All Activity
This stream auto-updates
- Past hour
-
-
-
- Today
-
-
-
-
-
-
-
-
Eddie Android edition 4.0.0 preview available
EMULE replied to Staff's topic in News and Announcement
Get two more logs. Eddie_1 is a log showing a failed attempt to send a message by clicking the paper airplane icon without connecting to the server. Eddie_2 is my server connection. When I click the paper airplane icon, the connection fails to send, the program crashes and restarts, disconnects, and then I reconnect, only to see the connection failure log displayed. In addition to the system reporting a sending failure, I also discovered a parameter issue in a custom AmneziaWG command. When randomly generating the corresponding AmneziaWG parameters for the WireGuard and AmneziaWG servers, if the Jc parameter generates a value greater than 10, it will become Jc=10 after clicking OK. When randomly generating the corresponding AmneziaWG parameters for the AmneziaWG server, not only the Jc parameter has the above problem, but S1 and S2 also have this problem. Once the randomly generated S1 is greater than 64 and S2 is greater than 64, they will all become S1=64 and S2=64 after being determined. Are there maximum value limits for these parameters? If so, should these parameter values be limited during random generation? However, I can clearly use Jc=20 in the AmneziaWG client on my computer. Is this an Eddie issue? I found that the configuration parameters for the AmneziaWG native server are more complex than those for the WireGuard server, which may be a key factor in my bypassing the GFW? I am looking forward to the arrival of the AmneziaWG native server.😄😄😄 Eddie_1.txt Eddie_2.txt -
Handshake for peer did not complete after 5 seconds
EMULE replied to HermanMunster107's topic in Troubleshooting and Problems
Hello. It seems you are also living under the firewall. Your logs are the same as WireGuard's logs in China now, and they are identified and blocked by the firewall. Please try the advanced obfuscation options. AirVPN offers: OpenVPN over SSH, SSL, TOR and AmneziaWG. The AmneziaWG option is currently in the testing phase. For detailed usage instructions, please find tutorials on the AirVPN website. If you are using the eddie client on your computer, you can uncheck "Automatic" and select a specific obfuscated protocol in Settings - Protocols. -
EMULE reacted to a post in a topic:
After switch Mac from M1 to M4 (same OS 15.7.2) Eddie now doesnt show Up/Down speed anymore ...
- Yesterday
-
-
I must commend the AI here – I wouldn't have thought of asking you whether you installed Eddie from scratch or copied over the profile. Most of the times those AIs catch mentions of one or two words in contexts of other words and hallucinate about the rest of the meaning, but this one was a good answer.
-
openvpn 2.6.14, remote random, router I removed push-peer-info setenv UV_IPV6 yes I added "4" to tcp, which log confirms proto tcp4 airvpn keeps trying to push ipv6, but since router is strict ipv4 only Linux can't add IPv6 to interface tun0 Exiting due to fatal error this keeps going a few hundred times, random servers, until suddenly some server (seems variable) no longer tries to push ipv6 and connection gets established. I tried also, to no avail pull-filter ignore "ifconfig-ipv6" pull-filter ignore "route-ipv6" setenv UV_IPV6=no setenv UV_IPV6 no Which ovpn file or other setting would get rid of airvpn pushing ipv6?
-
-
Hello. I am getting an usual amount of these errors in my logs in the past 24 hours to the point where I don't have a stable VPN connection anymore. The initial connection is clean but subsequent handshakes timeout. Any insight as how to proceed to solve/diagnose this would be greatly appreciated! . 2025.12.14 10:09:27 - Routes, add 0.0.0.0/1 for interface "Eddie (WireGuard Tunnel)". . 2025.12.14 10:09:27 - Routes, add 128.0.0.0/1 for interface "Eddie (WireGuard Tunnel)". . 2025.12.14 10:09:27 - Routes, add ::/1 for interface "Eddie (WireGuard Tunnel)". . 2025.12.14 10:09:28 - Routes, add 8000::/1 for interface "Eddie (WireGuard Tunnel)". . 2025.12.14 10:09:28 - Routes, add 139.28.218.235/32 for interface "Eddie (WireGuard Tunnel)". . 2025.12.14 10:09:28 - Routes, add 2a0d:5600:9:3f:3a9b:a7b9:b7c1:498/128 for interface "Eddie (WireGuard Tunnel)". . 2025.12.14 10:09:28 - Flushing DNS I 2025.12.14 10:09:28 - Checking route IPv4 I 2025.12.14 10:09:28 - Checking route IPv6 I 2025.12.14 10:09:38 - Checking DNS . 2025.12.14 10:09:39 - Collect network information ! 2025.12.14 10:09:39 - Connected. . 2025.12.14 10:09:39 - WireGuard > Startup complete . 2025.12.14 10:12:28 - WireGuard > Retrying handshake with peer 1 (139.28.218.237:1637) because we stopped hearing back after 15 seconds . 2025.12.14 10:12:33 - WireGuard > Handshake for peer 1 (139.28.218.237:1637) did not complete after 5 seconds, retrying (try 2) . 2025.12.14 10:12:38 - WireGuard > Handshake for peer 1 (139.28.218.237:1637) did not complete after 5 seconds, retrying (try 3) . 2025.12.14 10:12:43 - WireGuard > Retrying handshake with peer 1 (139.28.218.237:1637) because we stopped hearing back after 15 seconds . 2025.12.14 10:12:48 - WireGuard > Handshake for peer 1 (139.28.218.237:1637) did not complete after 5 seconds, retrying (try 2) . 2025.12.14 10:12:53 - WireGuard > Handshake for peer 1 (139.28.218.237:1637) did not complete after 5 seconds, retrying (try 3) . 2025.12.14 10:12:58 - WireGuard > Handshake for peer 1 (139.28.218.237:1637) did not complete after 5 seconds, retrying (try 4) . 2025.12.14 10:12:59 - WireGuard > Retrying handshake with peer 1 (139.28.218.237:1637) because we stopped hearing back after 15 seconds . 2025.12.14 10:13:03 - WireGuard > Handshake for peer 1 (139.28.218.237:1637) did not complete after 5 seconds, retrying (try 2) . 2025.12.14 10:13:08 - WireGuard > Handshake for peer 1 (139.28.218.237:1637) did not complete after 5 seconds, retrying (try 3)
-
-
-
ANSWERED Solved! Port Forwarding > No route to host (113)
Staff replied to anwnymos's topic in Troubleshooting and Problems
Hello! Therefore the issue should have a different cause and this is probably not the proper thread. Please open a ticket and/or a different thread at your convenience, after you have reviewed this checklist: https://airvpn.org/forums/topic/66388-port-forwarding/?do=findComment&comment=243305 Kind regards -
Eddie Android edition 4.0.0 preview available
Staff replied to Staff's topic in News and Announcement
Hello! If you can manage to store locally the report (try to tap the diskette "Save" icon) or you can manage to send the report via mail (try to tap the triangular "Share" icon) the logcat that Eddie includes could still contain a dump/trace of the previous crash, even if you had to re-start the app. Please send it to our support team (support@airvpn.org) or publish here, as you prefer. If there's no way to do it, please try to describe accurately all the steps that you perform, as well as the settings you configured, to help us reproduce the crash that occurs while Eddie is connected to a VPN server. Kind regards -
Hello! Yes, not PiedPiper but Richard himself only, when he stepped down as CEO of PiedPiper, although his vision was even greater because he thought about a mesh network between cell phones with a p2p-like layer not necessarily over any TCP/IP stack. Of course he had his revolutionary lossless compression algorithm, that we don't have in our universe. On the other hand, other observers have noted that the series producers might have had in mind something like a blockchain-based distributed storage network. Kind regards
-
Eddie Android edition 4.0.0 preview available
EMULE replied to Staff's topic in News and Announcement
I can't send a complete system report. Once I click the paper airplane icon, Eddie crashes and restarts, losing all previous reports. The live logs show an error, which I vaguely recall is caused by a connection reset. Even when I'm connected to the AirVPN server, Eddie still crashes and restarts. After some effort, I finally managed to capture the error log. Eddie_日志已创建在_14_Dec_2025_09_12_01_UTC_上.txt -
Eddie Android edition 4.0.0 preview available
EMULE replied to Staff's topic in News and Announcement
Hello. Today I installed the eddie v4.0.0 beta version on my Android phone and connected to AmneziaWG to perform a speed test. The following file is the log report. I can sense that AmneziaWG seems to have been speed-limited recently; the speed isn't as fast as when I first started using it. With CPS disabled, AmneziaWG was the slowest, with the connection speed limited to about 10KB/s for a short while before rebounding to a maximum of 500KB/s. Enabling CPS and trying QUIC emulation resulted in the fastest speed, reaching approximately 2MB/s. However, the speed was sometimes throttled to 300KB/s and as low as 10KB/s. On my most frequently used servers in Belgium and the United States, Wireguard port 1637 was usually available, whereas previously it was always unavailable on the Belgian server. When attempting DNS emulation, the speed was roughly the same as without CPS enabled. The connection was briefly throttled to 10KB/s, but after waiting, it recovered to 200KB/s, with a maximum speed of about 800KB/s. However, most of the time the speed was slower than AmneziaWG without CPS enabled. The QUIC emulation is currently performing well, and the speed may be even faster once the WireGuard server fully supports AmneziaWG, since it is currently only a test version. I'm confused as to why AmneziaWG is still being throttled. According to AmneziaVPN's advertising, shouldn't the AmneziaWG protocol be unrecognized by DPI? I suspect it's due to ISP generally limiting UDP speeds. Even when I turn off my VPN software and browse websites allowed in China, some content still buffers. However, there is no doubt that the availability of the AmneziaWG protocol is the highest among the protocols currently offered by AirVPN. SSH, SSL and other standard protocols do not perform as well as AmneziaWG in my experience. Although AmneziaWG is speed-limited, I can still browse the web, although download tasks are sometimes fast and sometimes slow. So far, I have not found any issues with AmneziaWG being blocked after the connection is established. After all, this is just a test so far. I'll wait until AmneziaWG is added to the Eddie PC version and then use it for a longer period of time to see how it goes. May everything turn out in a positive direction. Eddie_日志已创建在_14_Dec_2025_07_03_23_UTC_上.txt Eddie_日志已创建在_14_Dec_2025_07_14_52_UTC_上.txt -
-
Good morning, I have a Linksys 1200 and since yesterday I haven't been able to connect and I haven't changed anything, I also downloaded the configuration files again and still nothing, something must have changed?
-
- Last week
-
--- services: gluetun: cap_add: - NET_ADMIN deploy: resources: limits: cpus: '1' memory: 512m environment: - VPN_SERVICE_PROVIDER=airvpn - VPN_TYPE=wireguard - WIREGUARD_PRIVATE_KEY=... - WIREGUARD_PRESHARED_KEY=... - WIREGUARD_PUBLIC_KEY=... - SERVER_COUNTRIES=Netherlands - WIREGUARD_ADDRESSES=... - WIREGUARD_MTU=1320 - FIREWALL_OUTBOUND_SUBNETS= # Optional, access to local subnet. Adjust to your network - FIREWALL_VPN_INPUT_PORTS=51820 image: qmcgaw/gluetun:latest ports: - '38080:38080' # qBittorrent WebUI - '39696:9696' # Prowlarr WebUI - '30014:8686' # Lidarr WebUI - '30027:8989' # Sonarr WebUI - '30025:7878' # Radarr WebUI - '30055:30055' # Sabnzbd WebUI restart: unless-stopped volumes: - /mnt/apps/appdata/warez/gluetun:/gluetun qbittorrent: container_name: qbittorrent depends_on: gluetun: condition: service_healthy deploy: resources: limits: cpus: '1' memory: 1g environment: - PUID=568 - PGID=568 - TZ=Europe/London - WEBUI_PORT=38080 - TORRENTING_PORT=54811 image: lscr.io/linuxserver/qbittorrent:latest network_mode: service:gluetun volumes: - /mnt/apps/appdata/warez/qbittorrent:/config - /mnt/zfspool/downloads/torrents:/downloads/torrents/ ....... Hi, I'm attaching a snippet from my docker compose yaml which works every time, even when the tunnel reconnects. I hope it will you some troubleshooting ideas.
-
URnetwork https://ur.io There's a guest option, kinda hidden, to use the free community edition. I'm interested in anyone's comments on this service. I was also wondering if AirVPN should try something similar? And wasn't this what Pied Piper was attempting to do in the HBO TV series Silicon Valley?
-
-
Okay, I'll listen to you. You're more professional than me.😊😊😊
-
This is just how eddie works. When you add a server to the allowed list, eddie will only perform latency tests and ratings on servers in the allowed list. Therefore, I use eddie to never add any servers to the allowed list so that eddie can rate all servers. If you want to see the ratings for all servers, please remove all servers from the allowed list.
-
-
Please provide a system report, as requested. Please take the time to read what people post in order to understand it, not in order to answer them. Your logs don't show the whole truth, and the system report contains those logs, among more info like the actual OS you're using, making those useless explanations like the last part of the quote quite superfluous. Help is not a luxury hotel. You are expected to do your part. Otherwise, why should we bother spending time dragging all that info out of you if you don't bother even following the helpers' requests? @EMULE, in the future please ask explicitly for the system report instead of logs if Eddie is used. Do not encourage everyone to reask for more info. Thanks
-
-
ANSWERED Linux ip -6 addr add failed
scott210 replied to zombie1982's topic in Troubleshooting and Problems
Add me to the list of Mysteriously Impacted Years Later. Also fixed it for me -
-
Alright I'll paste the log below. If I select "show all" on the servers tab, it will show more servers but the only one with a score is Kornephoros (Toronto, Canada) and the stars are only 1.5/5 for speed and 5/5 for latency. No other servers have a rating. It also misidentifies Windows as 10, even though I am running 11. ==== . 2025.12.11 17:25:53 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.26100.0, Mono/.Net: v4.0.30319 . 2025.12.11 17:25:53 - Command line arguments (1): path="home" . 2025.12.11 17:25:57 - Reading options from C:\Users\\AppData\Local\Eddie\default.profile . 2025.12.11 17:25:59 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2025.12.11 17:25:59 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2025.12.11 17:25:59 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) ! 2025.12.11 17:26:00 - Activation of Network Lock - Windows Filtering Platform I 2025.12.11 17:26:01 - Ready . 2025.12.11 17:26:02 - Collect information about AirVPN completed I 2025.12.11 17:26:02 - Session starting. I 2025.12.11 17:26:03 - Checking authorization ... . 2025.12.11 17:26:04 - Added new network interface "Eddie", Wintun version 0.12 . 2025.12.11 17:26:04 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2025.12.11 17:26:04 - Connecting to Kornephoros (Canada, Toronto, Ontario) . 2025.12.11 17:26:04 - Collect information about AirVPN completed . 2025.12.11 17:26:04 - Routes, add 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2025.12.11 17:26:05 - Routes, add 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2025.12.11 17:26:05 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2025.12.11 17:26:05 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2025.12.11 17:26:05 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2025.12.11 17:26:05 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2025.12.11 17:26:05 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2025.12.11 17:26:05 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2025.12.11 17:26:05 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2025.12.11 17:26:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.157.13:443 . 2025.12.11 17:26:05 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2025.12.11 17:26:05 - OpenVPN > UDP link local: (not bound) . 2025.12.11 17:26:05 - OpenVPN > UDP link remote: [AF_INET]198.44.157.13:443 . 2025.12.11 17:26:05 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.157.13:443, sid=ee7755cd 351e79e1 . 2025.12.11 17:26:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2025.12.11 17:26:05 - OpenVPN > VERIFY KU OK . 2025.12.11 17:26:05 - OpenVPN > Validating certificate extended key usage . 2025.12.11 17:26:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2025.12.11 17:26:05 - OpenVPN > VERIFY EKU OK . 2025.12.11 17:26:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kornephoros, emailAddress=info@airvpn.org . 2025.12.11 17:26:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2025.12.11 17:26:05 - OpenVPN > [Kornephoros] Peer Connection Initiated with [AF_INET]198.44.157.13:443 . 2025.12.11 17:26:05 - OpenVPN > SENT CONTROL [Kornephoros]: 'PUSH_REQUEST' (status=1) . 2025.12.11 17:26:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.10.1,dhcp-option DNS6 fde6:7a:7d20:40a::1,tun-ipv6,route-gateway 10.8.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:40a::1015/64 fde6:7a:7d20:40a::1,ifconfig 10.8.10.23 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2025.12.11 17:26:05 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2025.12.11 17:26:05 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.8.10.1' . 2025.12.11 17:26:05 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:40a::1' . 2025.12.11 17:26:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2025.12.11 17:26:05 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2025.12.11 17:26:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2025.12.11 17:26:05 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2025.12.11 17:26:05 - OpenVPN > OPTIONS IMPORT: peer-id set . 2025.12.11 17:26:05 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2025.12.11 17:26:05 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2025.12.11 17:26:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2025.12.11 17:26:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.11 17:26:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.11 17:26:06 - OpenVPN > interactive service msg_channel=0 . 2025.12.11 17:26:06 - OpenVPN > open_tun . 2025.12.11 17:26:06 - OpenVPN > wintun device [Eddie] opened . 2025.12.11 17:26:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 40 static 10.8.10.23 255.255.255.0 . 2025.12.11 17:26:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 40 all . 2025.12.11 17:26:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 40 all . 2025.12.11 17:26:06 - OpenVPN > IPv4 MTU set to 1500 on interface 40 using SetIpInterfaceEntry() . 2025.12.11 17:26:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 40 fde6:7a:7d20:40a::1015/128 store=active . 2025.12.11 17:26:06 - OpenVPN > add_route_ipv6(fde6:7a:7d20:40a::/64 -> fde6:7a:7d20:40a::1015 metric 0) dev Eddie . 2025.12.11 17:26:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:40a::/64 40 fe80::8 store=active . 2025.12.11 17:26:06 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2025.12.11 17:26:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 40 all . 2025.12.11 17:26:06 - OpenVPN > IPv6 MTU set to 1500 on interface 40 using SetIpInterfaceEntry() . 2025.12.11 17:26:06 - OpenVPN > Initialization Sequence Completed . 2025.12.11 17:26:06 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2025.12.11 17:26:06 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2025.12.11 17:26:06 - DNS leak protection with packet filtering enabled. . 2025.12.11 17:26:06 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.8.10.1) . 2025.12.11 17:26:06 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:40a::1) . 2025.12.11 17:26:07 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.11 17:26:07 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.11 17:26:07 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.11 17:26:08 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.11 17:26:08 - Routes, add 198.44.157.34/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.11 17:26:08 - Routes, add 2607:9000:600:25:de12:e234:977:e491/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.11 17:26:08 - Flushing DNS I 2025.12.11 17:26:08 - Checking route IPv4 I 2025.12.11 17:26:10 - Checking route IPv6 I 2025.12.11 17:26:10 - Checking DNS ! 2025.12.11 17:26:10 - Connected. . 2025.12.11 17:31:18 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #351638 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2025.12.11 17:31:18 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #351640 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2025.12.11 17:31:26 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #422727 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2025.12.11 17:56:06 - Collect information about AirVPN completed . 2025.12.11 18:23:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2025.12.11 18:23:20 - OpenVPN > VERIFY KU OK . 2025.12.11 18:23:20 - OpenVPN > Validating certificate extended key usage . 2025.12.11 18:23:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2025.12.11 18:23:20 - OpenVPN > VERIFY EKU OK . 2025.12.11 18:23:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kornephoros, emailAddress=info@airvpn.org . 2025.12.11 18:23:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.11 18:23:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.11 18:23:20 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2025.12.11 18:26:06 - Collect information about AirVPN completed . 2025.12.12 00:10:24 - Cannot retrieve information about AirVPN: Fetch url error:Couldn't connect to server . 2025.12.12 00:10:28 - OpenVPN > [Kornephoros] Inactivity timeout (--ping-restart), restarting . 2025.12.12 00:10:28 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2025.12.12 00:10:28 - OpenVPN > Restart pause, 5 second(s) ! 2025.12.12 00:10:28 - Disconnecting . 2025.12.12 00:10:28 - Sending soft termination signal . 2025.12.12 00:10:33 - OpenVPN > Closing TUN/TAP interface . 2025.12.12 00:10:33 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:40a::/64) . 2025.12.12 00:10:33 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:40a::/64 40 fe80::8 store=active . 2025.12.12 00:10:33 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 40 fde6:7a:7d20:40a::1015 store=active . 2025.12.12 00:10:33 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 40 10.8.10.23 store=active . 2025.12.12 00:10:34 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2025.12.12 00:10:34 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:34 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:35 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:35 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:35 - Routes, delete 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2025.12.12 00:10:36 - Routes, delete 198.44.157.34/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:36 - Routes, delete 2607:9000:600:25:de12:e234:977:e491/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:36 - Routes, delete 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2025.12.12 00:10:36 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2025.12.12 00:10:36 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2025.12.12 00:10:36 - DNS leak protection with packet filtering disabled. . 2025.12.12 00:10:36 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2025.12.12 00:10:36 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2025.12.12 00:10:36 - Connection terminated. . 2025.12.12 00:10:39 - Waiting for latency tests (1 to go) I 2025.12.12 00:10:40 - Checking authorization ... . 2025.12.12 00:10:41 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2025.12.12 00:10:41 - Connecting to Kornephoros (Canada, Toronto, Ontario) . 2025.12.12 00:10:41 - Routes, add 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2025.12.12 00:10:41 - Routes, add 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2025.12.12 00:10:41 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2025.12.12 00:10:41 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2025.12.12 00:10:41 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2025.12.12 00:10:41 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2025.12.12 00:10:41 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2025.12.12 00:10:41 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2025.12.12 00:10:41 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2025.12.12 00:10:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.157.13:443 . 2025.12.12 00:10:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2025.12.12 00:10:41 - OpenVPN > UDP link local: (not bound) . 2025.12.12 00:10:41 - OpenVPN > UDP link remote: [AF_INET]198.44.157.13:443 . 2025.12.12 00:10:41 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.157.13:443, sid=63022879 70efa267 . 2025.12.12 00:10:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2025.12.12 00:10:41 - OpenVPN > VERIFY KU OK . 2025.12.12 00:10:41 - OpenVPN > Validating certificate extended key usage . 2025.12.12 00:10:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2025.12.12 00:10:41 - OpenVPN > VERIFY EKU OK . 2025.12.12 00:10:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kornephoros, emailAddress=info@airvpn.org . 2025.12.12 00:10:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2025.12.12 00:10:41 - OpenVPN > [Kornephoros] Peer Connection Initiated with [AF_INET]198.44.157.13:443 . 2025.12.12 00:10:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.10.1,dhcp-option DNS6 fde6:7a:7d20:40a::1,tun-ipv6,route-gateway 10.8.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:40a::1015/64 fde6:7a:7d20:40a::1,ifconfig 10.8.10.23 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2025.12.12 00:10:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2025.12.12 00:10:42 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.8.10.1' . 2025.12.12 00:10:42 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:40a::1' . 2025.12.12 00:10:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2025.12.12 00:10:42 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2025.12.12 00:10:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2025.12.12 00:10:42 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2025.12.12 00:10:42 - OpenVPN > OPTIONS IMPORT: peer-id set . 2025.12.12 00:10:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2025.12.12 00:10:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2025.12.12 00:10:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2025.12.12 00:10:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.12 00:10:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.12 00:10:42 - OpenVPN > interactive service msg_channel=0 . 2025.12.12 00:10:42 - OpenVPN > open_tun . 2025.12.12 00:10:42 - OpenVPN > wintun device [Eddie] opened . 2025.12.12 00:10:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 40 static 10.8.10.23 255.255.255.0 . 2025.12.12 00:10:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 40 all . 2025.12.12 00:10:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 40 all . 2025.12.12 00:10:42 - OpenVPN > IPv4 MTU set to 1500 on interface 40 using SetIpInterfaceEntry() . 2025.12.12 00:10:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 40 fde6:7a:7d20:40a::1015/128 store=active . 2025.12.12 00:10:42 - OpenVPN > add_route_ipv6(fde6:7a:7d20:40a::/64 -> fde6:7a:7d20:40a::1015 metric 0) dev Eddie . 2025.12.12 00:10:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:40a::/64 40 fe80::8 store=active . 2025.12.12 00:10:42 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2025.12.12 00:10:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 40 all . 2025.12.12 00:10:42 - OpenVPN > IPv6 MTU set to 1500 on interface 40 using SetIpInterfaceEntry() . 2025.12.12 00:10:42 - OpenVPN > Initialization Sequence Completed . 2025.12.12 00:10:42 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2025.12.12 00:10:42 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2025.12.12 00:10:42 - DNS leak protection with packet filtering enabled. . 2025.12.12 00:10:43 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.8.10.1) . 2025.12.12 00:10:43 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:40a::1) . 2025.12.12 00:10:43 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:43 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:44 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:44 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:44 - Routes, add 198.44.157.34/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:44 - Routes, add 2607:9000:600:25:de12:e234:977:e491/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 00:10:44 - Flushing DNS I 2025.12.12 00:10:44 - Checking route IPv4 I 2025.12.12 00:10:46 - Checking route IPv6 I 2025.12.12 00:10:46 - Checking DNS ! 2025.12.12 00:10:47 - Connected. . 2025.12.12 00:12:06 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #77075 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2025.12.12 00:12:06 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #77076 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2025.12.12 00:12:06 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #77077 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2025.12.12 00:40:25 - Above log line repeated 1495 times more . 2025.12.12 00:40:25 - Collect information about AirVPN completed . 2025.12.12 11:39:18 - OpenVPN > [Kornephoros] Inactivity timeout (--ping-restart), restarting . 2025.12.12 11:39:18 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2025.12.12 11:39:18 - OpenVPN > Restart pause, 5 second(s) ! 2025.12.12 11:39:18 - Disconnecting . 2025.12.12 11:39:18 - Sending soft termination signal . 2025.12.12 11:39:19 - Cannot retrieve information about AirVPN: Fetch url error:Couldn't connect to server . 2025.12.12 11:39:23 - OpenVPN > Closing TUN/TAP interface . 2025.12.12 11:39:23 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:40a::/64) . 2025.12.12 11:39:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:40a::/64 40 fe80::8 store=active . 2025.12.12 11:39:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 40 fde6:7a:7d20:40a::1015 store=active . 2025.12.12 11:39:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 40 10.8.10.23 store=active . 2025.12.12 11:39:23 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2025.12.12 11:39:23 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:24 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:25 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:25 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:25 - Routes, delete 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2025.12.12 11:39:26 - Routes, delete 198.44.157.34/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:26 - Routes, delete 2607:9000:600:25:de12:e234:977:e491/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:26 - Routes, delete 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2025.12.12 11:39:26 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2025.12.12 11:39:26 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2025.12.12 11:39:26 - DNS leak protection with packet filtering disabled. . 2025.12.12 11:39:26 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2025.12.12 11:39:26 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2025.12.12 11:39:26 - Connection terminated. . 2025.12.12 11:39:29 - Waiting for latency tests (1 to go) I 2025.12.12 11:39:30 - Checking authorization ... . 2025.12.12 11:39:31 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2025.12.12 11:39:31 - Connecting to Kornephoros (Canada, Toronto, Ontario) . 2025.12.12 11:39:31 - Routes, add 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2025.12.12 11:39:31 - Routes, add 198.44.157.13/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2025.12.12 11:39:31 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2025.12.12 11:39:31 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2025.12.12 11:39:31 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2025.12.12 11:39:31 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2025.12.12 11:39:31 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2025.12.12 11:39:31 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2025.12.12 11:39:31 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2025.12.12 11:39:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.157.13:443 . 2025.12.12 11:39:31 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2025.12.12 11:39:31 - OpenVPN > UDP link local: (not bound) . 2025.12.12 11:39:31 - OpenVPN > UDP link remote: [AF_INET]198.44.157.13:443 . 2025.12.12 11:39:34 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.157.13:443, sid=5c95250c 00a985de . 2025.12.12 11:39:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2025.12.12 11:39:34 - OpenVPN > VERIFY KU OK . 2025.12.12 11:39:34 - OpenVPN > Validating certificate extended key usage . 2025.12.12 11:39:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2025.12.12 11:39:34 - OpenVPN > VERIFY EKU OK . 2025.12.12 11:39:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kornephoros, emailAddress=info@airvpn.org . 2025.12.12 11:39:34 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2025.12.12 11:39:34 - OpenVPN > [Kornephoros] Peer Connection Initiated with [AF_INET]198.44.157.13:443 . 2025.12.12 11:39:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.10.1,dhcp-option DNS6 fde6:7a:7d20:40a::1,tun-ipv6,route-gateway 10.8.10.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:40a::1015/64 fde6:7a:7d20:40a::1,ifconfig 10.8.10.23 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2025.12.12 11:39:34 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2025.12.12 11:39:34 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.8.10.1' . 2025.12.12 11:39:34 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:40a::1' . 2025.12.12 11:39:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2025.12.12 11:39:34 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2025.12.12 11:39:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2025.12.12 11:39:34 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2025.12.12 11:39:34 - OpenVPN > OPTIONS IMPORT: peer-id set . 2025.12.12 11:39:34 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2025.12.12 11:39:34 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2025.12.12 11:39:34 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2025.12.12 11:39:34 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.12 11:39:34 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.12 11:39:34 - OpenVPN > interactive service msg_channel=0 . 2025.12.12 11:39:34 - OpenVPN > open_tun . 2025.12.12 11:39:34 - OpenVPN > wintun device [Eddie] opened . 2025.12.12 11:39:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 40 static 10.8.10.23 255.255.255.0 . 2025.12.12 11:39:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 40 all . 2025.12.12 11:39:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 40 all . 2025.12.12 11:39:34 - OpenVPN > IPv4 MTU set to 1500 on interface 40 using SetIpInterfaceEntry() . 2025.12.12 11:39:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 40 fde6:7a:7d20:40a::1015/128 store=active . 2025.12.12 11:39:35 - OpenVPN > add_route_ipv6(fde6:7a:7d20:40a::/64 -> fde6:7a:7d20:40a::1015 metric 0) dev Eddie . 2025.12.12 11:39:35 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:40a::/64 40 fe80::8 store=active . 2025.12.12 11:39:35 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2025.12.12 11:39:35 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 40 all . 2025.12.12 11:39:35 - OpenVPN > IPv6 MTU set to 1500 on interface 40 using SetIpInterfaceEntry() . 2025.12.12 11:39:35 - OpenVPN > Initialization Sequence Completed . 2025.12.12 11:39:35 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2025.12.12 11:39:35 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2025.12.12 11:39:35 - DNS leak protection with packet filtering enabled. . 2025.12.12 11:39:35 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.8.10.1) . 2025.12.12 11:39:35 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:40a::1) . 2025.12.12 11:39:35 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:36 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:36 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:36 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:36 - Routes, add 198.44.157.34/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:37 - Routes, add 2607:9000:600:25:de12:e234:977:e491/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2025.12.12 11:39:37 - Flushing DNS I 2025.12.12 11:39:37 - Checking route IPv4 I 2025.12.12 11:39:38 - Checking route IPv6 I 2025.12.12 11:39:39 - Checking DNS ! 2025.12.12 11:39:39 - Connected. . 2025.12.12 12:09:21 - Collect information about AirVPN completed . 2025.12.12 12:37:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2025.12.12 12:37:02 - OpenVPN > VERIFY KU OK . 2025.12.12 12:37:02 - OpenVPN > Validating certificate extended key usage . 2025.12.12 12:37:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2025.12.12 12:37:02 - OpenVPN > VERIFY EKU OK . 2025.12.12 12:37:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kornephoros, emailAddress=info@airvpn.org . 2025.12.12 12:37:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.12 12:37:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.12 12:37:02 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2025.12.12 12:39:29 - Collect information about AirVPN completed
-
Same here, over 6 months of use now and it has been the best VPN service i have used (and i have used many) i will certainly be renewing my subscription before my year is up.
-
-
Hi, Probably already suggested in the past (couldn't find anything upon searching) but here we go: Will it be possible that Air provides a DNS only service? It can be beneficial to those who cannot/don't want to host their own instance of adguard/pihole. I am aware of services such as NextDNS, but I would definitely prefer and trust an AirVPN take on this. I was thinking about it since Air already supplies DNS blocklists if it can be an option in the future. Wouldn't mind if it consumed 1/5 from the available slots. Cheers
