Jump to content
Not connected, Your IP: 3.133.109.141

Recommended Posts

Hi,

 

I tried to create support ticket, but for some reason says there no message, when I clearly typed something on message field. That's why I am writing here in the forum.

 

Lately, I have been having a lot of drops, and it doesn't allow me to connect back to a server, just keeps on a loop --> connect to xxxxxx, disconnecting xxxxx ----> restarting in 3 2 1 ---> connecting to xxxxx.

 

This issue appears to be with Windows 10 or Eddie, as on my Android tablet I never have issues.

 

Thank you

 

Share this post


Link to post

Hello!

 

I can't tell you why the support ticket failed.

 

But if you want help, please go to your Eddie client and its Logs tab and paste all the logs here, as we otherwise don't know what's going on, thank you.

 

If you're unsure how, then there's instructions in my signature.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

That link doesn't work. You can use something like this instead or upload a file to your post as well.

 

Switching browsers is also an option. It seems you get many browser errors - did you make sure your browser is up to date?

 

No your real IP won't show, but your local username will.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

I'm interested in the answer as I have similar issue... connects, disconnects, retries same server....loop

I'm on firefox

Share this post


Link to post

I'm interested in the answer as I have similar issue... connects, disconnects, retries same server....loop

I'm on firefox

The issue may be the same, but the causes different. For that reason, it's best you supply any and all logs that you can please .


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Any  updates on my issue?

 

Here is today's log (smaller so I can post here. In the end I managed to get it working by exiting Eddie and starting the software again.

 

Log:

 
. 2018.04.01 12:48:57 - Sending management termination signal
. 2018.04.01 12:48:59 - Management - Send 'signal SIGTERM'
. 2018.04.01 12:48:59 - Connection terminated.
. 2018.04.01 12:48:59 - DNS leak protection with packet filtering disabled.
W 2018.04.01 12:49:00 - The requested protocol has not been configured into the system, or no implementation for it exists
I 2018.04.01 12:49:08 - Checking authorization ...
! 2018.04.01 12:49:09 - Connecting to Betelgeuse (United Kingdom, Maidenhead)
. 2018.04.01 12:49:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.01 12:49:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.01 12:49:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]84.39.116.179:443
. 2018.04.01 12:49:09 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.04.01 12:49:09 - OpenVPN > UDP link local: (not bound)
. 2018.04.01 12:49:09 - OpenVPN > UDP link remote: [AF_INET]84.39.116.179:443
. 2018.04.01 12:49:09 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.04.01 12:49:09 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.04.01 12:49:09 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2018.04.01 12:49:09 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting
! 2018.04.01 12:49:09 - Disconnecting
. 2018.04.01 12:49:09 - Sending soft termination signal
. 2018.04.01 12:49:14 - Connection terminated.
W 2018.04.01 12:49:14 - The requested protocol has not been configured into the system, or no implementation for it exists
I 2018.04.01 12:49:17 - Checking authorization ...
! 2018.04.01 12:49:18 - Connecting to Alathfar (United Kingdom, Maidenhead)
. 2018.04.01 12:49:18 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.04.01 12:49:18 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.04.01 12:49:18 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.04.01 12:49:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.04.01 12:49:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.01 12:49:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.01 12:49:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.103.96.134:443
. 2018.04.01 12:49:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.04.01 12:49:18 - OpenVPN > UDP link local: (not bound)
. 2018.04.01 12:49:18 - OpenVPN > UDP link remote: [AF_INET]185.103.96.134:443
. 2018.04.01 12:49:18 - OpenVPN > TLS: Initial packet from [AF_INET]185.103.96.134:443, sid=ae552bba 03b8cedc
. 2018.04.01 12:49:18 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.04.01 12:49:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.04.01 12:49:18 - OpenVPN > VERIFY KU OK
. 2018.04.01 12:49:18 - OpenVPN > Validating certificate extended key usage
. 2018.04.01 12:49:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.04.01 12:49:18 - OpenVPN > VERIFY EKU OK
. 2018.04.01 12:49:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.04.01 12:49:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.04.01 12:49:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]185.103.96.134:443
. 2018.04.01 12:49:18 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.04.01 12:49:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.11.117 255.255.0.0'
. 2018.04.01 12:49:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.04.01 12:49:18 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.04.01 12:49:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.04.01 12:49:18 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.04.01 12:49:18 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.04.01 12:49:18 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.04.01 12:49:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.04.01 12:49:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.01 12:49:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.04.01 12:49:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.01 12:49:18 - OpenVPN > interactive service msg_channel=0
. 2018.04.01 12:49:18 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=25 HWADDR=60:36:dd:45:e5:f2
. 2018.04.01 12:49:18 - OpenVPN > open_tun
. 2018.04.01 12:49:18 - OpenVPN > TAP-WIN32 device [Ethernet 4] opened: \\.\Global\{C402201D-25A4-4443-A88B-865001479238}.tap
. 2018.04.01 12:49:18 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.04.01 12:49:18 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.11.117/255.255.0.0 [sUCCEEDED]
. 2018.04.01 12:49:18 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.11.117/255.255.0.0 on interface {C402201D-25A4-4443-A88B-865001479238} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.04.01 12:49:18 - OpenVPN > Successful ARP Flush on interface [22] {C402201D-25A4-4443-A88B-865001479238}
. 2018.04.01 12:49:18 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.04.01 12:49:18 - OpenVPN > Closing TUN/TAP interface
. 2018.04.01 12:49:18 - OpenVPN > TAP: DHCP address released
. 2018.04.01 12:49:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2018.04.01 12:49:18 - Disconnecting
. 2018.04.01 12:49:19 - Sending soft termination signal
. 2018.04.01 12:49:26 - Connection terminated.
W 2018.04.01 12:49:26 - The requested protocol has not been configured into the system, or no implementation for it exists
I 2018.04.01 12:49:29 - Checking authorization ...
! 2018.04.01 12:49:29 - Connecting to Kitel (United Kingdom, Maidenhead)
. 2018.04.01 12:49:29 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.04.01 12:49:29 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.04.01 12:49:29 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.04.01 12:49:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.04.01 12:49:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.01 12:49:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.01 12:49:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.103.96.132:443
. 2018.04.01 12:49:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.04.01 12:49:29 - OpenVPN > UDP link local: (not bound)
. 2018.04.01 12:49:29 - OpenVPN > UDP link remote: [AF_INET]185.103.96.132:443
. 2018.04.01 12:49:29 - OpenVPN > TLS: Initial packet from [AF_INET]185.103.96.132:443, sid=a95666b8 d35d48cb
. 2018.04.01 12:49:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.04.01 12:49:29 - OpenVPN > VERIFY KU OK
. 2018.04.01 12:49:29 - OpenVPN > Validating certificate extended key usage
. 2018.04.01 12:49:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.04.01 12:49:29 - OpenVPN > VERIFY EKU OK
. 2018.04.01 12:49:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.04.01 12:49:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.04.01 12:49:29 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]185.103.96.132:443
. 2018.04.01 12:49:30 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.04.01 12:49:30 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.04.01 12:49:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.16.58 255.255.0.0'
. 2018.04.01 12:49:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.04.01 12:49:30 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.04.01 12:49:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.04.01 12:49:30 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.04.01 12:49:30 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.04.01 12:49:30 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.04.01 12:49:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.04.01 12:49:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.01 12:49:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.04.01 12:49:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.01 12:49:30 - OpenVPN > interactive service msg_channel=0
. 2018.04.01 12:49:30 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=25 HWADDR=60:36:dd:45:e5:f2
. 2018.04.01 12:49:30 - OpenVPN > open_tun
. 2018.04.01 12:49:30 - OpenVPN > TAP-WIN32 device [Ethernet 4] opened: \\.\Global\{C402201D-25A4-4443-A88B-865001479238}.tap
. 2018.04.01 12:49:30 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.04.01 12:49:30 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.16.58/255.255.0.0 [sUCCEEDED]
. 2018.04.01 12:49:30 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.16.58/255.255.0.0 on interface {C402201D-25A4-4443-A88B-865001479238} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.04.01 12:49:30 - OpenVPN > Successful ARP Flush on interface [22] {C402201D-25A4-4443-A88B-865001479238}
. 2018.04.01 12:49:30 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.04.01 12:49:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.04.01 12:49:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 185.103.96.132 MASK 255.255.255.255 192.168.1.254
. 2018.04.01 12:49:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4
. 2018.04.01 12:49:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.04.01 12:49:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.04.01 12:49:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.04.01 12:49:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.04.01 12:49:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.04.01 12:49:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.04.01 12:49:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.04.01 12:49:30 - Interface Ethernet 4 metric changed from Automatic to 3, layer IPv4
. 2018.04.01 12:49:30 - DNS leak protection with packet filtering enabled.
. 2018.04.01 12:49:30 - Flushing DNS
. 2018.04.01 12:49:30 - Shell(11) of 'cmd.exe', 2 args: '/c';'ipconfig /flushdns';
. 2018.04.01 12:49:30 - Shell(11) done in 78 ms, exit: 0, out: 'Windows IP Configuration
. 2018.04.01 12:49:30 -     Successfully flushed the DNS Resolver Cache.'
. 2018.04.01 12:49:30 - Shell(12) of 'cmd.exe', 2 args: '/c';'ipconfig /registerdns';
. 2018.04.01 12:49:33 - Shell(12) done in 3062 ms, exit: 0, out: 'Windows IP Configuration
. 2018.04.01 12:49:33 -     Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer in 15 minutes.'
I 2018.04.01 12:49:34 - Checking route
. 2018.04.01 12:49:34 - Checking route failed: 109.154.253.185
. 2018.04.01 12:49:34 - Checking route (2° try)
. 2018.04.01 12:49:35 - Checking route failed: 109.154.253.185
. 2018.04.01 12:49:35 - Checking route (3° try)
. 2018.04.01 12:49:37 - Checking route failed: 109.154.253.185
E 2018.04.01 12:49:37 - Checking route failed.
. 2018.04.01 12:49:37 - OpenVPN > Initialization Sequence Completed
. 2018.04.01 12:49:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 185.103.96.132 MASK 255.255.255.255 192.168.1.254
. 2018.04.01 12:49:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.04.01 12:49:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.04.01 12:49:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.04.01 12:49:37 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.04.01 12:49:37 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.04.01 12:49:37 - OpenVPN > Closing TUN/TAP interface
. 2018.04.01 12:49:37 - OpenVPN > TAP: DHCP address released
. 2018.04.01 12:49:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2018.04.01 12:49:37 - Disconnecting
. 2018.04.01 12:49:37 - Sending soft termination signal
. 2018.04.01 12:49:43 - Connection terminated.
. 2018.04.01 12:49:43 - DNS leak protection with packet filtering disabled.
. 2018.04.01 12:49:43 - Interface Ethernet 4 metric restored from 3 to Automatic, layer IPv4
W 2018.04.01 12:49:43 - The requested protocol has not been configured into the system, or no implementation for it exists
I 2018.04.01 12:49:46 - Checking authorization ...
! 2018.04.01 12:49:46 - Connecting to Alshain (United Kingdom, London)
. 2018.04.01 12:49:46 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.04.01 12:49:46 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.04.01 12:49:46 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.04.01 12:49:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.04.01 12:49:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.01 12:49:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.01 12:49:46 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.103.96.131:443
. 2018.04.01 12:49:46 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.04.01 12:49:46 - OpenVPN > UDP link local: (not bound)
. 2018.04.01 12:49:46 - OpenVPN > UDP link remote: [AF_INET]185.103.96.131:443
. 2018.04.01 12:49:46 - OpenVPN > TLS: Initial packet from [AF_INET]185.103.96.131:443, sid=8c6f17a2 7474ad6d
. 2018.04.01 12:49:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.04.01 12:49:46 - OpenVPN > VERIFY KU OK
. 2018.04.01 12:49:46 - OpenVPN > Validating certificate extended key usage
. 2018.04.01 12:49:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.04.01 12:49:46 - OpenVPN > VERIFY EKU OK
. 2018.04.01 12:49:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.04.01 12:49:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.04.01 12:49:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]185.103.96.131:443
. 2018.04.01 12:49:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.04.01 12:49:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.15 255.255.0.0'
. 2018.04.01 12:49:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.04.01 12:49:47 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.04.01 12:49:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.04.01 12:49:47 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.04.01 12:49:47 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.04.01 12:49:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.04.01 12:49:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.04.01 12:49:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.01 12:49:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.04.01 12:49:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.01 12:49:47 - OpenVPN > interactive service msg_channel=0
. 2018.04.01 12:49:47 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=25 HWADDR=60:36:dd:45:e5:f2
. 2018.04.01 12:49:47 - OpenVPN > open_tun
. 2018.04.01 12:49:47 - OpenVPN > TAP-WIN32 device [Ethernet 4] opened: \\.\Global\{C402201D-25A4-4443-A88B-865001479238}.tap
. 2018.04.01 12:49:47 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.04.01 12:49:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.15/255.255.0.0 [sUCCEEDED]
. 2018.04.01 12:49:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.15/255.255.0.0 on interface {C402201D-25A4-4443-A88B-865001479238} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.04.01 12:49:47 - OpenVPN > Successful ARP Flush on interface [22] {C402201D-25A4-4443-A88B-865001479238}
. 2018.04.01 12:49:47 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.04.01 12:49:47 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.04.01 12:49:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 185.103.96.131 MASK 255.255.255.255 192.168.1.254
. 2018.04.01 12:49:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4
. 2018.04.01 12:49:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.04.01 12:49:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.04.01 12:49:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=3 and dwForwardType=4
. 2018.04.01 12:49:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.04.01 12:49:47 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.04.01 12:49:47 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=3 and dwForwardType=4
. 2018.04.01 12:49:47 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.04.01 12:49:47 - Interface Ethernet 4 metric changed from Automatic to 3, layer IPv4
. 2018.04.01 12:49:47 - DNS leak protection with packet filtering enabled.
. 2018.04.01 12:49:47 - Flushing DNS
. 2018.04.01 12:49:47 - Shell(13) of 'cmd.exe', 2 args: '/c';'ipconfig /flushdns';
. 2018.04.01 12:49:47 - Shell(13) done in 47 ms, exit: 0, out: 'Windows IP Configuration
. 2018.04.01 12:49:47 -     Successfully flushed the DNS Resolver Cache.'
. 2018.04.01 12:49:47 - Shell(14) of 'cmd.exe', 2 args: '/c';'ipconfig /registerdns';
. 2018.04.01 12:49:50 - Shell(14) done in 3062 ms, exit: 0, out: 'Windows IP Configuration
. 2018.04.01 12:49:50 -     Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer in 15 minutes.'
. 2018.04.01 12:49:50 - OpenVPN > Initialization Sequence Completed
. 2018.04.01 12:49:50 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.04.01 12:49:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 185.103.96.131 MASK 255.255.255.255 192.168.1.254
. 2018.04.01 12:49:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.04.01 12:49:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.04.01 12:49:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.04.01 12:49:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.04.01 12:49:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.04.01 12:49:50 - OpenVPN > Closing TUN/TAP interface
. 2018.04.01 12:49:50 - OpenVPN > TAP: DHCP address released
. 2018.04.01 12:49:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2018.04.01 12:49:50 - Disconnecting
. 2018.04.01 12:49:50 - Sending soft termination signal
. 2018.04.01 12:49:57 - Updating systems & servers data ...
. 2018.04.01 12:49:58 - Connection terminated.
. 2018.04.01 12:49:58 - DNS leak protection with packet filtering disabled.
. 2018.04.01 12:49:58 - Interface Ethernet 4 metric restored from 3 to Automatic, layer IPv4
W 2018.04.01 12:49:59 - The requested protocol has not been configured into the system, or no implementation for it exists
. 2018.04.01 12:49:59 - Flushing DNS
. 2018.04.01 12:49:59 - Shell(15) of 'cmd.exe', 2 args: '/c';'ipconfig /flushdns';
. 2018.04.01 12:50:02 - Shell(15) done in 2313 ms, exit: 0, out: 'Windows IP Configuration
. 2018.04.01 12:50:02 -     Successfully flushed the DNS Resolver Cache.'
. 2018.04.01 12:50:02 - Shell(16) of 'cmd.exe', 2 args: '/c';'ipconfig /registerdns';
. 2018.04.01 12:50:03 - Systems & servers data update completed
. 2018.04.01 12:50:05 - Shell(16) done in 3094 ms, exit: 0, out: 'Windows IP Configuration
. 2018.04.01 12:50:05 -     Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer in 15 minutes.'
. 2018.04.01 12:50:05 - IPv6 restored with packet filtering.
! 2018.04.01 12:50:05 - Session terminated.
. 2018.04.01 12:50:05 - Shutdown in progress
. 2018.04.01 12:50:06 - Deactivation of Network Lock
. 2018.04.01 12:50:06 - Shutdown complete
F 2018.04.01 12:50:06 - Unexpected error. Please contact our support staff. - The parameter is incorrect.
F 2018.04.01 12:50:06 -     -    at System.IO.__Error.WinIOError(Int32 errorCode, String maybeFullPath)
F 2018.04.01 12:50:06 -     at System.Console.ControlCHooker.Unhook()
F 2018.04.01 12:50:06 -     at System.Console.ControlCHooker.Finalize()
. 2018.04.01 12:52:11 - Command line arguments (1): path="home"
. 2018.04.01 12:52:12 - Shell(1) of 'C:\Program Files\AirVPN\openvpn.exe', 1 args: '--version';
. 2018.04.01 12:52:12 - Shell(1) done in 47 ms, exit: 1, out: 'OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.04.01 12:52:12 -     library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.04.01 12:52:12 -     Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.04.01 12:52:12 -     Originally developed by James Yonan
. 2018.04.01 12:52:12 -     Copyright © 2002-2017 OpenVPN Technologies, Inc. <sales@openvpn.net>
. 2018.04.01 12:52:12 -     Compile time defines: enable_async_push=no enable_comp_stub=no enable_crypto=yes enable_crypto_ofb_cfb=yes enable_debug=yes enable_def_auth=yes enable_dlopen=unknown enable_dlopen_self=unknown enable_dlopen_self_static=unknown enable_fast_install=needless enable_fragment=yes enable_iproute2=no enable_libtool_lock=yes enable_lz4=yes enable_lzo=yes enable_management=yes enable_multi=yes enable_multihome=yes enable_pam_dlopen=no enable_pedantic=no enable_pf=yes enable_pkcs11=yes enable_plugin_auth_pam=no enable_plugin_down_root=no enable_plugins=yes enable_port_share=yes enable_selinux=no enable_server=yes enable_shared=yes enable_shared_with_static_runtimes=yes enable_small=no enable_static=yes enable_strict=no enable_strict_options=no enable_systemd=no enable_werror=no enable_win32_dll=yes enable_x509_alt_username=no with_aix_soname=aix with_crypto_library=openssl with_gnu_ld=yes with_mem_check=no with_special_build= with_sysroot=no'
. 2018.04.01 12:52:12 - Shell(2) of 'C:\Program Files\AirVPN\plink.exe', 1 args: '-V';
. 2018.04.01 12:52:12 - Shell(2) done in 188 ms, exit: 1, out: 'plink: Release 0.67'
. 2018.04.01 12:52:12 - Shell(3) of 'C:\Program Files\AirVPN\stunnel.exe', 1 args: '-version';
. 2018.04.01 12:52:14 - Shell(3) done in 1703 ms, exit: 0, err: 'stunnel 5.40 on x86-pc-mingw32-gnu platform
. 2018.04.01 12:52:14 -     Compiled/running with OpenSSL 1.0.2k  26 Jan 2017
. 2018.04.01 12:52:14 -     Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2018.04.01 12:52:14 -     Global options:
. 2018.04.01 12:52:14 -     RNDbytes               = 64
. 2018.04.01 12:52:14 -     RNDoverwrite           = yes
. 2018.04.01 12:52:14 -     taskbar                = yes
. 2018.04.01 12:52:14 -     Service-level options:
. 2018.04.01 12:52:14 -     ciphers                = HIGH:!DH:!aNULL:!SSLv2
. 2018.04.01 12:52:14 -     curve                  = prime256v1
. 2018.04.01 12:52:14 -     debug                  = notice
. 2018.04.01 12:52:14 -     logId                  = sequential
. 2018.04.01 12:52:14 -     options                = NO_SSLv2
. 2018.04.01 12:52:14 -     options                = NO_SSLv3
. 2018.04.01 12:52:14 -     sessionCacheSize       = 1000
. 2018.04.01 12:52:14 -     sessionCacheTimeout    = 300 seconds
. 2018.04.01 12:52:14 -     stack                  = 65536 bytes
. 2018.04.01 12:52:14 -     TIMEOUTbusy            = 300 seconds
. 2018.04.01 12:52:14 -     TIMEOUTclose           = 60 seconds
. 2018.04.01 12:52:14 -     TIMEOUTconnect         = 10 seconds
. 2018.04.01 12:52:14 -     TIMEOUTidle            = 43200 seconds
. 2018.04.01 12:52:14 -     verify                 = none'
. 2018.04.01 12:52:14 - Shell(4) of 'C:\Program Files\AirVPN\curl.exe', 1 args: '--version';
. 2018.04.01 12:52:14 - Shell(4) done in 47 ms, exit: 0, out: 'curl 7.54.1 (x86_64-pc-win32) libcurl/7.54.1 OpenSSL/1.1.0f zlib/1.2.11 WinIDN libssh2/1.8.0 nghttp2/1.23.1
. 2018.04.01 12:52:14 -     Release-Date: 2017-06-14
. 2018.04.01 12:52:14 -     Protocols: dict file ftp ftps gopher http https imap imaps ldap ldaps pop3 pop3s rtsp scp sftp smtp smtps telnet tftp
. 2018.04.01 12:52:14 -     Features: AsynchDNS IDN IPv6 Largefile SSPI Kerberos SPNEGO NTLM SSL libz TLS-SRP HTTP2 HTTPS-proxy'
I 2018.04.01 12:52:14 - OpenVPN Driver - TAP-Windows Adapter V9 #3, version 9.21.2
I 2018.04.01 12:52:14 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
I 2018.04.01 12:52:14 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2018.04.01 12:52:14 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
I 2018.04.01 12:52:14 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
I 2018.04.01 12:52:14 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem
W 2018.04.01 12:52:15 - Recovery. Unexpected crash?
E 2018.04.01 12:52:15 - The requested protocol has not been configured into the system, or no implementation for it exists
! 2018.04.01 12:52:15 - Activation of Network Lock - Windows Filtering Platform
. 2018.04.01 12:52:15 - Updating systems & servers data ...
I 2018.04.01 12:52:15 - Session starting.
. 2018.04.01 12:52:16 - IPv6 disabled with packet filtering.
. 2018.04.01 12:52:16 - Systems & servers data update completed
I 2018.04.01 12:52:20 - Checking authorization ...
! 2018.04.01 12:52:20 - Connecting to Asterion (United Kingdom, London)
. 2018.04.01 12:52:20 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.04.01 12:52:20 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.04.01 12:52:20 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.04.01 12:52:20 - Connection to OpenVPN Management Interface
. 2018.04.01 12:52:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.04.01 12:52:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.01 12:52:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.01 12:52:21 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]217.151.98.167:443
. 2018.04.01 12:52:21 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.04.01 12:52:21 - OpenVPN > UDP link local: (not bound)
. 2018.04.01 12:52:21 - OpenVPN > UDP link remote: [AF_INET]217.151.98.167:443
. 2018.04.01 12:52:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.04.01 12:52:21 - OpenVPN > TLS: Initial packet from [AF_INET]217.151.98.167:443, sid=18321bf6 3701e1c8
. 2018.04.01 12:52:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.04.01 12:52:21 - OpenVPN > VERIFY KU OK
. 2018.04.01 12:52:21 - OpenVPN > Validating certificate extended key usage
. 2018.04.01 12:52:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.04.01 12:52:21 - OpenVPN > VERIFY EKU OK
. 2018.04.01 12:52:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.04.01 12:52:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.04.01 12:52:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]217.151.98.167:443
. 2018.04.01 12:52:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.04.01 12:52:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.15.241 255.255.0.0'
. 2018.04.01 12:52:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.04.01 12:52:22 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.04.01 12:52:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.04.01 12:52:22 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.04.01 12:52:22 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.04.01 12:52:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.04.01 12:52:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.04.01 12:52:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.01 12:52:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.04.01 12:52:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.01 12:52:22 - OpenVPN > interactive service msg_channel=0
. 2018.04.01 12:52:22 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=25 HWADDR=60:36:dd:45:e5:f2
. 2018.04.01 12:52:22 - OpenVPN > open_tun
. 2018.04.01 12:52:22 - OpenVPN > TAP-WIN32 device [Ethernet 4] opened: \\.\Global\{C402201D-25A4-4443-A88B-865001479238}.tap
. 2018.04.01 12:52:22 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.04.01 12:52:22 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.15.241/255.255.0.0 [sUCCEEDED]
. 2018.04.01 12:52:22 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.15.241/255.255.0.0 on interface {C402201D-25A4-4443-A88B-865001479238} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.04.01 12:52:22 - OpenVPN > Successful ARP Flush on interface [22] {C402201D-25A4-4443-A88B-865001479238}
. 2018.04.01 12:52:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.04.01 12:52:27 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.04.01 12:52:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 217.151.98.167 MASK 255.255.255.255 192.168.1.254
. 2018.04.01 12:52:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4
. 2018.04.01 12:52:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.04.01 12:52:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.04.01 12:52:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.04.01 12:52:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.04.01 12:52:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.04.01 12:52:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.04.01 12:52:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.04.01 12:52:27 - Interface Ethernet 4 metric changed from Automatic to 3, layer IPv4
. 2018.04.01 12:52:27 - DNS leak protection with packet filtering enabled.
. 2018.04.01 12:52:27 - Flushing DNS
. 2018.04.01 12:52:27 - Shell(5) of 'cmd.exe', 2 args: '/c';'ipconfig /flushdns';
. 2018.04.01 12:52:27 - Shell(5) done in 78 ms, exit: 0, out: 'Windows IP Configuration
. 2018.04.01 12:52:27 -     Successfully flushed the DNS Resolver Cache.'
. 2018.04.01 12:52:27 - Shell(6) of 'cmd.exe', 2 args: '/c';'ipconfig /registerdns';
. 2018.04.01 12:52:31 - Shell(6) done in 3078 ms, exit: 0, out: 'Windows IP Configuration
. 2018.04.01 12:52:31 -     Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer in 15 minutes.'
I 2018.04.01 12:52:31 - Checking route
! 2018.04.01 12:52:31 - Connected.
. 2018.04.01 12:52:31 - OpenVPN > Initialization Sequence Completed
 

Share this post


Link to post

Those are some errors I'm not familiar with. Your best bet right now would most likely be to try the experimental Eddie client, if you didn't do so already.

 

Then kindly report back. You can find instructions in my signature if you don't know where to get it. I don't recall if you're already using the latest stable release or not.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Have exactly the same problem. Airvpn tries to connect, disconnects then rrepeat. If Airvpn is not working than neither does my internet for some reason I Cannot phanthom. Trying the beta vetsion without a connecyion doesn't seem plausable and am at my wits end.

 

Hope this problem can be resolved this evening.

Share this post


Link to post

Have exactly the same problem. Airvpn tries to connect, disconnects then rrepeat. If Airvpn is not working than neither does my internet for some reason I Cannot phanthom. Trying the beta vetsion without a connecyion doesn't seem plausable and am at my wits end.

 

Hope this problem can be resolved this evening.

We can't help you if you don't supply any logs. The issue may appear to be the same, while the causes are different. If you don't know how, you're welcome to check the guide in my signature.

 

It sounds like you enabled Network Lock - in which case the software is doing what it's supposed to do: no Air connection, no connection at all for you, to stop leaks.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Those are some errors I'm not familiar with. Your best bet right now would most likely be to try the experimental Eddie client, if you didn't do so already.

 

Then kindly report back. You can find instructions in my signature if you don't know where to get it. I don't recall if you're already using the latest stable release or not.

 

I'm using Version 2.13.6.

 

I installed latest version I could find which was the experimental/ beta 2.14.2 but that one didn't even allow me to connect once. Here is the log for the new version (2.14.2):

 

. 2018.04.02 03:11:37 - Eddie version: 2.14.2 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319
. 2018.04.02 03:11:37 - Reading options from C:\Users\User\AppData\Local\AirVPN\AirVPN.xml
. 2018.04.02 03:11:37 - Command line arguments (1): path="home"
. 2018.04.02 03:11:38 - Shell(1) of 'cmd.exe', 2 args: '/c';'route -4 PRINT';
. 2018.04.02 03:11:38 - Shell(1) done in 47 ms, exit: 0, out: '===========================================================================
. 2018.04.02 03:11:38 -     Interface List
. 2018.04.02 03:11:38 -     17...88 ad 43 f3 c3 94 ......Realtek PCIe GBE Family Controller
. 2018.04.02 03:11:38 -     2...48 45 20 dc 5e 3e ......Microsoft Wi-Fi Direct Virtual Adapter
. 2018.04.02 03:11:38 -     13...00 ff ca bc 91 5f ......TAP-Windows Adapter V9
. 2018.04.02 03:11:38 -     14...48 45 20 dc 5e 3d ......Intel® Dual Band Wireless-AC 7265 #2
. 2018.04.02 03:11:38 -     3...48 45 20 dc 5e 41 ......Bluetooth Device (Personal Area Network)
. 2018.04.02 03:11:38 -     1...........................Software Loopback Interface 1
. 2018.04.02 03:11:38 -     ===========================================================================
. 2018.04.02 03:11:38 -     IPv4 Route Table
. 2018.04.02 03:11:38 -     ===========================================================================
. 2018.04.02 03:11:38 -     Active Routes:
. 2018.04.02 03:11:38 -     Network Destination        Netmask          Gateway       Interface  Metric
. 2018.04.02 03:11:38 -     0.0.0.0          0.0.0.0    192.168.1.254     192.168.1.99     35
. 2018.04.02 03:11:38 -     127.0.0.0        255.0.0.0         On-link         127.0.0.1    331
. 2018.04.02 03:11:38 -     127.0.0.1  255.255.255.255         On-link         127.0.0.1    331
. 2018.04.02 03:11:38 -     127.255.255.255  255.255.255.255         On-link         127.0.0.1    331
. 2018.04.02 03:11:38 -     169.254.0.0      255.255.0.0         On-link      169.254.20.6    291
. 2018.04.02 03:11:38 -     169.254.20.6  255.255.255.255         On-link      169.254.20.6    291
. 2018.04.02 03:11:38 -     169.254.255.255  255.255.255.255         On-link      169.254.20.6    291
. 2018.04.02 03:11:38 -     192.168.1.0    255.255.255.0         On-link      192.168.1.99    291
. 2018.04.02 03:11:38 -     192.168.1.99  255.255.255.255         On-link      192.168.1.99    291
. 2018.04.02 03:11:38 -     192.168.1.255  255.255.255.255         On-link      192.168.1.99    291
. 2018.04.02 03:11:38 -     224.0.0.0        240.0.0.0         On-link         127.0.0.1    331
. 2018.04.02 03:11:38 -     224.0.0.0        240.0.0.0         On-link      169.254.20.6    291
. 2018.04.02 03:11:38 -     224.0.0.0        240.0.0.0         On-link      192.168.1.99    291
. 2018.04.02 03:11:38 -     255.255.255.255  255.255.255.255         On-link         127.0.0.1    331
. 2018.04.02 03:11:38 -     255.255.255.255  255.255.255.255         On-link      169.254.20.6    291
. 2018.04.02 03:11:38 -     255.255.255.255  255.255.255.255         On-link      192.168.1.99    291
. 2018.04.02 03:11:38 -     ===========================================================================
. 2018.04.02 03:11:38 -     Persistent Routes:
. 2018.04.02 03:11:38 -     None'
. 2018.04.02 03:11:38 - Shell(2) of 'cmd.exe', 2 args: '/c';'route -6 PRINT';
. 2018.04.02 03:11:38 - Shell(2) done in 31 ms, exit: 0, out: '===========================================================================
. 2018.04.02 03:11:38 -     Interface List
. 2018.04.02 03:11:38 -     17...88 ad 43 f3 c3 94 ......Realtek PCIe GBE Family Controller
. 2018.04.02 03:11:38 -     2...48 45 20 dc 5e 3e ......Microsoft Wi-Fi Direct Virtual Adapter
. 2018.04.02 03:11:38 -     13...00 ff ca bc 91 5f ......TAP-Windows Adapter V9
. 2018.04.02 03:11:38 -     14...48 45 20 dc 5e 3d ......Intel® Dual Band Wireless-AC 7265 #2
. 2018.04.02 03:11:38 -     3...48 45 20 dc 5e 41 ......Bluetooth Device (Personal Area Network)
. 2018.04.02 03:11:38 -     1...........................Software Loopback Interface 1
. 2018.04.02 03:11:38 -     ===========================================================================
. 2018.04.02 03:11:38 -     IPv6 Route Table
. 2018.04.02 03:11:38 -     ===========================================================================
. 2018.04.02 03:11:38 -     Active Routes:
. 2018.04.02 03:11:38 -     If Metric Network Destination      Gateway
. 2018.04.02 03:11:38 -     1    331 ::1/128                  On-link
. 2018.04.02 03:11:38 -     1    331 ff00::/8                 On-link
. 2018.04.02 03:11:38 -     ===========================================================================
. 2018.04.02 03:11:38 -     Persistent Routes:
. 2018.04.02 03:11:38 -     None'
. 2018.04.02 03:11:39 - Shell(3) of 'C:\Program Files\AirVPN\openvpn.exe', 1 args: '--version';
. 2018.04.02 03:11:39 - Shell(3) done in 47 ms, exit: 1, out: 'OpenVPN 2.4.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Nov  3 2017
. 2018.04.02 03:11:39 -     library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.04.02 03:11:39 -     Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.04.02 03:11:39 -     Originally developed by James Yonan
. 2018.04.02 03:11:39 -     Copyright © 2002-2017 OpenVPN Technologies, Inc. <sales@openvpn.net>
. 2018.04.02 03:11:39 -     Compile time defines: enable_async_push=no enable_comp_stub=no enable_crypto=yes enable_crypto_ofb_cfb=yes enable_debug=yes enable_def_auth=yes enable_dlopen=unknown enable_dlopen_self=unknown enable_dlopen_self_static=unknown enable_fast_install=needless enable_fragment=yes enable_iproute2=no enable_libtool_lock=yes enable_lz4=yes enable_lzo=yes enable_management=yes enable_multihome=yes enable_pam_dlopen=no enable_pedantic=no enable_pf=yes enable_pkcs11=yes enable_plugin_auth_pam=no enable_plugin_down_root=no enable_plugins=yes enable_port_share=yes enable_selinux=no enable_server=yes enable_shared=yes enable_shared_with_static_runtimes=yes enable_small=no enable_static=yes enable_strict=no enable_strict_options=no enable_systemd=no enable_werror=no enable_win32_dll=yes enable_x509_alt_username=no with_crypto_library=openssl with_gnu_ld=yes with_mem_check=no with_special_build= with_sysroot=no'
. 2018.04.02 03:11:39 - Shell(4) of 'C:\Program Files\AirVPN\plink.exe', 1 args: '-V';
. 2018.04.02 03:11:39 - Shell(4) done in 94 ms, exit: 1, out: 'plink: Release 0.67'
. 2018.04.02 03:11:39 - Shell(5) of 'C:\Program Files\AirVPN\stunnel.exe', 1 args: '-version';
. 2018.04.02 03:11:40 - Shell(5) done in 797 ms, exit: 0, err: 'stunnel 5.40 on x86-pc-mingw32-gnu platform
. 2018.04.02 03:11:40 -     Compiled/running with OpenSSL 1.0.2k  26 Jan 2017
. 2018.04.02 03:11:40 -     Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2018.04.02 03:11:40 -     Global options:
. 2018.04.02 03:11:40 -     RNDbytes               = 64
. 2018.04.02 03:11:40 -     RNDoverwrite           = yes
. 2018.04.02 03:11:40 -     taskbar                = yes
. 2018.04.02 03:11:40 -     Service-level options:
. 2018.04.02 03:11:40 -     ciphers                = HIGH:!DH:!aNULL:!SSLv2
. 2018.04.02 03:11:40 -     curve                  = prime256v1
. 2018.04.02 03:11:40 -     debug                  = notice
. 2018.04.02 03:11:40 -     logId                  = sequential
. 2018.04.02 03:11:40 -     options                = NO_SSLv2
. 2018.04.02 03:11:40 -     options                = NO_SSLv3
. 2018.04.02 03:11:40 -     sessionCacheSize       = 1000
. 2018.04.02 03:11:40 -     sessionCacheTimeout    = 300 seconds
. 2018.04.02 03:11:40 -     stack                  = 65536 bytes
. 2018.04.02 03:11:40 -     TIMEOUTbusy            = 300 seconds
. 2018.04.02 03:11:40 -     TIMEOUTclose           = 60 seconds
. 2018.04.02 03:11:40 -     TIMEOUTconnect         = 10 seconds
. 2018.04.02 03:11:40 -     TIMEOUTidle            = 43200 seconds
. 2018.04.02 03:11:40 -     verify                 = none'
. 2018.04.02 03:11:40 - Shell(6) of 'C:\Program Files\AirVPN\curl.exe', 1 args: '--version';
. 2018.04.02 03:11:40 - Shell(6) done in 297 ms, exit: 0, out: 'curl 7.54.1 (x86_64-pc-win32) libcurl/7.54.1 OpenSSL/1.1.0f zlib/1.2.11 WinIDN libssh2/1.8.0 nghttp2/1.23.1
. 2018.04.02 03:11:40 -     Release-Date: 2017-06-14
. 2018.04.02 03:11:40 -     Protocols: dict file ftp ftps gopher http https imap imaps ldap ldaps pop3 pop3s rtsp scp sftp smtp smtps telnet tftp
. 2018.04.02 03:11:40 -     Features: AsynchDNS IDN IPv6 Largefile SSPI Kerberos SPNEGO NTLM SSL libz TLS-SRP HTTP2 HTTPS-proxy'
. 2018.04.02 03:11:40 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
. 2018.04.02 03:11:40 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2018.04.02 03:11:40 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2018.04.02 03:11:40 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2018.04.02 03:11:40 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
. 2018.04.02 03:11:40 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem
W 2018.04.02 03:11:40 - Recovery. Unexpected crash?
E 2018.04.02 03:11:40 - The requested protocol has not been configured into the system, or no implementation for it exists - Stack:    at System.Net.NetworkInformation.SystemIPInterfaceProperties.GetIPv6Properties()
E 2018.04.02 03:11:40 -     at Eddie.Platform.Windows.Platform.OnInterfaceRestore()
E 2018.04.02 03:11:40 -     at Eddie.Core.Platform.OnRecoveryLoad(XmlElement root)
E 2018.04.02 03:11:40 -     at Eddie.Core.Recovery.Load()
! 2018.04.02 03:11:40 - Activation of Network Lock - Windows Filtering Platform
. 2018.04.02 03:11:40 - Updating systems & servers data ...
I 2018.04.02 03:11:41 - Session starting.
. 2018.04.02 03:11:41 - Systems & servers data update completed
I 2018.04.02 03:11:45 - Checking authorization ...
. 2018.04.02 03:11:45 - IPv6 disabled with packet filtering.
! 2018.04.02 03:11:45 - Connecting to Gienah (Netherlands, Alblasserdam)
. 2018.04.02 03:11:46 - OpenVPN > OpenVPN 2.4.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Nov  3 2017
. 2018.04.02 03:11:46 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.04.02 03:11:46 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.04.02 03:11:46 - Connection to OpenVPN Management Interface
. 2018.04.02 03:11:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.04.02 03:11:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.02 03:11:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.02 03:11:46 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.93:443
. 2018.04.02 03:11:46 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.04.02 03:11:46 - OpenVPN > UDP link local: (not bound)
. 2018.04.02 03:11:46 - OpenVPN > UDP link remote: [AF_INET]213.152.162.93:443
. 2018.04.02 03:11:46 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.04.02 03:11:46 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.93:443, sid=19cd73ab 884d55b6
. 2018.04.02 03:11:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.04.02 03:11:46 - OpenVPN > VERIFY KU OK
. 2018.04.02 03:11:46 - OpenVPN > Validating certificate extended key usage
. 2018.04.02 03:11:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.04.02 03:11:46 - OpenVPN > VERIFY EKU OK
. 2018.04.02 03:11:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.04.02 03:11:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.04.02 03:11:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.93:443
. 2018.04.02 03:11:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.04.02 03:11:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.51.153 255.255.0.0'
. 2018.04.02 03:11:47 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.04.02 03:11:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.04.02 03:11:47 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.04.02 03:11:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.04.02 03:11:47 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.04.02 03:11:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.04.02 03:11:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.04.02 03:11:47 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.02 03:11:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.04.02 03:11:47 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.02 03:11:47 - OpenVPN > interactive service msg_channel=0
. 2018.04.02 03:11:47 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=14 HWADDR=48:45:20:dc:5e:3d
. 2018.04.02 03:11:47 - OpenVPN > open_tun
W 2018.04.02 03:11:47 - Windows WFP, Add rule failed: Interface ID '{CABC915F-0843-49E3-A721-B9009AFF687F}' unknown or disabled for the layer.:<rule name="NetLock - Interface - Allow {CABC915F-0843-49E3-A721-B9009AFF687F} - IPv6" layer="ale_auth_recv_accept_v6" action="permit" weight="1000"><if field="ip_local_interface" match="equal" interface="{CABC915F-0843-49E3-A721-B9009AFF687F}" /></rule> - Stack:    at Eddie.Platform.Windows.Wfp.AddItem(String code, XmlElement xml)
W 2018.04.02 03:11:47 -     at Eddie.Platform.Windows.NetworkLockWfp.AddRule(String code, XmlElement xmlRule)
W 2018.04.02 03:11:47 -     at Eddie.Core.NetworkLockManager.AllowInterface(String id)
W 2018.04.02 03:11:47 -     at Eddie.Core.InterfaceScope.Start(String id)
W 2018.04.02 03:11:47 -     at Eddie.Core.Threads.Session.ProcessLogEvent(String source, String message)
. 2018.04.02 03:11:47 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.04.02 03:11:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.51.153/255.255.0.0 [sUCCEEDED]
. 2018.04.02 03:11:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.51.153/255.255.0.0 on interface {CABC915F-0843-49E3-A721-B9009AFF687F} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.04.02 03:11:47 - OpenVPN > Successful ARP Flush on interface [13] {CABC915F-0843-49E3-A721-B9009AFF687F}
. 2018.04.02 03:11:47 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
! 2018.04.02 03:11:47 - Disconnecting
. 2018.04.02 03:11:47 - Sending management termination signal
. 2018.04.02 03:11:47 - Management - Send 'signal SIGTERM'
. 2018.04.02 03:11:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.04.02 03:11:47 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.04.02 03:11:52 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
. 2018.04.02 03:11:52 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.04.02 03:11:52 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2018.04.02 03:11:52 - Shell(7) of 'cmd.exe', 2 args: '/c';'netsh interface set interface "Ethernet 2" ENABLED';
. 2018.04.02 03:11:52 - Shell(7) done in 187 ms, exit: 0
. 2018.04.02 03:11:52 - OpenVPN > Closing TUN/TAP interface
. 2018.04.02 03:11:52 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: An address has not yet been associated with the network endpoint.   (code=1228)
. 2018.04.02 03:11:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.04.02 03:11:52 - Connection terminated.
. 2018.04.02 03:11:52 - IPv6 restored with packet filtering.
W 2018.04.02 03:11:52 - The requested protocol has not been configured into the system, or no implementation for it exists - Stack:    at System.Net.NetworkInformation.SystemIPInterfaceProperties.GetIPv6Properties()
W 2018.04.02 03:11:52 -     at Eddie.Platform.Windows.Platform.OnInterfaceRestore()
W 2018.04.02 03:11:52 -     at Eddie.Core.Threads.Session.OnRun()
I 2018.04.02 03:11:55 - Checking authorization ...
. 2018.04.02 03:11:56 - IPv6 disabled with packet filtering.
! 2018.04.02 03:11:56 - Connecting to Alphecca (Netherlands, Alblasserdam)
. 2018.04.02 03:11:56 - OpenVPN > OpenVPN 2.4.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Nov  3 2017
. 2018.04.02 03:11:56 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.04.02 03:11:56 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.04.02 03:11:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.04.02 03:11:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.02 03:11:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.02 03:11:56 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.4:443
. 2018.04.02 03:11:56 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.04.02 03:11:56 - OpenVPN > UDP link local: (not bound)
. 2018.04.02 03:11:56 - OpenVPN > UDP link remote: [AF_INET]109.202.107.4:443
. 2018.04.02 03:11:56 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.4:443, sid=b786c7d5 006331fa
. 2018.04.02 03:11:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.04.02 03:11:56 - OpenVPN > VERIFY KU OK
. 2018.04.02 03:11:56 - OpenVPN > Validating certificate extended key usage
. 2018.04.02 03:11:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.04.02 03:11:56 - OpenVPN > VERIFY EKU OK
. 2018.04.02 03:11:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.04.02 03:11:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.04.02 03:11:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.4:443
. 2018.04.02 03:11:58 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.04.02 03:11:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.37.78 255.255.0.0'
. 2018.04.02 03:11:58 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.04.02 03:11:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.04.02 03:11:58 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.04.02 03:11:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.04.02 03:11:58 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.04.02 03:11:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.04.02 03:11:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.04.02 03:11:58 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.02 03:11:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.04.02 03:11:58 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.02 03:11:58 - OpenVPN > interactive service msg_channel=0
. 2018.04.02 03:11:58 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=14 HWADDR=48:45:20:dc:5e:3d
. 2018.04.02 03:11:58 - OpenVPN > open_tun
W 2018.04.02 03:11:58 - Windows WFP, Add rule failed: Interface ID '{CABC915F-0843-49E3-A721-B9009AFF687F}' unknown or disabled for the layer.:<rule name="NetLock - Interface - Allow {CABC915F-0843-49E3-A721-B9009AFF687F} - IPv6" layer="ale_auth_recv_accept_v6" action="permit" weight="1000"><if field="ip_local_interface" match="equal" interface="{CABC915F-0843-49E3-A721-B9009AFF687F}" /></rule> - Stack:    at Eddie.Platform.Windows.Wfp.AddItem(String code, XmlElement xml)
W 2018.04.02 03:11:58 -     at Eddie.Platform.Windows.NetworkLockWfp.AddRule(String code, XmlElement xmlRule)
W 2018.04.02 03:11:58 -     at Eddie.Core.NetworkLockManager.AllowInterface(String id)
W 2018.04.02 03:11:58 -     at Eddie.Core.InterfaceScope.Start(String id)
W 2018.04.02 03:11:58 -     at Eddie.Core.Threads.Session.ProcessLogEvent(String source, String message)
. 2018.04.02 03:11:58 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.04.02 03:11:58 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.37.78/255.255.0.0 [sUCCEEDED]
. 2018.04.02 03:11:58 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.37.78/255.255.0.0 on interface {CABC915F-0843-49E3-A721-B9009AFF687F} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.04.02 03:11:58 - OpenVPN > Successful ARP Flush on interface [13] {CABC915F-0843-49E3-A721-B9009AFF687F}
. 2018.04.02 03:11:58 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
! 2018.04.02 03:11:58 - Disconnecting
. 2018.04.02 03:11:58 - Sending soft termination signal
. 2018.04.02 03:12:08 - Connection terminated.
. 2018.04.02 03:12:08 - IPv6 restored with packet filtering.
W 2018.04.02 03:12:08 - The requested protocol has not been configured into the system, or no implementation for it exists - Stack:    at System.Net.NetworkInformation.SystemIPInterfaceProperties.GetIPv6Properties()
W 2018.04.02 03:12:08 -     at Eddie.Platform.Windows.Platform.OnInterfaceRestore()
W 2018.04.02 03:12:08 -     at Eddie.Core.Threads.Session.OnRun()
I 2018.04.02 03:12:11 - Checking authorization ...
. 2018.04.02 03:12:11 - IPv6 disabled with packet filtering.
! 2018.04.02 03:12:11 - Connecting to Pleione (Netherlands, Alblasserdam)
W 2018.04.02 03:12:11 - OpenVPN > WARN: win_trigger_event: WriteConsoleInput: No such device or address (errno=6)
. 2018.04.02 03:12:11 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.04.02 03:12:11 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
. 2018.04.02 03:12:11 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.04.02 03:12:11 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2018.04.02 03:12:11 - Shell(8) of 'cmd.exe', 2 args: '/c';'netsh interface set interface "Ethernet 2" ENABLED';
. 2018.04.02 03:12:12 - Shell(8) done in 188 ms, exit: 0
. 2018.04.02 03:12:12 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
. 2018.04.02 03:12:12 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.04.02 03:12:12 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2018.04.02 03:12:12 - Shell(9) of 'cmd.exe', 2 args: '/c';'netsh interface set interface "Ethernet 2" ENABLED';
. 2018.04.02 03:12:12 - Shell(9) done in 187 ms, exit: 0
. 2018.04.02 03:12:12 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
. 2018.04.02 03:12:12 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.04.02 03:12:12 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2018.04.02 03:12:12 - Shell(10) of 'cmd.exe', 2 args: '/c';'netsh interface set interface "Ethernet 2" ENABLED';
. 2018.04.02 03:12:12 - Shell(10) done in 187 ms, exit: 0
. 2018.04.02 03:12:12 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
. 2018.04.02 03:12:12 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.04.02 03:12:12 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2018.04.02 03:12:12 - Shell(11) of 'cmd.exe', 2 args: '/c';'netsh interface set interface "Ethernet 2" ENABLED';
. 2018.04.02 03:12:12 - Shell(11) done in 188 ms, exit: 0
. 2018.04.02 03:12:12 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
. 2018.04.02 03:12:12 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...
. 2018.04.02 03:12:13 - Eddie Windows Interface Hack executed (Ethernet 2)
. 2018.04.02 03:12:13 - Shell(12) of 'cmd.exe', 2 args: '/c';'netsh interface set interface "Ethernet 2" ENABLED';
. 2018.04.02 03:12:13 - Shell(12) done in 187 ms, exit: 0
. 2018.04.02 03:12:13 - OpenVPN > Closing TUN/TAP interface
. 2018.04.02 03:12:13 - OpenVPN > NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: An address has not yet been associated with the network endpoint.   (code=1228)
. 2018.04.02 03:12:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2018.04.02 03:12:13 - Disconnecting
. 2018.04.02 03:12:13 - OpenVPN > OpenVPN 2.4.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Nov  3 2017
. 2018.04.02 03:12:13 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.04.02 03:12:13 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.04.02 03:12:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.04.02 03:12:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.02 03:12:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.02 03:12:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.148:443
. 2018.04.02 03:12:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.04.02 03:12:13 - OpenVPN > UDP link local: (not bound)
. 2018.04.02 03:12:13 - OpenVPN > UDP link remote: [AF_INET]213.152.162.148:443
. 2018.04.02 03:12:13 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.148:443, sid=faa2ef90 1ab3cf02
. 2018.04.02 03:12:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.04.02 03:12:13 - OpenVPN > VERIFY KU OK
. 2018.04.02 03:12:13 - OpenVPN > Validating certificate extended key usage
. 2018.04.02 03:12:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.04.02 03:12:13 - OpenVPN > VERIFY EKU OK
. 2018.04.02 03:12:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.04.02 03:12:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.04.02 03:12:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.148:443
. 2018.04.02 03:12:13 - Sending soft termination signal

Share this post


Link to post

Thank you.

 

When I downloaded the Beta client 2.14.2 on Windows 8, I also started getting this error:

 

W 2018.04.02 03:11:58 - Windows WFP, Add rule failed: Interface ID '{CABC915F-0843-49E3-A721-B9009AFF687F}' unknown or disabled for the layer.:<rule name="NetLock - Interface - Allow {CABC915F-0843-49E3-A721-B9009AFF687F} - IPv6" layer="ale_auth_recv_accept_v6" action="permit" weight="1000"><if field="ip_local_interface" match="equal" interface="{CABC915F-0843-49E3-A721-B9009AFF687F}" /></rule>

 

What worked was turning off Network Lock and reconnecting. I couldn't find any other solution to it. You may want to post in the Beta client thread about that error, so it gets addressed.

 

Update: Go to your device manager, find the TAP adapter and click uninstall. Including any drivers when the prompt shows a tickbox. Then, while Network Lock is enabled, connect to a location. Then Eddie will install the tunnel driver for you . Works for me.

 

. 2018.04.02 03:12:12 - OpenVPN > Route: Waiting for TUN/TAP interface to come up...

I was getting this too. Please go to Control Panel>Network & Internet>Network & Sharing Center>Change Adapter Settings>TAP Adapter Properties>Configure>Advanced>Media Status>Set to Always Connected>Click OK. If there's then further issues with this, a quick fix is to disable and re-enable the TAP adapter.

 

W 2018.04.02 03:12:08 - The requested protocol has not been configured into the system, or no implementation for it exists - Stack:    at System.Net.NetworkInformation.SystemIPInterfaceProperties.GetIPv6Properties()

You may be able to remedy this by going to Eddies menu>Preferences>Advanced>Microsoft Only>Disable IPv6 at OS level.

 

By the way @Staff if you're reading, do you think it would be good to install TAP utilities by default in the future?

At one point the logs stated that we "Should be able to go to Start>All Programs>Utilities>TAP Windows>Add new TAP adapter" and do stuff. But for me at least, it wasn't possible to find any "Utilities" or TAP stuff in Windows, until I went into Eddie's download folder and installed "TAP utilities" during the installation process. After that, Windows immediately found TAP-related stuff.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...