phisch 0 Posted ... Hi there, I need help fixing my dns leak. Some infos: I use ScriptSafe in addition to AVP via its own software, not openvpn. DNS Switch Mode is "Automatic". When I look at the adapter settings, I see the DNS Server of AirVPN (10.5.0.1). Log from right now: [spoiler]I 2016.06.08 16:23:50 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64. 2016.06.08 16:23:50 - Reading options from C:\Users\Besitzer\AppData\Local\AirVPN\AirVPN.xml. 2016.06.08 16:23:50 - Data Path: C:\Users\Besitzer\AppData\Local\AirVPN. 2016.06.08 16:23:50 - App Path: C:\Program Files\AirVPN. 2016.06.08 16:23:50 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe. 2016.06.08 16:23:50 - Command line arguments (1): path="home". 2016.06.08 16:23:50 - Operating System: Microsoft Windows NT 6.2.9200.0. 2016.06.08 16:23:50 - Updating systems & servers data ...I 2016.06.08 16:23:50 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1I 2016.06.08 16:23:50 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)I 2016.06.08 16:23:50 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)I 2016.06.08 16:23:50 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)! 2016.06.08 16:23:50 - Ready. 2016.06.08 16:23:50 - Systems & servers data update completed! 2016.06.08 16:23:53 - Activation of Network Lock - Windows FirewallI 2016.06.08 16:23:56 - Session starting.I 2016.06.08 16:23:56 - IPv6 disabled.I 2016.06.08 16:23:56 - Checking authorization ...! 2016.06.08 16:23:56 - Connecting to Celaeno (Netherlands, Alblasserdam). 2016.06.08 16:23:56 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.06.08 16:23:56 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.06.08 16:23:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.06.08 16:23:56 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.06.08 16:23:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.08 16:23:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.08 16:23:56 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.06.08 16:23:56 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.161.68:443 [nonblock]. 2016.06.08 16:23:57 - OpenVPN > TCP connection established with [AF_INET]213.152.161.68:443. 2016.06.08 16:23:57 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.06.08 16:23:57 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]213.152.161.68:443. 2016.06.08 16:23:57 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.68:443, sid=7d8d6b1a 1babc1d0. 2016.06.08 16:23:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.06.08 16:23:57 - OpenVPN > Validating certificate key usage. 2016.06.08 16:23:57 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.06.08 16:23:57 - OpenVPN > VERIFY KU OK. 2016.06.08 16:23:57 - OpenVPN > Validating certificate extended key usage. 2016.06.08 16:23:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.06.08 16:23:57 - OpenVPN > VERIFY EKU OK. 2016.06.08 16:23:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.06.08 16:23:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.08 16:23:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.08 16:23:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.08 16:23:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.08 16:23:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.06.08 16:23:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.68:443. 2016.06.08 16:24:01 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.06.08 16:24:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.4.95 255.255.0.0'. 2016.06.08 16:24:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.06.08 16:24:01 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.06.08 16:24:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.06.08 16:24:01 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.06.08 16:24:01 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.06.08 16:24:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.06.08 16:24:01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.06.08 16:24:01 - OpenVPN > open_tun, tt->ipv6=0. 2016.06.08 16:24:01 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{F9C25B5B-B5F9-4F8D-8608-B69FF7311AC4}.tap. 2016.06.08 16:24:01 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.06.08 16:24:01 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.4.95/255.255.0.0 [sUCCEEDED]. 2016.06.08 16:24:01 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.4.95/255.255.0.0 on interface {F9C25B5B-B5F9-4F8D-8608-B69FF7311AC4} [DHCP-serv: 10.5.255.254, lease-time: 31536000]. 2016.06.08 16:24:01 - OpenVPN > Successful ARP Flush on interface [16] {F9C25B5B-B5F9-4F8D-8608-B69FF7311AC4}. 2016.06.08 16:24:06 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.06.08 16:24:06 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.68 MASK 255.255.255.255 192.168.0.1. 2016.06.08 16:24:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.06.08 16:24:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.08 16:24:06 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 10. 2016.06.08 16:24:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.06.08 16:24:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.08 16:24:06 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1. 2016.06.08 16:24:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.08 16:24:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.08 16:24:06 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1. 2016.06.08 16:24:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.08 16:24:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.08 16:24:06 - Starting Management Interface. 2016.06.08 16:24:06 - OpenVPN > Initialization Sequence CompletedI 2016.06.08 16:24:06 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.06.08 16:24:06 - DNS of a network adapter forced (Intel® Ethernet Connection (2) I219-V #2)I 2016.06.08 16:24:06 - Flushing DNSI 2016.06.08 16:24:06 - Checking routeI 2016.06.08 16:24:31 - Checking DNS! 2016.06.08 16:24:31 - Connected.. 2016.06.08 16:24:31 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.06.08 16:24:31 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.06.08 16:24:31 - Disconnecting. 2016.06.08 16:24:31 - Management - Send 'signal SIGTERM'. 2016.06.08 16:24:31 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.06.08 16:24:31 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.68 MASK 255.255.255.255 192.168.0.1. 2016.06.08 16:24:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.08 16:24:31 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.0.1 MASK 255.255.255.255 192.168.0.1. 2016.06.08 16:24:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.08 16:24:31 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1. 2016.06.08 16:24:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.08 16:24:31 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1. 2016.06.08 16:24:31 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.06.08 16:24:31 - OpenVPN > Closing TUN/TAP interface. 2016.06.08 16:24:31 - OpenVPN > SIGTERM[hard,] received, process exiting. 2016.06.08 16:24:31 - Connection terminated.I 2016.06.08 16:24:31 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2016.06.08 16:24:31 - DNS of a network adapter restored to original settings (Intel® Ethernet Connection (2) I219-V #2)I 2016.06.08 16:24:34 - Checking authorization ...! 2016.06.08 16:24:34 - Connecting to Kitalpha (Switzerland, Zurich). 2016.06.08 16:24:34 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.06.08 16:24:34 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.06.08 16:24:34 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.06.08 16:24:35 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.06.08 16:24:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.08 16:24:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.08 16:24:35 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.06.08 16:24:35 - OpenVPN > Attempting to establish TCP connection with [AF_INET]91.214.169.68:443 [nonblock]. 2016.06.08 16:24:36 - OpenVPN > TCP connection established with [AF_INET]91.214.169.68:443. 2016.06.08 16:24:36 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.06.08 16:24:36 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]91.214.169.68:443. 2016.06.08 16:24:36 - OpenVPN > TLS: Initial packet from [AF_INET]91.214.169.68:443, sid=1eaf9b4c c61626cd. 2016.06.08 16:24:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.06.08 16:24:36 - OpenVPN > Validating certificate key usage. 2016.06.08 16:24:36 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.06.08 16:24:36 - OpenVPN > VERIFY KU OK. 2016.06.08 16:24:36 - OpenVPN > Validating certificate extended key usage. 2016.06.08 16:24:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.06.08 16:24:36 - OpenVPN > VERIFY EKU OK. 2016.06.08 16:24:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.06.08 16:24:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.08 16:24:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.08 16:24:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.06.08 16:24:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.06.08 16:24:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.06.08 16:24:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]91.214.169.68:443. 2016.06.08 16:24:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.06.08 16:24:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.2.109 255.255.0.0'. 2016.06.08 16:24:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.06.08 16:24:39 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.06.08 16:24:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.06.08 16:24:39 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.06.08 16:24:39 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.06.08 16:24:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.06.08 16:24:39 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.06.08 16:24:39 - OpenVPN > open_tun, tt->ipv6=0. 2016.06.08 16:24:39 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{F9C25B5B-B5F9-4F8D-8608-B69FF7311AC4}.tap. 2016.06.08 16:24:39 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.06.08 16:24:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.2.109/255.255.0.0 [sUCCEEDED]. 2016.06.08 16:24:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.2.109/255.255.0.0 on interface {F9C25B5B-B5F9-4F8D-8608-B69FF7311AC4} [DHCP-serv: 10.5.255.254, lease-time: 31536000]. 2016.06.08 16:24:39 - OpenVPN > Successful ARP Flush on interface [16] {F9C25B5B-B5F9-4F8D-8608-B69FF7311AC4}. 2016.06.08 16:24:44 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.06.08 16:24:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 91.214.169.68 MASK 255.255.255.255 192.168.0.1. 2016.06.08 16:24:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.06.08 16:24:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.08 16:24:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.0.1 MASK 255.255.255.255 192.168.0.1 IF 10. 2016.06.08 16:24:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2016.06.08 16:24:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.08 16:24:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1. 2016.06.08 16:24:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.08 16:24:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.08 16:24:44 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1. 2016.06.08 16:24:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.06.08 16:24:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.06.08 16:24:44 - Starting Management Interface. 2016.06.08 16:24:44 - OpenVPN > Initialization Sequence CompletedI 2016.06.08 16:24:44 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.06.08 16:24:44 - DNS of a network adapter forced (Intel® Ethernet Connection (2) I219-V #2)I 2016.06.08 16:24:44 - Flushing DNSI 2016.06.08 16:24:44 - Checking routeI 2016.06.08 16:24:44 - Checking DNS! 2016.06.08 16:24:45 - Connected.. 2016.06.08 16:24:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.06.08 16:24:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100[/spoiler] P.S.: Why doesn't the spoiler work? Quote Share this post Link to post
zhang888 1066 Posted ... Which DNS server(s) do you see in the leak test? 1 phisch reacted to this Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
phisch 0 Posted ... Either only the one of my ISP or both, my ISP and the one from AirVPN (Global Layer B.V. - AirVPN Server (in the Netherlands)). Right now it seems to be working again, but I didn't really change anything in addition to what I tried immediatly after recognizing my leak.I tried: Restarting PC, restarting AirVPN, clearing my whitelist of ScriptSafe and finally flushing my dns. Quote Share this post Link to post