Jump to content
Not connected, Your IP: 18.205.176.100
altae

ANSWERED Cannot connect while IPV6 is active

Recommended Posts

On my Windows 10 Pro, 64 bit, I cannot connect to any server while IPV6 is active. However if I disable IPV6 AirVPN connects just fine. I've attached the log. Any ideas? As Firewall I use Windows 10 Firewall Control which is based on Windows Filtering Platform. Disabling the firewall (allowing all traffic) does not help, the issue remains. I suspect it has something to do with this line "OpenVPN > ERROR: Windows route add ipv6 command failed: returned error code 1". What's more it makes no difference whether network lock is on or off.

 

. 2019.06.28 03:03:15 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.18362.0, Mono/.Net: v4.0.30319. 2019.06.28 03:03:15 - Reading options from D:\Downloads\Software\airvpn_client\airvpn_portable\default.xml. 2019.06.28 03:03:16 - Command line arguments (0):. 2019.06.28 03:03:16 - Profile path: D:\Downloads\Software\airvpn_client\airvpn_portable\default.xml. 2019.06.28 03:03:18 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2. 2019.06.28 03:03:18 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (D:\Downloads\Software\airvpn_client\airvpn_portable\openvpn.exe). 2019.06.28 03:03:18 - SSH - Version: plink 0.67 (D:\Downloads\Software\airvpn_client\airvpn_portable\plink.exe). 2019.06.28 03:03:18 - SSL - Version: stunnel 5.40 (D:\Downloads\Software\airvpn_client\airvpn_portable\stunnel.exe). 2019.06.28 03:03:18 - curl - Version: 7.54.1 (D:\Downloads\Software\airvpn_client\airvpn_portable\curl.exe). 2019.06.28 03:03:18 - Certification Authorities: D:\Downloads\Software\airvpn_client\airvpn_portable\res\cacert.pem. 2019.06.28 03:03:19 - Updating systems & servers data ...I 2019.06.28 03:03:19 - Ready. 2019.06.28 03:03:19 - Systems & servers data update completed! 2019.06.28 03:03:27 - Activation of Network Lock - Windows Filtering PlatformI 2019.06.28 03:03:31 - Session starting.I 2019.06.28 03:03:31 - Checking authorization ...! 2019.06.28 03:03:32 - Connecting to Celaeno (Netherlands, Alblasserdam). 2019.06.28 03:03:32 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2019.06.28 03:03:32 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2019.06.28 03:03:32 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10. 2019.06.28 03:03:32 - Connection to OpenVPN Management Interface. 2019.06.28 03:03:32 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2019.06.28 03:03:32 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.06.28 03:03:32 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.06.28 03:03:32 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.06.28 03:03:32 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.06.28 03:03:32 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.71:443. 2019.06.28 03:03:32 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2019.06.28 03:03:32 - OpenVPN > UDP link local: (not bound). 2019.06.28 03:03:32 - OpenVPN > UDP link remote: [AF_INET]213.152.161.71:443. 2019.06.28 03:03:32 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.71:443, sid=ff269534 c6a3dfd6. 2019.06.28 03:03:32 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2019.06.28 03:03:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2019.06.28 03:03:32 - OpenVPN > VERIFY KU OK. 2019.06.28 03:03:32 - OpenVPN > Validating certificate extended key usage. 2019.06.28 03:03:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2019.06.28 03:03:32 - OpenVPN > VERIFY EKU OK. 2019.06.28 03:03:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Celaeno, emailAddress=info@airvpn.org. 2019.06.28 03:03:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2019.06.28 03:03:32 - OpenVPN > [Celaeno] Peer Connection Initiated with [AF_INET]213.152.161.71:443. 2019.06.28 03:03:33 - OpenVPN > SENT CONTROL [Celaeno]: 'PUSH_REQUEST' (status=1). 2019.06.28 03:03:33 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.13.42.1,dhcp-option DNS6 fde6:7a:7d20:92a::1,tun-ipv6,route-gateway 10.13.42.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:92a::10bb/64 fde6:7a:7d20:92a::1,ifconfig 10.13.42.189 255.255.255.0,peer-id 1,cipher AES-256-GCM'. 2019.06.28 03:03:33 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2019.06.28 03:03:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2019.06.28 03:03:34 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2019.06.28 03:03:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2019.06.28 03:03:34 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2019.06.28 03:03:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2019.06.28 03:03:34 - OpenVPN > OPTIONS IMPORT: peer-id set. 2019.06.28 03:03:34 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2019.06.28 03:03:34 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2019.06.28 03:03:34 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2019.06.28 03:03:34 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2019.06.28 03:03:34 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2019.06.28 03:03:34 - OpenVPN > interactive service msg_channel=0. 2019.06.28 03:03:34 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=8 HWADDR=94:de:80:a6:96:a8. 2019.06.28 03:03:34 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2019.06.28 03:03:34 - OpenVPN > GetBestInterfaceEx() returned if=8. 2019.06.28 03:03:34 - OpenVPN > GDG6: II=8 DP=::/0 NH=fe80::3631:c4ff:fec9:b060. 2019.06.28 03:03:34 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0. 2019.06.28 03:03:34 - OpenVPN > ROUTE6_GATEWAY fe80::3631:c4ff:fec9:b060 I=8. 2019.06.28 03:03:34 - OpenVPN > open_tun. 2019.06.28 03:03:34 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{DD2A92AD-5B87-42EC-8B8E-B5D463E89B7A}.tap. 2019.06.28 03:03:34 - OpenVPN > TAP-Windows Driver Version 9.21. 2019.06.28 03:03:34 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.13.42.0/10.13.42.189/255.255.255.0 [sUCCEEDED]. 2019.06.28 03:03:34 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.13.42.189/255.255.255.0 on interface {DD2A92AD-5B87-42EC-8B8E-B5D463E89B7A} [DHCP-serv: 10.13.42.254, lease-time: 31536000]. 2019.06.28 03:03:34 - OpenVPN > Successful ARP Flush on interface [15] {DD2A92AD-5B87-42EC-8B8E-B5D463E89B7A}. 2019.06.28 03:03:34 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1. 2019.06.28 03:03:34 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=15 fde6:7a:7d20:92a::10bb store=active. 2019.06.28 03:03:36 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:92a::1 validate=no. 2019.06.28 03:03:36 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.. 2019.06.28 03:03:36 - OpenVPN > add_route_ipv6(fde6:7a:7d20:92a::/64 -> fde6:7a:7d20:92a::10bb metric 0) dev Ethernet 2. 2019.06.28 03:03:36 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:92a::/64 interface=15 fe80::8 store=active. 2019.06.28 03:03:36 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2019.06.28 03:03:41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2019.06.28 03:03:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.71 MASK 255.255.255.255 192.168.1.1. 2019.06.28 03:03:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4. 2019.06.28 03:03:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2019.06.28 03:03:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.13.42.1. 2019.06.28 03:03:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2019.06.28 03:03:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2019.06.28 03:03:41 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.13.42.1. 2019.06.28 03:03:41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2019.06.28 03:03:41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2019.06.28 03:03:41 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:92a::1 metric -1) dev Ethernet 2. 2019.06.28 03:03:41 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=15 fe80::8 store=active. 2019.06.28 03:03:41 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\WbemE 2019.06.28 03:03:41 - OpenVPN > ERROR: Windows route add ipv6 command failed: returned error code 1. 2019.06.28 03:03:41 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:92a::1 metric -1) dev Ethernet 2. 2019.06.28 03:03:41 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=15 fe80::8 store=active. 2019.06.28 03:03:41 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\WbemE 2019.06.28 03:03:41 - OpenVPN > ERROR: Windows route add ipv6 command failed: returned error code 1. 2019.06.28 03:03:41 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:92a::1 metric -1) dev Ethernet 2. 2019.06.28 03:03:41 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=15 fe80::8 store=active. 2019.06.28 03:03:41 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\WbemE 2019.06.28 03:03:41 - OpenVPN > ERROR: Windows route add ipv6 command failed: returned error code 1. 2019.06.28 03:03:41 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:92a::1 metric -1) dev Ethernet 2. 2019.06.28 03:03:41 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=15 fe80::8 store=active. 2019.06.28 03:03:41 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\WbemE 2019.06.28 03:03:42 - OpenVPN > ERROR: Windows route add ipv6 command failed: returned error code 1. 2019.06.28 03:03:42 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2019.06.28 03:03:42 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2019.06.28 03:03:42 - DNS leak protection with packet filtering enabled.. 2019.06.28 03:03:44 - DNS IPv4 of a network adapter forced (Ethernet 2, from manual (10.4.0.1) to 10.13.42.1). 2019.06.28 03:03:45 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:92a::1). 2019.06.28 03:03:45 - Routes, added a new route, 213.152.161.69 for gateway 10.13.42.1. 2019.06.28 03:03:45 - Routes, added a new route, 2a00:1678:2470:12:aea0:c528:11eb:1171 for gateway fde6:7a:7d20:92a::1. 2019.06.28 03:03:45 - Flushing DNSI 2019.06.28 03:03:49 - Checking route IPv4I 2019.06.28 03:03:49 - Checking route IPv6. 2019.06.28 03:04:10 - curl: (28) Connection timed out after 20000 milliseconds. 2019.06.28 03:04:10 - OpenVPN > Initialization Sequence Completed! 2019.06.28 03:04:10 - Disconnecting. 2019.06.28 03:04:10 - Routes, removed a route previously added, 213.152.161.69 for gateway 10.13.42.1. 2019.06.28 03:04:10 - Routes, removed a route previously added, 2a00:1678:2470:12:aea0:c528:11eb:1171 for gateway fde6:7a:7d20:92a::1. 2019.06.28 03:04:10 - Sending management termination signal. 2019.06.28 03:04:10 - Management - Send 'signal SIGTERM'. 2019.06.28 03:04:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2019.06.28 03:04:10 - OpenVPN > SIGTERM received, sending exit notification to peer. 2019.06.28 03:04:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.71 MASK 255.255.255.255 192.168.1.1. 2019.06.28 03:04:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2019.06.28 03:04:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.13.42.1. 2019.06.28 03:04:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2019.06.28 03:04:15 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.13.42.1. 2019.06.28 03:04:15 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2019.06.28 03:04:15 - OpenVPN > Closing TUN/TAP interface. 2019.06.28 03:04:15 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:92a::/64). 2019.06.28 03:04:15 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:92a::/64 interface=15 fe80::8 store=active. 2019.06.28 03:04:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:92a::10bb store=active. 2019.06.28 03:04:16 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all. 2019.06.28 03:04:16 - OpenVPN > TAP: DHCP address released. 2019.06.28 03:04:16 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2019.06.28 03:04:16 - Connection terminated.. 2019.06.28 03:04:16 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to 10.4.0.1). 2019.06.28 03:04:17 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic). 2019.06.28 03:04:17 - DNS leak protection with packet filtering disabled.. 2019.06.28 03:04:17 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2019.06.28 03:04:17 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2019.06.28 03:04:17 - Cancel requested.! 2019.06.28 03:04:17 - Session terminated.! 2019.06.28 03:04:18 - Deactivation of Network LockI 2019.06.28 03:10:48 - Session starting.I 2019.06.28 03:10:49 - Checking authorization ...! 2019.06.28 03:10:49 - Connecting to Piscium (Netherlands, Alblasserdam). 2019.06.28 03:10:49 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2019.06.28 03:10:49 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2019.06.28 03:10:49 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10. 2019.06.28 03:10:49 - Connection to OpenVPN Management Interface. 2019.06.28 03:10:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2019.06.28 03:10:49 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.06.28 03:10:49 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.06.28 03:10:49 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key. 2019.06.28 03:10:49 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication. 2019.06.28 03:10:49 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.133:443. 2019.06.28 03:10:49 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2019.06.28 03:10:49 - OpenVPN > UDP link local: (not bound). 2019.06.28 03:10:49 - OpenVPN > UDP link remote: [AF_INET]134.19.179.133:443. 2019.06.28 03:10:49 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.133:443, sid=ce1122b0 034423f6. 2019.06.28 03:10:49 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2019.06.28 03:10:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2019.06.28 03:10:49 - OpenVPN > VERIFY KU OK. 2019.06.28 03:10:49 - OpenVPN > Validating certificate extended key usage. 2019.06.28 03:10:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2019.06.28 03:10:49 - OpenVPN > VERIFY EKU OK. 2019.06.28 03:10:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Piscium, emailAddress=info@airvpn.org. 2019.06.28 03:10:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2019.06.28 03:10:50 - OpenVPN > [Piscium] Peer Connection Initiated with [AF_INET]134.19.179.133:443. 2019.06.28 03:10:51 - OpenVPN > SENT CONTROL [Piscium]: 'PUSH_REQUEST' (status=1). 2019.06.28 03:10:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.34.74.1,dhcp-option DNS6 fde6:7a:7d20:1e4a::1,tun-ipv6,route-gateway 10.34.74.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1e4a::10ec/64 fde6:7a:7d20:1e4a::1,ifconfig 10.34.74.238 255.255.255.0,peer-id 0,cipher AES-256-GCM'. 2019.06.28 03:10:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2019.06.28 03:10:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2019.06.28 03:10:51 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2019.06.28 03:10:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2019.06.28 03:10:51 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2019.06.28 03:10:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2019.06.28 03:10:51 - OpenVPN > OPTIONS IMPORT: peer-id set. 2019.06.28 03:10:51 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2019.06.28 03:10:51 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2019.06.28 03:10:51 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2019.06.28 03:10:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2019.06.28 03:10:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2019.06.28 03:10:51 - OpenVPN > interactive service msg_channel=0. 2019.06.28 03:10:51 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=8 HWADDR=94:de:80:a6:96:a8. 2019.06.28 03:10:51 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2019.06.28 03:10:51 - OpenVPN > GetBestInterfaceEx() returned if=8. 2019.06.28 03:10:51 - OpenVPN > GDG6: II=8 DP=::/0 NH=fe80::3631:c4ff:fec9:b060. 2019.06.28 03:10:51 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0. 2019.06.28 03:10:51 - OpenVPN > ROUTE6_GATEWAY fe80::3631:c4ff:fec9:b060 I=8. 2019.06.28 03:10:51 - OpenVPN > open_tun. 2019.06.28 03:10:51 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{DD2A92AD-5B87-42EC-8B8E-B5D463E89B7A}.tap. 2019.06.28 03:10:51 - OpenVPN > TAP-Windows Driver Version 9.21. 2019.06.28 03:10:51 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.34.74.0/10.34.74.238/255.255.255.0 [sUCCEEDED]. 2019.06.28 03:10:51 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.34.74.238/255.255.255.0 on interface {DD2A92AD-5B87-42EC-8B8E-B5D463E89B7A} [DHCP-serv: 10.34.74.254, lease-time: 31536000]. 2019.06.28 03:10:51 - OpenVPN > Successful ARP Flush on interface [15] {DD2A92AD-5B87-42EC-8B8E-B5D463E89B7A}. 2019.06.28 03:10:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1. 2019.06.28 03:10:52 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=15 fde6:7a:7d20:1e4a::10ec store=active. 2019.06.28 03:10:53 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:1e4a::1 validate=no. 2019.06.28 03:10:53 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.. 2019.06.28 03:10:54 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1e4a::/64 -> fde6:7a:7d20:1e4a::10ec metric 0) dev Ethernet 2. 2019.06.28 03:10:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1e4a::/64 interface=15 fe80::8 store=active. 2019.06.28 03:10:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem. 2019.06.28 03:10:59 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2019.06.28 03:10:59 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 134.19.179.133 MASK 255.255.255.255 192.168.1.1. 2019.06.28 03:10:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4. 2019.06.28 03:10:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2019.06.28 03:10:59 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.34.74.1. 2019.06.28 03:10:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2019.06.28 03:10:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2019.06.28 03:10:59 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.34.74.1. 2019.06.28 03:10:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2019.06.28 03:10:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2019.06.28 03:10:59 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1e4a::1 metric -1) dev Ethernet 2. 2019.06.28 03:10:59 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=15 fe80::8 store=active. 2019.06.28 03:10:59 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\WbemE 2019.06.28 03:10:59 - OpenVPN > ERROR: Windows route add ipv6 command failed: returned error code 1. 2019.06.28 03:11:00 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1e4a::1 metric -1) dev Ethernet 2. 2019.06.28 03:11:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=15 fe80::8 store=active. 2019.06.28 03:11:00 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\WbemE 2019.06.28 03:11:00 - OpenVPN > ERROR: Windows route add ipv6 command failed: returned error code 1. 2019.06.28 03:11:00 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1e4a::1 metric -1) dev Ethernet 2. 2019.06.28 03:11:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=15 fe80::8 store=active. 2019.06.28 03:11:00 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\WbemE 2019.06.28 03:11:00 - OpenVPN > ERROR: Windows route add ipv6 command failed: returned error code 1. 2019.06.28 03:11:00 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1e4a::1 metric -1) dev Ethernet 2. 2019.06.28 03:11:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=15 fe80::8 store=active. 2019.06.28 03:11:00 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\WbemE 2019.06.28 03:11:01 - OpenVPN > ERROR: Windows route add ipv6 command failed: returned error code 1. 2019.06.28 03:11:01 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2019.06.28 03:11:01 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2019.06.28 03:11:01 - DNS leak protection with packet filtering enabled.. 2019.06.28 03:11:02 - DNS IPv4 of a network adapter forced (Ethernet 2, from manual (10.4.0.1) to 10.34.74.1). 2019.06.28 03:11:02 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:1e4a::1). 2019.06.28 03:11:03 - Routes, added a new route, 134.19.179.131 for gateway 10.34.74.1. 2019.06.28 03:11:03 - Routes, added a new route, 2a00:1678:2470:aaaa:dd14:325d:9d13:57fa for gateway fde6:7a:7d20:1e4a::1. 2019.06.28 03:11:03 - Flushing DNSI 2019.06.28 03:11:07 - Checking route IPv4I 2019.06.28 03:11:07 - Checking route IPv6. 2019.06.28 03:11:27 - curl: (28) Connection timed out after 20000 milliseconds. 2019.06.28 03:11:27 - Checking route (2° try). 2019.06.28 03:11:48 - curl: (28) Connection timed out after 20000 milliseconds. 2019.06.28 03:11:48 - OpenVPN > Initialization Sequence Completed! 2019.06.28 03:11:48 - Disconnecting. 2019.06.28 03:11:48 - Routes, removed a route previously added, 134.19.179.131 for gateway 10.34.74.1. 2019.06.28 03:11:49 - Routes, removed a route previously added, 2a00:1678:2470:aaaa:dd14:325d:9d13:57fa for gateway fde6:7a:7d20:1e4a::1. 2019.06.28 03:11:49 - Sending management termination signal. 2019.06.28 03:11:49 - Management - Send 'signal SIGTERM'. 2019.06.28 03:11:49 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2019.06.28 03:11:49 - OpenVPN > SIGTERM received, sending exit notification to peer. 2019.06.28 03:11:54 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 134.19.179.133 MASK 255.255.255.255 192.168.1.1. 2019.06.28 03:11:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2019.06.28 03:11:54 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.34.74.1. 2019.06.28 03:11:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2019.06.28 03:11:54 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.34.74.1. 2019.06.28 03:11:54 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2019.06.28 03:11:54 - OpenVPN > Closing TUN/TAP interface. 2019.06.28 03:11:54 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1e4a::/64). 2019.06.28 03:11:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1e4a::/64 interface=15 fe80::8 store=active. 2019.06.28 03:11:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:1e4a::10ec store=active. 2019.06.28 03:11:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all. 2019.06.28 03:11:55 - OpenVPN > TAP: DHCP address released. 2019.06.28 03:11:55 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2019.06.28 03:11:55 - Connection terminated.. 2019.06.28 03:11:55 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to 10.4.0.1). 2019.06.28 03:11:56 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic). 2019.06.28 03:11:56 - DNS leak protection with packet filtering disabled.. 2019.06.28 03:11:56 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2019.06.28 03:11:56 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2019.06.28 03:11:56 - Cancel requested.! 2019.06.28 03:11:56 - Session terminated.. 2019.06.28 03:13:27 - Updating systems & servers data .... 2019.06.28 03:13:28 - Systems & servers data update completed

 

 

 

Share this post


Link to post

I'm sorry, your log output is very difficult to read. Can you do this again by using the LOG button in the top left corner of the editor?


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post
"netsh errors + unable to connect to several servers
It's a workaround because it quite simply disables usage of IPv6 in Eddie, but it will get you connected. So far no one's got a real lasting solution, it seems.

Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

So it turns off IPv6. It was working fine for me last week and this week when I connect its not. Is it a random issue that pops up? I'm running 2.16.3 and have been for a while.
I followed the instructions in the post and I am connected.

Share this post


Link to post
19 minutes ago, HurderDurder said:

it a random issue that pops up?


Unknown, I'm afraid. But bugs in the current versions of Eddie on all platforms except Android are currently piling up. Do not despair, though, as Eddie v3 is in active development which will resolve all your troubles.

Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...