Eddie System/Environment Report - 12/13/2020 - 1:21 AM UTC Eddie version: 2.19.6 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Enterprise LTSC 2019 OS version: Microsoft Windows NT 10.0.17763.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN driver: 0901: 9.9.2; wintun: 0.8 OpenVPN: 2.5.0 - OpenSSL 1.1.1h 22 Sep 2020, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: () ---------------------------- SSH: plink 0.73 Build platform: 64-bit x86 Windows Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800 Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe) ---------------------------- SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\Administrator\AppData\Local\Eddie\default.profile Data path: C:\Users\Administrator\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (1 args) path="home" Network Lock Active: No Connected to VPN: No Detected DNS: Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 105 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: Fetch url error:Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True network.ipv6.mode: block windows.disable_driver_upgrade: True windows.tap_up: False windows.wintun: True ---------------------------- Logs: . 2020.12.12 20:21:33 - Eddie version: 2.19.6 / windows_x64, System: Windows, Name: Windows 10 Enterprise LTSC 2019, Version: Microsoft Windows NT 10.0.17763.0, Mono/.Net: v4.0.30319 . 2020.12.12 20:21:33 - Command line arguments (1): path="home" . 2020.12.12 20:21:34 - Profile path: C:\Users\Administrator\AppData\Local\Eddie\default.profile . 2020.12.12 20:21:34 - Reading options from C:\Users\Administrator\AppData\Local\Eddie\default.profile . 2020.12.12 20:21:36 - Tun Driver - 0901: 9.9.2; wintun: 0.8 . 2020.12.12 20:21:36 - OpenVPN - Version: 2.5.0 - OpenSSL 1.1.1h 22 Sep 2020, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2020.12.12 20:21:36 - SSH - Version: plink 0.73 . 2020.12.12 20:21:36 - Build platform: 64-bit x86 Windows . 2020.12.12 20:21:36 - Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800 . 2020.12.12 20:21:36 - Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe) . 2020.12.12 20:21:36 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2020.12.12 20:21:36 - Ready . 2020.12.12 20:21:37 - Collect information about AirVPN completed I 2020.12.12 20:21:43 - Session starting. I 2020.12.12 20:21:43 - Checking authorization ... . 2020.12.12 20:21:43 - IPv6 disabled with packet filtering. ! 2020.12.12 20:21:43 - Connecting to Gliese (United States of America, New York City, New York) . 2020.12.12 20:21:44 - OpenVPN > OpenVPN 2.5.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 28 2020 . 2020.12.12 20:21:44 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2020.12.12 20:21:44 - OpenVPN > library versions: OpenSSL 1.1.1h 22 Sep 2020, LZO 2.10 . 2020.12.12 20:21:44 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.12 20:21:44 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.12 20:21:44 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.12.12 20:21:44 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.12.12 20:21:44 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]91.132.0.205:443 . 2020.12.12 20:21:44 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.12.12 20:21:44 - OpenVPN > UDP link local: (not bound) . 2020.12.12 20:21:44 - OpenVPN > UDP link remote: [AF_INET]91.132.0.205:443 . 2020.12.12 20:21:44 - OpenVPN > TLS: Initial packet from [AF_INET]91.132.0.205:443, sid=f4013e85 e71fc1f4 . 2020.12.12 20:21:44 - OpenVPN > VERIFY KU OK . 2020.12.12 20:21:44 - OpenVPN > Validating certificate extended key usage . 2020.12.12 20:21:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.12.12 20:21:44 - OpenVPN > VERIFY EKU OK . 2020.12.12 20:21:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Gliese, emailAddress=info@airvpn.org . 2020.12.12 20:21:44 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2020.12.12 20:21:44 - OpenVPN > [Gliese] Peer Connection Initiated with [AF_INET]91.132.0.205:443 . 2020.12.12 20:21:44 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.154.1,dhcp-option DNS6 fde6:7a:7d20:159a::1,tun-ipv6,route-gateway 10.25.154.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:159a::1022/64 fde6:7a:7d20:159a::1,ifconfig 10.25.154.36 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2020.12.12 20:21:44 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.12.12 20:21:44 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:159a::1' . 2020.12.12 20:21:44 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2020.12.12 20:21:44 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:159a::1022/64 fde6:7a:7d20:159a::1' . 2020.12.12 20:21:44 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.12.12 20:21:44 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.12.12 20:21:44 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.12.12 20:21:44 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.12.12 20:21:44 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.12.12 20:21:44 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.12.12 20:21:44 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.12.12 20:21:44 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.12.12 20:21:44 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.12.12 20:21:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.12 20:21:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.12.12 20:21:44 - OpenVPN > interactive service msg_channel=0 . 2020.12.12 20:21:44 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=7 HWADDR=00:6b:8e:3c:30:de . 2020.12.12 20:21:44 - OpenVPN > open_tun . 2020.12.12 20:21:44 - OpenVPN > wintun device [Local Area Connection] opened . 2020.12.12 20:21:45 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 18 static 10.25.154.36 255.255.255.0 . 2020.12.12 20:21:46 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 18 all E 2020.12.12 20:21:47 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2020.12.12 20:21:52 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 18 all E 2020.12.12 20:21:52 - OpenVPN > ERROR: netsh command failed: returned error code 1 . 2020.12.12 20:21:56 - OpenVPN > NETSH: command failed . 2020.12.12 20:21:56 - OpenVPN > Exiting due to fatal error ! 2020.12.12 20:21:56 - Disconnecting . 2020.12.12 20:21:56 - Connection terminated. . 2020.12.12 20:21:56 - IPv6 restored with packet filtering. . 2020.12.12 20:21:57 - ping 1 . 2020.12.12 20:21:57 - ping 2 W . 2020.12.12 20:21:57 - ping 2 WE ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "interface": "{615915B8-0685-4365-905B-52EC90F3C689}", "gateway": "10.0.0.1", "metric": "25" }, { "address": "10.0.0.0\/24", "interface": "{615915B8-0685-4365-905B-52EC90F3C689}", "gateway": "link", "metric": "281" }, { "address": "10.0.0.90", "interface": "{615915B8-0685-4365-905B-52EC90F3C689}", "gateway": "link", "metric": "281" }, { "address": "10.0.0.255", "interface": "{615915B8-0685-4365-905B-52EC90F3C689}", "gateway": "link", "metric": "281" }, { "address": "127.0.0.0\/8", "interface": "{D071ED2A-DF29-11E9-A2FB-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.0.0.1", "interface": "{D071ED2A-DF29-11E9-A2FB-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.255.255.255", "interface": "{D071ED2A-DF29-11E9-A2FB-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "224.0.0.0\/4", "interface": "{D071ED2A-DF29-11E9-A2FB-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "224.0.0.0\/4", "interface": "{615915B8-0685-4365-905B-52EC90F3C689}", "gateway": "link", "metric": "281" }, { "address": "255.255.255.255", "interface": "{D071ED2A-DF29-11E9-A2FB-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "255.255.255.255", "interface": "{615915B8-0685-4365-905B-52EC90F3C689}", "gateway": "link", "metric": "281" }, { "address": "::1", "interface": "{D071ED2A-DF29-11E9-A2FB-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "ff00::\/8", "interface": "{D071ED2A-DF29-11E9-A2FB-806E6F6E6963}", "gateway": "link", "metric": "331" } ], "interfaces": [ { "friendly": "Local Area Connection", "id": "{547E9A01-A97F-4F4C-B0D0-5E001D058D7F}", "name": "Local Area Connection", "description": "Wintun Userspace Tunnel", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "7038", "support_ipv4": true, "support_ipv6": false, "ips": [ "10.25.154.36" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Ethernet", "id": "{615915B8-0685-4365-905B-52EC90F3C689}", "name": "Ethernet", "description": "Realtek PCIe GbE Family Controller", "type": "Ethernet", "status": "Up", "bytes_received": "641661638", "bytes_sent": "38163422", "support_ipv4": true, "support_ipv6": false, "ips": [ "10.0.0.90" ], "gateways": [ "10.0.0.1" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Ethernet 2", "id": "{FE902F43-5FA9-4531-A43F-419FF1367B78}", "name": "Ethernet 2", "description": "TAP-Windows Adapter V9", "type": "Ethernet", "status": "Down", "bytes_received": "1532", "bytes_sent": "5278", "support_ipv4": true, "support_ipv6": false, "ips": [ "10.29.154.95" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{D071ED2A-DF29-11E9-A2FB-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "gateways": [], "bind": true, "dns4": null, "dns6": null } ], "ipv4-default-gateway": "10.0.0.1", "ipv4-default-interface": "{615915B8-0685-4365-905B-52EC90F3C689}" } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : DESKTOP Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : hsd1.vt.comcast.net Unknown adapter Local Area Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Wintun Userspace Tunnel Physical Address. . . . . . . . . : DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Ethernet adapter Ethernet: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek PCIe GbE Family Controller Physical Address. . . . . . . . . : 00-6B-8E-3C-30-DE DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv4 Address. . . . . . . . . . . : 10.0.0.90(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Saturday, December 12, 2020 8:05:04 PM Lease Expires . . . . . . . . . . : Monday, December 14, 2020 8:05:04 PM Default Gateway . . . . . . . . . : 10.0.0.1 DHCP Server . . . . . . . . . . . : 10.0.0.1 NetBIOS over Tcpip. . . . . . . . : Disabled Ethernet adapter Ethernet 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-FE-90-2F-43 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes