Jump to content
Not connected, Your IP: 52.200.130.163
treeguy

Checking DNS Failed (full logs included)

Recommended Posts

. 2019.02.09 14:20:39 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.17134.0, Mono/.Net: v4.0.30319
. 2019.02.09 14:20:39 - Reading options from D:\Programs\AirVPN\default.xml
. 2019.02.09 14:20:39 - Command line arguments (0):
. 2019.02.09 14:20:39 - Profile path: D:\Programs\AirVPN\default.xml
. 2019.02.09 14:20:40 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
. 2019.02.09 14:20:40 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (D:\Programs\AirVPN\openvpn.exe)
. 2019.02.09 14:20:40 - SSH - Version: plink 0.67 (D:\Programs\AirVPN\plink.exe)
. 2019.02.09 14:20:40 - SSL - Version: stunnel 5.40 (D:\Programs\AirVPN\stunnel.exe)
. 2019.02.09 14:20:40 - curl - Version: 7.54.1 (D:\Programs\AirVPN\curl.exe)
. 2019.02.09 14:20:40 - Certification Authorities: D:\Programs\AirVPN\res\cacert.pem
. 2019.02.09 14:20:41 - Updating systems & servers data ...
I 2019.02.09 14:20:41 - Ready
. 2019.02.09 14:20:42 - Systems & servers data update completed
I 2019.02.09 14:20:49 - Session starting.
I 2019.02.09 14:20:49 - Checking authorization ...
. 2019.02.09 14:20:50 - IPv6 disabled with packet filtering.
! 2019.02.09 14:20:50 - Connecting to Sculptor (United States, Atlanta, Georgia)
. 2019.02.09 14:20:50 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2019.02.09 14:20:50 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2019.02.09 14:20:50 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2019.02.09 14:20:50 - Connection to OpenVPN Management Interface
. 2019.02.09 14:20:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.02.09 14:20:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.02.09 14:20:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.02.09 14:20:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.02.09 14:20:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.02.09 14:20:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.37:443
. 2019.02.09 14:20:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2019.02.09 14:20:50 - OpenVPN > UDP link local: (not bound)
. 2019.02.09 14:20:50 - OpenVPN > UDP link remote: [AF_INET]64.42.179.37:443
. 2019.02.09 14:20:50 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.37:443, sid=4831c8cf c4c42820
. 2019.02.09 14:20:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.02.09 14:20:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.09 14:20:50 - OpenVPN > VERIFY KU OK
. 2019.02.09 14:20:50 - OpenVPN > Validating certificate extended key usage
. 2019.02.09 14:20:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.09 14:20:50 - OpenVPN > VERIFY EKU OK
. 2019.02.09 14:20:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sculptor, emailAddress=info@airvpn.org
. 2019.02.09 14:20:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.09 14:20:50 - OpenVPN > [sculptor] Peer Connection Initiated with [AF_INET]64.42.179.37:443
. 2019.02.09 14:20:51 - OpenVPN > SENT CONTROL [sculptor]: 'PUSH_REQUEST' (status=1)
. 2019.02.09 14:20:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.90.1,dhcp-option DNS6 fde6:7a:7d20:135a::1,tun-ipv6,route-gateway 10.23.90.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:135a::10b9/64 fde6:7a:7d20:135a::1,ifconfig 10.23.90.187 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2019.02.09 14:20:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2019.02.09 14:20:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:135a::1'
. 2019.02.09 14:20:51 - OpenVPN > Pushed option removed by filter: 'tun-ipv6'
. 2019.02.09 14:20:51 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:135a::10b9/64 fde6:7a:7d20:135a::1'
. 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2019.02.09 14:20:51 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.02.09 14:20:51 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.02.09 14:20:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.09 14:20:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.09 14:20:51 - OpenVPN > interactive service msg_channel=0
. 2019.02.09 14:20:51 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=2 HWADDR=e0:d5:5e:af:74:93
. 2019.02.09 14:20:51 - OpenVPN > open_tun
. 2019.02.09 14:20:51 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{2D318BED-776D-427C-94CD-FF14B83FB719}.tap
. 2019.02.09 14:20:51 - OpenVPN > TAP-Windows Driver Version 9.21
. 2019.02.09 14:20:51 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.23.90.0/10.23.90.187/255.255.255.0 [sUCCEEDED]
. 2019.02.09 14:20:51 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.23.90.187/255.255.255.0 on interface {2D318BED-776D-427C-94CD-FF14B83FB719} [DHCP-serv: 10.23.90.254, lease-time: 31536000]
. 2019.02.09 14:20:51 - OpenVPN > Successful ARP Flush on interface [9] {2D318BED-776D-427C-94CD-FF14B83FB719}
. 2019.02.09 14:20:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2019.02.09 14:20:56 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2019.02.09 14:20:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 64.42.179.37 MASK 255.255.255.255 192.168.1.1
. 2019.02.09 14:20:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2019.02.09 14:20:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2019.02.09 14:20:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.23.90.1
. 2019.02.09 14:20:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2019.02.09 14:20:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2019.02.09 14:20:56 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.23.90.1
. 2019.02.09 14:20:56 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2019.02.09 14:20:56 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2019.02.09 14:20:56 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2019.02.09 14:20:56 - DNS leak protection with packet filtering enabled.
. 2019.02.09 14:20:57 - DNS IPv4 of a network adapter forced (Ethernet 2, from manual (10.23.56.1) to 10.23.90.1)
W 2019.02.09 14:20:57 - Routes, add 64.42.179.35 for gateway 10.23.90.1 failed: The screen cannot be set to the number of lines and columns specified
. 2019.02.09 14:20:57 - Unable to compute route for 2605:9f80:6000:77:3824:245d:eb3b:b055: IPv6 VPN gateway not available.
. 2019.02.09 14:20:57 - Flushing DNS
I 2019.02.09 14:20:57 - Checking route IPv4
I 2019.02.09 14:20:57 - Checking DNS
. 2019.02.09 14:21:09 - Checking DNS failed:
. 2019.02.09 14:21:09 - Checking DNS (2° try)
. 2019.02.09 14:21:23 - Checking DNS failed:
. 2019.02.09 14:21:23 - Checking DNS (3° try)

Share this post


Link to post

Hello!

 

You can either try upgrading to the experimental client by following the link in my signature or you can try the below solution:

 

Eddie>Preferences>DNS>Uncheck "Check Air DNS">Save and Preferences>Advanced>Uncheck "Check if tunnel works">Save.

 

Then re-connect to a server.

 

Sometimes you only need to uncheck one of them.


Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. (<----Temporarily broken). You may also read the Eddie Android FAQ.
Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.


Tired of Windows? Why Linux Is Better.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...