.23 03:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 03:26:18 - OpenVPN > VERIFY EKU OK . 2020.05.23 03:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 03:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 03:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 03:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 03:56:23 - Collect information about AirVPN completed . 2020.05.23 04:26:18 - Renewing TLS key . 2020.05.23 04:26:18 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.23 04:26:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 04:26:19 - OpenVPN > VERIFY KU OK . 2020.05.23 04:26:19 - OpenVPN > Validating certificate extended key usage . 2020.05.23 04:26:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 04:26:19 - OpenVPN > VERIFY EKU OK . 2020.05.23 04:26:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 04:26:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 04:26:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 04:26:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 04:26:31 - Collect information about AirVPN completed . 2020.05.23 05:26:19 - Above log line repeated 1 times more . 2020.05.23 05:26:19 - OpenVPN > TLS: soft reset sec=0 bytes=116395931/-1 pkts=128844/0 . 2020.05.23 05:26:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 05:26:19 - OpenVPN > VERIFY KU OK . 2020.05.23 05:26:19 - OpenVPN > Validating certificate extended key usage . 2020.05.23 05:26:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 05:26:19 - OpenVPN > VERIFY EKU OK . 2020.05.23 05:26:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 05:26:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 05:26:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 05:26:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 05:26:47 - Collect information about AirVPN completed . 2020.05.23 06:26:20 - Above log line repeated 1 times more . 2020.05.23 06:26:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 06:26:20 - OpenVPN > VERIFY KU OK . 2020.05.23 06:26:20 - OpenVPN > Validating certificate extended key usage . 2020.05.23 06:26:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 06:26:20 - OpenVPN > VERIFY EKU OK . 2020.05.23 06:26:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 06:26:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 06:26:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 06:26:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 06:27:04 - Collect information about AirVPN completed . 2020.05.23 07:26:20 - Above log line repeated 1 times more . 2020.05.23 07:26:20 - OpenVPN > TLS: soft reset sec=0 bytes=11614412/-1 pkts=17517/0 . 2020.05.23 07:26:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 07:26:20 - OpenVPN > VERIFY KU OK . 2020.05.23 07:26:20 - OpenVPN > Validating certificate extended key usage . 2020.05.23 07:26:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 07:26:20 - OpenVPN > VERIFY EKU OK . 2020.05.23 07:26:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 07:26:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 07:26:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 07:26:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 07:27:20 - Collect information about AirVPN completed . 2020.05.23 08:26:20 - Above log line repeated 1 times more . 2020.05.23 08:26:20 - Renewing TLS key . 2020.05.23 08:26:20 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.23 08:26:21 - OpenVPN > TLS: soft reset sec=0 bytes=2899414/-1 pkts=7567/0 . 2020.05.23 08:26:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 08:26:21 - OpenVPN > VERIFY KU OK . 2020.05.23 08:26:21 - OpenVPN > Validating certificate extended key usage . 2020.05.23 08:26:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 08:26:21 - OpenVPN > VERIFY EKU OK . 2020.05.23 08:26:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 08:26:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 08:26:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 08:26:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 08:27:35 - Collect information about AirVPN completed . 2020.05.23 09:26:21 - Above log line repeated 1 times more . 2020.05.23 09:26:21 - Renewing TLS key . 2020.05.23 09:26:21 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.23 09:26:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 09:26:22 - OpenVPN > VERIFY KU OK . 2020.05.23 09:26:22 - OpenVPN > Validating certificate extended key usage . 2020.05.23 09:26:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 09:26:22 - OpenVPN > VERIFY EKU OK . 2020.05.23 09:26:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 09:26:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 09:26:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 09:26:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 09:27:51 - Collect information about AirVPN completed . 2020.05.23 10:26:22 - Above log line repeated 1 times more . 2020.05.23 10:26:22 - Renewing TLS key . 2020.05.23 10:26:22 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.23 10:26:23 - OpenVPN > TLS: soft reset sec=0 bytes=33464413/-1 pkts=51541/0 . 2020.05.23 10:26:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 10:26:23 - OpenVPN > VERIFY KU OK . 2020.05.23 10:26:23 - OpenVPN > Validating certificate extended key usage . 2020.05.23 10:26:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 10:26:23 - OpenVPN > VERIFY EKU OK . 2020.05.23 10:26:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 10:26:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 10:26:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 10:26:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 10:28:02 - Collect information about AirVPN completed . 2020.05.23 11:26:23 - Above log line repeated 1 times more . 2020.05.23 11:26:23 - Renewing TLS key . 2020.05.23 11:26:23 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.23 11:26:24 - OpenVPN > TLS: soft reset sec=0 bytes=18573503/-1 pkts=30624/0 . 2020.05.23 11:26:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 11:26:24 - OpenVPN > VERIFY KU OK . 2020.05.23 11:26:24 - OpenVPN > Validating certificate extended key usage . 2020.05.23 11:26:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 11:26:24 - OpenVPN > VERIFY EKU OK . 2020.05.23 11:26:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 11:26:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 11:26:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 11:26:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 11:28:17 - Collect information about AirVPN completed . 2020.05.23 12:26:24 - Above log line repeated 1 times more . 2020.05.23 12:26:24 - Renewing TLS key . 2020.05.23 12:26:24 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.23 12:26:25 - OpenVPN > TLS: soft reset sec=0 bytes=3842219/-1 pkts=7324/0 . 2020.05.23 12:26:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 12:26:25 - OpenVPN > VERIFY KU OK . 2020.05.23 12:26:25 - OpenVPN > Validating certificate extended key usage . 2020.05.23 12:26:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 12:26:25 - OpenVPN > VERIFY EKU OK . 2020.05.23 12:26:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 12:26:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 12:26:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 12:26:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 12:28:31 - Collect information about AirVPN completed . 2020.05.23 13:26:25 - Above log line repeated 1 times more . 2020.05.23 13:26:25 - Renewing TLS key . 2020.05.23 13:26:25 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.23 13:26:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 13:26:26 - OpenVPN > VERIFY KU OK . 2020.05.23 13:26:26 - OpenVPN > Validating certificate extended key usage . 2020.05.23 13:26:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 13:26:26 - OpenVPN > VERIFY EKU OK . 2020.05.23 13:26:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 13:26:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 13:26:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 13:26:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 13:28:45 - Collect information about AirVPN completed . 2020.05.23 14:26:26 - Above log line repeated 1 times more . 2020.05.23 14:26:26 - Renewing TLS key . 2020.05.23 14:26:26 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.23 14:26:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 14:26:27 - OpenVPN > VERIFY KU OK . 2020.05.23 14:26:27 - OpenVPN > Validating certificate extended key usage . 2020.05.23 14:26:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 14:26:27 - OpenVPN > VERIFY EKU OK . 2020.05.23 14:26:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 14:26:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 14:26:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 14:26:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 14:28:59 - Collect information about AirVPN completed . 2020.05.23 15:26:27 - Above log line repeated 1 times more . 2020.05.23 15:26:27 - Renewing TLS key . 2020.05.23 15:26:27 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.23 15:26:28 - OpenVPN > TLS: soft reset sec=0 bytes=40203935/-1 pkts=46192/0 . 2020.05.23 15:26:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 15:26:28 - OpenVPN > VERIFY KU OK . 2020.05.23 15:26:28 - OpenVPN > Validating certificate extended key usage . 2020.05.23 15:26:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 15:26:28 - OpenVPN > VERIFY EKU OK . 2020.05.23 15:26:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 15:26:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 15:26:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 15:26:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 15:29:12 - Collect information about AirVPN completed . 2020.05.23 16:26:28 - Above log line repeated 1 times more . 2020.05.23 16:26:28 - Renewing TLS key . 2020.05.23 16:26:28 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.23 16:26:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 16:26:29 - OpenVPN > VERIFY KU OK . 2020.05.23 16:26:29 - OpenVPN > Validating certificate extended key usage . 2020.05.23 16:26:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 16:26:29 - OpenVPN > VERIFY EKU OK . 2020.05.23 16:26:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 16:26:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 16:26:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 16:26:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 16:29:26 - Collect information about AirVPN completed . 2020.05.23 17:26:29 - Above log line repeated 1 times more . 2020.05.23 17:26:29 - Renewing TLS key . 2020.05.23 17:26:29 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.23 17:26:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 17:26:30 - OpenVPN > VERIFY KU OK . 2020.05.23 17:26:30 - OpenVPN > Validating certificate extended key usage . 2020.05.23 17:26:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 17:26:30 - OpenVPN > VERIFY EKU OK . 2020.05.23 17:26:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 17:26:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 17:26:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 17:26:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 17:29:39 - Collect information about AirVPN completed . 2020.05.23 18:26:30 - Above log line repeated 1 times more . 2020.05.23 18:26:30 - Renewing TLS key . 2020.05.23 18:26:30 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.23 18:26:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 18:26:31 - OpenVPN > VERIFY KU OK . 2020.05.23 18:26:31 - OpenVPN > Validating certificate extended key usage . 2020.05.23 18:26:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 18:26:31 - OpenVPN > VERIFY EKU OK . 2020.05.23 18:26:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 18:26:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 18:26:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 18:26:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 18:29:47 - Collect information about AirVPN completed . 2020.05.23 19:26:31 - Above log line repeated 1 times more . 2020.05.23 19:26:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 19:26:31 - OpenVPN > VERIFY KU OK . 2020.05.23 19:26:31 - OpenVPN > Validating certificate extended key usage . 2020.05.23 19:26:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 19:26:31 - OpenVPN > VERIFY EKU OK . 2020.05.23 19:26:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 19:26:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 19:26:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 19:26:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 19:29:47 - Collect information about AirVPN completed . 2020.05.23 20:26:32 - Above log line repeated 1 times more . 2020.05.23 20:26:32 - OpenVPN > TLS: soft reset sec=0 bytes=12602759/-1 pkts=17129/0 . 2020.05.23 20:26:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 20:26:32 - OpenVPN > VERIFY KU OK . 2020.05.23 20:26:32 - OpenVPN > Validating certificate extended key usage . 2020.05.23 20:26:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 20:26:32 - OpenVPN > VERIFY EKU OK . 2020.05.23 20:26:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 20:26:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 20:26:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 20:26:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 20:29:49 - Collect information about AirVPN completed . 2020.05.23 21:26:32 - Above log line repeated 1 times more . 2020.05.23 21:26:32 - OpenVPN > TLS: soft reset sec=0 bytes=40209129/-1 pkts=46512/0 . 2020.05.23 21:26:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 21:26:32 - OpenVPN > VERIFY KU OK . 2020.05.23 21:26:32 - OpenVPN > Validating certificate extended key usage . 2020.05.23 21:26:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 21:26:32 - OpenVPN > VERIFY EKU OK . 2020.05.23 21:26:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 21:26:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 21:26:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 21:26:33 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 21:29:49 - Collect information about AirVPN completed . 2020.05.23 22:26:32 - Above log line repeated 1 times more . 2020.05.23 22:26:32 - Renewing TLS key . 2020.05.23 22:26:32 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.23 22:26:33 - OpenVPN > TLS: soft reset sec=0 bytes=84743945/-1 pkts=90815/0 . 2020.05.23 22:26:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 22:26:33 - OpenVPN > VERIFY KU OK . 2020.05.23 22:26:33 - OpenVPN > Validating certificate extended key usage . 2020.05.23 22:26:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 22:26:33 - OpenVPN > VERIFY EKU OK . 2020.05.23 22:26:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 22:26:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 22:26:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 22:26:33 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 22:29:50 - Collect information about AirVPN completed . 2020.05.23 23:26:33 - Above log line repeated 1 times more . 2020.05.23 23:26:33 - OpenVPN > TLS: soft reset sec=0 bytes=39741593/-1 pkts=43564/0 . 2020.05.23 23:26:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.23 23:26:33 - OpenVPN > VERIFY KU OK . 2020.05.23 23:26:33 - OpenVPN > Validating certificate extended key usage . 2020.05.23 23:26:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.23 23:26:33 - OpenVPN > VERIFY EKU OK . 2020.05.23 23:26:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.23 23:26:34 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 23:26:34 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.23 23:26:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.23 23:29:49 - Collect information about AirVPN completed . 2020.05.24 00:26:33 - Above log line repeated 1 times more . 2020.05.24 00:26:33 - Renewing TLS key . 2020.05.24 00:26:33 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.24 00:26:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.24 00:26:34 - OpenVPN > VERIFY KU OK . 2020.05.24 00:26:34 - OpenVPN > Validating certificate extended key usage . 2020.05.24 00:26:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.24 00:26:34 - OpenVPN > VERIFY EKU OK . 2020.05.24 00:26:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.24 00:26:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.24 00:26:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.24 00:26:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.24 00:29:59 - Collect information about AirVPN completed . 2020.05.24 01:26:34 - Above log line repeated 1 times more . 2020.05.24 01:26:34 - OpenVPN > TLS: soft reset sec=0 bytes=1885542/-1 pkts=5124/0 . 2020.05.24 01:26:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.24 01:26:34 - OpenVPN > VERIFY KU OK . 2020.05.24 01:26:34 - OpenVPN > Validating certificate extended key usage . 2020.05.24 01:26:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.24 01:26:34 - OpenVPN > VERIFY EKU OK . 2020.05.24 01:26:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.24 01:26:34 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.24 01:26:34 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.24 01:26:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.24 01:29:59 - Collect information about AirVPN completed . 2020.05.24 02:26:34 - Above log line repeated 1 times more . 2020.05.24 02:26:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.24 02:26:34 - OpenVPN > VERIFY KU OK . 2020.05.24 02:26:34 - OpenVPN > Validating certificate extended key usage . 2020.05.24 02:26:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.24 02:26:34 - OpenVPN > VERIFY EKU OK . 2020.05.24 02:26:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.24 02:26:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.24 02:26:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.24 02:26:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.24 02:29:59 - Collect information about AirVPN completed . 2020.05.24 03:26:34 - Above log line repeated 1 times more . 2020.05.24 03:26:34 - Renewing TLS key . 2020.05.24 03:26:34 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.24 03:26:35 - OpenVPN > TLS: soft reset sec=0 bytes=2578982/-1 pkts=5912/0 . 2020.05.24 03:26:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.24 03:26:35 - OpenVPN > VERIFY KU OK . 2020.05.24 03:26:35 - OpenVPN > Validating certificate extended key usage . 2020.05.24 03:26:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.24 03:26:35 - OpenVPN > VERIFY EKU OK . 2020.05.24 03:26:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.24 03:26:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.24 03:26:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.24 03:26:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.24 03:29:59 - Collect information about AirVPN completed . 2020.05.24 04:26:35 - Above log line repeated 1 times more . 2020.05.24 04:26:35 - OpenVPN > TLS: soft reset sec=0 bytes=2683167/-1 pkts=6025/0 . 2020.05.24 04:26:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.24 04:26:35 - OpenVPN > VERIFY KU OK . 2020.05.24 04:26:35 - OpenVPN > Validating certificate extended key usage . 2020.05.24 04:26:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.24 04:26:35 - OpenVPN > VERIFY EKU OK . 2020.05.24 04:26:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.24 04:26:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.24 04:26:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.24 04:26:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.24 04:30:00 - Collect information about AirVPN completed . 2020.05.24 05:26:35 - Above log line repeated 1 times more . 2020.05.24 05:26:35 - Renewing TLS key . 2020.05.24 05:26:35 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.24 05:26:36 - OpenVPN > TLS: soft reset sec=0 bytes=2609893/-1 pkts=5922/0 . 2020.05.24 05:26:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.24 05:26:36 - OpenVPN > VERIFY KU OK . 2020.05.24 05:26:36 - OpenVPN > Validating certificate extended key usage . 2020.05.24 05:26:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.24 05:26:37 - OpenVPN > VERIFY EKU OK . 2020.05.24 05:26:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.24 05:26:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.24 05:26:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.24 05:26:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.24 05:30:01 - Collect information about AirVPN completed . 2020.05.24 06:26:36 - Above log line repeated 1 times more . 2020.05.24 06:26:36 - Renewing TLS key . 2020.05.24 06:26:36 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.24 06:26:37 - OpenVPN > TLS: soft reset sec=0 bytes=2416929/-1 pkts=5403/0 . 2020.05.24 06:26:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.24 06:26:37 - OpenVPN > VERIFY KU OK . 2020.05.24 06:26:37 - OpenVPN > Validating certificate extended key usage . 2020.05.24 06:26:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.24 06:26:37 - OpenVPN > VERIFY EKU OK . 2020.05.24 06:26:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.24 06:26:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.24 06:26:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.24 06:26:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.24 06:30:00 - Collect information about AirVPN completed . 2020.05.24 07:26:37 - Above log line repeated 1 times more . 2020.05.24 07:26:37 - OpenVPN > TLS: soft reset sec=0 bytes=1725168/-1 pkts=4570/0 . 2020.05.24 07:26:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.24 07:26:37 - OpenVPN > VERIFY KU OK . 2020.05.24 07:26:37 - OpenVPN > Validating certificate extended key usage . 2020.05.24 07:26:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.24 07:26:37 - OpenVPN > VERIFY EKU OK . 2020.05.24 07:26:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.24 07:26:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.24 07:26:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.24 07:26:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.24 07:30:00 - Collect information about AirVPN completed . 2020.05.24 08:26:37 - Above log line repeated 1 times more . 2020.05.24 08:26:37 - Renewing TLS key . 2020.05.24 08:26:37 - OpenVPN > TLS: tls_process: killed expiring key . 2020.05.24 08:26:38 - OpenVPN > TLS: soft reset sec=0 bytes=974516/-1 pkts=2863/0 . 2020.05.24 08:26:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.05.24 08:26:38 - OpenVPN > VERIFY KU OK . 2020.05.24 08:26:38 - OpenVPN > Validating certificate extended key usage . 2020.05.24 08:26:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.05.24 08:26:38 - OpenVPN > VERIFY EKU OK . 2020.05.24 08:26:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org . 2020.05.24 08:26:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.24 08:26:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.05.24 08:26:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.05.24 08:30:01 - Collect information about AirVPN completed ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "interface": "{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}", "gateway": "192.168.1.1", "metric": "25" }, { "address": "0.0.0.0\/1", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "10.28.246.1", "metric": "3" }, { "address": "10.28.246.0\/24", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "link", "metric": "259" }, { "address": "10.28.246.30", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "link", "metric": "259" }, { "address": "10.28.246.255", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "link", "metric": "259" }, { "address": "104.254.90.243", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "10.16.86.1", "metric": "4" }, { "address": "127.0.0.0\/8", "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.0.0.1", "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.255.255.255", "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "128.0.0.0\/1", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "10.28.246.1", "metric": "3" }, { "address": "184.75.223.227", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "10.28.246.1", "metric": "4" }, { "address": "184.75.223.229", "interface": "{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}", "gateway": "192.168.1.1", "metric": "25" }, { "address": "192.30.89.75", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "10.35.102.1", "metric": "4" }, { "address": "192.168.1.0\/24", "interface": "{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}", "gateway": "link", "metric": "281" }, { "address": "192.168.1.206", "interface": "{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}", "gateway": "link", "metric": "281" }, { "address": "192.168.1.255", "interface": "{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}", "gateway": "link", "metric": "281" }, { "address": "192.168.56.0\/24", "interface": "{B6318C3F-0804-4E24-8DE0-FB8EC1CCDCED}", "gateway": "link", "metric": "281" }, { "address": "192.168.56.1", "interface": "{B6318C3F-0804-4E24-8DE0-FB8EC1CCDCED}", "gateway": "link", "metric": "281" }, { "address": "192.168.56.255", "interface": "{B6318C3F-0804-4E24-8DE0-FB8EC1CCDCED}", "gateway": "link", "metric": "281" }, { "address": "224.0.0.0\/4", "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "224.0.0.0\/4", "interface": "{B6318C3F-0804-4E24-8DE0-FB8EC1CCDCED}", "gateway": "link", "metric": "281" }, { "address": "224.0.0.0\/4", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "link", "metric": "259" }, { "address": "224.0.0.0\/4", "interface": "{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}", "gateway": "link", "metric": "281" }, { "address": "255.255.255.255", "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "255.255.255.255", "interface": "{B6318C3F-0804-4E24-8DE0-FB8EC1CCDCED}", "gateway": "link", "metric": "281" }, { "address": "255.255.255.255", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "link", "metric": "259" }, { "address": "255.255.255.255", "interface": "{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}", "gateway": "link", "metric": "281" }, { "address": "::\/3", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "fe80::8", "metric": "259" }, { "address": "::1", "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "2000::\/4", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "fe80::8", "metric": "259" }, { "address": "2606:6080:1002:8:3285:30e:de43:8809", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "fde6:7a:7d20:18f6::1", "metric": "259" }, { "address": "3000::\/4", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "fe80::8", "metric": "259" }, { "address": "fc00::\/7", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "fe80::8", "metric": "259" }, { "address": "fde6:7a:7d20:18f6::\/64", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "fe80::8", "metric": "259" }, { "address": "fde6:7a:7d20:18f6::101c", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "link", "metric": "259" }, { "address": "fe80::\/64", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "link", "metric": "259" }, { "address": "fe80::\/64", "interface": "{DBEBA14D-B787-48C1-A9AF-9835BF9A2E60}", "gateway": "link", "metric": "331" }, { "address": "fe80::4f6:3b7e:47b4:225c", "interface": "{DBEBA14D-B787-48C1-A9AF-9835BF9A2E60}", "gateway": "link", "metric": "331" }, { "address": "fe80::e56b:37cf:35ee:ab34", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "link", "metric": "259" }, { "address": "ff00::\/8", "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "ff00::\/8", "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "gateway": "link", "metric": "259" }, { "address": "ff00::\/8", "interface": "{DBEBA14D-B787-48C1-A9AF-9835BF9A2E60}", "gateway": "link", "metric": "331" }, { "address": "2606:6080:1002:8:3285:30e:de43:8809", "gateway": "fde6:7a:7d20:18f6::1", "metric": "4294967295" } ], "interfaces": [ { "friendly": "Local Area Connection", "id": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "name": "Local Area Connection", "description": "TAP-Windows Adapter V9", "type": "53", "status": "Up", "bytes_received": "1622084974", "bytes_sent": "1461390460", "support_ipv4": true, "support_ipv6": true, "ips": [ "fde6:7a:7d20:18f6::101c", "fe80::e56b:37cf:35ee:ab34", "10.28.246.30" ], "gateways": [ "10.28.246.1", "10.16.86.1", "10.35.102.1", "fe80::8", "fde6:7a:7d20:18f6::1" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Ethernet", "id": "{B8212D7D-A1D7-4733-B2C3-A49916AFF0E0}", "name": "Ethernet", "description": "Intel(R) I350 Gigabit Network Connection", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.207.202" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Ethernet 3", "id": "{FE9803E3-BC08-4B13-BF9B-576BE8353D61}", "name": "Ethernet 3", "description": "QLogic BCM57810 10 Gigabit Ethernet (NDIS VBD Client) #166", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.159.168" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Ethernet 4", "id": "{2D1E9EFD-90AC-44BC-BA40-067580B1B17C}", "name": "Ethernet 4", "description": "QLogic BCM57810 10 Gigabit Ethernet (NDIS VBD Client) #167", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.3.70" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Ethernet 2", "id": "{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}", "name": "Ethernet 2", "description": "Intel(R) I350 Gigabit Network Connection #2", "type": "Ethernet", "status": "Up", "bytes_received": "13961564201", "bytes_sent": "15779728212", "support_ipv4": true, "support_ipv6": false, "ips": [ "192.168.1.206" ], "gateways": [ "192.168.1.1" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "VirtualBox Host-Only Network", "id": "{B6318C3F-0804-4E24-8DE0-FB8EC1CCDCED}", "name": "VirtualBox Host-Only Network", "description": "VirtualBox Host-Only Ethernet Adapter", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "192.168.56.1" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Mullvad", "id": "{1F4F8703-3ADF-4423-A363-3F6ABFAC4512}", "name": "Mullvad", "description": "Mullvad VPN TAP Adapter", "type": "53", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::b8c5:ba00:9923:ecea", "169.254.236.234" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "isatap.{B6318C3F-0804-4E24-8DE0-FB8EC1CCDCED}", "id": "{387F6E67-93C5-49AC-8245-AC93A836D691}", "name": "isatap.{B6318C3F-0804-4E24-8DE0-FB8EC1CCDCED}", "description": "Microsoft ISATAP Adapter", "type": "Tunnel", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": false, "support_ipv6": true, "ips": [ "fe80::5efe:192.168.56.1" ], "gateways": [], "bind": true, "dns4": null, "dns6": null }, { "friendly": "Teredo Tunneling Pseudo-Interface", "id": "{DBEBA14D-B787-48C1-A9AF-9835BF9A2E60}", "name": "Teredo Tunneling Pseudo-Interface", "description": "Teredo Tunneling Pseudo-Interface", "type": "Tunnel", "status": "Up", "bytes_received": "456", "bytes_sent": "17042", "support_ipv4": false, "support_ipv6": true, "ips": [ "fe80::4f6:3b7e:47b4:225c" ], "gateways": [], "bind": true, "dns4": null, "dns6": null }, { "friendly": "isatap.{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "id": "{3243F3C9-6791-4A72-B140-A334E3FECD17}", "name": "isatap.{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "description": "Microsoft ISATAP Adapter #2", "type": "Tunnel", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": false, "support_ipv6": true, "ips": [ "fe80::5efe:10.28.246.30" ], "gateways": [], "bind": true, "dns4": null, "dns6": null }, { "friendly": "isatap.{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}", "id": "{D85ACF4C-0B98-4743-96E3-F32A3077A929}", "name": "isatap.{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}", "description": "Microsoft ISATAP Adapter #4", "type": "Tunnel", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": false, "support_ipv6": true, "ips": [ "fe80::5efe:192.168.1.206" ], "gateways": [], "bind": true, "dns4": null, "dns6": null } ], "ipv4-default-gateway": "10.28.246.1", "ipv4-default-interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}", "ipv6-default-gateway": "fe80::8", "ipv6-default-interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}" } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : Server Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Unknown adapter Local Area Connection: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-61-92-0D-A2 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : fde6:7a:7d20:18f6::101c(Preferred) Link-local IPv6 Address . . . . . : fe80::e56b:37cf:35ee:ab34%10(Preferred) IPv4 Address. . . . . . . . . . . : 10.28.246.30(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Thursday, May 21, 2020 11:25:53 AM Lease Expires . . . . . . . . . . : Friday, May 21, 2021 11:25:50 AM Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.28.246.254 DHCPv6 IAID . . . . . . . . . . . : 771817313 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-24-73-07-C3-00-25-90-FB-A2-1D DNS Servers . . . . . . . . . . . : fde6:7a:7d20:18f6::1 10.28.246.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Intel(R) I350 Gigabit Network Connection Physical Address. . . . . . . . . : 00-25-90-FB-A2-1D DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Ethernet adapter Ethernet 3: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : QLogic BCM57810 10 Gigabit Ethernet (NDIS VBD Client) #166 Physical Address. . . . . . . . . : 00-25-90-8E-AB-7C DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Ethernet adapter Ethernet 4: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : QLogic BCM57810 10 Gigabit Ethernet (NDIS VBD Client) #167 Physical Address. . . . . . . . . : 00-25-90-8E-AB-7E DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Ethernet adapter Ethernet 2: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Intel(R) I350 Gigabit Network Connection #2 Physical Address. . . . . . . . . : 00-25-90-FB-A2-1C DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv4 Address. . . . . . . . . . . : 192.168.1.206(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Thursday, May 21, 2020 9:20:10 AM Lease Expires . . . . . . . . . . : Sunday, May 24, 2020 9:20:10 PM Default Gateway . . . . . . . . . : 192.168.1.1 DHCP Server . . . . . . . . . . . : 192.168.1.1 DNS Servers . . . . . . . . . . . : 192.168.1.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter VirtualBox Host-Only Network: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : VirtualBox Host-Only Ethernet Adapter Physical Address. . . . . . . . . : 0A-00-27-00-00-11 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes IPv4 Address. . . . . . . . . . . : 192.168.56.1(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : NetBIOS over Tcpip. . . . . . . . : Enabled Unknown adapter Mullvad: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Mullvad VPN TAP Adapter Physical Address. . . . . . . . . : 00-FF-1F-4F-87-03 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Tunnel adapter isatap.{B6318C3F-0804-4E24-8DE0-FB8EC1CCDCED}: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft ISATAP Adapter Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Tunnel adapter Teredo Tunneling Pseudo-Interface: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::4f6:3b7e:47b4:225c%21(Preferred) Default Gateway . . . . . . . . . : DHCPv6 IAID . . . . . . . . . . . : 335544320 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-24-73-07-C3-00-25-90-FB-A2-1D NetBIOS over Tcpip. . . . . . . . : Disabled Tunnel adapter isatap.{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft ISATAP Adapter #2 Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Tunnel adapter isatap.{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft ISATAP Adapter #4 Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Edited ... by Titums Quote Share this post Link to post
Titums 1 Posted ... (edited) I disabled SmartDNS and set the DNS server so the values in the Specs Page. The lock out still occurs. Here are my setting below. The IPv6 already had a dns value set, so I move it to alternate. Any ideas on how to fix this? My enabled Ethernet Connections #2 properties VPN properties Edited ... by Titums Quote Share this post Link to post
Flx 76 Posted ... Why did you set DNS1 to 10.4.0.1 on your TAP-adapter? That is for your main adapter Ethernet 2 not the TAP-adapter as I see you have correctly set. What is the TAP adapter version? If 9.21 update it. Grab the 9.24.x version and install that one from here-->https://build.openvpn.net/downloads/snapshots/ Quote Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
Titums 1 Posted ... I'll remove it from the TAP, tap is ver 9.24. Will see what happens in a few days. Quote Share this post Link to post
Flx 76 Posted ... 3 hours ago, Titums said: I'll remove it from the TAP, tap is ver 9.24. Will see what happens in a few days. See if this will help---->>> Quote Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
Titums 1 Posted ... Got this installed and it seems to be working. Will keep an eye on it and check in later. Quote Share this post Link to post
Titums 1 Posted ... The driver update/change has resolved this issue. It's been functional for almost a week now. thanks for you help. 1 Flx reacted to this Quote Share this post Link to post