stripe 0 Posted ... Hi allnormally ipleak.net works instantly (30 seconds at most and returns no errors)but today I ran a ipleak.net testtook 4-5 minutes to runand returned in the webrtc sectiondns servers 0 100 faults but the indicator was still green (I have webrtc disabled)after I ran ipleak no pages would load in the browser unless it was closed and restartedthe error happens on various browers and various operating systemsrunning dig it returns the airvpn dns address 10.4.0.1 so it seems I am using the correct dns serverany ideas on resolving the issue?cheers edit (more information): just checked on https://browserleaks.com/ip and it shows my ip as 213.152.161.211 (which is the same as eddie) issue resolved itself (for whatever reason) 14:21 (BST) Quote Share this post Link to post
Philiberti 9 Posted ... I'm getting a similar problem - with Network Lock enabled I can't load any web pages. Disabling Network Lock and using VPNcheck allows pages to load but I'm still getting the zero DNS servers / multiple faults error on IP Leak (see screen cap). I'm running Windows 10 64 bit and was updated this morning prior to all of these problems - could there be a link? Logs posted below I 2018.04.13 12:06:06 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319. 2018.04.13 12:06:06 - Reading options from C:\Program Files\AirVPN\AirVPN.xml. 2018.04.13 12:06:06 - Command line arguments (0):I 2018.04.13 12:06:08 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.9.2I 2018.04.13 12:06:08 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)I 2018.04.13 12:06:08 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2018.04.13 12:06:08 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)I 2018.04.13 12:06:08 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)I 2018.04.13 12:06:08 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem. 2018.04.13 12:06:08 - Updating systems & servers data ...! 2018.04.13 12:06:08 - Ready. 2018.04.13 12:06:09 - Systems & servers data update completed! 2018.04.13 12:06:11 - Activation of Network Lock - Windows Filtering PlatformI 2018.04.13 12:06:28 - Session starting.. 2018.04.13 12:06:28 - IPv6 disabled with packet filtering.I 2018.04.13 12:06:28 - Checking authorization ...! 2018.04.13 12:06:28 - Connecting to Musica (Netherlands, Alblasserdam). 2018.04.13 12:06:29 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.04.13 12:06:29 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.04.13 12:06:29 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.04.13 12:06:29 - Connection to OpenVPN Management Interface. 2018.04.13 12:06:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.04.13 12:06:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.04.13 12:06:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.04.13 12:06:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.248:443. 2018.04.13 12:06:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.04.13 12:06:29 - OpenVPN > UDP link local: (not bound). 2018.04.13 12:06:29 - OpenVPN > UDP link remote: [AF_INET]213.152.161.248:443. 2018.04.13 12:06:29 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.04.13 12:06:29 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.248:443, sid=b22c2b91 27e53abb. 2018.04.13 12:06:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.04.13 12:06:29 - OpenVPN > VERIFY KU OK. 2018.04.13 12:06:29 - OpenVPN > Validating certificate extended key usage. 2018.04.13 12:06:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.04.13 12:06:29 - OpenVPN > VERIFY EKU OK. 2018.04.13 12:06:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Musica, emailAddress=info@airvpn.org. 2018.04.13 12:06:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.04.13 12:06:29 - OpenVPN > [Musica] Peer Connection Initiated with [AF_INET]213.152.161.248:443. 2018.04.13 12:06:30 - OpenVPN > SENT CONTROL [Musica]: 'PUSH_REQUEST' (status=1). 2018.04.13 12:06:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.116 255.255.0.0,peer-id 9,cipher AES-256-GCM'. 2018.04.13 12:06:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.04.13 12:06:30 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.04.13 12:06:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.04.13 12:06:30 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.04.13 12:06:30 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.04.13 12:06:30 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.04.13 12:06:30 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.04.13 12:06:30 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.04.13 12:06:30 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.04.13 12:06:30 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.04.13 12:06:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.04.13 12:06:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.04.13 12:06:30 - OpenVPN > interactive service msg_channel=0. 2018.04.13 12:06:30 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=22 HWADDR=bc:5f:f4:42:84:86. 2018.04.13 12:06:30 - OpenVPN > open_tun. 2018.04.13 12:06:30 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{9B2102FF-F038-4B15-B652-DA62DBBD1DE8}.tap. 2018.04.13 12:06:30 - OpenVPN > TAP-Windows Driver Version 9.9. 2018.04.13 12:06:30 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.2.116/255.255.0.0 [sUCCEEDED]. 2018.04.13 12:06:30 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.2.116/255.255.0.0 on interface {9B2102FF-F038-4B15-B652-DA62DBBD1DE8} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.04.13 12:06:30 - OpenVPN > Successful ARP Flush on interface [15] {9B2102FF-F038-4B15-B652-DA62DBBD1DE8}. 2018.04.13 12:06:30 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.04.13 12:06:35 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.04.13 12:06:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.248 MASK 255.255.255.255 192.168.1.254. 2018.04.13 12:06:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.04.13 12:06:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.04.13 12:06:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.04.13 12:06:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4. 2018.04.13 12:06:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.04.13 12:06:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.04.13 12:06:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4. 2018.04.13 12:06:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.04.13 12:06:36 - Interface Ethernet metric changed from Automatic to 3, layer IPv4. 2018.04.13 12:06:36 - DNS leak protection with packet filtering enabled.. 2018.04.13 12:06:36 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.04.13 12:06:36 - Flushing DNSI 2018.04.13 12:06:39 - Checking routeI 2018.04.13 12:06:40 - Checking DNS! 2018.04.13 12:06:52 - Connected.. 2018.04.13 12:06:52 - OpenVPN > Initialization Sequence Completed! 2018.04.13 12:09:08 - Disconnecting. 2018.04.13 12:09:08 - Sending management termination signal. 2018.04.13 12:09:08 - Management - Send 'signal SIGTERM'. 2018.04.13 12:09:13 - Connection terminated.. 2018.04.13 12:09:14 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic). 2018.04.13 12:09:14 - DNS leak protection with packet filtering disabled.. 2018.04.13 12:09:14 - Interface Ethernet metric restored from 3 to Automatic, layer IPv4. 2018.04.13 12:09:14 - Flushing DNS. 2018.04.13 12:09:17 - IPv6 restored with packet filtering.! 2018.04.13 12:09:17 - Session terminated.! 2018.04.13 12:09:18 - Deactivation of Network LockI 2018.04.13 12:09:26 - Session starting.. 2018.04.13 12:09:27 - IPv6 disabled with packet filtering.I 2018.04.13 12:09:27 - Checking authorization ...! 2018.04.13 12:09:27 - Connecting to Atik (Netherlands, Alblasserdam). 2018.04.13 12:09:27 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.04.13 12:09:27 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.04.13 12:09:27 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.04.13 12:09:27 - Connection to OpenVPN Management Interface. 2018.04.13 12:09:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.04.13 12:09:27 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.04.13 12:09:27 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.04.13 12:09:27 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.9:443. 2018.04.13 12:09:27 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.04.13 12:09:27 - OpenVPN > UDP link local: (not bound). 2018.04.13 12:09:27 - OpenVPN > UDP link remote: [AF_INET]213.152.161.9:443. 2018.04.13 12:09:27 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.04.13 12:09:27 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.9:443, sid=015850b5 a0d361be. 2018.04.13 12:09:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.04.13 12:09:27 - OpenVPN > VERIFY KU OK. 2018.04.13 12:09:27 - OpenVPN > Validating certificate extended key usage. 2018.04.13 12:09:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.04.13 12:09:27 - OpenVPN > VERIFY EKU OK. 2018.04.13 12:09:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.04.13 12:09:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.04.13 12:09:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.9:443. 2018.04.13 12:09:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.04.13 12:09:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.8.253 255.255.0.0'. 2018.04.13 12:09:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.04.13 12:09:29 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.04.13 12:09:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.04.13 12:09:29 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.04.13 12:09:29 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.04.13 12:09:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.04.13 12:09:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.04.13 12:09:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.04.13 12:09:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.04.13 12:09:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.04.13 12:09:29 - OpenVPN > interactive service msg_channel=0. 2018.04.13 12:09:29 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=22 HWADDR=bc:5f:f4:42:84:86. 2018.04.13 12:09:29 - OpenVPN > open_tun. 2018.04.13 12:09:29 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{9B2102FF-F038-4B15-B652-DA62DBBD1DE8}.tap. 2018.04.13 12:09:29 - OpenVPN > TAP-Windows Driver Version 9.9. 2018.04.13 12:09:29 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.8.253/255.255.0.0 [sUCCEEDED]. 2018.04.13 12:09:29 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.8.253/255.255.0.0 on interface {9B2102FF-F038-4B15-B652-DA62DBBD1DE8} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.04.13 12:09:29 - OpenVPN > Successful ARP Flush on interface [15] {9B2102FF-F038-4B15-B652-DA62DBBD1DE8}. 2018.04.13 12:09:29 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.04.13 12:09:34 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.04.13 12:09:34 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.9 MASK 255.255.255.255 192.168.1.254. 2018.04.13 12:09:34 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2018.04.13 12:09:34 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.04.13 12:09:34 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.04.13 12:09:34 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4. 2018.04.13 12:09:34 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.04.13 12:09:34 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.04.13 12:09:34 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4. 2018.04.13 12:09:34 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.04.13 12:09:34 - Interface Ethernet metric changed from Automatic to 3, layer IPv4. 2018.04.13 12:09:34 - DNS leak protection with packet filtering enabled.. 2018.04.13 12:09:34 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1). 2018.04.13 12:09:34 - Flushing DNSI 2018.04.13 12:09:38 - Checking routeI 2018.04.13 12:09:38 - Checking DNS! 2018.04.13 12:09:51 - Connected.. 2018.04.13 12:09:51 - OpenVPN > Initialization Sequence Completed. 2018.04.13 12:16:14 - Updating systems & servers data .... 2018.04.13 12:16:14 - Systems & servers data update completed Quote Share this post Link to post
Philiberti 9 Posted ... Just re-engaged Network Lock and tried again - all is OK! Weird - ain't technology wonderful Quote Share this post Link to post