Jump to content
Not connected, Your IP: 3.145.57.41

Search the Community

Showing results for tags 'Latency'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 18 results

  1. Now, I have gone ahead and done what this article said to do, which worked for like a day. But now I'm back to having absolutely 0 clue what the latency of a server is, what it's score is, and my allowlist keeps getting deleted/wiped.
  2. The servers monitor shows no latency and ping results from locations. It,s empty.
  3. The UI doesn't display any latencies of the servers and no matter which serve I'm on, the internet connection will drop often when I'm connected to the VPN. I've tried reinstalling more than once and the problem persists. That's the best I can explain it. . 2023.02.27 23:40:42 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.22621.0, Mono/.Net: v4.0.30319 . 2023.02.27 23:40:43 - Command line arguments (1): path="home" . 2023.02.27 23:40:44 - Reading options from C:\Users\omarr\AppData\Local\Eddie\default.profile . 2023.02.27 23:40:46 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2023.02.27 23:40:46 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2023.02.27 23:40:46 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2023.02.27 23:40:47 - Ready . 2023.02.27 23:40:48 - Collect information about AirVPN completed I 2023.02.27 23:40:56 - Checking login ... ! 2023.02.27 23:40:57 - Logged in. I 2023.02.27 23:41:11 - Session starting. I 2023.02.27 23:41:12 - Checking authorization ... . 2023.02.27 23:41:13 - Added new network interface "Eddie", Wintun version 0.12 . 2023.02.27 23:41:13 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2023.02.27 23:41:13 - Connecting to Sculptor (United States of America, Atlanta, Georgia) . 2023.02.27 23:41:14 - Routes, add 64.42.179.37/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.02.27 23:41:14 - Routes, add 64.42.179.37/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists. . 2023.02.27 23:41:14 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.02.27 23:41:14 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.02.27 23:41:14 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.02.27 23:41:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.02.27 23:41:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.02.27 23:41:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.02.27 23:41:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.02.27 23:41:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.37:443 . 2023.02.27 23:41:14 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.02.27 23:41:14 - OpenVPN > UDP link local: (not bound) . 2023.02.27 23:41:14 - OpenVPN > UDP link remote: [AF_INET]64.42.179.37:443 . 2023.02.27 23:41:14 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.37:443, sid=c166c72a 3c7e4a7c . 2023.02.27 23:41:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.27 23:41:14 - OpenVPN > VERIFY KU OK . 2023.02.27 23:41:14 - OpenVPN > Validating certificate extended key usage . 2023.02.27 23:41:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.27 23:41:14 - OpenVPN > VERIFY EKU OK . 2023.02.27 23:41:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sculptor, emailAddress=info@airvpn.org . 2023.02.27 23:41:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.27 23:41:14 - OpenVPN > [Sculptor] Peer Connection Initiated with [AF_INET]64.42.179.37:443 . 2023.02.27 23:41:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.82.1,dhcp-option DNS6 fde6:7a:7d20:1352::1,tun-ipv6,route-gateway 10.23.82.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1352::10c7/64 fde6:7a:7d20:1352::1,ifconfig 10.23.82.201 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.02.27 23:41:15 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.02.27 23:41:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.82.1' . 2023.02.27 23:41:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1352::1' . 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.02.27 23:41:15 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.02.27 23:41:15 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.02.27 23:41:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.27 23:41:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.27 23:41:15 - OpenVPN > interactive service msg_channel=0 . 2023.02.27 23:41:15 - OpenVPN > open_tun . 2023.02.27 23:41:15 - OpenVPN > wintun device [Eddie] opened . 2023.02.27 23:41:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.23.82.201 255.255.255.0 . 2023.02.27 23:41:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all . 2023.02.27 23:41:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all . 2023.02.27 23:41:15 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.02.27 23:41:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 44 fde6:7a:7d20:1352::10c7/128 store=active . 2023.02.27 23:41:15 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1352::/64 -> fde6:7a:7d20:1352::10c7 metric 0) dev Eddie . 2023.02.27 23:41:16 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1352::/64 44 fe80::8 store=active . 2023.02.27 23:41:16 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.02.27 23:41:16 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 44 all . 2023.02.27 23:41:16 - OpenVPN > IPv6 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.02.27 23:41:16 - OpenVPN > Initialization Sequence Completed . 2023.02.27 23:41:16 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.02.27 23:41:16 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.02.27 23:41:16 - DNS leak protection with packet filtering enabled. . 2023.02.27 23:41:16 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.82.1) . 2023.02.27 23:41:16 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1352::1) . 2023.02.27 23:41:17 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:41:17 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:41:18 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:41:18 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:41:18 - Routes, add 64.42.179.35/32 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:41:19 - Routes, add 2605:9f80:6000:77:25ba:81d8:c17b:536b/128 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:41:19 - Flushing DNS I 2023.02.27 23:41:19 - Checking route IPv4 I 2023.02.27 23:41:19 - Checking route IPv6 I 2023.02.27 23:41:20 - Checking DNS ! 2023.02.27 23:41:20 - Connected. ! 2023.02.27 23:53:39 - Disconnecting . 2023.02.27 23:53:39 - Sending soft termination signal . 2023.02.27 23:53:43 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.02.27 23:53:44 - OpenVPN > Closing TUN/TAP interface . 2023.02.27 23:53:44 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1352::/64) . 2023.02.27 23:53:44 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1352::/64 44 fe80::8 store=active . 2023.02.27 23:53:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 44 fde6:7a:7d20:1352::10c7 store=active . 2023.02.27 23:53:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 44 10.23.82.201 store=active . 2023.02.27 23:53:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.02.27 23:53:46 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:46 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:46 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:47 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:47 - Routes, delete 64.42.179.37/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.02.27 23:53:47 - Routes, delete 64.42.179.35/32 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:48 - Routes, delete 2605:9f80:6000:77:25ba:81d8:c17b:536b/128 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:48 - Routes, delete 64.42.179.37/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", not exists. . 2023.02.27 23:53:48 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.02.27 23:53:48 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.02.27 23:53:48 - DNS leak protection with packet filtering disabled. . 2023.02.27 23:53:48 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.02.27 23:53:48 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.02.27 23:53:48 - Connection terminated. I 2023.02.27 23:53:48 - Checking authorization ... . 2023.02.27 23:53:49 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2023.02.27 23:53:49 - Connecting to Ursa (United States of America, Atlanta, Georgia) . 2023.02.27 23:53:50 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.02.27 23:53:50 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists. . 2023.02.27 23:53:50 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.02.27 23:53:50 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.02.27 23:53:50 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.02.27 23:53:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.02.27 23:53:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.02.27 23:53:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.02.27 23:53:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.02.27 23:53:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.53:443 . 2023.02.27 23:53:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.02.27 23:53:50 - OpenVPN > UDP link local: (not bound) . 2023.02.27 23:53:50 - OpenVPN > UDP link remote: [AF_INET]64.42.179.53:443 . 2023.02.27 23:53:50 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.53:443, sid=2f491c10 4764d9bd . 2023.02.27 23:53:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.27 23:53:51 - OpenVPN > VERIFY KU OK . 2023.02.27 23:53:51 - OpenVPN > Validating certificate extended key usage . 2023.02.27 23:53:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.27 23:53:51 - OpenVPN > VERIFY EKU OK . 2023.02.27 23:53:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.27 23:53:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.27 23:53:51 - OpenVPN > [Ursa] Peer Connection Initiated with [AF_INET]64.42.179.53:443 . 2023.02.27 23:53:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.146.1,dhcp-option DNS6 fde6:7a:7d20:1392::1,tun-ipv6,route-gateway 10.23.146.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1392::100a/64 fde6:7a:7d20:1392::1,ifconfig 10.23.146.12 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2023.02.27 23:53:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.02.27 23:53:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.146.1' . 2023.02.27 23:53:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1392::1' . 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.02.27 23:53:51 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.02.27 23:53:51 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.02.27 23:53:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.27 23:53:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.27 23:53:51 - OpenVPN > interactive service msg_channel=0 . 2023.02.27 23:53:51 - OpenVPN > open_tun . 2023.02.27 23:53:51 - OpenVPN > wintun device [Eddie] opened . 2023.02.27 23:53:51 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.23.146.12 255.255.255.0 . 2023.02.27 23:53:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all . 2023.02.27 23:53:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all . 2023.02.27 23:53:52 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.02.27 23:53:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 44 fde6:7a:7d20:1392::100a/128 store=active . 2023.02.27 23:53:52 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1392::/64 -> fde6:7a:7d20:1392::100a metric 0) dev Eddie . 2023.02.27 23:53:52 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1392::/64 44 fe80::8 store=active . 2023.02.27 23:53:52 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.02.27 23:53:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 44 all . 2023.02.27 23:53:53 - OpenVPN > IPv6 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.02.27 23:53:53 - OpenVPN > Initialization Sequence Completed . 2023.02.27 23:53:53 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.02.27 23:53:53 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.02.27 23:53:53 - DNS leak protection with packet filtering enabled. . 2023.02.27 23:53:54 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.146.1) . 2023.02.27 23:53:54 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1392::1) . 2023.02.27 23:53:54 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:55 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:55 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:56 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:56 - Routes, add 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:56 - Routes, add 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)". . 2023.02.27 23:53:56 - Flushing DNS I 2023.02.27 23:53:57 - Checking route IPv4 I 2023.02.27 23:53:57 - Checking route IPv6 I 2023.02.27 23:53:57 - Checking DNS ! 2023.02.27 23:53:58 - Connected. . 2023.02.28 00:10:56 - Collect information about AirVPN completed . 2023.02.28 00:41:02 - Collect information about AirVPN completed . 2023.02.28 00:53:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 00:53:47 - OpenVPN > VERIFY KU OK . 2023.02.28 00:53:47 - OpenVPN > Validating certificate extended key usage . 2023.02.28 00:53:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 00:53:47 - OpenVPN > VERIFY EKU OK . 2023.02.28 00:53:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 00:53:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 00:53:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 00:53:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 01:11:04 - Collect information about AirVPN completed . 2023.02.28 01:41:07 - Collect information about AirVPN completed . 2023.02.28 01:53:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 01:53:44 - OpenVPN > VERIFY KU OK . 2023.02.28 01:53:44 - OpenVPN > Validating certificate extended key usage . 2023.02.28 01:53:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 01:53:44 - OpenVPN > VERIFY EKU OK . 2023.02.28 01:53:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 01:53:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 01:53:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 01:53:44 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 02:11:10 - Collect information about AirVPN completed . 2023.02.28 02:41:16 - Collect information about AirVPN completed . 2023.02.28 02:53:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 02:53:41 - OpenVPN > VERIFY KU OK . 2023.02.28 02:53:41 - OpenVPN > Validating certificate extended key usage . 2023.02.28 02:53:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 02:53:41 - OpenVPN > VERIFY EKU OK . 2023.02.28 02:53:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 02:53:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 02:53:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 02:53:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 03:11:18 - Collect information about AirVPN completed . 2023.02.28 03:41:20 - Collect information about AirVPN completed . 2023.02.28 03:53:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 03:53:38 - OpenVPN > VERIFY KU OK . 2023.02.28 03:53:38 - OpenVPN > Validating certificate extended key usage . 2023.02.28 03:53:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 03:53:38 - OpenVPN > VERIFY EKU OK . 2023.02.28 03:53:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 03:53:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 03:53:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 03:53:38 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 04:11:24 - Collect information about AirVPN completed . 2023.02.28 04:41:31 - Collect information about AirVPN completed . 2023.02.28 04:53:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 04:53:35 - OpenVPN > VERIFY KU OK . 2023.02.28 04:53:35 - OpenVPN > Validating certificate extended key usage . 2023.02.28 04:53:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 04:53:35 - OpenVPN > VERIFY EKU OK . 2023.02.28 04:53:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 04:53:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 04:53:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 04:53:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 05:11:38 - Collect information about AirVPN completed . 2023.02.28 05:41:45 - Collect information about AirVPN completed . 2023.02.28 05:53:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 05:53:32 - OpenVPN > VERIFY KU OK . 2023.02.28 05:53:32 - OpenVPN > Validating certificate extended key usage . 2023.02.28 05:53:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 05:53:32 - OpenVPN > VERIFY EKU OK . 2023.02.28 05:53:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 05:53:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 05:53:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 05:53:32 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 06:11:53 - Collect information about AirVPN completed . 2023.02.28 06:41:53 - Collect information about AirVPN completed . 2023.02.28 06:51:38 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #251174 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 06:53:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 06:53:29 - OpenVPN > VERIFY KU OK . 2023.02.28 06:53:29 - OpenVPN > Validating certificate extended key usage . 2023.02.28 06:53:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 06:53:29 - OpenVPN > VERIFY EKU OK . 2023.02.28 06:53:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 06:53:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 06:53:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 06:53:29 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 07:11:55 - Collect information about AirVPN completed . 2023.02.28 07:42:01 - Collect information about AirVPN completed . 2023.02.28 07:53:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 07:53:25 - OpenVPN > VERIFY KU OK . 2023.02.28 07:53:25 - OpenVPN > Validating certificate extended key usage . 2023.02.28 07:53:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 07:53:25 - OpenVPN > VERIFY EKU OK . 2023.02.28 07:53:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 07:53:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 07:53:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 07:53:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 08:12:02 - Collect information about AirVPN completed ! 2023.02.28 08:41:33 - Disconnecting . 2023.02.28 08:41:33 - Sending soft termination signal . 2023.02.28 08:41:36 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.02.28 08:41:37 - OpenVPN > Closing TUN/TAP interface . 2023.02.28 08:41:37 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1392::/64) . 2023.02.28 08:41:37 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1392::/64 44 fe80::8 store=active . 2023.02.28 08:41:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 44 fde6:7a:7d20:1392::100a store=active . 2023.02.28 08:41:38 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 44 10.23.146.12 store=active . 2023.02.28 08:41:38 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.02.28 08:41:38 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:39 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:39 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:39 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:40 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.02.28 08:41:40 - Routes, delete 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:40 - Routes, delete 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:40 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", not exists. . 2023.02.28 08:41:40 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.02.28 08:41:41 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.02.28 08:41:41 - DNS leak protection with packet filtering disabled. . 2023.02.28 08:41:41 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.02.28 08:41:41 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.02.28 08:41:41 - Connection terminated. I 2023.02.28 08:41:41 - Checking authorization ... . 2023.02.28 08:41:49 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2023.02.28 08:41:49 - Connecting to Ursa (United States of America, Atlanta, Georgia) . 2023.02.28 08:41:49 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.02.28 08:41:50 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists. . 2023.02.28 08:41:50 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.02.28 08:41:50 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.02.28 08:41:50 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.02.28 08:41:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.02.28 08:41:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.02.28 08:41:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.02.28 08:41:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.02.28 08:41:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.53:443 . 2023.02.28 08:41:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.02.28 08:41:50 - OpenVPN > UDP link local: (not bound) . 2023.02.28 08:41:50 - OpenVPN > UDP link remote: [AF_INET]64.42.179.53:443 . 2023.02.28 08:41:50 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.53:443, sid=4f3556fe 72618fe9 . 2023.02.28 08:41:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 08:41:50 - OpenVPN > VERIFY KU OK . 2023.02.28 08:41:50 - OpenVPN > Validating certificate extended key usage . 2023.02.28 08:41:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 08:41:50 - OpenVPN > VERIFY EKU OK . 2023.02.28 08:41:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 08:41:50 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 08:41:50 - OpenVPN > [Ursa] Peer Connection Initiated with [AF_INET]64.42.179.53:443 . 2023.02.28 08:41:51 - OpenVPN > SENT CONTROL [Ursa]: 'PUSH_REQUEST' (status=1) . 2023.02.28 08:41:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.146.1,dhcp-option DNS6 fde6:7a:7d20:1392::1,tun-ipv6,route-gateway 10.23.146.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1392::100a/64 fde6:7a:7d20:1392::1,ifconfig 10.23.146.12 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.02.28 08:41:52 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.02.28 08:41:52 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.146.1' . 2023.02.28 08:41:52 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1392::1' . 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.02.28 08:41:52 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.02.28 08:41:52 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.02.28 08:41:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 08:41:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 08:41:52 - OpenVPN > interactive service msg_channel=0 . 2023.02.28 08:41:52 - OpenVPN > open_tun . 2023.02.28 08:41:52 - OpenVPN > wintun device [Eddie] opened . 2023.02.28 08:41:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.23.146.12 255.255.255.0 . 2023.02.28 08:41:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all . 2023.02.28 08:41:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all . 2023.02.28 08:41:53 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.02.28 08:41:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 44 fde6:7a:7d20:1392::100a/128 store=active . 2023.02.28 08:41:53 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1392::/64 -> fde6:7a:7d20:1392::100a metric 0) dev Eddie . 2023.02.28 08:41:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1392::/64 44 fe80::8 store=active . 2023.02.28 08:41:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.02.28 08:41:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 44 all . 2023.02.28 08:41:54 - OpenVPN > IPv6 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.02.28 08:41:54 - OpenVPN > Initialization Sequence Completed . 2023.02.28 08:41:54 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.02.28 08:41:54 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.02.28 08:41:54 - DNS leak protection with packet filtering enabled. . 2023.02.28 08:41:55 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.146.1) . 2023.02.28 08:41:55 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1392::1) . 2023.02.28 08:41:56 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:56 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:57 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:58 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:41:59 - Routes, add 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:42:00 - Routes, add 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)". . 2023.02.28 08:42:00 - Flushing DNS I 2023.02.28 08:42:00 - Checking route IPv4 I 2023.02.28 08:42:00 - Checking route IPv6 I 2023.02.28 08:42:07 - Checking DNS ! 2023.02.28 08:42:09 - Connected. . 2023.02.28 08:42:15 - Collect information about AirVPN completed . 2023.02.28 09:12:05 - Collect information about AirVPN completed . 2023.02.28 09:35:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #559128 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 09:35:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #559129 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 09:35:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #559130 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 09:41:38 - Above log line repeated 1 times more . 2023.02.28 09:41:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 09:41:38 - OpenVPN > VERIFY KU OK . 2023.02.28 09:41:38 - OpenVPN > Validating certificate extended key usage . 2023.02.28 09:41:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 09:41:38 - OpenVPN > VERIFY EKU OK . 2023.02.28 09:41:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 09:41:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 09:41:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 09:41:38 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 09:42:09 - Collect information about AirVPN completed . 2023.02.28 10:07:45 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #7714700 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 10:12:13 - Collect information about AirVPN completed . 2023.02.28 10:41:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 10:41:25 - OpenVPN > VERIFY KU OK . 2023.02.28 10:41:25 - OpenVPN > Validating certificate extended key usage . 2023.02.28 10:41:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 10:41:25 - OpenVPN > VERIFY EKU OK . 2023.02.28 10:41:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 10:41:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 10:41:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 10:41:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 10:42:23 - Collect information about AirVPN completed . 2023.02.28 11:12:28 - Collect information about AirVPN completed . 2023.02.28 11:41:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 11:41:12 - OpenVPN > VERIFY KU OK . 2023.02.28 11:41:12 - OpenVPN > Validating certificate extended key usage . 2023.02.28 11:41:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 11:41:12 - OpenVPN > VERIFY EKU OK . 2023.02.28 11:41:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 11:41:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 11:41:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 11:41:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 11:42:31 - Collect information about AirVPN completed . 2023.02.28 11:50:49 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2803532 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 11:50:49 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2803533 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 11:50:49 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2803534 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 12:12:35 - Above log line repeated 22 times more . 2023.02.28 12:12:35 - Collect information about AirVPN completed . 2023.02.28 12:41:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 12:41:01 - OpenVPN > VERIFY KU OK . 2023.02.28 12:41:01 - OpenVPN > Validating certificate extended key usage . 2023.02.28 12:41:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 12:41:01 - OpenVPN > VERIFY EKU OK . 2023.02.28 12:41:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 12:41:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 12:41:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 12:41:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 12:42:39 - Collect information about AirVPN completed . 2023.02.28 13:12:43 - Collect information about AirVPN completed . 2023.02.28 13:21:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1802111 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 13:21:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1802112 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 13:21:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1802113 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 13:40:48 - Above log line repeated 1 times more . 2023.02.28 13:40:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 13:40:48 - OpenVPN > VERIFY KU OK . 2023.02.28 13:40:48 - OpenVPN > Validating certificate extended key usage . 2023.02.28 13:40:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 13:40:48 - OpenVPN > VERIFY EKU OK . 2023.02.28 13:40:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 13:40:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 13:40:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 13:40:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 13:42:47 - Collect information about AirVPN completed . 2023.02.28 14:12:51 - Collect information about AirVPN completed . 2023.02.28 14:24:47 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1669588 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 14:24:47 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1669589 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 14:24:47 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1669590 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 14:40:35 - Above log line repeated 1 times more . 2023.02.28 14:40:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 14:40:35 - OpenVPN > VERIFY KU OK . 2023.02.28 14:40:35 - OpenVPN > Validating certificate extended key usage . 2023.02.28 14:40:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 14:40:35 - OpenVPN > VERIFY EKU OK . 2023.02.28 14:40:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 14:40:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 14:40:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 14:40:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 14:42:55 - Collect information about AirVPN completed . 2023.02.28 15:12:59 - Collect information about AirVPN completed . 2023.02.28 15:40:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 15:40:22 - OpenVPN > VERIFY KU OK . 2023.02.28 15:40:22 - OpenVPN > Validating certificate extended key usage . 2023.02.28 15:40:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 15:40:22 - OpenVPN > VERIFY EKU OK . 2023.02.28 15:40:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 15:40:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 15:40:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 15:40:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 15:43:03 - Collect information about AirVPN completed . 2023.02.28 15:49:18 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3467510 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 15:49:18 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3467511 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 15:49:18 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3467512 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 16:13:06 - Above log line repeated 1593 times more . 2023.02.28 16:13:06 - Collect information about AirVPN completed . 2023.02.28 16:19:00 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #15034958 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 16:19:00 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #15034960 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 16:19:00 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #15034961 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 16:40:09 - Above log line repeated 7428 times more . 2023.02.28 16:40:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 16:40:09 - OpenVPN > VERIFY KU OK . 2023.02.28 16:40:09 - OpenVPN > Validating certificate extended key usage . 2023.02.28 16:40:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 16:40:09 - OpenVPN > VERIFY EKU OK . 2023.02.28 16:40:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 16:40:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 16:40:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 16:40:09 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 16:43:09 - Collect information about AirVPN completed . 2023.02.28 16:48:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2306925 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 16:48:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2306926 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 16:48:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2306927 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 17:13:13 - Above log line repeated 6178 times more . 2023.02.28 17:13:13 - Collect information about AirVPN completed . 2023.02.28 17:39:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 17:39:56 - OpenVPN > VERIFY KU OK . 2023.02.28 17:39:56 - OpenVPN > Validating certificate extended key usage . 2023.02.28 17:39:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 17:39:56 - OpenVPN > VERIFY EKU OK . 2023.02.28 17:39:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 17:39:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 17:39:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 17:39:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 17:40:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #19175705 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 17:40:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #19175706 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 17:40:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #19175707 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 17:43:18 - Above log line repeated 6087 times more . 2023.02.28 17:43:18 - Collect information about AirVPN completed . 2023.02.28 17:43:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #435124 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 17:43:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #435125 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 17:43:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #435126 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 18:13:19 - Above log line repeated 59064 times more . 2023.02.28 18:13:19 - Collect information about AirVPN completed . 2023.02.28 18:32:40 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #12467559 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 18:32:40 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #12467560 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 18:32:40 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #12467561 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.02.28 18:39:43 - Above log line repeated 3177 times more . 2023.02.28 18:39:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 18:39:43 - OpenVPN > VERIFY KU OK . 2023.02.28 18:39:43 - OpenVPN > Validating certificate extended key usage . 2023.02.28 18:39:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 18:39:43 - OpenVPN > VERIFY EKU OK . 2023.02.28 18:39:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 18:39:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 18:39:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 18:39:43 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 18:43:20 - Collect information about AirVPN completed . 2023.02.28 19:13:25 - Collect information about AirVPN completed . 2023.02.28 19:39:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 19:39:30 - OpenVPN > VERIFY KU OK . 2023.02.28 19:39:30 - OpenVPN > Validating certificate extended key usage . 2023.02.28 19:39:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 19:39:30 - OpenVPN > VERIFY EKU OK . 2023.02.28 19:39:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 19:39:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 19:39:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 19:39:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 19:43:27 - Collect information about AirVPN completed . 2023.02.28 20:13:28 - Collect information about AirVPN completed . 2023.02.28 20:39:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 20:39:17 - OpenVPN > VERIFY KU OK . 2023.02.28 20:39:17 - OpenVPN > Validating certificate extended key usage . 2023.02.28 20:39:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 20:39:17 - OpenVPN > VERIFY EKU OK . 2023.02.28 20:39:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 20:39:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 20:39:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 20:39:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 20:43:30 - Collect information about AirVPN completed . 2023.02.28 21:13:39 - Collect information about AirVPN completed . 2023.02.28 21:39:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 21:39:05 - OpenVPN > VERIFY KU OK . 2023.02.28 21:39:05 - OpenVPN > Validating certificate extended key usage . 2023.02.28 21:39:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 21:39:05 - OpenVPN > VERIFY EKU OK . 2023.02.28 21:39:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 21:39:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 21:39:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 21:39:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 21:43:47 - Collect information about AirVPN completed . 2023.02.28 22:13:48 - Collect information about AirVPN completed . 2023.02.28 22:38:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 22:38:52 - OpenVPN > VERIFY KU OK . 2023.02.28 22:38:52 - OpenVPN > Validating certificate extended key usage . 2023.02.28 22:38:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 22:38:52 - OpenVPN > VERIFY EKU OK . 2023.02.28 22:38:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 22:38:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 22:38:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 22:38:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 22:43:48 - Collect information about AirVPN completed . 2023.02.28 23:13:57 - Collect information about AirVPN completed . 2023.02.28 23:38:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.02.28 23:38:39 - OpenVPN > VERIFY KU OK . 2023.02.28 23:38:39 - OpenVPN > Validating certificate extended key usage . 2023.02.28 23:38:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.02.28 23:38:39 - OpenVPN > VERIFY EKU OK . 2023.02.28 23:38:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.02.28 23:38:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 23:38:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.02.28 23:38:39 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.02.28 23:43:57 - Collect information about AirVPN completed . 2023.03.01 00:13:57 - Collect information about AirVPN completed ! 2023.03.01 00:38:38 - Disconnecting . 2023.03.01 00:38:38 - Sending soft termination signal . 2023.03.01 00:38:41 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.03.01 00:38:42 - OpenVPN > Closing TUN/TAP interface . 2023.03.01 00:38:42 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1392::/64) . 2023.03.01 00:38:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1392::/64 44 fe80::8 store=active . 2023.03.01 00:38:43 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 44 fde6:7a:7d20:1392::100a store=active . 2023.03.01 00:38:43 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 44 10.23.146.12 store=active . 2023.03.01 00:38:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.03.01 00:38:43 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:38:44 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:38:44 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:38:44 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:38:45 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.03.01 00:38:45 - Routes, delete 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:38:45 - Routes, delete 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:38:45 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", not exists. . 2023.03.01 00:38:45 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.03.01 00:38:46 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.03.01 00:38:46 - DNS leak protection with packet filtering disabled. . 2023.03.01 00:38:46 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.03.01 00:38:46 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.03.01 00:38:46 - Connection terminated. I 2023.03.01 00:38:46 - Checking authorization ... . 2023.03.01 00:38:54 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2023.03.01 00:38:54 - Connecting to Ursa (United States of America, Atlanta, Georgia) . 2023.03.01 00:38:55 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.03.01 00:38:55 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists. . 2023.03.01 00:38:55 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.03.01 00:38:55 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.03.01 00:38:55 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.03.01 00:38:55 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.01 00:38:55 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.01 00:38:55 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.01 00:38:55 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.01 00:38:55 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.53:443 . 2023.03.01 00:38:55 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.03.01 00:38:55 - OpenVPN > UDP link local: (not bound) . 2023.03.01 00:38:55 - OpenVPN > UDP link remote: [AF_INET]64.42.179.53:443 . 2023.03.01 00:38:55 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.53:443, sid=650cbd35 586318cc . 2023.03.01 00:38:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.03.01 00:38:55 - OpenVPN > VERIFY KU OK . 2023.03.01 00:38:55 - OpenVPN > Validating certificate extended key usage . 2023.03.01 00:38:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.03.01 00:38:55 - OpenVPN > VERIFY EKU OK . 2023.03.01 00:38:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.03.01 00:38:55 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.03.01 00:38:55 - OpenVPN > [Ursa] Peer Connection Initiated with [AF_INET]64.42.179.53:443 . 2023.03.01 00:38:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.146.1,dhcp-option DNS6 fde6:7a:7d20:1392::1,tun-ipv6,route-gateway 10.23.146.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1392::100a/64 fde6:7a:7d20:1392::1,ifconfig 10.23.146.12 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2023.03.01 00:38:56 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.03.01 00:38:56 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.146.1' . 2023.03.01 00:38:56 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1392::1' . 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.03.01 00:38:56 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.03.01 00:38:56 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.03.01 00:38:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.01 00:38:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.01 00:38:56 - OpenVPN > interactive service msg_channel=0 . 2023.03.01 00:38:56 - OpenVPN > open_tun . 2023.03.01 00:38:56 - OpenVPN > wintun device [Eddie] opened . 2023.03.01 00:38:56 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.23.146.12 255.255.255.0 . 2023.03.01 00:38:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all . 2023.03.01 00:38:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all . 2023.03.01 00:38:57 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.03.01 00:38:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 44 fde6:7a:7d20:1392::100a/128 store=active . 2023.03.01 00:38:58 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1392::/64 -> fde6:7a:7d20:1392::100a metric 0) dev Eddie . 2023.03.01 00:38:58 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1392::/64 44 fe80::8 store=active . 2023.03.01 00:38:58 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.03.01 00:38:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 44 all . 2023.03.01 00:38:58 - OpenVPN > IPv6 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.03.01 00:38:58 - OpenVPN > Initialization Sequence Completed . 2023.03.01 00:38:58 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.03.01 00:38:58 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.03.01 00:38:58 - DNS leak protection with packet filtering enabled. . 2023.03.01 00:38:59 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.146.1) . 2023.03.01 00:38:59 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1392::1) . 2023.03.01 00:38:59 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:39:00 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:39:01 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:39:01 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:39:02 - Routes, add 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:39:02 - Routes, add 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:39:02 - Flushing DNS I 2023.03.01 00:39:03 - Checking route IPv4 I 2023.03.01 00:39:03 - Checking route IPv6 I 2023.03.01 00:39:03 - Checking DNS ! 2023.03.01 00:39:04 - Connected. ! 2023.03.01 00:41:22 - Disconnecting . 2023.03.01 00:41:22 - Sending soft termination signal . 2023.03.01 00:41:26 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.03.01 00:41:27 - OpenVPN > Closing TUN/TAP interface . 2023.03.01 00:41:27 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1392::/64) . 2023.03.01 00:41:27 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1392::/64 44 fe80::8 store=active . 2023.03.01 00:41:28 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 44 fde6:7a:7d20:1392::100a store=active . 2023.03.01 00:41:28 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 44 10.23.146.12 store=active . 2023.03.01 00:41:28 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.03.01 00:41:29 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:29 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:29 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:30 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:30 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.03.01 00:41:30 - Routes, delete 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:31 - Routes, delete 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:31 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", not exists. . 2023.03.01 00:41:31 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.03.01 00:41:31 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.03.01 00:41:31 - DNS leak protection with packet filtering disabled. . 2023.03.01 00:41:31 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.03.01 00:41:31 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.03.01 00:41:31 - Connection terminated. I 2023.03.01 00:41:31 - Checking authorization ... . 2023.03.01 00:41:47 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2023.03.01 00:41:47 - Connecting to Ursa (United States of America, Atlanta, Georgia) . 2023.03.01 00:41:48 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.03.01 00:41:48 - Routes, add 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists. . 2023.03.01 00:41:48 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.03.01 00:41:48 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.03.01 00:41:48 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.03.01 00:41:48 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.01 00:41:48 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.01 00:41:48 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.01 00:41:48 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.01 00:41:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.53:443 . 2023.03.01 00:41:48 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.03.01 00:41:48 - OpenVPN > UDP link local: (not bound) . 2023.03.01 00:41:48 - OpenVPN > UDP link remote: [AF_INET]64.42.179.53:443 . 2023.03.01 00:41:48 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.53:443, sid=d74da7f2 3bbc66d0 . 2023.03.01 00:41:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.03.01 00:41:48 - OpenVPN > VERIFY KU OK . 2023.03.01 00:41:48 - OpenVPN > Validating certificate extended key usage . 2023.03.01 00:41:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.03.01 00:41:48 - OpenVPN > VERIFY EKU OK . 2023.03.01 00:41:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ursa, emailAddress=info@airvpn.org . 2023.03.01 00:41:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.03.01 00:41:48 - OpenVPN > [Ursa] Peer Connection Initiated with [AF_INET]64.42.179.53:443 . 2023.03.01 00:41:49 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.146.1,dhcp-option DNS6 fde6:7a:7d20:1392::1,tun-ipv6,route-gateway 10.23.146.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1392::100a/64 fde6:7a:7d20:1392::1,ifconfig 10.23.146.12 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.03.01 00:41:49 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.03.01 00:41:49 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.146.1' . 2023.03.01 00:41:49 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1392::1' . 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.03.01 00:41:49 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.03.01 00:41:49 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.03.01 00:41:49 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.01 00:41:49 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.01 00:41:49 - OpenVPN > interactive service msg_channel=0 . 2023.03.01 00:41:49 - OpenVPN > open_tun . 2023.03.01 00:41:49 - OpenVPN > wintun device [Eddie] opened . 2023.03.01 00:41:49 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.23.146.12 255.255.255.0 . 2023.03.01 00:41:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all . 2023.03.01 00:41:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all . 2023.03.01 00:41:50 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.03.01 00:41:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 44 fde6:7a:7d20:1392::100a/128 store=active . 2023.03.01 00:41:50 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1392::/64 -> fde6:7a:7d20:1392::100a metric 0) dev Eddie . 2023.03.01 00:41:51 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1392::/64 44 fe80::8 store=active . 2023.03.01 00:41:51 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.03.01 00:41:51 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 44 all . 2023.03.01 00:41:51 - OpenVPN > IPv6 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.03.01 00:41:51 - OpenVPN > Initialization Sequence Completed . 2023.03.01 00:41:51 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.03.01 00:41:51 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.03.01 00:41:51 - DNS leak protection with packet filtering enabled. . 2023.03.01 00:41:52 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.146.1) . 2023.03.01 00:41:52 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1392::1) . 2023.03.01 00:41:53 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:53 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:54 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:54 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:55 - Routes, add 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:56 - Routes, add 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:41:56 - Flushing DNS I 2023.03.01 00:41:57 - Checking route IPv4 I 2023.03.01 00:41:58 - Checking route IPv6 I 2023.03.01 00:41:58 - Checking DNS ! 2023.03.01 00:41:59 - Connected. . 2023.03.01 00:42:15 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #9960 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.03.01 00:42:15 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #9961 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.03.01 00:42:15 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #9962 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2023.03.01 00:42:52 - Above log line repeated 5 times more ! 2023.03.01 00:42:52 - Disconnecting . 2023.03.01 00:42:52 - Sending soft termination signal . 2023.03.01 00:42:55 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.03.01 00:42:56 - OpenVPN > Closing TUN/TAP interface . 2023.03.01 00:42:56 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1392::/64) . 2023.03.01 00:42:56 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1392::/64 44 fe80::8 store=active . 2023.03.01 00:42:56 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 44 fde6:7a:7d20:1392::100a store=active . 2023.03.01 00:42:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 44 10.23.146.12 store=active . 2023.03.01 00:42:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.03.01 00:42:57 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:42:58 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:42:59 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:42:59 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:43:00 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.03.01 00:43:00 - Routes, delete 64.42.179.51/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:43:01 - Routes, delete 2605:9f80:6000:79:291f:295e:3def:54a8/128 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:43:01 - Routes, delete 64.42.179.53/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", not exists. . 2023.03.01 00:43:01 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.03.01 00:43:01 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.03.01 00:43:01 - DNS leak protection with packet filtering disabled. . 2023.03.01 00:43:01 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.03.01 00:43:01 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.03.01 00:43:01 - Connection terminated. I 2023.03.01 00:43:01 - Checking authorization ... . 2023.03.01 00:43:30 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2023.03.01 00:43:30 - Connecting to Musca (United States of America, Atlanta, Georgia) . 2023.03.01 00:43:31 - Routes, add 64.42.179.45/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.03.01 00:43:31 - Routes, add 64.42.179.45/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists. . 2023.03.01 00:43:31 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.03.01 00:43:31 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.03.01 00:43:31 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.03.01 00:43:31 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.01 00:43:31 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.01 00:43:31 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.01 00:43:31 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.01 00:43:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.45:443 . 2023.03.01 00:43:31 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.03.01 00:43:31 - OpenVPN > UDP link local: (not bound) . 2023.03.01 00:43:31 - OpenVPN > UDP link remote: [AF_INET]64.42.179.45:443 . 2023.03.01 00:43:31 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.45:443, sid=956ffbce 7f1a3e2f . 2023.03.01 00:43:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.03.01 00:43:31 - OpenVPN > VERIFY KU OK . 2023.03.01 00:43:31 - OpenVPN > Validating certificate extended key usage . 2023.03.01 00:43:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.03.01 00:43:31 - OpenVPN > VERIFY EKU OK . 2023.03.01 00:43:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Musca, emailAddress=info@airvpn.org . 2023.03.01 00:43:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.03.01 00:43:31 - OpenVPN > [Musca] Peer Connection Initiated with [AF_INET]64.42.179.45:443 . 2023.03.01 00:43:31 - OpenVPN > SENT CONTROL [Musca]: 'PUSH_REQUEST' (status=1) . 2023.03.01 00:43:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.50.1,dhcp-option DNS6 fde6:7a:7d20:1332::1,tun-ipv6,route-gateway 10.23.50.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1332::10b1/64 fde6:7a:7d20:1332::1,ifconfig 10.23.50.179 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2023.03.01 00:43:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.03.01 00:43:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.50.1' . 2023.03.01 00:43:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1332::1' . 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.03.01 00:43:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.03.01 00:43:31 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.03.01 00:43:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.01 00:43:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.01 00:43:31 - OpenVPN > interactive service msg_channel=0 . 2023.03.01 00:43:31 - OpenVPN > open_tun . 2023.03.01 00:43:31 - OpenVPN > wintun device [Eddie] opened . 2023.03.01 00:43:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.23.50.179 255.255.255.0 . 2023.03.01 00:43:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all . 2023.03.01 00:43:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all . 2023.03.01 00:43:32 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.03.01 00:43:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 44 fde6:7a:7d20:1332::10b1/128 store=active . 2023.03.01 00:43:33 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1332::/64 -> fde6:7a:7d20:1332::10b1 metric 0) dev Eddie . 2023.03.01 00:43:33 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1332::/64 44 fe80::8 store=active . 2023.03.01 00:43:33 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.03.01 00:43:33 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 44 all . 2023.03.01 00:43:33 - OpenVPN > IPv6 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.03.01 00:43:33 - OpenVPN > Initialization Sequence Completed . 2023.03.01 00:43:33 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.03.01 00:43:33 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.03.01 00:43:33 - DNS leak protection with packet filtering enabled. . 2023.03.01 00:43:34 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.23.50.1) . 2023.03.01 00:43:34 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1332::1) . 2023.03.01 00:43:34 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:43:35 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:43:35 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:43:36 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:43:36 - Routes, add 64.42.179.43/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:43:37 - Routes, add 2605:9f80:6000:78:848d:e3b5:8bc8:34f/128 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:43:37 - Flushing DNS I 2023.03.01 00:43:37 - Checking route IPv4 I 2023.03.01 00:43:37 - Checking route IPv6 I 2023.03.01 00:43:38 - Checking DNS ! 2023.03.01 00:43:38 - Connected. ! 2023.03.01 00:45:57 - Disconnecting . 2023.03.01 00:45:57 - Sending soft termination signal . 2023.03.01 00:46:00 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.03.01 00:46:01 - OpenVPN > Closing TUN/TAP interface . 2023.03.01 00:46:01 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1332::/64) . 2023.03.01 00:46:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1332::/64 44 fe80::8 store=active . 2023.03.01 00:46:02 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 44 fde6:7a:7d20:1332::10b1 store=active . 2023.03.01 00:46:02 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 44 10.23.50.179 store=active . 2023.03.01 00:46:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.03.01 00:46:03 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:46:03 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:46:03 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:46:04 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:46:04 - Routes, delete 64.42.179.45/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.03.01 00:46:04 - Routes, delete 64.42.179.43/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:46:05 - Routes, delete 2605:9f80:6000:78:848d:e3b5:8bc8:34f/128 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:46:05 - Routes, delete 64.42.179.45/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", not exists. . 2023.03.01 00:46:05 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.03.01 00:46:05 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.03.01 00:46:05 - DNS leak protection with packet filtering disabled. . 2023.03.01 00:46:05 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.03.01 00:46:05 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.03.01 00:46:05 - Connection terminated. I 2023.03.01 00:46:05 - Checking authorization ... . 2023.03.01 00:46:30 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2023.03.01 00:46:30 - IPv6 disabled with packet filtering. ! 2023.03.01 00:46:30 - Connecting to Metallah (United States of America, Pennsylvania) . 2023.03.01 00:46:31 - Routes, add 156.96.151.134/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)". . 2023.03.01 00:46:31 - Routes, add 156.96.151.134/32 for interface "Wi-Fi (Qualcomm Atheros QCA61x4A Wireless Network Adapter)", already exists. . 2023.03.01 00:46:31 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.03.01 00:46:31 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.03.01 00:46:31 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.03.01 00:46:31 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.01 00:46:31 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.01 00:46:31 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.01 00:46:31 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.01 00:46:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]156.96.151.134:443 . 2023.03.01 00:46:31 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.03.01 00:46:31 - OpenVPN > UDP link local: (not bound) . 2023.03.01 00:46:31 - OpenVPN > UDP link remote: [AF_INET]156.96.151.134:443 . 2023.03.01 00:46:31 - OpenVPN > TLS: Initial packet from [AF_INET]156.96.151.134:443, sid=8ce2686b 932e2e2a . 2023.03.01 00:46:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.03.01 00:46:31 - OpenVPN > VERIFY KU OK . 2023.03.01 00:46:31 - OpenVPN > Validating certificate extended key usage . 2023.03.01 00:46:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.03.01 00:46:31 - OpenVPN > VERIFY EKU OK . 2023.03.01 00:46:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Metallah, emailAddress=info@airvpn.org . 2023.03.01 00:46:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.03.01 00:46:31 - OpenVPN > [Metallah] Peer Connection Initiated with [AF_INET]156.96.151.134:443 . 2023.03.01 00:46:31 - OpenVPN > SENT CONTROL [Metallah]: 'PUSH_REQUEST' (status=1) . 2023.03.01 00:46:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.22.146.1,route-gateway 10.22.146.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.22.146.18 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2023.03.01 00:46:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp' . 2023.03.01 00:46:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.146.1' . 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.03.01 00:46:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.03.01 00:46:31 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.03.01 00:46:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.01 00:46:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.01 00:46:31 - OpenVPN > interactive service msg_channel=0 . 2023.03.01 00:46:31 - OpenVPN > open_tun . 2023.03.01 00:46:31 - OpenVPN > wintun device [Eddie] opened . 2023.03.01 00:46:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 44 static 10.22.146.18 255.255.255.0 . 2023.03.01 00:46:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 44 all . 2023.03.01 00:46:32 - Collect information about AirVPN completed . 2023.03.01 00:46:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 44 all . 2023.03.01 00:46:32 - OpenVPN > IPv4 MTU set to 1500 on interface 44 using SetIpInterfaceEntry() . 2023.03.01 00:46:32 - OpenVPN > Initialization Sequence Completed . 2023.03.01 00:46:33 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.03.01 00:46:33 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.03.01 00:46:33 - DNS leak protection with packet filtering enabled. . 2023.03.01 00:46:33 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.22.146.1) . 2023.03.01 00:46:34 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:46:34 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:46:35 - Routes, add 156.96.151.132/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.01 00:46:35 - Flushing DNS I 2023.03.01 00:46:35 - Checking route IPv4 I 2023.03.01 00:46:37 - Checking DNS ! 2023.03.01 00:46:37 - Connected.
  4. While using Eddie 2.16.3, all of a sudden it began to say waiting for latency tests (219 to go) and staying like that. I have uninstalled and reinstalled it to make sure I have the most recent version but now it says 218 to go. If I wait long enough will it get through it or is there some preference I need to change somewhere?
  5. Hi I can not see latency or score anymore in the server list. I have notice this for some time. I use windows 10 professional latest update and latest update of Eddie. I there anything to do about this? Best Regards Captorx
  6. Well, I have siged up for another year! <accepting congratulations>....And I am paranoid.It seems to me the servers I usually connect to are about double the latency they used to be. These are Toronto and Vancouver servers....Why would my latency change?Of course my wireless (laptop) is much worse, but also much worse than beforeI noticed this around November of 2017Thoughts? Suggestions?Am I am being Kim Dotcom'd?No, I don't do a lot of unusual ...mostly gaming, watching videos...gone from 25ms to 70ms on average...Thanks,Mr. V
  7. I only use UK servers, all 16 of which I have added to the whitelist. However, there are around ~200 AirVPN servers in total, and when I start the AirVPN client the latency tests run for every single one of them. I often end up waiting longer for the latency tests to complete than I do connecting to the server itself, which is silly since I only need the tests to run on 16 out of the ~200. Can we please have a setting that allows us to restrict the latency test to the whitelist or another set of servers? So much effort is put into reducing OS startup time and this seems to throw a lot of that effort out the window.
  8. When the Refresh button is clicked while connected to a server it no longer works correctly. Now it alphabetizes the server list by server name, erases all of the scores and erases all of the latency numbers. The only way to fix it is to disconnect from whatever server I'm connected to and then, without even clicking Refresh, everything updates itself properly again immediately. The next time I click refresh while connected to any server the same thing happens all over again. You can't click refresh while connected without it messing up. Also, the speed is way off, both in the top left corner of this photo and in the speed graph. When I took this screenshot the DL speed was actually over 20Mb/s not 3Mb/s. Also, if you hover the mouse over the Eddie icon in the toolbar it usually says the DL speed is 0Mb/s regardless of what it actually is. Not always with that part but usually. And, again, the only way Ive found to correct this is to disconnect and reconnect.
  9. Dear readers, I have recently purchased a three month subscription to AirVPN and I've been using it over the past four or so days. I am having constant issues with regards to extreme jitter, occasional connection drops, and large amounts of packet loss. I have in the corner of my second monitor a (rainmeter) network meter (see first attachment). It measures my up- and downstream as well as my latency to 62.40.106.135, a perfSONAR address meant for testing latency. It tests every second. Symptoms: - Latency jitter ranges from ~20 to ~20000 milliseconds. - Occasional disconnects (latency stuck on 30000 and everything times out) - Some packet loss (often coincides with latency spikes) - Bandwidth trouble (often coincides with latency spikes and disconnects, remains for a minute or so after reconnecting) What I've tried: - Switching servers: I've tried 2 in Alblasserdam, 1 in Manchester and 1 in Germany (unsure where exactly) - Using specific protocols (top three, UDP 443, TCP 443 and UDP 80) - Increased send and receive buffer sizes to 256 and even 512 KB Background and specifications: - I am located in the Netherlands and my ISP is Ziggo (previously UPC, they merged). My subscription with them is good for 40 mb/s down and 4 mb/s up. Despite the price they ask for this I have had no trouble with their service whatsoever. - See second attachment for specifications of my computer. - See third attachment for specifications and settings of my network. - See fourth attachment for my Eddie settings. I have left out the parts I have not edited myself and are most unlikely to contain relevant settings. - See inside spoiler below for log. I have skimmed through it myself a few times over the past few days but I haven't been able to find anything. . 2017.04.27 05:29:37 - Systems & servers data update completed. 2017.04.27 05:29:56 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2276173 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 05:35:37 - Above log line repeated 105 times more. 2017.04.27 05:35:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 05:35:37 - OpenVPN > Validating certificate key usage. 2017.04.27 05:35:37 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 05:35:37 - OpenVPN > VERIFY KU OK. 2017.04.27 05:35:37 - OpenVPN > Validating certificate extended key usage. 2017.04.27 05:35:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 05:35:37 - OpenVPN > VERIFY EKU OK. 2017.04.27 05:35:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 05:35:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 05:35:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 05:35:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 05:36:03 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2507723 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 05:39:38 - Above log line repeated 68 times more. 2017.04.27 05:39:38 - Updating systems & servers data .... 2017.04.27 05:39:38 - Systems & servers data update completed. 2017.04.27 05:39:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #127983 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 05:49:38 - Above log line repeated 176 times more. 2017.04.27 05:49:38 - Updating systems & servers data .... 2017.04.27 05:49:39 - Systems & servers data update completed. 2017.04.27 05:49:41 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #566035 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 05:59:39 - Above log line repeated 159 times more. 2017.04.27 05:59:39 - Updating systems & servers data .... 2017.04.27 05:59:42 - Systems & servers data update completed. 2017.04.27 05:59:51 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #970788 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 06:09:42 - Above log line repeated 99 times more. 2017.04.27 06:09:42 - Updating systems & servers data .... 2017.04.27 06:09:43 - Systems & servers data update completed. 2017.04.27 06:09:56 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1393141 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 06:19:43 - Above log line repeated 173 times more. 2017.04.27 06:19:43 - Updating systems & servers data .... 2017.04.27 06:19:43 - Systems & servers data update completed. 2017.04.27 06:20:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1839699 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 06:29:43 - Above log line repeated 133 times more. 2017.04.27 06:29:43 - Updating systems & servers data .... 2017.04.27 06:29:44 - Systems & servers data update completed. 2017.04.27 06:29:55 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2262473 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 06:35:37 - Above log line repeated 47 times more. 2017.04.27 06:35:37 - OpenVPN > TLS: soft reset sec=0 bytes=3591490463/-1 pkts=3835628/0. 2017.04.27 06:35:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 06:35:37 - OpenVPN > Validating certificate key usage. 2017.04.27 06:35:37 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 06:35:37 - OpenVPN > VERIFY KU OK. 2017.04.27 06:35:37 - OpenVPN > Validating certificate extended key usage. 2017.04.27 06:35:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 06:35:37 - OpenVPN > VERIFY EKU OK. 2017.04.27 06:35:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 06:35:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 06:35:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 06:35:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 06:35:38 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2416729 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 06:39:45 - Above log line repeated 43 times more. 2017.04.27 06:39:45 - Updating systems & servers data .... 2017.04.27 06:39:45 - Systems & servers data update completed. 2017.04.27 06:40:11 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #55454 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 06:49:45 - Above log line repeated 94 times more. 2017.04.27 06:49:45 - Updating systems & servers data .... 2017.04.27 06:49:46 - Systems & servers data update completed. 2017.04.27 06:49:54 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #212178 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 06:59:46 - Above log line repeated 47 times more. 2017.04.27 06:59:46 - Updating systems & servers data .... 2017.04.27 06:59:48 - Systems & servers data update completed. 2017.04.27 07:00:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #409020 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 07:09:48 - Above log line repeated 82 times more. 2017.04.27 07:09:48 - Updating systems & servers data .... 2017.04.27 07:09:50 - Systems & servers data update completed. 2017.04.27 07:10:09 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #565707 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 07:19:50 - Above log line repeated 65 times more. 2017.04.27 07:19:51 - Updating systems & servers data .... 2017.04.27 07:19:53 - Systems & servers data update completed. 2017.04.27 07:20:10 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #767381 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 07:29:53 - Above log line repeated 121 times more. 2017.04.27 07:29:53 - Updating systems & servers data .... 2017.04.27 07:29:57 - Systems & servers data update completed. 2017.04.27 07:30:00 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1031568 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 07:35:37 - Above log line repeated 89 times more. 2017.04.27 07:35:37 - OpenVPN > TLS: soft reset sec=0 bytes=2050828597/-1 pkts=2553401/0. 2017.04.27 07:35:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 07:35:38 - OpenVPN > Validating certificate key usage. 2017.04.27 07:35:38 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 07:35:38 - OpenVPN > VERIFY KU OK. 2017.04.27 07:35:38 - OpenVPN > Validating certificate extended key usage. 2017.04.27 07:35:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 07:35:38 - OpenVPN > VERIFY EKU OK. 2017.04.27 07:35:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 07:35:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 07:35:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 07:35:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 07:36:01 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1268561 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 07:39:57 - Above log line repeated 73 times more. 2017.04.27 07:39:57 - Updating systems & servers data .... 2017.04.27 07:39:58 - Systems & servers data update completed. 2017.04.27 07:40:11 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #136395 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 07:49:58 - Above log line repeated 172 times more. 2017.04.27 07:49:58 - Updating systems & servers data .... 2017.04.27 07:49:59 - Systems & servers data update completed. 2017.04.27 07:51:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #423569 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 08:00:59 - Above log line repeated 79 times more. 2017.04.27 08:00:59 - Updating systems & servers data .... 2017.04.27 08:01:00 - Systems & servers data update completed. 2017.04.27 08:01:28 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #632108 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 08:11:00 - Above log line repeated 95 times more. 2017.04.27 08:11:00 - Updating systems & servers data .... 2017.04.27 08:11:01 - Systems & servers data update completed. 2017.04.27 08:11:10 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #833303 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 08:21:01 - Above log line repeated 82 times more. 2017.04.27 08:21:01 - Updating systems & servers data .... 2017.04.27 08:21:04 - Systems & servers data update completed. 2017.04.27 08:21:13 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1043880 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 08:31:04 - Above log line repeated 152 times more. 2017.04.27 08:31:04 - Updating systems & servers data .... 2017.04.27 08:31:06 - Systems & servers data update completed. 2017.04.27 08:31:29 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1225094 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 08:35:37 - Above log line repeated 55 times moreI 2017.04.27 08:35:37 - Renewing TLS key. 2017.04.27 08:35:37 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.27 08:35:38 - OpenVPN > TLS: soft reset sec=0 bytes=2083452371/-1 pkts=2632045/0. 2017.04.27 08:35:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 08:35:38 - OpenVPN > Validating certificate key usage. 2017.04.27 08:35:38 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 08:35:38 - OpenVPN > VERIFY KU OK. 2017.04.27 08:35:38 - OpenVPN > Validating certificate extended key usage. 2017.04.27 08:35:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 08:35:38 - OpenVPN > VERIFY EKU OK. 2017.04.27 08:35:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 08:35:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 08:35:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 08:35:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 08:35:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1291027 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 08:41:06 - Above log line repeated 31 times more. 2017.04.27 08:41:06 - Updating systems & servers data .... 2017.04.27 08:41:07 - Systems & servers data update completed. 2017.04.27 08:41:26 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #77449 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 08:51:07 - Above log line repeated 85 times more. 2017.04.27 08:51:07 - Updating systems & servers data .... 2017.04.27 08:51:08 - Systems & servers data update completed. 2017.04.27 08:51:20 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #241065 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 09:01:08 - Above log line repeated 108 times more. 2017.04.27 09:01:08 - Updating systems & servers data .... 2017.04.27 09:01:11 - Systems & servers data update completed. 2017.04.27 09:01:11 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #400156 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 09:11:11 - Above log line repeated 101 times more. 2017.04.27 09:11:11 - Updating systems & servers data .... 2017.04.27 09:11:12 - Systems & servers data update completed. 2017.04.27 09:11:24 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #570869 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 09:21:12 - Above log line repeated 68 times more. 2017.04.27 09:21:12 - Updating systems & servers data .... 2017.04.27 09:21:13 - Systems & servers data update completed. 2017.04.27 09:21:46 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #737520 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 09:31:13 - Above log line repeated 167 times more. 2017.04.27 09:31:13 - Updating systems & servers data .... 2017.04.27 09:31:13 - Systems & servers data update completed. 2017.04.27 09:31:46 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #924825 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 09:35:38 - Above log line repeated 86 times moreI 2017.04.27 09:35:38 - Renewing TLS key. 2017.04.27 09:35:38 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.27 09:35:39 - OpenVPN > TLS: soft reset sec=0 bytes=1822007608/-1 pkts=2185273/0. 2017.04.27 09:35:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 09:35:39 - OpenVPN > Validating certificate key usage. 2017.04.27 09:35:39 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 09:35:39 - OpenVPN > VERIFY KU OK. 2017.04.27 09:35:39 - OpenVPN > Validating certificate extended key usage. 2017.04.27 09:35:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 09:35:39 - OpenVPN > VERIFY EKU OK. 2017.04.27 09:35:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 09:35:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 09:35:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 09:35:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 09:36:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1003521 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 09:41:13 - Above log line repeated 84 times more. 2017.04.27 09:41:13 - Updating systems & servers data .... 2017.04.27 09:41:14 - Systems & servers data update completed. 2017.04.27 09:41:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #77111 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 09:52:14 - Above log line repeated 101 times more. 2017.04.27 09:52:14 - Updating systems & servers data .... 2017.04.27 09:52:15 - Systems & servers data update completed. 2017.04.27 09:52:45 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #276736 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 10:02:15 - Above log line repeated 85 times more. 2017.04.27 10:02:15 - Updating systems & servers data .... 2017.04.27 10:02:16 - Systems & servers data update completed. 2017.04.27 10:02:45 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #441301 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 10:13:16 - Above log line repeated 82 times more. 2017.04.27 10:13:16 - Updating systems & servers data .... 2017.04.27 10:13:17 - Systems & servers data update completed. 2017.04.27 10:13:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #621012 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 10:23:17 - Above log line repeated 61 times more. 2017.04.27 10:23:17 - Updating systems & servers data .... 2017.04.27 10:23:18 - Systems & servers data update completed. 2017.04.27 10:24:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #806524 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 10:33:18 - Above log line repeated 96 times more. 2017.04.27 10:33:18 - Updating systems & servers data .... 2017.04.27 10:33:19 - Systems & servers data update completed. 2017.04.27 10:33:31 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #963534 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 10:35:38 - Above log line repeated 15 times more. 2017.04.27 10:35:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 10:35:38 - OpenVPN > Validating certificate key usage. 2017.04.27 10:35:38 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 10:35:38 - OpenVPN > VERIFY KU OK. 2017.04.27 10:35:38 - OpenVPN > Validating certificate extended key usage. 2017.04.27 10:35:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 10:35:38 - OpenVPN > VERIFY EKU OK. 2017.04.27 10:35:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 10:35:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 10:35:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 10:35:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 10:36:08 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1005198 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 10:43:19 - Above log line repeated 65 times more. 2017.04.27 10:43:19 - Updating systems & servers data .... 2017.04.27 10:43:20 - Systems & servers data update completed. 2017.04.27 10:44:08 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #130275 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 10:53:20 - Above log line repeated 95 times more. 2017.04.27 10:53:20 - Updating systems & servers data .... 2017.04.27 10:53:21 - Systems & servers data update completed. 2017.04.27 10:53:30 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #275681 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 11:04:21 - Above log line repeated 45 times more. 2017.04.27 11:04:21 - Updating systems & servers data .... 2017.04.27 11:04:21 - Systems & servers data update completed. 2017.04.27 11:04:27 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #381983 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 11:14:21 - Above log line repeated 47 times more. 2017.04.27 11:14:21 - Updating systems & servers data .... 2017.04.27 11:14:22 - Systems & servers data update completed. 2017.04.27 11:15:53 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #453609 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 11:24:22 - Above log line repeated 97 times more. 2017.04.27 11:24:22 - Updating systems & servers data .... 2017.04.27 11:24:23 - Systems & servers data update completed. 2017.04.27 11:24:53 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #575893 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 11:34:23 - Above log line repeated 77 times more. 2017.04.27 11:34:23 - Updating systems & servers data .... 2017.04.27 11:34:24 - Systems & servers data update completed. 2017.04.27 11:34:58 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #730610 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 11:35:38 - Above log line repeated 20 times more. 2017.04.27 11:35:38 - OpenVPN > TLS: soft reset sec=0 bytes=1313761859/-1 pkts=1693408/0. 2017.04.27 11:35:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 11:35:39 - OpenVPN > Validating certificate key usage. 2017.04.27 11:35:39 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 11:35:39 - OpenVPN > VERIFY KU OK. 2017.04.27 11:35:39 - OpenVPN > Validating certificate extended key usage. 2017.04.27 11:35:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 11:35:39 - OpenVPN > VERIFY EKU OK. 2017.04.27 11:35:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 11:35:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 11:35:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 11:35:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 11:36:08 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #747644 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 11:44:24 - Above log line repeated 76 times more. 2017.04.27 11:44:24 - Updating systems & servers data .... 2017.04.27 11:44:25 - Systems & servers data update completed. 2017.04.27 11:45:40 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #108965 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 11:54:25 - Above log line repeated 24 times more. 2017.04.27 11:54:25 - Updating systems & servers data .... 2017.04.27 11:54:26 - Systems & servers data update completed. 2017.04.27 11:55:14 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #196542 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 12:04:26 - Above log line repeated 53 times more. 2017.04.27 12:04:26 - Updating systems & servers data .... 2017.04.27 12:04:27 - Systems & servers data update completed. 2017.04.27 12:06:04 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #320944 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 12:15:27 - Above log line repeated 65 times more. 2017.04.27 12:15:27 - Updating systems & servers data .... 2017.04.27 12:15:27 - Systems & servers data update completed. 2017.04.27 12:15:51 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #445585 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 12:25:28 - Above log line repeated 52 times more. 2017.04.27 12:25:28 - Updating systems & servers data .... 2017.04.27 12:25:28 - Systems & servers data update completed. 2017.04.27 12:26:01 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #569672 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 12:35:28 - Above log line repeated 91 times more. 2017.04.27 12:35:28 - Updating systems & servers data .... 2017.04.27 12:35:30 - Systems & servers data update completedI 2017.04.27 12:35:38 - Renewing TLS key. 2017.04.27 12:35:38 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.27 12:35:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 12:35:38 - OpenVPN > Validating certificate key usage. 2017.04.27 12:35:38 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 12:35:38 - OpenVPN > VERIFY KU OK. 2017.04.27 12:35:38 - OpenVPN > Validating certificate extended key usage. 2017.04.27 12:35:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 12:35:38 - OpenVPN > VERIFY EKU OK. 2017.04.27 12:35:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 12:35:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 12:35:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 12:35:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 12:35:50 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #699939 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 12:45:30 - Above log line repeated 73 times more. 2017.04.27 12:45:30 - Updating systems & servers data .... 2017.04.27 12:45:32 - Systems & servers data update completed. 2017.04.27 12:46:57 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #140145 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 12:55:32 - Above log line repeated 47 times more. 2017.04.27 12:55:32 - Updating systems & servers data .... 2017.04.27 12:55:33 - Systems & servers data update completed. 2017.04.27 12:55:49 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #276234 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 13:05:33 - Above log line repeated 84 times more. 2017.04.27 13:05:33 - Updating systems & servers data .... 2017.04.27 13:05:34 - Systems & servers data update completed. 2017.04.27 13:05:37 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #452499 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 13:15:34 - Above log line repeated 102 times more. 2017.04.27 13:15:34 - Updating systems & servers data .... 2017.04.27 13:15:35 - Systems & servers data update completed. 2017.04.27 13:16:36 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #617079 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 13:26:35 - Above log line repeated 77 times more. 2017.04.27 13:26:35 - Updating systems & servers data .... 2017.04.27 13:26:36 - Systems & servers data update completed. 2017.04.27 13:26:54 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #737474 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 13:35:38 - Above log line repeated 71 times more. 2017.04.27 13:35:38 - OpenVPN > TLS: soft reset sec=0 bytes=1388300030/-1 pkts=1931236/0. 2017.04.27 13:35:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 13:35:38 - OpenVPN > Validating certificate key usage. 2017.04.27 13:35:38 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 13:35:38 - OpenVPN > VERIFY KU OK. 2017.04.27 13:35:38 - OpenVPN > Validating certificate extended key usage. 2017.04.27 13:35:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 13:35:38 - OpenVPN > VERIFY EKU OK. 2017.04.27 13:35:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 13:35:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 13:35:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 13:35:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 13:36:14 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #858577 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 13:36:36 - Updating systems & servers data .... 2017.04.27 13:36:36 - Systems & servers data update completed. 2017.04.27 13:37:24 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2113 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 13:46:36 - Above log line repeated 49 times more. 2017.04.27 13:46:36 - Updating systems & servers data .... 2017.04.27 13:46:37 - Systems & servers data update completed. 2017.04.27 13:47:10 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #86468 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 13:56:37 - Above log line repeated 46 times more. 2017.04.27 13:56:37 - Updating systems & servers data .... 2017.04.27 13:56:38 - Systems & servers data update completed. 2017.04.27 13:56:50 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #175017 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 14:07:38 - Above log line repeated 56 times more. 2017.04.27 14:07:38 - Updating systems & servers data .... 2017.04.27 14:07:39 - Systems & servers data update completed. 2017.04.27 14:07:47 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #277842 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 14:17:40 - Above log line repeated 80 times more. 2017.04.27 14:17:40 - Updating systems & servers data .... 2017.04.27 14:17:40 - Systems & servers data update completed. 2017.04.27 14:18:03 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #412127 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 14:27:40 - Above log line repeated 72 times more. 2017.04.27 14:27:40 - Updating systems & servers data .... 2017.04.27 14:27:41 - Systems & servers data update completed. 2017.04.27 14:28:00 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #539818 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 14:35:37 - Above log line repeated 68 times more. 2017.04.27 14:35:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 14:35:37 - OpenVPN > Validating certificate key usage. 2017.04.27 14:35:37 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 14:35:37 - OpenVPN > VERIFY KU OK. 2017.04.27 14:35:37 - OpenVPN > Validating certificate extended key usage. 2017.04.27 14:35:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 14:35:37 - OpenVPN > VERIFY EKU OK. 2017.04.27 14:35:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 14:35:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 14:35:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 14:35:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 14:36:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #629465 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 14:38:41 - Above log line repeated 15 times more. 2017.04.27 14:38:41 - Updating systems & servers data .... 2017.04.27 14:38:42 - Systems & servers data update completed. 2017.04.27 14:39:02 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #24906 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 14:48:42 - Above log line repeated 213 times more. 2017.04.27 14:48:42 - Updating systems & servers data .... 2017.04.27 14:48:45 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #105302 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 14:48:45 - Above log line repeated 16 times more. 2017.04.27 14:48:45 - Systems & servers data update completed. 2017.04.27 14:49:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #108534 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 14:58:45 - Above log line repeated 609 times more. 2017.04.27 14:58:45 - Updating systems & servers data .... 2017.04.27 14:58:46 - Systems & servers data update completed. 2017.04.27 14:58:53 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #154350 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 15:08:46 - Above log line repeated 249 times more. 2017.04.27 15:08:46 - Updating systems & servers data .... 2017.04.27 15:08:50 - Systems & servers data update completed. 2017.04.27 15:09:24 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #351513 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 15:18:50 - Above log line repeated 334 times more. 2017.04.27 15:18:50 - Updating systems & servers data .... 2017.04.27 15:18:52 - Systems & servers data update completed. 2017.04.27 15:19:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #519983 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 15:28:52 - Above log line repeated 248 times more. 2017.04.27 15:28:52 - Updating systems & servers data .... 2017.04.27 15:28:52 - Systems & servers data update completed. 2017.04.27 15:28:55 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #707203 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 15:35:37 - Above log line repeated 95 times moreI 2017.04.27 15:35:37 - Renewing TLS key. 2017.04.27 15:35:37 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.27 15:35:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 15:35:37 - OpenVPN > Validating certificate key usage. 2017.04.27 15:35:37 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 15:35:37 - OpenVPN > VERIFY KU OK. 2017.04.27 15:35:37 - OpenVPN > Validating certificate extended key usage. 2017.04.27 15:35:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 15:35:37 - OpenVPN > VERIFY EKU OK. 2017.04.27 15:35:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 15:35:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 15:35:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 15:35:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 15:35:51 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #832304 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 15:38:52 - Above log line repeated 55 times more. 2017.04.27 15:38:52 - Updating systems & servers data .... 2017.04.27 15:38:55 - Systems & servers data update completed. 2017.04.27 15:39:36 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #65620 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 15:48:55 - Above log line repeated 152 times more. 2017.04.27 15:48:55 - Updating systems & servers data .... 2017.04.27 15:48:56 - Systems & servers data update completed. 2017.04.27 15:49:16 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #269927 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 15:58:56 - Above log line repeated 217 times more. 2017.04.27 15:58:56 - Updating systems & servers data .... 2017.04.27 15:58:57 - Systems & servers data update completed. 2017.04.27 15:59:09 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #530662 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 16:08:57 - Above log line repeated 155 times more. 2017.04.27 16:08:57 - Updating systems & servers data .... 2017.04.27 16:08:58 - Systems & servers data update completed. 2017.04.27 16:09:17 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #800405 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 16:18:59 - Above log line repeated 253 times more. 2017.04.27 16:18:59 - Updating systems & servers data .... 2017.04.27 16:19:01 - Systems & servers data update completed. 2017.04.27 16:19:09 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1060662 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 16:29:01 - Above log line repeated 260 times more. 2017.04.27 16:29:01 - Updating systems & servers data .... 2017.04.27 16:29:07 - Systems & servers data update completed. 2017.04.27 16:29:13 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1307533 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 16:35:37 - Above log line repeated 179 times moreI 2017.04.27 16:35:37 - Renewing TLS key. 2017.04.27 16:35:37 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.27 16:35:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 16:35:37 - OpenVPN > Validating certificate key usage. 2017.04.27 16:35:37 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 16:35:37 - OpenVPN > VERIFY KU OK. 2017.04.27 16:35:37 - OpenVPN > Validating certificate extended key usage. 2017.04.27 16:35:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 16:35:37 - OpenVPN > VERIFY EKU OK. 2017.04.27 16:35:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 16:35:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 16:35:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 16:35:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 16:35:38 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1509697 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 16:39:07 - Above log line repeated 269 times more. 2017.04.27 16:39:07 - Updating systems & servers data .... 2017.04.27 16:39:10 - Systems & servers data update completed. 2017.04.27 16:39:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #81204 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 16:49:10 - Above log line repeated 303 times more. 2017.04.27 16:49:10 - Updating systems & servers data .... 2017.04.27 16:49:11 - Systems & servers data update completed. 2017.04.27 16:49:36 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #379800 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 16:59:12 - Above log line repeated 680 times more. 2017.04.27 16:59:12 - Updating systems & servers data .... 2017.04.27 16:59:13 - Systems & servers data update completed. 2017.04.27 16:59:31 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #658154 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 17:09:13 - Above log line repeated 235 times more. 2017.04.27 17:09:13 - Updating systems & servers data .... 2017.04.27 17:09:19 - Systems & servers data update completed. 2017.04.27 17:09:35 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #899270 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 17:17:42 - Above log line repeated 99 times more. 2017.04.27 17:17:43 - OpenVPN > write to TUN/TAP : The system cannot find the file specified. (code=2). 2017.04.27 17:17:43 - OpenVPN > write to TUN/TAP : The system cannot find the file specified. (code=2). 2017.04.27 17:17:43 - Above log line repeated 70 times more. 2017.04.27 17:17:43 - OpenVPN > TUN/TAP I/O operation aborted, restarting. 2017.04.27 17:17:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.238 MASK 255.255.255.255 192.168.178.1. 2017.04.27 17:17:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.04.27 17:17:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1W 2017.04.27 17:17:43 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2017.04.27 17:17:43 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2017.04.27 17:17:43 - OpenVPN > Route deletion fallback to route.exe. 2017.04.27 17:17:43 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2017.04.27 17:17:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1W 2017.04.27 17:17:43 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2017.04.27 17:17:43 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2017.04.27 17:17:43 - OpenVPN > Route deletion fallback to route.exe. 2017.04.27 17:17:43 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2017.04.27 17:17:43 - OpenVPN > Closing TUN/TAP interface. 2017.04.27 17:17:43 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting. 2017.04.27 17:17:43 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017. 2017.04.27 17:17:43 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2017.04.27 17:17:43 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09. 2017.04.27 17:17:43 - OpenVPN > Restart pause, 10 second(s)! 2017.04.27 17:17:43 - Disconnecting. 2017.04.27 17:17:43 - Management - Send 'signal SIGTERM'. 2017.04.27 17:17:43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.04.27 17:17:43 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting. 2017.04.27 17:17:43 - Connection terminated.. 2017.04.27 17:17:44 - DNS of a network adapter restored to original settings (TP-LINK Wireless USB Adapter, to automatic). 2017.04.27 17:17:44 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2017.04.27 17:17:44 - DNS leak protection with packet filtering disabled.I 2017.04.27 17:17:55 - Checking authorization ...! 2017.04.27 17:17:59 - Connecting to Orion (Netherlands, Alblasserdam). 2017.04.27 17:17:59 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017. 2017.04.27 17:17:59 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2017.04.27 17:17:59 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09. 2017.04.27 17:17:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.04.27 17:17:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.27 17:17:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.27 17:17:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.238:443. 2017.04.27 17:17:59 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2017.04.27 17:17:59 - OpenVPN > UDP link local: (not bound). 2017.04.27 17:17:59 - OpenVPN > UDP link remote: [AF_INET]213.152.161.238:443. 2017.04.27 17:17:59 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.238:443, sid=e50e5614 1046685e. 2017.04.27 17:17:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 17:17:59 - OpenVPN > Validating certificate key usage. 2017.04.27 17:17:59 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 17:17:59 - OpenVPN > VERIFY KU OK. 2017.04.27 17:17:59 - OpenVPN > Validating certificate extended key usage. 2017.04.27 17:17:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 17:17:59 - OpenVPN > VERIFY EKU OK. 2017.04.27 17:17:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 17:18:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 17:18:00 - OpenVPN > [Orion] Peer Connection Initiated with [AF_INET]213.152.161.238:443. 2017.04.27 17:18:01 - OpenVPN > SENT CONTROL [Orion]: 'PUSH_REQUEST' (status=1). 2017.04.27 17:18:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.20.93 255.255.0.0,peer-id 35,cipher AES-256-GCM'. 2017.04.27 17:18:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.27 17:18:01 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.04.27 17:18:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.27 17:18:01 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.27 17:18:01 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.27 17:18:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.27 17:18:01 - OpenVPN > OPTIONS IMPORT: peer-id set. 2017.04.27 17:18:01 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2017.04.27 17:18:01 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2017.04.27 17:18:01 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 17:18:01 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 17:18:01 - OpenVPN > interactive service msg_channel=0. 2017.04.27 17:18:01 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=20 HWADDR=98:de:d0:05:ef:b4. 2017.04.27 17:18:01 - OpenVPN > open_tun. 2017.04.27 17:18:01 - OpenVPN > TAP-WIN32 device [Local Area Connection 4] opened: \\.\Global\{DB8AF0B6-7E73-488B-906D-B6B7E05129C0}.tap. 2017.04.27 17:18:01 - OpenVPN > TAP-Windows Driver Version 9.9. 2017.04.27 17:18:01 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.20.93/255.255.0.0 [sUCCEEDED]. 2017.04.27 17:18:01 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.20.93/255.255.0.0 on interface {DB8AF0B6-7E73-488B-906D-B6B7E05129C0} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.04.27 17:18:01 - OpenVPN > Successful ARP Flush on interface [24] {DB8AF0B6-7E73-488B-906D-B6B7E05129C0}. 2017.04.27 17:18:01 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.04.27 17:18:06 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.04.27 17:18:06 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.238 MASK 255.255.255.255 192.168.178.1. 2017.04.27 17:18:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.04.27 17:18:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.04.27 17:18:06 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.04.27 17:18:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2017.04.27 17:18:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.04.27 17:18:06 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.04.27 17:18:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2017.04.27 17:18:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.04.27 17:18:06 - Starting Management Interface. 2017.04.27 17:18:06 - OpenVPN > Initialization Sequence Completed. 2017.04.27 17:18:06 - DNS leak protection with packet filtering enabled.. 2017.04.27 17:18:06 - DNS of a network adapter forced (TP-LINK Wireless USB Adapter, from automatic (213.46.228.196,62.179.104.196) to 10.4.0.1). 2017.04.27 17:18:06 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2017.04.27 17:18:06 - Flushing DNS. 2017.04.27 17:18:06 - Shell of 'cmd.exe','/c ipconfig /flushdns' done sync in 421 ms, Output: Windows IP Configuration. 2017.04.27 17:18:06 - Successfully flushed the DNS Resolver Cache.. 2017.04.27 17:18:12 - Shell of 'cmd.exe','/c ipconfig /registerdns' done sync in 6038 ms, Output: Windows IP Configuration. 2017.04.27 17:18:12 - Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer in 15 minutes.I 2017.04.27 17:18:13 - Checking routeI 2017.04.27 17:18:13 - Checking DNS! 2017.04.27 17:18:14 - Connected.. 2017.04.27 17:18:14 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.27 17:18:14 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.04.27 17:19:19 - Updating systems & servers data .... 2017.04.27 17:19:20 - Systems & servers data update completed. 2017.04.27 17:19:30 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #8822 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 17:29:20 - Above log line repeated 662 times more. 2017.04.27 17:29:20 - Updating systems & servers data .... 2017.04.27 17:29:22 - Systems & servers data update completed. 2017.04.27 17:29:37 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #254700 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 17:39:22 - Above log line repeated 153 times more. 2017.04.27 17:39:22 - Updating systems & servers data .... 2017.04.27 17:39:23 - Systems & servers data update completed. 2017.04.27 17:39:37 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #428449 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 17:49:41 - Above log line repeated 85 times more. 2017.04.27 17:49:41 - Updating systems & servers data .... 2017.04.27 17:49:43 - Systems & servers data update completed. 2017.04.27 17:49:48 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #664254 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 17:59:43 - Above log line repeated 248 times more. 2017.04.27 17:59:43 - Updating systems & servers data .... 2017.04.27 17:59:43 - Systems & servers data update completed. 2017.04.27 18:05:00 - OpenVPN > write to TUN/TAP : The system cannot find the file specified. (code=2). 2017.04.27 18:05:01 - Above log line repeated 80 times more. 2017.04.27 18:05:01 - OpenVPN > TUN/TAP I/O operation aborted, restarting. 2017.04.27 18:05:01 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.238 MASK 255.255.255.255 192.168.178.1. 2017.04.27 18:05:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.04.27 18:05:01 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1W 2017.04.27 18:05:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2017.04.27 18:05:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2017.04.27 18:05:01 - OpenVPN > Route deletion fallback to route.exe. 2017.04.27 18:05:01 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2017.04.27 18:05:01 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1W 2017.04.27 18:05:01 - OpenVPN > Warning: route gateway is not reachable on any active network adapters: 10.4.0.1. 2017.04.27 18:05:01 - OpenVPN > Route deletion via IPAPI failed [adaptive]. 2017.04.27 18:05:01 - OpenVPN > Route deletion fallback to route.exe. 2017.04.27 18:05:01 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2017.04.27 18:05:01 - OpenVPN > Closing TUN/TAP interface. 2017.04.27 18:05:01 - OpenVPN > SIGHUP[soft,tun-abort] received, process restarting. 2017.04.27 18:05:01 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017. 2017.04.27 18:05:01 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2017.04.27 18:05:01 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09. 2017.04.27 18:05:01 - OpenVPN > Restart pause, 10 second(s)! 2017.04.27 18:05:01 - Disconnecting. 2017.04.27 18:05:01 - Management - Send 'signal SIGTERM'. 2017.04.27 18:05:01 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.04.27 18:05:01 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting. 2017.04.27 18:05:01 - Connection terminated.. 2017.04.27 18:05:01 - DNS of a network adapter restored to original settings (TP-LINK Wireless USB Adapter, to automatic). 2017.04.27 18:05:01 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2017.04.27 18:05:01 - DNS leak protection with packet filtering disabled.I 2017.04.27 18:05:12 - Checking authorization ...! 2017.04.27 18:05:12 - Connecting to Orion (Netherlands, Alblasserdam). 2017.04.27 18:05:12 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017. 2017.04.27 18:05:12 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2017.04.27 18:05:12 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09. 2017.04.27 18:05:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.04.27 18:05:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.27 18:05:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.27 18:05:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.238:443. 2017.04.27 18:05:12 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2017.04.27 18:05:12 - OpenVPN > UDP link local: (not bound). 2017.04.27 18:05:12 - OpenVPN > UDP link remote: [AF_INET]213.152.161.238:443. 2017.04.27 18:05:12 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.238:443, sid=dc7d0595 6fa020ae. 2017.04.27 18:05:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 18:05:13 - OpenVPN > Validating certificate key usage. 2017.04.27 18:05:13 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 18:05:13 - OpenVPN > VERIFY KU OK. 2017.04.27 18:05:13 - OpenVPN > Validating certificate extended key usage. 2017.04.27 18:05:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 18:05:13 - OpenVPN > VERIFY EKU OK. 2017.04.27 18:05:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 18:05:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 18:05:13 - OpenVPN > [Orion] Peer Connection Initiated with [AF_INET]213.152.161.238:443. 2017.04.27 18:05:14 - OpenVPN > SENT CONTROL [Orion]: 'PUSH_REQUEST' (status=1). 2017.04.27 18:05:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.20.93 255.255.0.0,peer-id 78,cipher AES-256-GCM'. 2017.04.27 18:05:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.27 18:05:14 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.04.27 18:05:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.27 18:05:14 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.27 18:05:14 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.27 18:05:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.27 18:05:14 - OpenVPN > OPTIONS IMPORT: peer-id set. 2017.04.27 18:05:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2017.04.27 18:05:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2017.04.27 18:05:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 18:05:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 18:05:14 - OpenVPN > interactive service msg_channel=0. 2017.04.27 18:05:14 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=20 HWADDR=98:de:d0:05:ef:b4. 2017.04.27 18:05:14 - OpenVPN > open_tun. 2017.04.27 18:05:14 - OpenVPN > TAP-WIN32 device [Local Area Connection 4] opened: \\.\Global\{DB8AF0B6-7E73-488B-906D-B6B7E05129C0}.tap. 2017.04.27 18:05:14 - OpenVPN > TAP-Windows Driver Version 9.9. 2017.04.27 18:05:14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.20.93/255.255.0.0 [sUCCEEDED]. 2017.04.27 18:05:14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.20.93/255.255.0.0 on interface {DB8AF0B6-7E73-488B-906D-B6B7E05129C0} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.04.27 18:05:14 - OpenVPN > Successful ARP Flush on interface [24] {DB8AF0B6-7E73-488B-906D-B6B7E05129C0}. 2017.04.27 18:05:14 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.04.27 18:05:19 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.04.27 18:05:19 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.238 MASK 255.255.255.255 192.168.178.1. 2017.04.27 18:05:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.04.27 18:05:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.04.27 18:05:19 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.04.27 18:05:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2017.04.27 18:05:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.04.27 18:05:19 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.04.27 18:05:19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2017.04.27 18:05:19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.04.27 18:05:19 - Starting Management Interface. 2017.04.27 18:05:19 - OpenVPN > Initialization Sequence Completed. 2017.04.27 18:05:19 - DNS leak protection with packet filtering enabled.. 2017.04.27 18:05:19 - DNS of a network adapter forced (TP-LINK Wireless USB Adapter, from automatic (213.46.228.196,62.179.104.196) to 10.4.0.1). 2017.04.27 18:05:19 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2017.04.27 18:05:19 - Flushing DNS. 2017.04.27 18:05:19 - Shell of 'cmd.exe','/c ipconfig /flushdns' done sync in 437 ms, Output: Windows IP Configuration. 2017.04.27 18:05:19 - Successfully flushed the DNS Resolver Cache.. 2017.04.27 18:05:25 - Shell of 'cmd.exe','/c ipconfig /registerdns' done sync in 6021 ms, Output: Windows IP Configuration. 2017.04.27 18:05:25 - Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer in 15 minutes.I 2017.04.27 18:05:25 - Checking routeI 2017.04.27 18:05:26 - Checking DNS! 2017.04.27 18:05:26 - Connected.. 2017.04.27 18:05:26 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.04.27 18:05:26 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.27 18:05:46 - Updating systems & servers data .... 2017.04.27 18:05:47 - Systems & servers data update completed. 2017.04.27 18:07:49 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #8482 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 18:15:48 - Above log line repeated 422 times more. 2017.04.27 18:15:48 - Updating systems & servers data .... 2017.04.27 18:15:50 - Systems & servers data update completed. 2017.04.27 18:15:53 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #320681 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 18:25:58 - Above log line repeated 52 times more. 2017.04.27 18:25:58 - Updating systems & servers data .... 2017.04.27 18:26:00 - Systems & servers data update completed. 2017.04.27 18:26:20 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #466910 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 18:36:00 - Above log line repeated 67 times more. 2017.04.27 18:36:00 - Updating systems & servers data .... 2017.04.27 18:36:02 - Systems & servers data update completed. 2017.04.27 18:36:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #646832 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 18:46:10 - Above log line repeated 185 times more. 2017.04.27 18:46:10 - Updating systems & servers data .... 2017.04.27 18:46:11 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #859648 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 18:46:11 - Above log line repeated 1 times more. 2017.04.27 18:46:11 - Systems & servers data update completed. 2017.04.27 18:46:51 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #880040 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 18:56:12 - Above log line repeated 792 times more. 2017.04.27 18:56:12 - Updating systems & servers data .... 2017.04.27 18:56:12 - Systems & servers data update completed. 2017.04.27 18:56:31 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1206881 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 19:05:13 - Above log line repeated 775 times more. 2017.04.27 19:05:13 - OpenVPN > TLS: soft reset sec=0 bytes=2102133928/-1 pkts=2734150/0. 2017.04.27 19:05:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 19:05:15 - OpenVPN > Validating certificate key usage. 2017.04.27 19:05:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 19:05:15 - OpenVPN > VERIFY KU OK. 2017.04.27 19:05:15 - OpenVPN > Validating certificate extended key usage. 2017.04.27 19:05:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 19:05:15 - OpenVPN > VERIFY EKU OK. 2017.04.27 19:05:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 19:05:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 19:05:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 19:05:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 19:05:43 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1527376 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 19:06:13 - Above log line repeated 46 times more. 2017.04.27 19:06:13 - Updating systems & servers data .... 2017.04.27 19:06:13 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1540168 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 19:06:14 - Systems & servers data update completed. 2017.04.27 19:06:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #4934 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 19:16:32 - Above log line repeated 899 times more. 2017.04.27 19:16:32 - Updating systems & servers data .... 2017.04.27 19:16:33 - Systems & servers data update completed. 2017.04.27 19:16:42 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #409896 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 19:26:33 - Above log line repeated 489 times more. 2017.04.27 19:26:33 - Updating systems & servers data .... 2017.04.27 19:26:35 - Systems & servers data update completed. 2017.04.27 19:26:53 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #770551 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 19:36:35 - Above log line repeated 436 times more. 2017.04.27 19:36:35 - Updating systems & servers data .... 2017.04.27 19:36:35 - Systems & servers data update completed. 2017.04.27 19:36:57 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1235479 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 19:46:35 - Above log line repeated 139 times more. 2017.04.27 19:46:35 - Updating systems & servers data .... 2017.04.27 19:46:36 - Systems & servers data update completed. 2017.04.27 19:46:54 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1424456 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 19:56:36 - Above log line repeated 115 times more. 2017.04.27 19:56:36 - Updating systems & servers data .... 2017.04.27 19:56:37 - Systems & servers data update completed. 2017.04.27 19:56:44 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1621608 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 20:05:13 - Above log line repeated 39 times moreI 2017.04.27 20:05:13 - Renewing TLS key. 2017.04.27 20:05:13 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.27 20:05:15 - OpenVPN > TLS: soft reset sec=0 bytes=2461165245/-1 pkts=3072589/0. 2017.04.27 20:05:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 20:05:15 - OpenVPN > Validating certificate key usage. 2017.04.27 20:05:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 20:05:15 - OpenVPN > VERIFY KU OK. 2017.04.27 20:05:15 - OpenVPN > Validating certificate extended key usage. 2017.04.27 20:05:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 20:05:15 - OpenVPN > VERIFY EKU OK. 2017.04.27 20:05:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 20:05:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 20:05:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 20:05:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 20:05:46 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1784356 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 20:07:37 - Above log line repeated 31 times more. 2017.04.27 20:07:37 - Updating systems & servers data .... 2017.04.27 20:07:39 - Systems & servers data update completed. 2017.04.27 20:08:05 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #38438 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 20:17:39 - Above log line repeated 87 times more. 2017.04.27 20:17:39 - Updating systems & servers data .... 2017.04.27 20:17:40 - Systems & servers data update completed. 2017.04.27 20:17:46 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #256556 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 20:27:40 - Above log line repeated 94 times more. 2017.04.27 20:27:40 - Updating systems & servers data .... 2017.04.27 20:27:41 - Systems & servers data update completed. 2017.04.27 20:28:07 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #496612 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 20:38:41 - Above log line repeated 131 times more. 2017.04.27 20:38:41 - Updating systems & servers data .... 2017.04.27 20:38:44 - Systems & servers data update completed. 2017.04.27 20:38:47 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #713707 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 20:48:44 - Above log line repeated 151 times more. 2017.04.27 20:48:44 - Updating systems & servers data .... 2017.04.27 20:48:45 - Systems & servers data update completed. 2017.04.27 20:49:27 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #963631 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 20:58:45 - Above log line repeated 177 times more. 2017.04.27 20:58:45 - Updating systems & servers data .... 2017.04.27 20:58:47 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1156281 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 20:58:47 - Above log line repeated 1 times more. 2017.04.27 20:58:47 - Systems & servers data update completed. 2017.04.27 20:58:57 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1160703 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 21:05:15 - Above log line repeated 80 times more. 2017.04.27 21:05:15 - OpenVPN > TLS: soft reset sec=0 bytes=1974258904/-1 pkts=2595305/0. 2017.04.27 21:05:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 21:05:15 - OpenVPN > Validating certificate key usage. 2017.04.27 21:05:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 21:05:15 - OpenVPN > VERIFY KU OK. 2017.04.27 21:05:15 - OpenVPN > Validating certificate extended key usage. 2017.04.27 21:05:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 21:05:15 - OpenVPN > VERIFY EKU OK. 2017.04.27 21:05:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 21:05:16 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 21:05:16 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 21:05:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 21:05:28 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1344923 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 21:08:47 - Above log line repeated 39 times more. 2017.04.27 21:08:47 - Updating systems & servers data .... 2017.04.27 21:08:49 - Systems & servers data update completed. 2017.04.27 21:08:52 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #90502 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 21:18:49 - Above log line repeated 203 times more. 2017.04.27 21:18:49 - Updating systems & servers data .... 2017.04.27 21:18:51 - Systems & servers data update completed. 2017.04.27 21:19:08 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #422275 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 21:28:51 - Above log line repeated 375 times more. 2017.04.27 21:28:51 - Updating systems & servers data .... 2017.04.27 21:28:54 - Systems & servers data update completed. 2017.04.27 21:28:59 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #733500 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 21:38:54 - Above log line repeated 391 times more. 2017.04.27 21:38:54 - Updating systems & servers data .... 2017.04.27 21:38:57 - Systems & servers data update completed. 2017.04.27 21:39:00 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #995814 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 21:48:57 - Above log line repeated 400 times more. 2017.04.27 21:48:57 - Updating systems & servers data .... 2017.04.27 21:48:58 - Systems & servers data update completed. 2017.04.27 21:49:00 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1215242 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 21:58:58 - Above log line repeated 679 times more. 2017.04.27 21:58:58 - Updating systems & servers data .... 2017.04.27 21:59:01 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1498726 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 21:59:05 - Above log line repeated 3 times more. 2017.04.27 21:59:05 - Systems & servers data update completed. 2017.04.27 21:59:11 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1503297 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 22:05:15 - Above log line repeated 599 times moreI 2017.04.27 22:05:15 - Renewing TLS key. 2017.04.27 22:05:15 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.27 22:05:16 - OpenVPN > TLS: soft reset sec=0 bytes=2387745470/-1 pkts=2950263/0. 2017.04.27 22:05:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 22:05:16 - OpenVPN > Validating certificate key usage. 2017.04.27 22:05:16 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 22:05:16 - OpenVPN > VERIFY KU OK. 2017.04.27 22:05:16 - OpenVPN > Validating certificate extended key usage. 2017.04.27 22:05:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 22:05:16 - OpenVPN > VERIFY EKU OK. 2017.04.27 22:05:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 22:05:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 22:05:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 22:05:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 22:05:21 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1699186 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 22:09:06 - Above log line repeated 382 times more. 2017.04.27 22:09:06 - Updating systems & servers data .... 2017.04.27 22:09:07 - Systems & servers data update completed. 2017.04.27 22:09:11 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #102194 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 22:19:07 - Above log line repeated 1146 times more. 2017.04.27 22:19:07 - Updating systems & servers data .... 2017.04.27 22:19:10 - Systems & servers data update completed. 2017.04.27 22:19:12 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #583386 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 22:29:10 - Above log line repeated 2112 times more. 2017.04.27 22:29:10 - Updating systems & servers data .... 2017.04.27 22:29:13 - Systems & servers data update completed. 2017.04.27 22:29:29 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1518607 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 22:39:14 - Above log line repeated 3234 times more. 2017.04.27 22:39:14 - Updating systems & servers data .... 2017.04.27 22:39:15 - Systems & servers data update completed. 2017.04.27 22:39:16 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2517231 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 22:49:15 - Above log line repeated 3098 times more. 2017.04.27 22:49:15 - Updating systems & servers data .... 2017.04.27 22:49:17 - Systems & servers data update completed. 2017.04.27 22:49:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3506690 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 22:59:18 - Above log line repeated 3121 times more. 2017.04.27 22:59:18 - Updating systems & servers data .... 2017.04.27 22:59:18 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #4505608 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 22:59:19 - Above log line repeated 10 times more. 2017.04.27 22:59:19 - Systems & servers data update completed. 2017.04.27 22:59:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #4506839 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 23:05:16 - Above log line repeated 2433 times moreI 2017.04.27 23:05:16 - Renewing TLS key. 2017.04.27 23:05:16 - OpenVPN > TLS: tls_process: killed expiring key. 2017.04.27 23:05:17 - OpenVPN > TLS: soft reset sec=0 bytes=6594705080/-1 pkts=7783489/0. 2017.04.27 23:05:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.27 23:05:17 - OpenVPN > Validating certificate key usage. 2017.04.27 23:05:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.27 23:05:17 - OpenVPN > VERIFY KU OK. 2017.04.27 23:05:17 - OpenVPN > Validating certificate extended key usage. 2017.04.27 23:05:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.27 23:05:17 - OpenVPN > VERIFY EKU OK. 2017.04.27 23:05:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.27 23:05:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 23:05:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.27 23:05:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.27 23:05:24 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #5130911 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 23:09:19 - Above log line repeated 702 times more. 2017.04.27 23:09:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #264926 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 23:09:19 - Updating systems & servers data .... 2017.04.27 23:09:20 - Above log line repeated 8 times more. 2017.04.27 23:09:20 - Systems & servers data update completed. 2017.04.27 23:09:22 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #273058 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 23:19:20 - Above log line repeated 3371 times more. 2017.04.27 23:19:20 - Updating systems & servers data .... 2017.04.27 23:19:21 - Systems & servers data update completed. 2017.04.27 23:19:24 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1222775 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 23:29:21 - Above log line repeated 1430 times more. 2017.04.27 23:29:21 - Updating systems & servers data .... 2017.04.27 23:29:25 - Systems & servers data update completed. 2017.04.27 23:29:28 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1979276 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 23:39:25 - Above log line repeated 431 times more. 2017.04.27 23:39:25 - Updating systems & servers data .... 2017.04.27 23:39:26 - Systems & servers data update completed. 2017.04.27 23:39:56 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2366454 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 23:49:28 - Above log line repeated 425 times more. 2017.04.27 23:49:28 - Updating systems & servers data .... 2017.04.27 23:49:30 - Systems & servers data update completed. 2017.04.27 23:49:42 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #2821669 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.27 23:59:30 - Above log line repeated 946 times more. 2017.04.27 23:59:30 - Updating systems & servers data .... 2017.04.27 23:59:32 - Systems & servers data update completed. 2017.04.27 23:59:34 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3475696 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.28 00:02:52 - Above log line repeated 251 times more! 2017.04.28 00:02:52 - Disconnecting. 2017.04.28 00:02:52 - Management - Send 'signal SIGTERM'. 2017.04.28 00:02:52 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.04.28 00:02:52 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.04.28 00:02:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.238 MASK 255.255.255.255 192.168.178.1. 2017.04.28 00:02:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.04.28 00:02:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.04.28 00:02:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.04.28 00:02:57 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.04.28 00:02:57 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.04.28 00:02:57 - OpenVPN > Closing TUN/TAP interface. 2017.04.28 00:02:57 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2017.04.28 00:02:57 - Connection terminated.. 2017.04.28 00:02:57 - DNS of a network adapter restored to original settings (TP-LINK Wireless USB Adapter, to automatic). 2017.04.28 00:02:57 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2017.04.28 00:02:57 - DNS leak protection with packet filtering disabled.I 2017.04.28 00:02:57 - Checking authorization ...! 2017.04.28 00:02:57 - Connecting to Orion (Netherlands, Alblasserdam). 2017.04.28 00:02:57 - OpenVPN > OpenVPN 2.4.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 29 2017. 2017.04.28 00:02:57 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2017.04.28 00:02:57 - OpenVPN > library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09. 2017.04.28 00:02:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.04.28 00:02:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.28 00:02:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.04.28 00:02:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.238:443. 2017.04.28 00:02:58 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2017.04.28 00:02:58 - OpenVPN > UDP link local: (not bound). 2017.04.28 00:02:58 - OpenVPN > UDP link remote: [AF_INET]213.152.161.238:443. 2017.04.28 00:03:27 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.238:443, sid=bf870299 c25ee78a. 2017.04.28 00:03:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.04.28 00:03:27 - OpenVPN > Validating certificate key usage. 2017.04.28 00:03:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.04.28 00:03:27 - OpenVPN > VERIFY KU OK. 2017.04.28 00:03:27 - OpenVPN > Validating certificate extended key usage. 2017.04.28 00:03:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.04.28 00:03:27 - OpenVPN > VERIFY EKU OK. 2017.04.28 00:03:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org. 2017.04.28 00:03:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.04.28 00:03:27 - OpenVPN > [Orion] Peer Connection Initiated with [AF_INET]213.152.161.238:443. 2017.04.28 00:03:28 - OpenVPN > SENT CONTROL [Orion]: 'PUSH_REQUEST' (status=1). 2017.04.28 00:03:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.20.93 255.255.0.0,peer-id 37,cipher AES-256-GCM'. 2017.04.28 00:03:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.04.28 00:03:28 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2017.04.28 00:03:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.04.28 00:03:28 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.04.28 00:03:28 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.04.28 00:03:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.04.28 00:03:28 - OpenVPN > OPTIONS IMPORT: peer-id set. 2017.04.28 00:03:28 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2017.04.28 00:03:28 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2017.04.28 00:03:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.28 00:03:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2017.04.28 00:03:28 - OpenVPN > interactive service msg_channel=0. 2017.04.28 00:03:28 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=20 HWADDR=98:de:d0:05:ef:b4. 2017.04.28 00:03:28 - OpenVPN > open_tun. 2017.04.28 00:03:28 - OpenVPN > TAP-WIN32 device [Local Area Connection 4] opened: \\.\Global\{DB8AF0B6-7E73-488B-906D-B6B7E05129C0}.tap. 2017.04.28 00:03:28 - OpenVPN > TAP-Windows Driver Version 9.9. 2017.04.28 00:03:28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.20.93/255.255.0.0 [sUCCEEDED]. 2017.04.28 00:03:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.20.93/255.255.0.0 on interface {DB8AF0B6-7E73-488B-906D-B6B7E05129C0} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.04.28 00:03:28 - OpenVPN > Successful ARP Flush on interface [24] {DB8AF0B6-7E73-488B-906D-B6B7E05129C0}. 2017.04.28 00:03:28 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2017.04.28 00:03:33 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.04.28 00:03:33 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.238 MASK 255.255.255.255 192.168.178.1. 2017.04.28 00:03:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.04.28 00:03:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.04.28 00:03:33 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.04.28 00:03:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2017.04.28 00:03:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.04.28 00:03:33 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.04.28 00:03:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4. 2017.04.28 00:03:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.04.28 00:03:33 - Starting Management Interface. 2017.04.28 00:03:33 - OpenVPN > Initialization Sequence Completed. 2017.04.28 00:03:33 - DNS leak protection with packet filtering enabled.. 2017.04.28 00:03:33 - DNS of a network adapter forced (TP-LINK Wireless USB Adapter, from automatic (213.46.228.196,62.179.104.196) to 10.4.0.1). 2017.04.28 00:03:33 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2017.04.28 00:03:33 - Flushing DNS. 2017.04.28 00:03:33 - Shell of 'cmd.exe','/c ipconfig /flushdns' done sync in 421 ms, Output: Windows IP Configuration. 2017.04.28 00:03:33 - Successfully flushed the DNS Resolver Cache.. 2017.04.28 00:03:39 - Shell of 'cmd.exe','/c ipconfig /registerdns' done sync in 6022 ms, Output: Windows IP Configuration. 2017.04.28 00:03:39 - Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer in 15 minutes.I 2017.04.28 00:03:39 - Checking routeI 2017.04.28 00:03:40 - Checking DNS! 2017.04.28 00:03:40 - Connected.. 2017.04.28 00:03:40 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.04.28 00:03:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.04.28 00:06:42 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #125026 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.28 00:09:32 - Above log line repeated 47 times more. 2017.04.28 00:09:32 - Updating systems & servers data .... 2017.04.28 00:09:35 - Systems & servers data update completed. 2017.04.28 00:10:31 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #330255 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.28 00:19:35 - Above log line repeated 86 times more. 2017.04.28 00:19:35 - Updating systems & servers data .... 2017.04.28 00:19:38 - Systems & servers data update completed. 2017.04.28 00:19:39 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #851976 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.28 00:29:38 - Above log line repeated 153 times more. 2017.04.28 00:29:38 - Updating systems & servers data .... 2017.04.28 00:29:40 - Systems & servers data update completed. 2017.04.28 00:30:18 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1271942 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.28 00:39:41 - Above log line repeated 115 times more. 2017.04.28 00:39:41 - Updating systems & servers data .... 2017.04.28 00:39:42 - Systems & servers data update completed. 2017.04.28 00:40:09 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1620746 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2017.04.28 00:49:42 - Above log line repeated 131 times more. 2017.04.28 00:49:42 - Updating systems & servers data .... 2017.04.28 00:49:43 - Systems & servers data update completed. 2017.04.28 00:50:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1848282 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings I hope I have provided enough information to figure out what's going on. It is getting on rather late here and I do have a rather busy day tomorrow so it may be a while until I'll be back here to respond again. I think AirVPN is a great service and I absolutely will want to continue using it for the foreseeable future if these issues can be resolved. Thank you in advance, Jurriaany, excited yet troubled customer.
  10. Hey now. I have read many threads w/in these forum(s), I'm sorry to post. I've tried to tweak settings & figure this out on my own, but I'm spent. I've resigned Eddie back to near default settings out of frustration. So here's the crux of the biscuit... I'm running Eddie Version 2.12.4. Windows7 (64bit, not sure if that matters). Cable, High Speed Internet connection. Again, I have most Eddie "default" options set, with a couple exceptions. AirVpn Support said to mark "activate network lock at startup", and I've also checked "remove the gateway route" (seems like a good idea b/c I use win7, I think?). All other options are back at default. I've read in multiple posts that the location of AirVPN IP/Server does not have to be nearby, yet if I go anywhere outside my general area, speed drops-off dramatically. I've checked for leaks, flush DNS, IpV6 is not detected, I'm pretty sure everything is good -execpt my Internet Speed(s). I'm in the US. I've found that the IP's closest to my city are always the fastest (which seems to contradict many of the posts I've read here). If I go to the Netherlands -forget about it! I ran a speed test directly from my ISP ('flash' type speed test), NOT connected to Eddie 9msPing / 180.21MbpsDL / 24.09MbpsUpload. So after the test above... now connected via Eddie/AirVPN, (I tried a couple IP/servers before finding this better result/IP), just now, 11msPing/88.26MbpsDL/22MbpsUpload. <<That's actually really good from what I typically see when running a speed test. Usually, I find I'm 30+Latency, 50Mbps+/-DL, 15Mbps+/-UL -or worse. So when I'm working, I'll sense my connection has slowed, then I have to manually, connect/disconnect/speed test in order to find a fast IP -which obviously s*cks & is time-consuming. Oh yeah, I also find if I disconnect from AirVpn Server, close Eddie, then re-open Eddie (then I'll have better luck w/ the Eddie suggested Servers). I disconnect from my ISP beforehand, plus I have Network Lock enabled... so I'm not sure why simply stopping/re-starting Eddie helps? I installed Eddie with my Windows Firewall On, and everything looks good w/ respect to my Firewall. That's it. 3 hours later, and I now must sleep... I bow my head in defeat, signing-off with Default Settings still intact. Rrrr Many Thanks, DfP *Admin, please delete this if deemed overly addressed w/in previous posts to these Forums.
  11. I'm using Eddie on macOS Sierra which is running behind Sophos UTM 9.4 firewall. I'm not seeing any values for score or latency, I've already allowed ICMP on the firewall. I believe the firewall is blocking something which is preventing me from getting the latency and score values. I've tried bypassing the firewall and everything worked fine. Anyone have any experience with Sophos UTM?
  12. Hi I have a strange problem and I'm at a loss to solve it. I've been tweaking at the settings for a while but nothing seems to improve. I have tried servers from all over the world and even moved to the non-standard ports. I did find moving to a non-standard port gave a bit of an average boost so I was more able to sustain up near the 10M max rate continuously than before. I assume this is just because most clients are connected to 443/udp and there's the OpenVPN single thread issue on the server. I am on a 24/1 ADSL2 connection with ~180ms latency to the closest LA servers. I can get slightly better latency into Singapore, but I'd rather terminate in the USA since most of my traffic ends up there anyway. What I see is that I cannot exceed about 10Mbps. I started out assuming it was just because my desktop OS is shit and its TCP window handling was slowing me down. I used DownloadThemAll to open dozens of connections instead of single-streaming a download. That didn't help. I was still capped at 10MBPS. I didn't see heavy CPU usage in my router but I ruled it by terminating the VPN on my high end i7 machine (with AES-NI) and repeating the DownloadThemAll test. It didn't help. The same test off the VPN saturates my link at 24MBPS. I have a few questions... First, is anyone else using OpenVPN in a similar situation (24/1 and ~200ms latency)? Do you see acceptable performance? Second, are there any tweaks to the config that might help improve the situation? I've tried forcing the sndbuf/rcvbuf settings to 512k but found that they hinder more than help. Third, I see what looks like high uplink utilization while pulling at the 10M rate over the VPN. the 1M uplink is actually quite saturated. I don't see similar when I disable the VPN. Is this normal for openvpn? If that's the case then I'm stuffed until I can increase my uplink rate. I didn't think OpenVPN added this much overhead though. There's nothing else I can think of to work out what's going on. Any suggestions?
  13. All, So far good results. I signed up for AirVPN while the Phoenix, AZ server was listed as down. It has since been removed entirely. I would have liked to have a local server, and that's partially chose airVPN. Client works well on both Windows and Linux. Works well on cell traffic in OpenVPN for Android as well. (You need to ensure it's set up correctly for cell traffic to route properly though, default settings do not accomplish a correct route) I'll be checking for DNS leaks and packet tracing some test traffic over the next few days to really see how well the tunnels work. One typical speed test below from the provided test on the website. Overall 8/10. Down: 27.881 Mbit/s Out, 23.576 Mbit/s In (84%), 50MB - Up: 1.891 Mbit/s Out, 1.775 Mbit/s In (93%), 20MB - Date: Sat, 05 Dec 2015 19:47:20 GMT - Buffers: 50MB/20MB - Laps: 3, Time: 360.16 secs --- xxx.xxx.xxx.xxx ping statistics --- 32 packets transmitted, 31 received, 3% packet loss, time 31053ms rtt min/avg/max/mdev = 21.427/23.465/30.945/1.578 ms Client: Phoenix, AZ VPN Server: Alkes -Nick
  14. I've recently noticed that the AirVPN client does not show a score or latency for servers listed in the "Servers" tab. There's no new version of the client on GitHub. Is there an issue that I've overlooked or an issue on my laptop config? Thanks.
  15. Hi, I have a problem with Airvpn + voip. My setup goes as: Android with OpenVPN (in config is selected best latency server and UDP option) > Zoiper android VOIP app which connects to callwithus.com voip service. I choosed airvpn for best speed recommendations. VPN I had before was slower and I could not call with vpn/voip. Voip is configured well (I guess, maybe needed some options for VPN) because if I turn off VPN, voip works just fine. Anyone has experience, suggestions, solutions how to make this setup working? Because for now it just dead silence - connection speed is too low I guess. Thanks, criminaldamage
  16. I have several computers (and game systems) on my LAN. Most are not connected to any AirVPN server. If I connect one of my computers to an Air server in the Netherlands, it does not seem to matter which one, and try to download torrents all of the other devices on my LAN start to experience very bad latency. The ping goes from 50 ms to 500 ms to sites like yahoo and google. If I stop torrenting everything goes back to being fine. I thought possibly I am saturating my connection to my ISP. That is not close to being the case, it is less than 10% of my normal connection speed, and it is really low - 1 Mbs. If instead of connecting to an Air server in the Netherlands I connect to one in Canada I get 4 Mbs and all of my other devices go back to 50 ms ping even though I am downloading faster and connected to the same number of peers. I don't live in Canada or the Netherlands. Connections to the Air servers are on linux machines using UDP (TCP didn't make any difference). The Netherlands is furhter and so I can accept that it is slower and there are dropped packets etc., but how is it affecting latency for devices that are not connected to the VPN?
  17. Hi, Im using Airvpn via my Netgear wndr3700v2 (Gargoyle), and my max speed so far is about 8,5Mbit. I was hoping for a tad more, though thats ok for surfing. So my question is, is there any easy way to find out the lowest latency / best speed, besides creating a configuration file for every single server, copy the server adress and apply it to my router? Thanks for any hint.
  18. I never get any results for latency on servers, all servers just appear as a dash. I'm trying to find which servers runs best for me, however 'recommended server' also places me on a server in a country i dont want (always the same server). I'm just trying to find a US server with good latency. Is there any way to fix this?
×
×
  • Create New...