Jump to content
Not connected, Your IP: 3.142.55.138
CeleryMan

Unable to connect using client, I receive failed looped connection attempts

Recommended Posts

Hello, this is my first time posting here. Whenever I try to connect to Eddie, the software seems to be stuck in a loop, with an error message appearing in my Windows Explorer saying "netsh command failed". This happens continually with no connection in the client software happening.

 

Here are my logs:

 

 

. 2018.12.11 17:42:12 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 7 Ultimate, Version: Microsoft Windows NT 6.1.7601 Service Pack 1, Mono/.Net: v2.0.50727
. 2018.12.11 17:42:12 - Reading options from C:\Users\Luke\AppData\Local\AirVPN\default.xml
. 2018.12.11 17:42:12 - Command line arguments (1): path="home"
. 2018.12.11 17:42:12 - Profile path: C:\Users\Luke\AppData\Local\AirVPN\default.xml
. 2018.12.11 17:42:14 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
. 2018.12.11 17:42:14 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2018.12.11 17:42:14 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2018.12.11 17:42:14 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2018.12.11 17:42:14 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
. 2018.12.11 17:42:14 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem
. 2018.12.11 17:42:14 - Updating systems & servers data ...
I 2018.12.11 17:42:15 - Ready
. 2018.12.11 17:42:15 - Systems & servers data update completed
I 2018.12.11 17:42:16 - Session starting.
I 2018.12.11 17:42:18 - Checking authorization ...
! 2018.12.11 17:42:19 - Connecting to Rana (Canada, Toronto, Ontario)
. 2018.12.11 17:42:19 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.12.11 17:42:19 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2018.12.11 17:42:19 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.12.11 17:42:19 - Connection to OpenVPN Management Interface
. 2018.12.11 17:42:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.12.11 17:42:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.12.11 17:42:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.12.11 17:42:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.19.94.132:443
. 2018.12.11 17:42:19 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2018.12.11 17:42:19 - OpenVPN > UDP link local: (not bound)
. 2018.12.11 17:42:19 - OpenVPN > UDP link remote: [AF_INET]199.19.94.132:443
. 2018.12.11 17:42:19 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.94.132:443, sid=69378094 58631959
. 2018.12.11 17:42:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.12.11 17:42:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.12.11 17:42:19 - OpenVPN > VERIFY KU OK
. 2018.12.11 17:42:19 - OpenVPN > Validating certificate extended key usage
. 2018.12.11 17:42:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.12.11 17:42:19 - OpenVPN > VERIFY EKU OK
. 2018.12.11 17:42:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.12.11 17:42:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.12.11 17:42:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.94.132:443
. 2018.12.11 17:42:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.12.11 17:42:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.196.1,dhcp-option DNS6 fde6:7a:7d20:17c4::1,tun-ipv6,route-gateway 10.27.196.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:17c4::10ee/64 fde6:7a:7d20:17c4::1,ifconfig 10.27.196.240 255.255.255.0,peer-id 33,cipher AES-256-GCM'
. 2018.12.11 17:42:21 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2018.12.11 17:42:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.12.11 17:42:21 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.12.11 17:42:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.12.11 17:42:21 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.12.11 17:42:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.12.11 17:42:21 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.12.11 17:42:21 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.12.11 17:42:21 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.12.11 17:42:21 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.12.11 17:42:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.12.11 17:42:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.12.11 17:42:21 - OpenVPN > interactive service msg_channel=0
. 2018.12.11 17:42:21 - OpenVPN > ROUTE_GATEWAY 10.1.42.1/255.255.252.0 I=11 HWADDR=94:de:80:00:20:6c
. 2018.12.11 17:42:21 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2018.12.11 17:42:21 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found.   (code=1168)
. 2018.12.11 17:42:21 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2018.12.11 17:42:21 - OpenVPN > open_tun
. 2018.12.11 17:42:21 - OpenVPN > TAP-WIN32 device [{665DA1EA-26CB-446A-9FB9-F07C091EAB47}] opened: \\.\Global\{665DA1EA-26CB-446A-9FB9-F07C091EAB47}.tap
. 2018.12.11 17:42:21 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.12.11 17:42:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.27.196.0/10.27.196.240/255.255.255.0 [sUCCEEDED]
. 2018.12.11 17:42:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.27.196.240/255.255.255.0 on interface {665DA1EA-26CB-446A-9FB9-F07C091EAB47} [DHCP-serv: 10.27.196.254, lease-time: 31536000]
. 2018.12.11 17:42:21 - OpenVPN > Successful ARP Flush on interface [22] {665DA1EA-26CB-446A-9FB9-F07C091EAB47}
. 2018.12.11 17:42:21 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2018.12.11 17:42:22 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=22 fde6:7a:7d20:17c4::10ee store=active
. 2018.12.11 17:42:23 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns {665DA1EA-26CB-446A-9FB9-F07C091EAB47} static fde6:7a:7d20:17c4::1 validate=no
E 2018.12.11 17:42:23 - OpenVPN > ERROR: netsh command failed: returned error code 1
. 2018.12.11 17:42:27 - OpenVPN > NETSH: command failed
. 2018.12.11 17:42:27 - OpenVPN > Exiting due to fatal error
! 2018.12.11 17:42:27 - Disconnecting
. 2018.12.11 17:42:27 - Connection terminated.
I 2018.12.11 17:42:30 - Checking authorization ...
! 2018.12.11 17:42:30 - Connecting to Chort (Canada, Toronto, Ontario)
. 2018.12.11 17:42:31 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.12.11 17:42:31 - OpenVPN > Windows version 6.1 (Windows 7) 64bit
. 2018.12.11 17:42:31 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.12.11 17:42:31 - Connection to OpenVPN Management Interface
. 2018.12.11 17:42:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.12.11 17:42:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.12.11 17:42:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.12.11 17:42:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.234:443
. 2018.12.11 17:42:31 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]
. 2018.12.11 17:42:31 - OpenVPN > UDP link local: (not bound)
. 2018.12.11 17:42:31 - OpenVPN > UDP link remote: [AF_INET]104.254.90.234:443
. 2018.12.11 17:42:31 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.234:443, sid=93330ae1 caeb538a
. 2018.12.11 17:42:31 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.12.11 17:42:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.12.11 17:42:31 - OpenVPN > VERIFY KU OK
. 2018.12.11 17:42:31 - OpenVPN > Validating certificate extended key usage
. 2018.12.11 17:42:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.12.11 17:42:31 - OpenVPN > VERIFY EKU OK
. 2018.12.11 17:42:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chort, emailAddress=info@airvpn.org
. 2018.12.11 17:42:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.12.11 17:42:31 - OpenVPN > [Chort] Peer Connection Initiated with [AF_INET]104.254.90.234:443
. 2018.12.11 17:42:32 - OpenVPN > SENT CONTROL [Chort]: 'PUSH_REQUEST' (status=1)
. 2018.12.11 17:42:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.14.52.1,dhcp-option DNS6 fde6:7a:7d20:a34::1,tun-ipv6,route-gateway 10.14.52.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:a34::1069/64 fde6:7a:7d20:a34::1,ifconfig 10.14.52.107 255.255.255.0,peer-id 15,cipher AES-256-GCM'
. 2018.12.11 17:42:32 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2018.12.11 17:42:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.12.11 17:42:32 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.12.11 17:42:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.12.11 17:42:32 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.12.11 17:42:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.12.11 17:42:32 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.12.11 17:42:32 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.12.11 17:42:32 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.12.11 17:42:32 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.12.11 17:42:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.12.11 17:42:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.12.11 17:42:32 - OpenVPN > interactive service msg_channel=0
. 2018.12.11 17:42:32 - OpenVPN > ROUTE_GATEWAY 10.1.42.1/255.255.252.0 I=11 HWADDR=94:de:80:00:20:6c
. 2018.12.11 17:42:32 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2018.12.11 17:42:32 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found.   (code=1168)
. 2018.12.11 17:42:32 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2018.12.11 17:42:32 - OpenVPN > open_tun
. 2018.12.11 17:42:32 - OpenVPN > TAP-WIN32 device [{665DA1EA-26CB-446A-9FB9-F07C091EAB47}] opened: \\.\Global\{665DA1EA-26CB-446A-9FB9-F07C091EAB47}.tap
. 2018.12.11 17:42:32 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.12.11 17:42:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.14.52.0/10.14.52.107/255.255.255.0 [sUCCEEDED]
. 2018.12.11 17:42:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.14.52.107/255.255.255.0 on interface {665DA1EA-26CB-446A-9FB9-F07C091EAB47} [DHCP-serv: 10.14.52.254, lease-time: 31536000]
. 2018.12.11 17:42:32 - OpenVPN > Successful ARP Flush on interface [22] {665DA1EA-26CB-446A-9FB9-F07C091EAB47}
. 2018.12.11 17:42:32 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2018.12.11 17:42:33 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=22 fde6:7a:7d20:a34::1069 store=active
! 2018.12.11 17:42:34 - Disconnecting
. 2018.12.11 17:42:34 - Sending management termination signal
. 2018.12.11 17:42:34 - Management - Send 'signal SIGTERM'
. 2018.12.11 17:42:34 - OpenVPN > MANAGEMENT: CMD '261840d1cc7ba859bc123f622ad701fa2d56365a67babaf5d722b48dc2e70a5a'
. 2018.12.11 17:42:34 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns {665DA1EA-26CB-446A-9FB9-F07C091EAB47} static fde6:7a:7d20:a34::1 validate=no
E 2018.12.11 17:42:34 - OpenVPN > ERROR: netsh command failed: returned error code 1
. 2018.12.11 17:42:38 - OpenVPN > MANAGEMENT: Client disconnected
. 2018.12.11 17:42:38 - OpenVPN > NETSH: command failed
. 2018.12.11 17:42:38 - OpenVPN > Exiting due to fatal error
. 2018.12.11 17:42:38 - Connection terminated.
I 2018.12.11 17:42:38 - Cancel requested.
! 2018.12.11 17:42:38 - Session terminated.
 

 

 

If anyone knows what is happening from looking at these logs

Share this post


Link to post

Hello!

 

Could you please try re-installing? Remembering to install all the drivers as prompted.

 

You could even try the experimental client then. Instructions in my signature.

 

Let us know how you get on .


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

I tried uninstalling it to being the reinstalling process. However, after running the uninstaller, and then re-installing after downloading the installer from this website, the folder that gets created shows the same Eddie-UI client, last modified 3 months ago upon my inital installation. How do I remedy this problem to uninstall and re-install properly?

 

 

EDIT: In fact, when I try uninstalling a re-installing, and then running the launcher, I run into my initial problem I posted about. So no progress there.

Share this post


Link to post

Do I bump this? I have no idea how any of this is supposed to go when I have this problem

 

I don't know if this is correct or not but it may have something to do with setting up dns on ip6 interface.  It appears like your client gets the push of options from server side and while executing part of it (ip6 dns) it fatally fails, and then this triggers the loop.

 

 

 

. 2018.12.11 17:42:21 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2018.12.11 17:42:22 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=22 fde6:7a:7d20:17c4::10ee store=active
. 2018.12.11 17:42:23 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns {665DA1EA-26CB-446A-9FB9-F07C091EAB47} static fde6:7a:7d20:17c4::1 validate=no
E 2018.12.11 17:42:23 - OpenVPN > ERROR: netsh command failed: returned error code 1
. 2018.12.11 17:42:27 - OpenVPN > NETSH: command failed
. 2018.12.11 17:42:27 - OpenVPN > Exiting due to fatal error

 

Unless you're specifically in need of ip6 atm, try disabling in the Eddie client the IP6 options.  If I recall in 2.16.x this is under the networking tab\section, and you can setup IP6 layer to just 'Block' and, probably more importantly  there is a checkbox in DNS tab for windows ignoring the ip6 dns push from the server, that you should try checking\testing.

 

It's possible actually just doing the last thing (the checkbox) might resolve the issue, though it doesn't necessarily explain\solve the why the netsh is failing in the first place but that may be it's whole other wall of wax.

 

/2cents hope it's helpful.

Share this post


Link to post

Tried what you were saying, it was already set to "Block". Unchecking that and attempting to connect to a server yields the same results as before. Does anyone else have any other ideas?

Share this post


Link to post

Tried what you were saying, it was already set to "Block". Unchecking that and attempting to connect to a server yields the same results as before. Does anyone else have any other ideas?

You could submit a support ticket.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Yep.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...