Jump to content
Not connected, Your IP: 34.204.202.44
drybones99

ANSWERED Can't connect to any server besides Telescopium

Recommended Posts

I have been unable to connect to servers besides "Telescopium, Vancouver, Canada" for months now. I have used AirVPN for years, and I used to be able to connect to various different servers. Now, I can only connect to Telescopium, with all other servers staying stuck on "Checking DNS," trying three times, and disconnecting and restarting, only to attempt again with a different server. It fails every time, unless the server is Telescopium, in which case it works fine. I haven't checked every server, but so far, after testing a myriad of servers, only Telescopium is working for me. I have tried internet connections from my two ISPs, but nothing works. What can I do to resolve this problem? I am willing to post logs, if necessary, although I would like to know which folder the relevant AirVPN logs are kept in.

Share this post


Link to post
15 hours ago, drybones99 said:

I would like to know which folder the relevant AirVPN logs are kept in.


They're not kept. If you want to write the logs to a file, there's a setting for it, but it's usually not necessary.

Please try a connection with any server and then with Telescopium, then click on the lifebelt icon in the Logs tab and paste the output here. 10 points to Gryffindor if you post them in LOG formatting (when you're posting it here, the button in the top left corner of the post editor is meant). Thank you!

Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

I attempted to connect to Titawin, it failed three times, and then I was able to successfully connect to Telescopium, as usual. These are the results, regardless of whether I have network lock turned on or not. Here is the log, in LOG formatting:

Eddie System/Environment Report - 1/23/2020 11:25 PM UTC

Eddie version: 2.13.6
Eddie OS build: windows_x64
Eddie architecture: x64
OS type: Windows
OS name: Windows 10 Pro
OS version: Microsoft Windows NT 10.0.18363.0
OS architecture: x64
Mono /.Net Framework: v4.0.30319
OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2
OpenVPN: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
Profile path: C:\Program Files\AirVPN\AirVPN.xml
Data path: C:\Program Files\AirVPN
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\AirVPN.exe
Command line arguments: (0 args) 
Network Lock Active: Yes, Windows Filtering Platform
Connected to VPN: Yes, Eddie.Core.StatsEntry
Detected DNS: 1.0.0.1, 1.1.1.1, 10.19.12.1
Test DNS IPv4: Ok
Test DNS IPv6: Failed
----------------------------
Test HTTP:

Status: HTTP/1.1 200 OK  - Headers: server:nginx;date:Thu, 23 Jan 2020 23:25:49 GMT;content-type:text/html; charset=UTF-8;transfer-encoding:chunked;connection:keep-alive;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;feature-policy:autoplay 'none'; camera 'none'; encrypted-media 'none'; fullscreen 'self'; geolocation 'none'; microphone 'none'; magnetometer 'none'; midi 'none'; payment 'none'; speaker 'self'; sync-xhr 'self'; vr 'none';;content-security-policy-report-only:report-uri https://airvpn.org/services/csp_report.php; default-src 'none'; connect-src 'self'; script-src 'self'; style-src 'self'; font-src 'self'; img-src 'self' data:; base-uri 'none'; frame-ancestors 'self' eddie.website; form-action 'self';content-security-policy:default-src 'none'; connect-src 'self'; script-src 'self'; style-src 'self'; font-src 'self'; img-src 'self' data:; base-uri 'none'; frame-ancestors 'self' eddie.website; form-action 'self';cache-control:max-age=0, no-cache, no-store, must-revalidate; - Body (10 bytes): Success.

----------------------------
Test HTTPS:

Status: HTTP/2 200  - Headers: server:nginx;date:Thu, 23 Jan 2020 23:25:50 GMT;content-type:text/html; charset=UTF-8;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;feature-policy:autoplay 'none'; camera 'none'; encrypted-media 'none'; fullscreen 'self'; geolocation 'none'; microphone 'none'; magnetometer 'none'; midi 'none'; payment 'none'; speaker 'self'; sync-xhr 'self'; vr 'none';;content-security-policy-report-only:report-uri https://airvpn.org/services/csp_report.php; default-src 'none'; connect-src 'self'; script-src 'self'; style-src 'self'; font-src 'self'; img-src 'self' data:; base-uri 'none'; frame-ancestors 'self' eddie.website; form-action 'self';content-security-policy:default-src 'none'; connect-src 'self'; script-src 'self'; style-src 'self'; font-src 'self'; img-src 'self' data:; base-uri 'none'; frame-ancestors 'self' eddie.website; form-action 'self';cache-control:max-age=0, no-cache, no-store, must-revalidate; - Body (10 bytes): Success.

----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
advanced.expert: True
advanced.check.route: False

----------------------------
Logs:

I 2020.01.23 15:23:43 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.18363.0, Mono/.Net Framework: v4.0.30319
. 2020.01.23 15:23:43 - Reading options from C:\Program Files\AirVPN\AirVPN.xml
. 2020.01.23 15:23:43 - Command line arguments (0):
I 2020.01.23 15:23:44 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2020.01.23 15:23:44 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
I 2020.01.23 15:23:44 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2020.01.23 15:23:44 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
I 2020.01.23 15:23:44 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
I 2020.01.23 15:23:44 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem
. 2020.01.23 15:23:45 - Updating systems & servers data ...
! 2020.01.23 15:23:45 - Ready
. 2020.01.23 15:23:46 - Systems & servers data update completed
! 2020.01.23 15:23:47 - Activation of Network Lock - Windows Filtering Platform
I 2020.01.23 15:23:56 - Session starting.
. 2020.01.23 15:23:56 - IPv6 disabled with packet filtering.
I 2020.01.23 15:23:56 - Checking authorization ...
! 2020.01.23 15:23:57 - Connecting to Titawin (Canada, Vancouver)
. 2020.01.23 15:23:57 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2020.01.23 15:23:57 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.01.23 15:23:57 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2020.01.23 15:23:57 - Connection to OpenVPN Management Interface
. 2020.01.23 15:23:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.01.23 15:23:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.01.23 15:23:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.01.23 15:23:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.58:443
. 2020.01.23 15:23:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.01.23 15:23:57 - OpenVPN > UDP link local: (not bound)
. 2020.01.23 15:23:57 - OpenVPN > UDP link remote: [AF_INET]192.30.89.58:443
. 2020.01.23 15:23:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.01.23 15:23:57 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.58:443, sid=c0639bcb 872f806e
. 2020.01.23 15:23:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.01.23 15:23:57 - OpenVPN > VERIFY KU OK
. 2020.01.23 15:23:57 - OpenVPN > Validating certificate extended key usage
. 2020.01.23 15:23:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.01.23 15:23:57 - OpenVPN > VERIFY EKU OK
. 2020.01.23 15:23:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Titawin, emailAddress=info@airvpn.org
. 2020.01.23 15:23:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.01.23 15:23:57 - OpenVPN > [Titawin] Peer Connection Initiated with [AF_INET]192.30.89.58:443
. 2020.01.23 15:23:58 - OpenVPN > SENT CONTROL [Titawin]: 'PUSH_REQUEST' (status=1)
. 2020.01.23 15:23:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.20.68.1,route-gateway 10.20.68.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.20.68.68 255.255.255.0,peer-id 6,cipher AES-256-GCM'
. 2020.01.23 15:23:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.01.23 15:23:58 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.01.23 15:23:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.01.23 15:23:58 - OpenVPN > OPTIONS IMPORT: route options modified
. 2020.01.23 15:23:58 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.01.23 15:23:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.01.23 15:23:58 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.01.23 15:23:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.01.23 15:23:58 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.01.23 15:23:58 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.01.23 15:23:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.23 15:23:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.23 15:23:58 - OpenVPN > interactive service msg_channel=0
. 2020.01.23 15:23:58 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=21 HWADDR=18:31:bf:6c:c5:85
. 2020.01.23 15:23:59 - OpenVPN > open_tun
. 2020.01.23 15:23:59 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{49D78DAA-9B0B-4538-AF60-1B02795C0B5B}.tap
. 2020.01.23 15:23:59 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.01.23 15:23:59 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.20.68.0/10.20.68.68/255.255.255.0 [SUCCEEDED]
. 2020.01.23 15:23:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.20.68.68/255.255.255.0 on interface {49D78DAA-9B0B-4538-AF60-1B02795C0B5B} [DHCP-serv: 10.20.68.254, lease-time: 31536000]
. 2020.01.23 15:23:59 - OpenVPN > Successful ARP Flush on interface [9] {49D78DAA-9B0B-4538-AF60-1B02795C0B5B}
. 2020.01.23 15:23:59 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2020.01.23 15:24:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.01.23 15:24:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.30.89.58 MASK 255.255.255.255 192.168.1.1
. 2020.01.23 15:24:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.01.23 15:24:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.23 15:24:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.20.68.1
. 2020.01.23 15:24:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.23 15:24:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.23 15:24:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.20.68.1
. 2020.01.23 15:24:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.23 15:24:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.23 15:24:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2020.01.23 15:24:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2020.01.23 15:24:04 - DNS leak protection with packet filtering enabled.
. 2020.01.23 15:24:04 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.19.12.1) to 10.20.68.1)
. 2020.01.23 15:24:04 - Flushing DNS
I 2020.01.23 15:24:04 - Checking DNS
. 2020.01.23 15:24:29 - curl: (6) Could not resolve host: titawin_exit.airservers.org
. 2020.01.23 15:24:29 - Checking DNS (2° try)
. 2020.01.23 15:24:54 - curl: (6) Could not resolve host: titawin_exit.airservers.org
. 2020.01.23 15:24:54 - Checking DNS (3° try)
. 2020.01.23 15:25:21 - curl: (6) Could not resolve host: titawin_exit.airservers.org
E 2020.01.23 15:25:21 - Checking DNS failed.
. 2020.01.23 15:25:21 - OpenVPN > Initialization Sequence Completed
! 2020.01.23 15:25:21 - Disconnecting
. 2020.01.23 15:25:21 - Sending management termination signal
. 2020.01.23 15:25:21 - Management - Send 'signal SIGTERM'
. 2020.01.23 15:25:26 - Connection terminated.
. 2020.01.23 15:25:26 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.19.12.1)
. 2020.01.23 15:25:26 - DNS leak protection with packet filtering disabled.
. 2020.01.23 15:25:26 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2020.01.23 15:25:26 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
I 2020.01.23 15:25:29 - Checking authorization ...
! 2020.01.23 15:25:30 - Connecting to Telescopium (Canada, Vancouver)
. 2020.01.23 15:25:30 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2020.01.23 15:25:30 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.01.23 15:25:30 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2020.01.23 15:25:30 - Connection to OpenVPN Management Interface
. 2020.01.23 15:25:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.01.23 15:25:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.01.23 15:25:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2020.01.23 15:25:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.50:443
. 2020.01.23 15:25:30 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.01.23 15:25:30 - OpenVPN > UDP link local: (not bound)
. 2020.01.23 15:25:30 - OpenVPN > UDP link remote: [AF_INET]192.30.89.50:443
. 2020.01.23 15:25:30 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.01.23 15:25:30 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.50:443, sid=c3a550ab da534c17
. 2020.01.23 15:25:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.01.23 15:25:30 - OpenVPN > VERIFY KU OK
. 2020.01.23 15:25:30 - OpenVPN > Validating certificate extended key usage
. 2020.01.23 15:25:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.01.23 15:25:30 - OpenVPN > VERIFY EKU OK
. 2020.01.23 15:25:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org
. 2020.01.23 15:25:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.01.23 15:25:31 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.50:443
. 2020.01.23 15:25:32 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1)
. 2020.01.23 15:25:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.19.4.1,route-gateway 10.19.4.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.19.4.238 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2020.01.23 15:25:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.01.23 15:25:32 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.01.23 15:25:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.01.23 15:25:32 - OpenVPN > OPTIONS IMPORT: route options modified
. 2020.01.23 15:25:32 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.01.23 15:25:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.01.23 15:25:32 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.01.23 15:25:32 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.01.23 15:25:32 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.01.23 15:25:32 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.01.23 15:25:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.23 15:25:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.01.23 15:25:32 - OpenVPN > interactive service msg_channel=0
. 2020.01.23 15:25:32 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=21 HWADDR=18:31:bf:6c:c5:85
. 2020.01.23 15:25:32 - OpenVPN > open_tun
. 2020.01.23 15:25:32 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{49D78DAA-9B0B-4538-AF60-1B02795C0B5B}.tap
. 2020.01.23 15:25:32 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.01.23 15:25:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.19.4.0/10.19.4.238/255.255.255.0 [SUCCEEDED]
. 2020.01.23 15:25:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.19.4.238/255.255.255.0 on interface {49D78DAA-9B0B-4538-AF60-1B02795C0B5B} [DHCP-serv: 10.19.4.254, lease-time: 31536000]
. 2020.01.23 15:25:32 - OpenVPN > Successful ARP Flush on interface [9] {49D78DAA-9B0B-4538-AF60-1B02795C0B5B}
. 2020.01.23 15:25:32 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2020.01.23 15:25:37 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.01.23 15:25:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.30.89.50 MASK 255.255.255.255 192.168.1.1
. 2020.01.23 15:25:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.01.23 15:25:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.23 15:25:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.19.4.1
. 2020.01.23 15:25:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.23 15:25:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.23 15:25:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.19.4.1
. 2020.01.23 15:25:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.01.23 15:25:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.01.23 15:25:37 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2020.01.23 15:25:37 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2020.01.23 15:25:37 - DNS leak protection with packet filtering enabled.
. 2020.01.23 15:25:37 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.19.12.1) to 10.19.4.1)
. 2020.01.23 15:25:37 - Flushing DNS
I 2020.01.23 15:25:37 - Checking DNS
! 2020.01.23 15:25:38 - Connected.
. 2020.01.23 15:25:38 - OpenVPN > Initialization Sequence Completed

----------------------------
Network Interfaces:

Network Interface: Ethernet 2 (TAP-Windows Adapter V9, ID:{49D78DAA-9B0B-4538-AF60-1B02795C0B5B}) - Ethernet - Up
Network Interface: Ethernet (Intel(R) Ethernet Connection (2) I219-V, ID:{D7ED2D2E-0008-4377-8107-BC99C4CA3233}) - Ethernet - Up
Network Interface: Local Area Connection* 1 (Microsoft Wi-Fi Direct Virtual Adapter #3, ID:{CAC75FD4-1AA3-449C-BC0F-5F54BF68D100}) - Wireless80211 - Down
Network Interface: Local Area Connection* 12 (Microsoft Wi-Fi Direct Virtual Adapter #4, ID:{31D63908-A579-4E93-89DA-6DA8FDDE846F}) - Wireless80211 - Down
Network Interface: Wi-Fi (Realtek 8822BE Wireless LAN 802.11ac PCI-E NIC, ID:{33C74F91-A3F9-4213-B286-AB0C829EED54}) - Wireless80211 - Down
Network Interface: Bluetooth Network Connection (Bluetooth Device (Personal Area Network), ID:{55B27356-53BD-493E-9F58-5E341EC139EB}) - Ethernet - Down
Network Interface: Loopback Pseudo-Interface 1 (Software Loopback Interface 1, ID:{F24A2B59-FE5D-11E8-956B-806E6F6E6963}) - Loopback - Up

----------------------------
Default gateways:

192.168.1.1, Intel(R) Ethernet Connection (2) I219-V

----------------------------
ipconfig /all:

'ipconfig' is not recognized as an internal or external command,
operable program or batch file.
----------------------------
route print:

'route' is not recognized as an internal or external command,
operable program or batch file.

Share this post


Link to post
18 hours ago, drybones99 said:

Eddie version: 2.13.6


I know this works, but maybe an update is overdue. We're currently on 2.16.3 stable and 2.18.6 beta which will be a stable in the very near future, so one can say 2.18.6 is safe to use. Besides, newer versions are more verbose on the support file output. :)
 
18 hours ago, drybones99 said:

advanced.check.route: False


This setting indicates that you also have got routing problems. Is it true?
 
18 hours ago, drybones99 said:

Detected DNS: 1.0.0.1, 1.1.1.1, 10.19.12.1
[…]
 . 2020.01.23 15:25:26 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.19.12.1)


Two remarks:
  1. The TAP adapter should remain at auto DNS. OpenVPN sets it according to the PUSH_REPLY, which is always the gateway of the VPN subnet you're connecting to.
  2. Some would advise to not use Cloudflare DNS (1.1.1.1, 1.0.0.1). It's a big company and your DNS queries are travelling unencrypted via internet. While I suggest that at least one upstream server should be configured, AirDNS (in the form of 10.4.0.1) should be used primarily.

Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

I updated AirVPN to version 2.16.3, and I can now connect to any server I want! If I ever have this problem again, I will be sure to refer back to this thread.

Share this post


Link to post
5 hours ago, giganerd said:

This setting indicates that you also have got routing problems. Is it true?


Can you please reset this setting? Check for the routes so we know it really works as it should.

Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

For some reason, I can't figure out where to find the "advanced.check.route" setting in Eddie. Where is it? When you tell me to reset it, does that mean I change it from false to true? I have "expert mode" turned on in the settings.

Share this post


Link to post

Settings > Advanced > Check if the tunnel works. Should be enabled.


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

The problem that I initially had reported has returned. I have made sure that "Check if the tunnel works" is enabled. Should I attempt to set the TAP adapter to "Auto DNS"? If so, how should I do that?

Share this post


Link to post

The window where you see all the interfaces > TAP Adapter > Properties > Internet Protocol version 4 > Set all to auto, the same on version 6.
Sorry, I don't use Windows to point you to the exact location. 😕


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

I set the TAP Adapter to auto DNS for both IPv4 and IPv6, but the problem continues. I attempted to connect to a server other than Telescopium, the recommended server, Nahn, it failed, and then I tried to connect to Telescopium, where it succeeded. I have posted the log for that test:

Eddie System/Environment Report - 2/6/2020 4:24 AM UTC

Eddie version: 2.16.3
Eddie OS build: windows_x64
Eddie architecture: x64
OS type: Windows
OS name: Windows 10 Pro
OS version: Microsoft Windows NT 10.0.18363.0
OS architecture: x64
Mono /.Net Framework: v4.0.30319
OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2
OpenVPN: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
Profile path: C:\Users\aidancaamano\AppData\Local\AirVPN\default.xml
Data path: C:\Users\aidancaamano\AppData\Local\AirVPN
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\Eddie-UI.exe
Command line arguments: (1 args) path="home"
Network Lock Active: Yes, Windows Filtering Platform
Connected to VPN: Yes, Telescopium
Detected DNS: 10.19.12.1, 192.168.1.1, fde6:7a:7d20:f02::1
Test DNS IPv4: Ok
Test DNS IPv6: Ok
Test Ping IPv4: 72 ms
Test Ping IPv6: 43 ms
Test HTTP IPv4: Ok
Test HTTP IPv6: Ok
Test HTTPS: Ok
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
advanced.expert: True

----------------------------
Logs:

. 2020.02.05 20:21:44 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.18363.0, Mono/.Net: v4.0.30319
. 2020.02.05 20:21:44 - Reading options from C:\Users\aidancaamano\AppData\Local\AirVPN\default.xml
. 2020.02.05 20:21:45 - Command line arguments (1): path="home"
. 2020.02.05 20:21:45 - Profile path: C:\Users\aidancaamano\AppData\Local\AirVPN\default.xml
. 2020.02.05 20:21:46 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
. 2020.02.05 20:21:46 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2020.02.05 20:21:46 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2020.02.05 20:21:46 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2020.02.05 20:21:46 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
. 2020.02.05 20:21:46 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem
. 2020.02.05 20:21:47 - Updating systems & servers data ...
I 2020.02.05 20:21:47 - Ready
. 2020.02.05 20:21:49 - Systems & servers data update completed
! 2020.02.05 20:21:50 - Activation of Network Lock - Windows Filtering Platform
I 2020.02.05 20:21:54 - Session starting.
I 2020.02.05 20:21:54 - Checking authorization ...
! 2020.02.05 20:21:55 - Connecting to Nahn (Canada, Vancouver)
. 2020.02.05 20:21:55 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.02.05 20:21:55 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.02.05 20:21:55 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.02.05 20:21:55 - Connection to OpenVPN Management Interface
. 2020.02.05 20:21:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.02.05 20:21:55 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.02.05 20:21:55 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.02.05 20:21:55 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.02.05 20:21:55 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.02.05 20:21:55 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.69:443
. 2020.02.05 20:21:55 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.02.05 20:21:55 - OpenVPN > UDP link local: (not bound)
. 2020.02.05 20:21:55 - OpenVPN > UDP link remote: [AF_INET]192.30.89.69:443
. 2020.02.05 20:21:55 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.69:443, sid=bc3ec8e9 b285db84
. 2020.02.05 20:21:55 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.02.05 20:21:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.02.05 20:21:55 - OpenVPN > VERIFY KU OK
. 2020.02.05 20:21:55 - OpenVPN > Validating certificate extended key usage
. 2020.02.05 20:21:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.02.05 20:21:55 - OpenVPN > VERIFY EKU OK
. 2020.02.05 20:21:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nahn, emailAddress=info@airvpn.org
. 2020.02.05 20:21:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.02.05 20:21:56 - OpenVPN > [Nahn] Peer Connection Initiated with [AF_INET]192.30.89.69:443
. 2020.02.05 20:21:57 - OpenVPN > SENT CONTROL [Nahn]: 'PUSH_REQUEST' (status=1)
. 2020.02.05 20:21:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.35.70.1,dhcp-option DNS6 fde6:7a:7d20:1f46::1,tun-ipv6,route-gateway 10.35.70.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1f46::1070/64 fde6:7a:7d20:1f46::1,ifconfig 10.35.70.114 255.255.255.0,peer-id 6,cipher AES-256-GCM'
. 2020.02.05 20:21:57 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.02.05 20:21:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.02.05 20:21:57 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.02.05 20:21:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.02.05 20:21:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.02.05 20:21:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.02.05 20:21:57 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.02.05 20:21:57 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.02.05 20:21:57 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.02.05 20:21:57 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.02.05 20:21:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.02.05 20:21:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.02.05 20:21:57 - OpenVPN > interactive service msg_channel=0
. 2020.02.05 20:21:57 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=21 HWADDR=18:31:bf:6c:c5:85
. 2020.02.05 20:21:57 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.02.05 20:21:57 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found.   (code=1168)
. 2020.02.05 20:21:57 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.02.05 20:21:57 - OpenVPN > open_tun
. 2020.02.05 20:21:57 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{49D78DAA-9B0B-4538-AF60-1B02795C0B5B}.tap
. 2020.02.05 20:21:57 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.02.05 20:21:57 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.35.70.0/10.35.70.114/255.255.255.0 [SUCCEEDED]
. 2020.02.05 20:21:57 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.35.70.114/255.255.255.0 on interface {49D78DAA-9B0B-4538-AF60-1B02795C0B5B} [DHCP-serv: 10.35.70.254, lease-time: 31536000]
. 2020.02.05 20:21:57 - OpenVPN > Successful ARP Flush on interface [9] {49D78DAA-9B0B-4538-AF60-1B02795C0B5B}
. 2020.02.05 20:21:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.02.05 20:21:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=9 fde6:7a:7d20:1f46::1070 store=active
. 2020.02.05 20:21:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:1f46::1 validate=no
. 2020.02.05 20:21:59 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1f46::/64 -> fde6:7a:7d20:1f46::1070 metric 0) dev Ethernet 2
. 2020.02.05 20:21:59 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1f46::/64 interface=9 fe80::8 store=active
. 2020.02.05 20:21:59 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.05 20:22:04 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.02.05 20:22:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.30.89.69 MASK 255.255.255.255 192.168.1.1
. 2020.02.05 20:22:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.02.05 20:22:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.02.05 20:22:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.35.70.1
. 2020.02.05 20:22:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.02.05 20:22:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.02.05 20:22:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.35.70.1
. 2020.02.05 20:22:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.02.05 20:22:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.02.05 20:22:04 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1f46::1 metric -1) dev Ethernet 2
. 2020.02.05 20:22:04 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=9 fe80::8 store=active
. 2020.02.05 20:22:04 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.05 20:22:04 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1f46::1 metric -1) dev Ethernet 2
. 2020.02.05 20:22:04 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=9 fe80::8 store=active
. 2020.02.05 20:22:04 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.05 20:22:04 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1f46::1 metric -1) dev Ethernet 2
. 2020.02.05 20:22:04 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=9 fe80::8 store=active
. 2020.02.05 20:22:04 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.05 20:22:04 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1f46::1 metric -1) dev Ethernet 2
. 2020.02.05 20:22:04 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=9 fe80::8 store=active
. 2020.02.05 20:22:04 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.05 20:22:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2020.02.05 20:22:04 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2020.02.05 20:22:04 - DNS leak protection with packet filtering enabled.
. 2020.02.05 20:22:05 - DNS IPv4 of a network adapter forced (Ethernet 2, from manual (10.19.12.1) to 10.35.70.1)
. 2020.02.05 20:22:05 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:1f46::1)
W 2020.02.05 20:22:05 - Routes, add 192.30.89.67 for gateway 10.35.70.1 failed: 'route' is not recognized as an internal or external command,
W 2020.02.05 20:22:05 -     operable program or batch file
W 2020.02.05 20:22:05 - Routes, add 2606:9580:100:e:d075:a67e:1f9c:139d for gateway fde6:7a:7d20:1f46::1 failed: 'netsh' is not recognized as an internal or external command,
W 2020.02.05 20:22:05 -     operable program or batch file
. 2020.02.05 20:22:05 - Flushing DNS
I 2020.02.05 20:22:05 - Checking route IPv4
I 2020.02.05 20:22:06 - Checking route IPv6
I 2020.02.05 20:22:06 - Checking DNS
. 2020.02.05 20:22:19 - Checking DNS failed:
. 2020.02.05 20:22:19 - Checking DNS (2° try)
. 2020.02.05 20:22:32 - Checking DNS failed:
. 2020.02.05 20:22:32 - Checking DNS (3° try)
. 2020.02.05 20:22:46 - Checking DNS failed:
E 2020.02.05 20:22:46 - Checking DNS failed.
. 2020.02.05 20:22:46 - OpenVPN > Initialization Sequence Completed
! 2020.02.05 20:22:46 - Disconnecting
. 2020.02.05 20:22:46 - Sending management termination signal
. 2020.02.05 20:22:46 - Management - Send 'signal SIGTERM'
. 2020.02.05 20:22:47 - OpenVPN > MANAGEMENT: CMD 'fac03fa128919b2d2fad5cef6b747798ff1588e523b3c4d3161c73e07c488fea'
. 2020.02.05 20:22:56 - Sending management termination signal
. 2020.02.05 20:22:56 - Management - Send 'signal SIGTERM'
. 2020.02.05 20:22:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.02.05 20:22:56 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.02.05 20:23:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.30.89.69 MASK 255.255.255.255 192.168.1.1
. 2020.02.05 20:23:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.02.05 20:23:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.35.70.1
. 2020.02.05 20:23:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.02.05 20:23:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.35.70.1
. 2020.02.05 20:23:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.02.05 20:23:01 - OpenVPN > delete_route_ipv6(::/3)
. 2020.02.05 20:23:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=9 fe80::8 store=active
. 2020.02.05 20:23:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.05 20:23:01 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.02.05 20:23:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=9 fe80::8 store=active
. 2020.02.05 20:23:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.05 20:23:01 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.02.05 20:23:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=9 fe80::8 store=active
. 2020.02.05 20:23:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.05 20:23:01 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.02.05 20:23:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=9 fe80::8 store=active
. 2020.02.05 20:23:01 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.05 20:23:02 - OpenVPN > Closing TUN/TAP interface
. 2020.02.05 20:23:02 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1f46::/64)
. 2020.02.05 20:23:02 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1f46::/64 interface=9 fe80::8 store=active
. 2020.02.05 20:23:02 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:1f46::1070 store=active
. 2020.02.05 20:23:02 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all
. 2020.02.05 20:23:02 - OpenVPN > TAP: DHCP address released
. 2020.02.05 20:23:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.02.05 20:23:02 - Connection terminated.
. 2020.02.05 20:23:03 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to 10.19.12.1)
. 2020.02.05 20:23:03 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic)
. 2020.02.05 20:23:03 - DNS leak protection with packet filtering disabled.
. 2020.02.05 20:23:03 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2020.02.05 20:23:03 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
I 2020.02.05 20:23:06 - Checking authorization ...
! 2020.02.05 20:23:06 - Connecting to Telescopium (Canada, Vancouver)
. 2020.02.05 20:23:06 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.02.05 20:23:06 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.02.05 20:23:06 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.02.05 20:23:06 - Connection to OpenVPN Management Interface
. 2020.02.05 20:23:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.02.05 20:23:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.02.05 20:23:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.02.05 20:23:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.02.05 20:23:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.02.05 20:23:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:443
. 2020.02.05 20:23:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.02.05 20:23:06 - OpenVPN > UDP link local: (not bound)
. 2020.02.05 20:23:06 - OpenVPN > UDP link remote: [AF_INET]192.30.89.53:443
. 2020.02.05 20:23:06 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.53:443, sid=58b948f6 561f6a22
. 2020.02.05 20:23:07 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.02.05 20:23:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.02.05 20:23:07 - OpenVPN > VERIFY KU OK
. 2020.02.05 20:23:07 - OpenVPN > Validating certificate extended key usage
. 2020.02.05 20:23:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.02.05 20:23:07 - OpenVPN > VERIFY EKU OK
. 2020.02.05 20:23:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org
. 2020.02.05 20:23:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.02.05 20:23:07 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.53:443
. 2020.02.05 20:23:08 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1)
. 2020.02.05 20:23:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.2.1,dhcp-option DNS6 fde6:7a:7d20:f02::1,tun-ipv6,route-gateway 10.19.2.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:f02::1058/64 fde6:7a:7d20:f02::1,ifconfig 10.19.2.90 255.255.255.0,peer-id 15,cipher AES-256-GCM'
. 2020.02.05 20:23:08 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.02.05 20:23:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.02.05 20:23:08 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.02.05 20:23:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.02.05 20:23:08 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.02.05 20:23:08 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.02.05 20:23:08 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.02.05 20:23:08 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.02.05 20:23:08 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.02.05 20:23:08 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.02.05 20:23:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.02.05 20:23:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.02.05 20:23:08 - OpenVPN > interactive service msg_channel=0
. 2020.02.05 20:23:08 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=21 HWADDR=18:31:bf:6c:c5:85
. 2020.02.05 20:23:08 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.02.05 20:23:08 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found.   (code=1168)
. 2020.02.05 20:23:08 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.02.05 20:23:08 - OpenVPN > open_tun
. 2020.02.05 20:23:08 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{49D78DAA-9B0B-4538-AF60-1B02795C0B5B}.tap
. 2020.02.05 20:23:08 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.02.05 20:23:08 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.19.2.0/10.19.2.90/255.255.255.0 [SUCCEEDED]
. 2020.02.05 20:23:08 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.19.2.90/255.255.255.0 on interface {49D78DAA-9B0B-4538-AF60-1B02795C0B5B} [DHCP-serv: 10.19.2.254, lease-time: 31536000]
. 2020.02.05 20:23:08 - OpenVPN > Successful ARP Flush on interface [9] {49D78DAA-9B0B-4538-AF60-1B02795C0B5B}
. 2020.02.05 20:23:08 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.02.05 20:23:09 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=9 fde6:7a:7d20:f02::1058 store=active
. 2020.02.05 20:23:10 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:f02::1 validate=no
. 2020.02.05 20:23:11 - OpenVPN > add_route_ipv6(fde6:7a:7d20:f02::/64 -> fde6:7a:7d20:f02::1058 metric 0) dev Ethernet 2
. 2020.02.05 20:23:11 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:f02::/64 interface=9 fe80::8 store=active
. 2020.02.05 20:23:11 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.05 20:23:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.02.05 20:23:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.30.89.53 MASK 255.255.255.255 192.168.1.1
. 2020.02.05 20:23:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.02.05 20:23:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.02.05 20:23:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.19.2.1
. 2020.02.05 20:23:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.02.05 20:23:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.02.05 20:23:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.19.2.1
. 2020.02.05 20:23:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.02.05 20:23:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.02.05 20:23:16 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:f02::1 metric -1) dev Ethernet 2
. 2020.02.05 20:23:16 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=9 fe80::8 store=active
. 2020.02.05 20:23:16 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.05 20:23:16 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:f02::1 metric -1) dev Ethernet 2
. 2020.02.05 20:23:16 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=9 fe80::8 store=active
. 2020.02.05 20:23:16 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.05 20:23:16 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:f02::1 metric -1) dev Ethernet 2
. 2020.02.05 20:23:16 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=9 fe80::8 store=active
. 2020.02.05 20:23:16 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.05 20:23:16 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:f02::1 metric -1) dev Ethernet 2
. 2020.02.05 20:23:16 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=9 fe80::8 store=active
. 2020.02.05 20:23:16 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.05 20:23:17 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2020.02.05 20:23:17 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2020.02.05 20:23:17 - DNS leak protection with packet filtering enabled.
. 2020.02.05 20:23:17 - DNS IPv4 of a network adapter forced (Ethernet 2, from manual (10.19.12.1) to 10.19.2.1)
. 2020.02.05 20:23:17 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:f02::1)
W 2020.02.05 20:23:17 - Routes, add 192.30.89.51 for gateway 10.19.2.1 failed: 'route' is not recognized as an internal or external command,
W 2020.02.05 20:23:17 -     operable program or batch file
W 2020.02.05 20:23:17 - Routes, add 2606:9580:100:c:8757:8ee:ec9c:991c for gateway fde6:7a:7d20:f02::1 failed: 'netsh' is not recognized as an internal or external command,
W 2020.02.05 20:23:17 -     operable program or batch file
. 2020.02.05 20:23:17 - Flushing DNS
I 2020.02.05 20:23:17 - Checking route IPv4
I 2020.02.05 20:23:18 - Checking route IPv6
I 2020.02.05 20:23:18 - Checking DNS
! 2020.02.05 20:23:20 - Connected.
. 2020.02.05 20:23:20 - OpenVPN > Initialization Sequence Completed

----------------------------
Network Interfaces and Routes:

{
    "support_ipv4": true,
    "support_ipv6": true,
    "routes": [],
    "interfaces": [
        {
            "friendly": "Ethernet 2",
            "id": "{49D78DAA-9B0B-4538-AF60-1B02795C0B5B}",
            "name": "Ethernet 2",
            "description": "TAP-Windows Adapter V9",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "676194218",
            "bytes_sent": "27290846",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fde6:7a:7d20:f02::1058",
                "fe80::2907:7bc9:b352:6f73",
                "10.19.2.90"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "10.19.12.1",
            "dns6": null
        },
        {
            "friendly": "Ethernet",
            "id": "{D7ED2D2E-0008-4377-8107-BC99C4CA3233}",
            "name": "Ethernet",
            "description": "Intel(R) Ethernet Connection (2) I219-V",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "906313205",
            "bytes_sent": "45850927",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::9d6a:7247:359a:8f56",
                "192.168.1.235"
            ],
            "gateways": [
                "192.168.1.1"
            ],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Wi-Fi",
            "id": "{33C74F91-A3F9-4213-B286-AB0C829EED54}",
            "name": "Wi-Fi",
            "description": "Realtek 8822BE Wireless LAN 802.11ac PCI-E NIC",
            "type": "Wireless80211",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::7596:1d8c:2a9f:eedd",
                "169.254.238.221"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Local Area Connection* 1",
            "id": "{CAC75FD4-1AA3-449C-BC0F-5F54BF68D100}",
            "name": "Local Area Connection* 1",
            "description": "Microsoft Wi-Fi Direct Virtual Adapter #3",
            "type": "Wireless80211",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::bc65:296c:a6e1:3dc9",
                "169.254.61.201"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Local Area Connection* 12",
            "id": "{31D63908-A579-4E93-89DA-6DA8FDDE846F}",
            "name": "Local Area Connection* 12",
            "description": "Microsoft Wi-Fi Direct Virtual Adapter #4",
            "type": "Wireless80211",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::f5da:868:16df:fec5",
                "169.254.254.197"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Bluetooth Network Connection",
            "id": "{55B27356-53BD-493E-9F58-5E341EC139EB}",
            "name": "Bluetooth Network Connection",
            "description": "Bluetooth Device (Personal Area Network)",
            "type": "Ethernet",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::41e:410d:fdc3:4b44",
                "169.254.75.68"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Loopback Pseudo-Interface 1",
            "id": "{F24A2B59-FE5D-11E8-956B-806E6F6E6963}",
            "name": "Loopback Pseudo-Interface 1",
            "description": "Software Loopback Interface 1",
            "type": "Loopback",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "::1",
                "127.0.0.1"
            ],
            "gateways": [],
            "bind": true,
            "dns4": null,
            "dns6": null
        }
    ],
    "ipv4-default-gateway": "192.168.1.1",
    "ipv4-default-interface": "{D7ED2D2E-0008-4377-8107-BC99C4CA3233}"
}
----------------------------
ipconfig /all:

'ipconfig' is not recognized as an internal or external command,
operable program or batch file.

Share this post


Link to post
12 hours ago, drybones99 said:

. 2020.02.05 20:22:05 - DNS IPv4 of a network adapter forced (Ethernet 2, from manual (10.19.12.1) to 10.35.70.1)
. 2020.02.05 20:22:05 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:1f46::1)
W 2020.02.05 20:22:05 - Routes, add 192.30.89.67 for gateway 10.35.70.1 failed: 'route' is not recognized as an internal or external command,
W 2020.02.05 20:22:05 -     operable program or batch file
W 2020.02.05 20:22:05 - Routes, add 2606:9580:100:e:d075:a67e:1f9c:139d for gateway fde6:7a:7d20:1f46::1 failed: 'netsh' is not recognized as an internal or external command,
W 2020.02.05 20:22:05 -     operable program or batch file


First, the DNS is manual again, and it's the same IP!
And second.. what the heck are those errors? They seemingly cause nothing to be set in the first place, so a failure seems inevitable. They do work later on in the connection, and, that's the most magical part here, they also work with Telescopium although they fail to be executed! Don't really know what is going on there.

Are you by any chance use anything security-related like firewalls, antivirus? Maybe something that "monitors" the OpenVPN connection?
Do you have another Windows 10 machine where you could test connections?

Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

Something interesting has happened. As a matter of fact, I do have an antivirus, Bitdefender, and when I switched it off, I was able to connect to any server I wanted. I tried turning all of Bitdefender's protections back on except for the Firewall, and it still worked. I turned the firewall back on, and even more surprisingly, it still worked! Somehow, switching the Bitdefender Firewall on and off solved the problem, at least temporarily. If it helps, here are the logs from connecting to three different servers, with Bitdefender Firewall switched off: 

Eddie System/Environment Report - 2/8/2020 4:49 AM UTC

Eddie version: 2.16.3
Eddie OS build: windows_x64
Eddie architecture: x64
OS type: Windows
OS name: Windows 10 Pro
OS version: Microsoft Windows NT 10.0.18363.0
OS architecture: x64
Mono /.Net Framework: v4.0.30319
OpenVPN driver: TAP-Windows Adapter V9, version 9.21.2
OpenVPN: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
Profile path: C:\Users\aidancaamano\AppData\Local\AirVPN\default.xml
Data path: C:\Users\aidancaamano\AppData\Local\AirVPN
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\Eddie-UI.exe
Command line arguments: (1 args) path="home"
Network Lock Active: Yes, Windows Filtering Platform
Connected to VPN: Yes, Alwaid
Detected DNS: 10.8.150.1, 192.168.1.1, fde6:7a:7d20:496::1
Test DNS IPv4: Ok
Test DNS IPv6: Ok
Test Ping IPv4: 118 ms
Test Ping IPv6: 153 ms
Test HTTP IPv4: Ok
Test HTTP IPv6: Ok
Test HTTPS: Ok
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
advanced.expert: True

----------------------------
Logs:

. 2020.02.07 20:47:38 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.18363.0, Mono/.Net: v4.0.30319
. 2020.02.07 20:47:38 - Reading options from C:\Users\aidancaamano\AppData\Local\AirVPN\default.xml
. 2020.02.07 20:47:38 - Command line arguments (1): path="home"
. 2020.02.07 20:47:38 - Profile path: C:\Users\aidancaamano\AppData\Local\AirVPN\default.xml
. 2020.02.07 20:47:39 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
. 2020.02.07 20:47:39 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2020.02.07 20:47:39 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2020.02.07 20:47:39 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2020.02.07 20:47:39 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
. 2020.02.07 20:47:39 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem
. 2020.02.07 20:47:40 - Updating systems & servers data ...
I 2020.02.07 20:47:40 - Ready
. 2020.02.07 20:47:41 - Systems & servers data update completed
! 2020.02.07 20:47:42 - Activation of Network Lock - Windows Filtering Platform
I 2020.02.07 20:47:45 - Session starting.
I 2020.02.07 20:47:45 - Checking authorization ...
! 2020.02.07 20:47:46 - Connecting to Sham (Canada, Vancouver)
. 2020.02.07 20:47:46 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.02.07 20:47:46 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.02.07 20:47:46 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.02.07 20:47:46 - Connection to OpenVPN Management Interface
. 2020.02.07 20:47:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.02.07 20:47:46 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.02.07 20:47:46 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.02.07 20:47:46 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.02.07 20:47:46 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.02.07 20:47:46 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.77:443
. 2020.02.07 20:47:46 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.02.07 20:47:46 - OpenVPN > UDP link local: (not bound)
. 2020.02.07 20:47:46 - OpenVPN > UDP link remote: [AF_INET]192.30.89.77:443
. 2020.02.07 20:47:46 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.77:443, sid=218b8771 40783aa6
. 2020.02.07 20:47:46 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.02.07 20:47:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.02.07 20:47:46 - OpenVPN > VERIFY KU OK
. 2020.02.07 20:47:46 - OpenVPN > Validating certificate extended key usage
. 2020.02.07 20:47:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.02.07 20:47:46 - OpenVPN > VERIFY EKU OK
. 2020.02.07 20:47:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sham, emailAddress=info@airvpn.org
. 2020.02.07 20:47:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.02.07 20:47:46 - OpenVPN > [Sham] Peer Connection Initiated with [AF_INET]192.30.89.77:443
. 2020.02.07 20:47:48 - OpenVPN > SENT CONTROL [Sham]: 'PUSH_REQUEST' (status=1)
. 2020.02.07 20:47:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.35.102.1,dhcp-option DNS6 fde6:7a:7d20:1f66::1,tun-ipv6,route-gateway 10.35.102.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1f66::1094/64 fde6:7a:7d20:1f66::1,ifconfig 10.35.102.150 255.255.255.0,peer-id 3,cipher AES-256-GCM'
. 2020.02.07 20:47:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.02.07 20:47:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.02.07 20:47:48 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.02.07 20:47:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.02.07 20:47:48 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.02.07 20:47:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.02.07 20:47:48 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.02.07 20:47:48 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.02.07 20:47:48 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.02.07 20:47:48 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.02.07 20:47:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.02.07 20:47:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.02.07 20:47:48 - OpenVPN > interactive service msg_channel=0
. 2020.02.07 20:47:48 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=21 HWADDR=18:31:bf:6c:c5:85
. 2020.02.07 20:47:48 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.02.07 20:47:48 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found.   (code=1168)
. 2020.02.07 20:47:48 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.02.07 20:47:48 - OpenVPN > open_tun
. 2020.02.07 20:47:48 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{49D78DAA-9B0B-4538-AF60-1B02795C0B5B}.tap
. 2020.02.07 20:47:48 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.02.07 20:47:48 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.35.102.0/10.35.102.150/255.255.255.0 [SUCCEEDED]
. 2020.02.07 20:47:48 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.35.102.150/255.255.255.0 on interface {49D78DAA-9B0B-4538-AF60-1B02795C0B5B} [DHCP-serv: 10.35.102.254, lease-time: 31536000]
. 2020.02.07 20:47:48 - OpenVPN > Successful ARP Flush on interface [9] {49D78DAA-9B0B-4538-AF60-1B02795C0B5B}
. 2020.02.07 20:47:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.02.07 20:47:49 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=9 fde6:7a:7d20:1f66::1094 store=active
. 2020.02.07 20:47:50 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:1f66::1 validate=no
. 2020.02.07 20:47:50 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1f66::/64 -> fde6:7a:7d20:1f66::1094 metric 0) dev Ethernet 2
. 2020.02.07 20:47:50 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1f66::/64 interface=9 fe80::8 store=active
. 2020.02.07 20:47:50 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:47:55 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.02.07 20:47:55 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.30.89.77 MASK 255.255.255.255 192.168.1.1
. 2020.02.07 20:47:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.02.07 20:47:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.02.07 20:47:55 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.35.102.1
. 2020.02.07 20:47:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.02.07 20:47:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.02.07 20:47:55 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.35.102.1
. 2020.02.07 20:47:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.02.07 20:47:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.02.07 20:47:55 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1f66::1 metric -1) dev Ethernet 2
. 2020.02.07 20:47:55 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=9 fe80::8 store=active
. 2020.02.07 20:47:55 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:47:55 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1f66::1 metric -1) dev Ethernet 2
. 2020.02.07 20:47:55 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=9 fe80::8 store=active
. 2020.02.07 20:47:55 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:47:55 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1f66::1 metric -1) dev Ethernet 2
. 2020.02.07 20:47:55 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=9 fe80::8 store=active
. 2020.02.07 20:47:55 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:47:55 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1f66::1 metric -1) dev Ethernet 2
. 2020.02.07 20:47:55 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=9 fe80::8 store=active
. 2020.02.07 20:47:55 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:47:55 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2020.02.07 20:47:55 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2020.02.07 20:47:55 - DNS leak protection with packet filtering enabled.
. 2020.02.07 20:47:55 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.35.102.1)
. 2020.02.07 20:47:55 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:1f66::1)
W 2020.02.07 20:47:56 - Routes, add 192.30.89.75 for gateway 10.35.102.1 failed: 'route' is not recognized as an internal or external command,
W 2020.02.07 20:47:56 -     operable program or batch file
W 2020.02.07 20:47:56 - Routes, add 2606:9580:100:f:5792:2dec:a4b6:2419 for gateway fde6:7a:7d20:1f66::1 failed: 'netsh' is not recognized as an internal or external command,
W 2020.02.07 20:47:56 -     operable program or batch file
. 2020.02.07 20:47:56 - Flushing DNS
I 2020.02.07 20:47:56 - Checking route IPv4
I 2020.02.07 20:47:56 - Checking route IPv6
I 2020.02.07 20:47:57 - Checking DNS
! 2020.02.07 20:47:58 - Connected.
. 2020.02.07 20:47:58 - OpenVPN > Initialization Sequence Completed
! 2020.02.07 20:48:03 - Disconnecting
. 2020.02.07 20:48:03 - Sending management termination signal
. 2020.02.07 20:48:03 - Management - Send 'signal SIGTERM'
. 2020.02.07 20:48:03 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.02.07 20:48:03 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.02.07 20:48:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.30.89.77 MASK 255.255.255.255 192.168.1.1
. 2020.02.07 20:48:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.02.07 20:48:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.35.102.1
. 2020.02.07 20:48:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.02.07 20:48:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.35.102.1
. 2020.02.07 20:48:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.02.07 20:48:08 - OpenVPN > delete_route_ipv6(::/3)
. 2020.02.07 20:48:08 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=9 fe80::8 store=active
. 2020.02.07 20:48:08 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:48:08 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.02.07 20:48:08 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=9 fe80::8 store=active
. 2020.02.07 20:48:08 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:48:08 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.02.07 20:48:08 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=9 fe80::8 store=active
. 2020.02.07 20:48:08 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:48:08 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.02.07 20:48:08 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=9 fe80::8 store=active
. 2020.02.07 20:48:08 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:48:08 - OpenVPN > Closing TUN/TAP interface
. 2020.02.07 20:48:08 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1f66::/64)
. 2020.02.07 20:48:08 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1f66::/64 interface=9 fe80::8 store=active
. 2020.02.07 20:48:08 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:1f66::1094 store=active
. 2020.02.07 20:48:09 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all
. 2020.02.07 20:48:09 - OpenVPN > TAP: DHCP address released
. 2020.02.07 20:48:09 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.02.07 20:48:09 - Connection terminated.
. 2020.02.07 20:48:09 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic)
. 2020.02.07 20:48:09 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic)
. 2020.02.07 20:48:09 - DNS leak protection with packet filtering disabled.
. 2020.02.07 20:48:09 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2020.02.07 20:48:09 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
I 2020.02.07 20:48:09 - Checking authorization ...
! 2020.02.07 20:48:09 - Connecting to Nahn (Canada, Vancouver)
. 2020.02.07 20:48:10 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.02.07 20:48:10 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.02.07 20:48:10 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.02.07 20:48:10 - Connection to OpenVPN Management Interface
. 2020.02.07 20:48:10 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.02.07 20:48:10 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.02.07 20:48:10 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.02.07 20:48:10 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.02.07 20:48:10 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.02.07 20:48:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.69:443
. 2020.02.07 20:48:10 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.02.07 20:48:10 - OpenVPN > UDP link local: (not bound)
. 2020.02.07 20:48:10 - OpenVPN > UDP link remote: [AF_INET]192.30.89.69:443
. 2020.02.07 20:48:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.02.07 20:48:10 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.69:443, sid=2ee8d7c9 7642e706
. 2020.02.07 20:48:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.02.07 20:48:10 - OpenVPN > VERIFY KU OK
. 2020.02.07 20:48:10 - OpenVPN > Validating certificate extended key usage
. 2020.02.07 20:48:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.02.07 20:48:10 - OpenVPN > VERIFY EKU OK
. 2020.02.07 20:48:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nahn, emailAddress=info@airvpn.org
. 2020.02.07 20:48:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.02.07 20:48:10 - OpenVPN > [Nahn] Peer Connection Initiated with [AF_INET]192.30.89.69:443
. 2020.02.07 20:48:11 - OpenVPN > SENT CONTROL [Nahn]: 'PUSH_REQUEST' (status=1)
. 2020.02.07 20:48:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.35.70.1,dhcp-option DNS6 fde6:7a:7d20:1f46::1,tun-ipv6,route-gateway 10.35.70.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1f46::1070/64 fde6:7a:7d20:1f46::1,ifconfig 10.35.70.114 255.255.255.0,peer-id 10,cipher AES-256-GCM'
. 2020.02.07 20:48:11 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.02.07 20:48:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.02.07 20:48:11 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.02.07 20:48:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.02.07 20:48:11 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.02.07 20:48:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.02.07 20:48:11 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.02.07 20:48:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.02.07 20:48:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.02.07 20:48:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.02.07 20:48:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.02.07 20:48:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.02.07 20:48:11 - OpenVPN > interactive service msg_channel=0
. 2020.02.07 20:48:11 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=21 HWADDR=18:31:bf:6c:c5:85
. 2020.02.07 20:48:11 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.02.07 20:48:11 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found.   (code=1168)
. 2020.02.07 20:48:11 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.02.07 20:48:11 - OpenVPN > open_tun
. 2020.02.07 20:48:11 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{49D78DAA-9B0B-4538-AF60-1B02795C0B5B}.tap
. 2020.02.07 20:48:11 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.02.07 20:48:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.35.70.0/10.35.70.114/255.255.255.0 [SUCCEEDED]
. 2020.02.07 20:48:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.35.70.114/255.255.255.0 on interface {49D78DAA-9B0B-4538-AF60-1B02795C0B5B} [DHCP-serv: 10.35.70.254, lease-time: 31536000]
. 2020.02.07 20:48:11 - OpenVPN > Successful ARP Flush on interface [9] {49D78DAA-9B0B-4538-AF60-1B02795C0B5B}
. 2020.02.07 20:48:11 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.02.07 20:48:12 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=9 fde6:7a:7d20:1f46::1070 store=active
. 2020.02.07 20:48:13 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:1f46::1 validate=no
. 2020.02.07 20:48:13 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1f46::/64 -> fde6:7a:7d20:1f46::1070 metric 0) dev Ethernet 2
. 2020.02.07 20:48:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1f46::/64 interface=9 fe80::8 store=active
. 2020.02.07 20:48:13 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:48:18 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.02.07 20:48:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.30.89.69 MASK 255.255.255.255 192.168.1.1
. 2020.02.07 20:48:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.02.07 20:48:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.02.07 20:48:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.35.70.1
. 2020.02.07 20:48:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.02.07 20:48:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.02.07 20:48:18 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.35.70.1
. 2020.02.07 20:48:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.02.07 20:48:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.02.07 20:48:18 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1f46::1 metric -1) dev Ethernet 2
. 2020.02.07 20:48:18 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=9 fe80::8 store=active
. 2020.02.07 20:48:18 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:48:18 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1f46::1 metric -1) dev Ethernet 2
. 2020.02.07 20:48:18 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=9 fe80::8 store=active
. 2020.02.07 20:48:18 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:48:18 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1f46::1 metric -1) dev Ethernet 2
. 2020.02.07 20:48:18 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=9 fe80::8 store=active
. 2020.02.07 20:48:18 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:48:18 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1f46::1 metric -1) dev Ethernet 2
. 2020.02.07 20:48:18 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=9 fe80::8 store=active
. 2020.02.07 20:48:18 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:48:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2020.02.07 20:48:18 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2020.02.07 20:48:18 - DNS leak protection with packet filtering enabled.
. 2020.02.07 20:48:18 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.35.70.1)
. 2020.02.07 20:48:18 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:1f46::1)
W 2020.02.07 20:48:19 - Routes, add 192.30.89.67 for gateway 10.35.70.1 failed: 'route' is not recognized as an internal or external command,
W 2020.02.07 20:48:19 -     operable program or batch file
W 2020.02.07 20:48:19 - Routes, add 2606:9580:100:e:d075:a67e:1f9c:139d for gateway fde6:7a:7d20:1f46::1 failed: 'netsh' is not recognized as an internal or external command,
W 2020.02.07 20:48:19 -     operable program or batch file
. 2020.02.07 20:48:19 - Flushing DNS
I 2020.02.07 20:48:19 - Checking route IPv4
I 2020.02.07 20:48:27 - Checking route IPv6
I 2020.02.07 20:48:28 - Checking DNS
! 2020.02.07 20:48:30 - Connected.
. 2020.02.07 20:48:30 - OpenVPN > Initialization Sequence Completed
! 2020.02.07 20:48:37 - Disconnecting
. 2020.02.07 20:48:37 - Sending management termination signal
. 2020.02.07 20:48:37 - Management - Send 'signal SIGTERM'
. 2020.02.07 20:48:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2020.02.07 20:48:37 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.02.07 20:48:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.30.89.69 MASK 255.255.255.255 192.168.1.1
. 2020.02.07 20:48:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.02.07 20:48:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.35.70.1
. 2020.02.07 20:48:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.02.07 20:48:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.35.70.1
. 2020.02.07 20:48:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.02.07 20:48:42 - OpenVPN > delete_route_ipv6(::/3)
. 2020.02.07 20:48:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=9 fe80::8 store=active
. 2020.02.07 20:48:42 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:48:42 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.02.07 20:48:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=9 fe80::8 store=active
. 2020.02.07 20:48:42 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:48:42 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.02.07 20:48:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=9 fe80::8 store=active
. 2020.02.07 20:48:42 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:48:42 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.02.07 20:48:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=9 fe80::8 store=active
. 2020.02.07 20:48:42 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:48:42 - OpenVPN > Closing TUN/TAP interface
. 2020.02.07 20:48:42 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1f46::/64)
. 2020.02.07 20:48:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1f46::/64 interface=9 fe80::8 store=active
. 2020.02.07 20:48:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:1f46::1070 store=active
. 2020.02.07 20:48:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all
. 2020.02.07 20:48:43 - OpenVPN > TAP: DHCP address released
. 2020.02.07 20:48:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.02.07 20:48:43 - Connection terminated.
. 2020.02.07 20:48:43 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic)
. 2020.02.07 20:48:43 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic)
. 2020.02.07 20:48:43 - DNS leak protection with packet filtering disabled.
. 2020.02.07 20:48:43 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2020.02.07 20:48:43 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
I 2020.02.07 20:48:43 - Checking authorization ...
! 2020.02.07 20:48:44 - Connecting to Alwaid (Canada, Toronto, Ontario)
. 2020.02.07 20:48:44 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2020.02.07 20:48:44 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.02.07 20:48:44 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2020.02.07 20:48:44 - Connection to OpenVPN Management Interface
. 2020.02.07 20:48:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2020.02.07 20:48:44 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.02.07 20:48:44 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.02.07 20:48:44 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.02.07 20:48:44 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.02.07 20:48:44 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.117:443
. 2020.02.07 20:48:44 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.02.07 20:48:44 - OpenVPN > UDP link local: (not bound)
. 2020.02.07 20:48:44 - OpenVPN > UDP link remote: [AF_INET]184.75.221.117:443
. 2020.02.07 20:48:44 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2020.02.07 20:48:44 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.117:443, sid=f5c45d32 c0413a50
. 2020.02.07 20:48:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.02.07 20:48:44 - OpenVPN > VERIFY KU OK
. 2020.02.07 20:48:44 - OpenVPN > Validating certificate extended key usage
. 2020.02.07 20:48:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.02.07 20:48:44 - OpenVPN > VERIFY EKU OK
. 2020.02.07 20:48:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org
. 2020.02.07 20:48:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.02.07 20:48:44 - OpenVPN > [Alwaid] Peer Connection Initiated with [AF_INET]184.75.221.117:443
. 2020.02.07 20:48:45 - OpenVPN > SENT CONTROL [Alwaid]: 'PUSH_REQUEST' (status=1)
. 2020.02.07 20:48:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.150.1,dhcp-option DNS6 fde6:7a:7d20:496::1,tun-ipv6,route-gateway 10.8.150.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:496::1022/64 fde6:7a:7d20:496::1,ifconfig 10.8.150.36 255.255.255.0,peer-id 5,cipher AES-256-GCM'
. 2020.02.07 20:48:46 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.02.07 20:48:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.02.07 20:48:46 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.02.07 20:48:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.02.07 20:48:46 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.02.07 20:48:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.02.07 20:48:46 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.02.07 20:48:46 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.02.07 20:48:46 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.02.07 20:48:46 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.02.07 20:48:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.02.07 20:48:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.02.07 20:48:46 - OpenVPN > interactive service msg_channel=0
. 2020.02.07 20:48:46 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=21 HWADDR=18:31:bf:6c:c5:85
. 2020.02.07 20:48:46 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.02.07 20:48:46 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found.   (code=1168)
. 2020.02.07 20:48:46 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.02.07 20:48:46 - OpenVPN > open_tun
. 2020.02.07 20:48:46 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{49D78DAA-9B0B-4538-AF60-1B02795C0B5B}.tap
. 2020.02.07 20:48:46 - OpenVPN > TAP-Windows Driver Version 9.21
. 2020.02.07 20:48:46 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.150.0/10.8.150.36/255.255.255.0 [SUCCEEDED]
. 2020.02.07 20:48:46 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.150.36/255.255.255.0 on interface {49D78DAA-9B0B-4538-AF60-1B02795C0B5B} [DHCP-serv: 10.8.150.254, lease-time: 31536000]
. 2020.02.07 20:48:46 - OpenVPN > Successful ARP Flush on interface [9] {49D78DAA-9B0B-4538-AF60-1B02795C0B5B}
. 2020.02.07 20:48:46 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2020.02.07 20:48:47 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=9 fde6:7a:7d20:496::1022 store=active
. 2020.02.07 20:48:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:496::1 validate=no
. 2020.02.07 20:48:48 - OpenVPN > add_route_ipv6(fde6:7a:7d20:496::/64 -> fde6:7a:7d20:496::1022 metric 0) dev Ethernet 2
. 2020.02.07 20:48:48 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:496::/64 interface=9 fe80::8 store=active
. 2020.02.07 20:48:48 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:48:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.02.07 20:48:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.117 MASK 255.255.255.255 192.168.1.1
. 2020.02.07 20:48:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.02.07 20:48:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.02.07 20:48:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.150.1
. 2020.02.07 20:48:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.02.07 20:48:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.02.07 20:48:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.150.1
. 2020.02.07 20:48:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.02.07 20:48:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.02.07 20:48:53 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:496::1 metric -1) dev Ethernet 2
. 2020.02.07 20:48:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=9 fe80::8 store=active
. 2020.02.07 20:48:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:48:53 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:496::1 metric -1) dev Ethernet 2
. 2020.02.07 20:48:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=9 fe80::8 store=active
. 2020.02.07 20:48:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:48:53 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:496::1 metric -1) dev Ethernet 2
. 2020.02.07 20:48:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=9 fe80::8 store=active
. 2020.02.07 20:48:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:48:53 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:496::1 metric -1) dev Ethernet 2
. 2020.02.07 20:48:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=9 fe80::8 store=active
. 2020.02.07 20:48:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.02.07 20:48:53 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2020.02.07 20:48:53 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2020.02.07 20:48:53 - DNS leak protection with packet filtering enabled.
. 2020.02.07 20:48:53 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.8.150.1)
. 2020.02.07 20:48:53 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to fde6:7a:7d20:496::1)
W 2020.02.07 20:48:53 - Routes, add 184.75.221.115 for gateway 10.8.150.1 failed: 'route' is not recognized as an internal or external command,
W 2020.02.07 20:48:53 -     operable program or batch file
W 2020.02.07 20:48:53 - Routes, add 2606:6080:1001:11:60bc:461c:1305:bb4b for gateway fde6:7a:7d20:496::1 failed: 'netsh' is not recognized as an internal or external command,
W 2020.02.07 20:48:53 -     operable program or batch file
. 2020.02.07 20:48:53 - Flushing DNS
I 2020.02.07 20:48:54 - Checking route IPv4
I 2020.02.07 20:49:02 - Checking route IPv6
I 2020.02.07 20:49:11 - Checking DNS
! 2020.02.07 20:49:12 - Connected.
. 2020.02.07 20:49:12 - OpenVPN > Initialization Sequence Completed

----------------------------
Network Interfaces and Routes:

{
    "support_ipv4": true,
    "support_ipv6": true,
    "routes": [],
    "interfaces": [
        {
            "friendly": "Ethernet 2",
            "id": "{49D78DAA-9B0B-4538-AF60-1B02795C0B5B}",
            "name": "Ethernet 2",
            "description": "TAP-Windows Adapter V9",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "5857876230",
            "bytes_sent": "263837769",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fde6:7a:7d20:496::1022",
                "fe80::2907:7bc9:b352:6f73",
                "10.8.150.36"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Ethernet",
            "id": "{D7ED2D2E-0008-4377-8107-BC99C4CA3233}",
            "name": "Ethernet",
            "description": "Intel(R) Ethernet Connection (2) I219-V",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "6504661411",
            "bytes_sent": "374829806",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::9d6a:7247:359a:8f56",
                "192.168.1.235"
            ],
            "gateways": [
                "192.168.1.1"
            ],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Wi-Fi",
            "id": "{33C74F91-A3F9-4213-B286-AB0C829EED54}",
            "name": "Wi-Fi",
            "description": "Realtek 8822BE Wireless LAN 802.11ac PCI-E NIC",
            "type": "Wireless80211",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::7596:1d8c:2a9f:eedd",
                "169.254.238.221"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Local Area Connection* 1",
            "id": "{CAC75FD4-1AA3-449C-BC0F-5F54BF68D100}",
            "name": "Local Area Connection* 1",
            "description": "Microsoft Wi-Fi Direct Virtual Adapter #3",
            "type": "Wireless80211",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::bc65:296c:a6e1:3dc9",
                "169.254.61.201"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Local Area Connection* 12",
            "id": "{31D63908-A579-4E93-89DA-6DA8FDDE846F}",
            "name": "Local Area Connection* 12",
            "description": "Microsoft Wi-Fi Direct Virtual Adapter #4",
            "type": "Wireless80211",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::f5da:868:16df:fec5",
                "169.254.254.197"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Bluetooth Network Connection",
            "id": "{55B27356-53BD-493E-9F58-5E341EC139EB}",
            "name": "Bluetooth Network Connection",
            "description": "Bluetooth Device (Personal Area Network)",
            "type": "Ethernet",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::41e:410d:fdc3:4b44",
                "169.254.75.68"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Loopback Pseudo-Interface 1",
            "id": "{F24A2B59-FE5D-11E8-956B-806E6F6E6963}",
            "name": "Loopback Pseudo-Interface 1",
            "description": "Software Loopback Interface 1",
            "type": "Loopback",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "::1",
                "127.0.0.1"
            ],
            "gateways": [],
            "bind": true,
            "dns4": null,
            "dns6": null
        }
    ],
    "ipv4-default-gateway": "192.168.1.1",
    "ipv4-default-interface": "{D7ED2D2E-0008-4377-8107-BC99C4CA3233}"
}
----------------------------
ipconfig /all:

'ipconfig' is not recognized as an internal or external command,
operable program or batch file.

Share this post


Link to post

Let us know if it stops working again.


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

Alright, I will. I think what caused it to suddenly stop working again before was a computer restart that I had done in order to complete a Windows update. Before that, I may have turned some of Bitdefender's settings on and off again. Restarting the computer might have put it back into a state where the VPN doesn't work properly anymore, unless I turn Bitdefender Firewall on and off.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...