MrRandom 6 Posted ... I've used AirVPN for years and in the past it would run for weeks without disconnecting and reconnecting now I'm lucky if it makes it a whole day, yesterday it only lasted about 8 hours. I've also been having a problem lately with being connectable after AirVPN reconnects, sometimes I'm still connectable but most of the time I'm not. I know that's not a problem with AirVPN but with the frequent reconnects it's made something that required no interaction on my part something I have to constantly monitor and mess with. I know my ISP (Comcast) has been messing with something for a few year now because I was getting about 99% of my speed then over night when they increased their speed and pushed new firmware my speed dropped to about 1/3 of what it was and it remains just a fraction of my actual speed to this day. Since that day I can also no longer use UDP, I've learned to live with the speed and found work arounds for all the other errors I was getting but this instability is becoming VERY inconvenient. For probably a couple years I was using TCP Port 443 IP 3 but the reconnects were happening every few hours so I switched to TCP Port 41185 IP 4 which seemed to make the connection last longer, sometimes a few days but the reconnects seem to be getting more frequent again. Looking at my logs it's always the same error that precedes the disconnect and reconnect... OpenVPN > read TCP_CLIENT: Unknown error (code=10060) I don't know if my ISP is doing something to cause it or if it's a problem with Eddie or something else but any help would be appreciated very much. Here's the log I saved just after the last reconnect. . 2022.03.21 00:38:35 - Above log line repeated 1 times more . 2022.03.21 00:38:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 00:38:35 - OpenVPN > VERIFY KU OK . 2022.03.21 00:38:35 - OpenVPN > Validating certificate extended key usage . 2022.03.21 00:38:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 00:38:35 - OpenVPN > VERIFY EKU OK . 2022.03.21 00:38:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 00:38:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 00:38:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 00:38:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 00:54:58 - Collect information about AirVPN completed . 2022.03.21 01:37:47 - Above log line repeated 1 times more . 2022.03.21 01:37:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 01:37:47 - OpenVPN > VERIFY KU OK . 2022.03.21 01:37:47 - OpenVPN > Validating certificate extended key usage . 2022.03.21 01:37:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 01:37:47 - OpenVPN > VERIFY EKU OK . 2022.03.21 01:37:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 01:37:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 01:37:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 01:37:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 01:55:10 - Collect information about AirVPN completed . 2022.03.21 02:36:59 - Above log line repeated 1 times more . 2022.03.21 02:36:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 02:36:59 - OpenVPN > VERIFY KU OK . 2022.03.21 02:36:59 - OpenVPN > Validating certificate extended key usage . 2022.03.21 02:36:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 02:36:59 - OpenVPN > VERIFY EKU OK . 2022.03.21 02:36:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 02:36:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 02:36:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 02:36:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 02:55:24 - Collect information about AirVPN completed . 2022.03.21 03:36:11 - Above log line repeated 1 times more . 2022.03.21 03:36:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 03:36:11 - OpenVPN > VERIFY KU OK . 2022.03.21 03:36:11 - OpenVPN > Validating certificate extended key usage . 2022.03.21 03:36:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 03:36:11 - OpenVPN > VERIFY EKU OK . 2022.03.21 03:36:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 03:36:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 03:36:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 03:36:11 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 03:55:34 - Collect information about AirVPN completed . 2022.03.21 04:35:23 - Above log line repeated 1 times more . 2022.03.21 04:35:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 04:35:23 - OpenVPN > VERIFY KU OK . 2022.03.21 04:35:23 - OpenVPN > Validating certificate extended key usage . 2022.03.21 04:35:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 04:35:23 - OpenVPN > VERIFY EKU OK . 2022.03.21 04:35:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 04:35:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 04:35:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 04:35:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 04:55:44 - Collect information about AirVPN completed . 2022.03.21 05:34:35 - Above log line repeated 1 times more . 2022.03.21 05:34:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 05:34:35 - OpenVPN > VERIFY KU OK . 2022.03.21 05:34:35 - OpenVPN > Validating certificate extended key usage . 2022.03.21 05:34:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 05:34:35 - OpenVPN > VERIFY EKU OK . 2022.03.21 05:34:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 05:34:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 05:34:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 05:34:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 05:55:52 - Collect information about AirVPN completed . 2022.03.21 06:33:47 - Above log line repeated 1 times more . 2022.03.21 06:33:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 06:33:47 - OpenVPN > VERIFY KU OK . 2022.03.21 06:33:47 - OpenVPN > Validating certificate extended key usage . 2022.03.21 06:33:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 06:33:47 - OpenVPN > VERIFY EKU OK . 2022.03.21 06:33:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 06:33:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 06:33:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 06:33:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 06:56:00 - Collect information about AirVPN completed . 2022.03.21 07:32:59 - Above log line repeated 1 times more . 2022.03.21 07:32:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 07:32:59 - OpenVPN > VERIFY KU OK . 2022.03.21 07:32:59 - OpenVPN > Validating certificate extended key usage . 2022.03.21 07:32:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 07:32:59 - OpenVPN > VERIFY EKU OK . 2022.03.21 07:32:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 07:32:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 07:32:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 07:32:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 07:56:05 - Collect information about AirVPN completed . 2022.03.21 08:32:13 - Above log line repeated 1 times more . 2022.03.21 08:32:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 08:32:13 - OpenVPN > VERIFY KU OK . 2022.03.21 08:32:13 - OpenVPN > Validating certificate extended key usage . 2022.03.21 08:32:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 08:32:13 - OpenVPN > VERIFY EKU OK . 2022.03.21 08:32:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 08:32:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 08:32:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 08:32:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 08:56:09 - Collect information about AirVPN completed . 2022.03.21 09:31:25 - Above log line repeated 1 times more . 2022.03.21 09:31:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 09:31:25 - OpenVPN > VERIFY KU OK . 2022.03.21 09:31:25 - OpenVPN > Validating certificate extended key usage . 2022.03.21 09:31:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 09:31:25 - OpenVPN > VERIFY EKU OK . 2022.03.21 09:31:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 09:31:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 09:31:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 09:31:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 09:56:19 - Collect information about AirVPN completed . 2022.03.21 10:30:37 - Above log line repeated 1 times more . 2022.03.21 10:30:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 10:30:37 - OpenVPN > VERIFY KU OK . 2022.03.21 10:30:37 - OpenVPN > Validating certificate extended key usage . 2022.03.21 10:30:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 10:30:37 - OpenVPN > VERIFY EKU OK . 2022.03.21 10:30:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 10:30:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 10:30:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 10:30:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 10:56:30 - Collect information about AirVPN completed . 2022.03.21 11:29:48 - Above log line repeated 1 times more . 2022.03.21 11:29:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 11:29:48 - OpenVPN > VERIFY KU OK . 2022.03.21 11:29:48 - OpenVPN > Validating certificate extended key usage . 2022.03.21 11:29:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 11:29:48 - OpenVPN > VERIFY EKU OK . 2022.03.21 11:29:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 11:29:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 11:29:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 11:29:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 11:56:43 - Collect information about AirVPN completed . 2022.03.21 12:29:00 - Above log line repeated 1 times more . 2022.03.21 12:29:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 12:29:00 - OpenVPN > VERIFY KU OK . 2022.03.21 12:29:00 - OpenVPN > Validating certificate extended key usage . 2022.03.21 12:29:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 12:29:00 - OpenVPN > VERIFY EKU OK . 2022.03.21 12:29:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 12:29:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 12:29:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 12:29:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 12:56:52 - Collect information about AirVPN completed . 2022.03.21 13:28:12 - Above log line repeated 1 times more . 2022.03.21 13:28:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 13:28:12 - OpenVPN > VERIFY KU OK . 2022.03.21 13:28:12 - OpenVPN > Validating certificate extended key usage . 2022.03.21 13:28:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 13:28:12 - OpenVPN > VERIFY EKU OK . 2022.03.21 13:28:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 13:28:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 13:28:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 13:28:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 13:57:01 - Collect information about AirVPN completed . 2022.03.21 14:27:24 - Above log line repeated 1 times more . 2022.03.21 14:27:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 14:27:24 - OpenVPN > VERIFY KU OK . 2022.03.21 14:27:24 - OpenVPN > Validating certificate extended key usage . 2022.03.21 14:27:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 14:27:24 - OpenVPN > VERIFY EKU OK . 2022.03.21 14:27:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 14:27:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 14:27:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 14:27:24 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 14:57:03 - Collect information about AirVPN completed . 2022.03.21 15:26:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 15:26:36 - OpenVPN > VERIFY KU OK . 2022.03.21 15:26:36 - OpenVPN > Validating certificate extended key usage . 2022.03.21 15:26:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 15:26:36 - OpenVPN > VERIFY EKU OK . 2022.03.21 15:26:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 15:26:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 15:26:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 15:26:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 15:27:06 - Collect information about AirVPN completed . 2022.03.21 16:25:48 - Above log line repeated 1 times more . 2022.03.21 16:25:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 16:25:48 - OpenVPN > VERIFY KU OK . 2022.03.21 16:25:48 - OpenVPN > Validating certificate extended key usage . 2022.03.21 16:25:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 16:25:48 - OpenVPN > VERIFY EKU OK . 2022.03.21 16:25:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 16:25:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 16:25:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 16:25:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 16:27:09 - Collect information about AirVPN completed . 2022.03.21 17:25:00 - Above log line repeated 1 times more . 2022.03.21 17:25:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 17:25:00 - OpenVPN > VERIFY KU OK . 2022.03.21 17:25:00 - OpenVPN > Validating certificate extended key usage . 2022.03.21 17:25:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 17:25:00 - OpenVPN > VERIFY EKU OK . 2022.03.21 17:25:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 17:25:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 17:25:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 17:25:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 17:27:18 - Collect information about AirVPN completed . 2022.03.21 18:24:12 - Above log line repeated 1 times more . 2022.03.21 18:24:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 18:24:12 - OpenVPN > VERIFY KU OK . 2022.03.21 18:24:12 - OpenVPN > Validating certificate extended key usage . 2022.03.21 18:24:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 18:24:12 - OpenVPN > VERIFY EKU OK . 2022.03.21 18:24:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 18:24:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 18:24:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 18:24:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 18:27:19 - Collect information about AirVPN completed . 2022.03.21 19:23:24 - Above log line repeated 1 times more . 2022.03.21 19:23:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 19:23:24 - OpenVPN > VERIFY KU OK . 2022.03.21 19:23:24 - OpenVPN > Validating certificate extended key usage . 2022.03.21 19:23:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 19:23:24 - OpenVPN > VERIFY EKU OK . 2022.03.21 19:23:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 19:23:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 19:23:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 19:23:24 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 19:27:28 - Collect information about AirVPN completed . 2022.03.21 20:22:36 - Above log line repeated 1 times more . 2022.03.21 20:22:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 20:22:36 - OpenVPN > VERIFY KU OK . 2022.03.21 20:22:36 - OpenVPN > Validating certificate extended key usage . 2022.03.21 20:22:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 20:22:36 - OpenVPN > VERIFY EKU OK . 2022.03.21 20:22:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 20:22:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 20:22:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 20:22:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 20:27:37 - Collect information about AirVPN completed . 2022.03.21 21:21:48 - Above log line repeated 1 times more . 2022.03.21 21:21:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 21:21:48 - OpenVPN > VERIFY KU OK . 2022.03.21 21:21:48 - OpenVPN > Validating certificate extended key usage . 2022.03.21 21:21:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 21:21:48 - OpenVPN > VERIFY EKU OK . 2022.03.21 21:21:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 21:21:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 21:21:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 21:21:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 21:27:39 - Collect information about AirVPN completed . 2022.03.21 22:21:00 - Above log line repeated 1 times more . 2022.03.21 22:21:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 22:21:00 - OpenVPN > VERIFY KU OK . 2022.03.21 22:21:00 - OpenVPN > Validating certificate extended key usage . 2022.03.21 22:21:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 22:21:00 - OpenVPN > VERIFY EKU OK . 2022.03.21 22:21:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 22:21:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 22:21:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 22:21:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 22:27:44 - Collect information about AirVPN completed . 2022.03.21 23:20:11 - Above log line repeated 1 times more . 2022.03.21 23:20:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 23:20:11 - OpenVPN > VERIFY KU OK . 2022.03.21 23:20:11 - OpenVPN > Validating certificate extended key usage . 2022.03.21 23:20:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 23:20:11 - OpenVPN > VERIFY EKU OK . 2022.03.21 23:20:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 23:20:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 23:20:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 23:20:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 23:27:49 - Collect information about AirVPN completed . 2022.03.22 00:19:23 - Above log line repeated 1 times more . 2022.03.22 00:19:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 00:19:23 - OpenVPN > VERIFY KU OK . 2022.03.22 00:19:23 - OpenVPN > Validating certificate extended key usage . 2022.03.22 00:19:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 00:19:23 - OpenVPN > VERIFY EKU OK . 2022.03.22 00:19:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 00:19:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 00:19:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 00:19:24 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 00:28:01 - Collect information about AirVPN completed . 2022.03.22 01:18:35 - Above log line repeated 1 times more . 2022.03.22 01:18:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 01:18:35 - OpenVPN > VERIFY KU OK . 2022.03.22 01:18:35 - OpenVPN > Validating certificate extended key usage . 2022.03.22 01:18:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 01:18:35 - OpenVPN > VERIFY EKU OK . 2022.03.22 01:18:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 01:18:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 01:18:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 01:18:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 01:28:13 - Collect information about AirVPN completed . 2022.03.22 02:17:47 - Above log line repeated 1 times more . 2022.03.22 02:17:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 02:17:47 - OpenVPN > VERIFY KU OK . 2022.03.22 02:17:47 - OpenVPN > Validating certificate extended key usage . 2022.03.22 02:17:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 02:17:47 - OpenVPN > VERIFY EKU OK . 2022.03.22 02:17:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 02:17:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 02:17:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 02:17:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 02:28:24 - Collect information about AirVPN completed . 2022.03.22 03:16:59 - Above log line repeated 1 times more . 2022.03.22 03:16:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 03:16:59 - OpenVPN > VERIFY KU OK . 2022.03.22 03:16:59 - OpenVPN > Validating certificate extended key usage . 2022.03.22 03:16:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 03:16:59 - OpenVPN > VERIFY EKU OK . 2022.03.22 03:16:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 03:16:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 03:16:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 03:16:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 03:27:52 - OpenVPN > read TCP_CLIENT: Unknown error (code=10060) . 2022.03.22 03:27:52 - OpenVPN > Connection reset, restarting [-1] . 2022.03.22 03:27:52 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2022.03.22 03:27:52 - OpenVPN > Restart pause, 5 second(s) ! 2022.03.22 03:27:52 - Disconnecting . 2022.03.22 03:27:52 - Routes, removed a route previously added, 68.235.35.124 for gateway 10.20.151.1 . 2022.03.22 03:27:52 - Sending soft termination signal . 2022.03.22 03:27:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 68.235.36.34 MASK 255.255.255.255 192.168.1.1 . 2022.03.22 03:27:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.03.22 03:27:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.22 03:27:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.03.22 03:27:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.22 03:27:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.03.22 03:27:57 - OpenVPN > Closing TUN/TAP interface . 2022.03.22 03:27:57 - OpenVPN > TAP: DHCP address released . 2022.03.22 03:27:57 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2022.03.22 03:27:57 - Connection terminated. . 2022.03.22 03:27:57 - IPv6 restored with packet filtering. . 2022.03.22 03:27:57 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.03.22 03:27:57 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2022.03.22 03:27:57 - DNS leak protection with packet filtering disabled. . 2022.03.22 03:27:57 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2022.03.22 03:27:57 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 I 2022.03.22 03:28:00 - Checking authorization ... W 2022.03.22 03:28:00 - Authorization check failed, continue anyway (Fetch url error:Server returned nothing (no headers, no data)) . 2022.03.22 03:28:00 - IPv6 disabled with packet filtering. ! 2022.03.22 03:28:00 - Connecting to Kruger (United States of America, Chicago, Illinois) . 2022.03.22 03:28:01 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.03.22 03:28:01 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.03.22 03:28:01 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.03.22 03:28:01 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.22 03:28:01 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.22 03:28:01 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.22 03:28:01 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.22 03:28:01 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]68.235.36.34:41185 . 2022.03.22 03:28:01 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.03.22 03:28:01 - OpenVPN > Attempting to establish TCP connection with [AF_INET]68.235.36.34:41185 [nonblock] . 2022.03.22 03:28:33 - Cannot retrieve information about AirVPN: Fetch url error:Server returned nothing (no headers, no data) . 2022.03.22 03:30:01 - OpenVPN > TCP: connect to [AF_INET]68.235.36.34:41185 failed: Unknown error . 2022.03.22 03:30:01 - OpenVPN > SIGUSR1[connection failed(soft),init_instance] received, process restarting . 2022.03.22 03:30:01 - OpenVPN > Restart pause, 5 second(s) ! 2022.03.22 03:30:01 - Disconnecting . 2022.03.22 03:30:01 - Sending soft termination signal . 2022.03.22 03:30:06 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2022.03.22 03:30:06 - Connection terminated. . 2022.03.22 03:30:06 - IPv6 restored with packet filtering. I 2022.03.22 03:30:10 - Checking authorization ... . 2022.03.22 03:30:10 - IPv6 disabled with packet filtering. ! 2022.03.22 03:30:10 - Connecting to Kruger (United States of America, Chicago, Illinois) . 2022.03.22 03:30:10 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.03.22 03:30:10 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.03.22 03:30:10 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.03.22 03:30:10 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.22 03:30:10 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.22 03:30:10 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.22 03:30:10 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.22 03:30:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]68.235.36.34:41185 . 2022.03.22 03:30:10 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.03.22 03:30:10 - OpenVPN > Attempting to establish TCP connection with [AF_INET]68.235.36.34:41185 [nonblock] . 2022.03.22 03:30:10 - OpenVPN > TCP connection established with [AF_INET]68.235.36.34:41185 . 2022.03.22 03:30:10 - OpenVPN > TCP_CLIENT link local: (not bound) . 2022.03.22 03:30:10 - OpenVPN > TCP_CLIENT link remote: [AF_INET]68.235.36.34:41185 . 2022.03.22 03:30:10 - OpenVPN > TLS: Initial packet from [AF_INET]68.235.36.34:41185, sid=c6dd9394 e5b23489 . 2022.03.22 03:30:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 03:30:10 - OpenVPN > VERIFY KU OK . 2022.03.22 03:30:10 - OpenVPN > Validating certificate extended key usage . 2022.03.22 03:30:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 03:30:10 - OpenVPN > VERIFY EKU OK . 2022.03.22 03:30:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 03:30:10 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 03:30:10 - OpenVPN > [Kruger] Peer Connection Initiated with [AF_INET]68.235.36.34:41185 . 2022.03.22 03:30:11 - OpenVPN > SENT CONTROL [Kruger]: 'PUSH_REQUEST' (status=1) . 2022.03.22 03:30:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.151.1,dhcp-option DNS6 fde6:7a:7d20:1097::1,tun-ipv6,route-gateway 10.20.151.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1097::100d/64 fde6:7a:7d20:1097::1,ifconfig 10.20.151.15 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.03.22 03:30:11 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.22 03:30:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1097::1' . 2022.03.22 03:30:11 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.22 03:30:11 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1097::100d/64 fde6:7a:7d20:1097::1' . 2022.03.22 03:30:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.22 03:30:11 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.22 03:30:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.22 03:30:11 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.22 03:30:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.03.22 03:30:11 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.22 03:30:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2022.03.22 03:30:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.22 03:30:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.22 03:30:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 03:30:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 03:30:11 - OpenVPN > interactive service msg_channel=0 . 2022.03.22 03:30:11 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=b4:2e:99:a5:7d:50 . 2022.03.22 03:30:11 - OpenVPN > open_tun . 2022.03.22 03:30:11 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2022.03.22 03:30:11 - OpenVPN > TAP-Windows Driver Version 9.24 . 2022.03.22 03:30:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.20.151.0/10.20.151.15/255.255.255.0 [SUCCEEDED] . 2022.03.22 03:30:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.20.151.15/255.255.255.0 on interface {C17997D5-C171-431A-99EB-AF41B82CEAD9} [DHCP-serv: 10.20.151.254, lease-time: 31536000] . 2022.03.22 03:30:11 - OpenVPN > Successful ARP Flush on interface [15] {C17997D5-C171-431A-99EB-AF41B82CEAD9} . 2022.03.22 03:30:11 - OpenVPN > IPv4 MTU set to 1500 on interface 15 using SetIpInterfaceEntry() . 2022.03.22 03:30:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2022.03.22 03:30:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 68.235.36.34 MASK 255.255.255.255 192.168.1.1 . 2022.03.22 03:30:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.03.22 03:30:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.03.22 03:30:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.22 03:30:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.03.22 03:30:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.03.22 03:30:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.22 03:30:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.03.22 03:30:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.03.22 03:30:16 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2022.03.22 03:30:16 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2022.03.22 03:30:16 - DNS leak protection with packet filtering enabled. . 2022.03.22 03:30:16 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.20.151.1) . 2022.03.22 03:30:16 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.20.151.1) . 2022.03.22 03:30:16 - Routes, added a new route, 68.235.35.124 for gateway 10.20.151.1 . 2022.03.22 03:30:16 - Unable to compute route for 2607:9000:0:16:16d7:9cc7:8a38:f9f0: IPv6 VPN gateway not available. . 2022.03.22 03:30:16 - Flushing DNS I 2022.03.22 03:30:16 - Checking route IPv4 I 2022.03.22 03:30:17 - Checking DNS ! 2022.03.22 03:30:17 - Connected. . 2022.03.22 03:30:17 - OpenVPN > Initialization Sequence Completed . 2022.03.22 03:58:36 - Collect information about AirVPN completed . 2022.03.22 04:29:56 - Above log line repeated 1 times more . 2022.03.22 04:29:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 04:29:56 - OpenVPN > VERIFY KU OK . 2022.03.22 04:29:56 - OpenVPN > Validating certificate extended key usage . 2022.03.22 04:29:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 04:29:56 - OpenVPN > VERIFY EKU OK . 2022.03.22 04:29:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 04:29:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 04:29:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 04:29:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 04:58:42 - Collect information about AirVPN completed . 2022.03.22 05:29:42 - Above log line repeated 1 times more . 2022.03.22 05:29:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 05:29:42 - OpenVPN > VERIFY KU OK . 2022.03.22 05:29:42 - OpenVPN > Validating certificate extended key usage . 2022.03.22 05:29:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 05:29:42 - OpenVPN > VERIFY EKU OK . 2022.03.22 05:29:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 05:29:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 05:29:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 05:29:42 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 05:58:50 - Collect information about AirVPN completed . 2022.03.22 06:29:28 - Above log line repeated 1 times more . 2022.03.22 06:29:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 06:29:28 - OpenVPN > VERIFY KU OK . 2022.03.22 06:29:28 - OpenVPN > Validating certificate extended key usage . 2022.03.22 06:29:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 06:29:28 - OpenVPN > VERIFY EKU OK . 2022.03.22 06:29:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 06:29:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 06:29:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 06:29:28 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 06:59:07 - Collect information about AirVPN completed . 2022.03.22 07:29:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 07:29:14 - OpenVPN > VERIFY KU OK . 2022.03.22 07:29:14 - OpenVPN > Validating certificate extended key usage . 2022.03.22 07:29:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 07:29:14 - OpenVPN > VERIFY EKU OK . 2022.03.22 07:29:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 07:29:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 07:29:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 07:29:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 07:29:17 - Collect information about AirVPN completed . 2022.03.22 08:29:02 - Above log line repeated 1 times more . 2022.03.22 08:29:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 08:29:02 - OpenVPN > VERIFY KU OK . 2022.03.22 08:29:02 - OpenVPN > Validating certificate extended key usage . 2022.03.22 08:29:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 08:29:02 - OpenVPN > VERIFY EKU OK . 2022.03.22 08:29:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 08:29:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 08:29:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 08:29:02 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 08:29:35 - Collect information about AirVPN completed . 2022.03.22 09:28:48 - Above log line repeated 1 times more . 2022.03.22 09:28:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 09:28:48 - OpenVPN > VERIFY KU OK . 2022.03.22 09:28:48 - OpenVPN > Validating certificate extended key usage . 2022.03.22 09:28:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 09:28:48 - OpenVPN > VERIFY EKU OK . 2022.03.22 09:28:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 09:28:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 09:28:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 09:28:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 09:29:53 - Collect information about AirVPN completed . 2022.03.22 10:28:34 - Above log line repeated 1 times more . 2022.03.22 10:28:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 10:28:34 - OpenVPN > VERIFY KU OK . 2022.03.22 10:28:34 - OpenVPN > Validating certificate extended key usage . 2022.03.22 10:28:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 10:28:34 - OpenVPN > VERIFY EKU OK . 2022.03.22 10:28:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 10:28:34 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 10:28:34 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 10:28:34 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 10:30:03 - Collect information about AirVPN completed . 2022.03.22 11:28:19 - Above log line repeated 1 times more . 2022.03.22 11:28:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 11:28:19 - OpenVPN > VERIFY KU OK . 2022.03.22 11:28:19 - OpenVPN > Validating certificate extended key usage . 2022.03.22 11:28:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 11:28:19 - OpenVPN > VERIFY EKU OK . 2022.03.22 11:28:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 11:28:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 11:28:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 11:28:20 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 11:30:12 - Collect information about AirVPN completed . 2022.03.22 12:28:05 - Above log line repeated 1 times more . 2022.03.22 12:28:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 12:28:05 - OpenVPN > VERIFY KU OK . 2022.03.22 12:28:05 - OpenVPN > Validating certificate extended key usage . 2022.03.22 12:28:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 12:28:05 - OpenVPN > VERIFY EKU OK . 2022.03.22 12:28:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 12:28:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 12:28:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 12:28:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 12:30:15 - Collect information about AirVPN completed . 2022.03.22 13:27:51 - Above log line repeated 1 times more . 2022.03.22 13:27:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 13:27:51 - OpenVPN > VERIFY KU OK . 2022.03.22 13:27:51 - OpenVPN > Validating certificate extended key usage . 2022.03.22 13:27:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 13:27:51 - OpenVPN > VERIFY EKU OK . 2022.03.22 13:27:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 13:27:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 13:27:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 13:27:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 13:30:29 - Collect information about AirVPN completed . 2022.03.22 14:27:37 - Above log line repeated 1 times more . 2022.03.22 14:27:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 14:27:37 - OpenVPN > VERIFY KU OK . 2022.03.22 14:27:37 - OpenVPN > Validating certificate extended key usage . 2022.03.22 14:27:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 14:27:37 - OpenVPN > VERIFY EKU OK . 2022.03.22 14:27:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 14:27:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 14:27:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 14:27:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 14:30:31 - Collect information about AirVPN completed . 2022.03.22 15:27:23 - Above log line repeated 1 times more . 2022.03.22 15:27:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 15:27:23 - OpenVPN > VERIFY KU OK . 2022.03.22 15:27:23 - OpenVPN > Validating certificate extended key usage . 2022.03.22 15:27:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 15:27:23 - OpenVPN > VERIFY EKU OK . 2022.03.22 15:27:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 15:27:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 15:27:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 15:27:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 15:30:41 - Collect information about AirVPN completed . 2022.03.22 16:00:58 - OpenVPN > read TCP_CLIENT: Unknown error (code=10060) . 2022.03.22 16:00:58 - OpenVPN > Connection reset, restarting [-1] . 2022.03.22 16:00:58 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2022.03.22 16:00:58 - OpenVPN > Restart pause, 5 second(s) ! 2022.03.22 16:00:58 - Disconnecting . 2022.03.22 16:00:58 - Routes, removed a route previously added, 68.235.35.124 for gateway 10.20.151.1 . 2022.03.22 16:00:58 - Sending soft termination signal . 2022.03.22 16:01:03 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 68.235.36.34 MASK 255.255.255.255 192.168.1.1 . 2022.03.22 16:01:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.03.22 16:01:03 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.22 16:01:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.03.22 16:01:03 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.22 16:01:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.03.22 16:01:03 - OpenVPN > Closing TUN/TAP interface . 2022.03.22 16:01:03 - OpenVPN > TAP: DHCP address released . 2022.03.22 16:01:03 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2022.03.22 16:01:03 - Connection terminated. . 2022.03.22 16:01:03 - IPv6 restored with packet filtering. . 2022.03.22 16:01:03 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.03.22 16:01:03 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2022.03.22 16:01:03 - DNS leak protection with packet filtering disabled. . 2022.03.22 16:01:03 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2022.03.22 16:01:03 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2022.03.22 16:01:04 - Collect information about AirVPN completed I 2022.03.22 16:01:06 - Checking authorization ... . 2022.03.22 16:01:06 - IPv6 disabled with packet filtering. ! 2022.03.22 16:01:06 - Connecting to Kruger (United States of America, Chicago, Illinois) . 2022.03.22 16:01:07 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.03.22 16:01:07 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.03.22 16:01:07 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.03.22 16:01:07 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.22 16:01:07 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.22 16:01:07 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.22 16:01:07 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.22 16:01:07 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]68.235.36.34:41185 . 2022.03.22 16:01:07 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.03.22 16:01:07 - OpenVPN > Attempting to establish TCP connection with [AF_INET]68.235.36.34:41185 [nonblock] . 2022.03.22 16:01:07 - OpenVPN > TCP connection established with [AF_INET]68.235.36.34:41185 . 2022.03.22 16:01:07 - OpenVPN > TCP_CLIENT link local: (not bound) . 2022.03.22 16:01:07 - OpenVPN > TCP_CLIENT link remote: [AF_INET]68.235.36.34:41185 . 2022.03.22 16:01:07 - OpenVPN > TLS: Initial packet from [AF_INET]68.235.36.34:41185, sid=434c1d06 11f8b0c7 . 2022.03.22 16:01:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 16:01:07 - OpenVPN > VERIFY KU OK . 2022.03.22 16:01:07 - OpenVPN > Validating certificate extended key usage . 2022.03.22 16:01:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 16:01:07 - OpenVPN > VERIFY EKU OK . 2022.03.22 16:01:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 16:01:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 16:01:07 - OpenVPN > [Kruger] Peer Connection Initiated with [AF_INET]68.235.36.34:41185 . 2022.03.22 16:01:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.151.1,dhcp-option DNS6 fde6:7a:7d20:1097::1,tun-ipv6,route-gateway 10.20.151.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1097::100d/64 fde6:7a:7d20:1097::1,ifconfig 10.20.151.15 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.03.22 16:01:07 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.22 16:01:07 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1097::1' . 2022.03.22 16:01:07 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.22 16:01:07 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1097::100d/64 fde6:7a:7d20:1097::1' . 2022.03.22 16:01:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.22 16:01:07 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.22 16:01:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.22 16:01:07 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.22 16:01:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.03.22 16:01:07 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.22 16:01:07 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2022.03.22 16:01:07 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.22 16:01:07 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.22 16:01:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 16:01:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 16:01:07 - OpenVPN > interactive service msg_channel=0 . 2022.03.22 16:01:07 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=b4:2e:99:a5:7d:50 . 2022.03.22 16:01:08 - OpenVPN > open_tun . 2022.03.22 16:01:08 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2022.03.22 16:01:08 - OpenVPN > TAP-Windows Driver Version 9.24 . 2022.03.22 16:01:08 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.20.151.0/10.20.151.15/255.255.255.0 [SUCCEEDED] . 2022.03.22 16:01:08 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.20.151.15/255.255.255.0 on interface {C17997D5-C171-431A-99EB-AF41B82CEAD9} [DHCP-serv: 10.20.151.254, lease-time: 31536000] . 2022.03.22 16:01:08 - OpenVPN > Successful ARP Flush on interface [15] {C17997D5-C171-431A-99EB-AF41B82CEAD9} . 2022.03.22 16:01:08 - OpenVPN > IPv4 MTU set to 1500 on interface 15 using SetIpInterfaceEntry() . 2022.03.22 16:01:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2022.03.22 16:01:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 68.235.36.34 MASK 255.255.255.255 192.168.1.1 . 2022.03.22 16:01:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.03.22 16:01:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.03.22 16:01:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.22 16:01:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.03.22 16:01:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.03.22 16:01:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.22 16:01:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.03.22 16:01:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.03.22 16:01:12 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2022.03.22 16:01:12 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2022.03.22 16:01:12 - DNS leak protection with packet filtering enabled. . 2022.03.22 16:01:12 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.20.151.1) . 2022.03.22 16:01:12 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.20.151.1) . 2022.03.22 16:01:12 - Routes, added a new route, 68.235.35.124 for gateway 10.20.151.1 . 2022.03.22 16:01:12 - Unable to compute route for 2607:9000:0:16:16d7:9cc7:8a38:f9f0: IPv6 VPN gateway not available. . 2022.03.22 16:01:12 - Flushing DNS I 2022.03.22 16:01:12 - Checking route IPv4 I 2022.03.22 16:01:12 - Checking DNS ! 2022.03.22 16:01:13 - Connected. . 2022.03.22 16:01:13 - OpenVPN > Initialization Sequence Completed . 2022.03.22 16:30:44 - Collect information about AirVPN completed . 2022.03.22 16:57:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 16:57:17 - OpenVPN > VERIFY KU OK . 2022.03.22 16:57:17 - OpenVPN > Validating certificate extended key usage . 2022.03.22 16:57:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 16:57:17 - OpenVPN > VERIFY EKU OK . 2022.03.22 16:57:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 16:57:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 16:57:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 16:57:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 17:00:49 - Collect information about AirVPN completed . 2022.03.22 17:53:27 - Above log line repeated 1 times more . 2022.03.22 17:53:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 17:53:27 - OpenVPN > VERIFY KU OK . 2022.03.22 17:53:27 - OpenVPN > Validating certificate extended key usage . 2022.03.22 17:53:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 17:53:27 - OpenVPN > VERIFY EKU OK . 2022.03.22 17:53:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 17:53:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 17:53:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 17:53:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 18:00:55 - Collect information about AirVPN completed . 2022.03.22 18:49:37 - Above log line repeated 1 times more . 2022.03.22 18:49:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 18:49:37 - OpenVPN > VERIFY KU OK . 2022.03.22 18:49:37 - OpenVPN > Validating certificate extended key usage . 2022.03.22 18:49:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 18:49:37 - OpenVPN > VERIFY EKU OK . 2022.03.22 18:49:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 18:49:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 18:49:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 18:49:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 19:01:04 - Collect information about AirVPN completed . 2022.03.22 19:45:47 - Above log line repeated 1 times more . 2022.03.22 19:45:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 19:45:47 - OpenVPN > VERIFY KU OK . 2022.03.22 19:45:47 - OpenVPN > Validating certificate extended key usage . 2022.03.22 19:45:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 19:45:47 - OpenVPN > VERIFY EKU OK . 2022.03.22 19:45:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 19:45:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 19:45:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 19:45:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 20:01:13 - Collect information about AirVPN completed . 2022.03.22 20:41:57 - Above log line repeated 1 times more . 2022.03.22 20:41:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 20:41:57 - OpenVPN > VERIFY KU OK . 2022.03.22 20:41:57 - OpenVPN > Validating certificate extended key usage . 2022.03.22 20:41:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 20:41:57 - OpenVPN > VERIFY EKU OK . 2022.03.22 20:41:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 20:41:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 20:41:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 20:41:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 21:01:19 - Collect information about AirVPN completed . 2022.03.22 21:38:07 - Above log line repeated 1 times more . 2022.03.22 21:38:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 21:38:07 - OpenVPN > VERIFY KU OK . 2022.03.22 21:38:07 - OpenVPN > Validating certificate extended key usage . 2022.03.22 21:38:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 21:38:07 - OpenVPN > VERIFY EKU OK . 2022.03.22 21:38:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 21:38:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 21:38:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 21:38:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 22:01:24 - Collect information about AirVPN completed . 2022.03.22 22:34:17 - Above log line repeated 1 times more . 2022.03.22 22:34:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 22:34:17 - OpenVPN > VERIFY KU OK . 2022.03.22 22:34:17 - OpenVPN > Validating certificate extended key usage . 2022.03.22 22:34:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 22:34:17 - OpenVPN > VERIFY EKU OK . 2022.03.22 22:34:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 22:34:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 22:34:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 22:34:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 23:01:30 - Collect information about AirVPN completed . 2022.03.22 23:30:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 23:30:26 - OpenVPN > VERIFY KU OK . 2022.03.22 23:30:26 - OpenVPN > Validating certificate extended key usage . 2022.03.22 23:30:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 23:30:26 - OpenVPN > VERIFY EKU OK . 2022.03.22 23:30:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 23:30:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 23:30:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 23:30:26 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 23:31:36 - Collect information about AirVPN completed . 2022.03.23 00:26:36 - Above log line repeated 1 times more . 2022.03.23 00:26:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 00:26:36 - OpenVPN > VERIFY KU OK . 2022.03.23 00:26:36 - OpenVPN > Validating certificate extended key usage . 2022.03.23 00:26:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 00:26:36 - OpenVPN > VERIFY EKU OK . 2022.03.23 00:26:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 00:26:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 00:26:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 00:26:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 00:31:49 - Collect information about AirVPN completed . 2022.03.23 01:22:46 - Above log line repeated 1 times more . 2022.03.23 01:22:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 01:22:46 - OpenVPN > VERIFY KU OK . 2022.03.23 01:22:46 - OpenVPN > Validating certificate extended key usage . 2022.03.23 01:22:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 01:22:46 - OpenVPN > VERIFY EKU OK . 2022.03.23 01:22:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 01:22:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 01:22:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 01:22:46 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 01:32:02 - Collect information about AirVPN completed . 2022.03.23 02:18:56 - Above log line repeated 1 times more . 2022.03.23 02:18:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 02:18:56 - OpenVPN > VERIFY KU OK . 2022.03.23 02:18:56 - OpenVPN > Validating certificate extended key usage . 2022.03.23 02:18:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 02:18:56 - OpenVPN > VERIFY EKU OK . 2022.03.23 02:18:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 02:18:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 02:18:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 02:18:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 02:32:14 - Collect information about AirVPN completed . 2022.03.23 03:15:06 - Above log line repeated 1 times more . 2022.03.23 03:15:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 03:15:06 - OpenVPN > VERIFY KU OK . 2022.03.23 03:15:06 - OpenVPN > Validating certificate extended key usage . 2022.03.23 03:15:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 03:15:06 - OpenVPN > VERIFY EKU OK . 2022.03.23 03:15:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 03:15:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 03:15:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 03:15:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 03:32:26 - Collect information about AirVPN completed . 2022.03.23 04:11:16 - Above log line repeated 1 times more . 2022.03.23 04:11:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 04:11:16 - OpenVPN > VERIFY KU OK . 2022.03.23 04:11:16 - OpenVPN > Validating certificate extended key usage . 2022.03.23 04:11:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 04:11:16 - OpenVPN > VERIFY EKU OK . 2022.03.23 04:11:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 04:11:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 04:11:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 04:11:16 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 04:32:37 - Collect information about AirVPN completed . 2022.03.23 05:07:26 - Above log line repeated 1 times more . 2022.03.23 05:07:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 05:07:26 - OpenVPN > VERIFY KU OK . 2022.03.23 05:07:26 - OpenVPN > Validating certificate extended key usage . 2022.03.23 05:07:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 05:07:26 - OpenVPN > VERIFY EKU OK . 2022.03.23 05:07:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 05:07:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 05:07:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 05:07:26 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 05:32:50 - Collect information about AirVPN completed . 2022.03.23 06:03:36 - Above log line repeated 1 times more . 2022.03.23 06:03:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 06:03:36 - OpenVPN > VERIFY KU OK . 2022.03.23 06:03:36 - OpenVPN > Validating certificate extended key usage . 2022.03.23 06:03:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 06:03:36 - OpenVPN > VERIFY EKU OK . 2022.03.23 06:03:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 06:03:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 06:03:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 06:03:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 06:33:03 - Collect information about AirVPN completed . 2022.03.23 06:59:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 06:59:46 - OpenVPN > VERIFY KU OK . 2022.03.23 06:59:46 - OpenVPN > Validating certificate extended key usage . 2022.03.23 06:59:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 06:59:46 - OpenVPN > VERIFY EKU OK . 2022.03.23 06:59:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 06:59:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 06:59:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 06:59:46 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 07:03:08 - Collect information about AirVPN completed . 2022.03.23 07:55:56 - Above log line repeated 1 times more . 2022.03.23 07:55:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 07:55:56 - OpenVPN > VERIFY KU OK . 2022.03.23 07:55:56 - OpenVPN > Validating certificate extended key usage . 2022.03.23 07:55:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 07:55:56 - OpenVPN > VERIFY EKU OK . 2022.03.23 07:55:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 07:55:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 07:55:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 07:55:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 08:03:19 - Collect information about AirVPN completed . 2022.03.23 08:52:08 - Above log line repeated 1 times more . 2022.03.23 08:52:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 08:52:08 - OpenVPN > VERIFY KU OK . 2022.03.23 08:52:08 - OpenVPN > Validating certificate extended key usage . 2022.03.23 08:52:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 08:52:08 - OpenVPN > VERIFY EKU OK . 2022.03.23 08:52:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 08:52:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 08:52:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 08:52:08 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 09:03:31 - Collect information about AirVPN completed . 2022.03.23 09:48:17 - Above log line repeated 1 times more . 2022.03.23 09:48:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 09:48:17 - OpenVPN > VERIFY KU OK . 2022.03.23 09:48:17 - OpenVPN > Validating certificate extended key usage . 2022.03.23 09:48:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 09:48:17 - OpenVPN > VERIFY EKU OK . 2022.03.23 09:48:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 09:48:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 09:48:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 09:48:18 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 10:03:39 - Collect information about AirVPN completed . 2022.03.23 10:44:27 - Above log line repeated 1 times more . 2022.03.23 10:44:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 10:44:27 - OpenVPN > VERIFY KU OK . 2022.03.23 10:44:27 - OpenVPN > Validating certificate extended key usage . 2022.03.23 10:44:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 10:44:27 - OpenVPN > VERIFY EKU OK . 2022.03.23 10:44:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 10:44:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 10:44:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 10:44:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 11:03:45 - Collect information about AirVPN completed . 2022.03.23 11:40:37 - Above log line repeated 1 times more . 2022.03.23 11:40:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 11:40:37 - OpenVPN > VERIFY KU OK . 2022.03.23 11:40:37 - OpenVPN > Validating certificate extended key usage . 2022.03.23 11:40:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 11:40:37 - OpenVPN > VERIFY EKU OK . 2022.03.23 11:40:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 11:40:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 11:40:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 11:40:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 12:03:52 - Collect information about AirVPN completed . 2022.03.23 12:36:47 - Above log line repeated 1 times more . 2022.03.23 12:36:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 12:36:47 - OpenVPN > VERIFY KU OK . 2022.03.23 12:36:47 - OpenVPN > Validating certificate extended key usage . 2022.03.23 12:36:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 12:36:47 - OpenVPN > VERIFY EKU OK . 2022.03.23 12:36:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 12:36:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 12:36:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 12:36:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 13:03:57 - Collect information about AirVPN completed . 2022.03.23 13:32:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 13:32:57 - OpenVPN > VERIFY KU OK . 2022.03.23 13:32:57 - OpenVPN > Validating certificate extended key usage . 2022.03.23 13:32:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 13:32:57 - OpenVPN > VERIFY EKU OK . 2022.03.23 13:32:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 13:32:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 13:32:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 13:32:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 13:34:02 - Collect information about AirVPN completed . 2022.03.23 13:43:26 - OpenVPN > read TCP_CLIENT: Unknown error (code=10060) . 2022.03.23 13:43:26 - OpenVPN > Connection reset, restarting [-1] . 2022.03.23 13:43:26 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2022.03.23 13:43:26 - OpenVPN > Restart pause, 5 second(s) ! 2022.03.23 13:43:26 - Disconnecting . 2022.03.23 13:43:26 - Routes, removed a route previously added, 68.235.35.124 for gateway 10.20.151.1 . 2022.03.23 13:43:26 - Sending soft termination signal . 2022.03.23 13:43:31 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 68.235.36.34 MASK 255.255.255.255 192.168.1.1 . 2022.03.23 13:43:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.03.23 13:43:31 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.23 13:43:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.03.23 13:43:31 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.23 13:43:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.03.23 13:43:31 - OpenVPN > Closing TUN/TAP interface . 2022.03.23 13:43:31 - OpenVPN > TAP: DHCP address released . 2022.03.23 13:43:31 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2022.03.23 13:43:31 - Connection terminated. . 2022.03.23 13:43:31 - IPv6 restored with packet filtering. . 2022.03.23 13:43:31 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.03.23 13:43:31 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2022.03.23 13:43:31 - DNS leak protection with packet filtering disabled. . 2022.03.23 13:43:31 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2022.03.23 13:43:31 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 I 2022.03.23 13:43:34 - Checking authorization ... . 2022.03.23 13:43:35 - IPv6 disabled with packet filtering. ! 2022.03.23 13:43:35 - Connecting to Kruger (United States of America, Chicago, Illinois) . 2022.03.23 13:43:35 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.03.23 13:43:35 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.03.23 13:43:35 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.03.23 13:43:35 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.23 13:43:35 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.23 13:43:35 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.23 13:43:35 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.23 13:43:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]68.235.36.34:41185 . 2022.03.23 13:43:35 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.03.23 13:43:35 - OpenVPN > Attempting to establish TCP connection with [AF_INET]68.235.36.34:41185 [nonblock] . 2022.03.23 13:43:35 - OpenVPN > TCP connection established with [AF_INET]68.235.36.34:41185 . 2022.03.23 13:43:35 - OpenVPN > TCP_CLIENT link local: (not bound) . 2022.03.23 13:43:35 - OpenVPN > TCP_CLIENT link remote: [AF_INET]68.235.36.34:41185 . 2022.03.23 13:43:35 - OpenVPN > TLS: Initial packet from [AF_INET]68.235.36.34:41185, sid=49cac23e c7480a0c . 2022.03.23 13:43:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 13:43:35 - OpenVPN > VERIFY KU OK . 2022.03.23 13:43:35 - OpenVPN > Validating certificate extended key usage . 2022.03.23 13:43:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 13:43:35 - OpenVPN > VERIFY EKU OK . 2022.03.23 13:43:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 13:43:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 13:43:35 - OpenVPN > [Kruger] Peer Connection Initiated with [AF_INET]68.235.36.34:41185 . 2022.03.23 13:43:36 - OpenVPN > SENT CONTROL [Kruger]: 'PUSH_REQUEST' (status=1) . 2022.03.23 13:43:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.151.1,dhcp-option DNS6 fde6:7a:7d20:1097::1,tun-ipv6,route-gateway 10.20.151.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1097::100d/64 fde6:7a:7d20:1097::1,ifconfig 10.20.151.15 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.03.23 13:43:36 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.23 13:43:36 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1097::1' . 2022.03.23 13:43:36 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.23 13:43:36 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1097::100d/64 fde6:7a:7d20:1097::1' . 2022.03.23 13:43:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.23 13:43:36 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.23 13:43:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.23 13:43:36 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.23 13:43:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.03.23 13:43:36 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.23 13:43:36 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2022.03.23 13:43:36 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.23 13:43:36 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.23 13:43:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 13:43:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 13:43:36 - OpenVPN > interactive service msg_channel=0 . 2022.03.23 13:43:36 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=b4:2e:99:a5:7d:50 . 2022.03.23 13:43:36 - OpenVPN > open_tun . 2022.03.23 13:43:36 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2022.03.23 13:43:36 - OpenVPN > TAP-Windows Driver Version 9.24 . 2022.03.23 13:43:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.20.151.0/10.20.151.15/255.255.255.0 [SUCCEEDED] . 2022.03.23 13:43:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.20.151.15/255.255.255.0 on interface {C17997D5-C171-431A-99EB-AF41B82CEAD9} [DHCP-serv: 10.20.151.254, lease-time: 31536000] . 2022.03.23 13:43:36 - OpenVPN > Successful ARP Flush on interface [15] {C17997D5-C171-431A-99EB-AF41B82CEAD9} . 2022.03.23 13:43:36 - OpenVPN > IPv4 MTU set to 1500 on interface 15 using SetIpInterfaceEntry() . 2022.03.23 13:43:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2022.03.23 13:43:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 68.235.36.34 MASK 255.255.255.255 192.168.1.1 . 2022.03.23 13:43:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.03.23 13:43:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.03.23 13:43:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.23 13:43:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.03.23 13:43:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.03.23 13:43:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.23 13:43:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.03.23 13:43:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.03.23 13:43:41 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2022.03.23 13:43:41 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2022.03.23 13:43:41 - DNS leak protection with packet filtering enabled. . 2022.03.23 13:43:41 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.20.151.1) . 2022.03.23 13:43:41 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.20.151.1) . 2022.03.23 13:43:41 - Routes, added a new route, 68.235.35.124 for gateway 10.20.151.1 . 2022.03.23 13:43:41 - Unable to compute route for 2607:9000:0:16:16d7:9cc7:8a38:f9f0: IPv6 VPN gateway not available. . 2022.03.23 13:43:41 - Flushing DNS I 2022.03.23 13:43:41 - Checking route IPv4 I 2022.03.23 13:43:42 - Checking DNS ! 2022.03.23 13:43:42 - Connected. . 2022.03.23 13:43:42 - OpenVPN > Initialization Sequence Completed Quote Share this post Link to post
MrRandom 6 Posted ... I got a notification that there was a reply but for some reason I don't see it here? This was the reply... Can you retest UDP please? Maybe things changed? I'm on UDP now, I'm using the same 41185 IP 4 . While It will probably take at least a day to see if it makes any difference in stability I can say that I haven't seen any of the errors in the log yet that I saw in the past on UDP and my speed is over 100Mbps faster than it was on TCP. Thanks for the suggestion and I'll report back tomorrow. Quote Share this post Link to post
OpenSourcerer 1436 Posted ... 16 hours ago, MrRandom said: I got a notification that there was a reply but for some reason I don't see it here? Yes, I deleted it right away because I read over this sentence of yours: On 3/24/2022 at 5:24 AM, MrRandom said: Since that day I can also no longer use UDP, I've learned to live with the speed and found work arounds for all the other errors I was getting but this instability is becoming VERY inconvenient. So I thought, there's no reason to suggest using UDP if it doesn't work, anyway. 16 hours ago, MrRandom said: I'm on UDP now, I'm using the same 41185 IP 4 . While It will probably take at least a day to see if it makes any difference in stability I can say that I haven't seen any of the errors in the log yet that I saw in the past on UDP and my speed is over 100Mbps faster than it was on TCP. But it looks like it was the correct suggestion, after all. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
MrRandom 6 Posted ... Hi. That was a poor choice of words on my part and not an accurate statement. I did try UDP and different protocols several times in the past but eventually I gave up and assumed my UDP issue was permanent so I should have said "I couldn't use UDP the last time I checked". Now that I think about it I had not tried UDP since I built my current computer so it's probably been over a year since I tried using UDP. So far my connection on UDP is still stable and I haven't had any of the issues I had in the past like massive amounts of packet errors or almost instant connection stalls when I started a torrent. I know my ISP changed something in the past because all my issues started when they increased their speed and pushed new firmware and nothing changed on my end. I'm not sure if my ISP changed something that is making UDP usable again or if something changed in Eddie or if it's my new hardware that is much better and based on a $700 Gygabyte X570 AORUS XTREME motherboard with an Intel 1gb network adapter? In any case my connection seems to be stable and my speed almost doubled so thanks for suggesting UDP, I'm not sure how long it would have taken me to ever try it again. It's still only been about 24 hours so nothing is definitive yet and I'll report back if I have any resets that seem unnecessary. If my connection makes it more than a week I would consider the problem resolved and I'll report that here. Thanks again for your reply and suggestion. 1 OpenSourcerer reacted to this Quote Share this post Link to post
MrRandom 6 Posted ... I keep forgetting to post an update here. My connection has been totally stable with no resets for almost 243 hours now, that's over 10 days and the longest my connection had been up in a couple years so I would say my problem is solved! Thanks again OpenSourcerer Quote Share this post Link to post
OpenSourcerer 1436 Posted ... That's a little surprising, seeing as the info in your original post was that an update cut down on the download throughput on UDP. Even if temporary. In any case, it's a great thing that it works out for you. Enjoy! Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
MrRandom 6 Posted ... Yeah it was a speed increase and firmware update by my ISP that originally caused all my problems and it wasn't just me, at the time there were forums that were filled with people having the same problems that started at exactly the same time. All of that happened just after we lost Net Neutrality and ISP's suddenly had the legal right to do whatever they wanted. Everyone told me it was a problem on my end and I had no proof my ISP was causing the problems but even though my proof was just anecdotal there is NO WAY I'll ever believe that my ISP wasn't causing my problems. They are still throttling or something because even though my connection is stable now and my speed almost doubled I'm still getting just a fraction of my actual speed when I used to get about 99% of my actual speed before all the problems started. Quote Share this post Link to post
golfextremely 0 Posted ... (edited) On 3/24/2022 at 9:24 AM, MrRandom said: I've used AirVPN for years and in the past it would run for weeks without disconnecting and reconnecting now I'm lucky if it makes it a whole day, yesterday it only lasted about 8 hours. I've also been having a problem lately with being connectable after AirVPN reconnects, sometimes I'm still connectable but most of the time I'm not. I know that's not a problem with AirVPN but with the frequent reconnects it's made something that required no interaction on my part something I have to constantly monitor and mess with. I know my ISP (Comcast) has been messing with something for a few year now because I was getting about 99% of my speed then over night when they increased their speed and pushed new firmware my speed dropped to about 1/3 of what it was and it remains just a fraction of my actual speed to this day. Since that day I can also no longer use UDP, I've learned to live with the speed and found work arounds for all the other errors I was getting but this instability is becoming VERY inconvenient. For probably a couple years I was using TCP Port 443 IP 3 but the reconnects were happening every few hours so I switched to TCP Port 41185 IP 4 which seemed to make the connection last longer, sometimes a few days but the reconnects seem to be getting more frequent again. Looking at my logs it's always the same error that precedes the disconnect and reconnect... OpenVPN > read TCP_CLIENT: Unknown error (code=10060) I don't know if my ISP is doing something to cause it or if it's a problem with Eddie or something else but any help would be appreciated very much. Here's the log I saved just after the last reconnect.https://vpnapk.su/nordvpn-mod-apk/ . 2022.03.21 00:38:35 - Above log line repeated 1 times more . 2022.03.21 00:38:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 00:38:35 - OpenVPN > VERIFY KU OK . 2022.03.21 00:38:35 - OpenVPN > Validating certificate extended key usage . 2022.03.21 00:38:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 00:38:35 - OpenVPN > VERIFY EKU OK . 2022.03.21 00:38:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 00:38:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 00:38:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 00:38:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 00:54:58 - Collect information about AirVPN completed . 2022.03.21 01:37:47 - Above log line repeated 1 times more . 2022.03.21 01:37:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 01:37:47 - OpenVPN > VERIFY KU OK . 2022.03.21 01:37:47 - OpenVPN > Validating certificate extended key usage . 2022.03.21 01:37:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 01:37:47 - OpenVPN > VERIFY EKU OK . 2022.03.21 01:37:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 01:37:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 01:37:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 01:37:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 01:55:10 - Collect information about AirVPN completed . 2022.03.21 02:36:59 - Above log line repeated 1 times more . 2022.03.21 02:36:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 02:36:59 - OpenVPN > VERIFY KU OK . 2022.03.21 02:36:59 - OpenVPN > Validating certificate extended key usage . 2022.03.21 02:36:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 02:36:59 - OpenVPN > VERIFY EKU OK . 2022.03.21 02:36:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 02:36:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 02:36:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 02:36:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 02:55:24 - Collect information about AirVPN completed . 2022.03.21 03:36:11 - Above log line repeated 1 times more . 2022.03.21 03:36:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 03:36:11 - OpenVPN > VERIFY KU OK . 2022.03.21 03:36:11 - OpenVPN > Validating certificate extended key usage . 2022.03.21 03:36:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 03:36:11 - OpenVPN > VERIFY EKU OK . 2022.03.21 03:36:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 03:36:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 03:36:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 03:36:11 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 03:55:34 - Collect information about AirVPN completed . 2022.03.21 04:35:23 - Above log line repeated 1 times more . 2022.03.21 04:35:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 04:35:23 - OpenVPN > VERIFY KU OK . 2022.03.21 04:35:23 - OpenVPN > Validating certificate extended key usage . 2022.03.21 04:35:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 04:35:23 - OpenVPN > VERIFY EKU OK . 2022.03.21 04:35:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 04:35:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 04:35:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 04:35:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 04:55:44 - Collect information about AirVPN completed . 2022.03.21 05:34:35 - Above log line repeated 1 times more . 2022.03.21 05:34:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 05:34:35 - OpenVPN > VERIFY KU OK . 2022.03.21 05:34:35 - OpenVPN > Validating certificate extended key usage . 2022.03.21 05:34:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 05:34:35 - OpenVPN > VERIFY EKU OK . 2022.03.21 05:34:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 05:34:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 05:34:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 05:34:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 05:55:52 - Collect information about AirVPN completed . 2022.03.21 06:33:47 - Above log line repeated 1 times more . 2022.03.21 06:33:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 06:33:47 - OpenVPN > VERIFY KU OK . 2022.03.21 06:33:47 - OpenVPN > Validating certificate extended key usage . 2022.03.21 06:33:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 06:33:47 - OpenVPN > VERIFY EKU OK . 2022.03.21 06:33:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 06:33:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 06:33:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 06:33:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 06:56:00 - Collect information about AirVPN completed . 2022.03.21 07:32:59 - Above log line repeated 1 times more . 2022.03.21 07:32:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 07:32:59 - OpenVPN > VERIFY KU OK . 2022.03.21 07:32:59 - OpenVPN > Validating certificate extended key usage . 2022.03.21 07:32:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 07:32:59 - OpenVPN > VERIFY EKU OK . 2022.03.21 07:32:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 07:32:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 07:32:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 07:32:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 07:56:05 - Collect information about AirVPN completed . 2022.03.21 08:32:13 - Above log line repeated 1 times more . 2022.03.21 08:32:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 08:32:13 - OpenVPN > VERIFY KU OK . 2022.03.21 08:32:13 - OpenVPN > Validating certificate extended key usage . 2022.03.21 08:32:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 08:32:13 - OpenVPN > VERIFY EKU OK . 2022.03.21 08:32:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 08:32:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 08:32:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 08:32:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 08:56:09 - Collect information about AirVPN completed . 2022.03.21 09:31:25 - Above log line repeated 1 times more . 2022.03.21 09:31:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 09:31:25 - OpenVPN > VERIFY KU OK . 2022.03.21 09:31:25 - OpenVPN > Validating certificate extended key usage . 2022.03.21 09:31:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 09:31:25 - OpenVPN > VERIFY EKU OK . 2022.03.21 09:31:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 09:31:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 09:31:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 09:31:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 09:56:19 - Collect information about AirVPN completed . 2022.03.21 10:30:37 - Above log line repeated 1 times more . 2022.03.21 10:30:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 10:30:37 - OpenVPN > VERIFY KU OK . 2022.03.21 10:30:37 - OpenVPN > Validating certificate extended key usage . 2022.03.21 10:30:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 10:30:37 - OpenVPN > VERIFY EKU OK . 2022.03.21 10:30:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 10:30:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 10:30:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 10:30:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 10:56:30 - Collect information about AirVPN completed . 2022.03.21 11:29:48 - Above log line repeated 1 times more . 2022.03.21 11:29:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 11:29:48 - OpenVPN > VERIFY KU OK . 2022.03.21 11:29:48 - OpenVPN > Validating certificate extended key usage . 2022.03.21 11:29:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 11:29:48 - OpenVPN > VERIFY EKU OK . 2022.03.21 11:29:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 11:29:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 11:29:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 11:29:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 11:56:43 - Collect information about AirVPN completed . 2022.03.21 12:29:00 - Above log line repeated 1 times more . 2022.03.21 12:29:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 12:29:00 - OpenVPN > VERIFY KU OK . 2022.03.21 12:29:00 - OpenVPN > Validating certificate extended key usage . 2022.03.21 12:29:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 12:29:00 - OpenVPN > VERIFY EKU OK . 2022.03.21 12:29:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 12:29:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 12:29:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 12:29:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 12:56:52 - Collect information about AirVPN completed . 2022.03.21 13:28:12 - Above log line repeated 1 times more . 2022.03.21 13:28:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 13:28:12 - OpenVPN > VERIFY KU OK . 2022.03.21 13:28:12 - OpenVPN > Validating certificate extended key usage . 2022.03.21 13:28:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 13:28:12 - OpenVPN > VERIFY EKU OK . 2022.03.21 13:28:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 13:28:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 13:28:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 13:28:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 13:57:01 - Collect information about AirVPN completed . 2022.03.21 14:27:24 - Above log line repeated 1 times more . 2022.03.21 14:27:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 14:27:24 - OpenVPN > VERIFY KU OK . 2022.03.21 14:27:24 - OpenVPN > Validating certificate extended key usage . 2022.03.21 14:27:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 14:27:24 - OpenVPN > VERIFY EKU OK . 2022.03.21 14:27:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 14:27:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 14:27:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 14:27:24 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 14:57:03 - Collect information about AirVPN completed . 2022.03.21 15:26:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 15:26:36 - OpenVPN > VERIFY KU OK . 2022.03.21 15:26:36 - OpenVPN > Validating certificate extended key usage . 2022.03.21 15:26:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 15:26:36 - OpenVPN > VERIFY EKU OK . 2022.03.21 15:26:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 15:26:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 15:26:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 15:26:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 15:27:06 - Collect information about AirVPN completed . 2022.03.21 16:25:48 - Above log line repeated 1 times more . 2022.03.21 16:25:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 16:25:48 - OpenVPN > VERIFY KU OK . 2022.03.21 16:25:48 - OpenVPN > Validating certificate extended key usage . 2022.03.21 16:25:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 16:25:48 - OpenVPN > VERIFY EKU OK . 2022.03.21 16:25:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 16:25:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 16:25:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 16:25:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 16:27:09 - Collect information about AirVPN completed . 2022.03.21 17:25:00 - Above log line repeated 1 times more . 2022.03.21 17:25:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 17:25:00 - OpenVPN > VERIFY KU OK . 2022.03.21 17:25:00 - OpenVPN > Validating certificate extended key usage . 2022.03.21 17:25:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 17:25:00 - OpenVPN > VERIFY EKU OK . 2022.03.21 17:25:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 17:25:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 17:25:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 17:25:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 17:27:18 - Collect information about AirVPN completed . 2022.03.21 18:24:12 - Above log line repeated 1 times more . 2022.03.21 18:24:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 18:24:12 - OpenVPN > VERIFY KU OK . 2022.03.21 18:24:12 - OpenVPN > Validating certificate extended key usage . 2022.03.21 18:24:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 18:24:12 - OpenVPN > VERIFY EKU OK . 2022.03.21 18:24:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 18:24:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 18:24:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 18:24:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 18:27:19 - Collect information about AirVPN completed . 2022.03.21 19:23:24 - Above log line repeated 1 times more . 2022.03.21 19:23:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 19:23:24 - OpenVPN > VERIFY KU OK . 2022.03.21 19:23:24 - OpenVPN > Validating certificate extended key usage . 2022.03.21 19:23:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 19:23:24 - OpenVPN > VERIFY EKU OK . 2022.03.21 19:23:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 19:23:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 19:23:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 19:23:24 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 19:27:28 - Collect information about AirVPN completed . 2022.03.21 20:22:36 - Above log line repeated 1 times more . 2022.03.21 20:22:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 20:22:36 - OpenVPN > VERIFY KU OK . 2022.03.21 20:22:36 - OpenVPN > Validating certificate extended key usage . 2022.03.21 20:22:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 20:22:36 - OpenVPN > VERIFY EKU OK . 2022.03.21 20:22:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 20:22:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 20:22:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 20:22:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 20:27:37 - Collect information about AirVPN completed . 2022.03.21 21:21:48 - Above log line repeated 1 times more . 2022.03.21 21:21:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 21:21:48 - OpenVPN > VERIFY KU OK . 2022.03.21 21:21:48 - OpenVPN > Validating certificate extended key usage . 2022.03.21 21:21:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 21:21:48 - OpenVPN > VERIFY EKU OK . 2022.03.21 21:21:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 21:21:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 21:21:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 21:21:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 21:27:39 - Collect information about AirVPN completed . 2022.03.21 22:21:00 - Above log line repeated 1 times more . 2022.03.21 22:21:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 22:21:00 - OpenVPN > VERIFY KU OK . 2022.03.21 22:21:00 - OpenVPN > Validating certificate extended key usage . 2022.03.21 22:21:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 22:21:00 - OpenVPN > VERIFY EKU OK . 2022.03.21 22:21:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 22:21:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 22:21:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 22:21:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 22:27:44 - Collect information about AirVPN completed . 2022.03.21 23:20:11 - Above log line repeated 1 times more . 2022.03.21 23:20:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.21 23:20:11 - OpenVPN > VERIFY KU OK . 2022.03.21 23:20:11 - OpenVPN > Validating certificate extended key usage . 2022.03.21 23:20:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.21 23:20:11 - OpenVPN > VERIFY EKU OK . 2022.03.21 23:20:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.21 23:20:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 23:20:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.21 23:20:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.21 23:27:49 - Collect information about AirVPN completed . 2022.03.22 00:19:23 - Above log line repeated 1 times more . 2022.03.22 00:19:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 00:19:23 - OpenVPN > VERIFY KU OK . 2022.03.22 00:19:23 - OpenVPN > Validating certificate extended key usage . 2022.03.22 00:19:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 00:19:23 - OpenVPN > VERIFY EKU OK . 2022.03.22 00:19:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 00:19:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 00:19:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 00:19:24 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 00:28:01 - Collect information about AirVPN completed . 2022.03.22 01:18:35 - Above log line repeated 1 times more . 2022.03.22 01:18:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 01:18:35 - OpenVPN > VERIFY KU OK . 2022.03.22 01:18:35 - OpenVPN > Validating certificate extended key usage . 2022.03.22 01:18:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 01:18:35 - OpenVPN > VERIFY EKU OK . 2022.03.22 01:18:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 01:18:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 01:18:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 01:18:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 01:28:13 - Collect information about AirVPN completed . 2022.03.22 02:17:47 - Above log line repeated 1 times more . 2022.03.22 02:17:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 02:17:47 - OpenVPN > VERIFY KU OK . 2022.03.22 02:17:47 - OpenVPN > Validating certificate extended key usage . 2022.03.22 02:17:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 02:17:47 - OpenVPN > VERIFY EKU OK . 2022.03.22 02:17:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 02:17:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 02:17:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 02:17:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 02:28:24 - Collect information about AirVPN completed . 2022.03.22 03:16:59 - Above log line repeated 1 times more . 2022.03.22 03:16:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 03:16:59 - OpenVPN > VERIFY KU OK . 2022.03.22 03:16:59 - OpenVPN > Validating certificate extended key usage . 2022.03.22 03:16:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 03:16:59 - OpenVPN > VERIFY EKU OK . 2022.03.22 03:16:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 03:16:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 03:16:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 03:16:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 03:27:52 - OpenVPN > read TCP_CLIENT: Unknown error (code=10060) . 2022.03.22 03:27:52 - OpenVPN > Connection reset, restarting [-1] . 2022.03.22 03:27:52 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2022.03.22 03:27:52 - OpenVPN > Restart pause, 5 second(s) ! 2022.03.22 03:27:52 - Disconnecting . 2022.03.22 03:27:52 - Routes, removed a route previously added, 68.235.35.124 for gateway 10.20.151.1 . 2022.03.22 03:27:52 - Sending soft termination signal . 2022.03.22 03:27:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 68.235.36.34 MASK 255.255.255.255 192.168.1.1 . 2022.03.22 03:27:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.03.22 03:27:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.22 03:27:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.03.22 03:27:57 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.22 03:27:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.03.22 03:27:57 - OpenVPN > Closing TUN/TAP interface . 2022.03.22 03:27:57 - OpenVPN > TAP: DHCP address released . 2022.03.22 03:27:57 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2022.03.22 03:27:57 - Connection terminated. . 2022.03.22 03:27:57 - IPv6 restored with packet filtering. . 2022.03.22 03:27:57 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.03.22 03:27:57 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2022.03.22 03:27:57 - DNS leak protection with packet filtering disabled. . 2022.03.22 03:27:57 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2022.03.22 03:27:57 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 I 2022.03.22 03:28:00 - Checking authorization ... W 2022.03.22 03:28:00 - Authorization check failed, continue anyway (Fetch url error:Server returned nothing (no headers, no data)) . 2022.03.22 03:28:00 - IPv6 disabled with packet filtering. ! 2022.03.22 03:28:00 - Connecting to Kruger (United States of America, Chicago, Illinois) . 2022.03.22 03:28:01 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.03.22 03:28:01 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.03.22 03:28:01 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.03.22 03:28:01 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.22 03:28:01 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.22 03:28:01 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.22 03:28:01 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.22 03:28:01 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]68.235.36.34:41185 . 2022.03.22 03:28:01 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.03.22 03:28:01 - OpenVPN > Attempting to establish TCP connection with [AF_INET]68.235.36.34:41185 [nonblock] . 2022.03.22 03:28:33 - Cannot retrieve information about AirVPN: Fetch url error:Server returned nothing (no headers, no data) . 2022.03.22 03:30:01 - OpenVPN > TCP: connect to [AF_INET]68.235.36.34:41185 failed: Unknown error . 2022.03.22 03:30:01 - OpenVPN > SIGUSR1[connection failed(soft),init_instance] received, process restarting . 2022.03.22 03:30:01 - OpenVPN > Restart pause, 5 second(s) ! 2022.03.22 03:30:01 - Disconnecting . 2022.03.22 03:30:01 - Sending soft termination signal . 2022.03.22 03:30:06 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2022.03.22 03:30:06 - Connection terminated. . 2022.03.22 03:30:06 - IPv6 restored with packet filtering. I 2022.03.22 03:30:10 - Checking authorization ... . 2022.03.22 03:30:10 - IPv6 disabled with packet filtering. ! 2022.03.22 03:30:10 - Connecting to Kruger (United States of America, Chicago, Illinois) . 2022.03.22 03:30:10 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.03.22 03:30:10 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.03.22 03:30:10 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.03.22 03:30:10 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.22 03:30:10 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.22 03:30:10 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.22 03:30:10 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.22 03:30:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]68.235.36.34:41185 . 2022.03.22 03:30:10 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.03.22 03:30:10 - OpenVPN > Attempting to establish TCP connection with [AF_INET]68.235.36.34:41185 [nonblock] . 2022.03.22 03:30:10 - OpenVPN > TCP connection established with [AF_INET]68.235.36.34:41185 . 2022.03.22 03:30:10 - OpenVPN > TCP_CLIENT link local: (not bound) . 2022.03.22 03:30:10 - OpenVPN > TCP_CLIENT link remote: [AF_INET]68.235.36.34:41185 . 2022.03.22 03:30:10 - OpenVPN > TLS: Initial packet from [AF_INET]68.235.36.34:41185, sid=c6dd9394 e5b23489 . 2022.03.22 03:30:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 03:30:10 - OpenVPN > VERIFY KU OK . 2022.03.22 03:30:10 - OpenVPN > Validating certificate extended key usage . 2022.03.22 03:30:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 03:30:10 - OpenVPN > VERIFY EKU OK . 2022.03.22 03:30:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 03:30:10 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 03:30:10 - OpenVPN > [Kruger] Peer Connection Initiated with [AF_INET]68.235.36.34:41185 . 2022.03.22 03:30:11 - OpenVPN > SENT CONTROL [Kruger]: 'PUSH_REQUEST' (status=1) . 2022.03.22 03:30:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.151.1,dhcp-option DNS6 fde6:7a:7d20:1097::1,tun-ipv6,route-gateway 10.20.151.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1097::100d/64 fde6:7a:7d20:1097::1,ifconfig 10.20.151.15 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.03.22 03:30:11 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.22 03:30:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1097::1' . 2022.03.22 03:30:11 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.22 03:30:11 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1097::100d/64 fde6:7a:7d20:1097::1' . 2022.03.22 03:30:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.22 03:30:11 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.22 03:30:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.22 03:30:11 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.22 03:30:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.03.22 03:30:11 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.22 03:30:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2022.03.22 03:30:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.22 03:30:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.22 03:30:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 03:30:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 03:30:11 - OpenVPN > interactive service msg_channel=0 . 2022.03.22 03:30:11 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=b4:2e:99:a5:7d:50 . 2022.03.22 03:30:11 - OpenVPN > open_tun . 2022.03.22 03:30:11 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2022.03.22 03:30:11 - OpenVPN > TAP-Windows Driver Version 9.24 . 2022.03.22 03:30:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.20.151.0/10.20.151.15/255.255.255.0 [SUCCEEDED] . 2022.03.22 03:30:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.20.151.15/255.255.255.0 on interface {C17997D5-C171-431A-99EB-AF41B82CEAD9} [DHCP-serv: 10.20.151.254, lease-time: 31536000] . 2022.03.22 03:30:11 - OpenVPN > Successful ARP Flush on interface [15] {C17997D5-C171-431A-99EB-AF41B82CEAD9} . 2022.03.22 03:30:11 - OpenVPN > IPv4 MTU set to 1500 on interface 15 using SetIpInterfaceEntry() . 2022.03.22 03:30:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2022.03.22 03:30:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 68.235.36.34 MASK 255.255.255.255 192.168.1.1 . 2022.03.22 03:30:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.03.22 03:30:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.03.22 03:30:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.22 03:30:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.03.22 03:30:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.03.22 03:30:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.22 03:30:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.03.22 03:30:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.03.22 03:30:16 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2022.03.22 03:30:16 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2022.03.22 03:30:16 - DNS leak protection with packet filtering enabled. . 2022.03.22 03:30:16 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.20.151.1) . 2022.03.22 03:30:16 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.20.151.1) . 2022.03.22 03:30:16 - Routes, added a new route, 68.235.35.124 for gateway 10.20.151.1 . 2022.03.22 03:30:16 - Unable to compute route for 2607:9000:0:16:16d7:9cc7:8a38:f9f0: IPv6 VPN gateway not available. . 2022.03.22 03:30:16 - Flushing DNS I 2022.03.22 03:30:16 - Checking route IPv4 I 2022.03.22 03:30:17 - Checking DNS ! 2022.03.22 03:30:17 - Connected. . 2022.03.22 03:30:17 - OpenVPN > Initialization Sequence Completed . 2022.03.22 03:58:36 - Collect information about AirVPN completed . 2022.03.22 04:29:56 - Above log line repeated 1 times more . 2022.03.22 04:29:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 04:29:56 - OpenVPN > VERIFY KU OK . 2022.03.22 04:29:56 - OpenVPN > Validating certificate extended key usage . 2022.03.22 04:29:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 04:29:56 - OpenVPN > VERIFY EKU OK . 2022.03.22 04:29:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 04:29:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 04:29:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 04:29:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 04:58:42 - Collect information about AirVPN completed . 2022.03.22 05:29:42 - Above log line repeated 1 times more . 2022.03.22 05:29:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 05:29:42 - OpenVPN > VERIFY KU OK . 2022.03.22 05:29:42 - OpenVPN > Validating certificate extended key usage . 2022.03.22 05:29:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 05:29:42 - OpenVPN > VERIFY EKU OK . 2022.03.22 05:29:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 05:29:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 05:29:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 05:29:42 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 05:58:50 - Collect information about AirVPN completed . 2022.03.22 06:29:28 - Above log line repeated 1 times more . 2022.03.22 06:29:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 06:29:28 - OpenVPN > VERIFY KU OK . 2022.03.22 06:29:28 - OpenVPN > Validating certificate extended key usage . 2022.03.22 06:29:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 06:29:28 - OpenVPN > VERIFY EKU OK . 2022.03.22 06:29:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 06:29:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 06:29:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 06:29:28 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 06:59:07 - Collect information about AirVPN completed . 2022.03.22 07:29:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 07:29:14 - OpenVPN > VERIFY KU OK . 2022.03.22 07:29:14 - OpenVPN > Validating certificate extended key usage . 2022.03.22 07:29:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 07:29:14 - OpenVPN > VERIFY EKU OK . 2022.03.22 07:29:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 07:29:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 07:29:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 07:29:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 07:29:17 - Collect information about AirVPN completed . 2022.03.22 08:29:02 - Above log line repeated 1 times more . 2022.03.22 08:29:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 08:29:02 - OpenVPN > VERIFY KU OK . 2022.03.22 08:29:02 - OpenVPN > Validating certificate extended key usage . 2022.03.22 08:29:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 08:29:02 - OpenVPN > VERIFY EKU OK . 2022.03.22 08:29:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 08:29:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 08:29:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 08:29:02 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 08:29:35 - Collect information about AirVPN completed . 2022.03.22 09:28:48 - Above log line repeated 1 times more . 2022.03.22 09:28:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 09:28:48 - OpenVPN > VERIFY KU OK . 2022.03.22 09:28:48 - OpenVPN > Validating certificate extended key usage . 2022.03.22 09:28:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 09:28:48 - OpenVPN > VERIFY EKU OK . 2022.03.22 09:28:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 09:28:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 09:28:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 09:28:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 09:29:53 - Collect information about AirVPN completed . 2022.03.22 10:28:34 - Above log line repeated 1 times more . 2022.03.22 10:28:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 10:28:34 - OpenVPN > VERIFY KU OK . 2022.03.22 10:28:34 - OpenVPN > Validating certificate extended key usage . 2022.03.22 10:28:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 10:28:34 - OpenVPN > VERIFY EKU OK . 2022.03.22 10:28:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 10:28:34 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 10:28:34 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 10:28:34 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 10:30:03 - Collect information about AirVPN completed . 2022.03.22 11:28:19 - Above log line repeated 1 times more . 2022.03.22 11:28:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 11:28:19 - OpenVPN > VERIFY KU OK . 2022.03.22 11:28:19 - OpenVPN > Validating certificate extended key usage . 2022.03.22 11:28:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 11:28:19 - OpenVPN > VERIFY EKU OK . 2022.03.22 11:28:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 11:28:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 11:28:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 11:28:20 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 11:30:12 - Collect information about AirVPN completed . 2022.03.22 12:28:05 - Above log line repeated 1 times more . 2022.03.22 12:28:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 12:28:05 - OpenVPN > VERIFY KU OK . 2022.03.22 12:28:05 - OpenVPN > Validating certificate extended key usage . 2022.03.22 12:28:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 12:28:05 - OpenVPN > VERIFY EKU OK . 2022.03.22 12:28:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 12:28:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 12:28:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 12:28:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 12:30:15 - Collect information about AirVPN completed . 2022.03.22 13:27:51 - Above log line repeated 1 times more . 2022.03.22 13:27:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 13:27:51 - OpenVPN > VERIFY KU OK . 2022.03.22 13:27:51 - OpenVPN > Validating certificate extended key usage . 2022.03.22 13:27:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 13:27:51 - OpenVPN > VERIFY EKU OK . 2022.03.22 13:27:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 13:27:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 13:27:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 13:27:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 13:30:29 - Collect information about AirVPN completed . 2022.03.22 14:27:37 - Above log line repeated 1 times more . 2022.03.22 14:27:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 14:27:37 - OpenVPN > VERIFY KU OK . 2022.03.22 14:27:37 - OpenVPN > Validating certificate extended key usage . 2022.03.22 14:27:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 14:27:37 - OpenVPN > VERIFY EKU OK . 2022.03.22 14:27:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 14:27:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 14:27:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 14:27:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 14:30:31 - Collect information about AirVPN completed . 2022.03.22 15:27:23 - Above log line repeated 1 times more . 2022.03.22 15:27:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 15:27:23 - OpenVPN > VERIFY KU OK . 2022.03.22 15:27:23 - OpenVPN > Validating certificate extended key usage . 2022.03.22 15:27:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 15:27:23 - OpenVPN > VERIFY EKU OK . 2022.03.22 15:27:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 15:27:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 15:27:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 15:27:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 15:30:41 - Collect information about AirVPN completed . 2022.03.22 16:00:58 - OpenVPN > read TCP_CLIENT: Unknown error (code=10060) . 2022.03.22 16:00:58 - OpenVPN > Connection reset, restarting [-1] . 2022.03.22 16:00:58 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2022.03.22 16:00:58 - OpenVPN > Restart pause, 5 second(s) ! 2022.03.22 16:00:58 - Disconnecting . 2022.03.22 16:00:58 - Routes, removed a route previously added, 68.235.35.124 for gateway 10.20.151.1 . 2022.03.22 16:00:58 - Sending soft termination signal . 2022.03.22 16:01:03 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 68.235.36.34 MASK 255.255.255.255 192.168.1.1 . 2022.03.22 16:01:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.03.22 16:01:03 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.22 16:01:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.03.22 16:01:03 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.22 16:01:03 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.03.22 16:01:03 - OpenVPN > Closing TUN/TAP interface . 2022.03.22 16:01:03 - OpenVPN > TAP: DHCP address released . 2022.03.22 16:01:03 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2022.03.22 16:01:03 - Connection terminated. . 2022.03.22 16:01:03 - IPv6 restored with packet filtering. . 2022.03.22 16:01:03 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.03.22 16:01:03 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2022.03.22 16:01:03 - DNS leak protection with packet filtering disabled. . 2022.03.22 16:01:03 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2022.03.22 16:01:03 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2022.03.22 16:01:04 - Collect information about AirVPN completed I 2022.03.22 16:01:06 - Checking authorization ... . 2022.03.22 16:01:06 - IPv6 disabled with packet filtering. ! 2022.03.22 16:01:06 - Connecting to Kruger (United States of America, Chicago, Illinois) . 2022.03.22 16:01:07 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.03.22 16:01:07 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.03.22 16:01:07 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.03.22 16:01:07 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.22 16:01:07 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.22 16:01:07 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.22 16:01:07 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.22 16:01:07 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]68.235.36.34:41185 . 2022.03.22 16:01:07 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.03.22 16:01:07 - OpenVPN > Attempting to establish TCP connection with [AF_INET]68.235.36.34:41185 [nonblock] . 2022.03.22 16:01:07 - OpenVPN > TCP connection established with [AF_INET]68.235.36.34:41185 . 2022.03.22 16:01:07 - OpenVPN > TCP_CLIENT link local: (not bound) . 2022.03.22 16:01:07 - OpenVPN > TCP_CLIENT link remote: [AF_INET]68.235.36.34:41185 . 2022.03.22 16:01:07 - OpenVPN > TLS: Initial packet from [AF_INET]68.235.36.34:41185, sid=434c1d06 11f8b0c7 . 2022.03.22 16:01:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 16:01:07 - OpenVPN > VERIFY KU OK . 2022.03.22 16:01:07 - OpenVPN > Validating certificate extended key usage . 2022.03.22 16:01:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 16:01:07 - OpenVPN > VERIFY EKU OK . 2022.03.22 16:01:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 16:01:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 16:01:07 - OpenVPN > [Kruger] Peer Connection Initiated with [AF_INET]68.235.36.34:41185 . 2022.03.22 16:01:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.151.1,dhcp-option DNS6 fde6:7a:7d20:1097::1,tun-ipv6,route-gateway 10.20.151.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1097::100d/64 fde6:7a:7d20:1097::1,ifconfig 10.20.151.15 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.03.22 16:01:07 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.22 16:01:07 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1097::1' . 2022.03.22 16:01:07 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.22 16:01:07 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1097::100d/64 fde6:7a:7d20:1097::1' . 2022.03.22 16:01:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.22 16:01:07 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.22 16:01:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.22 16:01:07 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.22 16:01:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.03.22 16:01:07 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.22 16:01:07 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2022.03.22 16:01:07 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.22 16:01:07 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.22 16:01:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 16:01:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 16:01:07 - OpenVPN > interactive service msg_channel=0 . 2022.03.22 16:01:07 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=b4:2e:99:a5:7d:50 . 2022.03.22 16:01:08 - OpenVPN > open_tun . 2022.03.22 16:01:08 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2022.03.22 16:01:08 - OpenVPN > TAP-Windows Driver Version 9.24 . 2022.03.22 16:01:08 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.20.151.0/10.20.151.15/255.255.255.0 [SUCCEEDED] . 2022.03.22 16:01:08 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.20.151.15/255.255.255.0 on interface {C17997D5-C171-431A-99EB-AF41B82CEAD9} [DHCP-serv: 10.20.151.254, lease-time: 31536000] . 2022.03.22 16:01:08 - OpenVPN > Successful ARP Flush on interface [15] {C17997D5-C171-431A-99EB-AF41B82CEAD9} . 2022.03.22 16:01:08 - OpenVPN > IPv4 MTU set to 1500 on interface 15 using SetIpInterfaceEntry() . 2022.03.22 16:01:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2022.03.22 16:01:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 68.235.36.34 MASK 255.255.255.255 192.168.1.1 . 2022.03.22 16:01:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.03.22 16:01:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.03.22 16:01:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.22 16:01:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.03.22 16:01:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.03.22 16:01:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.22 16:01:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.03.22 16:01:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.03.22 16:01:12 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2022.03.22 16:01:12 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2022.03.22 16:01:12 - DNS leak protection with packet filtering enabled. . 2022.03.22 16:01:12 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.20.151.1) . 2022.03.22 16:01:12 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.20.151.1) . 2022.03.22 16:01:12 - Routes, added a new route, 68.235.35.124 for gateway 10.20.151.1 . 2022.03.22 16:01:12 - Unable to compute route for 2607:9000:0:16:16d7:9cc7:8a38:f9f0: IPv6 VPN gateway not available. . 2022.03.22 16:01:12 - Flushing DNS I 2022.03.22 16:01:12 - Checking route IPv4 I 2022.03.22 16:01:12 - Checking DNS ! 2022.03.22 16:01:13 - Connected. . 2022.03.22 16:01:13 - OpenVPN > Initialization Sequence Completed . 2022.03.22 16:30:44 - Collect information about AirVPN completed . 2022.03.22 16:57:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 16:57:17 - OpenVPN > VERIFY KU OK . 2022.03.22 16:57:17 - OpenVPN > Validating certificate extended key usage . 2022.03.22 16:57:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 16:57:17 - OpenVPN > VERIFY EKU OK . 2022.03.22 16:57:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 16:57:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 16:57:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 16:57:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 17:00:49 - Collect information about AirVPN completed . 2022.03.22 17:53:27 - Above log line repeated 1 times more . 2022.03.22 17:53:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 17:53:27 - OpenVPN > VERIFY KU OK . 2022.03.22 17:53:27 - OpenVPN > Validating certificate extended key usage . 2022.03.22 17:53:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 17:53:27 - OpenVPN > VERIFY EKU OK . 2022.03.22 17:53:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 17:53:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 17:53:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 17:53:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 18:00:55 - Collect information about AirVPN completed . 2022.03.22 18:49:37 - Above log line repeated 1 times more . 2022.03.22 18:49:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 18:49:37 - OpenVPN > VERIFY KU OK . 2022.03.22 18:49:37 - OpenVPN > Validating certificate extended key usage . 2022.03.22 18:49:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 18:49:37 - OpenVPN > VERIFY EKU OK . 2022.03.22 18:49:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 18:49:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 18:49:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 18:49:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 19:01:04 - Collect information about AirVPN completed . 2022.03.22 19:45:47 - Above log line repeated 1 times more . 2022.03.22 19:45:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 19:45:47 - OpenVPN > VERIFY KU OK . 2022.03.22 19:45:47 - OpenVPN > Validating certificate extended key usage . 2022.03.22 19:45:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 19:45:47 - OpenVPN > VERIFY EKU OK . 2022.03.22 19:45:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 19:45:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 19:45:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 19:45:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 20:01:13 - Collect information about AirVPN completed . 2022.03.22 20:41:57 - Above log line repeated 1 times more . 2022.03.22 20:41:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 20:41:57 - OpenVPN > VERIFY KU OK . 2022.03.22 20:41:57 - OpenVPN > Validating certificate extended key usage . 2022.03.22 20:41:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 20:41:57 - OpenVPN > VERIFY EKU OK . 2022.03.22 20:41:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 20:41:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 20:41:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 20:41:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 21:01:19 - Collect information about AirVPN completed . 2022.03.22 21:38:07 - Above log line repeated 1 times more . 2022.03.22 21:38:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 21:38:07 - OpenVPN > VERIFY KU OK . 2022.03.22 21:38:07 - OpenVPN > Validating certificate extended key usage . 2022.03.22 21:38:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 21:38:07 - OpenVPN > VERIFY EKU OK . 2022.03.22 21:38:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 21:38:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 21:38:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 21:38:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 22:01:24 - Collect information about AirVPN completed . 2022.03.22 22:34:17 - Above log line repeated 1 times more . 2022.03.22 22:34:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 22:34:17 - OpenVPN > VERIFY KU OK . 2022.03.22 22:34:17 - OpenVPN > Validating certificate extended key usage . 2022.03.22 22:34:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 22:34:17 - OpenVPN > VERIFY EKU OK . 2022.03.22 22:34:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 22:34:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 22:34:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 22:34:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 23:01:30 - Collect information about AirVPN completed . 2022.03.22 23:30:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.22 23:30:26 - OpenVPN > VERIFY KU OK . 2022.03.22 23:30:26 - OpenVPN > Validating certificate extended key usage . 2022.03.22 23:30:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.22 23:30:26 - OpenVPN > VERIFY EKU OK . 2022.03.22 23:30:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.22 23:30:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 23:30:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.22 23:30:26 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.22 23:31:36 - Collect information about AirVPN completed . 2022.03.23 00:26:36 - Above log line repeated 1 times more . 2022.03.23 00:26:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 00:26:36 - OpenVPN > VERIFY KU OK . 2022.03.23 00:26:36 - OpenVPN > Validating certificate extended key usage . 2022.03.23 00:26:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 00:26:36 - OpenVPN > VERIFY EKU OK . 2022.03.23 00:26:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 00:26:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 00:26:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 00:26:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 00:31:49 - Collect information about AirVPN completed . 2022.03.23 01:22:46 - Above log line repeated 1 times more . 2022.03.23 01:22:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 01:22:46 - OpenVPN > VERIFY KU OK . 2022.03.23 01:22:46 - OpenVPN > Validating certificate extended key usage . 2022.03.23 01:22:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 01:22:46 - OpenVPN > VERIFY EKU OK . 2022.03.23 01:22:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 01:22:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 01:22:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 01:22:46 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 01:32:02 - Collect information about AirVPN completed . 2022.03.23 02:18:56 - Above log line repeated 1 times more . 2022.03.23 02:18:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 02:18:56 - OpenVPN > VERIFY KU OK . 2022.03.23 02:18:56 - OpenVPN > Validating certificate extended key usage . 2022.03.23 02:18:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 02:18:56 - OpenVPN > VERIFY EKU OK . 2022.03.23 02:18:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 02:18:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 02:18:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 02:18:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 02:32:14 - Collect information about AirVPN completed . 2022.03.23 03:15:06 - Above log line repeated 1 times more . 2022.03.23 03:15:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 03:15:06 - OpenVPN > VERIFY KU OK . 2022.03.23 03:15:06 - OpenVPN > Validating certificate extended key usage . 2022.03.23 03:15:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 03:15:06 - OpenVPN > VERIFY EKU OK . 2022.03.23 03:15:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 03:15:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 03:15:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 03:15:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 03:32:26 - Collect information about AirVPN completed . 2022.03.23 04:11:16 - Above log line repeated 1 times more . 2022.03.23 04:11:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 04:11:16 - OpenVPN > VERIFY KU OK . 2022.03.23 04:11:16 - OpenVPN > Validating certificate extended key usage . 2022.03.23 04:11:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 04:11:16 - OpenVPN > VERIFY EKU OK . 2022.03.23 04:11:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 04:11:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 04:11:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 04:11:16 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 04:32:37 - Collect information about AirVPN completed . 2022.03.23 05:07:26 - Above log line repeated 1 times more . 2022.03.23 05:07:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 05:07:26 - OpenVPN > VERIFY KU OK . 2022.03.23 05:07:26 - OpenVPN > Validating certificate extended key usage . 2022.03.23 05:07:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 05:07:26 - OpenVPN > VERIFY EKU OK . 2022.03.23 05:07:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 05:07:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 05:07:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 05:07:26 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 05:32:50 - Collect information about AirVPN completed . 2022.03.23 06:03:36 - Above log line repeated 1 times more . 2022.03.23 06:03:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 06:03:36 - OpenVPN > VERIFY KU OK . 2022.03.23 06:03:36 - OpenVPN > Validating certificate extended key usage . 2022.03.23 06:03:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 06:03:36 - OpenVPN > VERIFY EKU OK . 2022.03.23 06:03:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 06:03:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 06:03:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 06:03:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 06:33:03 - Collect information about AirVPN completed . 2022.03.23 06:59:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 06:59:46 - OpenVPN > VERIFY KU OK . 2022.03.23 06:59:46 - OpenVPN > Validating certificate extended key usage . 2022.03.23 06:59:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 06:59:46 - OpenVPN > VERIFY EKU OK . 2022.03.23 06:59:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 06:59:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 06:59:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 06:59:46 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 07:03:08 - Collect information about AirVPN completed . 2022.03.23 07:55:56 - Above log line repeated 1 times more . 2022.03.23 07:55:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 07:55:56 - OpenVPN > VERIFY KU OK . 2022.03.23 07:55:56 - OpenVPN > Validating certificate extended key usage . 2022.03.23 07:55:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 07:55:56 - OpenVPN > VERIFY EKU OK . 2022.03.23 07:55:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 07:55:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 07:55:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 07:55:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 08:03:19 - Collect information about AirVPN completed . 2022.03.23 08:52:08 - Above log line repeated 1 times more . 2022.03.23 08:52:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 08:52:08 - OpenVPN > VERIFY KU OK . 2022.03.23 08:52:08 - OpenVPN > Validating certificate extended key usage . 2022.03.23 08:52:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 08:52:08 - OpenVPN > VERIFY EKU OK . 2022.03.23 08:52:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 08:52:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 08:52:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 08:52:08 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 09:03:31 - Collect information about AirVPN completed . 2022.03.23 09:48:17 - Above log line repeated 1 times more . 2022.03.23 09:48:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 09:48:17 - OpenVPN > VERIFY KU OK . 2022.03.23 09:48:17 - OpenVPN > Validating certificate extended key usage . 2022.03.23 09:48:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 09:48:17 - OpenVPN > VERIFY EKU OK . 2022.03.23 09:48:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 09:48:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 09:48:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 09:48:18 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 10:03:39 - Collect information about AirVPN completed . 2022.03.23 10:44:27 - Above log line repeated 1 times more . 2022.03.23 10:44:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 10:44:27 - OpenVPN > VERIFY KU OK . 2022.03.23 10:44:27 - OpenVPN > Validating certificate extended key usage . 2022.03.23 10:44:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 10:44:27 - OpenVPN > VERIFY EKU OK . 2022.03.23 10:44:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 10:44:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 10:44:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 10:44:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 11:03:45 - Collect information about AirVPN completed . 2022.03.23 11:40:37 - Above log line repeated 1 times more . 2022.03.23 11:40:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 11:40:37 - OpenVPN > VERIFY KU OK . 2022.03.23 11:40:37 - OpenVPN > Validating certificate extended key usage . 2022.03.23 11:40:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 11:40:37 - OpenVPN > VERIFY EKU OK . 2022.03.23 11:40:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 11:40:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 11:40:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 11:40:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 12:03:52 - Collect information about AirVPN completed . 2022.03.23 12:36:47 - Above log line repeated 1 times more . 2022.03.23 12:36:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 12:36:47 - OpenVPN > VERIFY KU OK . 2022.03.23 12:36:47 - OpenVPN > Validating certificate extended key usage . 2022.03.23 12:36:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 12:36:47 - OpenVPN > VERIFY EKU OK . 2022.03.23 12:36:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 12:36:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 12:36:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 12:36:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 13:03:57 - Collect information about AirVPN completed . 2022.03.23 13:32:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 13:32:57 - OpenVPN > VERIFY KU OK . 2022.03.23 13:32:57 - OpenVPN > Validating certificate extended key usage . 2022.03.23 13:32:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 13:32:57 - OpenVPN > VERIFY EKU OK . 2022.03.23 13:32:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 13:32:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 13:32:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 13:32:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 13:34:02 - Collect information about AirVPN completed . 2022.03.23 13:43:26 - OpenVPN > read TCP_CLIENT: Unknown error (code=10060) . 2022.03.23 13:43:26 - OpenVPN > Connection reset, restarting [-1] . 2022.03.23 13:43:26 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting . 2022.03.23 13:43:26 - OpenVPN > Restart pause, 5 second(s) ! 2022.03.23 13:43:26 - Disconnecting . 2022.03.23 13:43:26 - Routes, removed a route previously added, 68.235.35.124 for gateway 10.20.151.1 . 2022.03.23 13:43:26 - Sending soft termination signal . 2022.03.23 13:43:31 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 68.235.36.34 MASK 255.255.255.255 192.168.1.1 . 2022.03.23 13:43:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.03.23 13:43:31 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.23 13:43:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.03.23 13:43:31 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.23 13:43:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2022.03.23 13:43:31 - OpenVPN > Closing TUN/TAP interface . 2022.03.23 13:43:31 - OpenVPN > TAP: DHCP address released . 2022.03.23 13:43:31 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2022.03.23 13:43:31 - Connection terminated. . 2022.03.23 13:43:31 - IPv6 restored with packet filtering. . 2022.03.23 13:43:31 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2022.03.23 13:43:31 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2022.03.23 13:43:31 - DNS leak protection with packet filtering disabled. . 2022.03.23 13:43:31 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2022.03.23 13:43:31 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 I 2022.03.23 13:43:34 - Checking authorization ... . 2022.03.23 13:43:35 - IPv6 disabled with packet filtering. ! 2022.03.23 13:43:35 - Connecting to Kruger (United States of America, Chicago, Illinois) . 2022.03.23 13:43:35 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.03.23 13:43:35 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.03.23 13:43:35 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.03.23 13:43:35 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.23 13:43:35 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.23 13:43:35 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.23 13:43:35 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.23 13:43:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]68.235.36.34:41185 . 2022.03.23 13:43:35 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.03.23 13:43:35 - OpenVPN > Attempting to establish TCP connection with [AF_INET]68.235.36.34:41185 [nonblock] . 2022.03.23 13:43:35 - OpenVPN > TCP connection established with [AF_INET]68.235.36.34:41185 . 2022.03.23 13:43:35 - OpenVPN > TCP_CLIENT link local: (not bound) . 2022.03.23 13:43:35 - OpenVPN > TCP_CLIENT link remote: [AF_INET]68.235.36.34:41185 . 2022.03.23 13:43:35 - OpenVPN > TLS: Initial packet from [AF_INET]68.235.36.34:41185, sid=49cac23e c7480a0c . 2022.03.23 13:43:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.23 13:43:35 - OpenVPN > VERIFY KU OK . 2022.03.23 13:43:35 - OpenVPN > Validating certificate extended key usage . 2022.03.23 13:43:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.23 13:43:35 - OpenVPN > VERIFY EKU OK . 2022.03.23 13:43:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2022.03.23 13:43:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.03.23 13:43:35 - OpenVPN > [Kruger] Peer Connection Initiated with [AF_INET]68.235.36.34:41185 . 2022.03.23 13:43:36 - OpenVPN > SENT CONTROL [Kruger]: 'PUSH_REQUEST' (status=1) . 2022.03.23 13:43:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.151.1,dhcp-option DNS6 fde6:7a:7d20:1097::1,tun-ipv6,route-gateway 10.20.151.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1097::100d/64 fde6:7a:7d20:1097::1,ifconfig 10.20.151.15 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.03.23 13:43:36 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.23 13:43:36 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1097::1' . 2022.03.23 13:43:36 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.23 13:43:36 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1097::100d/64 fde6:7a:7d20:1097::1' . 2022.03.23 13:43:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.23 13:43:36 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.23 13:43:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.23 13:43:36 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.23 13:43:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.03.23 13:43:36 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.23 13:43:36 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2022.03.23 13:43:36 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.23 13:43:36 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.23 13:43:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 13:43:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.23 13:43:36 - OpenVPN > interactive service msg_channel=0 . 2022.03.23 13:43:36 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=5 HWADDR=b4:2e:99:a5:7d:50 . 2022.03.23 13:43:36 - OpenVPN > open_tun . 2022.03.23 13:43:36 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2022.03.23 13:43:36 - OpenVPN > TAP-Windows Driver Version 9.24 . 2022.03.23 13:43:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.20.151.0/10.20.151.15/255.255.255.0 [SUCCEEDED] . 2022.03.23 13:43:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.20.151.15/255.255.255.0 on interface {C17997D5-C171-431A-99EB-AF41B82CEAD9} [DHCP-serv: 10.20.151.254, lease-time: 31536000] . 2022.03.23 13:43:36 - OpenVPN > Successful ARP Flush on interface [15] {C17997D5-C171-431A-99EB-AF41B82CEAD9} . 2022.03.23 13:43:36 - OpenVPN > IPv4 MTU set to 1500 on interface 15 using SetIpInterfaceEntry() . 2022.03.23 13:43:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2022.03.23 13:43:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 68.235.36.34 MASK 255.255.255.255 192.168.1.1 . 2022.03.23 13:43:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.03.23 13:43:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.03.23 13:43:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.23 13:43:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.03.23 13:43:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.03.23 13:43:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.20.151.1 . 2022.03.23 13:43:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.03.23 13:43:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.03.23 13:43:41 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2022.03.23 13:43:41 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2022.03.23 13:43:41 - DNS leak protection with packet filtering enabled. . 2022.03.23 13:43:41 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.20.151.1) . 2022.03.23 13:43:41 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.20.151.1) . 2022.03.23 13:43:41 - Routes, added a new route, 68.235.35.124 for gateway 10.20.151.1 . 2022.03.23 13:43:41 - Unable to compute route for 2607:9000:0:16:16d7:9cc7:8a38:f9f0: IPv6 VPN gateway not available. . 2022.03.23 13:43:41 - Flushing DNS I 2022.03.23 13:43:41 - Checking route IPv4 I 2022.03.23 13:43:42 - Checking DNS ! 2022.03.23 13:43:42 - Connected. . 2022.03.23 13:43:42 - OpenVPN > Initialization Sequence Completed I am also having the same issue. Edited ... by golfextremely Quote Share this post Link to post
OpenSourcerer 1436 Posted ... 4 hours ago, golfextremely said: I am also having the same issue. Open your own thread with your own info. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post