Jump to content
Not connected, Your IP: 3.149.214.28
alsatian

Routes, add xxxx for gateway xxxx failed

Recommended Posts

Hi there,

 

Since a few weeks ago, i haven't been able to connect using eddie. Here's the log:

"Routes, add 103.16.27.81 for gateway 10.9.200.1 failed:" is the one that keeps popping out on the bottom right on my desktop when  I try to connect. I have also no idea why the DNS check failed.

The number will change whenever it tries to connect to another server.

 

. 2018.12.03 20:45:20 - Eddie version: 2.15.2 / windows_x64, System: Windows, Name: Windows 7 Ultimate, Version: Microsoft Windows NT 6.1.7601 Service Pack 1, Mono/.Net: v2.0.50727
. 2018.12.03 20:45:20 - Reading options from C:\Users\Mitchell\AppData\Local\AirVPN\default.xml
. 2018.12.03 20:45:20 - Command line arguments (1): path="home"
. 2018.12.03 20:45:20 - Profile path: C:\Users\Mitchell\AppData\Local\AirVPN\default.xml
. 2018.12.03 20:45:22 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
. 2018.12.03 20:45:22 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2018.12.03 20:45:22 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2018.12.03 20:45:22 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2018.12.03 20:45:22 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
. 2018.12.03 20:45:22 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem
. 2018.12.03 20:45:22 - Updating systems & servers data ...
I 2018.12.03 20:45:22 - Ready
. 2018.12.03 20:45:24 - Systems & servers data update completed
I 2018.12.03 20:45:32 - Session starting.
I 2018.12.03 20:45:32 - Checking authorization ...
W 2018.12.03 20:45:33 - The server supports IPv6, but IPv6 is disabled at OS level. You need to re-enable it manually (reboot is required) or disable this warning by setting Preferences > Networking > Layer IPv6: Block.
. 2018.12.03 20:45:33 - IPv6 disabled with packet filtering.
! 2018.12.03 20:45:33 - Connecting to Arcturus (Hong Kong, Hong Kong)
. 2018.12.03 20:45:33 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.12.03 20:45:33 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2018.12.03 20:45:33 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.12.03 20:45:33 - Connection to OpenVPN Management Interface
. 2018.12.03 20:45:33 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.12.03 20:45:33 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.12.03 20:45:33 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.12.03 20:45:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]103.16.27.80:443
. 2018.12.03 20:45:33 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2018.12.03 20:45:33 - OpenVPN > UDP link local: (not bound)
. 2018.12.03 20:45:33 - OpenVPN > UDP link remote: [AF_INET]103.16.27.80:443
. 2018.12.03 20:45:33 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.12.03 20:45:33 - OpenVPN > TLS: Initial packet from [AF_INET]103.16.27.80:443, sid=604306af ae2cceaa
. 2018.12.03 20:45:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.12.03 20:45:34 - OpenVPN > VERIFY KU OK
. 2018.12.03 20:45:34 - OpenVPN > Validating certificate extended key usage
. 2018.12.03 20:45:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.12.03 20:45:34 - OpenVPN > VERIFY EKU OK
. 2018.12.03 20:45:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Arcturus, emailAddress=info@airvpn.org
. 2018.12.03 20:45:34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.12.03 20:45:34 - OpenVPN > [Arcturus] Peer Connection Initiated with [AF_INET]103.16.27.80:443
. 2018.12.03 20:45:35 - OpenVPN > SENT CONTROL [Arcturus]: 'PUSH_REQUEST' (status=1)
. 2018.12.03 20:45:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.9.200.1,dhcp-option DNS6 fde6:7a:7d20:5c8::1,tun-ipv6,route-gateway 10.9.200.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:5c8::1002/64 fde6:7a:7d20:5c8::1,ifconfig 10.9.200.4 255.255.255.0,peer-id 1,cipher AES-256-GCM'
. 2018.12.03 20:45:36 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2018.12.03 20:45:36 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:5c8::1'
. 2018.12.03 20:45:36 - OpenVPN > Pushed option removed by filter: 'tun-ipv6'
. 2018.12.03 20:45:36 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:5c8::1002/64 fde6:7a:7d20:5c8::1'
. 2018.12.03 20:45:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.12.03 20:45:36 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.12.03 20:45:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.12.03 20:45:36 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.12.03 20:45:36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.12.03 20:45:36 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.12.03 20:45:36 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.12.03 20:45:36 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.12.03 20:45:36 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.12.03 20:45:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.12.03 20:45:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.12.03 20:45:36 - OpenVPN > interactive service msg_channel=0
. 2018.12.03 20:45:36 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=10 HWADDR=bc:5f:f4:ca:a3:e7
. 2018.12.03 20:45:36 - OpenVPN > open_tun
. 2018.12.03 20:45:36 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{F25EEE0E-BA09-444D-BB5F-485013E18ABD}.tap
. 2018.12.03 20:45:36 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.12.03 20:45:36 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.9.200.0/10.9.200.4/255.255.255.0 [SUCCEEDED]
. 2018.12.03 20:45:36 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.9.200.4/255.255.255.0 on interface {F25EEE0E-BA09-444D-BB5F-485013E18ABD} [DHCP-serv: 10.9.200.254, lease-time: 31536000]
. 2018.12.03 20:45:36 - OpenVPN > Successful ARP Flush on interface [13] {F25EEE0E-BA09-444D-BB5F-485013E18ABD}
. 2018.12.03 20:45:36 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.12.03 20:45:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.12.03 20:45:41 - OpenVPN > C:\Windows\system32\route.exe ADD 103.16.27.80 MASK 255.255.255.255 192.168.1.254
. 2018.12.03 20:45:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2018.12.03 20:45:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.12.03 20:45:41 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.9.200.1
. 2018.12.03 20:45:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.12.03 20:45:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.12.03 20:45:41 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.9.200.1
. 2018.12.03 20:45:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.12.03 20:45:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.12.03 20:45:41 - Interface Local Area Connection 3 metric changed from Automatic to 3, layer IPv4
. 2018.12.03 20:45:41 - DNS leak protection with packet filtering enabled.
. 2018.12.03 20:45:42 - DNS IPv4 of a network adapter forced (Local Area Connection 3, from manual (10.30.136.1) to 10.9.200.1)
W 2018.12.03 20:45:42 - Routes, add 103.16.27.81 for gateway 10.9.200.1 failed:
. 2018.12.03 20:45:42 - Unable to compute route for 2001:df0:465:1080:d1a3:762f:46d3:e801: IPv6 VPN gateway not available.
. 2018.12.03 20:45:42 - Flushing DNS
I 2018.12.03 20:45:42 - Checking route IPv4
I 2018.12.03 20:45:44 - Checking DNS
. 2018.12.03 20:45:57 - Checking DNS failed:
. 2018.12.03 20:45:57 - Checking DNS (2° try)
. 2018.12.03 20:46:12 - Checking DNS failed:
. 2018.12.03 20:46:12 - Checking DNS (3° try)
. 2018.12.03 20:46:27 - Checking DNS failed:
E 2018.12.03 20:46:27 - Checking DNS failed.
. 2018.12.03 20:46:27 - OpenVPN > Initialization Sequence Completed
! 2018.12.03 20:46:27 - Disconnecting
. 2018.12.03 20:46:27 - Sending management termination signal
. 2018.12.03 20:46:27 - Management - Send 'signal SIGTERM'
. 2018.12.03 20:46:27 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.12.03 20:46:27 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.12.03 20:46:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 103.16.27.80 MASK 255.255.255.255 192.168.1.254
. 2018.12.03 20:46:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.12.03 20:46:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.9.200.1
. 2018.12.03 20:46:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.12.03 20:46:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.9.200.1
. 2018.12.03 20:46:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.12.03 20:46:32 - OpenVPN > Closing TUN/TAP interface
. 2018.12.03 20:46:32 - OpenVPN > TAP: DHCP address released
. 2018.12.03 20:46:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.12.03 20:46:32 - Connection terminated.
. 2018.12.03 20:46:32 - IPv6 restored with packet filtering.
. 2018.12.03 20:46:32 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection 3, to 10.30.136.1)
. 2018.12.03 20:46:32 - DNS leak protection with packet filtering disabled.
. 2018.12.03 20:46:32 - Interface Local Area Connection 3 metric restored from 3 to Automatic, layer IPv4
I 2018.12.03 20:46:35 - Checking authorization ...
W 2018.12.03 20:46:36 - The server supports IPv6, but IPv6 is disabled at OS level. You need to re-enable it manually (reboot is required) or disable this warning by setting Preferences > Networking > Layer IPv6: Block.
. 2018.12.03 20:46:36 - IPv6 disabled with packet filtering.
! 2018.12.03 20:46:36 - Connecting to Yed (Hong Kong, Hong Kong)
. 2018.12.03 20:46:37 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.12.03 20:46:37 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2018.12.03 20:46:37 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.12.03 20:46:37 - Connection to OpenVPN Management Interface
. 2018.12.03 20:46:37 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.12.03 20:46:37 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.12.03 20:46:37 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.12.03 20:46:37 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]103.16.27.74:443
. 2018.12.03 20:46:37 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2018.12.03 20:46:37 - OpenVPN > UDP link local: (not bound)
. 2018.12.03 20:46:37 - OpenVPN > UDP link remote: [AF_INET]103.16.27.74:443
. 2018.12.03 20:46:37 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.12.03 20:46:37 - OpenVPN > TLS: Initial packet from [AF_INET]103.16.27.74:443, sid=f53fc9f9 bc2f8a07
. 2018.12.03 20:46:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.12.03 20:46:37 - OpenVPN > VERIFY KU OK
. 2018.12.03 20:46:37 - OpenVPN > Validating certificate extended key usage
. 2018.12.03 20:46:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.12.03 20:46:37 - OpenVPN > VERIFY EKU OK
. 2018.12.03 20:46:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Yed, emailAddress=info@airvpn.org
. 2018.12.03 20:46:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.12.03 20:46:38 - OpenVPN > [Yed] Peer Connection Initiated with [AF_INET]103.16.27.74:443
. 2018.12.03 20:46:39 - OpenVPN > SENT CONTROL [Yed]: 'PUSH_REQUEST' (status=1)
. 2018.12.03 20:46:40 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.136.1,dhcp-option DNS6 fde6:7a:7d20:1c88::1,tun-ipv6,route-gateway 10.32.136.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1c88::10ad/64 fde6:7a:7d20:1c88::1,ifconfig 10.32.136.175 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2018.12.03 20:46:40 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2018.12.03 20:46:40 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1c88::1'
. 2018.12.03 20:46:40 - OpenVPN > Pushed option removed by filter: 'tun-ipv6'
. 2018.12.03 20:46:40 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1c88::10ad/64 fde6:7a:7d20:1c88::1'
. 2018.12.03 20:46:40 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.12.03 20:46:40 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.12.03 20:46:40 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.12.03 20:46:40 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.12.03 20:46:40 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.12.03 20:46:40 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.12.03 20:46:40 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.12.03 20:46:40 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.12.03 20:46:40 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.12.03 20:46:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.12.03 20:46:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.12.03 20:46:40 - OpenVPN > interactive service msg_channel=0
. 2018.12.03 20:46:40 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=10 HWADDR=bc:5f:f4:ca:a3:e7
. 2018.12.03 20:46:40 - OpenVPN > open_tun
. 2018.12.03 20:46:40 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{F25EEE0E-BA09-444D-BB5F-485013E18ABD}.tap
. 2018.12.03 20:46:40 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.12.03 20:46:40 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.32.136.0/10.32.136.175/255.255.255.0 [SUCCEEDED]
. 2018.12.03 20:46:40 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.32.136.175/255.255.255.0 on interface {F25EEE0E-BA09-444D-BB5F-485013E18ABD} [DHCP-serv: 10.32.136.254, lease-time: 31536000]
. 2018.12.03 20:46:40 - OpenVPN > Successful ARP Flush on interface [13] {F25EEE0E-BA09-444D-BB5F-485013E18ABD}
. 2018.12.03 20:46:40 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
! 2018.12.03 20:46:42 - Disconnecting
. 2018.12.03 20:46:42 - Sending management termination signal
. 2018.12.03 20:46:42 - Management - Send 'signal SIGTERM'
. 2018.12.03 20:46:42 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.12.03 20:46:42 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.12.03 20:46:45 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.12.03 20:46:45 - OpenVPN > C:\Windows\system32\route.exe ADD 103.16.27.74 MASK 255.255.255.255 192.168.1.254
. 2018.12.03 20:46:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2018.12.03 20:46:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.12.03 20:46:45 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.32.136.1
. 2018.12.03 20:46:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.12.03 20:46:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.12.03 20:46:45 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.32.136.1
. 2018.12.03 20:46:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.12.03 20:46:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.12.03 20:46:45 - Interface Local Area Connection 3 metric changed from Automatic to 3, layer IPv4
. 2018.12.03 20:46:45 - DNS leak protection with packet filtering enabled.
. 2018.12.03 20:46:45 - DNS IPv4 of a network adapter forced (Local Area Connection 3, from manual (10.30.136.1) to 10.32.136.1)
W 2018.12.03 20:46:45 - Routes, add 103.16.27.75 for gateway 10.32.136.1 failed:
. 2018.12.03 20:46:45 - Unable to compute route for 2001:df0:465:1074:efae:12c9:a5e5:cb91: IPv6 VPN gateway not available.
. 2018.12.03 20:46:45 - Flushing DNS
. 2018.12.03 20:46:46 - OpenVPN > Initialization Sequence Completed
. 2018.12.03 20:46:47 - OpenVPN > C:\Windows\system32\route.exe DELETE 103.16.27.74 MASK 255.255.255.255 192.168.1.254
. 2018.12.03 20:46:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.12.03 20:46:47 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.32.136.1
. 2018.12.03 20:46:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.12.03 20:46:47 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.32.136.1
. 2018.12.03 20:46:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.12.03 20:46:47 - OpenVPN > Closing TUN/TAP interface
. 2018.12.03 20:46:47 - OpenVPN > TAP: DHCP address released
. 2018.12.03 20:46:47 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.12.03 20:46:47 - Connection terminated.
. 2018.12.03 20:46:47 - IPv6 restored with packet filtering.
. 2018.12.03 20:46:47 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection 3, to 10.30.136.1)
. 2018.12.03 20:46:47 - DNS leak protection with packet filtering disabled.
. 2018.12.03 20:46:47 - Interface Local Area Connection 3 metric restored from 3 to Automatic, layer IPv4
I 2018.12.03 20:46:47 - Cancel requested.
! 2018.12.03 20:46:47 - Session terminated.

 

If anyone could help that'd would be great.

 

I tried using open vpn and it worked so I think this is something to do with eddie program.

 

Thanks

Share this post


Link to post

Hello!

 

You can try updating your client to the latest stable release. Sometimes that sorts the issue, as well as leaving you with an updated client .

 

Otherwise you can also try going to Eddie>Preferences>DNS>And unchecking "Check AirVPN DNS". As well as Preferences>Advanced>Uncheck "Check if tunnel works".


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

So the solution half worked...

 

It is able to "connect" but I still can't use it to access the internet

 

Very odd

Share this post


Link to post

May we see the new logs, in full?


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post
. 2018.12.05 19:01:29 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 7 Ultimate, Version: Microsoft Windows NT 6.1.7601 Service Pack 1, Mono/.Net: v2.0.50727
. 2018.12.05 19:01:29 - Reading options from C:\Users\Mitchell\AppData\Local\AirVPN\default.xml
. 2018.12.05 19:01:29 - Command line arguments (1): path="home"
. 2018.12.05 19:01:29 - Profile path: C:\Users\Mitchell\AppData\Local\AirVPN\default.xml
. 2018.12.05 19:01:31 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
. 2018.12.05 19:01:31 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2018.12.05 19:01:31 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2018.12.05 19:01:31 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2018.12.05 19:01:31 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
. 2018.12.05 19:01:31 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem
. 2018.12.05 19:01:31 - Updating systems & servers data ...
I 2018.12.05 19:01:31 - Ready
. 2018.12.05 19:01:33 - Systems & servers data update completed
I 2018.12.05 19:02:06 - Session starting.
I 2018.12.05 19:02:06 - Checking authorization ...
. 2018.12.05 19:02:07 - IPv6 disabled with packet filtering.
! 2018.12.05 19:02:07 - Connecting to Delphinus (Singapore, Singapore)
. 2018.12.05 19:02:07 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.12.05 19:02:07 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2018.12.05 19:02:07 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.12.05 19:02:07 - Connection to OpenVPN Management Interface
. 2018.12.05 19:02:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.12.05 19:02:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.12.05 19:02:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.12.05 19:02:07 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.200.116.218:443
. 2018.12.05 19:02:07 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2018.12.05 19:02:07 - OpenVPN > UDP link local: (not bound)
. 2018.12.05 19:02:07 - OpenVPN > UDP link remote: [AF_INET]185.200.116.218:443
. 2018.12.05 19:02:08 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.12.05 19:02:08 - OpenVPN > TLS: Initial packet from [AF_INET]185.200.116.218:443, sid=88113066 8269573a
. 2018.12.05 19:02:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.12.05 19:02:08 - OpenVPN > VERIFY KU OK
. 2018.12.05 19:02:08 - OpenVPN > Validating certificate extended key usage
. 2018.12.05 19:02:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.12.05 19:02:08 - OpenVPN > VERIFY EKU OK
. 2018.12.05 19:02:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Delphinus, emailAddress=info@airvpn.org
. 2018.12.05 19:02:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.12.05 19:02:08 - OpenVPN > [Delphinus] Peer Connection Initiated with [AF_INET]185.200.116.218:443
. 2018.12.05 19:02:09 - OpenVPN > SENT CONTROL [Delphinus]: 'PUSH_REQUEST' (status=1)
. 2018.12.05 19:02:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.72.1,dhcp-option DNS6 fde6:7a:7d20:b48::1,tun-ipv6,route-gateway 10.15.72.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:b48::100e/64 fde6:7a:7d20:b48::1,ifconfig 10.15.72.16 255.255.255.0,peer-id 2,cipher AES-256-GCM'
. 2018.12.05 19:02:10 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2018.12.05 19:02:10 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:b48::1'
. 2018.12.05 19:02:10 - OpenVPN > Pushed option removed by filter: 'tun-ipv6'
. 2018.12.05 19:02:10 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:b48::100e/64 fde6:7a:7d20:b48::1'
. 2018.12.05 19:02:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.12.05 19:02:10 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.12.05 19:02:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.12.05 19:02:10 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.12.05 19:02:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.12.05 19:02:10 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.12.05 19:02:10 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.12.05 19:02:10 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.12.05 19:02:10 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.12.05 19:02:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.12.05 19:02:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.12.05 19:02:10 - OpenVPN > interactive service msg_channel=0
. 2018.12.05 19:02:10 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=10 HWADDR=bc:5f:f4:ca:a3:e7
. 2018.12.05 19:02:10 - OpenVPN > open_tun
. 2018.12.05 19:02:10 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{F25EEE0E-BA09-444D-BB5F-485013E18ABD}.tap
. 2018.12.05 19:02:10 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.12.05 19:02:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.15.72.0/10.15.72.16/255.255.255.0 [SUCCEEDED]
. 2018.12.05 19:02:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.15.72.16/255.255.255.0 on interface {F25EEE0E-BA09-444D-BB5F-485013E18ABD} [DHCP-serv: 10.15.72.254, lease-time: 31536000]
. 2018.12.05 19:02:10 - OpenVPN > Successful ARP Flush on interface [13] {F25EEE0E-BA09-444D-BB5F-485013E18ABD}
. 2018.12.05 19:02:10 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.12.05 19:02:15 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.12.05 19:02:15 - OpenVPN > C:\Windows\system32\route.exe ADD 185.200.116.218 MASK 255.255.255.255 192.168.1.254
. 2018.12.05 19:02:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2018.12.05 19:02:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.12.05 19:02:15 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.15.72.1
. 2018.12.05 19:02:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.12.05 19:02:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.12.05 19:02:15 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.15.72.1
. 2018.12.05 19:02:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.12.05 19:02:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.12.05 19:02:15 - Interface Local Area Connection 3 metric changed from Automatic to 3, layer IPv4
. 2018.12.05 19:02:15 - DNS leak protection with packet filtering enabled.
. 2018.12.05 19:02:15 - DNS IPv4 of a network adapter forced (Local Area Connection 3, from manual (10.30.136.1) to 10.15.72.1)
W 2018.12.05 19:02:16 - Routes, add 185.200.116.219 for gateway 10.15.72.1 failed:
. 2018.12.05 19:02:16 - Unable to compute route for 2a0a:b640:1:4:b733:d98a:4d01:3ae6: IPv6 VPN gateway not available.
. 2018.12.05 19:02:16 - Flushing DNS
! 2018.12.05 19:02:16 - Connected.
. 2018.12.05 19:02:16 - OpenVPN > Initialization Sequence Completed

Here you go. The "W 2018.12.05 19:02:16 - Routes, add 185.200.116.219 for gateway 10.15.72.1 failed:" error is still present.

This is using the latest version of eddie.

Share this post


Link to post

This is happening to me....Eddie shows connected, but, gateway does not work.

Mac Mojave; Eddie 2.16 - 2.17.2

"Routes, add ::/0 for gateway fe80::failed: route: writing to routing socks: Network is unreachable

Share this post


Link to post

i got it to work on mine.

 

I have everything as default now, but, in NETWORK, I unchecked the REMOVE THE DEFAULT GATEWAY ROUTE, and now, everything is working ... Mac OS Mail and the websites seem to be loading. This is on the BETA version of EDDIE for Mac.

 

Will unchecking this box diminish the security of the VPN?

 

THanks

Share this post


Link to post

i got it to work on mine.

 

I have everything as default now, but, in NETWORK, I unchecked the REMOVE THE DEFAULT GATEWAY ROUTE, and now, everything is working ... Mac OS Mail and the websites seem to be loading. This is on the BETA version of EDDIE for Mac.

 

Will unchecking this box diminish the security of the VPN?

 

THanks

Sadly I never got mine to work. the default setting for the "Remove the default gateway route" is unchecked, and enabling it did nothing. I guess I'm stuck with OpenVPN

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...