Jump to content
Not connected, Your IP: 216.73.216.21

All Activity

This stream auto-updates     

  1. Past hour
  2. Please provide a system report, as requested. Please take the time to read what people post in order to understand it, not in order to answer them. Your logs don't show the whole truth, and the system report contains those logs, among more info like the actual OS you're using, making those useless explanations like the last part of the quote quite superfluous. Help is not a luxury hotel. You are expected to do your part. Otherwise, why should we bother spending time dragging all that info out of you if you don't bother even following the helpers' requests? @EMULE, in the future please ask explicitly for the system report instead of logs if Eddie is used. Do not encourage everyone to reask for more info. Thanks
  3. Today
  4. Alright I'll paste the log below. If I select "show all" on the servers tab, it will show more servers but the only one with a score is Kornephoros (Toronto, Canada) and the stars are only 1.5/5 for speed and 5/5 for latency. No other servers have a rating. It also misidentifies Windows as 10, even though I am running 11. ==== . 2025.12.11 17:25:53 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.26100.0, Mono/.Net: v4.0.30319 . 2025.12.11 17:25:53 - Command line arguments (1): path="home" . 2025.12.11 17:25:57 - Reading options from C:\Users\\AppData\Local\Eddie\default.profile . 2025.12.11 17:25:59 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2025.12.11 17:25:59 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2025.12.11 17:25:59 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) ! 2025.12.11 17:26:00 - Activation of Network Lock - Windows Filtering Platform I 2025.12.11 17:26:01 - Ready . 2025.12.11 17:26:02 - Collect information about AirVPN completed I 2025.12.11 17:26:02 - Session starting. I 2025.12.11 17:26:03 - Checking authorization ... . 2025.12.11 17:26:04 - Added new network interface "Eddie", Wintun version 0.12 . 2025.12.11 17:26:04 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2025.12.11 17:26:04 - Connecting to Kornephoros (Canada, Toronto, Ontario) . 2025.12.11 17:26:04 - Collect information about AirVPN completed . 2025.12.11 17:26:04 - Routes, add 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2025.12.11 17:26:05 - Routes, add 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2025.12.11 17:26:05 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2025.12.11 17:26:05 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2025.12.11 17:26:05 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2025.12.11 17:26:05 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2025.12.11 17:26:05 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2025.12.11 17:26:05 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2025.12.11 17:26:05 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2025.12.11 17:26:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.157.13:443 . 2025.12.11 17:26:05 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2025.12.11 17:26:05 - OpenVPN > UDP link local: (not bound) . 2025.12.11 17:26:05 - OpenVPN > UDP link remote: [AF_INET]198.44.157.13:443 . 2025.12.11 17:26:05 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.157.13:443, sid=ee7755cd 351e79e1 . 2025.12.11 17:26:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2025.12.11 17:26:05 - OpenVPN > VERIFY KU OK . 2025.12.11 17:26:05 - OpenVPN > Validating certificate extended key usage . 2025.12.11 17:26:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2025.12.11 17:26:05 - OpenVPN > VERIFY EKU OK . 2025.12.11 17:26:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kornephoros, emailAddress=info@airvpn.org . 2025.12.11 17:26:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2025.12.11 17:26:05 - OpenVPN > [Kornephoros] Peer Connection Initiated with [AF_INET]198.44.157.13:443 . 2025.12.11 17:26:05 - OpenVPN > SENT CONTROL [Kornephoros]: 'PUSH_REQUEST' (status=1) . 2025.12.11 17:26:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.10.1,dhcp-option DNS6 fde6:7a:7d20:40a::1,tun-ipv6,route-gateway 10.8.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:40a::1015/64 fde6:7a:7d20:40a::1,ifconfig 10.8.10.23 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2025.12.11 17:26:05 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2025.12.11 17:26:05 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.8.10.1' . 2025.12.11 17:26:05 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:40a::1' . 2025.12.11 17:26:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2025.12.11 17:26:05 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2025.12.11 17:26:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2025.12.11 17:26:05 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2025.12.11 17:26:05 - OpenVPN > OPTIONS IMPORT: peer-id set . 2025.12.11 17:26:05 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2025.12.11 17:26:05 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2025.12.11 17:26:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2025.12.11 17:26:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.11 17:26:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.11 17:26:06 - OpenVPN > interactive service msg_channel=0 . 2025.12.11 17:26:06 - OpenVPN > open_tun . 2025.12.11 17:26:06 - OpenVPN > wintun device [Eddie] opened . 2025.12.11 17:26:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 40 static 10.8.10.23 255.255.255.0 . 2025.12.11 17:26:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 40 all . 2025.12.11 17:26:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 40 all . 2025.12.11 17:26:06 - OpenVPN > IPv4 MTU set to 1500 on interface 40 using SetIpInterfaceEntry() . 2025.12.11 17:26:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 40 fde6:7a:7d20:40a::1015/128 store=active . 2025.12.11 17:26:06 - OpenVPN > add_route_ipv6(fde6:7a:7d20:40a::/64 -> fde6:7a:7d20:40a::1015 metric 0) dev Eddie . 2025.12.11 17:26:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:40a::/64 40 fe80::8 store=active . 2025.12.11 17:26:06 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2025.12.11 17:26:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 40 all . 2025.12.11 17:26:06 - OpenVPN > IPv6 MTU set to 1500 on interface 40 using SetIpInterfaceEntry() . 2025.12.11 17:26:06 - OpenVPN > Initialization Sequence Completed . 2025.12.11 17:26:06 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2025.12.11 17:26:06 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2025.12.11 17:26:06 - DNS leak protection with packet filtering enabled. . 2025.12.11 17:26:06 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.8.10.1) . 2025.12.11 17:26:06 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:40a::1) . 2025.12.11 17:26:07 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.11 17:26:07 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.11 17:26:07 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.11 17:26:08 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.11 17:26:08 - Routes, add 198.44.157.34/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.11 17:26:08 - Routes, add 2607:9000:600:25:de12:e234:977:e491/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.11 17:26:08 - Flushing DNS I 2025.12.11 17:26:08 - Checking route IPv4 I 2025.12.11 17:26:10 - Checking route IPv6 I 2025.12.11 17:26:10 - Checking DNS ! 2025.12.11 17:26:10 - Connected. . 2025.12.11 17:31:18 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #351638 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2025.12.11 17:31:18 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #351640 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2025.12.11 17:31:26 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #422727 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2025.12.11 17:56:06 - Collect information about AirVPN completed . 2025.12.11 18:23:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2025.12.11 18:23:20 - OpenVPN > VERIFY KU OK . 2025.12.11 18:23:20 - OpenVPN > Validating certificate extended key usage . 2025.12.11 18:23:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2025.12.11 18:23:20 - OpenVPN > VERIFY EKU OK . 2025.12.11 18:23:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kornephoros, emailAddress=info@airvpn.org . 2025.12.11 18:23:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.11 18:23:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.11 18:23:20 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2025.12.11 18:26:06 - Collect information about AirVPN completed . 2025.12.12 00:10:24 - Cannot retrieve information about AirVPN: Fetch url error:Couldn't connect to server . 2025.12.12 00:10:28 - OpenVPN > [Kornephoros] Inactivity timeout (--ping-restart), restarting . 2025.12.12 00:10:28 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2025.12.12 00:10:28 - OpenVPN > Restart pause, 5 second(s) ! 2025.12.12 00:10:28 - Disconnecting . 2025.12.12 00:10:28 - Sending soft termination signal . 2025.12.12 00:10:33 - OpenVPN > Closing TUN/TAP interface . 2025.12.12 00:10:33 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:40a::/64) . 2025.12.12 00:10:33 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:40a::/64 40 fe80::8 store=active . 2025.12.12 00:10:33 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 40 fde6:7a:7d20:40a::1015 store=active . 2025.12.12 00:10:33 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 40 10.8.10.23 store=active . 2025.12.12 00:10:34 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2025.12.12 00:10:34 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:34 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:35 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:35 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:35 - Routes, delete 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2025.12.12 00:10:36 - Routes, delete 198.44.157.34/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:36 - Routes, delete 2607:9000:600:25:de12:e234:977:e491/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:36 - Routes, delete 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2025.12.12 00:10:36 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2025.12.12 00:10:36 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2025.12.12 00:10:36 - DNS leak protection with packet filtering disabled. . 2025.12.12 00:10:36 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2025.12.12 00:10:36 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2025.12.12 00:10:36 - Connection terminated. . 2025.12.12 00:10:39 - Waiting for latency tests (1 to go) I 2025.12.12 00:10:40 - Checking authorization ... . 2025.12.12 00:10:41 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2025.12.12 00:10:41 - Connecting to Kornephoros (Canada, Toronto, Ontario) . 2025.12.12 00:10:41 - Routes, add 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2025.12.12 00:10:41 - Routes, add 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2025.12.12 00:10:41 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2025.12.12 00:10:41 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2025.12.12 00:10:41 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2025.12.12 00:10:41 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2025.12.12 00:10:41 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2025.12.12 00:10:41 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2025.12.12 00:10:41 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2025.12.12 00:10:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.157.13:443 . 2025.12.12 00:10:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2025.12.12 00:10:41 - OpenVPN > UDP link local: (not bound) . 2025.12.12 00:10:41 - OpenVPN > UDP link remote: [AF_INET]198.44.157.13:443 . 2025.12.12 00:10:41 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.157.13:443, sid=63022879 70efa267 . 2025.12.12 00:10:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2025.12.12 00:10:41 - OpenVPN > VERIFY KU OK . 2025.12.12 00:10:41 - OpenVPN > Validating certificate extended key usage . 2025.12.12 00:10:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2025.12.12 00:10:41 - OpenVPN > VERIFY EKU OK . 2025.12.12 00:10:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kornephoros, emailAddress=info@airvpn.org . 2025.12.12 00:10:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2025.12.12 00:10:41 - OpenVPN > [Kornephoros] Peer Connection Initiated with [AF_INET]198.44.157.13:443 . 2025.12.12 00:10:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.10.1,dhcp-option DNS6 fde6:7a:7d20:40a::1,tun-ipv6,route-gateway 10.8.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:40a::1015/64 fde6:7a:7d20:40a::1,ifconfig 10.8.10.23 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2025.12.12 00:10:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2025.12.12 00:10:42 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.8.10.1' . 2025.12.12 00:10:42 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:40a::1' . 2025.12.12 00:10:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2025.12.12 00:10:42 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2025.12.12 00:10:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2025.12.12 00:10:42 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2025.12.12 00:10:42 - OpenVPN > OPTIONS IMPORT: peer-id set . 2025.12.12 00:10:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2025.12.12 00:10:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2025.12.12 00:10:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2025.12.12 00:10:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.12 00:10:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.12 00:10:42 - OpenVPN > interactive service msg_channel=0 . 2025.12.12 00:10:42 - OpenVPN > open_tun . 2025.12.12 00:10:42 - OpenVPN > wintun device [Eddie] opened . 2025.12.12 00:10:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 40 static 10.8.10.23 255.255.255.0 . 2025.12.12 00:10:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 40 all . 2025.12.12 00:10:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 40 all . 2025.12.12 00:10:42 - OpenVPN > IPv4 MTU set to 1500 on interface 40 using SetIpInterfaceEntry() . 2025.12.12 00:10:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 40 fde6:7a:7d20:40a::1015/128 store=active . 2025.12.12 00:10:42 - OpenVPN > add_route_ipv6(fde6:7a:7d20:40a::/64 -> fde6:7a:7d20:40a::1015 metric 0) dev Eddie . 2025.12.12 00:10:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:40a::/64 40 fe80::8 store=active . 2025.12.12 00:10:42 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2025.12.12 00:10:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 40 all . 2025.12.12 00:10:42 - OpenVPN > IPv6 MTU set to 1500 on interface 40 using SetIpInterfaceEntry() . 2025.12.12 00:10:42 - OpenVPN > Initialization Sequence Completed . 2025.12.12 00:10:42 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2025.12.12 00:10:42 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2025.12.12 00:10:42 - DNS leak protection with packet filtering enabled. . 2025.12.12 00:10:43 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.8.10.1) . 2025.12.12 00:10:43 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:40a::1) . 2025.12.12 00:10:43 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:43 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:44 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:44 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:44 - Routes, add 198.44.157.34/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:44 - Routes, add 2607:9000:600:25:de12:e234:977:e491/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:44 - Flushing DNS I 2025.12.12 00:10:44 - Checking route IPv4 I 2025.12.12 00:10:46 - Checking route IPv6 I 2025.12.12 00:10:46 - Checking DNS ! 2025.12.12 00:10:47 - Connected. . 2025.12.12 00:12:06 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #77075 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2025.12.12 00:12:06 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #77076 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2025.12.12 00:12:06 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #77077 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2025.12.12 00:40:25 - Above log line repeated 1495 times more . 2025.12.12 00:40:25 - Collect information about AirVPN completed . 2025.12.12 11:39:18 - OpenVPN > [Kornephoros] Inactivity timeout (--ping-restart), restarting . 2025.12.12 11:39:18 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2025.12.12 11:39:18 - OpenVPN > Restart pause, 5 second(s) ! 2025.12.12 11:39:18 - Disconnecting . 2025.12.12 11:39:18 - Sending soft termination signal . 2025.12.12 11:39:19 - Cannot retrieve information about AirVPN: Fetch url error:Couldn't connect to server . 2025.12.12 11:39:23 - OpenVPN > Closing TUN/TAP interface . 2025.12.12 11:39:23 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:40a::/64) . 2025.12.12 11:39:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:40a::/64 40 fe80::8 store=active . 2025.12.12 11:39:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 40 fde6:7a:7d20:40a::1015 store=active . 2025.12.12 11:39:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 40 10.8.10.23 store=active . 2025.12.12 11:39:23 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2025.12.12 11:39:23 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:24 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:25 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:25 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:25 - Routes, delete 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2025.12.12 11:39:26 - Routes, delete 198.44.157.34/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:26 - Routes, delete 2607:9000:600:25:de12:e234:977:e491/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:26 - Routes, delete 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2025.12.12 11:39:26 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2025.12.12 11:39:26 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2025.12.12 11:39:26 - DNS leak protection with packet filtering disabled. . 2025.12.12 11:39:26 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2025.12.12 11:39:26 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2025.12.12 11:39:26 - Connection terminated. . 2025.12.12 11:39:29 - Waiting for latency tests (1 to go) I 2025.12.12 11:39:30 - Checking authorization ... . 2025.12.12 11:39:31 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2025.12.12 11:39:31 - Connecting to Kornephoros (Canada, Toronto, Ontario) . 2025.12.12 11:39:31 - Routes, add 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2025.12.12 11:39:31 - Routes, add 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2025.12.12 11:39:31 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2025.12.12 11:39:31 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2025.12.12 11:39:31 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2025.12.12 11:39:31 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2025.12.12 11:39:31 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2025.12.12 11:39:31 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2025.12.12 11:39:31 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2025.12.12 11:39:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.157.13:443 . 2025.12.12 11:39:31 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2025.12.12 11:39:31 - OpenVPN > UDP link local: (not bound) . 2025.12.12 11:39:31 - OpenVPN > UDP link remote: [AF_INET]198.44.157.13:443 . 2025.12.12 11:39:34 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.157.13:443, sid=5c95250c 00a985de . 2025.12.12 11:39:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2025.12.12 11:39:34 - OpenVPN > VERIFY KU OK . 2025.12.12 11:39:34 - OpenVPN > Validating certificate extended key usage . 2025.12.12 11:39:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2025.12.12 11:39:34 - OpenVPN > VERIFY EKU OK . 2025.12.12 11:39:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kornephoros, emailAddress=info@airvpn.org . 2025.12.12 11:39:34 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2025.12.12 11:39:34 - OpenVPN > [Kornephoros] Peer Connection Initiated with [AF_INET]198.44.157.13:443 . 2025.12.12 11:39:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.10.1,dhcp-option DNS6 fde6:7a:7d20:40a::1,tun-ipv6,route-gateway 10.8.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:40a::1015/64 fde6:7a:7d20:40a::1,ifconfig 10.8.10.23 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2025.12.12 11:39:34 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2025.12.12 11:39:34 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.8.10.1' . 2025.12.12 11:39:34 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:40a::1' . 2025.12.12 11:39:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2025.12.12 11:39:34 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2025.12.12 11:39:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2025.12.12 11:39:34 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2025.12.12 11:39:34 - OpenVPN > OPTIONS IMPORT: peer-id set . 2025.12.12 11:39:34 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2025.12.12 11:39:34 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2025.12.12 11:39:34 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2025.12.12 11:39:34 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.12 11:39:34 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.12 11:39:34 - OpenVPN > interactive service msg_channel=0 . 2025.12.12 11:39:34 - OpenVPN > open_tun . 2025.12.12 11:39:34 - OpenVPN > wintun device [Eddie] opened . 2025.12.12 11:39:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 40 static 10.8.10.23 255.255.255.0 . 2025.12.12 11:39:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 40 all . 2025.12.12 11:39:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 40 all . 2025.12.12 11:39:34 - OpenVPN > IPv4 MTU set to 1500 on interface 40 using SetIpInterfaceEntry() . 2025.12.12 11:39:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 40 fde6:7a:7d20:40a::1015/128 store=active . 2025.12.12 11:39:35 - OpenVPN > add_route_ipv6(fde6:7a:7d20:40a::/64 -> fde6:7a:7d20:40a::1015 metric 0) dev Eddie . 2025.12.12 11:39:35 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:40a::/64 40 fe80::8 store=active . 2025.12.12 11:39:35 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2025.12.12 11:39:35 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 40 all . 2025.12.12 11:39:35 - OpenVPN > IPv6 MTU set to 1500 on interface 40 using SetIpInterfaceEntry() . 2025.12.12 11:39:35 - OpenVPN > Initialization Sequence Completed . 2025.12.12 11:39:35 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2025.12.12 11:39:35 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2025.12.12 11:39:35 - DNS leak protection with packet filtering enabled. . 2025.12.12 11:39:35 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.8.10.1) . 2025.12.12 11:39:35 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:40a::1) . 2025.12.12 11:39:35 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:36 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:36 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:36 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:36 - Routes, add 198.44.157.34/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:37 - Routes, add 2607:9000:600:25:de12:e234:977:e491/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:37 - Flushing DNS I 2025.12.12 11:39:37 - Checking route IPv4 I 2025.12.12 11:39:38 - Checking route IPv6 I 2025.12.12 11:39:39 - Checking DNS ! 2025.12.12 11:39:39 - Connected. . 2025.12.12 12:09:21 - Collect information about AirVPN completed . 2025.12.12 12:37:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2025.12.12 12:37:02 - OpenVPN > VERIFY KU OK . 2025.12.12 12:37:02 - OpenVPN > Validating certificate extended key usage . 2025.12.12 12:37:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2025.12.12 12:37:02 - OpenVPN > VERIFY EKU OK . 2025.12.12 12:37:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kornephoros, emailAddress=info@airvpn.org . 2025.12.12 12:37:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.12 12:37:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.12 12:37:02 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2025.12.12 12:39:29 - Collect information about AirVPN completed
  5. Hi, Probably already suggested in the past (couldn't find anything upon searching) but here we go: Will it be possible that Air provides a DNS only service? It can be beneficial to those who cannot/don't want to host their own instance of adguard/pihole. I am aware of services such as NextDNS, but I would definitely prefer and trust an AirVPN take on this. I was thinking about it since Air already supplies DNS blocklists if it can be an option in the future. Wouldn't mind if it consumed 1/5 from the available slots. Cheers
  6. Is 192.168.254.254 your router's IP address? Is your computer's IP address set to 192.168.254.104? However, the log shows that your computer's IP is 192.168.254.254, which means that your computer's IP is indeed not being routed correctly. Does your router have an IP-MAC binding function in its DHCP settings? If so, it is recommended that you use DHCP to bind the devices you want to use to the local IP address via MAC identifier. If not, you can try assigning the router address to 192.168.254.1, and then assigning other devices to addresses after that (192.168.254.2~192.168.254.254).
  7. I use quite some hardware, so its better to asign static IPs, or otherwise connecting multiple NAS can gets troublesome ... When upgrading my old Mac with the new I just changed all IPs in my network from 192.168.0.xxx to now 192.168.254.xxx Router: 192.168.254.254 Subnet Mask: 255.255.255.0 en0 Mac: 192.168.254.104 (static) Subnet Mask: 255.255.255.0 All my computers and NAS work with that like before. The only difference is Eddie wich isnt showing transfer speed anymore.
  8. This is caused by an incorrect local network IP address. I see from the logs that your computer's local IP address is 192.168.254.254. I would like to ask what the IP address of your router's LAN port is? Home network IP addresses are usually automatically assigned by the router (DHCP). Why would you need to manually assign one? If you absolutely must use a static local IP address, please ensure that the IP is correctly routed. For example, if your router's LAN port IP is 192.168.3.1, then all devices connected to this router must have IP addresses within the corresponding address pool (192.168.3.2~192.168.3.254). Has your computer's IP been correctly routed? Please check carefully.
  9. Yes, if you need help from the community, try to provide logs or screenshots of program malfunctions. Text descriptions alone make it difficult to pinpoint the problem. However, there's another reason: I simply didn't see it. Haha, there are plenty of posts on the community forum after all. 😄😄😄
  10. Have you added a specific server to the allowed list in the server list? You can check the "Show All" box at the bottom of the Eddie server interface to see all servers.
  11. Yesterday
  12. One probable reason no one answers you is because you gave too little information, and people don't bother spending time to ask you for it. Close Eddie and reopen, try a connection, then provide a system report: .
  13. Can I get a little help? Why is Komephoros in Canada the only server? Is this normal??
  14. Really? It's good news to know that it's not a server issue.😂 It seems the only option left is to try AmneziaWG 1.5. 😡Damn the GFW! The latest GFW has incorporated AI, greatly enhancing its ability to block VPN protocols. Fortunately, China is vigorously promoting IPv6, which allows me to catch my breath for now. The future depends on full support from the AmneziaWG protocol.🙌
  15. OK - the default configuration does not work, but modified one works. Looks like DPI is not always on in Uzbekistan, but as of 12/11/2025 3:10pm its on. AmneziaVPN with the following params in [Interface] section works Jc = 20 Jmin = 50 Jmax = 1000 S1 = 0 S2 = 0 H1 = 3 H2 = 1 H3 = 4 H4 = 2 and it does not work without them. I guess AirVPN team needs to make it available for EddieUI. And grant me a few month of free access for the testing Alex
  16. Hello! Understood. This is typical with dynamic blocking by GFW and other blocking tools. Remember that GFW (and other blocking tools) behavior is not deterministic, as clearly disclosed and proved at the USENIX Security Symposium 2025. We have already put in place methods capable to defeat the GFW in most circumstances (probably 85% success rate), as you have noticed, and when you are blocked by some heuristic decision of the GFW you necessarily need some trial and error. We are working to increase the success rate even more, stay tuned in the near future. No, this is not the case. OpenVPN eats resources but not in a critical way, and it will require less and less resources while more and more clients switch to WireGuard or AmneziaWG. According to your description, to the lack of any warning by our monitoring system, and the fact the we have no similar complaints from Western countries, we feel comfortable to say that this is not a server side problem. Kind regards
  17. This is a problem. Because it's dynamic. For example, today I can connect to all ports on server A, but only to a specific port on server B. Tomorrow, I might only be able to connect to the specific port on server A, while all ports on server B will be available. All servers behave this way; there's no guarantee that one will always be available and another will always be unavailable. Server hardware and software are fixed, and my network environment is also fixed. Only the server load is dynamic, which is why I suspect it's a problem of Wireguard resources being exhausted on the server. Perhaps OpenVPN is consuming too many resources. I think we can verify this on the two servers testing DCO by increasing the priority of WireGuard and seeing if all WireGuard ports are available.
  18. Hello! It could. Feel free to try it. Let us double check in order to ascertain that the problem is not on the server side: can you please send us the names of the servers you experience this problem on? Kind regards
  19. I'm also confused. Perhaps the hardware isn't powerful enough? A 1Gbps server can handle 100+ users with 80% bandwidth utilization. This means a 10Gbps server would need 1000+ users to achieve the same 80% bandwidth utilization. However, in reality, a 10Gbps server experiences a significant speed drop when handling 300+ users, seemingly unable to keep up. It would be better to label it as a 3Gbps or 5Gbps server, as the actual speed difference from the advertised 10Gbps is substantial. If that's the case, it would be better to replace one 10Gbps server with ten 1Gbps servers. Maybe that's the case? I think AirVPN may have leased a 10Gbps network in the data center, but the servers can't handle that 10Gbps network. Isn't that a waste of resources? I think AirVPN can increase the number of 1Gbps servers as much as possible to make full use of network bandwidth, which would also save on server costs for AirVPN, wouldn't it?
  20. Really? So how can this be resolved? Change the connection protocol? But it's still the same when I use AmneziaWG 1.0. Can QUIC simulation in AmneziaWG 1.5 solve this problem? My ISP did not block the corresponding UDP ports. Some servers have all ports unavailable via Wireguard, some can only use one specific port, and some can connect to all three ports. What a perplexing question! Wireguard is not as available on all servers as OpenVPN, which causes some trouble for users who use Wireguard to connect. Did WireGuard require strict network conditions from the outset? I always feel that WireGuard's compatibility is not as good as OpenVPN's. Is it that network compatibility is sacrificed for high performance? In any case, allocating more resources to Wireguard is reasonable, as Wireguard's high performance will be appreciated by more people. Of course, OpenVPN is also indispensable, as there will always be some people who need to bypass strict network restrictions. Is DCO an effective solution for optimizing both? I'm really looking forward to it. So, what stage is DCO testing at? Is DCO 2.6.14 still unstable? OpenVPN 2.7 series has already removed support for WinTun, so I believe the OpenVPN team is full of confidence in DCO for the 2.7 series. I'm really looking forward to seeing the DCO effect in the official 2.7 series.
  21. Last week
  22. Are you sure you don't have an option somewhere in the gateway settings to prevent opnsense making static routes for monitor IP? I have that in pfsense. I usually trace the route through the VPN interface to anything (e.g. 9.9.9.9) and then use the first or second hop as the monitor address for that gateway. In past experience I've had times where gateway monitoring said everything was fine but reaching the internet wasn't happening. That's why I've taken to pinging something on the other side of the VPN gateway.
  23. I've seen this happen on Vindemiatrix, and I think it happened on Taiyangshou today as well (maximum is 4.8 Gb/s but that is average so likely it did surpass 5 Gb/s). I still wonder why overall bandwidth utilization of 10 Gbps servers are low (<50%), is this just due to scaling?
  24. Hello! This is a problem caused by blocks though, not a server problem. Kind regards
  25. Hello! With WireGuard it's a very good choice as the DNS server IP address (10.128.0.1) is also the VPN gateway address, on every and each server since the WireGuard network is one. With OpenVPN, you have different subnet on every server though and you can't rely on a fixed address. 10.4.0.1 is available on every server for DNS queries but does not respond to ping. You could consider to extract the gateway from the tun interface settings at each connection and ping that gateway. Kind regards
  26. That’s a really solid breakdown, and it honestly explains why people get tripped up with TikTok mods and similar apps. Back in the XDA and GitHub days, trust came from the community, not from some shiny website repeating “safe” fifteen times. What you said about real modders avoiding those polished download pages is spot on. I was chatting with someone at SEO Discovery about this kind of thing recently, and they mentioned how those overly SEO-optimized sites tend to target people who don’t know the difference between a genuine project and a sketchy clone. Your experience pretty much lines up with that.
  27. Hello! Nothing wrong, it's possible that the third party service is malfunctioning. Are you able to reach your listening service from the Internet? Kind regards
  28. Hello! This is potentially the problem, We can't be sure because for some unfathomable reason you deleted once again the endpoint address and the port. Or did you literally enter "#ip" and "#port"? By the way, when VPN_SERVICE_PROVIDER environment variable is set to an integrated VPN such as AirVPN (as it is in your case) you can rely on more proper variables that will prevent you from entering wrong addresses and/or ports. Please set the proper environment variables, delete the quoted ones (quoted here above), and check whether the problem gets resolved. Please see here again: https://github.com/qdm12/gluetun-wiki/blob/main/setup/providers/airvpn.md Kind regards
  1. Load more activity
×
×
  • Create New...