All Activity
This stream auto-updates
- Past hour
-
-
- Today
-
-
-
-
-
-
-
-
- Yesterday
-
-
Hi, I have a web server hosted in my home network, and I am trying to access it remotely via my public IP address. However, when I am connected to AirVPN, I am unable to access the server from outside my network. I have confirmed that the server is properly set up with port forwarding (ports 80 and 443) on my router, and it is accessible when I disconnect from the VPN. Here are the details of my setup: I have mapped Port 8346 on AirVPN’s website to Port 8346 (one of the 5 available ports). In my ASUS router, I then map Port 8346 to Port 443 (the internal port used by my web server for HTTPS). The web server is hosted in my local network (on a static IP address). The issue occurs when I am connected to AirVPN and try to access the web server via my public IP address. I have already tested that the web server is accessible when I am not connected to AirVPN, confirming that the port forwarding is properly set up on my router. Could you please assist me in diagnosing the issue? Specifically, I would like to know: Does AirVPN affect local port forwarding or local network traffic when connected? Are there any settings or configurations I should be aware of to ensure that traffic to my web server is properly routed while connected to AirVPN? Is there any way to configure the VPN connection or AirVPN to allow access to my internal web server while connected to the VPN? I appreciate your help in resolving this issue and look forward to your advice. Thank you
-
it seems to return those using "terminal - super user mode" And in one of the tests, I had to manually disable NetLock because it would lock up the app and prevent me from connecting, as shown at 0:17. Keeping NetLock enabled in this situation prevents the software from connecting. So I ran two tests: one with it on and one without it. This is evident in both the one log and the video. It does not allow me to connect, therefore I ran the second test without it.
-
Can't connect to myself through forwarded port
Staff replied to tduiwz's topic in Troubleshooting and Problems
Hello! This is expected. It is also unavoidable: consider that inside the VPN server packets originated by your node when it is a source pass through public entry-IP address -> virtual network -> exit-IP address -> final destination. When your node is a destination from external source, packets reaching the exit-IP address are forwarded to the virtual network, encrypted and sent to your VPN IP address So, if your VPN IP address is both source and destination and the packet should simultaneously get out of and enter the exit-IP address etc., what happens? You create a network loop because there's no self-routing logic for your packet between entry -> VPN -> exit -> exit again -> VPN and finally entry addresses, and the packet is lost. The VPN is not designed as a loopback device, so to speak. Use your system loopback interface to have the system communicate with itself as a simultaneous source and destination. This is a different issue and this behavior is explicitly blocked in the infrastructure for security reasons. It is a valuable VPN feature (allowing sharing resources, sharing the same network) in virtual networks where all the nodes are known and trusted, but it is dangerous in a public VPN service or in general where nodes can not be trusted by each other. The only shared resource in the VPN is the DNS server. No node can reach another node inside the VPN itself. Kind regards -
-
Can't connect to myself through forwarded port
tduiwz posted a topic in Troubleshooting and Problems
On Windows PC running Eddie/WireGuard, I can connect to the forwarded port from any computer except the PC running the VPN software. This is rather inconvenient since I can't easily test the connections from the same computer, or have two services on the same computer communicate with each other over the VPN tunnel (e.g. two torrent clients, both with forwarded ports) I tried a variety of tools to test, but for example, in one terminal on the PC $ netcat -l -p [FORWARDED PORT] then in another terminal: $ netcat [VPN exit IP] [FORWARDED PORT] the TCP connection fails. but if I run the exact same command to connect to the server from any other computer, the connection is successful - Last week
-
[OpenSuse - Tumbleweed] DNS Leaking
Tech Jedi Alex replied to lilzayn's topic in Eddie - AirVPN Client
Is this comedy? You requested help, I requested more info, and now you request to be given more info on why you should click the link to learn how to give more info. Huh?? Click the damn link and learn how to give more info and why you were asked. 🙄 So, in the original post you write that NetLock doesn't work, but the system report as well as all the logs you provided paint a different picture: netlock.connection: False --- Network Lock Active: No There is nothing indicating that it's acually engaged. No, those mini-tests are, funnily enough, also in the system report: OS support IPv4: Yes OS support IPv6: Yes Detected DNS: 10.128.0.1,fd7d:76ee:e68f:a993::1 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 102 ms Test Ping IPv6: 101 ms Test HTTP IPv4: Error: Fetch url error:Could not connect to server Test HTTP IPv6: Error: Fetch url error:Could not connect to server Test HTTPS: Ok You don't need to do anything yourself. I'm a bit confused that a very important UI message in 0:17 is nowhere to be seen in the logs.. but that's not on you. It says There is no available or enabled Network Lock mode, sorry, indicating that neither of these tools could be found on your system: iptables-legacy iptables-nft nft Could you please check whether any of those is callable from a (privileged) shell? If not, I think simply installing nft (or nftables) with your package manager may fix everything for you, even the DNS leak. -
-
-
-
Major performance issue (Hard Cap at sub-1MB/s) Hardware: Synology NAS [DS918+] OS: DSM 7.x Container: Gluetun (image: qmcgaw/gluetun) Hi everyone, I am experiencing extremely slow speeds with AirVPN (Wireguard) configured via Gluetun on my Synology NAS. Despite having a high-speed fiber connection, my downloads inside the container are currently capped at approximately 500 KB/s. Interestingly, when I first tested Wireguard with a MTU of 1280, the speed briefly hit 30 MB/s, but it has since dropped and won't go back up. Furthermore, when switching the provider to Private Internet Access (PIA) using OpenVPN, I easily reach 15 MB/s, which suggests the NAS hardware is capable of more. Here is my current Docker Compose environment configuration for AirVPN: environment: VPN_SERVICE_PROVIDER=airvpn VPN_TYPE=wireguard FIREWALL_VPN_INPUT_PORTS=3xxxx WIREGUARD_PRIVATE_KEY=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx WIREGUARD_PRESHARED_KEY=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx WIREGUARD_ADDRESSES=10.xx.xx.xx/32 WIREGUARD_MTU=1280 SERVER_COUNTRIES=Belgium VPN_IPV6=off Technical observations: Speed Test: Tested via "sudo docker exec -it gluetun-wireguard wget -O /dev/null https://proof.ovh.net/files/100Mb.dat". Result is consistently stuck at ~500KB/s now. MTU: I have tried 1420, 1320, and 1280. Only 1280 showed a brief spike to 30 MB/s before crashing down to current speeds. CPU Usage: NAS CPU remains very low during tests (< 15%). Connectivity: The tunnel establishes perfectly and I am assigned the correct AirVPN IP. Comparison: PIA (OpenVPN) reaches 15 MB/s on the same machine/network. ISP/Hardware: Outside of the VPN container, the NAS reaches full fiber speeds (900+ Mbps). It feels like there is an invisible hard cap or a massive packet fragmentation/dropping issue specific to the AirVPN/Wireguard setup on this device. My questions: Why would the speed peak at 30 MB/s once and then stay throttled at 500 KB/s? Is my syntax for WIREGUARD_ADDRESSES and FIREWALL_VPN_INPUT_PORTS correct for the Gluetun/AirVPN implementation? Are there any known Docker-on-DSM limitations that specifically throttle Wireguard UDP traffic over time? Any insights or troubleshooting tips would be greatly appreciated. Thx !
-
Thank you for the transparency. You should have specified 'why' it wasn't enough to begin with. sorry. I feel at least like a line that says in all bold "Saving the log will not have the same effect as uploading it bc it doesn't have all that extra data" should be added to that, to help avoid idiots like me lmao. Here is the full report, not going to censor anything bc a. it isn't where i live b. and this isn't my name lol Eddie System/Environment Report - 3/15/2026 - 10:49 AM UTC Eddie version: 2.24.6 Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: openSUSE Tumbleweed OS version: 20260304 OS architecture: x64 Framework: 6.8.0.96 (tarball Wed Jan 15 10:20:48 UTC 2020); Framework: v4.0.30319 OpenVPN: 2.6.14 - OpenSSL 3.5.3 16 Sep 2025, LZO 2.10 (/sbin/openvpn) Hummingbird: Not available WireGuard: Not available SSH: OpenSSH_10.2p1, OpenSSL 3.5.3 16 Sep 2025 (/usr/bin/ssh) SSL: Not available Profile path: /home/zayn/.config/eddie/default.profile Data path: /home/zayn/.config/eddie Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/eddie-ui Command line arguments: (1 args) path.resources="/usr/share/eddie-ui" Network Lock Active: No Connected to VPN: Yes, Merga OS support IPv4: Yes OS support IPv6: Yes Detected DNS: 10.128.0.1,fd7d:76ee:e68f:a993::1 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 102 ms Test Ping IPv6: 101 ms Test HTTP IPv4: Error: Fetch url error:Could not connect to server Test HTTP IPv6: Error: Fetch url error:Could not connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True key: (omissis) areas.allowlist: ca,nl,cz areas.denylist: de,us,at,gb,tw proxy.mode: none netlock.connection: False netlock.allow_private: False netlock.allow_ping: False ---------------------------- Logs: . 2026.03.15 11:39:46 - Eddie version: 2.24.6 / linux_x64, System: Linux, Name: openSUSE Tumbleweed, Version: 20260304, Framework: 6.8.0.96 (tarball Wed Jan 15 10:20:48 UTC 2020); Framework: v4.0.30319 . 2026.03.15 11:39:46 - Command line arguments (1): path.resources="/usr/share/eddie-ui" . 2026.03.15 11:39:46 - Raise system privileges . 2026.03.15 11:39:48 - Collect network information . 2026.03.15 11:39:48 - Reading options from /home/zayn/.config/eddie/default.profile . 2026.03.15 11:39:48 - OpenVPN - Version: 2.6.14 - OpenSSL 3.5.3 16 Sep 2025, LZO 2.10 (/sbin/openvpn) . 2026.03.15 11:39:48 - SSH - Version: OpenSSH_10.2p1, OpenSSL 3.5.3 16 Sep 2025 (/usr/bin/ssh) I 2026.03.15 11:39:48 - SSL - Not available I 2026.03.15 11:39:52 - Ready . 2026.03.15 11:39:53 - Collect information about AirVPN completed I 2026.03.15 11:39:56 - Session starting. I 2026.03.15 11:39:56 - Checking authorization ... ! 2026.03.15 11:39:56 - Connecting to Horologium (Netherlands, Alblasserdam) . 2026.03.15 11:39:57 - Routes, add 213.152.162.7/32 for interface "wlp3s0". . 2026.03.15 11:39:57 - WireGuard > Setup start . 2026.03.15 11:39:57 - WireGuard > Setup complete . 2026.03.15 11:39:57 - WireGuard > Setup interface . 2026.03.15 11:40:03 - WireGuard > Received first handshake . 2026.03.15 11:40:03 - DNS of the system switched to VPN DNS - via /etc/resolv.conf) . 2026.03.15 11:40:03 - Routes, add 0.0.0.0/1 for interface "Eddie". . 2026.03.15 11:40:03 - Routes, add 128.0.0.0/1 for interface "Eddie". . 2026.03.15 11:40:03 - Routes, add ::/1 for interface "Eddie". . 2026.03.15 11:40:03 - Routes, add 8000::/1 for interface "Eddie". . 2026.03.15 11:40:03 - Routes, add 213.152.162.5/32 for interface "Eddie". . 2026.03.15 11:40:03 - Routes, add 2a00:1678:2470:53:a5c9:c41a:4260:66f9/128 for interface "Eddie". . 2026.03.15 11:40:03 - Flushing DNS I 2026.03.15 11:40:03 - Checking route IPv4 I 2026.03.15 11:40:04 - Checking route IPv6 I 2026.03.15 11:40:05 - Checking DNS . 2026.03.15 11:40:11 - Collect network information ! 2026.03.15 11:40:11 - Connected. ! 2026.03.15 11:40:50 - Disconnecting . 2026.03.15 11:40:51 - WireGuard > Stop request received . 2026.03.15 11:40:51 - WireGuard > Stopping . 2026.03.15 11:40:51 - WireGuard > Completed . 2026.03.15 11:40:51 - Routes, delete 0.0.0.0/1 for interface "Eddie", not exists. . 2026.03.15 11:40:51 - Routes, delete 128.0.0.0/1 for interface "Eddie", not exists. . 2026.03.15 11:40:51 - Routes, delete ::/1 for interface "Eddie", not exists. . 2026.03.15 11:40:51 - Routes, delete 8000::/1 for interface "Eddie", not exists. . 2026.03.15 11:40:51 - Routes, delete 213.152.162.7/32 for interface "wlp3s0". . 2026.03.15 11:40:51 - Routes, delete 213.152.162.5/32 for interface "Eddie", not exists. . 2026.03.15 11:40:51 - Routes, delete 2a00:1678:2470:53:a5c9:c41a:4260:66f9/128 for interface "Eddie", not exists. . 2026.03.15 11:40:51 - DNS of the system restored - via /etc/resolv.conf) . 2026.03.15 11:40:51 - Collect network information . 2026.03.15 11:40:51 - Connection terminated. I 2026.03.15 11:40:51 - Checking authorization ... ! 2026.03.15 11:40:52 - Connecting to Musica (Netherlands, Alblasserdam) . 2026.03.15 11:40:52 - Routes, add 213.152.161.251/32 for interface "wlp3s0". . 2026.03.15 11:40:52 - WireGuard > Setup start . 2026.03.15 11:40:52 - WireGuard > Setup complete . 2026.03.15 11:40:52 - WireGuard > Setup interface . 2026.03.15 11:40:53 - WireGuard > Received first handshake . 2026.03.15 11:40:53 - DNS of the system switched to VPN DNS - via /etc/resolv.conf) . 2026.03.15 11:40:53 - Routes, add 0.0.0.0/1 for interface "Eddie". . 2026.03.15 11:40:53 - Routes, add 128.0.0.0/1 for interface "Eddie". . 2026.03.15 11:40:53 - Routes, add ::/1 for interface "Eddie". . 2026.03.15 11:40:53 - Routes, add 8000::/1 for interface "Eddie". . 2026.03.15 11:40:53 - Routes, add 213.152.161.249/32 for interface "Eddie". . 2026.03.15 11:40:53 - Routes, add 2a00:1678:2470:50:4fbf:b745:133a:e951/128 for interface "Eddie". . 2026.03.15 11:40:53 - Flushing DNS I 2026.03.15 11:40:53 - Checking route IPv4 I 2026.03.15 11:40:54 - Checking route IPv6 I 2026.03.15 11:40:54 - Checking DNS . 2026.03.15 11:40:55 - Collect network information ! 2026.03.15 11:40:55 - Connected. ! 2026.03.15 11:43:43 - Disconnecting . 2026.03.15 11:43:44 - WireGuard > Stop request received . 2026.03.15 11:43:44 - WireGuard > Stopping . 2026.03.15 11:43:44 - WireGuard > Completed . 2026.03.15 11:43:44 - Routes, delete 0.0.0.0/1 for interface "Eddie", not exists. . 2026.03.15 11:43:44 - Routes, delete 128.0.0.0/1 for interface "Eddie", not exists. . 2026.03.15 11:43:44 - Routes, delete ::/1 for interface "Eddie", not exists. . 2026.03.15 11:43:44 - Routes, delete 8000::/1 for interface "Eddie", not exists. . 2026.03.15 11:43:44 - Routes, delete 213.152.161.251/32 for interface "wlp3s0". . 2026.03.15 11:43:44 - Routes, delete 213.152.161.249/32 for interface "Eddie", not exists. . 2026.03.15 11:43:44 - Routes, delete 2a00:1678:2470:50:4fbf:b745:133a:e951/128 for interface "Eddie", not exists. . 2026.03.15 11:43:44 - DNS of the system restored - via /etc/resolv.conf) . 2026.03.15 11:43:44 - Collect network information . 2026.03.15 11:43:45 - Connection terminated. . 2026.03.15 11:43:45 - Flushing DNS ! 2026.03.15 11:43:45 - Session terminated. I 2026.03.15 11:49:44 - Session starting. I 2026.03.15 11:49:44 - Checking authorization ... ! 2026.03.15 11:49:44 - Connecting to Merga (Netherlands, Alblasserdam) . 2026.03.15 11:49:44 - Routes, add 213.152.161.32/32 for interface "wlp3s0". . 2026.03.15 11:49:44 - WireGuard > Setup start . 2026.03.15 11:49:44 - WireGuard > Setup complete . 2026.03.15 11:49:44 - WireGuard > Setup interface . 2026.03.15 11:49:45 - WireGuard > Received first handshake . 2026.03.15 11:49:45 - DNS of the system switched to VPN DNS - via /etc/resolv.conf) . 2026.03.15 11:49:45 - Routes, add 0.0.0.0/1 for interface "Eddie". . 2026.03.15 11:49:45 - Routes, add 128.0.0.0/1 for interface "Eddie". . 2026.03.15 11:49:45 - Routes, add ::/1 for interface "Eddie". . 2026.03.15 11:49:45 - Routes, add 8000::/1 for interface "Eddie". . 2026.03.15 11:49:45 - Routes, add 213.152.161.30/32 for interface "Eddie". . 2026.03.15 11:49:46 - Routes, add 2a00:1678:2470:42:e8d8:5e4e:65f3:5e89/128 for interface "Eddie". . 2026.03.15 11:49:46 - Flushing DNS I 2026.03.15 11:49:46 - Checking route IPv4 I 2026.03.15 11:49:46 - Checking route IPv6 I 2026.03.15 11:49:47 - Checking DNS . 2026.03.15 11:49:47 - Collect network information ! 2026.03.15 11:49:47 - Connected. ---------------------------- Network Info: { "routes": [ { "destination": "0.0.0.0\/1", "interface": "Eddie", "scope": "link" }, { "destination": "0.0.0.0\/0", "gateway": "192.168.183.10", "interface": "wlp3s0", "metric": "600", "proto": "dhcp", "src": "192.168.183.23" }, { "destination": "128.0.0.0\/1", "interface": "Eddie", "scope": "link" }, { "destination": "192.168.183.0\/24", "interface": "wlp3s0", "metric": "600", "proto": "kernel", "scope": "link", "src": "192.168.183.23" }, { "destination": "213.152.161.30\/32", "interface": "Eddie", "scope": "link" }, { "destination": "213.152.161.32\/32", "gateway": "192.168.183.10", "interface": "wlp3s0" }, { "destination": "2a00:1678:2470:42:e8d8:5e4e:65f3:5e89\/128", "interface": "Eddie", "metric": "1024", "pref": "medium" }, { "destination": "::\/1", "interface": "Eddie", "metric": "1024", "pref": "medium" }, { "destination": "fd7d:76ee:e68f:a993:e3d1:c7ce:a3d1:77a5\/128", "interface": "Eddie", "metric": "256", "pref": "medium", "proto": "kernel" }, { "destination": "fe80::\/64", "interface": "wlp3s0", "metric": "1024", "pref": "medium", "proto": "kernel" }, { "destination": "8000::\/1", "interface": "Eddie", "metric": "1024", "pref": "medium" } ], "ipv4-default-gateway": "192.168.183.10", "ipv4-default-interface": "wlp3s0", "interfaces": [ { "friendly": "lo", "id": "lo", "name": "lo", "description": "lo", "type": "Loopback", "status": "Unknown", "bytes_received": "1163623", "bytes_sent": "1163623", "support_ipv4": true, "support_ipv6": true, "ips": [ "127.0.0.1", "::1" ], "bind": true }, { "friendly": "eno1", "id": "eno1", "name": "eno1", "description": "eno1", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "wlp3s0", "id": "wlp3s0", "name": "wlp3s0", "description": "wlp3s0", "type": "Wireless80211", "status": "Up", "bytes_received": "713653844", "bytes_sent": "11454366", "support_ipv4": true, "support_ipv6": true, "ips": [ "192.168.183.23", "fe80::c351:f9a6:78f5:e836" ], "bind": true }, { "friendly": "Eddie", "id": "Eddie", "name": "Eddie", "description": "Eddie", "type": "0", "status": "Unknown", "bytes_received": "34412", "bytes_sent": "26028", "support_ipv4": true, "support_ipv6": true, "ips": [ "10.160.108.1", "fd7d:76ee:e68f:a993:e3d1:c7ce:a3d1:77a5" ], "bind": true } ] } ---------------------------- ip addr show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host noprefixroute valid_lft forever preferred_lft forever 2: eno1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast state DOWN group default qlen 1000 link/ether bc:fc:e7:d3:7b:c9 brd ff:ff:ff:ff:ff:ff altname enp2s0 altname enxbcfce7d37bc9 3: wlp3s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000 link/ether 58:02:05:c7:40:42 brd ff:ff:ff:ff:ff:ff altname wlx580205c74042 inet 192.168.183.23/24 brd 192.168.183.255 scope global dynamic noprefixroute wlp3s0 valid_lft 84811sec preferred_lft 84811sec inet6 fe80::c351:f9a6:78f5:e836/64 scope link noprefixroute valid_lft forever preferred_lft forever 6: Eddie: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1320 qdisc noqueue state UNKNOWN group default qlen 1000 link/none inet 10.160.108.1/32 scope global Eddie valid_lft forever preferred_lft forever inet6 fd7d:76ee:e68f:a993:e3d1:c7ce:a3d1:77a5/128 scope global valid_lft forever preferred_lft forever ---------------------------- ip link show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eno1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast state DOWN mode DEFAULT group default qlen 1000 link/ether bc:fc:e7:d3:7b:c9 brd ff:ff:ff:ff:ff:ff altname enp2s0 altname enxbcfce7d37bc9 3: wlp3s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP mode DORMANT group default qlen 1000 link/ether 58:02:05:c7:40:42 brd ff:ff:ff:ff:ff:ff altname wlx580205c74042 6: Eddie: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1320 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/none Furthermore, as for the tests i don't exactly know what to do, so i just searched whatever you said and i did those. i had to host the video on patchy bc odysee doesn't like it and refuses to cooperate for some reason. please excuse that (its the same dev behind nadeko invidious btw :)) ): https://patchy.moe/rT387 as for the eddie settings, the only thing i did was give it elevated privileges via the terminal. i did that and i have my server blocklist; for less privacy friendly countries. everything else should be the default. and my client version is 2.24.6. link to uploaded report: https://eddie.website/report/8712ae1c/
-
[OpenSuse - Tumbleweed] DNS Leaking
Tech Jedi Alex replied to lilzayn's topic in Eddie - AirVPN Client
I have the logs. I don't have more specific OS info software versions and paths (what's there, what isn't) some light network tests (how it can connect and how not) current Eddie settings output of network-related commands (link state, routes, etc.) which are not completely part of the logs. But funnily enough, what you continue to paste here is 100% part of the system report.. if you had read the thread I linked to, you would know that. So either you help us help you, or you help yourself. It's really that easy. -
Hello! The moderator asked for a system report generated by Eddie, please read! We would like to see the report as well. It will add information that could be valuable to understand the problem. You will need just a few seconds to generate and send it. Kind regards
-
-
-
DoT and DoH not returning custom responses
bot3291198 posted a topic in Troubleshooting and Problems
I've configured custom responses for DNS. When I query 10.128.0.1:53, I get back the custom A records I've set. When I query 10.128.0.1 over DoT or DoH, I don't get the custom responses but rather the public DNS responses. Shouldn't DoT and DoH return the same responses as port 53? Took me a while to track this down. I have a device that attempts DoT on startup and will use DoT if available. For now, I've blocked port 853 for that device then it drops down to plain 53, but thinking that all 3 of plain, DoT and DoH should return the custom responses? -
My intention was to rule out problems with UDP and Wireguard. OpenVPN and UDP with OpenVPN work, so the problem is Wireguard. If you can live with OpenVPN, no need to further examinate this.
-
you have: the logs and yes, the second one gives me the warning and it does nothing. copying the output from the logs gives the exact same result. please read: the logs. it reads: . 2026.03.08 19:37:31 - Eddie version: 2.24.6 / linux_x64, System: Linux, Name: openSUSE Tumbleweed, Version: 20260304, Framework: 6.8.0.96 (tarball Wed Jan 15 10:20:48 UTC 2020); Framework: v4.0.30319 . 2026.03.08 19:37:31 - Command line arguments (1): path.resources="/usr/share/eddie-ui" . 2026.03.08 19:37:31 - Raise system privileges . 2026.03.08 19:37:32 - Collect network information . 2026.03.08 19:37:33 - Reading options from /home/zayn/.config/eddie/default.profile . 2026.03.08 19:37:33 - OpenVPN - Version: 2.6.14 - OpenSSL 3.5.3 16 Sep 2025, LZO 2.10 (/sbin/openvpn) . 2026.03.08 19:37:33 - SSH - Version: OpenSSH_10.2p1, OpenSSL 3.5.3 16 Sep 2025 (/usr/bin/ssh) I 2026.03.08 19:37:33 - SSL - Not available I 2026.03.08 19:37:37 - Ready . 2026.03.08 19:37:38 - Collect information about AirVPN completed I 2026.03.08 19:37:41 - Session starting. I 2026.03.08 19:37:41 - Checking authorization ... ! 2026.03.08 19:37:41 - Connecting to Tianyi (Netherlands, Alblasserdam) . 2026.03.08 19:37:41 - Routes, add 213.152.186.175/32 for interface "wlp3s0". . 2026.03.08 19:37:41 - WireGuard > Setup start . 2026.03.08 19:37:41 - WireGuard > Setup complete . 2026.03.08 19:37:41 - WireGuard > Setup interface . 2026.03.08 19:37:42 - WireGuard > Received first handshake . 2026.03.08 19:37:42 - DNS of the system switched to VPN DNS - via /etc/resolv.conf) . 2026.03.08 19:37:43 - Routes, add 0.0.0.0/1 for interface "Eddie". . 2026.03.08 19:37:43 - Routes, add 128.0.0.0/1 for interface "Eddie". . 2026.03.08 19:37:43 - Routes, add ::/1 for interface "Eddie". . 2026.03.08 19:37:43 - Routes, add 8000::/1 for interface "Eddie". . 2026.03.08 19:37:43 - Routes, add 213.152.186.173/32 for interface "Eddie". . 2026.03.08 19:37:43 - Routes, add 2a00:1678:1337:2430:5879:14eb:6d99:c756/128 for interface "Eddie". . 2026.03.08 19:37:43 - Flushing DNS I 2026.03.08 19:37:43 - Checking route IPv4 I 2026.03.08 19:37:43 - Checking route IPv6 I 2026.03.08 19:37:45 - Checking DNS . 2026.03.08 19:37:45 - Collect network information ! 2026.03.08 19:37:45 - Connected. F 2026.03.08 19:38:13 - Unexpected error. Please contact our support staff. - ApplicationThread - Access to the path "/usr/lib/eddie-ui/Eddie_20260308_193810.txt" is denied. - at System.IO.FileStream..ctor (System.String path, System.IO.FileMode mode, System.IO.FileAccess access, System.IO.FileShare share, System.Int32 bufferSize, System.Boolean anonymous, System.IO.FileOptions options) [0x0019e] in <c453bf849bb84e719dbec0475e99db95>:0 F 2026.03.08 19:38:13 - at System.IO.FileStream..ctor (System.String path, System.IO.FileMode mode, System.IO.FileAccess access, System.IO.FileShare share, System.Int32 bufferSize, System.IO.FileOptions options) [0x00000] in <c453bf849bb84e719dbec0475e99db95>:0 F 2026.03.08 19:38:13 - at (wrapper remoting-invoke-with-check) System.IO.FileStream..ctor(string,System.IO.FileMode,System.IO.FileAccess,System.IO.FileShare,int,System.IO.FileOptions) F 2026.03.08 19:38:13 - at System.IO.StreamWriter..ctor (System.String path, System.Boolean append, System.Text.Encoding encoding, System.Int32 bufferSize) [0x00055] in <c453bf849bb84e719dbec0475e99db95>:0 F 2026.03.08 19:38:13 - at System.IO.StreamWriter..ctor (System.String path) [0x00008] in <c453bf849bb84e719dbec0475e99db95>:0 F 2026.03.08 19:38:13 - at (wrapper remoting-invoke-with-check) System.IO.StreamWriter..ctor(string) F 2026.03.08 19:38:13 - at Eddie.Forms.Forms.Main.LogsDoSave (System.Boolean selectedOnly) [0x00055] in <7f43ecababb74a4e9f031f2a26324cba>:0 F 2026.03.08 19:38:13 - at Eddie.Forms.Forms.Main.cmdLogsSave_Click (System.Object sender, System.EventArgs e) [0x00000] in <7f43ecababb74a4e9f031f2a26324cba>:0 F 2026.03.08 19:38:13 - at System.Windows.Forms.Control.OnClick (System.EventArgs e) [0x00019] in <1ad3b9c5e8484f3cb4aaaf843739b786>:0 F 2026.03.08 19:38:13 - at System.Windows.Forms.Button.OnClick (System.EventArgs e) [0x0001e] in <1ad3b9c5e8484f3cb4aaaf843739b786>:0 F 2026.03.08 19:38:13 - at System.Windows.Forms.ButtonBase.OnMouseUp (System.Windows.Forms.MouseEventArgs mevent) [0x00069] in <1ad3b9c5e8484f3cb4aaaf843739b786>:0 F 2026.03.08 19:38:13 - at System.Windows.Forms.Button.OnMouseUp (System.Windows.Forms.MouseEventArgs mevent) [0x00000] in <1ad3b9c5e8484f3cb4aaaf843739b786>:0 F 2026.03.08 19:38:13 - at System.Windows.Forms.Control.WmLButtonUp (System.Windows.Forms.Message& m) [0x00078] in <1ad3b9c5e8484f3cb4aaaf843739b786>:0 F 2026.03.08 19:38:13 - at System.Windows.Forms.Control.WndProc (System.Windows.Forms.Message& m) [0x001b4] in <1ad3b9c5e8484f3cb4aaaf843739b786>:0 F 2026.03.08 19:38:13 - at System.Windows.Forms.ButtonBase.WndProc (System.Windows.Forms.Message& m) [0x00037] in <1ad3b9c5e8484f3cb4aaaf843739b786>:0 F 2026.03.08 19:38:13 - at System.Windows.Forms.Button.WndProc (System.Windows.Forms.Message& m) [0x00000] in <1ad3b9c5e8484f3cb4aaaf843739b786>:0 F 2026.03.08 19:38:13 - at System.Windows.Forms.Control+ControlWindowTarget.OnMessage (System.Windows.Forms.Message& m) [0x00000] in <1ad3b9c5e8484f3cb4aaaf843739b786>:0 F 2026.03.08 19:38:13 - at System.Windows.Forms.Control+ControlNativeWindow.WndProc (System.Windows.Forms.Message& m) [0x0000b] in <1ad3b9c5e8484f3cb4aaaf843739b786>:0 F 2026.03.08 19:38:13 - at System.Windows.Forms.NativeWindow.WndProc (System.IntPtr hWnd, System.Windows.Forms.Msg msg, System.IntPtr wParam, System.IntPtr lParam) [0x00085] in <1ad3b9c5e8484f3cb4aaaf843739b786>:0 if you would have simply opened the log, you would know that.
-
I see in the changelog for the UniFi Network App 10.2.93: - Added IPv6 support for WireGuard VPN. I'd given up hope, I tell you!
-
Yeah, I can see that now. I'm able to hit 1.2-3Gbps on occassion. Without AirVPN I can get 2.3Gbps, so it cuts it nearly in half, but it's sufficient. It's probably my CPU that's the bottleneck. I'll use a more powerful machine for further testing later.
-
Slower Than Expected Upload In Qbittorrent via Gluetun
LeeO replied to s09931's topic in Troubleshooting and Problems
Hello, put this line on environment that boost my upload : - WIREGUARD_MTU=1280 Gl -
Configuring White listed servers and traffic splitting
Staff replied to 0bacon's topic in AirVPN Suite
@0bacon Hello! That's fine, as is standard practice in a multi-user system, each user can have a different configuration file for each piece of software. However, we do not recommend running Goldcrest as root; a user belonging to the airvpn group is sufficient. This error suggests that the intersection between the general Bluetit allowed servers set and the specific Goldcrest white listed server set is empty. Please feel free to publish the Bluetit log to let us look into this error more properly. You can generate it and store it to a specific file, in a systemd based system, with these commands: sudo journalctl | grep bluetit > bluetit.log With default settings, traffic splitting is disabled, from the manual: Make sure to set allowtrafficsplitting to on on /etc/airvpn/bluetit.rc file. Only the superuser can make this change. Since traffic splitting implies traffic flowing outside the VPN tunnel, this is one of those settings that, by design, are considered the exclusive domain of the superuser. Once you change the setting and re-start Bluetit, you should see that the problem is resolved. If not, again the Bluetit log can offer valuable insight. Kind regards -
-
-
ive followed this gitlab readme here. My goal is to eventually have traffic splitting but so far I can't connect to a server. When I run goldcrest -O there is ERROR: Reached end of AirVPN server list. No suitable server found. This is because I want to only connect to chicago based vpn's. When goldcrest -O is entered it tells me that it's reading run control directives from file /home/xxx/.config/goldcrest.rc So I have been configuring it there, and it looks like below. I am also confused because there is config files in /etc/airvpn/bluetit.rc, /root/.config/goldcrest.rc and my home/f/.config/goldcrest.rc. Is one of these higher priority than another? When I leave everything in default settings then I do connect to a vpn server. So I tried to split tunnel with cuckoo -r and I get ERROR setnamespace: Cannot open network namespace 'aircuckoo': No such file or directory Any tips would be greatly appreciated. thanks for your time GNU nano 8.7.1 /home/x/.config/goldcrest.rc # # goldcrest runcontrol file # #air-server Kruger Praecipua Sneden Superba Meridiana Fang Sadalsuud # air-vpn-type <openvpn|wireguard> # air-tls-mode <auto|auth|crypt> # air-ipv6 <on|off> # air-6to4 <on|off> air-user myusername air-password mypassword # air-key <name> air-white-server-list Kruger Praecipua Sneden Superba Meridiana Fang Sadalsuud # air-black-server-list <server list> # air-white-country-list <country list> # air-black-country-list <country list> # cipher <cipher_name> # proto <udp|tcp> # server <server_ip|server_url> # port <port> # tcp-queue-limit <n> # mtu <n> # ncp-disable <yes|no> # network-lock <on|iptables|nftables|pf|off> # allow-private-network <yes|no> # allow-ping <yes|no|input|output> # allow-ipv6ndp <yes|no> # ignore-dns-push <yes|no> # allowuaf <yes|no|default> # timeout <seconds> # compress <yes|no|asym> # proxy-host <host_ip|host_url> # proxy-port <port> # proxy-username <proxy_username> # proxy-password <proxy_password> # proxy-basic <yes|no> # alt-proxy <yes|no> # persist-tun <on|off> # async <on|off> # conn-stat-interval <seconds>
-
Oh my god you have ended days of frustration for this inexperienced youngling. If you are willing, are you able to explain why the automatic port selection was preventing a successful handshake?
-
-
-
Hello! There's no "hard limit", as correctly advertised on the main page. The main factors determining the maximum throughput are the physical limits of your ISP and our lines/ports/server available bandwidth, CPU power, the weakest (slowest) hop in the network path between your and our nodes, and traffic shaping by your ISP (if any). The "weakest" of the mentioned factors determine the actual throughput. In reality the all time high recorded in AirVPN history (WireGuard only) is more than 1 Gbit/s: about 2.1 Gbit/s from residential lines around the world (also confirmed here) which means 4.2 Gbit/s on the server for that single session, and even more from datacenter to datacenter. Kind regards
-
Still not working on MacOS Seq. We gonna get this fixed... or is that just not a priority?
-
Eddie Android edition 4.0.0 preview available
Skif456 replied to Staff's topic in News and Announcement
Hello! When can we expect the Amnesia protocol to be available in the Config Generator on the website? Thanks! -
-
[OpenSuse - Tumbleweed] DNS Leaking
Tech Jedi Alex replied to lilzayn's topic in Eddie - AirVPN Client
The one thing that I see is that you didn't read the thread I linked to, as in both files you simply copied the logs. The second one also doesn't have a connection attempt recorded, so this text file is, frankly, useless. Carefully read what is requested of you and follow the instructions. -
-
In Eddie Preferences > Protocols, untick Automatic and select UDP port 443. Retry a connection. If it still doesn't work, provide a system report instead of only the logs. .
