Jump to content
Not connected, Your IP: 3.145.102.18
ouvnwnamc4j3jy

ANSWERED Eddie stuck at "Checking route IPv4"

Recommended Posts

Posted ... (edited)

Hey,

 

I previously used AirVPN without any problems, however after reacquiring a subscription it does not connect anymore. No settings changed, my setup is the same. The router however changed (from Fritzbox to Speedport). Every time I try to connect it gets stuck at "Checking route IPv4". Disabling the firewall, switching to different servers and ensuring DNS lock doesn't help, unticking the "check if tunnel works" box only makes the client get suck at "Flushing DNS".

 

Here's the log:

 

 

. 2019.02.23 20:47:23 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.17763.0, Mono/.Net: v4.0.30319
. 2019.02.23 20:47:23 - Reading options from C:\Users\Mooni\AppData\Local\AirVPN\default.xml
. 2019.02.23 20:47:23 - Command line arguments (1): path="home"
. 2019.02.23 20:47:23 - Profile path: C:\Users\Mooni\AppData\Local\AirVPN\default.xml
. 2019.02.23 20:47:25 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
. 2019.02.23 20:47:25 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (D:\Program Files\AirVPN\openvpn.exe)
. 2019.02.23 20:47:25 - SSH - Version: plink 0.67 (D:\Program Files\AirVPN\plink.exe)
. 2019.02.23 20:47:25 - SSL - Version: stunnel 5.40 (D:\Program Files\AirVPN\stunnel.exe)
. 2019.02.23 20:47:25 - curl - Version: 7.54.1 (D:\Program Files\AirVPN\curl.exe)
. 2019.02.23 20:47:25 - Certification Authorities: D:\Program Files\AirVPN\res\cacert.pem
W 2019.02.23 20:47:25 - Recovery. Unexpected crash?
. 2019.02.23 20:47:25 - Routes, remove 213.152.162.5 for gateway 10.19.40.1 failed: L”schen der Route fehlgeschlagen: Element nicht gefunden
! 2019.02.23 20:47:25 - Activation of Network Lock - Windows Filtering Platform
. 2019.02.23 20:47:25 - Updating systems & servers data ...
I 2019.02.23 20:47:25 - Ready
. 2019.02.23 20:47:26 - Systems & servers data update completed
! 2019.02.23 20:47:27 - Deactivation of Network Lock
I 2019.02.23 20:47:27 - Session starting.
I 2019.02.23 20:47:29 - Checking authorization ...
! 2019.02.23 20:47:29 - Connecting to Gienah (Netherlands, Alblasserdam)
. 2019.02.23 20:47:29 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2019.02.23 20:47:29 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2019.02.23 20:47:29 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2019.02.23 20:47:29 - Connection to OpenVPN Management Interface
. 2019.02.23 20:47:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.02.23 20:47:29 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.02.23 20:47:29 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.02.23 20:47:29 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.02.23 20:47:29 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.02.23 20:47:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.96:443
. 2019.02.23 20:47:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2019.02.23 20:47:29 - OpenVPN > UDP link local: (not bound)
. 2019.02.23 20:47:29 - OpenVPN > UDP link remote: [AF_INET]213.152.162.96:443
. 2019.02.23 20:47:29 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.96:443, sid=71b847ce 5f160680
. 2019.02.23 20:47:29 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.02.23 20:47:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.23 20:47:29 - OpenVPN > VERIFY KU OK
. 2019.02.23 20:47:29 - OpenVPN > Validating certificate extended key usage
. 2019.02.23 20:47:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.23 20:47:29 - OpenVPN > VERIFY EKU OK
. 2019.02.23 20:47:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2019.02.23 20:47:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.23 20:47:30 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.96:443
. 2019.02.23 20:47:31 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2019.02.23 20:47:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.17.198.1,dhcp-option DNS6 fde6:7a:7d20:dc6::1,tun-ipv6,route-gateway 10.17.198.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:dc6::109f/64 fde6:7a:7d20:dc6::1,ifconfig 10.17.198.161 255.255.255.0,peer-id 2,cipher AES-256-GCM'
. 2019.02.23 20:47:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2019.02.23 20:47:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.02.23 20:47:31 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.02.23 20:47:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.02.23 20:47:31 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.02.23 20:47:31 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.02.23 20:47:31 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.02.23 20:47:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2019.02.23 20:47:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.02.23 20:47:31 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.02.23 20:47:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.23 20:47:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.23 20:47:31 - OpenVPN > interactive service msg_channel=0
. 2019.02.23 20:47:31 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=12 HWADDR=1c:1b:0d:30:c5:4d
. 2019.02.23 20:47:31 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2019.02.23 20:47:31 - OpenVPN > GetBestInterfaceEx() returned if=12
. 2019.02.23 20:47:31 - OpenVPN > GDG6: II=12 DP=::/0 NH=fe80::1
. 2019.02.23 20:47:31 - OpenVPN > GDG6: Metric=16, Loopback=0, AA=1, I=0
. 2019.02.23 20:47:31 - OpenVPN > ROUTE6_GATEWAY fe80::1 I=12
. 2019.02.23 20:47:31 - OpenVPN > open_tun
. 2019.02.23 20:47:31 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B8CFDE74-2F68-4B87-9EC7-43493F8FC3C5}.tap
. 2019.02.23 20:47:31 - OpenVPN > TAP-Windows Driver Version 9.21
. 2019.02.23 20:47:31 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.17.198.0/10.17.198.161/255.255.255.0 [SUCCEEDED]
. 2019.02.23 20:47:31 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.17.198.161/255.255.255.0 on interface {B8CFDE74-2F68-4B87-9EC7-43493F8FC3C5} [DHCP-serv: 10.17.198.254, lease-time: 31536000]
. 2019.02.23 20:47:31 - OpenVPN > Successful ARP Flush on interface [10] {B8CFDE74-2F68-4B87-9EC7-43493F8FC3C5}
. 2019.02.23 20:47:31 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2019.02.23 20:47:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=10 fde6:7a:7d20:dc6::109f store=active
. 2019.02.23 20:47:33 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:dc6::1 validate=no
. 2019.02.23 20:47:33 - OpenVPN > add_route_ipv6(fde6:7a:7d20:dc6::/64 -> fde6:7a:7d20:dc6::109f metric 0) dev Ethernet 2
. 2019.02.23 20:47:33 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:dc6::/64 interface=10 fe80::8 store=active
. 2019.02.23 20:47:33 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.02.23 20:47:38 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2019.02.23 20:47:38 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.96 MASK 255.255.255.255 192.168.2.1
. 2019.02.23 20:47:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2019.02.23 20:47:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2019.02.23 20:47:38 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.17.198.1
. 2019.02.23 20:47:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2019.02.23 20:47:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2019.02.23 20:47:38 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.17.198.1
. 2019.02.23 20:47:38 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2019.02.23 20:47:38 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2019.02.23 20:47:38 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:dc6::1 metric -1) dev Ethernet 2
. 2019.02.23 20:47:38 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=10 fe80::8 store=active
. 2019.02.23 20:47:38 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.02.23 20:47:38 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:dc6::1 metric -1) dev Ethernet 2
. 2019.02.23 20:47:38 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=10 fe80::8 store=active
. 2019.02.23 20:47:38 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.02.23 20:47:38 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:dc6::1 metric -1) dev Ethernet 2
. 2019.02.23 20:47:38 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=10 fe80::8 store=active
. 2019.02.23 20:47:38 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.02.23 20:47:38 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:dc6::1 metric -1) dev Ethernet 2
. 2019.02.23 20:47:38 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=10 fe80::8 store=active
. 2019.02.23 20:47:38 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.02.23 20:47:38 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2019.02.23 20:47:38 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2019.02.23 20:47:38 - DNS leak protection with packet filtering enabled.
. 2019.02.23 20:47:38 - DNS IPv4 of a network adapter forced (Ethernet 2, from manual (10.4.0.1) to 10.17.198.1)
. 2019.02.23 20:47:38 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:dc6::1)
. 2019.02.23 20:47:39 - Routes, added a new route, 213.152.162.94 for gateway 10.17.198.1
. 2019.02.23 20:47:39 - Routes, added a new route, 2a00:1678:2470:32:a6d0:3939:bb6b:a0e4 for gateway fde6:7a:7d20:dc6::1
. 2019.02.23 20:47:39 - Flushing DNS
I 2019.02.23 20:47:42 - Checking route IPv4
. 2019.02.23 20:48:02 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
. 2019.02.23 20:48:02 - Checking route (2° try)
. 2019.02.23 20:48:23 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
. 2019.02.23 20:48:23 - Checking route (3° try)
. 2019.02.23 20:48:45 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received
E 2019.02.23 20:48:45 - Checking route IPv4 failed.
. 2019.02.23 20:48:45 - OpenVPN > Initialization Sequence Completed
! 2019.02.23 20:48:45 - Disconnecting
. 2019.02.23 20:48:45 - Routes, removed a route previously added, 213.152.162.94 for gateway 10.17.198.1
. 2019.02.23 20:48:45 - Routes, removed a route previously added, 2a00:1678:2470:32:a6d0:3939:bb6b:a0e4 for gateway fde6:7a:7d20:dc6::1
. 2019.02.23 20:48:45 - Sending management termination signal
. 2019.02.23 20:48:45 - Management - Send 'signal SIGTERM'
. 2019.02.23 20:48:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2019.02.23 20:48:45 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2019.02.23 20:48:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.96 MASK 255.255.255.255 192.168.2.1
. 2019.02.23 20:48:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2019.02.23 20:48:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.17.198.1
. 2019.02.23 20:48:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2019.02.23 20:48:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.17.198.1
. 2019.02.23 20:48:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2019.02.23 20:48:50 - OpenVPN > delete_route_ipv6(::/3)
. 2019.02.23 20:48:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=10 fe80::8 store=active
. 2019.02.23 20:48:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.02.23 20:48:50 - OpenVPN > delete_route_ipv6(2000::/4)
. 2019.02.23 20:48:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=10 fe80::8 store=active
. 2019.02.23 20:48:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.02.23 20:48:50 - OpenVPN > delete_route_ipv6(3000::/4)
. 2019.02.23 20:48:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=10 fe80::8 store=active
. 2019.02.23 20:48:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.02.23 20:48:50 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2019.02.23 20:48:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=10 fe80::8 store=active
. 2019.02.23 20:48:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.02.23 20:48:50 - OpenVPN > Closing TUN/TAP interface
. 2019.02.23 20:48:50 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:dc6::/64)
. 2019.02.23 20:48:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:dc6::/64 interface=10 fe80::8 store=active
. 2019.02.23 20:48:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:dc6::109f store=active
. 2019.02.23 20:48:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all
. 2019.02.23 20:48:50 - OpenVPN > TAP: DHCP address released
. 2019.02.23 20:48:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2019.02.23 20:48:50 - Connection terminated.
. 2019.02.23 20:48:50 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to 10.4.0.1)
. 2019.02.23 20:48:50 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic)
. 2019.02.23 20:48:50 - DNS leak protection with packet filtering disabled.
. 2019.02.23 20:48:51 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2019.02.23 20:48:51 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
I 2019.02.23 20:48:54 - Checking authorization ...
! 2019.02.23 20:48:54 - Connecting to Hyadum (Netherlands, Alblasserdam)
. 2019.02.23 20:48:54 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2019.02.23 20:48:54 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2019.02.23 20:48:54 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2019.02.23 20:48:54 - Connection to OpenVPN Management Interface
. 2019.02.23 20:48:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.02.23 20:48:54 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.02.23 20:48:54 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.02.23 20:48:54 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.02.23 20:48:54 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.02.23 20:48:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.37:443
. 2019.02.23 20:48:54 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2019.02.23 20:48:54 - OpenVPN > UDP link local: (not bound)
. 2019.02.23 20:48:54 - OpenVPN > UDP link remote: [AF_INET]213.152.161.37:443
. 2019.02.23 20:48:54 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.37:443, sid=bb03a39b 315d2c16
. 2019.02.23 20:48:54 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.02.23 20:48:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.23 20:48:54 - OpenVPN > VERIFY KU OK
. 2019.02.23 20:48:54 - OpenVPN > Validating certificate extended key usage
. 2019.02.23 20:48:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.23 20:48:54 - OpenVPN > VERIFY EKU OK
. 2019.02.23 20:48:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hyadum, emailAddress=info@airvpn.org
. 2019.02.23 20:48:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.23 20:48:54 - OpenVPN > [Hyadum] Peer Connection Initiated with [AF_INET]213.152.161.37:443
! 2019.02.23 20:48:54 - Disconnecting
. 2019.02.23 20:48:54 - Sending management termination signal
. 2019.02.23 20:48:54 - Management - Send 'signal SIGTERM'
. 2019.02.23 20:48:55 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2019.02.23 20:48:55 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2019.02.23 20:48:56 - OpenVPN > SENT CONTROL [Hyadum]: 'PUSH_REQUEST' (status=1)
. 2019.02.23 20:48:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.70.1,dhcp-option DNS6 fde6:7a:7d20:f46::1,tun-ipv6,route-gateway 10.19.70.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:f46::1085/64 fde6:7a:7d20:f46::1,ifconfig 10.19.70.135 255.255.255.0,peer-id 2,cipher AES-256-GCM'
. 2019.02.23 20:48:56 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2019.02.23 20:48:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.02.23 20:48:56 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.02.23 20:48:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.02.23 20:48:56 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.02.23 20:48:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.02.23 20:48:56 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.02.23 20:48:56 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2019.02.23 20:48:56 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.02.23 20:48:56 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.02.23 20:48:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.23 20:48:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.23 20:48:56 - OpenVPN > interactive service msg_channel=0
. 2019.02.23 20:48:56 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=12 HWADDR=1c:1b:0d:30:c5:4d
. 2019.02.23 20:48:56 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2019.02.23 20:48:56 - OpenVPN > GetBestInterfaceEx() returned if=12
. 2019.02.23 20:48:56 - OpenVPN > GDG6: II=12 DP=::/0 NH=fe80::1
. 2019.02.23 20:48:56 - OpenVPN > GDG6: Metric=16, Loopback=0, AA=1, I=0
. 2019.02.23 20:48:56 - OpenVPN > ROUTE6_GATEWAY fe80::1 I=12
. 2019.02.23 20:48:56 - OpenVPN > open_tun
. 2019.02.23 20:48:56 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B8CFDE74-2F68-4B87-9EC7-43493F8FC3C5}.tap
. 2019.02.23 20:48:56 - OpenVPN > TAP-Windows Driver Version 9.21
. 2019.02.23 20:48:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.19.70.0/10.19.70.135/255.255.255.0 [SUCCEEDED]
. 2019.02.23 20:48:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.19.70.135/255.255.255.0 on interface {B8CFDE74-2F68-4B87-9EC7-43493F8FC3C5} [DHCP-serv: 10.19.70.254, lease-time: 31536000]
. 2019.02.23 20:48:56 - OpenVPN > Successful ARP Flush on interface [10] {B8CFDE74-2F68-4B87-9EC7-43493F8FC3C5}
. 2019.02.23 20:48:56 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2019.02.23 20:48:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=10 fde6:7a:7d20:f46::1085 store=active
. 2019.02.23 20:48:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:f46::1 validate=no
. 2019.02.23 20:48:58 - OpenVPN > add_route_ipv6(fde6:7a:7d20:f46::/64 -> fde6:7a:7d20:f46::1085 metric 0) dev Ethernet 2
. 2019.02.23 20:48:58 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:f46::/64 interface=10 fe80::8 store=active
. 2019.02.23 20:48:58 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2019.02.23 20:48:59 - OpenVPN > Closing TUN/TAP interface
. 2019.02.23 20:48:59 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:f46::/64)
. 2019.02.23 20:48:59 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:f46::/64 interface=10 fe80::8 store=active
. 2019.02.23 20:48:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:f46::1085 store=active
. 2019.02.23 20:48:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all
. 2019.02.23 20:48:59 - OpenVPN > TAP: DHCP address released
. 2019.02.23 20:48:59 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2019.02.23 20:48:59 - Connection terminated.
I 2019.02.23 20:48:59 - Cancel requested.
! 2019.02.23 20:48:59 - Session terminated.


Any ideas what the problem might be?

Edited ... by giganerd
Apply LOG formatting to logs

Share this post


Link to post

Hello!

 

Did you uncheck "Check Air DNS" too, in addition to "check if tunnel works"?


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Hello!

 

Did you uncheck "Check Air DNS" too, in addition to "check if tunnel works"?

 

Oh well, that helped. Thanks a lot!

 

Edit: Thought the connection is so slow, that I can't even load google.com. Could that somehow be connected (unchecked both "Check Air DNS" and "check if tunnel works")?

Share this post


Link to post

Have you tried different servers and the TCP protocol?


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post
Guest
This topic is now closed to further replies.

×
×
  • Create New...