$|$C0 1 Posted ... VPN Newbie Just installed Eddie on 2 Windows 7 Pro systems. One on cable in the city, one on a rural ASDL connection. System in the city is humming fine. Ping times typically under 70 ms. System in the boonies, not so much. BW seems ok, but not latency. Ping above 1500 ms with Eddie on. Under 70 with it off. My understanding is that this rural ISP does not support IPv6, but a geek told me that does not matter as AirVPN uses IPv4 for tunneling. Am I missing some setting option(s) to optimize Eddie with my rural system? Quote Share this post Link to post
OpenSourcerer 1416 Posted ... 20 minutes ago, $|$C0 said: but a geek told me that does not matter as AirVPN uses IPv4 for tunneling. Well, your contact speaks truly. You could disable v6 in Eddie (Networking > Layer IPv6 -> Block), see if that helps. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
$|$C0 1 Posted ... So far I am using the default settings. As I looked back over the 3 days I have been using Eddie, I saw a gradual creep on ping time on that ASDL line. After I stopped and restarted Eddie, the ping time was low at first, but within hours it began rising. Quote Share this post Link to post
OpenSourcerer 1416 Posted ... Logs > lifebelt icon on the right > copy/paste the output. We might need more info on your setup first. Don't bother about logs, they're in there as well. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
$|$C0 1 Posted ... (edited) Support suggested the gradual increase in ping times might be ISP traffic shaping. ISP claims it "does not monitor how you use our service" and my system logs tend to validate that claim. See 1st image. After trying Eddie with default settings for 3 days and getting ping times above 1500ms, these custom settings were enabled: For protocols: TCP, port 443, IP 3 For networking: Layer IPv6 was Blocked, connection protocol was set to IPv4 Only Test is proceeding but ping time is still high. See 2nd and 3rd images Tests through the 2nd day similar to running on default on the initial 3 days. It was the 3rd day when ping time got way out of hand. We'll see now if these settings changes hold for the next couple days. But even ping times in the 400 ms range as is currently is not optimal. Edited ... by $|$C0 adding image Quote Share this post Link to post
$|$C0 1 Posted ... (edited) Eddie System/Environment Report - 2/23/2022 - 2:07 PM UTC Eddie version: 2.20.0 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 7 Professional OS version: Microsoft Windows NT 6.1.7601 Service Pack 1 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN driver: 0901: 9.24.2; wintun: Not found OpenVPN: 2.5.1 - OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: () SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\*\*\*\AppData\Local\Eddie\default.profile Data path: C:\*\*\*\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (1 args) path="home" Network Lock Active: Yes, Windows Filtering Platform Connected to VPN: Yes, Tejat Detected DNS: fde6:7a:7d20:1b7a::1, 10.31.122.1, 208.67.222.222, 58.6.115.42, 5.45.96.220, 37.235.1.174, 205.204.88.60, 1.1.1.1 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 400 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Error: Fetch url error:SSL peer certificate or SSH remote key was not OK ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True connect: True netlock: True servers.whitelist: 402b3e70148b9d30900df01bc64e88d06a5bb1ea4bf6f6a706a300f7e0a9736e,68a3cf26ef90c5bfc11c4986eda57e3fc4610186f8ecdc6421f3159ad072de5b,754018c7e9fcbff567b14fed7d61181b355ff87abd849f2c540d1b62a44b57fe,a5ddea420fba1c6fa22eabebd95ae5d42425c097c266a2b25a40d8eeb0615db8,97d3f21c2f83893eeb5eea447a24adb7eacbc9b8fe563394c87545aa32a6d9cc,c7adec03f939e1d9174e78467018bfde9530fa07706299636afc64079c6b3fde,9eb4e9fec3d7fda83d74da42fba80a8e0a755d315d7f5190e429a41ec8c10cb9,af2e81b347e0620f2179b0bbcbe7712c08c958bb336e1764dfbf9d396324a378,7a6810765122ba4eed879a5dc71ad57a2240a3589c62ac06d6433121c182c0ef,f17154cf0682930a755b264d106104cc7a769ab6b724c0c3959fc3054563efb4,1e2270a6088e17c67aee04239f0a16ef08cb10d833059b5bd9e71c89984232fc,262b50b8289535b042fc434a962e3050cc083869dcd16253e06c91556a0d69a1,56c6eafbe65d79069d6ac79e7560eb42fa7a941e8ac3c0fa259bda2fbd2ee5db,029ce5313805eb04a279020131a2779e67a6b146093194467108b29b89725daa,18779a8cb8b16f965f3ff883ba0a270ab35a8f6728e88d4834a243a56fab1bff,4575725e1275fce5fd62bf4a17bd75863d3a3bfcd0dc632a65d128683193adf0,33c8256b9c7480388a7889393288f215f24170b204a2f9e1c94425a9830ec79a,be8ff3428e34718903b63c0a3bb5d462fb60e9467bfaf51704d369851003bada,00c5ced917bfaa14617710448aad743f41fbff55013655e41e047be1d5819d30,165b49c37f4de697229e0b40a94dab51aaf779c223da14774ff0dc1eadfb9b74,21ec07747b840a44028ad0668aa412ddd9e972a653cea9911b053026090dfe96,f315cae62bfe63c53920058f00a0715dc07f3ef9ef1b8d5ad9dfb8a2b5a5c3e6 servers.startlast: True mode.protocol: TCP mode.alt: 2 network.entry.iplayer: ipv4-only network.ipv6.mode: block ---------------------------- Logs: . 2022.02.21 18:17:02 - Eddie version: 2.20.0 / windows_x64, System: Windows, Name: Windows 7 Professional, Version: Microsoft Windows NT 6.1.7601 Service Pack 1, Mono/.Net: v4.0.30319 . 2022.02.21 18:17:02 - Command line arguments (1): path="home" . 2022.02.21 18:17:03 - Profile path: C:\*\*\*\AppData\Local\Eddie\default.profile . 2022.02.21 18:17:03 - Reading options from C:\*\*\*\AppData\Local\Eddie\default.profile . 2022.02.21 18:17:06 - Tun Driver - 0901: 9.24.2; wintun: Not found . 2022.02.21 18:17:06 - OpenVPN - Version: 2.5.1 - OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2022.02.21 18:17:06 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe) . 2022.02.21 18:17:06 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) ! 2022.02.21 18:17:07 - Activation of Network Lock - Windows Filtering Platform I 2022.02.21 18:17:08 - Ready . 2022.02.21 18:17:09 - Collect information about AirVPN completed I 2022.02.21 18:17:09 - Session starting. . 2022.02.21 18:17:09 - Waiting for latency tests (32 to go) . 2022.02.21 18:17:10 - Collect information about AirVPN completed . 2022.02.21 18:17:10 - Waiting for latency tests (4 to go) I 2022.02.21 18:17:13 - Checking authorization ... ! 2022.02.21 18:17:14 - Connecting to Tejat (Canada, Toronto, Ontario) . 2022.02.21 18:17:14 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.02.21 18:17:14 - OpenVPN > Windows version 6.1 (Windows 7) 64bit . 2022.02.21 18:17:14 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.02.21 18:17:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.21 18:17:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.21 18:17:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.21 18:17:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.21 18:17:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.197:443 . 2022.02.21 18:17:14 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144] . 2022.02.21 18:17:14 - OpenVPN > UDP link local: (not bound) . 2022.02.21 18:17:14 - OpenVPN > UDP link remote: [AF_INET]184.75.221.197:443 . 2022.02.21 18:17:14 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.197:443, sid=cadb7164 3e5f2c9c . 2022.02.21 18:17:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.21 18:17:14 - OpenVPN > VERIFY KU OK . 2022.02.21 18:17:14 - OpenVPN > Validating certificate extended key usage . 2022.02.21 18:17:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.21 18:17:14 - OpenVPN > VERIFY EKU OK . 2022.02.21 18:17:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.21 18:17:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.21 18:17:14 - OpenVPN > [Tejat] Peer Connection Initiated with [AF_INET]184.75.221.197:443 . 2022.02.21 18:17:15 - OpenVPN > SENT CONTROL [Tejat]: 'PUSH_REQUEST' (status=1) . 2022.02.21 18:17:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.122.1,dhcp-option DNS6 fde6:7a:7d20:1b7a::1,tun-ipv6,route-gateway 10.31.122.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1b7a::1098/64 fde6:7a:7d20:1b7a::1,ifconfig 10.31.122.154 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2022.02.21 18:17:15 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.02.21 18:17:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.02.21 18:17:15 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.02.21 18:17:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.02.21 18:17:15 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.02.21 18:17:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.02.21 18:17:15 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.02.21 18:17:15 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.02.21 18:17:15 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.02.21 18:17:15 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.02.21 18:17:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.21 18:17:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.21 18:17:15 - OpenVPN > interactive service msg_channel=0 . 2022.02.21 18:17:15 - OpenVPN > ROUTE_GATEWAY 192.168.*.*/255.255.255.0 I=12 HWADDR=b8:76:3f:25:d0:60 . 2022.02.21 18:17:15 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2022.02.21 18:17:15 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found. (code=1168) . 2022.02.21 18:17:15 - OpenVPN > ROUTE6: default_gateway=UNDEF . 2022.02.21 18:17:15 - OpenVPN > open_tun . 2022.02.21 18:17:15 - OpenVPN > tap-windows6 device [Local Area Connection 3] opened . 2022.02.21 18:17:15 - OpenVPN > TAP-Windows Driver Version 9.24 . 2022.02.21 18:17:15 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.31.122.0/10.31.122.154/255.255.255.0 [SUCCEEDED] . 2022.02.21 18:17:15 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.31.122.154/255.255.255.0 on interface {F7B0F641-62BC-4F34-843B-5E584A42DCB4} [DHCP-serv: 10.31.122.254, lease-time: 31536000] . 2022.02.21 18:17:15 - OpenVPN > Successful ARP Flush on interface [19] {F7B0F641-62BC-4F34-843B-5E584A42DCB4} . 2022.02.21 18:17:15 - OpenVPN > IPv4 MTU set to 1500 on interface 19 using SetIpInterfaceEntry() . 2022.02.21 18:17:15 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 19 fde6:7a:7d20:1b7a::1098/128 store=active . 2022.02.21 18:17:15 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1b7a::/64 -> fde6:7a:7d20:1b7a::1098 metric 0) dev Local Area Connection 3 . 2022.02.21 18:17:15 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1b7a::/64 19 fe80::8 store=active . 2022.02.21 18:17:15 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2022.02.21 18:17:15 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 19 all . 2022.02.21 18:17:15 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns 19 static fde6:7a:7d20:1b7a::1 validate=no . 2022.02.21 18:17:15 - OpenVPN > IPv6 MTU set to 1500 on interface 19 using SetIpInterfaceEntry() . 2022.02.21 18:17:20 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2022.02.21 18:17:20 - OpenVPN > C:\Windows\system32\route.exe ADD 184.75.221.197 MASK 255.255.255.255 192.168.*.* . 2022.02.21 18:17:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.02.21 18:17:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.21 18:17:20 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.31.122.1 . 2022.02.21 18:17:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2022.02.21 18:17:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.21 18:17:20 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.31.122.1 . 2022.02.21 18:17:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2022.02.21 18:17:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.21 18:17:20 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1b7a::1 metric -1) dev Local Area Connection 3 . 2022.02.21 18:17:20 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route ::/3 19 fe80::8 store=active . 2022.02.21 18:17:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2022.02.21 18:17:20 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1b7a::1 metric -1) dev Local Area Connection 3 . 2022.02.21 18:17:20 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 2000::/4 19 fe80::8 store=active . 2022.02.21 18:17:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2022.02.21 18:17:20 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1b7a::1 metric -1) dev Local Area Connection 3 . 2022.02.21 18:17:20 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 3000::/4 19 fe80::8 store=active . 2022.02.21 18:17:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2022.02.21 18:17:20 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1b7a::1 metric -1) dev Local Area Connection 3 . 2022.02.21 18:17:20 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fc00::/7 19 fe80::8 store=active . 2022.02.21 18:17:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2022.02.21 18:17:20 - Interface Local Area Connection 3 metric changed from Automatic to 3, layer IPv4 . 2022.02.21 18:17:20 - Interface Local Area Connection 3 metric changed from Automatic to 3, layer IPv6 . 2022.02.21 18:17:20 - DNS leak protection with packet filtering enabled. . 2022.02.21 18:17:20 - DNS IPv4 of a network adapter forced (Local Area Connection 3, from automatic to 10.31.122.1) . 2022.02.21 18:17:20 - DNS IPv6 of a network adapter forced (Local Area Connection 3, from automatic to fde6:7a:7d20:1b7a::1) . 2022.02.21 18:17:20 - Routes, added a new route, 184.75.221.195 for gateway 10.31.122.1 . 2022.02.21 18:17:20 - Routes, added a new route, 2606:6080:1001:15:45d:2b31:f931:2e2 for gateway fde6:7a:7d20:1b7a::1 . 2022.02.21 18:17:20 - Flushing DNS I 2022.02.21 18:17:20 - Checking route IPv4 I 2022.02.21 18:17:21 - Checking route IPv6 I 2022.02.21 18:17:26 - Checking DNS ! 2022.02.21 18:17:27 - Connected. . 2022.02.21 18:17:27 - OpenVPN > Initialization Sequence Completed . 2022.02.21 18:47:18 - Collect information about AirVPN completed . 2022.02.21 19:13:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.21 19:13:50 - OpenVPN > VERIFY KU OK . 2022.02.21 19:13:50 - OpenVPN > Validating certificate extended key usage . 2022.02.21 19:13:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.21 19:13:50 - OpenVPN > VERIFY EKU OK . 2022.02.21 19:13:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.21 19:13:50 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.21 19:13:50 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.21 19:13:50 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.21 19:17:28 - Collect information about AirVPN completed . 2022.02.21 20:10:26 - Above log line repeated 1 times more . 2022.02.21 20:10:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.21 20:10:26 - OpenVPN > VERIFY KU OK . 2022.02.21 20:10:26 - OpenVPN > Validating certificate extended key usage . 2022.02.21 20:10:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.21 20:10:26 - OpenVPN > VERIFY EKU OK . 2022.02.21 20:10:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.21 20:10:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.21 20:10:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.21 20:10:28 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.21 20:17:40 - Collect information about AirVPN completed . 2022.02.21 21:05:40 - Above log line repeated 1 times more . 2022.02.21 21:05:40 - Elevated: Command:service-conn-mode . 2022.02.21 21:07:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.21 21:07:04 - OpenVPN > VERIFY KU OK . 2022.02.21 21:07:04 - OpenVPN > Validating certificate extended key usage . 2022.02.21 21:07:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.21 21:07:04 - OpenVPN > VERIFY EKU OK . 2022.02.21 21:07:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.21 21:07:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.21 21:07:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.21 21:07:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.21 21:17:42 - Collect information about AirVPN completed . 2022.02.21 22:03:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.21 22:03:40 - OpenVPN > VERIFY KU OK . 2022.02.21 22:03:40 - OpenVPN > Validating certificate extended key usage . 2022.02.21 22:03:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.21 22:03:40 - OpenVPN > VERIFY EKU OK . 2022.02.21 22:03:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.21 22:03:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.21 22:03:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.21 22:03:42 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.21 23:00:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.21 23:00:18 - OpenVPN > VERIFY KU OK . 2022.02.21 23:00:18 - OpenVPN > Validating certificate extended key usage . 2022.02.21 23:00:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.21 23:00:18 - OpenVPN > VERIFY EKU OK . 2022.02.21 23:00:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.21 23:00:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.21 23:00:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.21 23:00:18 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.21 23:56:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.21 23:56:56 - OpenVPN > VERIFY KU OK . 2022.02.21 23:56:56 - OpenVPN > Validating certificate extended key usage . 2022.02.21 23:56:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.21 23:56:56 - OpenVPN > VERIFY EKU OK . 2022.02.21 23:56:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.21 23:56:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.21 23:56:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.21 23:56:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 00:53:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 00:53:32 - OpenVPN > VERIFY KU OK . 2022.02.22 00:53:32 - OpenVPN > Validating certificate extended key usage . 2022.02.22 00:53:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 00:53:32 - OpenVPN > VERIFY EKU OK . 2022.02.22 00:53:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 00:53:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 00:53:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 00:53:32 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 01:50:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 01:50:10 - OpenVPN > VERIFY KU OK . 2022.02.22 01:50:10 - OpenVPN > Validating certificate extended key usage . 2022.02.22 01:50:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 01:50:10 - OpenVPN > VERIFY EKU OK . 2022.02.22 01:50:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 01:50:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 01:50:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 01:50:10 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 02:46:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 02:46:48 - OpenVPN > VERIFY KU OK . 2022.02.22 02:46:48 - OpenVPN > Validating certificate extended key usage . 2022.02.22 02:46:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 02:46:48 - OpenVPN > VERIFY EKU OK . 2022.02.22 02:46:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 02:46:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 02:46:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 02:46:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 03:43:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 03:43:27 - OpenVPN > VERIFY KU OK . 2022.02.22 03:43:27 - OpenVPN > Validating certificate extended key usage . 2022.02.22 03:43:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 03:43:27 - OpenVPN > VERIFY EKU OK . 2022.02.22 03:43:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 03:43:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 03:43:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 03:43:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 04:40:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 04:40:04 - OpenVPN > VERIFY KU OK . 2022.02.22 04:40:04 - OpenVPN > Validating certificate extended key usage . 2022.02.22 04:40:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 04:40:04 - OpenVPN > VERIFY EKU OK . 2022.02.22 04:40:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 04:40:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 04:40:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 04:40:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 05:36:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 05:36:43 - OpenVPN > VERIFY KU OK . 2022.02.22 05:36:43 - OpenVPN > Validating certificate extended key usage . 2022.02.22 05:36:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 05:36:43 - OpenVPN > VERIFY EKU OK . 2022.02.22 05:36:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 05:36:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 05:36:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 05:36:43 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 06:33:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 06:33:19 - OpenVPN > VERIFY KU OK . 2022.02.22 06:33:19 - OpenVPN > Validating certificate extended key usage . 2022.02.22 06:33:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 06:33:19 - OpenVPN > VERIFY EKU OK . 2022.02.22 06:33:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 06:33:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 06:33:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 06:33:19 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 07:11:44 - Elevated: Command:service-conn-mode . 2022.02.22 07:29:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 07:29:57 - OpenVPN > VERIFY KU OK . 2022.02.22 07:29:57 - OpenVPN > Validating certificate extended key usage . 2022.02.22 07:29:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 07:29:57 - OpenVPN > VERIFY EKU OK . 2022.02.22 07:29:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 07:29:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 07:29:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 07:29:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 08:26:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 08:26:34 - OpenVPN > VERIFY KU OK . 2022.02.22 08:26:34 - OpenVPN > Validating certificate extended key usage . 2022.02.22 08:26:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 08:26:34 - OpenVPN > VERIFY EKU OK . 2022.02.22 08:26:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 08:26:34 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 08:26:34 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 08:26:34 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 09:23:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 09:23:10 - OpenVPN > VERIFY KU OK . 2022.02.22 09:23:10 - OpenVPN > Validating certificate extended key usage . 2022.02.22 09:23:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 09:23:10 - OpenVPN > VERIFY EKU OK . 2022.02.22 09:23:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 09:23:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 09:23:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 09:23:10 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 10:19:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 10:19:48 - OpenVPN > VERIFY KU OK . 2022.02.22 10:19:48 - OpenVPN > Validating certificate extended key usage . 2022.02.22 10:19:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 10:19:48 - OpenVPN > VERIFY EKU OK . 2022.02.22 10:19:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 10:19:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 10:19:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 10:19:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 11:16:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 11:16:30 - OpenVPN > VERIFY KU OK . 2022.02.22 11:16:30 - OpenVPN > Validating certificate extended key usage . 2022.02.22 11:16:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 11:16:30 - OpenVPN > VERIFY EKU OK . 2022.02.22 11:16:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 11:16:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 11:16:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 11:16:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 12:13:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 12:13:09 - OpenVPN > VERIFY KU OK . 2022.02.22 12:13:09 - OpenVPN > Validating certificate extended key usage . 2022.02.22 12:13:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 12:13:09 - OpenVPN > VERIFY EKU OK . 2022.02.22 12:13:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 12:13:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 12:13:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 12:13:09 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 12:22:54 - ping 1 . 2022.02.22 12:22:54 - ping 2 W . 2022.02.22 12:22:55 - ping 2 WE . 2022.02.22 13:09:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 13:09:51 - OpenVPN > VERIFY KU OK . 2022.02.22 13:09:51 - OpenVPN > Validating certificate extended key usage . 2022.02.22 13:09:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 13:09:51 - OpenVPN > VERIFY EKU OK . 2022.02.22 13:09:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 13:09:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 13:09:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 13:09:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 14:06:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 14:06:29 - OpenVPN > VERIFY KU OK . 2022.02.22 14:06:29 - OpenVPN > Validating certificate extended key usage . 2022.02.22 14:06:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 14:06:29 - OpenVPN > VERIFY EKU OK . 2022.02.22 14:06:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 14:06:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 14:06:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 14:06:29 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 15:03:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 15:03:08 - OpenVPN > VERIFY KU OK . 2022.02.22 15:03:08 - OpenVPN > Validating certificate extended key usage . 2022.02.22 15:03:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 15:03:08 - OpenVPN > VERIFY EKU OK . 2022.02.22 15:03:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 15:03:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 15:03:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 15:03:08 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 15:59:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 15:59:45 - OpenVPN > VERIFY KU OK . 2022.02.22 15:59:45 - OpenVPN > Validating certificate extended key usage . 2022.02.22 15:59:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 15:59:45 - OpenVPN > VERIFY EKU OK . 2022.02.22 15:59:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 15:59:45 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 15:59:45 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 15:59:45 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 16:56:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 16:56:21 - OpenVPN > VERIFY KU OK . 2022.02.22 16:56:21 - OpenVPN > Validating certificate extended key usage . 2022.02.22 16:56:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 16:56:21 - OpenVPN > VERIFY EKU OK . 2022.02.22 16:56:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 16:56:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 16:56:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 16:56:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 17:52:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 17:52:59 - OpenVPN > VERIFY KU OK . 2022.02.22 17:52:59 - OpenVPN > Validating certificate extended key usage . 2022.02.22 17:52:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 17:52:59 - OpenVPN > VERIFY EKU OK . 2022.02.22 17:52:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 17:52:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 17:52:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 17:52:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 18:49:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 18:49:35 - OpenVPN > VERIFY KU OK . 2022.02.22 18:49:35 - OpenVPN > Validating certificate extended key usage . 2022.02.22 18:49:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 18:49:35 - OpenVPN > VERIFY EKU OK . 2022.02.22 18:49:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 18:49:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 18:49:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 18:49:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 19:46:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 19:46:11 - OpenVPN > VERIFY KU OK . 2022.02.22 19:46:11 - OpenVPN > Validating certificate extended key usage . 2022.02.22 19:46:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 19:46:11 - OpenVPN > VERIFY EKU OK . 2022.02.22 19:46:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 19:46:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 19:46:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 19:46:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 20:42:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 20:42:48 - OpenVPN > VERIFY KU OK . 2022.02.22 20:42:48 - OpenVPN > Validating certificate extended key usage . 2022.02.22 20:42:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 20:42:48 - OpenVPN > VERIFY EKU OK . 2022.02.22 20:42:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 20:42:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 20:42:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 20:42:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 21:39:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 21:39:24 - OpenVPN > VERIFY KU OK . 2022.02.22 21:39:24 - OpenVPN > Validating certificate extended key usage . 2022.02.22 21:39:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 21:39:24 - OpenVPN > VERIFY EKU OK . 2022.02.22 21:39:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 21:39:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 21:39:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 21:39:26 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 22:36:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 22:36:02 - OpenVPN > VERIFY KU OK . 2022.02.22 22:36:02 - OpenVPN > Validating certificate extended key usage . 2022.02.22 22:36:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 22:36:02 - OpenVPN > VERIFY EKU OK . 2022.02.22 22:36:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 22:36:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 22:36:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 22:36:02 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.22 23:32:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.22 23:32:40 - OpenVPN > VERIFY KU OK . 2022.02.22 23:32:40 - OpenVPN > Validating certificate extended key usage . 2022.02.22 23:32:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.22 23:32:40 - OpenVPN > VERIFY EKU OK . 2022.02.22 23:32:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.22 23:32:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 23:32:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.22 23:32:40 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.23 00:29:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.23 00:29:16 - OpenVPN > VERIFY KU OK . 2022.02.23 00:29:16 - OpenVPN > Validating certificate extended key usage . 2022.02.23 00:29:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.23 00:29:16 - OpenVPN > VERIFY EKU OK . 2022.02.23 00:29:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.23 00:29:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 00:29:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 00:29:16 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.23 01:25:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.23 01:25:52 - OpenVPN > VERIFY KU OK . 2022.02.23 01:25:52 - OpenVPN > Validating certificate extended key usage . 2022.02.23 01:25:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.23 01:25:52 - OpenVPN > VERIFY EKU OK . 2022.02.23 01:25:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.23 01:25:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 01:25:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 01:25:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.23 02:22:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.23 02:22:28 - OpenVPN > VERIFY KU OK . 2022.02.23 02:22:28 - OpenVPN > Validating certificate extended key usage . 2022.02.23 02:22:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.23 02:22:28 - OpenVPN > VERIFY EKU OK . 2022.02.23 02:22:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.23 02:22:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 02:22:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 02:22:28 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.23 03:19:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.23 03:19:04 - OpenVPN > VERIFY KU OK . 2022.02.23 03:19:04 - OpenVPN > Validating certificate extended key usage . 2022.02.23 03:19:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.23 03:19:04 - OpenVPN > VERIFY EKU OK . 2022.02.23 03:19:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.23 03:19:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 03:19:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 03:19:04 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.23 04:15:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.23 04:15:40 - OpenVPN > VERIFY KU OK . 2022.02.23 04:15:40 - OpenVPN > Validating certificate extended key usage . 2022.02.23 04:15:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.23 04:15:40 - OpenVPN > VERIFY EKU OK . 2022.02.23 04:15:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.23 04:15:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 04:15:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 04:15:40 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.23 05:12:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.23 05:12:16 - OpenVPN > VERIFY KU OK . 2022.02.23 05:12:16 - OpenVPN > Validating certificate extended key usage . 2022.02.23 05:12:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.23 05:12:16 - OpenVPN > VERIFY EKU OK . 2022.02.23 05:12:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.23 05:12:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 05:12:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 05:12:16 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.23 06:08:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.23 06:08:58 - OpenVPN > VERIFY KU OK . 2022.02.23 06:08:58 - OpenVPN > Validating certificate extended key usage . 2022.02.23 06:08:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.23 06:08:58 - OpenVPN > VERIFY EKU OK . 2022.02.23 06:08:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.23 06:08:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 06:08:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 06:08:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.23 07:05:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.23 07:05:36 - OpenVPN > VERIFY KU OK . 2022.02.23 07:05:36 - OpenVPN > Validating certificate extended key usage . 2022.02.23 07:05:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.23 07:05:36 - OpenVPN > VERIFY EKU OK . 2022.02.23 07:05:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.23 07:05:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 07:05:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 07:05:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.23 08:02:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.23 08:02:14 - OpenVPN > VERIFY KU OK . 2022.02.23 08:02:14 - OpenVPN > Validating certificate extended key usage . 2022.02.23 08:02:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.23 08:02:14 - OpenVPN > VERIFY EKU OK . 2022.02.23 08:02:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.23 08:02:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 08:02:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 08:02:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.23 08:58:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.23 08:58:51 - OpenVPN > VERIFY KU OK . 2022.02.23 08:58:51 - OpenVPN > Validating certificate extended key usage . 2022.02.23 08:58:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.23 08:58:51 - OpenVPN > VERIFY EKU OK . 2022.02.23 08:58:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org . 2022.02.23 08:58:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 08:58:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.23 08:58:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.23 09:07:34 - ping 1 . 2022.02.23 09:07:34 - ping 2 W . 2022.02.23 09:07:39 - ping 2 WE ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}", "gateway": "192.168.*.*", "metric": "25" }, { "address": "0.0.0.0\/1", "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "gateway": "10.31.122.1", "metric": "3" }, { "address": "10.31.122.0\/24", "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "gateway": "link", "metric": "259" }, { "address": "10.31.122.154", "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "gateway": "link", "metric": "259" }, { "address": "10.31.122.255", "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "gateway": "link", "metric": "259" }, { "address": "127.0.0.0\/8", "interface": "{846EE342-7039-11DE-9D20-806E6F6E6963}", "gateway": "link", "metric": "306" }, { "address": "127.0.0.1", "interface": "{846EE342-7039-11DE-9D20-806E6F6E6963}", "gateway": "link", "metric": "306" }, { "address": "127.255.255.255", "interface": "{846EE342-7039-11DE-9D20-806E6F6E6963}", "gateway": "link", "metric": "306" }, { "address": "128.0.0.0\/1", "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "gateway": "10.31.122.1", "metric": "3" }, { "address": "184.75.221.195", "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "gateway": "10.31.122.1", "metric": "4" }, { "address": "184.75.221.197", "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}", "gateway": "192.168.*.*", "metric": "25" }, { "address": "192.168.*.0\/24", "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}", "gateway": "link", "metric": "281" }, { "address": "192.168.*.100", "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}", "gateway": "link", "metric": "281" }, { "address": "192.168.*.255", "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}", "gateway": "link", "metric": "281" }, { "address": "224.0.0.0\/4", "interface": "{846EE342-7039-11DE-9D20-806E6F6E6963}", "gateway": "link", "metric": "306" }, { "address": "224.0.0.0\/4", "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "gateway": "link", "metric": "259" }, { "address": "224.0.0.0\/4", "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}", "gateway": "link", "metric": "281" }, { "address": "255.255.255.255", "interface": "{846EE342-7039-11DE-9D20-806E6F6E6963}", "gateway": "link", "metric": "306" }, { "address": "255.255.255.255", "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "gateway": "link", "metric": "259" }, { "address": "255.255.255.255", "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}", "gateway": "link", "metric": "281" }, { "address": "::\/3", "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "gateway": "fe80::8", "metric": "259" }, { "address": "::1", "interface": "{846EE342-7039-11DE-9D20-806E6F6E6963}", "gateway": "link", "metric": "306" }, { "address": "2000::\/4", "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "gateway": "fe80::8", "metric": "259" }, { "address": "2606:6080:1001:15:45d:2b31:f931:2e2", "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "gateway": "fde6:7a:7d20:1b7a::1", "metric": "259" }, { "address": "3000::\/4", "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "gateway": "fe80::8", "metric": "259" }, { "address": "fc00::\/7", "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "gateway": "fe80::8", "metric": "259" }, { "address": "fde6:7a:7d20:1b7a::\/64", "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "gateway": "fe80::8", "metric": "259" }, { "address": "fde6:7a:7d20:1b7a::1098", "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "gateway": "link", "metric": "259" }, { "address": "fe80::\/64", "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "gateway": "link", "metric": "259" }, { "address": "fe80::\/64", "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}", "gateway": "link", "metric": "281" }, { "address": "fe80::4dbd:ef56:e76a:d79b", "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "gateway": "link", "metric": "259" }, { "address": "fe80::59d0:b652:d20d:992f", "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}", "gateway": "link", "metric": "281" }, { "address": "ff00::\/8", "interface": "{846EE342-7039-11DE-9D20-806E6F6E6963}", "gateway": "link", "metric": "306" }, { "address": "ff00::\/8", "interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "gateway": "link", "metric": "259" }, { "address": "ff00::\/8", "interface": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}", "gateway": "link", "metric": "281" }, { "address": "2606:6080:1001:15:45d:2b31:f931:2e2", "gateway": "fde6:7a:7d20:1b7a::1", "metric": "4294967295" } ], "interfaces": [ { "friendly": "Local Area Connection 3", "id": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "name": "Local Area Connection 3", "description": "TAP-Windows Adapter V9", "type": "Virtual", "status": "Up", "bytes_received": "49700286070", "bytes_sent": "31929874261", "support_ipv4": true, "support_ipv6": true, "ips": [ "fde6:7a:7d20:1b7a::1098", "fe80::4dbd:ef56:e76a:d79b", "10.31.122.154" ], "gateways": [ "10.31.122.1", "fe80::8", "fde6:7a:7d20:1b7a::1" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Wireless Network Connection", "id": "{B8F798C7-0CF0-402D-812D-4BA6383544B8}", "name": "Wireless Network Connection", "description": "Dell Wireless 1504 802.11b\/g\/n (2.4GHz)", "type": "Wireless80211", "status": "Up", "bytes_received": "65193653255", "bytes_sent": "40343305577", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::59d0:b652:d20d:992f", "192.168.*.100" ], "gateways": [ "192.168.*.*" ], "bind": true, "dns4": "208.67.222.222,58.6.115.42,5.45.96.220,37.235.1.174,205.204.88.60,1.1.1.1", "dns6": null }, { "friendly": "Local Area Connection", "id": "{E39CE88C-C37D-4AE0-A6C4-46BEE2746D30}", "name": "Local Area Connection", "description": "Intel(R) 82579LM Gigabit Network Connection", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::ed51:8186:5e07:cdc7", "169.254.205.199" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{846EE342-7039-11DE-9D20-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "isatap.{B8F798C7-0CF0-402D-812D-4BA6383544B8}", "id": "{53448994-B365-48D2-9FB5-236D0C5BBAD1}", "name": "isatap.{B8F798C7-0CF0-402D-812D-4BA6383544B8}", "description": "Microsoft ISATAP Adapter", "type": "Tunnel", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": false, "support_ipv6": true, "ips": [], "gateways": [], "bind": false, "dns4": null, "dns6": null }, { "friendly": "isatap.home", "id": "{D5EF332A-3B86-4275-B208-F88DD91CD875}", "name": "isatap.home", "description": "Microsoft ISATAP Adapter #2", "type": "Tunnel", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": false, "support_ipv6": true, "ips": [ "fe80::5efe:192.168.*.100" ], "gateways": [], "bind": true, "dns4": null, "dns6": null }, { "friendly": "isatap.{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "id": "{22D6D43C-862A-4123-ADF4-23BD30F5E634}", "name": "isatap.{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "description": "Microsoft ISATAP Adapter #3", "type": "Tunnel", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": false, "support_ipv6": true, "ips": [ "fe80::5efe:10.31.122.154" ], "gateways": [], "bind": true, "dns4": null, "dns6": null } ], "ipv4-default-gateway": "10.31.122.1", "ipv4-default-interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}", "ipv6-default-gateway": "fe80::8", "ipv6-default-interface": "{F7B0F641-62BC-4F34-843B-5E584A42DCB4}" } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : E6530 Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : home Unknown adapter Local Area Connection 3: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-F7-B0-F6-41 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : fde6:7a:7d20:1b7a::1098(Preferred) Link-local IPv6 Address . . . . . : fe80::4dbd:ef56:e76a:d79b%19(Preferred) IPv4 Address. . . . . . . . . . . : 10.31.122.154(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Monday, February 21, 2022 6:17:15 PM Lease Expires . . . . . . . . . . : Tuesday, February 21, 2023 6:17:14 PM Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.31.122.254 DHCPv6 IAID . . . . . . . . . . . : 469827575 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1B-57-F1-B5-74-86-7A-69-7D-6D DNS Servers . . . . . . . . . . . : fde6:7a:7d20:1b7a::1 10.31.122.1 NetBIOS over Tcpip. . . . . . . . : Enabled Wireless LAN adapter Wireless Network Connection: Connection-specific DNS Suffix . : home Description . . . . . . . . . . . : Dell Wireless 1504 802.11b/g/n (2.4GHz) Physical Address. . . . . . . . . : B8-76-3F-25-D0-60 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::59d0:b652:d20d:992f%12(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.*.100(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Saturday, February 19, 2022 9:57:48 PM Lease Expires . . . . . . . . . . : Tuesday, March 01, 2022 10:59:47 PM Default Gateway . . . . . . . . . : 192.168.*.* DHCP Server . . . . . . . . . . . : 192.168.*.* DHCPv6 IAID . . . . . . . . . . . : 230192703 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1B-57-F1-B5-74-86-7A-69-7D-6D DNS Servers . . . . . . . . . . . : 208.67.222.222 58.6.115.42 5.45.96.220 37.235.1.174 205.204.88.60 1.1.1.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Local Area Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : home Description . . . . . . . . . . . : Intel(R) 82579LM Gigabit Network Connection Physical Address. . . . . . . . . : 74-86-7A-69-7D-6D DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Tunnel adapter isatap.{B8F798C7-0CF0-402D-812D-4BA6383544B8}: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft ISATAP Adapter Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Tunnel adapter isatap.home: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : home Description . . . . . . . . . . . : Microsoft ISATAP Adapter #2 Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Tunnel adapter isatap.{F7B0F641-62BC-4F34-843B-5E584A42DCB4}: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft ISATAP Adapter #3 Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Edited ... by OpenSourcerer Apply LOG format to logs Quote Share this post Link to post
$|$C0 1 Posted ... On suggestion, I tried connecting with an ethernet cable instead of WiFi. No noticeable difference. After resetting Eddie to defaults, i recorded a week of tranquility as to ping times even when I disabled my torrent BW limit to max out the ISP assigned allotment and create a worst case scenario. Then, for the first time in the 3 weeks I have been testing Eddie, I got that "Bootstrap Failure" alert 3 nights in a row. After the initial install of Eddie and that surge in ping times over first 3 days to an average over 1000 ms, windows discovered 150 updates needed. After that process, I never experienced such disabling ping times again. They remained volatile but typically averaging under 500 ms. Then, as I was experimenting with settings, trying to eliminate or instigate problems, it all settled down, for a week. I *think* this was preceded by turning off the block on IPv6. I had enabled that because my ISP does not support IPv6. Back to Eddie defaults. Then I got that "Bootstrap failed" alert 2 nightsin a row and my connectivity was down/blocked? for hours. On the 3rd night, lost connectivity again around midnight but it seemed to reconnect automatically around 5 am while I was still afk. never saw any "Bootstrap failed" alert this time. I might have to put another computer online without Eddie to see if it is the ISP connection or Eddie blocking this one. Quote Share this post Link to post
OpenSourcerer 1416 Posted ... Can you please try wintun adapter instead of TAP? In Eddie Preferences > Advanced, tick Use wintun driver and retry all your experiments. It is reported that this driver does a better job with tunnelling. Maybe your latency will drop considerably, too, and the stability will increase. You can also revert the protocol setting back to UDP. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post