Jump to content
Not connected, Your IP: 3.133.124.161
Staff

Eddie 2.10 available

Recommended Posts

Hello!

We're very glad to inform you that a new Eddie Air client version has been released: 2.10.

2.10 version is compatible with several Linux distributions. For very important notes about environments, please read here: https://airvpn.org/forum/35-client-software-platforms-environments

 

Integration with Windows 10 has been greatly improved as well.

 

Eddie 2.10 includes important bug fixes and changes meeting users' requests and preferences.

Please read the changelog: https://airvpn.org/services/changelog.php?software=client&format=html

Upgrade is strongly recommended.

Just like previous version 2.9, Eddie implements direct Tor support for OpenVPN over Tor connections. Eddie makes OpenVPN over Tor easily available to Linux and OS X users: no needs for Virtual Machines, middle boxes or other special configurations. Windows users will find a more friendly approach as well. This mode is not handled anymore as a generic connection to a socks proxy, but it is specifically designed for Tor and therefore solves multiple issues, especially in Linux and OS X, including the "infinite routing loop" problem (see for example http://tor.stackexchange.com/questions/1232/me-tor-vpn-how/1235#1235 )

As far as we know, Eddie is the first and currently the only OpenVPN wrapper that natively allows OpenVPN over Tor connections for multiple Operating Systems. https://airvpn.org/tor

We recommend that you upgrade Eddie as soon as possible.

Eddie 2.10 for GNU Linux can be downloaded here: https://airvpn.org/linux
Eddie 2.10 for Windows can be downloaded here: https://airvpn.org/windows
Eddie 2.10 for OS X Mavericks and Yosemite only can be downloaded here: https://airvpn.org/macosx

PLEASE NOTE: Eddie 2.10 package includes an OpenVPN version re-compiled by us from OpenVPN 2.3.8 source code with OpenSSL 1.0.2d for security reasons and to fix this bug: https://community.openvpn.net/openvpn/ticket/328

Eddie overview is available here: https://airvpn.org/software
Eddie includes a Network Lock feature: https://airvpn.org/faq/software_lock
Eddie 2.10.x is free and open source software released under GPLv3. GitHub repository https://github.com/AirVPN/airvpn-client


Kind regards & datalove
AirVPN Staff

Share this post


Link to post
Guest

I like it, is it possible tho that the keyboard shortcut for menu(or make a new one) that shows the main window after hiding it? can be useful

Share this post


Link to post

So this stable version is the same exact version from experimental v2.10.3 ?

 

Yes. 2.10.0, 2.10.1 and 2.10.2 have not been promoted to Stable. The only candidate which made it is 2.10.3.

 

Kind regards

Share this post


Link to post
Guest

damn symantec is crying "WS.Reputation.1" on the installer

Share this post


Link to post

Running slick here.  Debian and Ubuntu!

Same here Linux Mint 17.2 KDE

Share this post


Link to post

Dear Staff,

I currently use portable v2.9 for windows. When update to portable v2.10, do I need to uninstall something first before I use v2.10? Or I just unzipped v2.10 and it's good for use? Thanks!

Share this post


Link to post

Working perfectly in Windows 10 so far! I am also using the 9.0.0.21 TAP-driver that gave me trouble in Win7, seems to be working perfectly now. Great work!

Share this post


Link to post

Eddie 2.10:  All seems good in Mint 17.2 Cinnamon - both installed and portable versions 

​Thank you Air team!  

Share this post


Link to post

Hello!

 

Eddie 2.10.3 is available for OS X. That's just a mistake in the package which will be fixed in the next release. Check in Eddie menu "AirVPN" -> "About" to verify that you're really running Eddie 2.10.3.

 

Kind regards

Share this post


Link to post

Running Eddie 2.10.3 in Manjaro Linux.

 

Works well after disabling IPv6 kernel stack on bootup (I had DNS leaks before doing this).

 

One thing I've noticed is that if I get disconnected from a server and the client automatically reconnects to a different server, I'll get a DNS leak after it reconnects.

 

Client is configured with the following settings:

  • Connect on startup
  • Network lock enabled
  • IPv6 - Disabled
  • Remove default gateway route - unchecked
  • DNS Switch Mode - Automatic
  • Network Lock Mode - Automatic

 

I don't get spontaneously disconnected very often and didn't always check on IPLeak.net afterwards, so I'm not sure if this happens every single time, but I do remember it happening at least twice before.

 

When it happened today, here's the order of events:

  1. Connected to VPN
  2. Checked IPleak.net to verify - no DNS leak
  3. Got spontaneously disconnected from the server
  4. Client automatically reconnected to a different server
  5. Checked IPleak.net again - DNS leak present
  6. Manually disconnected from the server
  7. Manually connected to a different server
  8. Checked IPleak.net again - no DNS leak

Here is the log from Eddie:

 

I 2016.01.01 12:35:13 - AirVPN client version: 2.10.3 / x64, System: Linux, Name: Manjaro Linux \r (\n) (\l) / x64

. 2016.01.01 12:35:13 - Reading options from /home/name/.AirVPN/AirVPN.xml

. 2016.01.01 12:35:13 - Data Path: /home/name/.AirVPN

. 2016.01.01 12:35:13 - App Path: /home/name/.AirVPN

. 2016.01.01 12:35:13 - Executable Path: /home/name/.AirVPN/airvpn

. 2016.01.01 12:35:13 - Command line arguments (0):

. 2016.01.01 12:35:13 - Updating systems & servers data ...

. 2016.01.01 12:35:13 - Operating System: Unix 4.1.15.1 - Linux hostname 4.1.15-1-MANJARO #1 SMP PREEMPT Tue Dec 15 07:48:44 UTC 2015 x86_64 GNU/Linux

I 2016.01.01 12:35:14 - OpenVPN Driver - Found, /dev/net/tun

I 2016.01.01 12:35:14 - OpenVPN - Version: OpenVPN 2.3.8 (/home/name/.AirVPN/openvpn)

I 2016.01.01 12:35:14 - SSH - Version: OpenSSH_7.1p1, OpenSSL 1.0.2e 3 Dec 2015 (/usr/bin/ssh)

I 2016.01.01 12:35:14 - SSL - Version: stunnel 5.06 (/home/name/.AirVPN/stunnel)

! 2016.01.01 12:35:14 - Activation of Network Lock - Linux IPTables

. 2016.01.01 12:35:14 - Systems & servers data update completed

I 2016.01.01 12:35:16 - Session starting.

W 2016.01.01 12:35:16 - Unable to understand if IPV6 is active.

I 2016.01.01 12:35:25 - Checking authorization ...

! 2016.01.01 12:35:25 - Connecting to Cephei (Canada, Toronto, Ontario)

. 2016.01.01 12:35:25 - OpenVPN > OpenVPN 2.3.8 x86_64-unknown-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [MH] [iPv6] built on Aug 13 2015

. 2016.01.01 12:35:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08

. 2016.01.01 12:35:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2016.01.01 12:35:25 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file

. 2016.01.01 12:35:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.01.01 12:35:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.01.01 12:35:25 - OpenVPN > Socket Buffers: R=[212992->262144] S=[212992->262144]

. 2016.01.01 12:35:25 - OpenVPN > UDPv4 link local: [undef]

. 2016.01.01 12:35:25 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.214.162:443

. 2016.01.01 12:35:25 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.214.162:443, sid=11f8fc08 8b995010

. 2016.01.01 12:35:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.01.01 12:35:25 - OpenVPN > Validating certificate key usage

. 2016.01.01 12:35:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.01.01 12:35:25 - OpenVPN > VERIFY KU OK

. 2016.01.01 12:35:25 - OpenVPN > Validating certificate extended key usage

. 2016.01.01 12:35:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.01.01 12:35:25 - OpenVPN > VERIFY EKU OK

. 2016.01.01 12:35:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.01.01 12:35:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.01.01 12:35:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.01.01 12:35:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.01.01 12:35:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.01.01 12:35:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.01.01 12:35:26 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.214.162:443

. 2016.01.01 12:35:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2016.01.01 12:35:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.159 255.255.0.0'

. 2016.01.01 12:35:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2016.01.01 12:35:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified

. 2016.01.01 12:35:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2016.01.01 12:35:28 - OpenVPN > OPTIONS IMPORT: route options modified

. 2016.01.01 12:35:28 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2016.01.01 12:35:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2016.01.01 12:35:28 - OpenVPN > TUN/TAP device tun0 opened

. 2016.01.01 12:35:28 - OpenVPN > TUN/TAP TX queue length set to 100

. 2016.01.01 12:35:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

. 2016.01.01 12:35:28 - OpenVPN > /sbin/ifconfig tun0 10.4.1.159 netmask 255.255.0.0 mtu 1500 broadcast 10.4.255.255

. 2016.01.01 12:35:33 - OpenVPN > /sbin/route add -net 184.75.214.162 netmask 255.255.255.255 gw 10.0.0.1

. 2016.01.01 12:35:33 - OpenVPN > /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.4.0.1

. 2016.01.01 12:35:33 - OpenVPN > /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.4.0.1

. 2016.01.01 12:35:33 - Starting Management Interface

. 2016.01.01 12:35:33 - OpenVPN > Initialization Sequence Completed

I 2016.01.01 12:35:33 - /etc/resolv.conf renamed to /etc/resolv.conf.airvpn as backup

I 2016.01.01 12:35:33 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)

I 2016.01.01 12:35:33 - Flushing DNS

I 2016.01.01 12:35:33 - Checking route

I 2016.01.01 12:35:34 - Checking DNS

! 2016.01.01 12:35:34 - Connected.

. 2016.01.01 12:35:34 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2016.01.01 12:35:34 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2016.01.01 13:00:58 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2016.01.01 13:00:58 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2016.01.01 13:00:58 - OpenVPN > Restart pause, 2 second(s)

! 2016.01.01 13:00:58 - Disconnecting

. 2016.01.01 13:00:58 - Management - Send 'signal SIGTERM'

. 2016.01.01 13:00:58 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2016.01.01 13:00:58 - OpenVPN > MANAGEMENT: Client disconnected

. 2016.01.01 13:00:58 - OpenVPN > Assertion failed at misc.c:779

. 2016.01.01 13:00:58 - OpenVPN > Exiting due to fatal error

. 2016.01.01 13:00:58 - Connection terminated.

I 2016.01.01 13:00:58 - DNS of the system restored to original settings (Rename method)

I 2016.01.01 13:01:08 - Checking authorization ...

! 2016.01.01 13:01:09 - Connecting to Aludra (Canada, Toronto, Ontario)

. 2016.01.01 13:01:09 - OpenVPN > OpenVPN 2.3.8 x86_64-unknown-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [MH] [iPv6] built on Aug 13 2015

. 2016.01.01 13:01:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08

. 2016.01.01 13:01:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2016.01.01 13:01:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file

. 2016.01.01 13:01:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.01.01 13:01:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.01.01 13:01:09 - OpenVPN > Socket Buffers: R=[212992->262144] S=[212992->262144]

. 2016.01.01 13:01:09 - OpenVPN > UDPv4 link local: [undef]

. 2016.01.01 13:01:09 - OpenVPN > UDPv4 link remote: [AF_INET]104.254.90.202:443

. 2016.01.01 13:01:09 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.202:443, sid=e2b42b27 4e764329

. 2016.01.01 13:01:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.01.01 13:01:09 - OpenVPN > Validating certificate key usage

. 2016.01.01 13:01:09 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.01.01 13:01:09 - OpenVPN > VERIFY KU OK

. 2016.01.01 13:01:09 - OpenVPN > Validating certificate extended key usage

. 2016.01.01 13:01:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.01.01 13:01:09 - OpenVPN > VERIFY EKU OK

. 2016.01.01 13:01:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.01.01 13:01:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.01.01 13:01:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.01.01 13:01:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.01.01 13:01:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.01.01 13:01:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.01.01 13:01:17 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.202:443

. 2016.01.01 13:01:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2016.01.01 13:01:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.188 255.255.0.0'

. 2016.01.01 13:01:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2016.01.01 13:01:20 - OpenVPN > OPTIONS IMPORT: LZO parms modified

. 2016.01.01 13:01:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2016.01.01 13:01:20 - OpenVPN > OPTIONS IMPORT: route options modified

. 2016.01.01 13:01:20 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2016.01.01 13:01:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2016.01.01 13:01:20 - OpenVPN > TUN/TAP device tun0 opened

. 2016.01.01 13:01:20 - OpenVPN > TUN/TAP TX queue length set to 100

. 2016.01.01 13:01:20 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

. 2016.01.01 13:01:20 - OpenVPN > /sbin/ifconfig tun0 10.4.0.188 netmask 255.255.0.0 mtu 1500 broadcast 10.4.255.255

. 2016.01.01 13:01:25 - OpenVPN > /sbin/route add -net 104.254.90.202 netmask 255.255.255.255 gw 10.0.0.1

. 2016.01.01 13:01:25 - OpenVPN > /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.4.0.1

. 2016.01.01 13:01:25 - OpenVPN > /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.4.0.1

. 2016.01.01 13:01:25 - Starting Management Interface

. 2016.01.01 13:01:25 - OpenVPN > Initialization Sequence Completed

I 2016.01.01 13:01:25 - /etc/resolv.conf renamed to /etc/resolv.conf.airvpn as backup

I 2016.01.01 13:01:25 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)

I 2016.01.01 13:01:25 - Flushing DNS

I 2016.01.01 13:01:25 - Checking route

I 2016.01.01 13:01:26 - Checking DNS

! 2016.01.01 13:01:26 - Connected.

. 2016.01.01 13:01:26 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2016.01.01 13:01:26 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

! 2016.01.01 13:04:27 - Disconnecting

. 2016.01.01 13:04:27 - Management - Send 'signal SIGTERM'

. 2016.01.01 13:04:27 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2016.01.01 13:04:27 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2016.01.01 13:04:32 - OpenVPN > /sbin/route del -net 104.254.90.202 netmask 255.255.255.255

. 2016.01.01 13:04:32 - OpenVPN > /sbin/route del -net 0.0.0.0 netmask 128.0.0.0

. 2016.01.01 13:04:32 - OpenVPN > /sbin/route del -net 128.0.0.0 netmask 128.0.0.0

. 2016.01.01 13:04:32 - OpenVPN > Closing TUN/TAP interface

. 2016.01.01 13:04:32 - OpenVPN > /sbin/ifconfig tun0 0.0.0.0

. 2016.01.01 13:04:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2016.01.01 13:04:32 - Connection terminated.

I 2016.01.01 13:04:32 - DNS of the system restored to original settings (Rename method)

! 2016.01.01 13:04:32 - Session terminated.

I 2016.01.01 13:04:38 - Session starting.

W 2016.01.01 13:04:38 - Unable to understand if IPV6 is active.

I 2016.01.01 13:04:38 - Checking authorization ...

! 2016.01.01 13:04:39 - Connecting to Grumium (Canada, Toronto, Ontario)

. 2016.01.01 13:04:39 - OpenVPN > OpenVPN 2.3.8 x86_64-unknown-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [MH] [iPv6] built on Aug 13 2015

. 2016.01.01 13:04:39 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08

. 2016.01.01 13:04:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2016.01.01 13:04:39 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file

. 2016.01.01 13:04:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.01.01 13:04:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.01.01 13:04:39 - OpenVPN > Socket Buffers: R=[212992->262144] S=[212992->262144]

. 2016.01.01 13:04:39 - OpenVPN > UDPv4 link local: [undef]

. 2016.01.01 13:04:39 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.95.187:443

. 2016.01.01 13:04:39 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.95.187:443, sid=40b6365c 4b58d443

. 2016.01.01 13:04:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2016.01.01 13:04:39 - OpenVPN > Validating certificate key usage

. 2016.01.01 13:04:39 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0

. 2016.01.01 13:04:39 - OpenVPN > VERIFY KU OK

. 2016.01.01 13:04:39 - OpenVPN > Validating certificate extended key usage

. 2016.01.01 13:04:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2016.01.01 13:04:39 - OpenVPN > VERIFY EKU OK

. 2016.01.01 13:04:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2016.01.01 13:04:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.01.01 13:04:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.01.01 13:04:40 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2016.01.01 13:04:40 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2016.01.01 13:04:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2016.01.01 13:04:40 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.95.187:443

. 2016.01.01 13:04:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2016.01.01 13:04:44 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.85 255.255.0.0'

. 2016.01.01 13:04:44 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2016.01.01 13:04:44 - OpenVPN > OPTIONS IMPORT: LZO parms modified

. 2016.01.01 13:04:44 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2016.01.01 13:04:44 - OpenVPN > OPTIONS IMPORT: route options modified

. 2016.01.01 13:04:44 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2016.01.01 13:04:44 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2016.01.01 13:04:44 - OpenVPN > TUN/TAP device tun0 opened

. 2016.01.01 13:04:44 - OpenVPN > TUN/TAP TX queue length set to 100

. 2016.01.01 13:04:44 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

. 2016.01.01 13:04:44 - OpenVPN > /sbin/ifconfig tun0 10.4.1.85 netmask 255.255.0.0 mtu 1500 broadcast 10.4.255.255

. 2016.01.01 13:04:49 - OpenVPN > /sbin/route add -net 199.19.95.187 netmask 255.255.255.255 gw 10.0.0.1

. 2016.01.01 13:04:49 - OpenVPN > /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.4.0.1

. 2016.01.01 13:04:49 - OpenVPN > /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.4.0.1

. 2016.01.01 13:04:49 - Starting Management Interface

. 2016.01.01 13:04:49 - OpenVPN > Initialization Sequence Completed

I 2016.01.01 13:04:49 - /etc/resolv.conf renamed to /etc/resolv.conf.airvpn as backup

I 2016.01.01 13:04:49 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)

I 2016.01.01 13:04:49 - Flushing DNS

I 2016.01.01 13:04:49 - Checking route

I 2016.01.01 13:04:50 - Checking DNS

! 2016.01.01 13:04:50 - Connected.

. 2016.01.01 13:04:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2016.01.01 13:04:50 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2016.01.01 13:05:16 - Updating systems & servers data ...

. 2016.01.01 13:05:18 - Systems & servers data update completed

Share this post


Link to post

Had a disconnect/reconnect tonight but didn't have a DNS leak afterwards.

 

Couple possibilities:

 

It doesn't happen every time.

It corrects itself after a period of time (I checked about 30 mins afterwards this time instead of immediately after).

It doesn't happen at all and what I saw previously was cached DNS info that appeared when I reloaded ipleak.net (I'm quite sure I reloaded ipleak.net 3 or more times, though, which should have purged any cached info).

 

 

Another quirk (not sure if this is related) happens when I do the following:

 

Connect to the VPN

Check ipleak.net

Shut down the VPN client

Start the client and connect to the VPN again

Check ipleak.net again

 

When I check ipleak.net a second time (refreshing the same tab), it usually shows my ISP's DNS servers along with Air's VPN servers. If I reload ipleak, my ISP's DNS entries vanish.

 

What's strange is that I didn't refresh the page when the VPN was disconnected, so I'm not sure when it checked my for my ISP's DNS and loaded it. If I do this but open a new tab instead, it doesn't appear to happen (or maybe it just doesn't happen all the time - I haven't tested it that often). I thought at the time that ipleak was continually checking DNS in the background, so detected my ISP's servers when I disconnected the VPN and showed cached DNS entries when I reloaded the page after the VPN was back up.

 

All of this is with Firefox 43.0.2.

Share this post


Link to post
AirVPN software produces an error under Windows 10 (x64) if it is installed.

 

Every time I install it again, coming at the end of the installation the message: OpenVPN is not installed. But if you AirVPN starts and establishes a VPN connection, OpenVPN runs in the task.

 

I think you should correct this and change dringenst that could ome users (like me) very irritating.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...