Staff 9972 Posted ... Hello!We're very glad to inform you that a new Eddie Air client version has been released: 2.10.2.10 version is compatible with several Linux distributions. For very important notes about environments, please read here: https://airvpn.org/forum/35-client-software-platforms-environments Integration with Windows 10 has been greatly improved as well. Eddie 2.10 includes important bug fixes and changes meeting users' requests and preferences.Please read the changelog: https://airvpn.org/services/changelog.php?software=client&format=htmlUpgrade is strongly recommended.Just like previous version 2.9, Eddie implements direct Tor support for OpenVPN over Tor connections. Eddie makes OpenVPN over Tor easily available to Linux and OS X users: no needs for Virtual Machines, middle boxes or other special configurations. Windows users will find a more friendly approach as well. This mode is not handled anymore as a generic connection to a socks proxy, but it is specifically designed for Tor and therefore solves multiple issues, especially in Linux and OS X, including the "infinite routing loop" problem (see for example http://tor.stackexchange.com/questions/1232/me-tor-vpn-how/1235#1235 )As far as we know, Eddie is the first and currently the only OpenVPN wrapper that natively allows OpenVPN over Tor connections for multiple Operating Systems. https://airvpn.org/torWe recommend that you upgrade Eddie as soon as possible.Eddie 2.10 for GNU Linux can be downloaded here: https://airvpn.org/linuxEddie 2.10 for Windows can be downloaded here: https://airvpn.org/windowsEddie 2.10 for OS X Mavericks and Yosemite only can be downloaded here: https://airvpn.org/macosxPLEASE NOTE: Eddie 2.10 package includes an OpenVPN version re-compiled by us from OpenVPN 2.3.8 source code with OpenSSL 1.0.2d for security reasons and to fix this bug: https://community.openvpn.net/openvpn/ticket/328Eddie overview is available here: https://airvpn.org/softwareEddie includes a Network Lock feature: https://airvpn.org/faq/software_lockEddie 2.10.x is free and open source software released under GPLv3. GitHub repository https://github.com/AirVPN/airvpn-clientKind regards & dataloveAirVPN Staff 8 spinmaster, snaggle, hrezaei and 5 others reacted to this Quote Share this post Link to post
Guest Posted ... I like it, is it possible tho that the keyboard shortcut for menu(or make a new one) that shows the main window after hiding it? can be useful 1 Jahnique reacted to this Quote Share this post Link to post
internet_user 6 Posted ... So this stable version is the same exact version from experimental v2.10.3 ? Quote Share this post Link to post
Staff 9972 Posted ... So this stable version is the same exact version from experimental v2.10.3 ? Yes. 2.10.0, 2.10.1 and 2.10.2 have not been promoted to Stable. The only candidate which made it is 2.10.3. Kind regards 1 encrypted reacted to this Quote Share this post Link to post
Guest Posted ... damn symantec is crying "WS.Reputation.1" on the installer Quote Share this post Link to post
altae 22 Posted ... Running slick here. Debian and Ubuntu!Same here Linux Mint 17.2 KDE Quote Share this post Link to post
triplehyper 2 Posted ... I'm sticking to Eddie 2.9.2 because it works for my Windows 8. Is it ok? Quote Share this post Link to post
ovgw 0 Posted ... Dear Staff,I currently use portable v2.9 for windows. When update to portable v2.10, do I need to uninstall something first before I use v2.10? Or I just unzipped v2.10 and it's good for use? Thanks! Quote Share this post Link to post
andeby 7 Posted ... Working perfectly in Windows 10 so far! I am also using the 9.0.0.21 TAP-driver that gave me trouble in Win7, seems to be working perfectly now. Great work! Quote Share this post Link to post
esmeralda 3 Posted ... Eddie 2.10: All seems good in Mint 17.2 Cinnamon - both installed and portable versions Thank you Air team! Quote Share this post Link to post
hugomueller 13 Posted ... I still wonder why you can not fix the issue with the remaining DNS entry in Windows.I am not the only one with this problem:https://airvpn.org/topic/14829-can-only-connect-to-the-internet-browser-through-airvpn/?p=31769Already adressed a ticket but nothing happens. 1 hugomueller reacted to this Quote Share this post Link to post
psychlops 27 Posted ... I just downloaded Eddie for Mac OSX from the Downloads page: https://airvpn.org/macosx/ it says Version 2.10, but when I unzip it it's version 2.8. Is 2.10 for Mac available? Quote Share this post Link to post
Staff 9972 Posted ... Hello! Eddie 2.10.3 is available for OS X. That's just a mistake in the package which will be fixed in the next release. Check in Eddie menu "AirVPN" -> "About" to verify that you're really running Eddie 2.10.3. Kind regards Quote Share this post Link to post
psyxos 0 Posted ... Hi all Version 2.10 running without any problems on Fedora 23 Cheers Quote Share this post Link to post
Ansuz 5 Posted ... Running Eddie 2.10.3 in Manjaro Linux. Works well after disabling IPv6 kernel stack on bootup (I had DNS leaks before doing this). One thing I've noticed is that if I get disconnected from a server and the client automatically reconnects to a different server, I'll get a DNS leak after it reconnects. Client is configured with the following settings:Connect on startupNetwork lock enabledIPv6 - DisabledRemove default gateway route - uncheckedDNS Switch Mode - AutomaticNetwork Lock Mode - Automatic I don't get spontaneously disconnected very often and didn't always check on IPLeak.net afterwards, so I'm not sure if this happens every single time, but I do remember it happening at least twice before. When it happened today, here's the order of events:Connected to VPN Checked IPleak.net to verify - no DNS leak Got spontaneously disconnected from the server Client automatically reconnected to a different server Checked IPleak.net again - DNS leak present Manually disconnected from the server Manually connected to a different server Checked IPleak.net again - no DNS leakHere is the log from Eddie: I 2016.01.01 12:35:13 - AirVPN client version: 2.10.3 / x64, System: Linux, Name: Manjaro Linux \r (\n) (\l) / x64. 2016.01.01 12:35:13 - Reading options from /home/name/.AirVPN/AirVPN.xml. 2016.01.01 12:35:13 - Data Path: /home/name/.AirVPN. 2016.01.01 12:35:13 - App Path: /home/name/.AirVPN. 2016.01.01 12:35:13 - Executable Path: /home/name/.AirVPN/airvpn. 2016.01.01 12:35:13 - Command line arguments (0):. 2016.01.01 12:35:13 - Updating systems & servers data .... 2016.01.01 12:35:13 - Operating System: Unix 4.1.15.1 - Linux hostname 4.1.15-1-MANJARO #1 SMP PREEMPT Tue Dec 15 07:48:44 UTC 2015 x86_64 GNU/LinuxI 2016.01.01 12:35:14 - OpenVPN Driver - Found, /dev/net/tunI 2016.01.01 12:35:14 - OpenVPN - Version: OpenVPN 2.3.8 (/home/name/.AirVPN/openvpn)I 2016.01.01 12:35:14 - SSH - Version: OpenSSH_7.1p1, OpenSSL 1.0.2e 3 Dec 2015 (/usr/bin/ssh)I 2016.01.01 12:35:14 - SSL - Version: stunnel 5.06 (/home/name/.AirVPN/stunnel)! 2016.01.01 12:35:14 - Activation of Network Lock - Linux IPTables. 2016.01.01 12:35:14 - Systems & servers data update completedI 2016.01.01 12:35:16 - Session starting.W 2016.01.01 12:35:16 - Unable to understand if IPV6 is active.I 2016.01.01 12:35:25 - Checking authorization ...! 2016.01.01 12:35:25 - Connecting to Cephei (Canada, Toronto, Ontario). 2016.01.01 12:35:25 - OpenVPN > OpenVPN 2.3.8 x86_64-unknown-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [MH] [iPv6] built on Aug 13 2015. 2016.01.01 12:35:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.01 12:35:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.01 12:35:25 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.01 12:35:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.01 12:35:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.01 12:35:25 - OpenVPN > Socket Buffers: R=[212992->262144] S=[212992->262144]. 2016.01.01 12:35:25 - OpenVPN > UDPv4 link local: [undef]. 2016.01.01 12:35:25 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.214.162:443. 2016.01.01 12:35:25 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.214.162:443, sid=11f8fc08 8b995010. 2016.01.01 12:35:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.01 12:35:25 - OpenVPN > Validating certificate key usage. 2016.01.01 12:35:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.01 12:35:25 - OpenVPN > VERIFY KU OK. 2016.01.01 12:35:25 - OpenVPN > Validating certificate extended key usage. 2016.01.01 12:35:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.01 12:35:25 - OpenVPN > VERIFY EKU OK. 2016.01.01 12:35:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.01 12:35:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.01 12:35:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.01 12:35:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.01 12:35:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.01 12:35:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.01 12:35:26 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.214.162:443. 2016.01.01 12:35:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.01 12:35:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.159 255.255.0.0'. 2016.01.01 12:35:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.01 12:35:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.01 12:35:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.01 12:35:28 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.01 12:35:28 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.01 12:35:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.01 12:35:28 - OpenVPN > TUN/TAP device tun0 opened. 2016.01.01 12:35:28 - OpenVPN > TUN/TAP TX queue length set to 100. 2016.01.01 12:35:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.01 12:35:28 - OpenVPN > /sbin/ifconfig tun0 10.4.1.159 netmask 255.255.0.0 mtu 1500 broadcast 10.4.255.255. 2016.01.01 12:35:33 - OpenVPN > /sbin/route add -net 184.75.214.162 netmask 255.255.255.255 gw 10.0.0.1. 2016.01.01 12:35:33 - OpenVPN > /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.4.0.1. 2016.01.01 12:35:33 - OpenVPN > /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.4.0.1. 2016.01.01 12:35:33 - Starting Management Interface. 2016.01.01 12:35:33 - OpenVPN > Initialization Sequence CompletedI 2016.01.01 12:35:33 - /etc/resolv.conf renamed to /etc/resolv.conf.airvpn as backupI 2016.01.01 12:35:33 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)I 2016.01.01 12:35:33 - Flushing DNSI 2016.01.01 12:35:33 - Checking routeI 2016.01.01 12:35:34 - Checking DNS! 2016.01.01 12:35:34 - Connected.. 2016.01.01 12:35:34 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.01.01 12:35:34 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.01.01 13:00:58 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2016.01.01 13:00:58 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2016.01.01 13:00:58 - OpenVPN > Restart pause, 2 second(s)! 2016.01.01 13:00:58 - Disconnecting. 2016.01.01 13:00:58 - Management - Send 'signal SIGTERM'. 2016.01.01 13:00:58 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.01.01 13:00:58 - OpenVPN > MANAGEMENT: Client disconnected. 2016.01.01 13:00:58 - OpenVPN > Assertion failed at misc.c:779. 2016.01.01 13:00:58 - OpenVPN > Exiting due to fatal error. 2016.01.01 13:00:58 - Connection terminated.I 2016.01.01 13:00:58 - DNS of the system restored to original settings (Rename method)I 2016.01.01 13:01:08 - Checking authorization ...! 2016.01.01 13:01:09 - Connecting to Aludra (Canada, Toronto, Ontario). 2016.01.01 13:01:09 - OpenVPN > OpenVPN 2.3.8 x86_64-unknown-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [MH] [iPv6] built on Aug 13 2015. 2016.01.01 13:01:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.01 13:01:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.01 13:01:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.01 13:01:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.01 13:01:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.01 13:01:09 - OpenVPN > Socket Buffers: R=[212992->262144] S=[212992->262144]. 2016.01.01 13:01:09 - OpenVPN > UDPv4 link local: [undef]. 2016.01.01 13:01:09 - OpenVPN > UDPv4 link remote: [AF_INET]104.254.90.202:443. 2016.01.01 13:01:09 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.202:443, sid=e2b42b27 4e764329. 2016.01.01 13:01:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.01 13:01:09 - OpenVPN > Validating certificate key usage. 2016.01.01 13:01:09 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.01 13:01:09 - OpenVPN > VERIFY KU OK. 2016.01.01 13:01:09 - OpenVPN > Validating certificate extended key usage. 2016.01.01 13:01:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.01 13:01:09 - OpenVPN > VERIFY EKU OK. 2016.01.01 13:01:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.01 13:01:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.01 13:01:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.01 13:01:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.01 13:01:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.01 13:01:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.01 13:01:17 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.202:443. 2016.01.01 13:01:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.01 13:01:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.188 255.255.0.0'. 2016.01.01 13:01:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.01 13:01:20 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.01 13:01:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.01 13:01:20 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.01 13:01:20 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.01 13:01:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.01 13:01:20 - OpenVPN > TUN/TAP device tun0 opened. 2016.01.01 13:01:20 - OpenVPN > TUN/TAP TX queue length set to 100. 2016.01.01 13:01:20 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.01 13:01:20 - OpenVPN > /sbin/ifconfig tun0 10.4.0.188 netmask 255.255.0.0 mtu 1500 broadcast 10.4.255.255. 2016.01.01 13:01:25 - OpenVPN > /sbin/route add -net 104.254.90.202 netmask 255.255.255.255 gw 10.0.0.1. 2016.01.01 13:01:25 - OpenVPN > /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.4.0.1. 2016.01.01 13:01:25 - OpenVPN > /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.4.0.1. 2016.01.01 13:01:25 - Starting Management Interface. 2016.01.01 13:01:25 - OpenVPN > Initialization Sequence CompletedI 2016.01.01 13:01:25 - /etc/resolv.conf renamed to /etc/resolv.conf.airvpn as backupI 2016.01.01 13:01:25 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)I 2016.01.01 13:01:25 - Flushing DNSI 2016.01.01 13:01:25 - Checking routeI 2016.01.01 13:01:26 - Checking DNS! 2016.01.01 13:01:26 - Connected.. 2016.01.01 13:01:26 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.01.01 13:01:26 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.01.01 13:04:27 - Disconnecting. 2016.01.01 13:04:27 - Management - Send 'signal SIGTERM'. 2016.01.01 13:04:27 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.01.01 13:04:27 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.01.01 13:04:32 - OpenVPN > /sbin/route del -net 104.254.90.202 netmask 255.255.255.255. 2016.01.01 13:04:32 - OpenVPN > /sbin/route del -net 0.0.0.0 netmask 128.0.0.0. 2016.01.01 13:04:32 - OpenVPN > /sbin/route del -net 128.0.0.0 netmask 128.0.0.0. 2016.01.01 13:04:32 - OpenVPN > Closing TUN/TAP interface. 2016.01.01 13:04:32 - OpenVPN > /sbin/ifconfig tun0 0.0.0.0. 2016.01.01 13:04:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.01.01 13:04:32 - Connection terminated.I 2016.01.01 13:04:32 - DNS of the system restored to original settings (Rename method)! 2016.01.01 13:04:32 - Session terminated.I 2016.01.01 13:04:38 - Session starting.W 2016.01.01 13:04:38 - Unable to understand if IPV6 is active.I 2016.01.01 13:04:38 - Checking authorization ...! 2016.01.01 13:04:39 - Connecting to Grumium (Canada, Toronto, Ontario). 2016.01.01 13:04:39 - OpenVPN > OpenVPN 2.3.8 x86_64-unknown-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [MH] [iPv6] built on Aug 13 2015. 2016.01.01 13:04:39 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.01 13:04:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.01 13:04:39 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.01 13:04:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.01 13:04:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.01 13:04:39 - OpenVPN > Socket Buffers: R=[212992->262144] S=[212992->262144]. 2016.01.01 13:04:39 - OpenVPN > UDPv4 link local: [undef]. 2016.01.01 13:04:39 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.95.187:443. 2016.01.01 13:04:39 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.95.187:443, sid=40b6365c 4b58d443. 2016.01.01 13:04:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.01 13:04:39 - OpenVPN > Validating certificate key usage. 2016.01.01 13:04:39 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.01 13:04:39 - OpenVPN > VERIFY KU OK. 2016.01.01 13:04:39 - OpenVPN > Validating certificate extended key usage. 2016.01.01 13:04:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.01 13:04:39 - OpenVPN > VERIFY EKU OK. 2016.01.01 13:04:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.01 13:04:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.01 13:04:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.01 13:04:40 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.01 13:04:40 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.01 13:04:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.01 13:04:40 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.95.187:443. 2016.01.01 13:04:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.01 13:04:44 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.85 255.255.0.0'. 2016.01.01 13:04:44 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.01 13:04:44 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.01 13:04:44 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.01 13:04:44 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.01 13:04:44 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.01 13:04:44 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.01 13:04:44 - OpenVPN > TUN/TAP device tun0 opened. 2016.01.01 13:04:44 - OpenVPN > TUN/TAP TX queue length set to 100. 2016.01.01 13:04:44 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.01 13:04:44 - OpenVPN > /sbin/ifconfig tun0 10.4.1.85 netmask 255.255.0.0 mtu 1500 broadcast 10.4.255.255. 2016.01.01 13:04:49 - OpenVPN > /sbin/route add -net 199.19.95.187 netmask 255.255.255.255 gw 10.0.0.1. 2016.01.01 13:04:49 - OpenVPN > /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.4.0.1. 2016.01.01 13:04:49 - OpenVPN > /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.4.0.1. 2016.01.01 13:04:49 - Starting Management Interface. 2016.01.01 13:04:49 - OpenVPN > Initialization Sequence CompletedI 2016.01.01 13:04:49 - /etc/resolv.conf renamed to /etc/resolv.conf.airvpn as backupI 2016.01.01 13:04:49 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)I 2016.01.01 13:04:49 - Flushing DNSI 2016.01.01 13:04:49 - Checking routeI 2016.01.01 13:04:50 - Checking DNS! 2016.01.01 13:04:50 - Connected.. 2016.01.01 13:04:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.01.01 13:04:50 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.01.01 13:05:16 - Updating systems & servers data .... 2016.01.01 13:05:18 - Systems & servers data update completed Quote Share this post Link to post
a9db3edd 0 Posted ... Are you still planning to release your client for use with other vpns? Quote Share this post Link to post
Ansuz 5 Posted ... Are you still planning to release your client for use with other vpns? The client is open source:https://github.com/AirVPN/airvpn-client So anyone who wants can take the source code and adapt it to use with other VPNs. Quote Share this post Link to post
Ansuz 5 Posted ... Had a disconnect/reconnect tonight but didn't have a DNS leak afterwards. Couple possibilities: It doesn't happen every time.It corrects itself after a period of time (I checked about 30 mins afterwards this time instead of immediately after).It doesn't happen at all and what I saw previously was cached DNS info that appeared when I reloaded ipleak.net (I'm quite sure I reloaded ipleak.net 3 or more times, though, which should have purged any cached info). Another quirk (not sure if this is related) happens when I do the following: Connect to the VPNCheck ipleak.netShut down the VPN clientStart the client and connect to the VPN againCheck ipleak.net again When I check ipleak.net a second time (refreshing the same tab), it usually shows my ISP's DNS servers along with Air's VPN servers. If I reload ipleak, my ISP's DNS entries vanish. What's strange is that I didn't refresh the page when the VPN was disconnected, so I'm not sure when it checked my for my ISP's DNS and loaded it. If I do this but open a new tab instead, it doesn't appear to happen (or maybe it just doesn't happen all the time - I haven't tested it that often). I thought at the time that ipleak was continually checking DNS in the background, so detected my ISP's servers when I disconnected the VPN and showed cached DNS entries when I reloaded the page after the VPN was back up. All of this is with Firefox 43.0.2. Quote Share this post Link to post
strykenKN 0 Posted ... AirVPN software produces an error under Windows 10 (x64) if it is installed. Every time I install it again, coming at the end of the installation the message: OpenVPN is not installed. But if you AirVPN starts and establishes a VPN connection, OpenVPN runs in the task. I think you should correct this and change dringenst that could ome users (like me) very irritating. Quote Share this post Link to post
internet_user 6 Posted ... So far i don't have any issue since Eddie 2.10.3 but can we expecting new version, new feature? 1 hugomueller reacted to this Quote Share this post Link to post