Jump to content
Not connected, Your IP: 3.231.220.225
Titums

Internet locks up over time, requires reboot.

Recommended Posts

I have Eddie 2.18.9, on windows server 2016.  I got this vpn so I could have port forwarding on my torrents; so the vpn is connected 24/7.  It's running with default settings and network lock enabled.  

After a few days of running my browser can no longer connect to the internet.  It just say 'no internet' with the chrome dinosaur, but torrents still work.  Sometimes pages I already had open will still refresh but new pages fail.  Disconnecting, turning off network lock, and closing Eddie do not resolve the issue.  Only thing I've found that resolves the issue is rebooting the computer.  Then it's good few a few days till it happens again.

Any help would be great, thanks.

Share this post


Link to post

I suspect it's something with DNS. It might get reset at some point, but since NetLock does not allow detected DNS, the browser can't connect with domain names after the reset but the torrent client, which is using IP addresses, still can.
You could let it run as usual and when it happens, in Eddie > Logs, click the lifebelt icon and paste or upload the output here. That way we can confirm it. Or you simply set the DNS server of your primary network interface to the addresses on Specs page. Also, disable SmartDNS to prevent leaks if you have multiple physical network interfaces.


» I am not an AirVPN team member. All opinions are my own and are not to be considered official. Only the AirVPN Staff account should be viewed as such.

» The forums is a place where you can ask questions to the community. You are not entitled to guaranteed answer times. Answer quality may vary, too. If you need professional support, please create tickets.

» If you're new, take some time to read LZ1's New User Guide to AirVPN. On questions, use the search function first. On errors, search for the error message instead.

» If you choose to create a new thread, keep in mind that we don't know your setup. Give info about it. Never forget the OpenVPN logs or, for Eddie, the support file (Logs > lifebelt icon).

» The community kindly asks you to not set up Tor exit relays when connected to AirVPN. Their IP addresses are subject to restrictions and these are relayed to all users of the affected servers.

 

» Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, chances are you will be unique amond the mass again.

Share this post


Link to post

>Or you simply set the DNS server of your primary network interface to the addresses on Specs page. 

If I do this, that means that DNS won't work if I'm not connected to the VPN right?

I'll post the logs Next time it happens, it's been connected for 2 days now, so it'll probably be in the next day or two.

Share this post


Link to post
10 minutes ago, Titums said:

If I do this, that means that DNS won't work if I'm not connected to the VPN right?


No, it won't. Neat side effect is that most programs will think you don't have an internet connection, sort of like an unreliable Network Lock :)

» I am not an AirVPN team member. All opinions are my own and are not to be considered official. Only the AirVPN Staff account should be viewed as such.

» The forums is a place where you can ask questions to the community. You are not entitled to guaranteed answer times. Answer quality may vary, too. If you need professional support, please create tickets.

» If you're new, take some time to read LZ1's New User Guide to AirVPN. On questions, use the search function first. On errors, search for the error message instead.

» If you choose to create a new thread, keep in mind that we don't know your setup. Give info about it. Never forget the OpenVPN logs or, for Eddie, the support file (Logs > lifebelt icon).

» The community kindly asks you to not set up Tor exit relays when connected to AirVPN. Their IP addresses are subject to restrictions and these are relayed to all users of the affected servers.

 

» Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, chances are you will be unique amond the mass again.

Share this post


Link to post
On 5/23/2020 at 3:24 AM, giganerd said:

I suspect it's something with DNS. It might get reset at some point,

Exactly that started 2-3 days ago. By what magic I still don't know. On reconnect nothing would work(webpages etc.)
Exact date: May 21, 2020

Share this post


Link to post
Posted ... (edited)

Here is the log.
It would be nice to have a solution to this that doesn't break browsing while disconnected.


Eddie System/Environment Report - 5/24/2020 - 3:12 PM UTC

Eddie version: 2.18.9
Eddie OS build: windows_x64
Eddie architecture: x64
OS type: Windows
OS name: Windows Server 2016 Standard
OS version: Microsoft Windows NT 10.0.14393.0
OS architecture: x64
Mono /.Net Framework: v4.0.30319
TUN driver: 0901: 9.24.2; wintun: 0.6
OpenVPN: 2.4.8 - OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
Hummingbird:  ()
SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
curl: 7.68.0 (C:\Program Files\AirVPN\curl.exe)
Profile path: C:\Users\dsmith\AppData\Local\Eddie\default.profile
Data path: C:\Users\dsmith\AppData\Local\Eddie
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\Eddie-UI.exe
Command line arguments: (1 args) path="home"
Network Lock Active: Yes, Windows Filtering Platform
Connected to VPN: Yes, Saiph
Detected DNS: 10.28.246.1, 192.168.1.1, fde6:7a:7d20:18f6::1
Test DNS IPv4: Failed
Test DNS IPv6: Failed
Test Ping IPv4: 140 ms
Test Ping IPv6: 140 ms
Test HTTP IPv4: Ok
Test HTTP IPv6: Ok
Test HTTPS: Error:curl: (6) Could not resolve host: eddie.website
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
netlock: True

----------------------------
Logs:

. 2020.05.21 10:16:47 - Eddie version: 2.18.9 / windows_x64, System: Windows, Name: Windows Server 2016 Standard, Version: Microsoft Windows NT 10.0.14393.0, Mono/.Net: v4.0.30319
. 2020.05.21 10:16:47 - Command line arguments (1): path="home"
. 2020.05.21 10:16:48 - Raise system privileges
. 2020.05.21 10:16:51 - Profile path: C:\Users\dsmith\AppData\Local\Eddie\default.profile
. 2020.05.21 10:16:52 - Reading options from C:\Users\dsmith\AppData\Local\Eddie\default.profile
. 2020.05.21 10:16:57 - Tun Driver - 0901: 9.24.2; wintun: 0.6
. 2020.05.21 10:16:57 - OpenVPN - Version: 2.4.8 - OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2020.05.21 10:16:57 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2020.05.21 10:16:57 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2020.05.21 10:16:57 - curl - Version: 7.68.0 (C:\Program Files\AirVPN\curl.exe)
. 2020.05.21 10:16:57 - Recovery. Unexpected crash?
. 2020.05.21 10:16:57 - Routes, removed an existing route, 184.75.221.195 for gateway 10.31.118.1
. 2020.05.21 10:16:58 - Routes, removed an existing route, 2606:6080:1001:15:45d:2b31:f931:2e2 for gateway fde6:7a:7d20:1b76::1
. 2020.05.21 10:16:58 - Routes, added a new route, 104.254.90.243 for gateway 10.16.86.1
. 2020.05.21 10:16:58 - Routes, added a new route, 192.30.89.75 for gateway 10.35.102.1
! 2020.05.21 10:16:58 - Activation of Network Lock - Windows Filtering Platform
I 2020.05.21 10:16:59 - Ready
. 2020.05.21 10:17:00 - Collect information about AirVPN completed
! 2020.05.21 10:18:05 - Deactivation of Network Lock
. 2020.05.21 10:47:02 - Collect information about AirVPN completed
. 2020.05.21 11:25:48 - Above log line repeated 1 times more
! 2020.05.21 11:25:48 - Activation of Network Lock - Windows Filtering Platform
I 2020.05.21 11:25:50 - Session starting.
I 2020.05.21 11:25:50 - Checking authorization ...
! 2020.05.21 11:25:51 - Connecting to Saiph (Canada, Toronto, Ontario)
. 2020.05.21 11:25:51 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
. 2020.05.21 11:25:51 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.05.21 11:25:51 - OpenVPN > library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10
. 2020.05.21 11:25:51 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.05.21 11:25:51 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.05.21 11:25:51 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.05.21 11:25:51 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.05.21 11:25:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.229:443
. 2020.05.21 11:25:51 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.05.21 11:25:51 - OpenVPN > UDP link local: (not bound)
. 2020.05.21 11:25:51 - OpenVPN > UDP link remote: [AF_INET]184.75.223.229:443
. 2020.05.21 11:25:51 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.229:443, sid=ab5181b8 658ddede
. 2020.05.21 11:25:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.21 11:25:51 - OpenVPN > VERIFY KU OK
. 2020.05.21 11:25:51 - OpenVPN > Validating certificate extended key usage
. 2020.05.21 11:25:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.21 11:25:51 - OpenVPN > VERIFY EKU OK
. 2020.05.21 11:25:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.21 11:25:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.21 11:25:52 - OpenVPN > [Saiph] Peer Connection Initiated with [AF_INET]184.75.223.229:443
. 2020.05.21 11:25:53 - OpenVPN > SENT CONTROL [Saiph]: 'PUSH_REQUEST' (status=1)
. 2020.05.21 11:25:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.246.1,dhcp-option DNS6 fde6:7a:7d20:18f6::1,tun-ipv6,route-gateway 10.28.246.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:18f6::101c/64 fde6:7a:7d20:18f6::1,ifconfig 10.28.246.30 255.255.255.0,peer-id 9,cipher AES-256-GCM'
. 2020.05.21 11:25:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.05.21 11:25:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.05.21 11:25:53 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.05.21 11:25:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.05.21 11:25:53 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.05.21 11:25:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.05.21 11:25:53 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.05.21 11:25:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.05.21 11:25:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.05.21 11:25:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.05.21 11:25:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 11:25:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 11:25:53 - OpenVPN > interactive service msg_channel=0
. 2020.05.21 11:25:53 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=6 HWADDR=00:25:90:fb:a2:1c
. 2020.05.21 11:25:53 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.05.21 11:25:53 - OpenVPN > GetBestInterfaceEx() returned if=21
. 2020.05.21 11:25:53 - OpenVPN > GDG6: II=21 DP=::/0 NH=::
. 2020.05.21 11:25:53 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0
. 2020.05.21 11:25:53 - OpenVPN > ROUTE6_GATEWAY :: ON_LINK I=21
. 2020.05.21 11:25:53 - OpenVPN > open_tun
. 2020.05.21 11:25:53 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}.tap
. 2020.05.21 11:25:53 - OpenVPN > TAP-Windows Driver Version 9.24
. 2020.05.21 11:25:53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.28.246.0/10.28.246.30/255.255.255.0 [SUCCEEDED]
. 2020.05.21 11:25:53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.28.246.30/255.255.255.0 on interface {61920DA2-D3D6-4DD8-97F3-4B7AB6295376} [DHCP-serv: 10.28.246.254, lease-time: 31536000]
. 2020.05.21 11:25:53 - OpenVPN > Successful ARP Flush on interface [10] {61920DA2-D3D6-4DD8-97F3-4B7AB6295376}
. 2020.05.21 11:25:54 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=10 fde6:7a:7d20:18f6::101c store=active
. 2020.05.21 11:25:56 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns Local Area Connection static fde6:7a:7d20:18f6::1 validate=no
. 2020.05.21 11:25:56 - OpenVPN > add_route_ipv6(fde6:7a:7d20:18f6::/64 -> fde6:7a:7d20:18f6::101c metric 0) dev Local Area Connection
. 2020.05.21 11:25:56 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:18f6::/64 interface=10 fe80::8 store=active
. 2020.05.21 11:25:56 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2020.05.21 11:26:01 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.05.21 11:26:01 - OpenVPN > C:\Windows\system32\route.exe ADD 184.75.223.229 MASK 255.255.255.255 192.168.1.1
. 2020.05.21 11:26:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.05.21 11:26:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.21 11:26:01 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.28.246.1
. 2020.05.21 11:26:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2020.05.21 11:26:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.21 11:26:01 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.28.246.1
. 2020.05.21 11:26:01 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=6 and dwForwardType=4
. 2020.05.21 11:26:01 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.21 11:26:01 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:18f6::1 metric -1) dev Local Area Connection
. 2020.05.21 11:26:01 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route ::/3 interface=10 fe80::8 store=active
. 2020.05.21 11:26:01 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2020.05.21 11:26:01 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:18f6::1 metric -1) dev Local Area Connection
. 2020.05.21 11:26:01 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 2000::/4 interface=10 fe80::8 store=active
. 2020.05.21 11:26:01 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2020.05.21 11:26:01 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:18f6::1 metric -1) dev Local Area Connection
. 2020.05.21 11:26:01 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 3000::/4 interface=10 fe80::8 store=active
. 2020.05.21 11:26:01 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2020.05.21 11:26:01 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:18f6::1 metric -1) dev Local Area Connection
. 2020.05.21 11:26:01 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fc00::/7 interface=10 fe80::8 store=active
. 2020.05.21 11:26:01 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2020.05.21 11:26:01 - Interface Local Area Connection metric changed from 6 to 3, layer IPv4
. 2020.05.21 11:26:01 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6
. 2020.05.21 11:26:01 - DNS leak protection with packet filtering enabled.
. 2020.05.21 11:26:02 - Routes, added a new route, 184.75.223.227 for gateway 10.28.246.1
. 2020.05.21 11:26:02 - Routes, added a new route, 2606:6080:1002:8:3285:30e:de43:8809 for gateway fde6:7a:7d20:18f6::1
. 2020.05.21 11:26:02 - Flushing DNS
I 2020.05.21 11:26:02 - Checking route IPv4
I 2020.05.21 11:26:02 - Checking route IPv6
I 2020.05.21 11:26:06 - Checking DNS
! 2020.05.21 11:26:06 - Connected.
. 2020.05.21 11:26:06 - OpenVPN > Initialization Sequence Completed
. 2020.05.21 11:47:12 - Collect information about AirVPN completed
. 2020.05.21 12:25:52 - Above log line repeated 1 times more
. 2020.05.21 12:25:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.21 12:25:52 - OpenVPN > VERIFY KU OK
. 2020.05.21 12:25:52 - OpenVPN > Validating certificate extended key usage
. 2020.05.21 12:25:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.21 12:25:52 - OpenVPN > VERIFY EKU OK
. 2020.05.21 12:25:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.21 12:25:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 12:25:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 12:25:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.21 12:47:25 - Collect information about AirVPN completed
. 2020.05.21 13:25:52 - Above log line repeated 1 times more
. 2020.05.21 13:25:52 - Renewing TLS key
. 2020.05.21 13:25:52 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.21 13:25:54 - OpenVPN > TLS: soft reset sec=-1 bytes=4583158/-1 pkts=9110/0
. 2020.05.21 13:25:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.21 13:25:54 - OpenVPN > VERIFY KU OK
. 2020.05.21 13:25:54 - OpenVPN > Validating certificate extended key usage
. 2020.05.21 13:25:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.21 13:25:54 - OpenVPN > VERIFY EKU OK
. 2020.05.21 13:25:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.21 13:25:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 13:25:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 13:25:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.21 13:47:37 - Collect information about AirVPN completed
. 2020.05.21 14:25:54 - Above log line repeated 1 times more
. 2020.05.21 14:25:54 - OpenVPN > TLS: soft reset sec=0 bytes=2018215/-1 pkts=5437/0
. 2020.05.21 14:25:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.21 14:25:54 - OpenVPN > VERIFY KU OK
. 2020.05.21 14:25:54 - OpenVPN > Validating certificate extended key usage
. 2020.05.21 14:25:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.21 14:25:54 - OpenVPN > VERIFY EKU OK
. 2020.05.21 14:25:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.21 14:25:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 14:25:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 14:25:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.21 14:47:50 - Collect information about AirVPN completed
. 2020.05.21 15:25:54 - Above log line repeated 1 times more
. 2020.05.21 15:25:54 - Renewing TLS key
. 2020.05.21 15:25:54 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.21 15:25:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.21 15:25:55 - OpenVPN > VERIFY KU OK
. 2020.05.21 15:25:55 - OpenVPN > Validating certificate extended key usage
. 2020.05.21 15:25:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.21 15:25:55 - OpenVPN > VERIFY EKU OK
. 2020.05.21 15:25:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.21 15:25:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 15:25:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 15:25:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.21 15:48:05 - Collect information about AirVPN completed
. 2020.05.21 16:25:55 - Above log line repeated 1 times more
. 2020.05.21 16:25:55 - Renewing TLS key
. 2020.05.21 16:25:55 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.21 16:25:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.21 16:25:56 - OpenVPN > VERIFY KU OK
. 2020.05.21 16:25:56 - OpenVPN > Validating certificate extended key usage
. 2020.05.21 16:25:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.21 16:25:56 - OpenVPN > VERIFY EKU OK
. 2020.05.21 16:25:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.21 16:25:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 16:25:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 16:25:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.21 16:48:19 - Collect information about AirVPN completed
. 2020.05.21 17:25:56 - Above log line repeated 1 times more
. 2020.05.21 17:25:56 - OpenVPN > TLS: soft reset sec=0 bytes=9527825/-1 pkts=13558/0
. 2020.05.21 17:25:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.21 17:25:56 - OpenVPN > VERIFY KU OK
. 2020.05.21 17:25:56 - OpenVPN > Validating certificate extended key usage
. 2020.05.21 17:25:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.21 17:25:56 - OpenVPN > VERIFY EKU OK
. 2020.05.21 17:25:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.21 17:25:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 17:25:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 17:25:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.21 17:48:32 - Collect information about AirVPN completed
. 2020.05.21 18:25:56 - Above log line repeated 1 times more
. 2020.05.21 18:25:56 - Renewing TLS key
. 2020.05.21 18:25:56 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.21 18:25:57 - OpenVPN > TLS: soft reset sec=0 bytes=8874388/-1 pkts=12618/0
. 2020.05.21 18:25:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.21 18:25:57 - OpenVPN > VERIFY KU OK
. 2020.05.21 18:25:57 - OpenVPN > Validating certificate extended key usage
. 2020.05.21 18:25:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.21 18:25:57 - OpenVPN > VERIFY EKU OK
. 2020.05.21 18:25:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.21 18:25:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 18:25:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 18:25:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.21 18:48:46 - Collect information about AirVPN completed
. 2020.05.21 19:25:58 - Above log line repeated 1 times more
. 2020.05.21 19:25:58 - Renewing TLS key
. 2020.05.21 19:25:58 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.21 19:25:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.21 19:25:58 - OpenVPN > VERIFY KU OK
. 2020.05.21 19:25:58 - OpenVPN > Validating certificate extended key usage
. 2020.05.21 19:25:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.21 19:25:58 - OpenVPN > VERIFY EKU OK
. 2020.05.21 19:25:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.21 19:25:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 19:25:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 19:25:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.21 19:48:59 - Collect information about AirVPN completed
. 2020.05.21 20:25:58 - Above log line repeated 1 times more
. 2020.05.21 20:25:58 - Renewing TLS key
. 2020.05.21 20:25:58 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.21 20:25:59 - OpenVPN > TLS: soft reset sec=0 bytes=3665348/-1 pkts=6906/0
. 2020.05.21 20:25:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.21 20:25:59 - OpenVPN > VERIFY KU OK
. 2020.05.21 20:25:59 - OpenVPN > Validating certificate extended key usage
. 2020.05.21 20:25:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.21 20:25:59 - OpenVPN > VERIFY EKU OK
. 2020.05.21 20:25:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.21 20:26:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 20:26:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 20:26:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.21 20:49:13 - Collect information about AirVPN completed
. 2020.05.21 21:25:59 - Above log line repeated 1 times more
. 2020.05.21 21:25:59 - Renewing TLS key
. 2020.05.21 21:25:59 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.21 21:26:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.21 21:26:00 - OpenVPN > VERIFY KU OK
. 2020.05.21 21:26:00 - OpenVPN > Validating certificate extended key usage
. 2020.05.21 21:26:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.21 21:26:00 - OpenVPN > VERIFY EKU OK
. 2020.05.21 21:26:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.21 21:26:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 21:26:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 21:26:01 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.21 21:49:26 - Collect information about AirVPN completed
. 2020.05.21 22:26:00 - Above log line repeated 1 times more
. 2020.05.21 22:26:00 - Renewing TLS key
. 2020.05.21 22:26:00 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.21 22:26:01 - OpenVPN > TLS: soft reset sec=0 bytes=9496612/-1 pkts=14493/0
. 2020.05.21 22:26:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.21 22:26:01 - OpenVPN > VERIFY KU OK
. 2020.05.21 22:26:01 - OpenVPN > Validating certificate extended key usage
. 2020.05.21 22:26:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.21 22:26:01 - OpenVPN > VERIFY EKU OK
. 2020.05.21 22:26:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.21 22:26:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 22:26:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 22:26:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.21 22:49:40 - Collect information about AirVPN completed
. 2020.05.21 23:26:01 - Above log line repeated 1 times more
. 2020.05.21 23:26:01 - Renewing TLS key
. 2020.05.21 23:26:01 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.21 23:26:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.21 23:26:02 - OpenVPN > VERIFY KU OK
. 2020.05.21 23:26:02 - OpenVPN > Validating certificate extended key usage
. 2020.05.21 23:26:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.21 23:26:02 - OpenVPN > VERIFY EKU OK
. 2020.05.21 23:26:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.21 23:26:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 23:26:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.21 23:26:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.21 23:49:54 - Collect information about AirVPN completed
. 2020.05.22 00:26:02 - Above log line repeated 1 times more
. 2020.05.22 00:26:02 - OpenVPN > TLS: soft reset sec=0 bytes=3539064/-1 pkts=6955/0
. 2020.05.22 00:26:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 00:26:02 - OpenVPN > VERIFY KU OK
. 2020.05.22 00:26:02 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 00:26:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 00:26:02 - OpenVPN > VERIFY EKU OK
. 2020.05.22 00:26:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 00:26:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 00:26:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 00:26:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 00:50:08 - Collect information about AirVPN completed
. 2020.05.22 01:26:02 - Above log line repeated 1 times more
. 2020.05.22 01:26:02 - OpenVPN > TLS: soft reset sec=0 bytes=6934550/-1 pkts=11075/0
. 2020.05.22 01:26:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 01:26:02 - OpenVPN > VERIFY KU OK
. 2020.05.22 01:26:02 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 01:26:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 01:26:02 - OpenVPN > VERIFY EKU OK
. 2020.05.22 01:26:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 01:26:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 01:26:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 01:26:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 01:50:22 - Collect information about AirVPN completed
. 2020.05.22 02:26:02 - Above log line repeated 1 times more
. 2020.05.22 02:26:02 - Renewing TLS key
. 2020.05.22 02:26:02 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.22 02:26:03 - OpenVPN > TLS: soft reset sec=0 bytes=17410122/-1 pkts=24218/0
. 2020.05.22 02:26:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 02:26:03 - OpenVPN > VERIFY KU OK
. 2020.05.22 02:26:03 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 02:26:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 02:26:03 - OpenVPN > VERIFY EKU OK
. 2020.05.22 02:26:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 02:26:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 02:26:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 02:26:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 02:50:36 - Collect information about AirVPN completed
. 2020.05.22 03:26:03 - Above log line repeated 1 times more
. 2020.05.22 03:26:03 - Renewing TLS key
. 2020.05.22 03:26:03 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.22 03:26:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 03:26:04 - OpenVPN > VERIFY KU OK
. 2020.05.22 03:26:04 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 03:26:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 03:26:04 - OpenVPN > VERIFY EKU OK
. 2020.05.22 03:26:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 03:26:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 03:26:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 03:26:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 03:50:49 - Collect information about AirVPN completed
. 2020.05.22 04:26:04 - Above log line repeated 1 times more
. 2020.05.22 04:26:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 04:26:04 - OpenVPN > VERIFY KU OK
. 2020.05.22 04:26:04 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 04:26:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 04:26:04 - OpenVPN > VERIFY EKU OK
. 2020.05.22 04:26:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 04:26:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 04:26:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 04:26:04 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 04:51:02 - Collect information about AirVPN completed
. 2020.05.22 05:26:04 - Above log line repeated 1 times more
. 2020.05.22 05:26:04 - OpenVPN > TLS: soft reset sec=0 bytes=16547315/-1 pkts=21129/0
. 2020.05.22 05:26:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 05:26:04 - OpenVPN > VERIFY KU OK
. 2020.05.22 05:26:04 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 05:26:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 05:26:04 - OpenVPN > VERIFY EKU OK
. 2020.05.22 05:26:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 05:26:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 05:26:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 05:26:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 05:51:16 - Collect information about AirVPN completed
. 2020.05.22 06:26:05 - Above log line repeated 1 times more
. 2020.05.22 06:26:05 - OpenVPN > TLS: soft reset sec=0 bytes=4915261/-1 pkts=8874/0
. 2020.05.22 06:26:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 06:26:05 - OpenVPN > VERIFY KU OK
. 2020.05.22 06:26:05 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 06:26:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 06:26:05 - OpenVPN > VERIFY EKU OK
. 2020.05.22 06:26:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 06:26:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 06:26:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 06:26:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 06:51:29 - Collect information about AirVPN completed
. 2020.05.22 07:26:05 - Above log line repeated 1 times more
. 2020.05.22 07:26:05 - OpenVPN > TLS: soft reset sec=0 bytes=2141809/-1 pkts=5837/0
. 2020.05.22 07:26:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 07:26:05 - OpenVPN > VERIFY KU OK
. 2020.05.22 07:26:05 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 07:26:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 07:26:05 - OpenVPN > VERIFY EKU OK
. 2020.05.22 07:26:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 07:26:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 07:26:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 07:26:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 07:51:43 - Collect information about AirVPN completed
. 2020.05.22 08:26:05 - Above log line repeated 1 times more
. 2020.05.22 08:26:05 - Renewing TLS key
. 2020.05.22 08:26:05 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.22 08:26:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 08:26:06 - OpenVPN > VERIFY KU OK
. 2020.05.22 08:26:06 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 08:26:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 08:26:06 - OpenVPN > VERIFY EKU OK
. 2020.05.22 08:26:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 08:26:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 08:26:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 08:26:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 08:51:56 - Collect information about AirVPN completed
. 2020.05.22 09:26:06 - Above log line repeated 1 times more
. 2020.05.22 09:26:06 - Renewing TLS key
. 2020.05.22 09:26:06 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.22 09:26:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 09:26:07 - OpenVPN > VERIFY KU OK
. 2020.05.22 09:26:07 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 09:26:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 09:26:07 - OpenVPN > VERIFY EKU OK
. 2020.05.22 09:26:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 09:26:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 09:26:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 09:26:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 09:52:11 - Collect information about AirVPN completed
. 2020.05.22 10:26:07 - Above log line repeated 1 times more
. 2020.05.22 10:26:07 - Renewing TLS key
. 2020.05.22 10:26:07 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.22 10:26:08 - OpenVPN > TLS: soft reset sec=0 bytes=68845925/-1 pkts=92098/0
. 2020.05.22 10:26:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 10:26:08 - OpenVPN > VERIFY KU OK
. 2020.05.22 10:26:08 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 10:26:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 10:26:08 - OpenVPN > VERIFY EKU OK
. 2020.05.22 10:26:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 10:26:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 10:26:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 10:26:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 10:52:25 - Collect information about AirVPN completed
. 2020.05.22 11:26:08 - Above log line repeated 1 times more
. 2020.05.22 11:26:08 - Renewing TLS key
. 2020.05.22 11:26:08 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.22 11:26:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 11:26:09 - OpenVPN > VERIFY KU OK
. 2020.05.22 11:26:09 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 11:26:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 11:26:09 - OpenVPN > VERIFY EKU OK
. 2020.05.22 11:26:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 11:26:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 11:26:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 11:26:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 11:52:38 - Collect information about AirVPN completed
. 2020.05.22 12:26:09 - Above log line repeated 1 times more
. 2020.05.22 12:26:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 12:26:09 - OpenVPN > VERIFY KU OK
. 2020.05.22 12:26:09 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 12:26:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 12:26:09 - OpenVPN > VERIFY EKU OK
. 2020.05.22 12:26:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 12:26:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 12:26:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 12:26:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 12:52:52 - Collect information about AirVPN completed
. 2020.05.22 13:26:09 - Above log line repeated 1 times more
. 2020.05.22 13:26:09 - OpenVPN > TLS: soft reset sec=0 bytes=550200551/-1 pkts=598843/0
. 2020.05.22 13:26:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 13:26:09 - OpenVPN > VERIFY KU OK
. 2020.05.22 13:26:09 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 13:26:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 13:26:09 - OpenVPN > VERIFY EKU OK
. 2020.05.22 13:26:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 13:26:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 13:26:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 13:26:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 13:53:06 - Collect information about AirVPN completed
. 2020.05.22 14:26:09 - Above log line repeated 1 times more
. 2020.05.22 14:26:09 - Renewing TLS key
. 2020.05.22 14:26:09 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.22 14:26:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 14:26:10 - OpenVPN > VERIFY KU OK
. 2020.05.22 14:26:10 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 14:26:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 14:26:10 - OpenVPN > VERIFY EKU OK
. 2020.05.22 14:26:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 14:26:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 14:26:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 14:26:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 14:53:14 - Collect information about AirVPN completed
. 2020.05.22 15:26:10 - Above log line repeated 1 times more
. 2020.05.22 15:26:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 15:26:10 - OpenVPN > VERIFY KU OK
. 2020.05.22 15:26:10 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 15:26:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 15:26:10 - OpenVPN > VERIFY EKU OK
. 2020.05.22 15:26:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 15:26:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 15:26:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 15:26:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 15:53:24 - Collect information about AirVPN completed
. 2020.05.22 16:26:10 - Above log line repeated 1 times more
. 2020.05.22 16:26:10 - OpenVPN > TLS: soft reset sec=0 bytes=42192701/-1 pkts=70497/0
. 2020.05.22 16:26:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 16:26:10 - OpenVPN > VERIFY KU OK
. 2020.05.22 16:26:10 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 16:26:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 16:26:10 - OpenVPN > VERIFY EKU OK
. 2020.05.22 16:26:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 16:26:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 16:26:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 16:26:11 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 16:53:31 - Collect information about AirVPN completed
. 2020.05.22 17:26:10 - Above log line repeated 1 times more
. 2020.05.22 17:26:10 - Renewing TLS key
. 2020.05.22 17:26:10 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.22 17:26:11 - OpenVPN > TLS: soft reset sec=0 bytes=6678601/-1 pkts=13685/0
. 2020.05.22 17:26:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 17:26:11 - OpenVPN > VERIFY KU OK
. 2020.05.22 17:26:11 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 17:26:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 17:26:11 - OpenVPN > VERIFY EKU OK
. 2020.05.22 17:26:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 17:26:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 17:26:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 17:26:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 17:53:47 - Collect information about AirVPN completed
. 2020.05.22 18:26:12 - Above log line repeated 1 times more
. 2020.05.22 18:26:12 - Renewing TLS key
. 2020.05.22 18:26:12 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.22 18:26:12 - OpenVPN > TLS: soft reset sec=0 bytes=11629770/-1 pkts=17422/0
. 2020.05.22 18:26:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 18:26:12 - OpenVPN > VERIFY KU OK
. 2020.05.22 18:26:12 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 18:26:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 18:26:12 - OpenVPN > VERIFY EKU OK
. 2020.05.22 18:26:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 18:26:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 18:26:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 18:26:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 18:54:03 - Collect information about AirVPN completed
. 2020.05.22 19:26:12 - Above log line repeated 1 times more
. 2020.05.22 19:26:12 - OpenVPN > TLS: soft reset sec=0 bytes=3699542/-1 pkts=8513/0
. 2020.05.22 19:26:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 19:26:12 - OpenVPN > VERIFY KU OK
. 2020.05.22 19:26:12 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 19:26:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 19:26:12 - OpenVPN > VERIFY EKU OK
. 2020.05.22 19:26:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 19:26:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 19:26:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 19:26:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 19:54:19 - Collect information about AirVPN completed
. 2020.05.22 20:26:12 - Above log line repeated 1 times more
. 2020.05.22 20:26:12 - Renewing TLS key
. 2020.05.22 20:26:12 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.22 20:26:13 - OpenVPN > TLS: soft reset sec=0 bytes=10692877/-1 pkts=16552/0
. 2020.05.22 20:26:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 20:26:13 - OpenVPN > VERIFY KU OK
. 2020.05.22 20:26:13 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 20:26:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 20:26:13 - OpenVPN > VERIFY EKU OK
. 2020.05.22 20:26:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 20:26:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 20:26:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 20:26:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 20:54:35 - Collect information about AirVPN completed
. 2020.05.22 21:26:14 - Above log line repeated 1 times more
. 2020.05.22 21:26:14 - OpenVPN > TLS: soft reset sec=-1 bytes=116283133/-1 pkts=124514/0
. 2020.05.22 21:26:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 21:26:14 - OpenVPN > VERIFY KU OK
. 2020.05.22 21:26:14 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 21:26:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 21:26:14 - OpenVPN > VERIFY EKU OK
. 2020.05.22 21:26:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 21:26:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 21:26:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 21:26:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 21:54:50 - Collect information about AirVPN completed
. 2020.05.22 22:26:14 - Above log line repeated 1 times more
. 2020.05.22 22:26:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 22:26:14 - OpenVPN > VERIFY KU OK
. 2020.05.22 22:26:14 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 22:26:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 22:26:14 - OpenVPN > VERIFY EKU OK
. 2020.05.22 22:26:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 22:26:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 22:26:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 22:26:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 22:55:06 - Collect information about AirVPN completed
. 2020.05.22 23:26:14 - Above log line repeated 1 times more
. 2020.05.22 23:26:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.22 23:26:14 - OpenVPN > VERIFY KU OK
. 2020.05.22 23:26:14 - OpenVPN > Validating certificate extended key usage
. 2020.05.22 23:26:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.22 23:26:14 - OpenVPN > VERIFY EKU OK
. 2020.05.22 23:26:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.22 23:26:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 23:26:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.22 23:26:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.22 23:55:20 - Collect information about AirVPN completed
. 2020.05.23 00:26:14 - Above log line repeated 1 times more
. 2020.05.23 00:26:14 - Renewing TLS key
. 2020.05.23 00:26:14 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.23 00:26:15 - OpenVPN > TLS: soft reset sec=0 bytes=196893255/-1 pkts=215645/0
. 2020.05.23 00:26:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 00:26:15 - OpenVPN > VERIFY KU OK
. 2020.05.23 00:26:15 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 00:26:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 00:26:15 - OpenVPN > VERIFY EKU OK
. 2020.05.23 00:26:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 00:26:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 00:26:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 00:26:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 00:55:36 - Collect information about AirVPN completed
. 2020.05.23 01:26:15 - Above log line repeated 1 times more
. 2020.05.23 01:26:15 - Renewing TLS key
. 2020.05.23 01:26:15 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.23 01:26:16 - OpenVPN > TLS: soft reset sec=0 bytes=2609204/-1 pkts=7099/0
. 2020.05.23 01:26:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 01:26:16 - OpenVPN > VERIFY KU OK
. 2020.05.23 01:26:16 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 01:26:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 01:26:16 - OpenVPN > VERIFY EKU OK
. 2020.05.23 01:26:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 01:26:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 01:26:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 01:26:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 01:55:51 - Collect information about AirVPN completed
. 2020.05.23 02:26:16 - Above log line repeated 1 times more
. 2020.05.23 02:26:16 - Renewing TLS key
. 2020.05.23 02:26:16 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.23 02:26:17 - OpenVPN > TLS: soft reset sec=0 bytes=3854122/-1 pkts=8649/0
. 2020.05.23 02:26:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 02:26:17 - OpenVPN > VERIFY KU OK
. 2020.05.23 02:26:17 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 02:26:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 02:26:17 - OpenVPN > VERIFY EKU OK
. 2020.05.23 02:26:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 02:26:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 02:26:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 02:26:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 02:56:06 - Collect information about AirVPN completed
. 2020.05.23 03:26:17 - Above log line repeated 1 times more
. 2020.05.23 03:26:17 - Renewing TLS key
. 2020.05.23 03:26:17 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.23 03:26:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 03:26:18 - OpenVPN > VERIFY KU OK
. 2020.05.23 03:26:18 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 03:26:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 03:26:18 - OpenVPN > VERIFY EKU OK
. 2020.05.23 03:26:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 03:26:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 03:26:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 03:26:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 03:56:23 - Collect information about AirVPN completed
. 2020.05.23 04:26:18 - Renewing TLS key
. 2020.05.23 04:26:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.23 04:26:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 04:26:19 - OpenVPN > VERIFY KU OK
. 2020.05.23 04:26:19 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 04:26:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 04:26:19 - OpenVPN > VERIFY EKU OK
. 2020.05.23 04:26:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 04:26:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 04:26:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 04:26:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 04:26:31 - Collect information about AirVPN completed
. 2020.05.23 05:26:19 - Above log line repeated 1 times more
. 2020.05.23 05:26:19 - OpenVPN > TLS: soft reset sec=0 bytes=116395931/-1 pkts=128844/0
. 2020.05.23 05:26:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 05:26:19 - OpenVPN > VERIFY KU OK
. 2020.05.23 05:26:19 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 05:26:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 05:26:19 - OpenVPN > VERIFY EKU OK
. 2020.05.23 05:26:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 05:26:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 05:26:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 05:26:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 05:26:47 - Collect information about AirVPN completed
. 2020.05.23 06:26:20 - Above log line repeated 1 times more
. 2020.05.23 06:26:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 06:26:20 - OpenVPN > VERIFY KU OK
. 2020.05.23 06:26:20 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 06:26:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 06:26:20 - OpenVPN > VERIFY EKU OK
. 2020.05.23 06:26:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 06:26:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 06:26:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 06:26:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 06:27:04 - Collect information about AirVPN completed
. 2020.05.23 07:26:20 - Above log line repeated 1 times more
. 2020.05.23 07:26:20 - OpenVPN > TLS: soft reset sec=0 bytes=11614412/-1 pkts=17517/0
. 2020.05.23 07:26:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 07:26:20 - OpenVPN > VERIFY KU OK
. 2020.05.23 07:26:20 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 07:26:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 07:26:20 - OpenVPN > VERIFY EKU OK
. 2020.05.23 07:26:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 07:26:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 07:26:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 07:26:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 07:27:20 - Collect information about AirVPN completed
. 2020.05.23 08:26:20 - Above log line repeated 1 times more
. 2020.05.23 08:26:20 - Renewing TLS key
. 2020.05.23 08:26:20 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.23 08:26:21 - OpenVPN > TLS: soft reset sec=0 bytes=2899414/-1 pkts=7567/0
. 2020.05.23 08:26:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 08:26:21 - OpenVPN > VERIFY KU OK
. 2020.05.23 08:26:21 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 08:26:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 08:26:21 - OpenVPN > VERIFY EKU OK
. 2020.05.23 08:26:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 08:26:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 08:26:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 08:26:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 08:27:35 - Collect information about AirVPN completed
. 2020.05.23 09:26:21 - Above log line repeated 1 times more
. 2020.05.23 09:26:21 - Renewing TLS key
. 2020.05.23 09:26:21 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.23 09:26:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 09:26:22 - OpenVPN > VERIFY KU OK
. 2020.05.23 09:26:22 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 09:26:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 09:26:22 - OpenVPN > VERIFY EKU OK
. 2020.05.23 09:26:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 09:26:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 09:26:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 09:26:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 09:27:51 - Collect information about AirVPN completed
. 2020.05.23 10:26:22 - Above log line repeated 1 times more
. 2020.05.23 10:26:22 - Renewing TLS key
. 2020.05.23 10:26:22 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.23 10:26:23 - OpenVPN > TLS: soft reset sec=0 bytes=33464413/-1 pkts=51541/0
. 2020.05.23 10:26:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 10:26:23 - OpenVPN > VERIFY KU OK
. 2020.05.23 10:26:23 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 10:26:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 10:26:23 - OpenVPN > VERIFY EKU OK
. 2020.05.23 10:26:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 10:26:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 10:26:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 10:26:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 10:28:02 - Collect information about AirVPN completed
. 2020.05.23 11:26:23 - Above log line repeated 1 times more
. 2020.05.23 11:26:23 - Renewing TLS key
. 2020.05.23 11:26:23 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.23 11:26:24 - OpenVPN > TLS: soft reset sec=0 bytes=18573503/-1 pkts=30624/0
. 2020.05.23 11:26:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 11:26:24 - OpenVPN > VERIFY KU OK
. 2020.05.23 11:26:24 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 11:26:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 11:26:24 - OpenVPN > VERIFY EKU OK
. 2020.05.23 11:26:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 11:26:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 11:26:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 11:26:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 11:28:17 - Collect information about AirVPN completed
. 2020.05.23 12:26:24 - Above log line repeated 1 times more
. 2020.05.23 12:26:24 - Renewing TLS key
. 2020.05.23 12:26:24 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.23 12:26:25 - OpenVPN > TLS: soft reset sec=0 bytes=3842219/-1 pkts=7324/0
. 2020.05.23 12:26:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 12:26:25 - OpenVPN > VERIFY KU OK
. 2020.05.23 12:26:25 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 12:26:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 12:26:25 - OpenVPN > VERIFY EKU OK
. 2020.05.23 12:26:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 12:26:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 12:26:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 12:26:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 12:28:31 - Collect information about AirVPN completed
. 2020.05.23 13:26:25 - Above log line repeated 1 times more
. 2020.05.23 13:26:25 - Renewing TLS key
. 2020.05.23 13:26:25 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.23 13:26:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 13:26:26 - OpenVPN > VERIFY KU OK
. 2020.05.23 13:26:26 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 13:26:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 13:26:26 - OpenVPN > VERIFY EKU OK
. 2020.05.23 13:26:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 13:26:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 13:26:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 13:26:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 13:28:45 - Collect information about AirVPN completed
. 2020.05.23 14:26:26 - Above log line repeated 1 times more
. 2020.05.23 14:26:26 - Renewing TLS key
. 2020.05.23 14:26:26 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.23 14:26:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 14:26:27 - OpenVPN > VERIFY KU OK
. 2020.05.23 14:26:27 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 14:26:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 14:26:27 - OpenVPN > VERIFY EKU OK
. 2020.05.23 14:26:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 14:26:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 14:26:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 14:26:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 14:28:59 - Collect information about AirVPN completed
. 2020.05.23 15:26:27 - Above log line repeated 1 times more
. 2020.05.23 15:26:27 - Renewing TLS key
. 2020.05.23 15:26:27 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.23 15:26:28 - OpenVPN > TLS: soft reset sec=0 bytes=40203935/-1 pkts=46192/0
. 2020.05.23 15:26:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 15:26:28 - OpenVPN > VERIFY KU OK
. 2020.05.23 15:26:28 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 15:26:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 15:26:28 - OpenVPN > VERIFY EKU OK
. 2020.05.23 15:26:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 15:26:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 15:26:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 15:26:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 15:29:12 - Collect information about AirVPN completed
. 2020.05.23 16:26:28 - Above log line repeated 1 times more
. 2020.05.23 16:26:28 - Renewing TLS key
. 2020.05.23 16:26:28 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.23 16:26:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 16:26:29 - OpenVPN > VERIFY KU OK
. 2020.05.23 16:26:29 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 16:26:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 16:26:29 - OpenVPN > VERIFY EKU OK
. 2020.05.23 16:26:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 16:26:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 16:26:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 16:26:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 16:29:26 - Collect information about AirVPN completed
. 2020.05.23 17:26:29 - Above log line repeated 1 times more
. 2020.05.23 17:26:29 - Renewing TLS key
. 2020.05.23 17:26:29 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.23 17:26:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 17:26:30 - OpenVPN > VERIFY KU OK
. 2020.05.23 17:26:30 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 17:26:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 17:26:30 - OpenVPN > VERIFY EKU OK
. 2020.05.23 17:26:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 17:26:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 17:26:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 17:26:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 17:29:39 - Collect information about AirVPN completed
. 2020.05.23 18:26:30 - Above log line repeated 1 times more
. 2020.05.23 18:26:30 - Renewing TLS key
. 2020.05.23 18:26:30 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.23 18:26:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 18:26:31 - OpenVPN > VERIFY KU OK
. 2020.05.23 18:26:31 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 18:26:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 18:26:31 - OpenVPN > VERIFY EKU OK
. 2020.05.23 18:26:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 18:26:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 18:26:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 18:26:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 18:29:47 - Collect information about AirVPN completed
. 2020.05.23 19:26:31 - Above log line repeated 1 times more
. 2020.05.23 19:26:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 19:26:31 - OpenVPN > VERIFY KU OK
. 2020.05.23 19:26:31 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 19:26:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 19:26:31 - OpenVPN > VERIFY EKU OK
. 2020.05.23 19:26:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 19:26:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 19:26:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 19:26:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 19:29:47 - Collect information about AirVPN completed
. 2020.05.23 20:26:32 - Above log line repeated 1 times more
. 2020.05.23 20:26:32 - OpenVPN > TLS: soft reset sec=0 bytes=12602759/-1 pkts=17129/0
. 2020.05.23 20:26:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 20:26:32 - OpenVPN > VERIFY KU OK
. 2020.05.23 20:26:32 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 20:26:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 20:26:32 - OpenVPN > VERIFY EKU OK
. 2020.05.23 20:26:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 20:26:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 20:26:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 20:26:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 20:29:49 - Collect information about AirVPN completed
. 2020.05.23 21:26:32 - Above log line repeated 1 times more
. 2020.05.23 21:26:32 - OpenVPN > TLS: soft reset sec=0 bytes=40209129/-1 pkts=46512/0
. 2020.05.23 21:26:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 21:26:32 - OpenVPN > VERIFY KU OK
. 2020.05.23 21:26:32 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 21:26:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 21:26:32 - OpenVPN > VERIFY EKU OK
. 2020.05.23 21:26:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 21:26:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 21:26:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 21:26:33 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 21:29:49 - Collect information about AirVPN completed
. 2020.05.23 22:26:32 - Above log line repeated 1 times more
. 2020.05.23 22:26:32 - Renewing TLS key
. 2020.05.23 22:26:32 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.23 22:26:33 - OpenVPN > TLS: soft reset sec=0 bytes=84743945/-1 pkts=90815/0
. 2020.05.23 22:26:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 22:26:33 - OpenVPN > VERIFY KU OK
. 2020.05.23 22:26:33 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 22:26:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 22:26:33 - OpenVPN > VERIFY EKU OK
. 2020.05.23 22:26:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 22:26:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 22:26:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 22:26:33 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 22:29:50 - Collect information about AirVPN completed
. 2020.05.23 23:26:33 - Above log line repeated 1 times more
. 2020.05.23 23:26:33 - OpenVPN > TLS: soft reset sec=0 bytes=39741593/-1 pkts=43564/0
. 2020.05.23 23:26:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.23 23:26:33 - OpenVPN > VERIFY KU OK
. 2020.05.23 23:26:33 - OpenVPN > Validating certificate extended key usage
. 2020.05.23 23:26:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.23 23:26:33 - OpenVPN > VERIFY EKU OK
. 2020.05.23 23:26:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.23 23:26:34 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 23:26:34 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.23 23:26:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.23 23:29:49 - Collect information about AirVPN completed
. 2020.05.24 00:26:33 - Above log line repeated 1 times more
. 2020.05.24 00:26:33 - Renewing TLS key
. 2020.05.24 00:26:33 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.24 00:26:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.24 00:26:34 - OpenVPN > VERIFY KU OK
. 2020.05.24 00:26:34 - OpenVPN > Validating certificate extended key usage
. 2020.05.24 00:26:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.24 00:26:34 - OpenVPN > VERIFY EKU OK
. 2020.05.24 00:26:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.24 00:26:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.24 00:26:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.24 00:26:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.24 00:29:59 - Collect information about AirVPN completed
. 2020.05.24 01:26:34 - Above log line repeated 1 times more
. 2020.05.24 01:26:34 - OpenVPN > TLS: soft reset sec=0 bytes=1885542/-1 pkts=5124/0
. 2020.05.24 01:26:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.24 01:26:34 - OpenVPN > VERIFY KU OK
. 2020.05.24 01:26:34 - OpenVPN > Validating certificate extended key usage
. 2020.05.24 01:26:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.24 01:26:34 - OpenVPN > VERIFY EKU OK
. 2020.05.24 01:26:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.24 01:26:34 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.24 01:26:34 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.24 01:26:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.24 01:29:59 - Collect information about AirVPN completed
. 2020.05.24 02:26:34 - Above log line repeated 1 times more
. 2020.05.24 02:26:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.24 02:26:34 - OpenVPN > VERIFY KU OK
. 2020.05.24 02:26:34 - OpenVPN > Validating certificate extended key usage
. 2020.05.24 02:26:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.24 02:26:34 - OpenVPN > VERIFY EKU OK
. 2020.05.24 02:26:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.24 02:26:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.24 02:26:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.24 02:26:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.24 02:29:59 - Collect information about AirVPN completed
. 2020.05.24 03:26:34 - Above log line repeated 1 times more
. 2020.05.24 03:26:34 - Renewing TLS key
. 2020.05.24 03:26:34 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.24 03:26:35 - OpenVPN > TLS: soft reset sec=0 bytes=2578982/-1 pkts=5912/0
. 2020.05.24 03:26:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.24 03:26:35 - OpenVPN > VERIFY KU OK
. 2020.05.24 03:26:35 - OpenVPN > Validating certificate extended key usage
. 2020.05.24 03:26:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.24 03:26:35 - OpenVPN > VERIFY EKU OK
. 2020.05.24 03:26:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.24 03:26:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.24 03:26:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.24 03:26:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.24 03:29:59 - Collect information about AirVPN completed
. 2020.05.24 04:26:35 - Above log line repeated 1 times more
. 2020.05.24 04:26:35 - OpenVPN > TLS: soft reset sec=0 bytes=2683167/-1 pkts=6025/0
. 2020.05.24 04:26:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.24 04:26:35 - OpenVPN > VERIFY KU OK
. 2020.05.24 04:26:35 - OpenVPN > Validating certificate extended key usage
. 2020.05.24 04:26:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.24 04:26:35 - OpenVPN > VERIFY EKU OK
. 2020.05.24 04:26:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.24 04:26:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.24 04:26:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.24 04:26:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.24 04:30:00 - Collect information about AirVPN completed
. 2020.05.24 05:26:35 - Above log line repeated 1 times more
. 2020.05.24 05:26:35 - Renewing TLS key
. 2020.05.24 05:26:35 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.24 05:26:36 - OpenVPN > TLS: soft reset sec=0 bytes=2609893/-1 pkts=5922/0
. 2020.05.24 05:26:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.24 05:26:36 - OpenVPN > VERIFY KU OK
. 2020.05.24 05:26:36 - OpenVPN > Validating certificate extended key usage
. 2020.05.24 05:26:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.24 05:26:37 - OpenVPN > VERIFY EKU OK
. 2020.05.24 05:26:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.24 05:26:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.24 05:26:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.24 05:26:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.24 05:30:01 - Collect information about AirVPN completed
. 2020.05.24 06:26:36 - Above log line repeated 1 times more
. 2020.05.24 06:26:36 - Renewing TLS key
. 2020.05.24 06:26:36 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.24 06:26:37 - OpenVPN > TLS: soft reset sec=0 bytes=2416929/-1 pkts=5403/0
. 2020.05.24 06:26:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.24 06:26:37 - OpenVPN > VERIFY KU OK
. 2020.05.24 06:26:37 - OpenVPN > Validating certificate extended key usage
. 2020.05.24 06:26:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.24 06:26:37 - OpenVPN > VERIFY EKU OK
. 2020.05.24 06:26:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.24 06:26:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.24 06:26:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.24 06:26:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.24 06:30:00 - Collect information about AirVPN completed
. 2020.05.24 07:26:37 - Above log line repeated 1 times more
. 2020.05.24 07:26:37 - OpenVPN > TLS: soft reset sec=0 bytes=1725168/-1 pkts=4570/0
. 2020.05.24 07:26:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.24 07:26:37 - OpenVPN > VERIFY KU OK
. 2020.05.24 07:26:37 - OpenVPN > Validating certificate extended key usage
. 2020.05.24 07:26:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.24 07:26:37 - OpenVPN > VERIFY EKU OK
. 2020.05.24 07:26:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.24 07:26:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.24 07:26:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.24 07:26:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.24 07:30:00 - Collect information about AirVPN completed
. 2020.05.24 08:26:37 - Above log line repeated 1 times more
. 2020.05.24 08:26:37 - Renewing TLS key
. 2020.05.24 08:26:37 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.24 08:26:38 - OpenVPN > TLS: soft reset sec=0 bytes=974516/-1 pkts=2863/0
. 2020.05.24 08:26:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.24 08:26:38 - OpenVPN > VERIFY KU OK
. 2020.05.24 08:26:38 - OpenVPN > Validating certificate extended key usage
. 2020.05.24 08:26:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.24 08:26:38 - OpenVPN > VERIFY EKU OK
. 2020.05.24 08:26:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Saiph, emailAddress=info@airvpn.org
. 2020.05.24 08:26:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.24 08:26:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.24 08:26:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.24 08:30:01 - Collect information about AirVPN completed

----------------------------
Network Interfaces and Routes:

{
    "support_ipv4": true,
    "support_ipv6": true,
    "routes": [
        {
            "address": "0.0.0.0\/0",
            "interface": "{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}",
            "gateway": "192.168.1.1",
            "metric": "25"
        },
        {
            "address": "0.0.0.0\/1",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "10.28.246.1",
            "metric": "3"
        },
        {
            "address": "10.28.246.0\/24",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "10.28.246.30",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "10.28.246.255",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "104.254.90.243",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "10.16.86.1",
            "metric": "4"
        },
        {
            "address": "127.0.0.0\/8",
            "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "127.0.0.1",
            "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "127.255.255.255",
            "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "128.0.0.0\/1",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "10.28.246.1",
            "metric": "3"
        },
        {
            "address": "184.75.223.227",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "10.28.246.1",
            "metric": "4"
        },
        {
            "address": "184.75.223.229",
            "interface": "{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}",
            "gateway": "192.168.1.1",
            "metric": "25"
        },
        {
            "address": "192.30.89.75",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "10.35.102.1",
            "metric": "4"
        },
        {
            "address": "192.168.1.0\/24",
            "interface": "{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "192.168.1.206",
            "interface": "{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "192.168.1.255",
            "interface": "{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "192.168.56.0\/24",
            "interface": "{B6318C3F-0804-4E24-8DE0-FB8EC1CCDCED}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "192.168.56.1",
            "interface": "{B6318C3F-0804-4E24-8DE0-FB8EC1CCDCED}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "192.168.56.255",
            "interface": "{B6318C3F-0804-4E24-8DE0-FB8EC1CCDCED}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{B6318C3F-0804-4E24-8DE0-FB8EC1CCDCED}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "255.255.255.255",
            "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "255.255.255.255",
            "interface": "{B6318C3F-0804-4E24-8DE0-FB8EC1CCDCED}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "255.255.255.255",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "255.255.255.255",
            "interface": "{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "::\/3",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "fe80::8",
            "metric": "259"
        },
        {
            "address": "::1",
            "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "2000::\/4",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "fe80::8",
            "metric": "259"
        },
        {
            "address": "2606:6080:1002:8:3285:30e:de43:8809",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "fde6:7a:7d20:18f6::1",
            "metric": "259"
        },
        {
            "address": "3000::\/4",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "fe80::8",
            "metric": "259"
        },
        {
            "address": "fc00::\/7",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "fe80::8",
            "metric": "259"
        },
        {
            "address": "fde6:7a:7d20:18f6::\/64",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "fe80::8",
            "metric": "259"
        },
        {
            "address": "fde6:7a:7d20:18f6::101c",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "fe80::\/64",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "fe80::\/64",
            "interface": "{DBEBA14D-B787-48C1-A9AF-9835BF9A2E60}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "fe80::4f6:3b7e:47b4:225c",
            "interface": "{DBEBA14D-B787-48C1-A9AF-9835BF9A2E60}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "fe80::e56b:37cf:35ee:ab34",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "ff00::\/8",
            "interface": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "ff00::\/8",
            "interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "ff00::\/8",
            "interface": "{DBEBA14D-B787-48C1-A9AF-9835BF9A2E60}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "2606:6080:1002:8:3285:30e:de43:8809",
            "gateway": "fde6:7a:7d20:18f6::1",
            "metric": "4294967295"
        }
    ],
    "interfaces": [
        {
            "friendly": "Local Area Connection",
            "id": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "name": "Local Area Connection",
            "description": "TAP-Windows Adapter V9",
            "type": "53",
            "status": "Up",
            "bytes_received": "1622084974",
            "bytes_sent": "1461390460",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fde6:7a:7d20:18f6::101c",
                "fe80::e56b:37cf:35ee:ab34",
                "10.28.246.30"
            ],
            "gateways": [
                "10.28.246.1",
                "10.16.86.1",
                "10.35.102.1",
                "fe80::8",
                "fde6:7a:7d20:18f6::1"
            ],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Ethernet",
            "id": "{B8212D7D-A1D7-4733-B2C3-A49916AFF0E0}",
            "name": "Ethernet",
            "description": "Intel(R) I350 Gigabit Network Connection",
            "type": "Ethernet",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [
                "169.254.207.202"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Ethernet 3",
            "id": "{FE9803E3-BC08-4B13-BF9B-576BE8353D61}",
            "name": "Ethernet 3",
            "description": "QLogic BCM57810 10 Gigabit Ethernet (NDIS VBD Client) #166",
            "type": "Ethernet",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [
                "169.254.159.168"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Ethernet 4",
            "id": "{2D1E9EFD-90AC-44BC-BA40-067580B1B17C}",
            "name": "Ethernet 4",
            "description": "QLogic BCM57810 10 Gigabit Ethernet (NDIS VBD Client) #167",
            "type": "Ethernet",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [
                "169.254.3.70"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Ethernet 2",
            "id": "{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}",
            "name": "Ethernet 2",
            "description": "Intel(R) I350 Gigabit Network Connection #2",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "13961564201",
            "bytes_sent": "15779728212",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [
                "192.168.1.206"
            ],
            "gateways": [
                "192.168.1.1"
            ],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "VirtualBox Host-Only Network",
            "id": "{B6318C3F-0804-4E24-8DE0-FB8EC1CCDCED}",
            "name": "VirtualBox Host-Only Network",
            "description": "VirtualBox Host-Only Ethernet Adapter",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [
                "192.168.56.1"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Mullvad",
            "id": "{1F4F8703-3ADF-4423-A363-3F6ABFAC4512}",
            "name": "Mullvad",
            "description": "Mullvad VPN TAP Adapter",
            "type": "53",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::b8c5:ba00:9923:ecea",
                "169.254.236.234"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Loopback Pseudo-Interface 1",
            "id": "{A0D1B95F-AF87-11E6-9658-806E6F6E6963}",
            "name": "Loopback Pseudo-Interface 1",
            "description": "Software Loopback Interface 1",
            "type": "Loopback",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "::1",
                "127.0.0.1"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "isatap.{B6318C3F-0804-4E24-8DE0-FB8EC1CCDCED}",
            "id": "{387F6E67-93C5-49AC-8245-AC93A836D691}",
            "name": "isatap.{B6318C3F-0804-4E24-8DE0-FB8EC1CCDCED}",
            "description": "Microsoft ISATAP Adapter",
            "type": "Tunnel",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": false,
            "support_ipv6": true,
            "ips": [
                "fe80::5efe:192.168.56.1"
            ],
            "gateways": [],
            "bind": true,
            "dns4": null,
            "dns6": null
        },
        {
            "friendly": "Teredo Tunneling Pseudo-Interface",
            "id": "{DBEBA14D-B787-48C1-A9AF-9835BF9A2E60}",
            "name": "Teredo Tunneling Pseudo-Interface",
            "description": "Teredo Tunneling Pseudo-Interface",
            "type": "Tunnel",
            "status": "Up",
            "bytes_received": "456",
            "bytes_sent": "17042",
            "support_ipv4": false,
            "support_ipv6": true,
            "ips": [
                "fe80::4f6:3b7e:47b4:225c"
            ],
            "gateways": [],
            "bind": true,
            "dns4": null,
            "dns6": null
        },
        {
            "friendly": "isatap.{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "id": "{3243F3C9-6791-4A72-B140-A334E3FECD17}",
            "name": "isatap.{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
            "description": "Microsoft ISATAP Adapter #2",
            "type": "Tunnel",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": false,
            "support_ipv6": true,
            "ips": [
                "fe80::5efe:10.28.246.30"
            ],
            "gateways": [],
            "bind": true,
            "dns4": null,
            "dns6": null
        },
        {
            "friendly": "isatap.{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}",
            "id": "{D85ACF4C-0B98-4743-96E3-F32A3077A929}",
            "name": "isatap.{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}",
            "description": "Microsoft ISATAP Adapter #4",
            "type": "Tunnel",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": false,
            "support_ipv6": true,
            "ips": [
                "fe80::5efe:192.168.1.206"
            ],
            "gateways": [],
            "bind": true,
            "dns4": null,
            "dns6": null
        }
    ],
    "ipv4-default-gateway": "10.28.246.1",
    "ipv4-default-interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}",
    "ipv6-default-gateway": "fe80::8",
    "ipv6-default-interface": "{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}"
}
----------------------------
ipconfig /all:

Windows IP Configuration

   Host Name . . . . . . . . . . . . : Server
   Primary Dns Suffix  . . . . . . . : 
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No

Unknown adapter Local Area Connection:

   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : TAP-Windows Adapter V9
   Physical Address. . . . . . . . . : 00-FF-61-92-0D-A2
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : fde6:7a:7d20:18f6::101c(Preferred) 
   Link-local IPv6 Address . . . . . : fe80::e56b:37cf:35ee:ab34%10(Preferred) 
   IPv4 Address. . . . . . . . . . . : 10.28.246.30(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Thursday, May 21, 2020 11:25:53 AM
   Lease Expires . . . . . . . . . . : Friday, May 21, 2021 11:25:50 AM
   Default Gateway . . . . . . . . . : 
   DHCP Server . . . . . . . . . . . : 10.28.246.254
   DHCPv6 IAID . . . . . . . . . . . : 771817313
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-24-73-07-C3-00-25-90-FB-A2-1D
   DNS Servers . . . . . . . . . . . : fde6:7a:7d20:18f6::1
                                       10.28.246.1
   NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Ethernet:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Intel(R) I350 Gigabit Network Connection
   Physical Address. . . . . . . . . : 00-25-90-FB-A2-1D
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Ethernet adapter Ethernet 3:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : QLogic BCM57810 10 Gigabit Ethernet (NDIS VBD Client) #166
   Physical Address. . . . . . . . . : 00-25-90-8E-AB-7C
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Ethernet adapter Ethernet 4:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : QLogic BCM57810 10 Gigabit Ethernet (NDIS VBD Client) #167
   Physical Address. . . . . . . . . : 00-25-90-8E-AB-7E
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Ethernet adapter Ethernet 2:

   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Intel(R) I350 Gigabit Network Connection #2
   Physical Address. . . . . . . . . : 00-25-90-FB-A2-1C
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 192.168.1.206(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Thursday, May 21, 2020 9:20:10 AM
   Lease Expires . . . . . . . . . . : Sunday, May 24, 2020 9:20:10 PM
   Default Gateway . . . . . . . . . : 192.168.1.1
   DHCP Server . . . . . . . . . . . : 192.168.1.1
   DNS Servers . . . . . . . . . . . : 192.168.1.1
   NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter VirtualBox Host-Only Network:

   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : VirtualBox Host-Only Ethernet Adapter
   Physical Address. . . . . . . . . : 0A-00-27-00-00-11
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 192.168.56.1(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 
   NetBIOS over Tcpip. . . . . . . . : Enabled

Unknown adapter Mullvad:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Mullvad VPN TAP Adapter
   Physical Address. . . . . . . . . : 00-FF-1F-4F-87-03
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Tunnel adapter isatap.{B6318C3F-0804-4E24-8DE0-FB8EC1CCDCED}:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Teredo Tunneling Pseudo-Interface:

   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::4f6:3b7e:47b4:225c%21(Preferred) 
   Default Gateway . . . . . . . . . : 
   DHCPv6 IAID . . . . . . . . . . . : 335544320
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-24-73-07-C3-00-25-90-FB-A2-1D
   NetBIOS over Tcpip. . . . . . . . : Disabled

Tunnel adapter isatap.{61920DA2-D3D6-4DD8-97F3-4B7AB6295376}:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter #2
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes

Tunnel adapter isatap.{33B70DFB-1BB9-4550-9DE0-44D0ECB45D03}:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter #4
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes

Edited ... by Titums

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...