Jump to content
Not connected, Your IP: 18.220.123.118
$|$C0

High Ping time on 1 of 2 Windows 7 Computers

Recommended Posts

VPN Newbie

Just installed Eddie on 2 Windows 7 Pro systems. One on cable in the city, one on a rural ASDL connection.

System in the city is humming fine. Ping times typically under 70 ms.
System in the boonies, not so much. BW seems ok, but not latency. Ping above 1500 ms with Eddie on. Under 70 with it off.
My understanding is that this rural ISP does not support IPv6, but a geek told me that does not matter as AirVPN uses IPv4 for tunneling.

Am I missing some setting option(s) to optimize Eddie with my rural system?

20220221 High ping.png

Share this post


Link to post
20 minutes ago, $|$C0 said:

but a geek told me that does not matter as AirVPN uses IPv4 for tunneling.


Well, your contact speaks truly.

You could disable v6 in Eddie (Networking > Layer IPv6 -> Block), see if that helps.

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

So far I am using the default settings.
As I looked back over the 3 days I have been using Eddie, I saw a gradual creep on ping time on that ASDL line. After I stopped and restarted Eddie, the ping time was low at first, but within hours it began rising.

 

20220221 1830 Rural ASDL 3 day ping history_caw50.png

20220221 2100 Rural ASDL 3 hour uptime ping creep_caw50.png

Share this post


Link to post

Logs > lifebelt icon on the right > copy/paste the output. We might need more info on your setup first. Don't bother about logs, they're in there as well.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
Posted ... (edited)

Support suggested the gradual increase in ping times might be ISP traffic shaping. ISP claims it "does not monitor how you use our service" and my system logs tend to validate that claim. See 1st image.

After trying Eddie with default settings for 3 days and getting ping times above 1500ms, these custom settings were enabled:
For protocols: TCP, port 443, IP 3
For networking: Layer IPv6 was Blocked, connection protocol was set to IPv4 Only

Test is proceeding but ping time is still high. See 2nd and 3rd images

Tests through the 2nd day similar to running on default on the initial 3 days. It was the 3rd day when ping time got way out of hand. We'll see now if these settings changes hold for the next couple days. But even ping times in the 400 ms range as is currently is not optimal.
 

20220222 1600 Rural ASDL 4 month ping time graph_w50.png

 

20220223 1600 Rural ASDL 7 day ping time graph_w75.png

20220223 1600 Rural ASDL 2 day ping time graph_75.png

Edited ... by $|$C0
adding image

Share this post


Link to post
Posted ... (edited)

Eddie System/Environment Report - 2/23/2022 - 2:07 PM UTC

Eddie version: 2.20.0
Eddie OS build: windows_x64
Eddie architecture: x64
OS type: Windows
OS name: Windows 7 Professional
OS version: Microsoft Windows NT 6.1.7601 Service Pack 1
OS architecture: x64
Mono /.Net Framework: v4.0.30319
TUN driver: 0901: 9.24.2; wintun: Not found
OpenVPN: 2.5.1 - OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
Hummingbird:  ()
SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
Profile path: C:\*\*\*\AppData\Local\Eddie\default.profile
Data path: C:\*\*\*\AppData\Local\Eddie
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\Eddie-UI.exe
Command line arguments: (1 args) path="home"
Network Lock Active: Yes, Windows Filtering Platform
Connected to VPN: Yes, Tejat
Detected DNS: fde6:7a:7d20:1b7a::1, 10.31.122.1, 208.67.222.222, 58.6.115.42, 5.45.96.220, 37.235.1.174, 205.204.88.60, 1.1.1.1
Test DNS IPv4: Ok
Test DNS IPv6: Ok
Test Ping IPv4: 400 ms
Test Ping IPv6: Failed
Test HTTP IPv4: Ok
Test HTTP IPv6: Ok
Test HTTPS: Error: Fetch url error:SSL peer certificate or SSH remote key was not OK
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
connect: True
netlock: True
servers.whitelist: 402b3e70148b9d30900df01bc64e88d06a5bb1ea4bf6f6a706a300f7e0a9736e,68a3cf26ef90c5bfc11c4986eda57e3fc4610186f8ecdc6421f3159ad072de5b,754018c7e9fcbff567b14fed7d61181b355ff87abd849f2c540d1b62a44b57fe,a5ddea420fba1c6fa22eabebd95ae5d42425c097c266a2b25a40d8eeb0615db8,97d3f21c2f83893eeb5eea447a24adb7eacbc9b8fe563394c87545aa32a6d9cc,c7adec03f939e1d9174e78467018bfde9530fa07706299636afc64079c6b3fde,9eb4e9fec3d7fda83d74da42fba80a8e0a755d315d7f5190e429a41ec8c10cb9,af2e81b347e0620f2179b0bbcbe7712c08c958bb336e1764dfbf9d396324a378,7a6810765122ba4eed879a5dc71ad57a2240a3589c62ac06d6433121c182c0ef,f17154cf0682930a755b264d106104cc7a769ab6b724c0c3959fc3054563efb4,1e2270a6088e17c67aee04239f0a16ef08cb10d833059b5bd9e71c89984232fc,262b50b8289535b042fc434a962e3050cc083869dcd16253e06c91556a0d69a1,56c6eafbe65d79069d6ac79e7560eb42fa7a941e8ac3c0fa259bda2fbd2ee5db,029ce5313805eb04a279020131a2779e67a6b146093194467108b29b89725daa,18779a8cb8b16f965f3ff883ba0a270ab35a8f6728e88d4834a243a56fab1bff,4575725e1275fce5fd62bf4a17bd75863d3a3bfcd0dc632a65d128683193adf0,33c8256b9c7480388a7889393288f215f24170b204a2f9e1c94425a9830ec79a,be8ff3428e34718903b63c0a3bb5d462fb60e9467bfaf51704d369851003bada,00c5ced917bfaa14617710448aad743f41fbff55013655e41e047be1d5819d30,165b49c37f4de697229e0b40a94dab51aaf779c223da14774ff0dc1eadfb9b74,21ec07747b840a44028ad0668aa412ddd9e972a653cea9911b053026090dfe96,f315cae62bfe63c53920058f00a0715dc07f3ef9ef1b8d5ad9dfb8a2b5a5c3e6
servers.startlast: True
mode.protocol: TCP
mode.alt: 2
network.entry.iplayer: ipv4-only
network.ipv6.mode: block

----------------------------
Logs:

. 2022.02.21 18:17:02 - Eddie version: 2.20.0 / windows_x64, System: Windows, Name: Windows 7 Professional, Version: Microsoft Windows NT 6.1.7601 Service Pack 1, Mono/.Net: v4.0.30319
. 2022.02.21 18:17:02 - Command line arguments (1): path="home"
. 2022.02.21 18:17:03 - Profile path: C:\*\*\*\AppData\Local\Eddie\default.profile
. 2022.02.21 18:17:03 - Reading options from C:\*\*\*\AppData\Local\Eddie\default.profile
. 2022.02.21 18:17:06 - Tun Driver - 0901: 9.24.2; wintun: Not found
. 2022.02.21 18:17:06 - OpenVPN - Version: 2.5.1 - OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2022.02.21 18:17:06 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2022.02.21 18:17:06 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
! 2022.02.21 18:17:07 - Activation of Network Lock - Windows Filtering Platform
I 2022.02.21 18:17:08 - Ready
. 2022.02.21 18:17:09 - Collect information about AirVPN completed
I 2022.02.21 18:17:09 - Session starting.
. 2022.02.21 18:17:09 - Waiting for latency tests (32 to go)
. 2022.02.21 18:17:10 - Collect information about AirVPN completed
. 2022.02.21 18:17:10 - Waiting for latency tests (4 to go)
I 2022.02.21 18:17:13 - Checking authorization ...
! 2022.02.21 18:17:14 - Connecting to Tejat (Canada, Toronto, Ontario)
. 2022.02.21 18:17:14 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
. 2022.02.21 18:17:14 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2022.02.21 18:17:14 - OpenVPN > library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
. 2022.02.21 18:17:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.02.21 18:17:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.02.21 18:17:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.02.21 18:17:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.02.21 18:17:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.197:443
. 2022.02.21 18:17:14 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2022.02.21 18:17:14 - OpenVPN > UDP link local: (not bound)
. 2022.02.21 18:17:14 - OpenVPN > UDP link remote: [AF_INET]184.75.221.197:443
. 2022.02.21 18:17:14 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.197:443, sid=cadb7164 3e5f2c9c
. 2022.02.21 18:17:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.21 18:17:14 - OpenVPN > VERIFY KU OK
. 2022.02.21 18:17:14 - OpenVPN > Validating certificate extended key usage
. 2022.02.21 18:17:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.21 18:17:14 - OpenVPN > VERIFY EKU OK
. 2022.02.21 18:17:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.21 18:17:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.21 18:17:14 - OpenVPN > [Tejat] Peer Connection Initiated with [AF_INET]184.75.221.197:443
. 2022.02.21 18:17:15 - OpenVPN > SENT CONTROL [Tejat]: 'PUSH_REQUEST' (status=1)
. 2022.02.21 18:17:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.122.1,dhcp-option DNS6 fde6:7a:7d20:1b7a::1,tun-ipv6,route-gateway 10.31.122.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1b7a::1098/64 fde6:7a:7d20:1b7a::1,ifconfig 10.31.122.154 255.255.255.0,peer-id 2,cipher AES-256-GCM'
. 2022.02.21 18:17:15 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2022.02.21 18:17:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.02.21 18:17:15 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2022.02.21 18:17:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.02.21 18:17:15 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.02.21 18:17:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.02.21 18:17:15 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.02.21 18:17:15 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2022.02.21 18:17:15 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2022.02.21 18:17:15 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2022.02.21 18:17:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.21 18:17:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.21 18:17:15 - OpenVPN > interactive service msg_channel=0
. 2022.02.21 18:17:15 - OpenVPN > ROUTE_GATEWAY 192.168.*.*/255.255.255.0 I=12 HWADDR=b8:76:3f:25:d0:60
. 2022.02.21 18:17:15 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2022.02.21 18:17:15 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found.   (code=1168)
. 2022.02.21 18:17:15 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2022.02.21 18:17:15 - OpenVPN > open_tun
. 2022.02.21 18:17:15 - OpenVPN > tap-windows6 device [Local Area Connection 3] opened
. 2022.02.21 18:17:15 - OpenVPN > TAP-Windows Driver Version 9.24
. 2022.02.21 18:17:15 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.31.122.0/10.31.122.154/255.255.255.0 [SUCCEEDED]
. 2022.02.21 18:17:15 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.31.122.154/255.255.255.0 on interface {F7B0F641-62BC-4F34-843B-5E584A42DCB4} [DHCP-serv: 10.31.122.254, lease-time: 31536000]
. 2022.02.21 18:17:15 - OpenVPN > Successful ARP Flush on interface [19] {F7B0F641-62BC-4F34-843B-5E584A42DCB4}
. 2022.02.21 18:17:15 - OpenVPN > IPv4 MTU set to 1500 on interface 19 using SetIpInterfaceEntry()
. 2022.02.21 18:17:15 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 19 fde6:7a:7d20:1b7a::1098/128 store=active
. 2022.02.21 18:17:15 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1b7a::/64 -> fde6:7a:7d20:1b7a::1098 metric 0) dev Local Area Connection 3
. 2022.02.21 18:17:15 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1b7a::/64 19 fe80::8 store=active
. 2022.02.21 18:17:15 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2022.02.21 18:17:15 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 19 all
. 2022.02.21 18:17:15 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns 19 static fde6:7a:7d20:1b7a::1 validate=no
. 2022.02.21 18:17:15 - OpenVPN > IPv6 MTU set to 1500 on interface 19 using SetIpInterfaceEntry()
. 2022.02.21 18:17:20 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2022.02.21 18:17:20 - OpenVPN > C:\Windows\system32\route.exe ADD 184.75.221.197 MASK 255.255.255.255 192.168.*.*
. 2022.02.21 18:17:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2022.02.21 18:17:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2022.02.21 18:17:20 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.31.122.1
. 2022.02.21 18:17:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2022.02.21 18:17:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2022.02.21 18:17:20 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.31.122.1
. 2022.02.21 18:17:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2022.02.21 18:17:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2022.02.21 18:17:20 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1b7a::1 metric -1) dev Local Area Connection 3
. 2022.02.21 18:17:20 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route ::/3 19 fe80::8 store=active
. 2022.02.21 18:17:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2022.02.21 18:17:20 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1b7a::1 metric -1) dev Local Area Connection 3
. 2022.02.21 18:17:20 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 2000::/4 19 fe80::8 store=active
. 2022.02.21 18:17:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2022.02.21 18:17:20 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1b7a::1 metric -1) dev Local Area Connection 3
. 2022.02.21 18:17:20 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 3000::/4 19 fe80::8 store=active
. 2022.02.21 18:17:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2022.02.21 18:17:20 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1b7a::1 metric -1) dev Local Area Connection 3
. 2022.02.21 18:17:20 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fc00::/7 19 fe80::8 store=active
. 2022.02.21 18:17:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
. 2022.02.21 18:17:20 - Interface Local Area Connection 3 metric changed from Automatic to 3, layer IPv4
. 2022.02.21 18:17:20 - Interface Local Area Connection 3 metric changed from Automatic to 3, layer IPv6
. 2022.02.21 18:17:20 - DNS leak protection with packet filtering enabled.
. 2022.02.21 18:17:20 - DNS IPv4 of a network adapter forced (Local Area Connection 3, from automatic to 10.31.122.1)
. 2022.02.21 18:17:20 - DNS IPv6 of a network adapter forced (Local Area Connection 3, from automatic to fde6:7a:7d20:1b7a::1)
. 2022.02.21 18:17:20 - Routes, added a new route, 184.75.221.195 for gateway 10.31.122.1
. 2022.02.21 18:17:20 - Routes, added a new route, 2606:6080:1001:15:45d:2b31:f931:2e2 for gateway fde6:7a:7d20:1b7a::1
. 2022.02.21 18:17:20 - Flushing DNS
I 2022.02.21 18:17:20 - Checking route IPv4
I 2022.02.21 18:17:21 - Checking route IPv6
I 2022.02.21 18:17:26 - Checking DNS
! 2022.02.21 18:17:27 - Connected.
. 2022.02.21 18:17:27 - OpenVPN > Initialization Sequence Completed
. 2022.02.21 18:47:18 - Collect information about AirVPN completed
. 2022.02.21 19:13:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.21 19:13:50 - OpenVPN > VERIFY KU OK
. 2022.02.21 19:13:50 - OpenVPN > Validating certificate extended key usage
. 2022.02.21 19:13:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.21 19:13:50 - OpenVPN > VERIFY EKU OK
. 2022.02.21 19:13:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.21 19:13:50 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.21 19:13:50 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.21 19:13:50 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.21 19:17:28 - Collect information about AirVPN completed
. 2022.02.21 20:10:26 - Above log line repeated 1 times more
. 2022.02.21 20:10:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.21 20:10:26 - OpenVPN > VERIFY KU OK
. 2022.02.21 20:10:26 - OpenVPN > Validating certificate extended key usage
. 2022.02.21 20:10:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.21 20:10:26 - OpenVPN > VERIFY EKU OK
. 2022.02.21 20:10:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.21 20:10:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.21 20:10:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.21 20:10:28 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.21 20:17:40 - Collect information about AirVPN completed
. 2022.02.21 21:05:40 - Above log line repeated 1 times more
. 2022.02.21 21:05:40 - Elevated: Command:service-conn-mode
. 2022.02.21 21:07:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.21 21:07:04 - OpenVPN > VERIFY KU OK
. 2022.02.21 21:07:04 - OpenVPN > Validating certificate extended key usage
. 2022.02.21 21:07:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.21 21:07:04 - OpenVPN > VERIFY EKU OK
. 2022.02.21 21:07:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.21 21:07:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.21 21:07:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.21 21:07:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.21 21:17:42 - Collect information about AirVPN completed
. 2022.02.21 22:03:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.21 22:03:40 - OpenVPN > VERIFY KU OK
. 2022.02.21 22:03:40 - OpenVPN > Validating certificate extended key usage
. 2022.02.21 22:03:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.21 22:03:40 - OpenVPN > VERIFY EKU OK
. 2022.02.21 22:03:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.21 22:03:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.21 22:03:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.21 22:03:42 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.21 23:00:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.21 23:00:18 - OpenVPN > VERIFY KU OK
. 2022.02.21 23:00:18 - OpenVPN > Validating certificate extended key usage
. 2022.02.21 23:00:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.21 23:00:18 - OpenVPN > VERIFY EKU OK
. 2022.02.21 23:00:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.21 23:00:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.21 23:00:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.21 23:00:18 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.21 23:56:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.21 23:56:56 - OpenVPN > VERIFY KU OK
. 2022.02.21 23:56:56 - OpenVPN > Validating certificate extended key usage
. 2022.02.21 23:56:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.21 23:56:56 - OpenVPN > VERIFY EKU OK
. 2022.02.21 23:56:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.21 23:56:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.21 23:56:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.21 23:56:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 00:53:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 00:53:32 - OpenVPN > VERIFY KU OK
. 2022.02.22 00:53:32 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 00:53:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 00:53:32 - OpenVPN > VERIFY EKU OK
. 2022.02.22 00:53:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 00:53:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 00:53:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 00:53:32 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 01:50:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 01:50:10 - OpenVPN > VERIFY KU OK
. 2022.02.22 01:50:10 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 01:50:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 01:50:10 - OpenVPN > VERIFY EKU OK
. 2022.02.22 01:50:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 01:50:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 01:50:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 01:50:10 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 02:46:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 02:46:48 - OpenVPN > VERIFY KU OK
. 2022.02.22 02:46:48 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 02:46:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 02:46:48 - OpenVPN > VERIFY EKU OK
. 2022.02.22 02:46:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 02:46:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 02:46:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 02:46:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 03:43:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 03:43:27 - OpenVPN > VERIFY KU OK
. 2022.02.22 03:43:27 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 03:43:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 03:43:27 - OpenVPN > VERIFY EKU OK
. 2022.02.22 03:43:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 03:43:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 03:43:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 03:43:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 04:40:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 04:40:04 - OpenVPN > VERIFY KU OK
. 2022.02.22 04:40:04 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 04:40:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 04:40:04 - OpenVPN > VERIFY EKU OK
. 2022.02.22 04:40:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 04:40:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 04:40:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 04:40:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 05:36:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 05:36:43 - OpenVPN > VERIFY KU OK
. 2022.02.22 05:36:43 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 05:36:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 05:36:43 - OpenVPN > VERIFY EKU OK
. 2022.02.22 05:36:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 05:36:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 05:36:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 05:36:43 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 06:33:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 06:33:19 - OpenVPN > VERIFY KU OK
. 2022.02.22 06:33:19 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 06:33:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 06:33:19 - OpenVPN > VERIFY EKU OK
. 2022.02.22 06:33:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 06:33:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 06:33:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 06:33:19 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 07:11:44 - Elevated: Command:service-conn-mode
. 2022.02.22 07:29:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 07:29:57 - OpenVPN > VERIFY KU OK
. 2022.02.22 07:29:57 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 07:29:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 07:29:57 - OpenVPN > VERIFY EKU OK
. 2022.02.22 07:29:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 07:29:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 07:29:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 07:29:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 08:26:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 08:26:34 - OpenVPN > VERIFY KU OK
. 2022.02.22 08:26:34 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 08:26:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 08:26:34 - OpenVPN > VERIFY EKU OK
. 2022.02.22 08:26:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 08:26:34 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 08:26:34 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 08:26:34 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 09:23:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 09:23:10 - OpenVPN > VERIFY KU OK
. 2022.02.22 09:23:10 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 09:23:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 09:23:10 - OpenVPN > VERIFY EKU OK
. 2022.02.22 09:23:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 09:23:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 09:23:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 09:23:10 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 10:19:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 10:19:48 - OpenVPN > VERIFY KU OK
. 2022.02.22 10:19:48 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 10:19:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 10:19:48 - OpenVPN > VERIFY EKU OK
. 2022.02.22 10:19:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 10:19:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 10:19:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 10:19:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 11:16:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 11:16:30 - OpenVPN > VERIFY KU OK
. 2022.02.22 11:16:30 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 11:16:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 11:16:30 - OpenVPN > VERIFY EKU OK
. 2022.02.22 11:16:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 11:16:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 11:16:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 11:16:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 12:13:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 12:13:09 - OpenVPN > VERIFY KU OK
. 2022.02.22 12:13:09 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 12:13:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 12:13:09 - OpenVPN > VERIFY EKU OK
. 2022.02.22 12:13:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 12:13:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 12:13:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 12:13:09 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 12:22:54 - ping 1
. 2022.02.22 12:22:54 - ping 2 W
. 2022.02.22 12:22:55 - ping 2 WE
. 2022.02.22 13:09:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 13:09:51 - OpenVPN > VERIFY KU OK
. 2022.02.22 13:09:51 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 13:09:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 13:09:51 - OpenVPN > VERIFY EKU OK
. 2022.02.22 13:09:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 13:09:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 13:09:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 13:09:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 14:06:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 14:06:29 - OpenVPN > VERIFY KU OK
. 2022.02.22 14:06:29 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 14:06:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 14:06:29 - OpenVPN > VERIFY EKU OK
. 2022.02.22 14:06:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 14:06:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 14:06:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 14:06:29 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 15:03:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 15:03:08 - OpenVPN > VERIFY KU OK
. 2022.02.22 15:03:08 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 15:03:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 15:03:08 - OpenVPN > VERIFY EKU OK
. 2022.02.22 15:03:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 15:03:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 15:03:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 15:03:08 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 15:59:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 15:59:45 - OpenVPN > VERIFY KU OK
. 2022.02.22 15:59:45 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 15:59:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 15:59:45 - OpenVPN > VERIFY EKU OK
. 2022.02.22 15:59:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 15:59:45 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 15:59:45 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 15:59:45 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 16:56:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 16:56:21 - OpenVPN > VERIFY KU OK
. 2022.02.22 16:56:21 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 16:56:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 16:56:21 - OpenVPN > VERIFY EKU OK
. 2022.02.22 16:56:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 16:56:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 16:56:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 16:56:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 17:52:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 17:52:59 - OpenVPN > VERIFY KU OK
. 2022.02.22 17:52:59 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 17:52:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 17:52:59 - OpenVPN > VERIFY EKU OK
. 2022.02.22 17:52:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 17:52:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 17:52:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 17:52:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 18:49:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 18:49:35 - OpenVPN > VERIFY KU OK
. 2022.02.22 18:49:35 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 18:49:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 18:49:35 - OpenVPN > VERIFY EKU OK
. 2022.02.22 18:49:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 18:49:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 18:49:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 18:49:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 19:46:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 19:46:11 - OpenVPN > VERIFY KU OK
. 2022.02.22 19:46:11 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 19:46:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 19:46:11 - OpenVPN > VERIFY EKU OK
. 2022.02.22 19:46:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 19:46:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 19:46:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 19:46:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 20:42:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 20:42:48 - OpenVPN > VERIFY KU OK
. 2022.02.22 20:42:48 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 20:42:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 20:42:48 - OpenVPN > VERIFY EKU OK
. 2022.02.22 20:42:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 20:42:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 20:42:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 20:42:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 21:39:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 21:39:24 - OpenVPN > VERIFY KU OK
. 2022.02.22 21:39:24 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 21:39:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 21:39:24 - OpenVPN > VERIFY EKU OK
. 2022.02.22 21:39:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 21:39:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 21:39:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 21:39:26 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 22:36:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 22:36:02 - OpenVPN > VERIFY KU OK
. 2022.02.22 22:36:02 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 22:36:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 22:36:02 - OpenVPN > VERIFY EKU OK
. 2022.02.22 22:36:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 22:36:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 22:36:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 22:36:02 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.22 23:32:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.22 23:32:40 - OpenVPN > VERIFY KU OK
. 2022.02.22 23:32:40 - OpenVPN > Validating certificate extended key usage
. 2022.02.22 23:32:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.22 23:32:40 - OpenVPN > VERIFY EKU OK
. 2022.02.22 23:32:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.22 23:32:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 23:32:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.22 23:32:40 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.23 00:29:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.23 00:29:16 - OpenVPN > VERIFY KU OK
. 2022.02.23 00:29:16 - OpenVPN > Validating certificate extended key usage
. 2022.02.23 00:29:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.23 00:29:16 - OpenVPN > VERIFY EKU OK
. 2022.02.23 00:29:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.23 00:29:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 00:29:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 00:29:16 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.23 01:25:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.23 01:25:52 - OpenVPN > VERIFY KU OK
. 2022.02.23 01:25:52 - OpenVPN > Validating certificate extended key usage
. 2022.02.23 01:25:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.23 01:25:52 - OpenVPN > VERIFY EKU OK
. 2022.02.23 01:25:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.23 01:25:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 01:25:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 01:25:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.23 02:22:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.23 02:22:28 - OpenVPN > VERIFY KU OK
. 2022.02.23 02:22:28 - OpenVPN > Validating certificate extended key usage
. 2022.02.23 02:22:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.23 02:22:28 - OpenVPN > VERIFY EKU OK
. 2022.02.23 02:22:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.23 02:22:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 02:22:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 02:22:28 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.23 03:19:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.23 03:19:04 - OpenVPN > VERIFY KU OK
. 2022.02.23 03:19:04 - OpenVPN > Validating certificate extended key usage
. 2022.02.23 03:19:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.23 03:19:04 - OpenVPN > VERIFY EKU OK
. 2022.02.23 03:19:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.23 03:19:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 03:19:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 03:19:04 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.23 04:15:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.23 04:15:40 - OpenVPN > VERIFY KU OK
. 2022.02.23 04:15:40 - OpenVPN > Validating certificate extended key usage
. 2022.02.23 04:15:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.23 04:15:40 - OpenVPN > VERIFY EKU OK
. 2022.02.23 04:15:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.23 04:15:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 04:15:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 04:15:40 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.23 05:12:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.23 05:12:16 - OpenVPN > VERIFY KU OK
. 2022.02.23 05:12:16 - OpenVPN > Validating certificate extended key usage
. 2022.02.23 05:12:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.23 05:12:16 - OpenVPN > VERIFY EKU OK
. 2022.02.23 05:12:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.23 05:12:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 05:12:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 05:12:16 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.23 06:08:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.23 06:08:58 - OpenVPN > VERIFY KU OK
. 2022.02.23 06:08:58 - OpenVPN > Validating certificate extended key usage
. 2022.02.23 06:08:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.23 06:08:58 - OpenVPN > VERIFY EKU OK
. 2022.02.23 06:08:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.23 06:08:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 06:08:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 06:08:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.23 07:05:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.23 07:05:36 - OpenVPN > VERIFY KU OK
. 2022.02.23 07:05:36 - OpenVPN > Validating certificate extended key usage
. 2022.02.23 07:05:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.23 07:05:36 - OpenVPN > VERIFY EKU OK
. 2022.02.23 07:05:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.23 07:05:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 07:05:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 07:05:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.23 08:02:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.23 08:02:14 - OpenVPN > VERIFY KU OK
. 2022.02.23 08:02:14 - OpenVPN > Validating certificate extended key usage
. 2022.02.23 08:02:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.23 08:02:14 - OpenVPN > VERIFY EKU OK
. 2022.02.23 08:02:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.23 08:02:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 08:02:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 08:02:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.23 08:58:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.02.23 08:58:51 - OpenVPN > VERIFY KU OK
. 2022.02.23 08:58:51 - OpenVPN > Validating certificate extended key usage
. 2022.02.23 08:58:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.02.23 08:58:51 - OpenVPN > VERIFY EKU OK
. 2022.02.23 08:58:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org
. 2022.02.23 08:58:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 08:58:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.02.23 08:58:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2022.02.23 09:07:34 - ping 1
. 2022.02.23 09:07:34 - ping 2 W
. 2022.02.23 09:07:39 - ping 2 WE

----------------------------
Network Interfaces and Routes:

{
    "support_ipv4": true,
    "support_ipv6": true,
    "routes": [
        {
            "address": "0.0.0.0\/0",
            "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}",
            "gateway": "192.168.*.*",
            "metric": "25"
        },
        {
            "address": "0.0.0.0\/1",
            "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "gateway": "10.31.122.1",
            "metric": "3"
        },
        {
            "address": "10.31.122.0\/24",
            "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "10.31.122.154",
            "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "10.31.122.255",
            "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "127.0.0.0\/8",
            "interface": "{846EE342-7039-11DE-9D20-806E6F6E6963}",
            "gateway": "link",
            "metric": "306"
        },
        {
            "address": "127.0.0.1",
            "interface": "{846EE342-7039-11DE-9D20-806E6F6E6963}",
            "gateway": "link",
            "metric": "306"
        },
        {
            "address": "127.255.255.255",
            "interface": "{846EE342-7039-11DE-9D20-806E6F6E6963}",
            "gateway": "link",
            "metric": "306"
        },
        {
            "address": "128.0.0.0\/1",
            "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "gateway": "10.31.122.1",
            "metric": "3"
        },
        {
            "address": "184.75.221.195",
            "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "gateway": "10.31.122.1",
            "metric": "4"
        },
        {
            "address": "184.75.221.197",
            "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}",
            "gateway": "192.168.*.*",
            "metric": "25"
        },
        {
            "address": "192.168.*.0\/24",
            "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "192.168.*.100",
            "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "192.168.*.255",
            "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{846EE342-7039-11DE-9D20-806E6F6E6963}",
            "gateway": "link",
            "metric": "306"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "255.255.255.255",
            "interface": "{846EE342-7039-11DE-9D20-806E6F6E6963}",
            "gateway": "link",
            "metric": "306"
        },
        {
            "address": "255.255.255.255",
            "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "255.255.255.255",
            "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "::\/3",
            "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "gateway": "fe80::8",
            "metric": "259"
        },
        {
            "address": "::1",
            "interface": "{846EE342-7039-11DE-9D20-806E6F6E6963}",
            "gateway": "link",
            "metric": "306"
        },
        {
            "address": "2000::\/4",
            "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "gateway": "fe80::8",
            "metric": "259"
        },
        {
            "address": "2606:6080:1001:15:45d:2b31:f931:2e2",
            "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "gateway": "fde6:7a:7d20:1b7a::1",
            "metric": "259"
        },
        {
            "address": "3000::\/4",
            "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "gateway": "fe80::8",
            "metric": "259"
        },
        {
            "address": "fc00::\/7",
            "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "gateway": "fe80::8",
            "metric": "259"
        },
        {
            "address": "fde6:7a:7d20:1b7a::\/64",
            "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "gateway": "fe80::8",
            "metric": "259"
        },
        {
            "address": "fde6:7a:7d20:1b7a::1098",
            "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "fe80::\/64",
            "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "fe80::\/64",
            "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "fe80::4dbd:ef56:e76a:d79b",
            "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "fe80::59d0:b652:d20d:992f",
            "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "ff00::\/8",
            "interface": "{846EE342-7039-11DE-9D20-806E6F6E6963}",
            "gateway": "link",
            "metric": "306"
        },
        {
            "address": "ff00::\/8",
            "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "gateway": "link",
            "metric": "259"
        },
        {
            "address": "ff00::\/8",
            "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}",
            "gateway": "link",
            "metric": "281"
        },
        {
            "address": "2606:6080:1001:15:45d:2b31:f931:2e2",
            "gateway": "fde6:7a:7d20:1b7a::1",
            "metric": "4294967295"
        }
    ],
    "interfaces": [
        {
            "friendly": "Local Area Connection 3",
            "id": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "name": "Local Area Connection 3",
            "description": "TAP-Windows Adapter V9",
            "type": "Virtual",
            "status": "Up",
            "bytes_received": "49700286070",
            "bytes_sent": "31929874261",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fde6:7a:7d20:1b7a::1098",
                "fe80::4dbd:ef56:e76a:d79b",
                "10.31.122.154"
            ],
            "gateways": [
                "10.31.122.1",
                "fe80::8",
                "fde6:7a:7d20:1b7a::1"
            ],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Wireless Network Connection",
            "id": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}",
            "name": "Wireless Network Connection",
            "description": "Dell Wireless 1504 802.11b\/g\/n (2.4GHz)",
            "type": "Wireless80211",
            "status": "Up",
            "bytes_received": "65193653255",
            "bytes_sent": "40343305577",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::59d0:b652:d20d:992f",
                "192.168.*.100"
            ],
            "gateways": [
                "192.168.*.*"
            ],
            "bind": true,
            "dns4": "208.67.222.222,58.6.115.42,5.45.96.220,37.235.1.174,205.204.88.60,1.1.1.1",
            "dns6": null
        },
        {
            "friendly": "Local Area Connection",
            "id": "{E39CE88C-C37D-4AE0-A6C4-46BEE2746D30}",
            "name": "Local Area Connection",
            "description": "Intel(R) 82579LM Gigabit Network Connection",
            "type": "Ethernet",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::ed51:8186:5e07:cdc7",
                "169.254.205.199"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Loopback Pseudo-Interface 1",
            "id": "{846EE342-7039-11DE-9D20-806E6F6E6963}",
            "name": "Loopback Pseudo-Interface 1",
            "description": "Software Loopback Interface 1",
            "type": "Loopback",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "::1",
                "127.0.0.1"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "isatap.{B8F798C7-0CF0-402D-812D-4BA6383544B8}",
            "id": "{53448994-B365-48D2-9FB5-236D0C5BBAD1}",
            "name": "isatap.{B8F798C7-0CF0-402D-812D-4BA6383544B8}",
            "description": "Microsoft ISATAP Adapter",
            "type": "Tunnel",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": false,
            "support_ipv6": true,
            "ips": [],
            "gateways": [],
            "bind": false,
            "dns4": null,
            "dns6": null
        },
        {
            "friendly": "isatap.home",
            "id": "{D5EF332A-3B86-4275-B208-F88DD91CD875}",
            "name": "isatap.home",
            "description": "Microsoft ISATAP Adapter #2",
            "type": "Tunnel",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": false,
            "support_ipv6": true,
            "ips": [
                "fe80::5efe:192.168.*.100"
            ],
            "gateways": [],
            "bind": true,
            "dns4": null,
            "dns6": null
        },
        {
            "friendly": "isatap.{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "id": "{22D6D43C-862A-4123-ADF4-23BD30F5E634}",
            "name": "isatap.{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
            "description": "Microsoft ISATAP Adapter #3",
            "type": "Tunnel",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": false,
            "support_ipv6": true,
            "ips": [
                "fe80::5efe:10.31.122.154"
            ],
            "gateways": [],
            "bind": true,
            "dns4": null,
            "dns6": null
        }
    ],
    "ipv4-default-gateway": "10.31.122.1",
    "ipv4-default-interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}",
    "ipv6-default-gateway": "fe80::8",
    "ipv6-default-interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}"
}
----------------------------
ipconfig /all:

Windows IP Configuration

   Host Name . . . . . . . . . . . . : E6530
   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : home

Unknown adapter Local Area Connection 3:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : TAP-Windows Adapter V9
   Physical Address. . . . . . . . . : 00-FF-F7-B0-F6-41
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : fde6:7a:7d20:1b7a::1098(Preferred)
   Link-local IPv6 Address . . . . . : fe80::4dbd:ef56:e76a:d79b%19(Preferred)
   IPv4 Address. . . . . . . . . . . : 10.31.122.154(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Monday, February 21, 2022 6:17:15 PM
   Lease Expires . . . . . . . . . . : Tuesday, February 21, 2023 6:17:14 PM
   Default Gateway . . . . . . . . . :
   DHCP Server . . . . . . . . . . . : 10.31.122.254
   DHCPv6 IAID . . . . . . . . . . . : 469827575
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1B-57-F1-B5-74-86-7A-69-7D-6D
   DNS Servers . . . . . . . . . . . : fde6:7a:7d20:1b7a::1
                                       10.31.122.1
   NetBIOS over Tcpip. . . . . . . . : Enabled

Wireless LAN adapter Wireless Network Connection:

   Connection-specific DNS Suffix  . : home
   Description . . . . . . . . . . . : Dell Wireless 1504 802.11b/g/n (2.4GHz)
   Physical Address. . . . . . . . . : B8-76-3F-25-D0-60
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::59d0:b652:d20d:992f%12(Preferred)
   IPv4 Address. . . . . . . . . . . : 192.168.*.100(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Saturday, February 19, 2022 9:57:48 PM
   Lease Expires . . . . . . . . . . : Tuesday, March 01, 2022 10:59:47 PM
   Default Gateway . . . . . . . . . : 192.168.*.*
   DHCP Server . . . . . . . . . . . : 192.168.*.*
   DHCPv6 IAID . . . . . . . . . . . : 230192703
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1B-57-F1-B5-74-86-7A-69-7D-6D
   DNS Servers . . . . . . . . . . . : 208.67.222.222
                                       58.6.115.42
                                       5.45.96.220
                                       37.235.1.174
                                       205.204.88.60
                                       1.1.1.1
   NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Local Area Connection:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : home
   Description . . . . . . . . . . . : Intel(R) 82579LM Gigabit Network Connection
   Physical Address. . . . . . . . . : 74-86-7A-69-7D-6D
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Tunnel adapter isatap.{B8F798C7-0CF0-402D-812D-4BA6383544B8}:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes

Tunnel adapter isatap.home:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : home
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter #2
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes

Tunnel adapter isatap.{F7B0F641-62BC-4F34-843B-5E584A42DCB4}:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter #3
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes

Edited ... by OpenSourcerer
Apply LOG format to logs

Share this post


Link to post

On suggestion, I tried connecting with an ethernet cable instead of WiFi. No noticeable difference.

After resetting Eddie to defaults, i recorded a week of tranquility as to ping times even when I disabled my torrent BW limit to max out the ISP assigned allotment and create a worst case scenario.

Then, for the first time in the 3 weeks I have been testing Eddie, I got that "Bootstrap Failure" alert 3 nights in a row.

After the initial install of Eddie and that surge in ping times over first 3 days to an average over 1000 ms, windows discovered 150 updates needed. After that process, I never experienced such disabling ping times again. They remained volatile but typically averaging under 500 ms.

Then, as I was experimenting with settings, trying to eliminate or instigate problems, it all settled down, for a week. I *think* this was preceded by turning off the block on IPv6. I had enabled that because my ISP does not support IPv6. Back to Eddie defaults.

Then I got that "Bootstrap failed" alert 2 nightsin a row and my connectivity was down/blocked? for hours. On the 3rd night, lost connectivity again around midnight but it seemed to reconnect automatically around 5 am while I was still afk. never saw any "Bootstrap failed" alert this time. I might have to put another computer online without Eddie to see if it is the ISP connection or Eddie blocking this one.






 

20220312 - Rural ASDL 15 day ping time graph_ca.png

Share this post


Link to post

Can you please try wintun adapter instead of TAP? In Eddie Preferences > Advanced, tick Use wintun driver and retry all your experiments. It is reported that this driver does a better job with tunnelling. Maybe your latency will drop considerably, too, and the stability will increase. You can also revert the protocol setting back to UDP.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...