All Activity
This stream auto-updates
- Past hour
-
-
-
-
Linux: AirVPN Suite 2.1.0 preview available
colorman replied to Staff's topic in News and Announcement
I checked the YAST network settings, but I only see 1 route. Just to be sure, I also checked the cockpit; I don't see anything unusual. By the way, I use openSUSE Slowroll. I have no idea where else to look. I didn't have any problems with the previous version. Exactly. Add it (you can edit the file with any text editor with root privileges), set it to "no" and verify that the issue gets resolved. NftablesTableOwner=no then re-start firewalld. This is vital to let Bluetit operate "Network Lock" properly. Exclusive ownership of the firewall tables must be pondered on a case by case basis. In this case if you wish to enable "Network Lock" you can't assign exclusive ownership of the tables to firewalld. I added it, but I don't see any change. I restarted the firewall and restarted the PC myself. For now, I think I'll just go back to the previous version. I will test it for you again later (I enjoy doing that). As far as my knowledge allows. -
-
-
Thanks for your support. I cannot test as I'm running the arm64 architecture. If you would like me to test it on arm, let me know when the build is available.
-
-
- Today
-
-
-
-
Hello! Exactly. Add it (you can edit the file with any text editor with root privileges), set it to "no" and verify that the issue gets resolved. NftablesTableOwner=no then re-start firewalld. This is vital to let Bluetit operate "Network Lock" properly. Exclusive ownership of the firewall tables must be pondered on a case by case basis. In this case if you wish to enable "Network Lock" you can't assign exclusive ownership of the tables to firewalld. You have two default routes via 192.168.178.1 on the same interface (enp6s0), one without explicit metric (so metric 0) and one with metric 100. Such duplicates are harmless in general but Bluetit detects them, probably fails to understand that the metric of one of them is 0, and throws a critical error believing that the metric is the same for both. We'll work on the matter carefully. In the meantime just delete the duplicate route and configure your interface either fully static or fully DHCP to keep on testing Kind regards
-
-
Linux: AirVPN Suite 2.1.0 preview available
colorman replied to Staff's topic in News and Announcement
I do not see NftablesTableOwner in /etc/firewalld/firewalld.conf # firewalld config file # default zone # The default zone used if an empty zone string is used. # Default: public DefaultZone=public # Clean up on exit # If set to no or false the firewall configuration will not get cleaned up # on exit or stop of firewalld. # Default: yes CleanupOnExit=yes # Clean up kernel modules on exit # If set to yes or true the firewall related kernel modules will be # unloaded on exit or stop of firewalld. This might attempt to unload # modules not originally loaded by firewalld. # Default: no CleanupModulesOnExit=no # Lockdown # If set to enabled, firewall changes with the D-Bus interface will be limited # to applications that are listed in the lockdown whitelist. # The lockdown whitelist file is lockdown-whitelist.xml # Default: no Lockdown=no # IPv6_rpfilter # Performs a reverse path filter test on a packet for IPv6. If a reply to the # packet would be sent via the same interface that the packet arrived on, the # packet will match and be accepted, otherwise dropped. # The rp_filter for IPv4 is controlled using sysctl. # Note: This feature has a performance impact. See man page FIREWALLD.CONF(5) # for details. # Default: yes IPv6_rpfilter=yes # IndividualCalls # Do not use combined -restore calls, but individual calls. This increases the # time that is needed to apply changes and to start the daemon, but is good for # debugging. # Default: no IndividualCalls=no # LogDenied # Add logging rules right before reject and drop rules in the INPUT, FORWARD # and OUTPUT chains for the default rules and also final reject and drop rules # in zones. Possible values are: all, unicast, broadcast, multicast and off. # Default: off LogDenied=off # FirewallBackend # Selects the firewall backend implementation. # Choices are: # - nftables (default) # - iptables (iptables, ip6tables, ebtables and ipset) # Note: The iptables backend is deprecated. It will be removed in a future # release. FirewallBackend=nftables # FlushAllOnReload # Flush all runtime rules on a reload. In previous releases some runtime # configuration was retained during a reload, namely; interface to zone # assignment, and direct rules. This was confusing to users. To override this # behavior set this to "yes". # Default: no FlushAllOnReload=no # ReloadPolicy # Policy during reload. By default all traffic except for established # connections is dropped while the rules are updated. Set to "DROP", "REJECT" # or "ACCEPT". Alternatively, specify it per table, like # "OUTPUT:ACCEPT,INPUT:DROP,FORWARD:REJECT". # Default: ReloadPolicy=INPUT:DROP,FORWARD:DROP,OUTPUT:DROP ReloadPolicy=INPUT:DROP,FORWARD:DROP,OUTPUT:DROP # RFC3964_IPv4 # As per RFC 3964, filter IPv6 traffic with 6to4 destination addresses that # correspond to IPv4 addresses that should not be routed over the public # internet. # Defaults to "yes". RFC3964_IPv4=yes # NftablesFlowtable # This may improve forwarded traffic throughput by enabling nftables flowtable. # It is a software fastpath and avoids calling nftables rule evaluation for # data packets. This only works for TCP and UDP traffic. # The value is a space separated list of interfaces. # Example value "eth0 eth1". # Defaults to "off". NftablesFlowtable=off # NftablesCounters # If set to yes, add a counter to every nftables rule. This is useful for # debugging and comes with a small performance cost. # Defaults to "no". NftablesCounters=no @localhost:/usr/local/bin> ip a 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host noprefixroute valid_lft forever preferred_lft forever 2: enp6s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000 link/ether a8:a1:59:2f:52:3e brd ff:ff:ff:ff:ff:ff altname enxa8a1592f523e inet 192.168.178.11/24 brd 192.168.178.255 scope global dynamic enp6s0 valid_lft 85583sec preferred_lft 85583sec inet6 2001:1c04:588:e400:84e3:a53f:f3f1:cda5/64 scope global temporary dynamic valid_lft 603984sec preferred_lft 85494sec inet6 2001:1c04:588:e400:c866:1f63:a0b9:4a41/64 scope global dynamic mngtmpaddr noprefixroute valid_lft 604732sec preferred_lft 604732sec inet6 fe80::35a5:513a:4743:88bd/64 scope link noprefixroute valid_lft forever preferred_lft forever gerrit@localhost:/usr/local/bin> ip route show default via 192.168.178.1 dev enp6s0 default via 192.168.178.1 dev enp6s0 proto dhcp src 192.168.178.11 metric 100 192.168.178.0/24 dev enp6s0 proto kernel scope link src 192.168.178.11 192.168.178.0/24 dev enp6s0 proto kernel scope link src 192.168.178.11 metric 100 gerrit@localhost:/usr/local/bin> ip route get 0.0.0.0 local 0.0.0.0 dev lo src 127.0.0.1 uid 1000 cache <local> -
-
-
@colorman Hello and thank you for your tests! This is a critical situation which will cause Network Lock to falter and lead to firewall system settings restore problems. Please fix it according to the quoted instructions. Should you have already adhered to the aforementioned guidance and Bluetit continues to issue that warning, we kindly ask you to apprise us forthwith. This critical error suggests that something goes wrong in Bluetit's gateway(s) detection. Probably the error shall endure even after the prior misconfiguration has been rectified. If so, please send us the output of the following commands: ip a ip route show ip route get 0.0.0.0 Kind regards
-
Hello! This message has been picked to experiment answers by a selected LLM. The answer has been verified manually and slightly edited. In short, the hops you mention are in Singapore. No changes in Singapore infrastructure took place to justify the change in latency you detect. Operator: locate countries of: vlan12.as06-10g.wco1.sg.m247.ro irb-1906.agg1v.wco1.sg.m247.ro be-2-3111.bb1n.wco1.sg.m247.ro All three hostnames point to infrastructure in Singapore. Here’s how that breaks down: wco1.sg.m247.ro sg is the standard country/location code for Singapore wco1 likely refers to a specific data center or site within that region m247.ro is a Romanian network provider (M247), but they operate globally So for each: vlan12.as06-10g.wco1.sg.m247.ro → Singapore irb-1906.agg1v.wco1.sg.m247.ro → Singapore be-2-3111.bb1n.wco1.sg.m247.ro → Singapore Summary: All three are part of M247’s network presence in Singapore, despite the .ro domain. Operator: Break down names with additional details These hostnames follow fairly typical ISP / backbone naming conventions. Each segment encodes device role, interface, and location. Let’s break them down piece by piece. 🌍 Common suffix (applies to all) m247.ro → Network operated by M247 (Romanian-origin ISP with global PoPs) sg → Singapore wco1 → Likely “West Coast / core site 1” (internal site code for that Singapore PoP) So all three are devices inside the same Singapore location. 1️⃣ vlan12.as06-10g.wco1.sg.m247.ro Breakdown: vlan12 A VLAN interface (Virtual LAN ID 12) Used for logical segmentation inside a router/switch as06-10g as06 → likely “access switch / aggregation switch #6” 10g → 10 Gigabit interface/uplink wco1.sg.m247.ro Location + provider (Singapore PoP) Interpretation: 👉 A VLAN interface (ID 12) on an access/aggregation switch with a 10G link 👉 Likely used for customer traffic or internal segmentation 2️⃣ irb-1906.agg1v.wco1.sg.m247.ro Breakdown: irb-1906 IRB = Integrated Routing and Bridging Interface number 1906 Common on Juniper gear (Layer 3 gateway for a VLAN) agg1v agg → aggregation router/switch 1 → device number v → possibly “virtualized” or variant of the node wco1.sg.m247.ro Same Singapore site Interpretation: 👉 A Layer 3 gateway interface (IRB) on an aggregation router 👉 Handles routing between VLANs or customer subnets 3️⃣ be-2-3111.bb1n.wco1.sg.m247.ro Breakdown: be-2-3111 BE = Bundle Ethernet (port-channel / LAG) 2 → bundle ID 3111 → internal interface identifier bb1n bb → backbone router 1 → device number n → possibly “north” (directional naming is common) wco1.sg.m247.ro Same location Interpretation: 👉 A backbone router interface using a bundled (aggregated) high-capacity link 👉 Likely part of core transit or inter-PoP connectivity 🧠 Big picture (network hierarchy) Putting them together: Access layer → as06-10g (customer-facing / edge connectivity) Aggregation layer → agg1v (traffic consolidation + routing) Backbone/core layer → bb1n (high-capacity transit) This is a classic ISP architecture: Customer VLAN → Access Switch → Aggregation Router → Backbone Router ⚠️ Important note These interpretations are informed guesses, not guaranteed facts. Naming conventions vary by provider, but M247’s style aligns closely with standard ISP practices. Kind regards
-
-
-
Hi All, With the permission from the staff here, I'm releasing a project I've been working on these past few months, for myself, named AirBL. Fully hosted on GitHub for all to run via their preferred container deployment method, e.g. Docker, OrbStack, etc. The companion will help you with: Smart Gluetun Integration: Bypasses Gluetun's static logic by feeding it a dynamic servers.json, monitoring for DroneBL blocks and forcibly restart Gluetun if the server IP gets flagged (customizable behavior). WireGuard Generation: Automatically generates perfected wg0.conf files (per the user choice, prioritizing speed, clean servers or both). It pulls data from internal speed tests and TCP verifiers to lock in clean IPs. AUTO Entry Resolution: Use the "AUTO" setting to let AirBL analyze its local SQLite database and automatically map your configuration to the fastest historical route. Multi-Day Discovery Engine: Cycles through different ports (1637, 47107, 51820) and Entry points, over several days to eliminate "fluke" speed tests and lock in proven performance, discovering the best possible route. Dynamic Identity Ingestion: Just drop one AirVPN .conf file into the directory. AirBL extracts your keys and dynamically generates hundreds of optimized variants on the fly. Abuse & Performance Filtering: Automatically bans servers that drop below your Mbps floor, keeping your server list healthy. And more! Come check it out here https://github.com/xEsurient/AirBL | https://xesurient.github.io/AirBL/ Feedback and commits on the project are welcome, e.g. if there's things that you think could be done better such as abandoning the N*Speedtests logic via speedtest-cli for something more robust or indicative of the network's performance. Disclosures: Wiki is AI fixed with references and proof checked after changes (to ensure the information is understandable and complete), README.md is completely AI generated based on the project itself, minus a few tweaks and fact checking changes, Index.html is a standard template (commonly used by whatever AI choice) that has been modified slightly (based on Jinja2). Disclosures: Wiki is AI fixed with references and proof checked after changes (to ensure the information is understandable and complete), README.md is completely AI generated based on the project itself, minus a few tweaks and fact checking changes, Index.html is a standard template (commonly used by whatever AI choice) that has been modified slightly (based on Jinja2).
-
I'm getting the same error on Debian 13 with KDE Plasma, and I've tried the following: Reinstalling eddie-ui Installing libgtk2.0-0 Running with sudo -E eddie-ui Running with DISPLAY=:0 eddie-ui Running without sudo as normal user All GTK versions are installed, the app is installed at /usr/bin/eddie-ui, appears to be Eddie's .NET runtime not being compatible with Debian 13, but it was working just fine until a month or two ago.
- Yesterday
-
So I am unable to connect. I don't know what is happening. Here is the log. Please help but understand that I am not versed on this and what it means. Regards. . 2026.04.25 17:46:49 - Connection terminated. I 2026.04.25 17:46:52 - Checking authorization ... . 2026.04.25 17:46:53 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" ! 2026.04.25 17:46:53 - Connecting to Alhena (Canada, Toronto, Ontario) . 2026.04.25 17:46:53 - Routes, skipped for 162.219.176.5 : IPv4 Net gateway not available. . 2026.04.25 17:46:53 - Routes, skipped for 162.219.176.5 : IPv4 Net gateway not available. . 2026.04.25 17:46:53 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2026.04.25 17:46:53 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2026.04.25 17:46:53 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2026.04.25 17:46:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 17:46:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 17:46:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 17:46:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 17:46:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.5:443 . 2026.04.25 17:46:53 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2026.04.25 17:46:53 - OpenVPN > UDP link local: (not bound) . 2026.04.25 17:46:53 - OpenVPN > UDP link remote: [AF_INET]162.219.176.5:443 . 2026.04.25 17:46:53 - OpenVPN > TLS: Initial packet from [AF_INET]162.219.176.5:443, sid=f87b860c f4e11a67 . 2026.04.25 17:47:26 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2026.04.25 17:47:26 - OpenVPN > SIGTERM received, sending exit notification to peer . 2026.04.25 17:47:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2026.04.25 17:47:31 - Disconnecting . 2026.04.25 17:47:31 - Routes, skipped for 162.219.176.5 : IPv4 Net gateway not available. . 2026.04.25 17:47:31 - Routes, skipped for 162.219.176.5 : IPv4 Net gateway not available. . 2026.04.25 17:47:31 - Connection terminated. I 2026.04.25 17:47:34 - Checking authorization ... . 2026.04.25 17:47:35 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" ! 2026.04.25 17:47:35 - Connecting to Regulus (Canada, Toronto, Ontario) . 2026.04.25 17:47:35 - Routes, skipped for 184.75.221.37 : IPv4 Net gateway not available. . 2026.04.25 17:47:35 - Routes, skipped for 184.75.221.37 : IPv4 Net gateway not available. . 2026.04.25 17:47:35 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2026.04.25 17:47:35 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2026.04.25 17:47:35 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2026.04.25 17:47:35 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 17:47:35 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 17:47:35 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 17:47:35 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 17:47:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.37:443 . 2026.04.25 17:47:35 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2026.04.25 17:47:35 - OpenVPN > UDP link local: (not bound) . 2026.04.25 17:47:35 - OpenVPN > UDP link remote: [AF_INET]184.75.221.37:443 . 2026.04.25 17:47:35 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.37:443, sid=de4fdcd5 40e2b5fe . 2026.04.25 17:47:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2026.04.25 17:47:35 - OpenVPN > VERIFY KU OK . 2026.04.25 17:47:35 - OpenVPN > Validating certificate extended key usage . 2026.04.25 17:47:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2026.04.25 17:47:35 - OpenVPN > VERIFY EKU OK . 2026.04.25 17:47:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2026.04.25 17:47:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2026.04.25 17:47:35 - OpenVPN > [Regulus] Peer Connection Initiated with [AF_INET]184.75.221.37:443 . 2026.04.25 17:47:35 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.26.1,dhcp-option DNS6 fde6:7a:7d20:181a::1,tun-ipv6,route-gateway 10.28.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:181a::106d/64 fde6:7a:7d20:181a::1,ifconfig 10.28.26.111 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2026.04.25 17:47:35 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2026.04.25 17:47:35 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.26.1' . 2026.04.25 17:47:35 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:181a::1' . 2026.04.25 17:47:35 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2026.04.25 17:47:35 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2026.04.25 17:47:35 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2026.04.25 17:47:35 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2026.04.25 17:47:35 - OpenVPN > OPTIONS IMPORT: peer-id set . 2026.04.25 17:47:35 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2026.04.25 17:47:35 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2026.04.25 17:47:35 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2026.04.25 17:47:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 17:47:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 17:47:35 - OpenVPN > interactive service msg_channel=0 . 2026.04.25 17:47:35 - OpenVPN > open_tun . 2026.04.25 17:47:35 - OpenVPN > wintun device [Eddie] opened . 2026.04.25 17:47:36 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.28.26.111 255.255.255.0 . 2026.04.25 17:47:36 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all . 2026.04.25 17:47:36 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all . 2026.04.25 17:47:36 - OpenVPN > IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 17:47:36 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:181a::106d/128 store=active . 2026.04.25 17:47:36 - OpenVPN > add_route_ipv6(fde6:7a:7d20:181a::/64 -> fde6:7a:7d20:181a::106d metric 0) dev Eddie . 2026.04.25 17:47:36 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:181a::/64 51 fe80::8 store=active . 2026.04.25 17:47:36 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2026.04.25 17:47:36 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all . 2026.04.25 17:47:36 - OpenVPN > IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 17:47:36 - OpenVPN > Initialization Sequence Completed . 2026.04.25 17:47:36 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2026.04.25 17:47:36 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2026.04.25 17:47:36 - DNS leak protection with packet filtering enabled. . 2026.04.25 17:47:37 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.28.26.1) . 2026.04.25 17:47:37 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:181a::1) . 2026.04.25 17:47:37 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:47:38 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:47:38 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:47:38 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:47:39 - Routes, add 184.75.221.35/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:47:39 - Routes, add 2606:6080:1001:e:2e9c:bad5:dbdd:84ea/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:47:39 - Flushing DNS I 2026.04.25 17:47:39 - Checking route IPv4 . 2026.04.25 17:48:49 - Checking route (4° try) . 2026.04.25 17:49:14 - Checking route (5° try) E 2026.04.25 17:49:35 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2026.04.25 17:49:35 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 17:49:35 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 17:49:35 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 17:49:35 - Above log line repeated 17 times more ! 2026.04.25 17:49:35 - Disconnecting . 2026.04.25 17:49:35 - Sending soft termination signal . 2026.04.25 17:49:38 - OpenVPN > SIGTERM received, sending exit notification to peer . 2026.04.25 17:49:39 - OpenVPN > Closing TUN/TAP interface . 2026.04.25 17:49:39 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:181a::/64) . 2026.04.25 17:49:39 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:181a::/64 51 fe80::8 store=active . 2026.04.25 17:49:39 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:181a::106d store=active . 2026.04.25 17:49:39 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.28.26.111 store=active . 2026.04.25 17:49:39 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2026.04.25 17:49:40 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:49:40 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:49:41 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:49:41 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:49:41 - Routes, skipped for 184.75.221.37 : IPv4 Net gateway not available. . 2026.04.25 17:49:41 - Routes, delete 184.75.221.35/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:49:42 - Routes, delete 2606:6080:1001:e:2e9c:bad5:dbdd:84ea/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:49:42 - Routes, skipped for 184.75.221.37 : IPv4 Net gateway not available. . 2026.04.25 17:49:42 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 17:49:42 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 17:49:42 - DNS leak protection with packet filtering disabled. . 2026.04.25 17:49:42 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2026.04.25 17:49:42 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2026.04.25 17:49:42 - Connection terminated. I 2026.04.25 17:49:45 - Checking authorization ... . 2026.04.25 17:49:46 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" ! 2026.04.25 17:49:46 - Connecting to Alkurhah (Canada, Toronto, Ontario) . 2026.04.25 17:49:46 - Routes, skipped for 184.75.221.205 : IPv4 Net gateway not available. . 2026.04.25 17:49:46 - Routes, skipped for 184.75.221.205 : IPv4 Net gateway not available. . 2026.04.25 17:49:46 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2026.04.25 17:49:46 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2026.04.25 17:49:46 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2026.04.25 17:49:46 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 17:49:46 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 17:49:46 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 17:49:46 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 17:49:46 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.205:443 . 2026.04.25 17:49:46 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2026.04.25 17:49:46 - OpenVPN > UDP link local: (not bound) . 2026.04.25 17:49:46 - OpenVPN > UDP link remote: [AF_INET]184.75.221.205:443 . 2026.04.25 17:49:46 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.205:443, sid=966fa547 ffd42bce . 2026.04.25 17:49:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2026.04.25 17:49:46 - OpenVPN > VERIFY KU OK . 2026.04.25 17:49:46 - OpenVPN > Validating certificate extended key usage . 2026.04.25 17:49:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2026.04.25 17:49:46 - OpenVPN > VERIFY EKU OK . 2026.04.25 17:49:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org . 2026.04.25 17:49:46 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2026.04.25 17:49:46 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.205:443 . 2026.04.25 17:49:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.218.1,dhcp-option DNS6 fde6:7a:7d20:2da::1,tun-ipv6,route-gateway 10.6.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:2da::1099/64 fde6:7a:7d20:2da::1,ifconfig 10.6.218.155 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2026.04.25 17:49:46 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2026.04.25 17:49:46 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.6.218.1' . 2026.04.25 17:49:46 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:2da::1' . 2026.04.25 17:49:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2026.04.25 17:49:46 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2026.04.25 17:49:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2026.04.25 17:49:46 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2026.04.25 17:49:46 - OpenVPN > OPTIONS IMPORT: peer-id set . 2026.04.25 17:49:46 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2026.04.25 17:49:46 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2026.04.25 17:49:46 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2026.04.25 17:49:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 17:49:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 17:49:46 - OpenVPN > interactive service msg_channel=0 . 2026.04.25 17:49:46 - OpenVPN > open_tun . 2026.04.25 17:49:46 - OpenVPN > wintun device [Eddie] opened . 2026.04.25 17:49:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.6.218.155 255.255.255.0 . 2026.04.25 17:49:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all . 2026.04.25 17:49:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all . 2026.04.25 17:49:47 - OpenVPN > IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 17:49:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:2da::1099/128 store=active . 2026.04.25 17:49:47 - OpenVPN > add_route_ipv6(fde6:7a:7d20:2da::/64 -> fde6:7a:7d20:2da::1099 metric 0) dev Eddie . 2026.04.25 17:49:47 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:2da::/64 51 fe80::8 store=active . 2026.04.25 17:49:47 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2026.04.25 17:49:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all . 2026.04.25 17:49:47 - OpenVPN > IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 17:49:47 - OpenVPN > Initialization Sequence Completed . 2026.04.25 17:49:47 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2026.04.25 17:49:47 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2026.04.25 17:49:47 - DNS leak protection with packet filtering enabled. . 2026.04.25 17:49:48 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.6.218.1) . 2026.04.25 17:49:48 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:2da::1) . 2026.04.25 17:49:48 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:49:49 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:49:49 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:49:49 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:49:50 - Routes, add 184.75.221.203/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:49:50 - Routes, add 2606:6080:1001:16:3492:5f11:f1fb:66ae/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:49:50 - Flushing DNS I 2026.04.25 17:49:50 - Checking route IPv4 . 2026.04.25 17:51:00 - Checking route (4° try) . 2026.04.25 17:51:25 - Checking route (5° try) E 2026.04.25 17:51:46 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2026.04.25 17:51:46 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 17:51:46 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 17:51:46 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 17:51:46 - Above log line repeated 10 times more ! 2026.04.25 17:51:46 - Disconnecting . 2026.04.25 17:51:46 - Sending soft termination signal . 2026.04.25 17:51:49 - OpenVPN > SIGTERM received, sending exit notification to peer . 2026.04.25 17:51:51 - OpenVPN > Closing TUN/TAP interface . 2026.04.25 17:51:51 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:2da::/64) . 2026.04.25 17:51:51 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:2da::/64 51 fe80::8 store=active . 2026.04.25 17:51:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:2da::1099 store=active . 2026.04.25 17:51:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.6.218.155 store=active . 2026.04.25 17:51:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2026.04.25 17:51:52 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:51:53 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:51:53 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:51:53 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:51:53 - Routes, skipped for 184.75.221.205 : IPv4 Net gateway not available. . 2026.04.25 17:51:54 - Routes, delete 184.75.221.203/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:51:54 - Routes, delete 2606:6080:1001:16:3492:5f11:f1fb:66ae/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:51:54 - Routes, skipped for 184.75.221.205 : IPv4 Net gateway not available. . 2026.04.25 17:51:54 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 17:51:54 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 17:51:54 - DNS leak protection with packet filtering disabled. . 2026.04.25 17:51:55 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2026.04.25 17:51:55 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2026.04.25 17:51:55 - Connection terminated. . 2026.04.25 17:51:58 - Waiting for latency tests (254 to go) . 2026.04.25 17:51:59 - Waiting for latency tests (14 to go) . 2026.04.25 17:52:00 - Waiting for latency tests (5 to go) I 2026.04.25 17:52:02 - Checking authorization ... . 2026.04.25 17:52:02 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" ! 2026.04.25 17:52:02 - Connecting to Mintaka (Canada, Toronto, Ontario) . 2026.04.25 17:52:02 - Routes, skipped for 184.75.223.221 : IPv4 Net gateway not available. . 2026.04.25 17:52:02 - Routes, skipped for 184.75.223.221 : IPv4 Net gateway not available. . 2026.04.25 17:52:03 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2026.04.25 17:52:03 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2026.04.25 17:52:03 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2026.04.25 17:52:03 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 17:52:03 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 17:52:03 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 17:52:03 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 17:52:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.221:443 . 2026.04.25 17:52:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2026.04.25 17:52:03 - OpenVPN > UDP link local: (not bound) . 2026.04.25 17:52:03 - OpenVPN > UDP link remote: [AF_INET]184.75.223.221:443 . 2026.04.25 17:52:03 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.221:443, sid=93757b47 272ec4cf . 2026.04.25 17:52:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2026.04.25 17:52:03 - OpenVPN > VERIFY KU OK . 2026.04.25 17:52:03 - OpenVPN > Validating certificate extended key usage . 2026.04.25 17:52:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2026.04.25 17:52:03 - OpenVPN > VERIFY EKU OK . 2026.04.25 17:52:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2026.04.25 17:52:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2026.04.25 17:52:03 - OpenVPN > [Mintaka] Peer Connection Initiated with [AF_INET]184.75.223.221:443 . 2026.04.25 17:52:03 - OpenVPN > SENT CONTROL [Mintaka]: 'PUSH_REQUEST' (status=1) . 2026.04.25 17:52:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.26.1,dhcp-option DNS6 fde6:7a:7d20:141a::1,tun-ipv6,route-gateway 10.24.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:141a::10cb/64 fde6:7a:7d20:141a::1,ifconfig 10.24.26.205 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2026.04.25 17:52:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2026.04.25 17:52:03 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.24.26.1' . 2026.04.25 17:52:03 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:141a::1' . 2026.04.25 17:52:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2026.04.25 17:52:03 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2026.04.25 17:52:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2026.04.25 17:52:03 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2026.04.25 17:52:03 - OpenVPN > OPTIONS IMPORT: peer-id set . 2026.04.25 17:52:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2026.04.25 17:52:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2026.04.25 17:52:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2026.04.25 17:52:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 17:52:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 17:52:03 - OpenVPN > interactive service msg_channel=0 . 2026.04.25 17:52:03 - OpenVPN > open_tun . 2026.04.25 17:52:03 - OpenVPN > wintun device [Eddie] opened . 2026.04.25 17:52:04 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.24.26.205 255.255.255.0 . 2026.04.25 17:52:04 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all . 2026.04.25 17:52:04 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all . 2026.04.25 17:52:04 - OpenVPN > IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 17:52:04 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:141a::10cb/128 store=active . 2026.04.25 17:52:04 - OpenVPN > add_route_ipv6(fde6:7a:7d20:141a::/64 -> fde6:7a:7d20:141a::10cb metric 0) dev Eddie . 2026.04.25 17:52:04 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:141a::/64 51 fe80::8 store=active . 2026.04.25 17:52:04 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2026.04.25 17:52:04 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all . 2026.04.25 17:52:04 - OpenVPN > IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 17:52:04 - OpenVPN > Initialization Sequence Completed . 2026.04.25 17:52:04 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2026.04.25 17:52:04 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2026.04.25 17:52:04 - DNS leak protection with packet filtering enabled. . 2026.04.25 17:52:04 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.24.26.1) . 2026.04.25 17:52:04 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:141a::1) . 2026.04.25 17:52:05 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:52:05 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:52:06 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:52:06 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:52:07 - Routes, add 184.75.223.219/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:52:07 - Routes, add 2606:6080:1002:7:def:437f:f6fa:7759/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:52:07 - Flushing DNS I 2026.04.25 17:52:07 - Checking route IPv4 . 2026.04.25 17:53:16 - Checking route (4° try) . 2026.04.25 17:53:41 - Checking route (5° try) E 2026.04.25 17:54:02 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2026.04.25 17:54:02 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 17:54:02 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 17:54:02 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 17:54:02 - Above log line repeated 8 times more ! 2026.04.25 17:54:02 - Disconnecting . 2026.04.25 17:54:02 - Sending soft termination signal . 2026.04.25 17:54:06 - OpenVPN > SIGTERM received, sending exit notification to peer . 2026.04.25 17:54:07 - OpenVPN > Closing TUN/TAP interface . 2026.04.25 17:54:07 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:141a::/64) . 2026.04.25 17:54:07 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:141a::/64 51 fe80::8 store=active . 2026.04.25 17:54:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:141a::10cb store=active . 2026.04.25 17:54:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.24.26.205 store=active . 2026.04.25 17:54:08 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2026.04.25 17:54:08 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:54:09 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:54:09 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:54:09 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:54:09 - Routes, skipped for 184.75.223.221 : IPv4 Net gateway not available. . 2026.04.25 17:54:10 - Routes, delete 184.75.223.219/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:54:10 - Routes, delete 2606:6080:1002:7:def:437f:f6fa:7759/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:54:10 - Routes, skipped for 184.75.223.221 : IPv4 Net gateway not available. . 2026.04.25 17:54:10 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 17:54:10 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 17:54:10 - DNS leak protection with packet filtering disabled. . 2026.04.25 17:54:10 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2026.04.25 17:54:10 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2026.04.25 17:54:10 - Connection terminated. I 2026.04.25 17:54:13 - Checking authorization ... . 2026.04.25 17:54:14 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" ! 2026.04.25 17:54:14 - Connecting to Cephei (Canada, Toronto, Ontario) . 2026.04.25 17:54:14 - Routes, skipped for 184.75.214.165 : IPv4 Net gateway not available. . 2026.04.25 17:54:14 - Routes, skipped for 184.75.214.165 : IPv4 Net gateway not available. . 2026.04.25 17:54:14 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2026.04.25 17:54:14 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2026.04.25 17:54:14 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2026.04.25 17:54:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 17:54:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 17:54:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 17:54:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 17:54:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.165:443 . 2026.04.25 17:54:14 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2026.04.25 17:54:14 - OpenVPN > UDP link local: (not bound) . 2026.04.25 17:54:14 - OpenVPN > UDP link remote: [AF_INET]184.75.214.165:443 . 2026.04.25 17:54:16 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.214.165:443, sid=84fd3333 e8f6710d . 2026.04.25 17:54:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2026.04.25 17:54:17 - OpenVPN > VERIFY KU OK . 2026.04.25 17:54:17 - OpenVPN > Validating certificate extended key usage . 2026.04.25 17:54:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2026.04.25 17:54:17 - OpenVPN > VERIFY EKU OK . 2026.04.25 17:54:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cephei, emailAddress=info@airvpn.org . 2026.04.25 17:54:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2026.04.25 17:54:17 - OpenVPN > [Cephei] Peer Connection Initiated with [AF_INET]184.75.214.165:443 . 2026.04.25 17:54:17 - OpenVPN > SENT CONTROL [Cephei]: 'PUSH_REQUEST' (status=1) . 2026.04.25 17:54:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.13.122.1,dhcp-option DNS6 fde6:7a:7d20:97a::1,tun-ipv6,route-gateway 10.13.122.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:97a::1021/64 fde6:7a:7d20:97a::1,ifconfig 10.13.122.35 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2026.04.25 17:54:17 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2026.04.25 17:54:17 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.13.122.1' . 2026.04.25 17:54:17 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:97a::1' . 2026.04.25 17:54:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2026.04.25 17:54:17 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2026.04.25 17:54:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2026.04.25 17:54:17 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2026.04.25 17:54:17 - OpenVPN > OPTIONS IMPORT: peer-id set . 2026.04.25 17:54:17 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2026.04.25 17:54:17 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2026.04.25 17:54:17 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2026.04.25 17:54:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 17:54:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 17:54:17 - OpenVPN > interactive service msg_channel=0 . 2026.04.25 17:54:17 - OpenVPN > open_tun . 2026.04.25 17:54:17 - OpenVPN > wintun device [Eddie] opened . 2026.04.25 17:54:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.13.122.35 255.255.255.0 . 2026.04.25 17:54:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all . 2026.04.25 17:54:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all . 2026.04.25 17:54:18 - OpenVPN > IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 17:54:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:97a::1021/128 store=active . 2026.04.25 17:54:18 - OpenVPN > add_route_ipv6(fde6:7a:7d20:97a::/64 -> fde6:7a:7d20:97a::1021 metric 0) dev Eddie . 2026.04.25 17:54:18 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:97a::/64 51 fe80::8 store=active . 2026.04.25 17:54:18 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2026.04.25 17:54:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all . 2026.04.25 17:54:18 - OpenVPN > IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 17:54:18 - OpenVPN > Initialization Sequence Completed . 2026.04.25 17:54:18 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2026.04.25 17:54:18 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2026.04.25 17:54:18 - DNS leak protection with packet filtering enabled. . 2026.04.25 17:54:18 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.13.122.1) . 2026.04.25 17:54:18 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:97a::1) . 2026.04.25 17:54:19 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:54:19 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:54:20 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:54:20 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:54:20 - Routes, add 184.75.214.163/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:54:21 - Routes, add 2606:6080:1001:c:1d9a:8f36:e174:d7c5/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:54:21 - Flushing DNS I 2026.04.25 17:54:21 - Checking route IPv4 . 2026.04.25 17:55:30 - Checking route (4° try) . 2026.04.25 17:55:55 - Checking route (5° try) E 2026.04.25 17:56:16 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2026.04.25 17:56:16 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 17:56:16 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 17:56:16 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 17:56:16 - Above log line repeated 16 times more ! 2026.04.25 17:56:16 - Disconnecting . 2026.04.25 17:56:16 - Sending soft termination signal . 2026.04.25 17:56:19 - OpenVPN > SIGTERM received, sending exit notification to peer . 2026.04.25 17:56:21 - OpenVPN > Closing TUN/TAP interface . 2026.04.25 17:56:21 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:97a::/64) . 2026.04.25 17:56:21 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:97a::/64 51 fe80::8 store=active . 2026.04.25 17:56:21 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:97a::1021 store=active . 2026.04.25 17:56:21 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.13.122.35 store=active . 2026.04.25 17:56:21 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2026.04.25 17:56:22 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:56:22 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:56:23 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:56:23 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:56:23 - Routes, skipped for 184.75.214.165 : IPv4 Net gateway not available. . 2026.04.25 17:56:24 - Routes, delete 184.75.214.163/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:56:24 - Routes, delete 2606:6080:1001:c:1d9a:8f36:e174:d7c5/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:56:24 - Routes, skipped for 184.75.214.165 : IPv4 Net gateway not available. . 2026.04.25 17:56:24 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 17:56:24 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 17:56:24 - DNS leak protection with packet filtering disabled. . 2026.04.25 17:56:24 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2026.04.25 17:56:24 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2026.04.25 17:56:24 - Connection terminated. I 2026.04.25 17:56:27 - Checking authorization ... . 2026.04.25 17:56:28 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" ! 2026.04.25 17:56:28 - Connecting to Agena (Canada, Toronto, Ontario) . 2026.04.25 17:56:28 - Routes, skipped for 184.75.223.213 : IPv4 Net gateway not available. . 2026.04.25 17:56:28 - Routes, skipped for 184.75.223.213 : IPv4 Net gateway not available. . 2026.04.25 17:56:28 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2026.04.25 17:56:28 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2026.04.25 17:56:28 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2026.04.25 17:56:28 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 17:56:28 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 17:56:28 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 17:56:28 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 17:56:28 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.213:443 . 2026.04.25 17:56:28 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2026.04.25 17:56:28 - OpenVPN > UDP link local: (not bound) . 2026.04.25 17:56:28 - OpenVPN > UDP link remote: [AF_INET]184.75.223.213:443 . 2026.04.25 17:56:28 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.213:443, sid=e7171b53 5db86834 . 2026.04.25 17:56:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2026.04.25 17:56:28 - OpenVPN > VERIFY KU OK . 2026.04.25 17:56:28 - OpenVPN > Validating certificate extended key usage . 2026.04.25 17:56:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2026.04.25 17:56:28 - OpenVPN > VERIFY EKU OK . 2026.04.25 17:56:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Agena, emailAddress=info@airvpn.org . 2026.04.25 17:56:28 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2026.04.25 17:56:28 - OpenVPN > [Agena] Peer Connection Initiated with [AF_INET]184.75.223.213:443 . 2026.04.25 17:56:29 - OpenVPN > SENT CONTROL [Agena]: 'PUSH_REQUEST' (status=1) . 2026.04.25 17:56:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.4.218.1,dhcp-option DNS6 fde6:7a:7d20:da::1,tun-ipv6,route-gateway 10.4.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:da::1024/64 fde6:7a:7d20:da::1,ifconfig 10.4.218.38 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2026.04.25 17:56:29 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2026.04.25 17:56:29 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.4.218.1' . 2026.04.25 17:56:29 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:da::1' . 2026.04.25 17:56:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2026.04.25 17:56:29 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2026.04.25 17:56:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2026.04.25 17:56:29 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2026.04.25 17:56:29 - OpenVPN > OPTIONS IMPORT: peer-id set . 2026.04.25 17:56:29 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2026.04.25 17:56:29 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2026.04.25 17:56:29 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2026.04.25 17:56:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 17:56:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 17:56:29 - OpenVPN > interactive service msg_channel=0 . 2026.04.25 17:56:29 - OpenVPN > open_tun . 2026.04.25 17:56:29 - OpenVPN > wintun device [Eddie] opened . 2026.04.25 17:56:30 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.4.218.38 255.255.255.0 . 2026.04.25 17:56:30 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all . 2026.04.25 17:56:30 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all . 2026.04.25 17:56:30 - OpenVPN > IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 17:56:30 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:da::1024/128 store=active . 2026.04.25 17:56:30 - OpenVPN > add_route_ipv6(fde6:7a:7d20:da::/64 -> fde6:7a:7d20:da::1024 metric 0) dev Eddie . 2026.04.25 17:56:30 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:da::/64 51 fe80::8 store=active . 2026.04.25 17:56:30 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2026.04.25 17:56:30 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all . 2026.04.25 17:56:30 - OpenVPN > IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 17:56:30 - OpenVPN > Initialization Sequence Completed . 2026.04.25 17:56:30 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2026.04.25 17:56:30 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2026.04.25 17:56:30 - DNS leak protection with packet filtering enabled. . 2026.04.25 17:56:30 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.4.218.1) . 2026.04.25 17:56:30 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:da::1) . 2026.04.25 17:56:31 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:56:31 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:56:32 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:56:32 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:56:33 - Routes, add 184.75.223.211/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:56:33 - Routes, add 2606:6080:1002:6:f780:efa6:f9d2:3459/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:56:33 - Flushing DNS I 2026.04.25 17:56:33 - Checking route IPv4 . 2026.04.25 17:57:42 - Checking route (4° try) . 2026.04.25 17:58:07 - Checking route (5° try) E 2026.04.25 17:58:28 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2026.04.25 17:58:28 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 17:58:28 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 17:58:28 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 17:58:28 - Above log line repeated 4 times more ! 2026.04.25 17:58:28 - Disconnecting . 2026.04.25 17:58:28 - Sending soft termination signal . 2026.04.25 17:58:32 - OpenVPN > SIGTERM received, sending exit notification to peer . 2026.04.25 17:58:33 - OpenVPN > Closing TUN/TAP interface . 2026.04.25 17:58:33 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:da::/64) . 2026.04.25 17:58:33 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:da::/64 51 fe80::8 store=active . 2026.04.25 17:58:33 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:da::1024 store=active . 2026.04.25 17:58:33 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.4.218.38 store=active . 2026.04.25 17:58:33 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2026.04.25 17:58:34 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:58:34 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:58:35 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:58:35 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:58:35 - Routes, skipped for 184.75.223.213 : IPv4 Net gateway not available. . 2026.04.25 17:58:36 - Routes, delete 184.75.223.211/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:58:36 - Routes, delete 2606:6080:1002:6:f780:efa6:f9d2:3459/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:58:36 - Routes, skipped for 184.75.223.213 : IPv4 Net gateway not available. . 2026.04.25 17:58:36 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 17:58:36 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 17:58:36 - DNS leak protection with packet filtering disabled. . 2026.04.25 17:58:36 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2026.04.25 17:58:36 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2026.04.25 17:58:36 - Connection terminated. I 2026.04.25 17:58:39 - Checking authorization ... . 2026.04.25 17:58:40 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" ! 2026.04.25 17:58:40 - Connecting to Alwaid (Canada, Toronto, Ontario) . 2026.04.25 17:58:40 - Routes, skipped for 184.75.221.109 : IPv4 Net gateway not available. . 2026.04.25 17:58:40 - Routes, skipped for 184.75.221.109 : IPv4 Net gateway not available. . 2026.04.25 17:58:40 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2026.04.25 17:58:40 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2026.04.25 17:58:40 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2026.04.25 17:58:40 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 17:58:40 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 17:58:40 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 17:58:40 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 17:58:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.109:443 . 2026.04.25 17:58:40 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2026.04.25 17:58:40 - OpenVPN > UDP link local: (not bound) . 2026.04.25 17:58:40 - OpenVPN > UDP link remote: [AF_INET]184.75.221.109:443 . 2026.04.25 17:58:40 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.109:443, sid=cdbde049 11285cce . 2026.04.25 17:58:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2026.04.25 17:58:40 - OpenVPN > VERIFY KU OK . 2026.04.25 17:58:40 - OpenVPN > Validating certificate extended key usage . 2026.04.25 17:58:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2026.04.25 17:58:40 - OpenVPN > VERIFY EKU OK . 2026.04.25 17:58:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org . 2026.04.25 17:58:40 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2026.04.25 17:58:40 - OpenVPN > [Alwaid] Peer Connection Initiated with [AF_INET]184.75.221.109:443 . 2026.04.25 17:58:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.154.1,dhcp-option DNS6 fde6:7a:7d20:49a::1,tun-ipv6,route-gateway 10.8.154.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:49a::1061/64 fde6:7a:7d20:49a::1,ifconfig 10.8.154.99 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2026.04.25 17:58:41 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2026.04.25 17:58:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.8.154.1' . 2026.04.25 17:58:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:49a::1' . 2026.04.25 17:58:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2026.04.25 17:58:41 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2026.04.25 17:58:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2026.04.25 17:58:41 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2026.04.25 17:58:41 - OpenVPN > OPTIONS IMPORT: peer-id set . 2026.04.25 17:58:41 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2026.04.25 17:58:41 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2026.04.25 17:58:41 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2026.04.25 17:58:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 17:58:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 17:58:41 - OpenVPN > interactive service msg_channel=0 . 2026.04.25 17:58:41 - OpenVPN > open_tun . 2026.04.25 17:58:41 - OpenVPN > wintun device [Eddie] opened . 2026.04.25 17:58:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.8.154.99 255.255.255.0 . 2026.04.25 17:58:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all . 2026.04.25 17:58:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all . 2026.04.25 17:58:41 - OpenVPN > IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 17:58:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:49a::1061/128 store=active . 2026.04.25 17:58:41 - OpenVPN > add_route_ipv6(fde6:7a:7d20:49a::/64 -> fde6:7a:7d20:49a::1061 metric 0) dev Eddie . 2026.04.25 17:58:41 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:49a::/64 51 fe80::8 store=active . 2026.04.25 17:58:41 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2026.04.25 17:58:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all . 2026.04.25 17:58:41 - OpenVPN > IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 17:58:41 - OpenVPN > Initialization Sequence Completed . 2026.04.25 17:58:42 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2026.04.25 17:58:42 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2026.04.25 17:58:42 - DNS leak protection with packet filtering enabled. . 2026.04.25 17:58:42 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.8.154.1) . 2026.04.25 17:58:42 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:49a::1) . 2026.04.25 17:58:42 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:58:43 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:58:43 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:58:44 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:58:44 - Routes, add 184.75.221.107/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:58:44 - Routes, add 2606:6080:1001:30:5f94:f242:c829:1017/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 17:58:44 - Flushing DNS I 2026.04.25 17:58:45 - Checking route IPv4 . 2026.04.25 17:59:54 - Checking route (4° try) . 2026.04.25 18:00:19 - Checking route (5° try) E 2026.04.25 18:00:40 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2026.04.25 18:00:40 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 18:00:40 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 18:00:40 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 18:00:40 - Above log line repeated 8 times more ! 2026.04.25 18:00:40 - Disconnecting . 2026.04.25 18:00:40 - Sending soft termination signal . 2026.04.25 18:00:43 - OpenVPN > SIGTERM received, sending exit notification to peer . 2026.04.25 18:00:45 - OpenVPN > Closing TUN/TAP interface . 2026.04.25 18:00:45 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:49a::/64) . 2026.04.25 18:00:45 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:49a::/64 51 fe80::8 store=active . 2026.04.25 18:00:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:49a::1061 store=active . 2026.04.25 18:00:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.8.154.99 store=active . 2026.04.25 18:00:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2026.04.25 18:00:46 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:00:46 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:00:47 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:00:47 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:00:47 - Routes, skipped for 184.75.221.109 : IPv4 Net gateway not available. . 2026.04.25 18:00:47 - Routes, delete 184.75.221.107/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:00:48 - Routes, delete 2606:6080:1001:30:5f94:f242:c829:1017/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:00:48 - Routes, skipped for 184.75.221.109 : IPv4 Net gateway not available. . 2026.04.25 18:00:48 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 18:00:48 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 18:00:48 - DNS leak protection with packet filtering disabled. . 2026.04.25 18:00:48 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2026.04.25 18:00:48 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2026.04.25 18:00:48 - Connection terminated. I 2026.04.25 18:00:51 - Checking authorization ... . 2026.04.25 18:00:52 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" ! 2026.04.25 18:00:52 - Connecting to Avior (Canada, Toronto, Ontario) . 2026.04.25 18:00:52 - Routes, skipped for 184.75.223.237 : IPv4 Net gateway not available. . 2026.04.25 18:00:52 - Routes, skipped for 184.75.223.237 : IPv4 Net gateway not available. . 2026.04.25 18:00:52 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2026.04.25 18:00:52 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2026.04.25 18:00:52 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2026.04.25 18:00:52 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 18:00:52 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 18:00:52 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 18:00:52 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 18:00:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.237:443 . 2026.04.25 18:00:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2026.04.25 18:00:52 - OpenVPN > UDP link local: (not bound) . 2026.04.25 18:00:52 - OpenVPN > UDP link remote: [AF_INET]184.75.223.237:443 . 2026.04.25 18:00:54 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.237:443, sid=87d0561d 83d8c7d9 . 2026.04.25 18:00:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2026.04.25 18:00:54 - OpenVPN > VERIFY KU OK . 2026.04.25 18:00:54 - OpenVPN > Validating certificate extended key usage . 2026.04.25 18:00:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2026.04.25 18:00:54 - OpenVPN > VERIFY EKU OK . 2026.04.25 18:00:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org . 2026.04.25 18:00:54 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2026.04.25 18:00:54 - OpenVPN > [Avior] Peer Connection Initiated with [AF_INET]184.75.223.237:443 . 2026.04.25 18:00:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.250.1,dhcp-option DNS6 fde6:7a:7d20:6fa::1,tun-ipv6,route-gateway 10.10.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6fa::106f/64 fde6:7a:7d20:6fa::1,ifconfig 10.10.250.113 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2026.04.25 18:00:55 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2026.04.25 18:00:55 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.10.250.1' . 2026.04.25 18:00:55 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6fa::1' . 2026.04.25 18:00:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2026.04.25 18:00:55 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2026.04.25 18:00:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2026.04.25 18:00:55 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2026.04.25 18:00:55 - OpenVPN > OPTIONS IMPORT: peer-id set . 2026.04.25 18:00:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2026.04.25 18:00:55 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2026.04.25 18:00:55 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2026.04.25 18:00:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 18:00:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 18:00:55 - OpenVPN > interactive service msg_channel=0 . 2026.04.25 18:00:55 - OpenVPN > open_tun . 2026.04.25 18:00:55 - OpenVPN > wintun device [Eddie] opened . 2026.04.25 18:00:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.10.250.113 255.255.255.0 . 2026.04.25 18:00:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all . 2026.04.25 18:00:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all . 2026.04.25 18:00:55 - OpenVPN > IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 18:00:55 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:6fa::106f/128 store=active . 2026.04.25 18:00:55 - OpenVPN > add_route_ipv6(fde6:7a:7d20:6fa::/64 -> fde6:7a:7d20:6fa::106f metric 0) dev Eddie . 2026.04.25 18:00:56 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:6fa::/64 51 fe80::8 store=active . 2026.04.25 18:00:56 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2026.04.25 18:00:56 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all . 2026.04.25 18:00:56 - OpenVPN > IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 18:00:56 - OpenVPN > Initialization Sequence Completed . 2026.04.25 18:00:56 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2026.04.25 18:00:56 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2026.04.25 18:00:56 - DNS leak protection with packet filtering enabled. . 2026.04.25 18:00:56 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.10.250.1) . 2026.04.25 18:00:56 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:6fa::1) . 2026.04.25 18:00:57 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:00:57 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:00:58 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:00:58 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:00:59 - Routes, add 184.75.223.235/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:00:59 - Routes, add 2606:6080:1002:9:ffc4:b9c1:20ad:82f9/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:00:59 - Flushing DNS I 2026.04.25 18:00:59 - Checking route IPv4 . 2026.04.25 18:02:08 - Checking route (4° try) . 2026.04.25 18:02:34 - Checking route (5° try) E 2026.04.25 18:02:55 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2026.04.25 18:02:55 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 18:02:55 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 18:02:55 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 18:02:55 - Above log line repeated 18 times more ! 2026.04.25 18:02:55 - Disconnecting . 2026.04.25 18:02:55 - Sending soft termination signal . 2026.04.25 18:02:58 - OpenVPN > SIGTERM received, sending exit notification to peer . 2026.04.25 18:02:59 - OpenVPN > Closing TUN/TAP interface . 2026.04.25 18:02:59 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:6fa::/64) . 2026.04.25 18:02:59 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:6fa::/64 51 fe80::8 store=active . 2026.04.25 18:02:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:6fa::106f store=active . 2026.04.25 18:02:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.10.250.113 store=active . 2026.04.25 18:02:59 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2026.04.25 18:03:00 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:03:00 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:03:01 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:03:01 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:03:01 - Routes, skipped for 184.75.223.237 : IPv4 Net gateway not available. . 2026.04.25 18:03:01 - Routes, delete 184.75.223.235/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:03:02 - Routes, delete 2606:6080:1002:9:ffc4:b9c1:20ad:82f9/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:03:02 - Routes, skipped for 184.75.223.237 : IPv4 Net gateway not available. . 2026.04.25 18:03:02 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 18:03:02 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 18:03:02 - DNS leak protection with packet filtering disabled. . 2026.04.25 18:03:02 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2026.04.25 18:03:02 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2026.04.25 18:03:02 - Connection terminated. I 2026.04.25 18:03:05 - Checking authorization ... . 2026.04.25 18:03:06 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" ! 2026.04.25 18:03:06 - Connecting to Tyl (Canada, Toronto, Ontario) . 2026.04.25 18:03:06 - Routes, skipped for 184.75.223.205 : IPv4 Net gateway not available. . 2026.04.25 18:03:06 - Routes, skipped for 184.75.223.205 : IPv4 Net gateway not available. . 2026.04.25 18:03:06 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2026.04.25 18:03:06 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2026.04.25 18:03:06 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2026.04.25 18:03:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 18:03:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 18:03:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 18:03:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 18:03:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.205:443 . 2026.04.25 18:03:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2026.04.25 18:03:06 - OpenVPN > UDP link local: (not bound) . 2026.04.25 18:03:06 - OpenVPN > UDP link remote: [AF_INET]184.75.223.205:443 . 2026.04.25 18:03:06 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.205:443, sid=a12a8735 887deafc . 2026.04.25 18:03:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2026.04.25 18:03:06 - OpenVPN > VERIFY KU OK . 2026.04.25 18:03:06 - OpenVPN > Validating certificate extended key usage . 2026.04.25 18:03:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2026.04.25 18:03:06 - OpenVPN > VERIFY EKU OK . 2026.04.25 18:03:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tyl, emailAddress=info@airvpn.org . 2026.04.25 18:03:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2026.04.25 18:03:06 - OpenVPN > [Tyl] Peer Connection Initiated with [AF_INET]184.75.223.205:443 . 2026.04.25 18:03:06 - OpenVPN > SENT CONTROL [Tyl]: 'PUSH_REQUEST' (status=1) . 2026.04.25 18:03:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.218.1,dhcp-option DNS6 fde6:7a:7d20:1bda::1,tun-ipv6,route-gateway 10.31.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1bda::1053/64 fde6:7a:7d20:1bda::1,ifconfig 10.31.218.85 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2026.04.25 18:03:06 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2026.04.25 18:03:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.31.218.1' . 2026.04.25 18:03:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1bda::1' . 2026.04.25 18:03:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2026.04.25 18:03:06 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2026.04.25 18:03:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2026.04.25 18:03:06 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2026.04.25 18:03:06 - OpenVPN > OPTIONS IMPORT: peer-id set . 2026.04.25 18:03:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2026.04.25 18:03:06 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2026.04.25 18:03:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2026.04.25 18:03:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 18:03:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 18:03:06 - OpenVPN > interactive service msg_channel=0 . 2026.04.25 18:03:06 - OpenVPN > open_tun . 2026.04.25 18:03:06 - OpenVPN > wintun device [Eddie] opened . 2026.04.25 18:03:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.31.218.85 255.255.255.0 . 2026.04.25 18:03:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all . 2026.04.25 18:03:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all . 2026.04.25 18:03:07 - OpenVPN > IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 18:03:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:1bda::1053/128 store=active . 2026.04.25 18:03:07 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1bda::/64 -> fde6:7a:7d20:1bda::1053 metric 0) dev Eddie . 2026.04.25 18:03:07 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1bda::/64 51 fe80::8 store=active . 2026.04.25 18:03:07 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2026.04.25 18:03:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all . 2026.04.25 18:03:07 - OpenVPN > IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 18:03:07 - OpenVPN > Initialization Sequence Completed . 2026.04.25 18:03:07 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2026.04.25 18:03:07 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2026.04.25 18:03:07 - DNS leak protection with packet filtering enabled. . 2026.04.25 18:03:08 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.31.218.1) . 2026.04.25 18:03:08 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1bda::1) . 2026.04.25 18:03:08 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:03:09 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:03:09 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:03:09 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:03:10 - Routes, add 184.75.223.203/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:03:10 - Routes, add 2606:6080:1002:5:a1ba:b510:7908:829e/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:03:10 - Flushing DNS I 2026.04.25 18:03:10 - Checking route IPv4 . 2026.04.25 18:04:20 - Checking route (4° try) . 2026.04.25 18:04:45 - Checking route (5° try) E 2026.04.25 18:05:06 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2026.04.25 18:05:06 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 18:05:06 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 18:05:06 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 18:05:06 - Above log line repeated 18 times more ! 2026.04.25 18:05:06 - Disconnecting . 2026.04.25 18:05:06 - Sending soft termination signal . 2026.04.25 18:05:09 - OpenVPN > SIGTERM received, sending exit notification to peer . 2026.04.25 18:05:10 - OpenVPN > Closing TUN/TAP interface . 2026.04.25 18:05:10 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1bda::/64) . 2026.04.25 18:05:10 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1bda::/64 51 fe80::8 store=active . 2026.04.25 18:05:11 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:1bda::1053 store=active . 2026.04.25 18:05:11 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.31.218.85 store=active . 2026.04.25 18:05:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2026.04.25 18:05:11 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:05:12 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:05:12 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:05:13 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:05:13 - Routes, skipped for 184.75.223.205 : IPv4 Net gateway not available. . 2026.04.25 18:05:13 - Routes, delete 184.75.223.203/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:05:13 - Routes, delete 2606:6080:1002:5:a1ba:b510:7908:829e/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:05:13 - Routes, skipped for 184.75.223.205 : IPv4 Net gateway not available. . 2026.04.25 18:05:13 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 18:05:13 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 18:05:13 - DNS leak protection with packet filtering disabled. . 2026.04.25 18:05:14 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2026.04.25 18:05:14 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2026.04.25 18:05:14 - Connection terminated. I 2026.04.25 18:05:17 - Checking authorization ... . 2026.04.25 18:05:17 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" ! 2026.04.25 18:05:17 - Connecting to Elgafar (Canada, Toronto, Ontario) . 2026.04.25 18:05:17 - Routes, skipped for 198.44.157.61 : IPv4 Net gateway not available. . 2026.04.25 18:05:17 - Routes, skipped for 198.44.157.61 : IPv4 Net gateway not available. . 2026.04.25 18:05:18 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2026.04.25 18:05:18 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2026.04.25 18:05:18 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2026.04.25 18:05:18 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 18:05:18 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 18:05:18 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 18:05:18 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 18:05:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.157.61:443 . 2026.04.25 18:05:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2026.04.25 18:05:18 - OpenVPN > UDP link local: (not bound) . 2026.04.25 18:05:18 - OpenVPN > UDP link remote: [AF_INET]198.44.157.61:443 . 2026.04.25 18:05:18 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.157.61:443, sid=937a0ab1 4fefae6f . 2026.04.25 18:05:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2026.04.25 18:05:18 - OpenVPN > VERIFY KU OK . 2026.04.25 18:05:18 - OpenVPN > Validating certificate extended key usage . 2026.04.25 18:05:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2026.04.25 18:05:18 - OpenVPN > VERIFY EKU OK . 2026.04.25 18:05:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Elgafar, emailAddress=info@airvpn.org . 2026.04.25 18:05:18 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2026.04.25 18:05:18 - OpenVPN > [Elgafar] Peer Connection Initiated with [AF_INET]198.44.157.61:443 . 2026.04.25 18:05:18 - OpenVPN > SENT CONTROL [Elgafar]: 'PUSH_REQUEST' (status=1) . 2026.04.25 18:05:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.78.154.1,dhcp-option DNS6 fde6:7a:7d20:4a9a::1,tun-ipv6,route-gateway 10.78.154.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:4a9a::106f/64 fde6:7a:7d20:4a9a::1,ifconfig 10.78.154.113 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2026.04.25 18:05:18 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2026.04.25 18:05:18 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.78.154.1' . 2026.04.25 18:05:18 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:4a9a::1' . 2026.04.25 18:05:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2026.04.25 18:05:18 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2026.04.25 18:05:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2026.04.25 18:05:18 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2026.04.25 18:05:18 - OpenVPN > OPTIONS IMPORT: peer-id set . 2026.04.25 18:05:18 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2026.04.25 18:05:18 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2026.04.25 18:05:18 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2026.04.25 18:05:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 18:05:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 18:05:18 - OpenVPN > interactive service msg_channel=0 . 2026.04.25 18:05:18 - OpenVPN > open_tun . 2026.04.25 18:05:18 - OpenVPN > wintun device [Eddie] opened . 2026.04.25 18:05:19 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.78.154.113 255.255.255.0 . 2026.04.25 18:05:19 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all . 2026.04.25 18:05:19 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all . 2026.04.25 18:05:19 - OpenVPN > IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 18:05:19 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:4a9a::106f/128 store=active . 2026.04.25 18:05:19 - OpenVPN > add_route_ipv6(fde6:7a:7d20:4a9a::/64 -> fde6:7a:7d20:4a9a::106f metric 0) dev Eddie . 2026.04.25 18:05:19 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:4a9a::/64 51 fe80::8 store=active . 2026.04.25 18:05:19 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2026.04.25 18:05:19 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all . 2026.04.25 18:05:19 - OpenVPN > IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 18:05:19 - OpenVPN > Initialization Sequence Completed . 2026.04.25 18:05:19 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2026.04.25 18:05:19 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2026.04.25 18:05:19 - DNS leak protection with packet filtering enabled. . 2026.04.25 18:05:19 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.78.154.1) . 2026.04.25 18:05:20 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:4a9a::1) . 2026.04.25 18:05:20 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:05:20 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:05:21 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:05:21 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:05:22 - Routes, add 198.44.157.162/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:05:22 - Routes, add 2607:9000:600:22:ac5e:c05a:ff67:b587/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:05:22 - Flushing DNS I 2026.04.25 18:05:22 - Checking route IPv4 . 2026.04.25 18:06:31 - Checking route (4° try) . 2026.04.25 18:06:57 - Checking route (5° try) E 2026.04.25 18:07:18 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2026.04.25 18:07:18 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 18:07:18 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 18:07:18 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 18:07:18 - Above log line repeated 20 times more ! 2026.04.25 18:07:18 - Disconnecting . 2026.04.25 18:07:18 - Sending soft termination signal . 2026.04.25 18:07:21 - OpenVPN > SIGTERM received, sending exit notification to peer . 2026.04.25 18:07:23 - OpenVPN > Closing TUN/TAP interface . 2026.04.25 18:07:23 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:4a9a::/64) . 2026.04.25 18:07:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:4a9a::/64 51 fe80::8 store=active . 2026.04.25 18:07:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:4a9a::106f store=active . 2026.04.25 18:07:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.78.154.113 store=active . 2026.04.25 18:07:23 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2026.04.25 18:07:24 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:07:24 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:07:24 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:07:25 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:07:25 - Routes, skipped for 198.44.157.61 : IPv4 Net gateway not available. . 2026.04.25 18:07:25 - Routes, delete 198.44.157.162/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:07:26 - Routes, delete 2607:9000:600:22:ac5e:c05a:ff67:b587/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:07:26 - Routes, skipped for 198.44.157.61 : IPv4 Net gateway not available. . 2026.04.25 18:07:26 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 18:07:26 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 18:07:26 - DNS leak protection with packet filtering disabled. . 2026.04.25 18:07:26 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2026.04.25 18:07:26 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2026.04.25 18:07:26 - Connection terminated. . 2026.04.25 18:07:29 - Waiting for latency tests (254 to go) . 2026.04.25 18:07:30 - Waiting for latency tests (228 to go) . 2026.04.25 18:07:31 - Waiting for latency tests (2 to go) I 2026.04.25 18:07:33 - Checking authorization ... . 2026.04.25 18:07:34 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel #2)" ! 2026.04.25 18:07:34 - Connecting to Chamukuy (Canada, Toronto, Ontario) . 2026.04.25 18:07:34 - Routes, skipped for 198.44.157.133 : IPv4 Net gateway not available. . 2026.04.25 18:07:34 - Routes, skipped for 198.44.157.133 : IPv4 Net gateway not available. . 2026.04.25 18:07:34 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2026.04.25 18:07:34 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2026.04.25 18:07:34 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2026.04.25 18:07:34 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 18:07:34 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 18:07:34 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2026.04.25 18:07:34 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2026.04.25 18:07:34 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.157.133:443 . 2026.04.25 18:07:34 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2026.04.25 18:07:34 - OpenVPN > UDP link local: (not bound) . 2026.04.25 18:07:34 - OpenVPN > UDP link remote: [AF_INET]198.44.157.133:443 . 2026.04.25 18:07:34 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.157.133:443, sid=c7565b12 5e4a2a33 . 2026.04.25 18:07:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2026.04.25 18:07:34 - OpenVPN > VERIFY KU OK . 2026.04.25 18:07:34 - OpenVPN > Validating certificate extended key usage . 2026.04.25 18:07:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2026.04.25 18:07:34 - OpenVPN > VERIFY EKU OK . 2026.04.25 18:07:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chamukuy, emailAddress=info@airvpn.org . 2026.04.25 18:07:34 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2026.04.25 18:07:34 - OpenVPN > [Chamukuy] Peer Connection Initiated with [AF_INET]198.44.157.133:443 . 2026.04.25 18:07:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.68.154.1,dhcp-option DNS6 fde6:7a:7d20:409a::1,tun-ipv6,route-gateway 10.68.154.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:409a::1081/64 fde6:7a:7d20:409a::1,ifconfig 10.68.154.131 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2026.04.25 18:07:34 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2026.04.25 18:07:34 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.68.154.1' . 2026.04.25 18:07:34 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:409a::1' . 2026.04.25 18:07:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2026.04.25 18:07:34 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2026.04.25 18:07:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2026.04.25 18:07:34 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2026.04.25 18:07:34 - OpenVPN > OPTIONS IMPORT: peer-id set . 2026.04.25 18:07:34 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2026.04.25 18:07:34 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2026.04.25 18:07:34 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2026.04.25 18:07:34 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 18:07:34 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2026.04.25 18:07:34 - OpenVPN > interactive service msg_channel=0 . 2026.04.25 18:07:34 - OpenVPN > open_tun . 2026.04.25 18:07:34 - OpenVPN > wintun device [Eddie] opened . 2026.04.25 18:07:35 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 51 static 10.68.154.131 255.255.255.0 . 2026.04.25 18:07:35 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 51 all . 2026.04.25 18:07:35 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 51 all . 2026.04.25 18:07:35 - OpenVPN > IPv4 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 18:07:35 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 51 fde6:7a:7d20:409a::1081/128 store=active . 2026.04.25 18:07:35 - OpenVPN > add_route_ipv6(fde6:7a:7d20:409a::/64 -> fde6:7a:7d20:409a::1081 metric 0) dev Eddie . 2026.04.25 18:07:35 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:409a::/64 51 fe80::8 store=active . 2026.04.25 18:07:35 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2026.04.25 18:07:35 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 51 all . 2026.04.25 18:07:35 - OpenVPN > IPv6 MTU set to 1500 on interface 51 using SetIpInterfaceEntry() . 2026.04.25 18:07:35 - OpenVPN > Initialization Sequence Completed . 2026.04.25 18:07:35 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2026.04.25 18:07:35 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2026.04.25 18:07:35 - DNS leak protection with packet filtering enabled. . 2026.04.25 18:07:36 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.68.154.1) . 2026.04.25 18:07:36 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:409a::1) . 2026.04.25 18:07:36 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:07:37 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:07:37 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:07:37 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:07:38 - Routes, add 198.44.157.178/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:07:38 - Routes, add 2607:9000:600:23:4ad4:e968:c493:fc24/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:07:38 - Flushing DNS I 2026.04.25 18:07:38 - Checking route IPv4 . 2026.04.25 18:08:48 - Checking route (4° try) . 2026.04.25 18:09:09 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 18:09:09 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 18:09:09 - OpenVPN > write UDP: Unknown error (code=10065) . 2026.04.25 18:09:09 - Above log line repeated 13 times more ! 2026.04.25 18:09:09 - Disconnecting . 2026.04.25 18:09:09 - Sending soft termination signal . 2026.04.25 18:09:12 - OpenVPN > SIGTERM received, sending exit notification to peer . 2026.04.25 18:09:13 - OpenVPN > Closing TUN/TAP interface . 2026.04.25 18:09:13 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:409a::/64) . 2026.04.25 18:09:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:409a::/64 51 fe80::8 store=active . 2026.04.25 18:09:13 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 51 fde6:7a:7d20:409a::1081 store=active . 2026.04.25 18:09:13 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 51 10.68.154.131 store=active . 2026.04.25 18:09:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2026.04.25 18:09:14 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:09:14 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:09:14 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:09:15 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:09:15 - Routes, skipped for 198.44.157.133 : IPv4 Net gateway not available. . 2026.04.25 18:09:15 - Routes, delete 198.44.157.178/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:09:15 - Routes, delete 2607:9000:600:23:4ad4:e968:c493:fc24/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2026.04.25 18:09:15 - Routes, skipped for 198.44.157.133 : IPv4 Net gateway not available. . 2026.04.25 18:09:15 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 18:09:15 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2026.04.25 18:09:15 - DNS leak protection with packet filtering disabled. . 2026.04.25 18:09:16 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2026.04.25 18:09:16 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2026.04.25 18:09:16 - Connection terminated. I 2026.04.25 18:09:16 - Cancel requested. ! 2026.04.25 18:09:16 - Session terminated. . 2026.04.25 18:16:10 - Collect information about AirVPN completed . 2026.04.25 18:46:12 - Collect information about AirVPN completed ! 2026.04.25 18:57:05 - Deactivation of Network Lock
-
-
Guest reacted to a post in a topic:
Fallback test timeout and duplicate dns test result. Is everyone having these issues or just me? ...
-
Hello Guys, I've been an satisfied AirVPN client for over 10 years, this past month I've noticed that the Singapore servers which I mainly use now have a latency that's very poor (I'm in S.E Asia) The Eddie client is showing that Japan is better for Latency so I connect to them. While connecting to a few Singapore nodes I'm also noticing that my 1st, 2nd and 3rd hops are coming out of Romania. vlan12.as06-10g.wco1.sg.m247.ro irb-1906.agg1v.wco1.sg.m247.ro be-2-3111.bb1n.wco1.sg.m247.ro While that would explain the latency issue if I'm actually connecting to Romanian servers but I'm supposed to be using Singapore. Hopefully someone can explain the issue I'm having. Thanks
-
Linux: AirVPN Suite 2.1.0 preview available
colorman replied to Staff's topic in News and Announcement
First test: Note with ./goldcrest AirVPN_Netherlands_UDP-443-Entry3.ovpn No problem 😁 @localhost:/usr/local/bin> ./goldcrest AirVPN_Belgium_UDP-1637-Entry3.conf Goldcrest - AirVPN Bluetit Client 2.1.0 alpha 1 - 23 April 2026 2026-04-25 17:03:13 Reading run control directives from file /home/gerrit/.config/goldcrest.rc 2026-04-25 17:03:13 Bluetit - AirVPN WireGuard/OpenVPN3 Service 2.1.0 alpha 1 - 23 April 2026 2026-04-25 17:03:14 OpenVPN core 3.12 AirVPN (20260206) linux x86_64 64-bit 2026-04-25 17:03:14 Copyright (C) 2012- OpenVPN Inc. All rights reserved. 2026-04-25 17:03:14 OpenSSL 3.5.3 16 Sep 2025 2026-04-25 17:03:14 AirVPN WireGuard Client 2.0.0 Linux x86_64 64-bit 2026-04-25 17:03:14 Bluetit options successfully reset 2026-04-25 17:03:14 Requesting VPN connection to Bluetit 2026-04-25 17:03:14 Network filter and lock are using nftables 2026-04-25 17:03:14 Kernel module nf_tables is already loaded 2026-04-25 17:03:14 WARNING: firewalld is active on this system and may interfere with network filter and lock 2026-04-25 17:03:14 WARNING: firewalld is currently owning NFTables and this will prevent the system network f ilter settings to be restored and cause an error. Please set NftablesTableOwner to "no" in /etc/firewalld/fire walld.conf 2026-04-25 17:03:14 Network filter successfully initialized 2026-04-25 17:03:14 Private network is allowed to pass the network filter 2026-04-25 17:03:14 Ping output is allowed to pass the network filter 2026-04-25 17:03:14 IPv6 NDP is allowed to pass the network filter 2026-04-25 17:03:14 Local interface lo - IPv4 127.0.0.1 IPv6 ::1 2026-04-25 17:03:14 Local interface enp6s0 - IPv4 192.168.178.11 IPv6 2001:1c04:588:e400:23da:d20e:1229:fd80 I Pv6 2001:1c04:588:e400:c866:1f63:a0b9:4a41 IPv6 fe80::35a5:513a:4743:88bd 2026-04-25 17:03:14 Default IPv4 gateway via 192.168.178.1 dev enp6s0 2026-04-25 17:03:14 Default IPv6 gateway via fe80::3a17:b1ff:fe40:9189 dev enp6s0 2026-04-25 17:03:14 Starting WireGuard synchronous connection 2026-04-25 17:03:14 ERROR: gateway 192.168.178.1 on interface enp6s0 has the same metrics (2147483647) of gate way on interface . Network routing can be unpredictable in most cases. Please fix your routing table. 2026-04-25 17:03:14 Kernel module wireguard is already loaded 2026-04-25 17:03:14 WireGuard client successfully created and initialized. 2026-04-25 17:03:14 WireGuard Connect thread exception: Cannot resolve hostname 2026-04-25 17:03:14 Bluetit session terminated -
-
"Test Port" gives me a "Connection Refused" error
Staff replied to anchoby's topic in Troubleshooting and Problems
@anchoby Hello! Error 111 means that the packet reached your node but the attempted connection was actively rejected, typically through a TCP RST packet. Please follow this checklist: https://airvpn.org/forums/topic/66388-port-forwarding/?do=findComment&comment=243305 Kind regards -
Internet Blocked When Eddie VPN off
Viktor23596 replied to VortexSimp482's topic in Eddie - AirVPN Client
This happened to me, but that was eons ago and on Windows host. Eddie typically backs up the current system DNS configuration on startup and replaces it with AirVPN’s DNS servers for the duration of the VPN session. Under normal conditions, the original DNS settings are restored when the session ends. However, if the client or system shuts down unexpectedly, this restoration step may not complete. As a result, the system can be left using AirVPN DNS servers. On subsequent launches, Eddie may then back up this already-modified state instead of the original configuration, effectively losing the previous (likely DHCP-assigned) DNS settings. To resolve the issue, reset your DNS configuration [while Eddie is not running, Staff]. Go to your network settings and set IPv4 DNS to Automatic (DHCP). This will restore your system’s default DNS behavior. Regards Viktor23596 -
-
- Last week
-
-
Oh good! I'm glad I'm not going insane, because I couldn't figure it why it wasn't working. Thanks for the quick fix.
-
Hello! We see the problem. Eddie Android edition 4.0.0 is affected by a bug. When Eddie generates a profile for WireGuard or AmneziaWG, it fails to add the MTU option and the IPv6 argument for the AllowedIPs option. We have immediately patched Eddie with high priority and now version 4.0.1 is available, addressing these issues. We strongly recommend that you upgrade immediately. Thank you for having reported the problems! Please see also here: https://airvpn.org/forums/topic/80030-eddie-android-edition-401-available/ Kind regards AirVPN Support Team
-
Hello! We're very glad to inform you that Eddie Android edition 4.0.1 is now available. This is a patch release to fix a bug affecting AmneziaWG and WireGuard profile generation by Eddie. When generating a profile for WireGuard or AmneziaWG, Eddie 4.0.0 omits the MTU option and the IPv6 address space (even when it's necessary) in AllowedIPs option arguments. We strongly recommend that you upgrade immediately. Eddie Android edition 4.0.1 is available on our web site and the Google Play Store. Any other feature is described by the 4.0.0 version announcement, available here: https://airvpn.org/forums/topic/79743-eddie-android-edition-400-available/ Kind regards & datalove AirVPN Staff
-
-
Hello. I'm new to AirVPN. So I'm trying to set up Airvpn + Qbittorrent and I'm having some troubles. I get a "Connection Refused" error when testing the port. I have opened the port in my firewall (30105) and It's also set in qbittorrent. Network Interface is also set to airvpn. I'm using the OpenVPN UDP config from the generator on the website. Continent: Europe, OS: Linux CachyOS.
-
-
-
Guest started following macOS: Hummingbird 2.0.0 available ...
-
I use WireGuard as default and OpenVPN with some special ports as "backup" in cases where I cannot connect via regular WireGuard (though this has rarely happened).
-
-
+1 for the HaGeZi Multi Pro blocklist. (the Pro++ may be too aggressive and might cause things to break I think - that's why the "regular" Pro is IMHO better suited)
-
-
VPN works intermittently - Beginner help
spinmaster replied to ExplosiveKoala's topic in Eddie - AirVPN Client
A couple of things I observed from the "not working" log: ipv4-default-gateway: 25.255.255.254 interface: ZeroTier Virtual Port your default route is not your router (192.168.1.1) it’s your ZeroTier interface Test DNS IPv6: Failed Test Ping IPv6: Failed IPv6 seems broken ... Looks like a conflict between OpenVPN via Eddie and the ZeroTier virtual networking. Can you temporarily disable ZeroTier and check if you can connect with Eddie? -
There are the two configs. The first one works, generated by the site I linked to. The second one does not, and was generated by Eddie for Android 4.0. # Phoenix - Guniibuu [Interface] PrivateKey = Address = 10.191.122.99/32,fd7d:76ee:e68f:a993:4abf:faec:ddcf:7af4/128 DNS = 10.128.0.1, fd7d:76ee:e68f:a993::1 MTU = 1420 Jc = 5 Jmin = 10 Jmax = 40 S1 = 0 S2 = 0 H1 = 1 H2 = 2 H3 = 3 H4 = 4 [Peer] PublicKey = PresharedKey = AllowedIPs = 0.0.0.0/0, ::/0 Endpoint = 198.44.133.70:1637 [Interface] Address = 10.191.122.99/32, fd7d:76ee:e68f:a993:4abf:faec:ddcf:7af4/128 PrivateKey = DNS = 10.128.0.1, fd7d:76ee:e68f:a993::1 Jc = 5 Jmin = 10 Jmax = 30 S1 = 0 S2 = 0 H1 = 2 H2 = 4 H3 = 1 H4 = 3 [Peer] PublicKey = PresharedKey = Endpoint = 198.44.133.67:1637 AllowedIPs = 0.0.0.0/0
-
Hello! We're very glad to inform you that AirVPN Suite version 2.1.0 alpha 1 is now available for x86-64 based Linux systems. Builds for ARM architectures will be available in the near future. AirVPN Suite 2.1.0 development focuses on bug fixes, improved IPv6 management and aims at a quick release. New features are planned for the major new version (probably 3.0.0) which is planned to offer complete AmneziaWG support. Main changes: very large routing table should not cause Bluetit to crash anymore more accurate detection of default gateway several IPv6 addresses management fixes more accurate detection of network availability (in progress) Changelog for the AirVPN Suite 2.1.0 (complete file available in the downloadable package): Version 2.1.0 alpha 1 - 23 April 2026 [ProMIND] updated to OpenVPN-AirVPN 3.12 (20260206) airvpntools [ProMIND] added new method capitalizeWord() network [ProMIND] getGatewayFromRouteTable(): msgBuf is now dynamically allocated (currently to 32KiB) [ProMIND] getGatewayFromRouteTable(): socket's receive buffer set to 1MiB [ProMIND] getGatewayFromRouteTable(): revised code for a more strict and reliable scan [ProMIND] added methods isValidIPAddress(), isValidIPv4() and isValidIPv6() [ProMIND] parseIpSpecification(): fixed IPv6 specification handling wireguardclient [ProMIND] setup(): check validity for both IPv4 and IPv6 gateways [ProMIND] profileNeedsResolution(): fixed IPv6 address handling [ProMIND] setConfiguration(): fixed IPv6 address handling [ProMIND] resolveProfile(): fixed IPv6 address handling URL to download the tarball (please note that packages for ARM architectures will be available in the near future): https://eddie.website/repository/AirVPN-Suite/2.1.0-alpha1/AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz SHA-2: https://eddie.website/repository/AirVPN-Suite/2.1.0-alpha1/AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz.sha512 $ sha256sum AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz fcc74f7941b6c1b4215e9820d2fc959fb17957fbbdb7d149a1a128930f05038d AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz If you wish to test, thank you very much! Please feel free to report here any bug and malfunction you find! Kind regards & datalove AirVPN Staff
