deadalus   0 Posted ... Hello, I 've been using airVPN for a bit over a year now, read a couple of guides and have had qbittorrent successfully running with a forwarded port, until today 😕 (This might have started earlier, I haven't tried to download anything in a few weeks) -All my torrents were showing 0/0 seeds/leechers, even though I m pretty sure they have a few thousands. - Double checked airVPN port and qbittorrrent port, nothing was changed. - Tried different servers, tried using a few new ports, no luck Am I the only one with this problem, or could it be related somehow with the current situation in central Europe? Thanks! Quote Share this post Link to post
OpenSourcerer   1441 Posted ... Try forwarding a new random port and use that, then. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
deadalus   0 Posted ... Yeah as I said, I already tried a few different ports on different servers -> both on canyouseeme and on airvpn/ports they still appear blocked 😕 Quote Share this post Link to post
SurprisedItWorks   49 Posted ... FWIW, port forwarding is working fine for me (US server), and my port-forwarding setup hasn't changed in at least a month. Quote Share this post Link to post
OpenSourcerer   1441 Posted ... Appear blocked as in actively rejected or a timeout? Is there a firewall you are using? What's your client and version? OS? Actually, some logs would be nice. If you're using Eddie, paste a support file instead (Logs > Lifebelt icon). Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
deadalus   0 Posted ... Sure, here! (I did some minor editing of IPs/MAC, let me know if you need anything explicitly from the original file)logClean.txt  logClean.txt Quote Share this post Link to post
OpenSourcerer   1441 Posted ... Eddie version: 2.13.6 First of all: Please update Eddie. At least to 2.16.3, but the 2.18 beta fixes a multitude of errors of 2.16.3 as well. I'm even surprised you can still connect with 2.13. When you do this, you can paste another support file here because the amount of info changed greatly. It's more informative in current stable/beta.  ! 2020.03.22 23:30:36 - Activation of Network Lock - Windows Filtering Platform Do you experience the same if NetLock is off? Does it also happen if you use vanilla OpenVPN? I'd also like to remark that using Google Public DNS is a bad practice since they log pretty much everything. Try OpenNIC Project instead. And about the IP/MAC things you changed, the Windows interface IDs are useless for the public, private IPv4 addresses cannot be routed by the public as well, but the MAC and certain v6 addresses were rightly hidden. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
deadalus   0 Posted ... Hey, Sorry for the delay! I guess I got really used to everything auto-updating nowadays 😅 Still happens with the new version. Here's the new file! - It still happens with network lock off unfortunately. - By vanilla OpenVPN you mean using the default openVPN app to connect? (never tried that before) - Note: I recently was doing testing an App's functionality while being offline, so I disabled/re-enabled my ethernet adapter to simulate it. Could that be related? Thanks for the support!log2.txt Quote Share this post Link to post
OpenSourcerer   1441 Posted ... Logs seem to be okay.  40 minutes ago, deadalus said: - By vanilla OpenVPN you mean using the default openVPN app to connect? (never tried that before) Yes.  40 minutes ago, deadalus said: - Note: I recently was doing testing an App's functionality while being offline, so I disabled/re-enabled my ethernet adapter to simulate it. Could that be related? Were you connected at that time? In this case it should normalize itself after a reconnect.  On 3/22/2020 at 7:58 PM, giganerd said: Appear blocked as in actively rejected or a timeout? Is there a firewall you are using? Can you answer this, please? Let's extend this question to security software like Kaspersky and firewalls. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
deadalus   0 Posted ... Quote Appear blocked as in actively rejected or a timeout? I am just running the port test in the client Area/Forwarded ports with it reporting Checking port 20157 for internal IP 10.31.26.68 completed.   and the ports being grey like this And Canyouseeme reports a timeout , same as yougetsignal.com/tools/open-ports I am not using any firewalls besides the typical windows defender stuff. Connection set as private network and I even tried with Firewall off, still timed out on ports. ISP is Vodafone in Germany for what it's worth.  Quote Share this post Link to post
OpenSourcerer   1441 Posted ... I think I'm asking superfluously, but when you run these checks, is the software running as well? Is it listening on all interfaces/IP addresses or at least on the 10.x / TAP one? In a privileged cmd/powershell, when you're connected and the software is supposed to be reachable, can you please run netstat -a -o -n?  1 hour ago, deadalus said: ISP is Vodafone in Germany for what it's worth. That doesn't matter much. I had Vodafone Kabel DE and nothing like this ever happened. I'm being more and more sure that it's a local problem, but I got to admit that I'm slowly running out of ideas. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
deadalus   0 Posted ...  Proto  Local Address      Foreign Address     State      PID  TCP   0.0.0.0:135       0.0.0.0:0        LISTENING    988  TCP   0.0.0.0:445       0.0.0.0:0        LISTENING    4  TCP   0.0.0.0:5040      0.0.0.0:0        LISTENING    7240  TCP   0.0.0.0:5357      0.0.0.0:0        LISTENING    4  TCP   0.0.0.0:7680      0.0.0.0:0        LISTENING    3436  TCP   0.0.0.0:27036      0.0.0.0:0        LISTENING    13252  TCP   0.0.0.0:49664      0.0.0.0:0        LISTENING    576  TCP   0.0.0.0:49665      0.0.0.0:0        LISTENING    1508  TCP   0.0.0.0:49666      0.0.0.0:0        LISTENING    1320  TCP   0.0.0.0:49667      0.0.0.0:0        LISTENING    2368  TCP   0.0.0.0:49668      0.0.0.0:0        LISTENING    3644  TCP   0.0.0.0:49669      0.0.0.0:0        LISTENING    648  TCP   0.0.0.0:49687      0.0.0.0:0        LISTENING    668  TCP   10.34.154.56:139    0.0.0.0:0        LISTENING    4  TCP   10.34.154.56:7688    52.114.89.91:443    TIME_WAIT    0  TCP   10.34.154.56:10874   52.114.89.91:443    TIME_WAIT    0  TCP   10.34.154.56:22586   52.114.89.91:443    TIME_WAIT    0  TCP   10.34.154.56:35013   52.114.89.91:443    TIME_WAIT    0  TCP   10.34.154.56:38917   52.114.89.91:443    TIME_WAIT    0  TCP   10.34.154.56:44172   52.114.89.91:443    TIME_WAIT    0  TCP   10.34.154.56:50009   52.114.89.164:443    TIME_WAIT    0  TCP   10.34.154.56:50019   52.114.89.164:443    TIME_WAIT    0  TCP   10.34.154.56:50028   52.114.89.173:443    TIME_WAIT    0  TCP   10.34.154.56:50038   52.114.89.173:443    TIME_WAIT    0  TCP   10.34.154.56:50040   52.114.89.165:443    TIME_WAIT    0  TCP   10.34.154.56:50043   52.114.89.165:443    TIME_WAIT    0  TCP   10.34.154.56:50045   52.114.89.168:443    TIME_WAIT    0  TCP   10.34.154.56:50046   52.114.89.168:443    TIME_WAIT    0  TCP   10.34.154.56:50934   52.114.77.7:443     ESTABLISHED   12628  TCP   10.34.154.56:50935   52.113.194.132:443   ESTABLISHED   11972  TCP   10.34.154.56:50936   216.58.208.110:443   ESTABLISHED   11276  TCP   10.34.154.56:50938   216.58.208.110:443   TIME_WAIT    0  TCP   10.34.154.56:50939   172.217.17.46:443    ESTABLISHED   11276  TCP   10.34.154.56:50940   157.240.201.24:443   ESTABLISHED   6600  TCP   10.34.154.56:50943   134.19.179.187:89    TIME_WAIT    0  TCP   10.34.154.56:50948   52.114.89.91:443    TIME_WAIT    0  TCP   10.34.154.56:50952   157.240.201.50:443   ESTABLISHED   6600  TCP   10.34.154.56:50953   51.140.157.153:443   ESTABLISHED   11972  TCP   10.34.154.56:50954   108.177.119.188:443   ESTABLISHED   11276  TCP   10.34.154.56:50961   52.114.75.38:443    ESTABLISHED   12628  TCP   10.34.154.56:50969   52.114.74.89:443    ESTABLISHED   11972  TCP   10.34.154.56:50972   5.196.64.52:443     ESTABLISHED   11276  TCP   10.34.154.56:50974   23.196.233.47:443    ESTABLISHED   13904  TCP   10.34.154.56:50975   13.107.21.200:443    TIME_WAIT    0  TCP   10.34.154.56:50976   13.107.21.200:443    TIME_WAIT    0  TCP   10.34.154.56:50977   13.107.18.11:443    TIME_WAIT    0  TCP   10.34.154.56:50978   13.107.21.200:443    ESTABLISHED   8812  TCP   10.34.154.56:50979   13.107.18.254:443    ESTABLISHED   8812  TCP   10.34.154.56:50980   13.107.246.10:443    ESTABLISHED   8812  TCP   10.34.154.56:50981   152.199.19.161:443   ESTABLISHED   8812  TCP   10.34.154.56:50982   204.79.197.222:443   ESTABLISHED   8812  TCP   10.34.154.56:50983   77.79.249.112:443    ESTABLISHED   13904  TCP   10.34.154.56:50984   193.59.178.227:443   ESTABLISHED   13904  TCP   10.34.154.56:50985   193.59.178.227:443   ESTABLISHED   13904  TCP   10.34.154.56:50986   95.101.78.112:443    ESTABLISHED   11972  TCP   10.34.154.56:50990   52.114.76.13:443    ESTABLISHED   11972  TCP   10.34.154.56:50991   77.79.249.112:443    ESTABLISHED   13904  TCP   10.34.154.56:50992   52.114.74.2:443     ESTABLISHED   11972  TCP   10.34.154.56:50997   52.113.194.132:443   ESTABLISHED   12628  TCP   10.34.154.56:50998   52.114.88.28:443    ESTABLISHED   12628  TCP   10.34.154.56:59683   52.114.89.91:443    TIME_WAIT    0  TCP   127.0.0.1:3100     0.0.0.0:0        LISTENING    9864  TCP   127.0.0.1:3100     127.0.0.1:50928     ESTABLISHED   9864  TCP   127.0.0.1:5939     0.0.0.0:0        LISTENING    4496  TCP   127.0.0.1:9977     0.0.0.0:0        LISTENING    14116  TCP   127.0.0.1:9977     127.0.0.1:49873     ESTABLISHED   14116  TCP   127.0.0.1:27060     0.0.0.0:0        LISTENING    13252  TCP   127.0.0.1:49725     127.0.0.1:49726     ESTABLISHED   6600  TCP   127.0.0.1:49726     127.0.0.1:49725     ESTABLISHED   6600  TCP   127.0.0.1:49730     127.0.0.1:49731     ESTABLISHED   6600  TCP   127.0.0.1:49731     127.0.0.1:49730     ESTABLISHED   6600  TCP   127.0.0.1:49733     127.0.0.1:65001     ESTABLISHED   4296  TCP   127.0.0.1:49735     0.0.0.0:0        LISTENING    8584  TCP   127.0.0.1:49735     127.0.0.1:49752     ESTABLISHED   8584  TCP   127.0.0.1:49752     127.0.0.1:49735     ESTABLISHED   7476  TCP   127.0.0.1:49873     127.0.0.1:9977     ESTABLISHED   13904  TCP   127.0.0.1:50914     127.0.0.1:50913     TIME_WAIT    0  TCP   127.0.0.1:50926     127.0.0.1:50925     TIME_WAIT    0  TCP   127.0.0.1:50928     127.0.0.1:3100     ESTABLISHED   8532  TCP   127.0.0.1:50930     127.0.0.1:5357     TIME_WAIT    0  TCP   127.0.0.1:50932     127.0.0.1:5357     TIME_WAIT    0  TCP   127.0.0.1:50942     127.0.0.1:50941     TIME_WAIT    0  TCP   127.0.0.1:50945     127.0.0.1:50944     TIME_WAIT    0  TCP   127.0.0.1:50963     127.0.0.1:50962     TIME_WAIT    0  TCP   127.0.0.1:50966     127.0.0.1:50965     TIME_WAIT    0  TCP   127.0.0.1:65001     0.0.0.0:0        LISTENING    4296  TCP   127.0.0.1:65001     127.0.0.1:49733     ESTABLISHED   4296  TCP   192.168.2.100:139    0.0.0.0:0        LISTENING    4  TCP   192.168.2.100:50717   185.60.216.11:443    ESTABLISHED   6600  TCP   192.168.2.100:50803   52.111.243.6:443    TIME_WAIT    0  TCP   192.168.2.100:50915   63.33.78.166:80     TIME_WAIT    0  TCP   192.168.2.100:50927   63.33.78.166:80     TIME_WAIT    0  TCP   [::]:135        [::]:0         LISTENING    988  TCP   [::]:445        [::]:0         LISTENING    4  TCP   [::]:5357        [::]:0         LISTENING    4  TCP   [::]:7680        [::]:0         LISTENING    3436  TCP   [::]:49664       [::]:0         LISTENING    576  TCP   [::]:49665       [::]:0         LISTENING    1508  TCP   [::]:49666       [::]:0         LISTENING    1320  TCP   [::]:49667       [::]:0         LISTENING    2368  TCP   [::]:49668       [::]:0         LISTENING    3644  TCP   [::]:49669       [::]:0         LISTENING    648  TCP   [::]:49687       [::]:0         LISTENING    668  TCP   [::1]:50929       [::1]:5357       TIME_WAIT    0  TCP   [::1]:50931       [::1]:5357       TIME_WAIT    0  TCP   [X::1036]:50933    [X:b00c:0:2]:443    ESTABLISHED   11276  TCP   [X::1036]:50946    [X:41:52a6:8a00]:89  TIME_WAIT    0  TCP   [X::1036]:50956    [X:a004::bfeb:8c34]:443  ESTABLISHED   12628  TCP   [X::1036]:50967    [X:52a6:8a00]:89    TIME_WAIT    0  UDP   0.0.0.0:500       *:*                   4200  UDP   0.0.0.0:3702      *:*                   2972  UDP   0.0.0.0:3702      *:*                   2972  UDP   0.0.0.0:3702      *:*                   3096  UDP   0.0.0.0:3702      *:*                   3096  UDP   0.0.0.0:4500      *:*                   4200  UDP   0.0.0.0:5050      *:*                   7240  UDP   0.0.0.0:5353      *:*                   14724  UDP   0.0.0.0:5353      *:*                   14724  UDP   0.0.0.0:5353      *:*                   14724  UDP   0.0.0.0:5353      *:*                   2228  UDP   0.0.0.0:5353      *:*                   14724  UDP   0.0.0.0:5355      *:*                   2228  UDP   0.0.0.0:27036      *:*                   13252  UDP   0.0.0.0:50000      *:*                   3096  UDP   0.0.0.0:51434      *:*                   12628  UDP   0.0.0.0:51463      *:*                   2228  UDP   0.0.0.0:52896      *:*                   2972  UDP   0.0.0.0:54915      *:*                   9776  UDP   0.0.0.0:55446      *:*                   4296  UDP   0.0.0.0:55758      *:*                   4496  UDP   0.0.0.0:55760      *:*                   3644  UDP   0.0.0.0:56956      *:*                   14116  UDP   0.0.0.0:58433      *:*                   9864  UDP   0.0.0.0:58768      *:*                   2228  UDP   0.0.0.0:63847      *:*                   11276  UDP   10.34.154.56:137    *:*                   4  UDP   10.34.154.56:138    *:*                   4  UDP   10.34.154.56:1900    *:*                   3656  UDP   10.34.154.56:5353    *:*                   4296  UDP   10.34.154.56:56897   *:*                   3656  UDP   127.0.0.1:1900     *:*                   3656  UDP   127.0.0.1:10010     *:*                   8584  UDP   127.0.0.1:10011     *:*                   7008  UDP   127.0.0.1:52898     *:*                   3932  UDP   127.0.0.1:56898     *:*                   3656  UDP   127.0.0.1:57044     *:*                   7016  UDP   192.168.2.100:137    *:*                   4  UDP   192.168.2.100:138    *:*                   4  UDP   192.168.2.100:1900   *:*                   3656  UDP   192.168.2.100:5353   *:*                   4296  UDP   192.168.2.100:5353   *:*                   4496  UDP   192.168.2.100:56896   *:*                   3656  UDP   [::]:500        *:*                   4200  UDP   [::]:3702        *:*                   3096  UDP   [::]:3702        *:*                   3096  UDP   [::]:3702        *:*                   2972  UDP   [::]:3702        *:*                   2972  UDP   [::]:4500        *:*                   4200  UDP   [::]:5353        *:*                   2228  UDP   [::]:5353        *:*                   14724  UDP   [::]:5353        *:*                   14724  UDP   [::]:5355        *:*                   2228  UDP   [::]:50001       *:*                   3096  UDP   [::]:51434       *:*                   12628  UDP   [::]:51463       *:*                   2228  UDP   [::]:52897       *:*                   2972  UDP   [::]:54915       *:*                   9776  UDP   [::]:55447       *:*                   4296  UDP   [::]:55759       *:*                   4496  UDP   [::]:58768       *:*                   2228  UDP   [::1]:1900       *:*                   3656  UDP   [::1]:5353       *:*                   4496  UDP   [::1]:5353       *:*                   4296  UDP   [::1]:56895       *:*                   3656  UDP   [x:740e%8]:1900  *:*                   3656  UDP   [x:740e%8]:56893  *:*                   3656  UDP   [x:e4d0%14]:546  *:*                   1912  UDP   [x%14]:1900  *:*                   3656  UDP   [x:e4d0%14]:56894  *:*                   3656 Quote Share this post Link to post
deadalus   0 Posted ... 54 minutes ago, giganerd said: I think I'm asking superfluously, but when you run these checks, is the software running as well? Is it listening on all interfaces/IP addresses or at least on the 10.x / TAP one? I am checking for ports on the website (and qbittorrent is also not reaching it) when I am connected to a server while the new eddie is running, if that is what you re asking I know, it seems like a weirdly specific thing, but thanks for sticking with me. Quote Share this post Link to post
OpenSourcerer   1441 Posted ... The interesting thing is that neither of the ports you posted earlier show up in the netstat. Are you 150%, absolutely and unequivocally sure you configured your softwares correctly to use these ports? Or did you change the ports already? Also, I should've known that -o only posts a process ID and not also the name like on Linux. I don't know of any command line way to show the names.. Do you have another machine, preferably with the same operating system, you can test your scenario with? Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
deadalus   0 Posted ... Hey, booted up my windows 10 laptop, installed eddie and after connecting to a server tried to check the ports online, again no success 😕 Here's netstat with qbittorent running/listening to 20157 (PID 14688 = Qbittorent according to taskmanager/details) Proto Local Address Foreign Address State PID TCP 0.0.0.0:135 0.0.0.0:0 LISTENING 1004 TCP 0.0.0.0:445 0.0.0.0:0 LISTENING 4 TCP 0.0.0.0:5040 0.0.0.0:0 LISTENING 6608 TCP 0.0.0.0:5357 0.0.0.0:0 LISTENING 4 TCP 0.0.0.0:7680 0.0.0.0:0 LISTENING 3552 TCP 0.0.0.0:27036 0.0.0.0:0 LISTENING 11064 TCP 0.0.0.0:49664 0.0.0.0:0 LISTENING 580 TCP 0.0.0.0:49665 0.0.0.0:0 LISTENING 1488 TCP 0.0.0.0:49666 0.0.0.0:0 LISTENING 1304 TCP 0.0.0.0:49667 0.0.0.0:0 LISTENING 2256 TCP 0.0.0.0:49668 0.0.0.0:0 LISTENING 3576 TCP 0.0.0.0:49669 0.0.0.0:0 LISTENING 652 TCP 0.0.0.0:49689 0.0.0.0:0 LISTENING 672 TCP 0.0.0.0:50962 0.0.0.0:0 LISTENING 10116 TCP 0.0.0.0:57621 0.0.0.0:0 LISTENING 10116 TCP 10.10.122.247:139 0.0.0.0:0 LISTENING 4 TCP 10.10.122.247:50923 77.79.249.114:443 ESTABLISHED 12564 TCP 10.10.122.247:50924 155.133.248.34:27022 ESTABLISHED 11064 TCP 10.10.122.247:50926 23.38.16.188:443 ESTABLISHED 12564 TCP 10.10.122.247:50927 77.79.249.114:443 ESTABLISHED 12564 TCP 10.10.122.247:50928 172.217.168.238:443 ESTABLISHED 1600 TCP 10.10.122.247:50935 35.190.242.42:443 ESTABLISHED 10116 TCP 10.10.122.247:50936 35.186.224.53:443 ESTABLISHED 10116 TCP 10.10.122.247:50937 35.186.224.53:443 ESTABLISHED 5888 TCP 10.10.122.247:50939 35.186.224.47:443 ESTABLISHED 10116 TCP 10.10.122.247:50940 173.194.79.188:5228 ESTABLISHED 1600 TCP 10.10.122.247:50943 23.66.23.40:443 ESTABLISHED 11456 TCP 10.10.122.247:50952 23.217.99.130:443 TIME_WAIT 0 TCP 10.10.122.247:50953 172.217.168.238:443 ESTABLISHED 11456 TCP 10.10.122.247:50954 88.221.254.16:443 ESTABLISHED 11456 TCP 10.10.122.247:50955 13.107.42.11:443 ESTABLISHED 1600 TCP 10.10.122.247:50958 13.69.188.18:443 ESTABLISHED 1600 TCP 10.10.122.247:50961 31.13.64.11:443 ESTABLISHED 6384 TCP 10.10.122.247:50963 40.74.32.146:443 ESTABLISHED 1600 TCP 10.10.122.247:50964 40.74.32.146:443 ESTABLISHED 1600 TCP 10.10.122.247:50967 31.13.64.48:443 ESTABLISHED 6384 TCP 10.10.122.247:50968 31.13.64.48:443 ESTABLISHED 6384 TCP 10.10.122.247:50969 31.13.64.48:443 ESTABLISHED 6384 TCP 10.10.122.247:50973 172.217.17.110:443 TIME_WAIT 0 TCP 10.10.122.247:50975 157.240.27.27:443 TIME_WAIT 0 TCP 10.10.122.247:50976 31.13.64.35:443 TIME_WAIT 0 TCP 10.10.122.247:50977 31.13.64.21:443 TIME_WAIT 0 TCP 10.10.122.247:50979 31.13.64.48:443 ESTABLISHED 6384 TCP 10.10.122.247:50983 52.158.24.209:443 TIME_WAIT 0 TCP 10.10.122.247:50986 52.114.77.33:443 ESTABLISHED 1600 TCP 10.10.122.247:50987 172.217.17.133:443 ESTABLISHED 1600 TCP 10.10.122.247:50988 172.217.17.46:443 TIME_WAIT 0 TCP 10.10.122.247:50991 104.18.20.226:80 ESTABLISHED 4112 TCP 10.10.122.247:50992 88.221.255.147:80 ESTABLISHED 4112 TCP 10.10.122.247:50998 31.13.64.11:443 ESTABLISHED 6384 TCP 10.10.122.247:51000 88.221.255.147:80 ESTABLISHED 4112 TCP 10.10.122.247:51002 204.79.197.200:443 TIME_WAIT 0 TCP 10.10.122.247:51003 204.79.197.200:443 TIME_WAIT 0 TCP 10.10.122.247:51004 204.79.197.200:443 TIME_WAIT 0 TCP 10.10.122.247:51005 13.107.18.11:443 TIME_WAIT 0 TCP 10.10.122.247:51006 13.107.18.11:443 TIME_WAIT 0 TCP 10.10.122.247:51010 104.20.137.9:443 ESTABLISHED 14688 TCP 10.10.122.247:51011 188.138.70.92:80 ESTABLISHED 14688 TCP 10.10.122.247:51012 104.27.131.137:80 ESTABLISHED 14688 TCP 10.10.122.247:51015 167.114.44.150:80 ESTABLISHED 14688 TCP 10.10.122.247:51016 208.83.20.110:80 ESTABLISHED 14688 TCP 10.10.122.247:51017 138.255.103.85:80 ESTABLISHED 14688 TCP 10.10.122.247:51020 167.114.44.150:443 ESTABLISHED 14688 TCP 10.10.122.247:51021 208.83.20.110:443 ESTABLISHED 14688 TCP 10.10.122.247:51025 167.114.44.150:443 TIME_WAIT 0 TCP 10.10.122.247:51026 167.114.44.150:443 TIME_WAIT 0 TCP 10.10.122.247:51027 167.114.44.150:443 TIME_WAIT 0 TCP 10.10.122.247:51028 167.114.44.150:443 TIME_WAIT 0 TCP 10.10.122.247:51029 152.199.19.161:443 ESTABLISHED 8432 TCP 10.10.122.247:51030 13.107.255.72:443 ESTABLISHED 8432 TCP 10.10.122.247:51031 131.253.33.254:443 ESTABLISHED 8432 TCP 10.10.122.247:51032 204.79.197.222:443 ESTABLISHED 8432 TCP 10.10.122.247:51033 204.79.197.200:443 ESTABLISHED 8432 TCP 10.10.122.247:51034 52.209.210.113:443 ESTABLISHED 1600 TCP 10.10.122.247:51036 13.107.18.11:443 ESTABLISHED 8432 TCP 10.10.122.247:51037 13.107.246.254:443 ESTABLISHED 8432 TCP 127.0.0.1:3100 0.0.0.0:0 LISTENING 5696 TCP 127.0.0.1:3100 127.0.0.1:50914 ESTABLISHED 5696 TCP 127.0.0.1:5939 0.0.0.0:0 LISTENING 4524 TCP 127.0.0.1:9977 0.0.0.0:0 LISTENING 13844 TCP 127.0.0.1:9977 127.0.0.1:49862 ESTABLISHED 13844 TCP 127.0.0.1:20157 0.0.0.0:0 LISTENING 14688 TCP 127.0.0.1:27060 0.0.0.0:0 LISTENING 11064 TCP 127.0.0.1:49735 127.0.0.1:49736 ESTABLISHED 6384 TCP 127.0.0.1:49736 127.0.0.1:49735 ESTABLISHED 6384 TCP 127.0.0.1:49738 127.0.0.1:49739 ESTABLISHED 6384 TCP 127.0.0.1:49739 127.0.0.1:49738 ESTABLISHED 6384 TCP 127.0.0.1:49857 127.0.0.1:65001 ESTABLISHED 4328 TCP 127.0.0.1:49862 127.0.0.1:9977 ESTABLISHED 12564 TCP 127.0.0.1:49867 0.0.0.0:0 LISTENING 7976 TCP 127.0.0.1:49867 127.0.0.1:49907 ESTABLISHED 7976 TCP 127.0.0.1:49907 127.0.0.1:49867 ESTABLISHED 13952 TCP 127.0.0.1:50914 127.0.0.1:3100 ESTABLISHED 8120 TCP 127.0.0.1:51008 127.0.0.1:51009 ESTABLISHED 14688 TCP 127.0.0.1:51009 127.0.0.1:51008 ESTABLISHED 14688 TCP 127.0.0.1:65001 0.0.0.0:0 LISTENING 4328 TCP 127.0.0.1:65001 127.0.0.1:49857 ESTABLISHED 4328 TCP 192.168.2.100:139 0.0.0.0:0 LISTENING 4 TCP [::]:135 [::]:0 LISTENING 1004 TCP [::]:445 [::]:0 LISTENING 4 TCP [::]:5357 [::]:0 LISTENING 4 TCP [::]:7680 [::]:0 LISTENING 3552 TCP [::]:49664 [::]:0 LISTENING 580 TCP [::]:49665 [::]:0 LISTENING 1488 TCP [::]:49666 [::]:0 LISTENING 1304 TCP [::]:49667 [::]:0 LISTENING 2256 TCP [::]:49668 [::]:0 LISTENING 3576 TCP [::]:49669 [::]:0 LISTENING 652 TCP [::]:49689 [::]:0 LISTENING 672 TCP [X::10f5]:50972 [X:0:2]:443 ESTABLISHED 1600 TCP [X::10f5]:51035 [X:c40b]:80 ESTABLISHED 11064 UDP 0.0.0.0:500 *:* 4240 UDP 0.0.0.0:3702 *:* 344 UDP 0.0.0.0:3702 *:* 2980 UDP 0.0.0.0:3702 *:* 2980 UDP 0.0.0.0:3702 *:* 344 UDP 0.0.0.0:4500 *:* 4240 UDP 0.0.0.0:5050 *:* 6608 UDP 0.0.0.0:5353 *:* 10984 UDP 0.0.0.0:5353 *:* 1600 UDP 0.0.0.0:5353 *:* 10984 UDP 0.0.0.0:5353 *:* 10116 UDP 0.0.0.0:5353 *:* 10984 UDP 0.0.0.0:5353 *:* 1600 UDP 0.0.0.0:5353 *:* 2180 UDP 0.0.0.0:5353 *:* 10116 UDP 0.0.0.0:5353 *:* 10984 UDP 0.0.0.0:5355 *:* 2180 UDP 0.0.0.0:6771 *:* 14688 UDP 0.0.0.0:6771 *:* 14688 UDP 0.0.0.0:27036 *:* 11064 UDP 0.0.0.0:51324 *:* 1600 UDP 0.0.0.0:54915 *:* 9284 UDP 0.0.0.0:55104 *:* 4524 UDP 0.0.0.0:55106 *:* 3576 UDP 0.0.0.0:56682 *:* 1600 UDP 0.0.0.0:57621 *:* 10116 UDP 0.0.0.0:57926 *:* 14688 UDP 0.0.0.0:57928 *:* 14688 UDP 0.0.0.0:58014 *:* 5696 UDP 0.0.0.0:58899 *:* 10116 UDP 0.0.0.0:58900 *:* 10116 UDP 0.0.0.0:59041 *:* 11064 UDP 0.0.0.0:59537 *:* 4328 UDP 0.0.0.0:63299 *:* 13844 UDP 0.0.0.0:64383 *:* 1600 UDP 0.0.0.0:64908 *:* 2980 UDP 0.0.0.0:64914 *:* 344 UDP 10.10.122.247:137 *:* 4 UDP 10.10.122.247:138 *:* 4 UDP 10.10.122.247:1900 *:* 3324 UDP 10.10.122.247:5353 *:* 4328 UDP 10.10.122.247:6771 *:* 14688 UDP 10.10.122.247:52004 *:* 3324 UDP 10.10.122.247:63487 *:* 14688 UDP 127.0.0.1:1900 *:* 3324 UDP 127.0.0.1:10010 *:* 7976 UDP 127.0.0.1:10011 *:* 6660 UDP 127.0.0.1:20157 *:* 14688 UDP 127.0.0.1:52005 *:* 3324 UDP 127.0.0.1:64472 *:* 5260 UDP 127.0.0.1:64916 *:* 3992 UDP 192.168.2.100:137 *:* 4 UDP 192.168.2.100:138 *:* 4 UDP 192.168.2.100:1900 *:* 3324 UDP 192.168.2.100:2177 *:* 7660 UDP 192.168.2.100:5353 *:* 4328 UDP 192.168.2.100:5353 *:* 4524 UDP 192.168.2.100:6771 *:* 14688 UDP 192.168.2.100:52003 *:* 3324 UDP 192.168.2.100:63488 *:* 14688 UDP [::]:500 *:* 4240 UDP [::]:3702 *:* 344 UDP [::]:3702 *:* 2980 UDP [::]:3702 *:* 2980 UDP [::]:3702 *:* 344 UDP [::]:4500 *:* 4240 UDP [::]:5353 *:* 10984 UDP [::]:5353 *:* 2180 UDP [::]:5353 *:* 10984 UDP [::]:5353 *:* 1600 UDP [::]:5355 *:* 2180 UDP [::]:6771 *:* 14688 UDP [::]:54915 *:* 9284 UDP [::]:55105 *:* 4524 UDP [::]:57927 *:* 14688 UDP [::]:57929 *:* 14688 UDP [::]:59538 *:* 4328 UDP [::]:64909 *:* 2980 UDP [::]:64915 *:* 344 UDP [::1]:1900 *:* 3324 UDP [::1]:5353 *:* 4328 UDP [::1]:5353 *:* 4524 UDP [::1]:52002 *:* 3324 UDP [X::10f5]:6771 *:* 14688 UDP [X::10f5]:57920 *:* 14688 UDP [X:7c15]:2177 *:* 7660 UDP [X:7c15]:6771 *:* 14688 UDP [X:7c15]:57923 *:* 14688 UDP [X:740e]:2177 *:* 7660 UDP [X:740e]:6771 *:* 14688 UDP [X:740e]:57922 *:* 14688 UDP [X:740e%8]:1900 *:* 3324 UDP [X:740e%8]:2177 *:* 7660 UDP [X:740e%8]:6771 *:* 14688 UDP [X:740e%8]:52000 *:* 3324 UDP [X:740e%8]:57924 *:* 14688 UDP [X:e4d0%14]:1900 *:* 3324 UDP [X:e4d0%14]:6771 *:* 14688 UDP [X:e4d0%14]:52001 *:* 3324 UDP [X:e4d0%14]:57921 *:* 14688 Quote Share this post Link to post
OpenSourcerer   1441 Posted ... Okay, it should work, then. You could try binding qB to the TAP interface. Doubt it will make it work, so it'll be a desperate action. I'm just going to shoot out ideas, no guarantee they're good ones What was the last thing you did before it stopped working? Installed something? Made an update? Changed a setting anywhere, even if it was an UI setting? Something in the router? Are there any other connections to AirVPN you can see in the client area? If yes, kill them all via the respective buttons, wait a moment and retry a connection. Maybe try another OS? Or in another network? Try another program, maybe? Though you wrote it didn't work with any program. There's a tool called netcat which allows to create arbitrary sockets. It's possible to setup a listening socket using it so that one can test whether connections are actually coming through while netcat explicitly tells you the results. There's a windows version also, usage should be similar to Linux, so something like this will work: netcat.exe -4 -v -l -s [IPv4 of the TAP interface] -p 20157 Then try a test on the port forwarding page or on canyouseeme.org again. If nc doesn't print any connection attempts, I don't know anymore. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
deadalus   0 Posted ... I uninstalled eddie and openTap, reinstalled (but version 2.18) and it fails to connect while checking IPv6. Unfortunately I dont have another OS /Network. Tracing back my steps, the only relevant thing that happened besides any automatic windows updates would be me re-installing openVPN in preparation for home office these weeks. (I also tried with OpenVPN and download a configuration from the website with no more luck regarding the ports) Here's the log while trying to connect today. I 2020.03.29 12:28:00 - Session starting. I 2020.03.29 12:28:00 - Checking authorization ... ! 2020.03.29 12:28:00 - Connecting to Hassaleh (Netherlands, Alblasserdam) . 2020.03.29 12:28:00 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.03.29 12:28:00 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.03.29 12:28:00 - OpenVPN > library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10 . 2020.03.29 12:28:00 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.03.29 12:28:00 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.03.29 12:28:00 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.03.29 12:28:00 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.03.29 12:28:00 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.42:443 . 2020.03.29 12:28:00 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.03.29 12:28:00 - OpenVPN > UDP link local: (not bound) . 2020.03.29 12:28:00 - OpenVPN > UDP link remote: [AF_INET]213.152.161.42:443 . 2020.03.29 12:28:00 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.42:443, sid=43736556 . 2020.03.29 12:28:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.03.29 12:28:01 - OpenVPN > VERIFY KU OK . 2020.03.29 12:28:01 - OpenVPN > Validating certificate extended key usage . 2020.03.29 12:28:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.03.29 12:28:01 - OpenVPN > VERIFY EKU OK . 2020.03.29 12:28:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hassaleh, emailAddress=info@airvpn.org . 2020.03.29 12:28:01 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.03.29 12:28:01 - OpenVPN > [Hassaleh] Peer Connection Initiated with [AF_INET]213.152.161.42:443 . 2020.03.29 12:28:02 - OpenVPN > SENT CONTROL [Hassaleh]: 'PUSH_REQUEST' (status=1) . 2020.03.29 12:28:02 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.18.154.1,dhcp-option DNS6 :e9a::1,tun-ipv6,route-gateway 10.18.154.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 :e9a::10b4/64 :e9a::1,ifconfig 10.18.154.182 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2020.03.29 12:28:02 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.03.29 12:28:02 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.03.29 12:28:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.03.29 12:28:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.03.29 12:28:02 - OpenVPN > interactive service msg_channel=0 . 2020.03.29 12:28:02 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=8 HWADDR=:8d . 2020.03.29 12:28:02 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.03.29 12:28:02 - OpenVPN > GetBestInterfaceEx() returned if=8 . 2020.03.29 12:28:02 - OpenVPN > GDG6: II=8 DP=::/0 NH=:feda:6b08 . 2020.03.29 12:28:02 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2020.03.29 12:28:02 - OpenVPN > ROUTE6_GATEWAY :6b08 I=8 . 2020.03.29 12:28:02 - OpenVPN > open_tun . 2020.03.29 12:28:02 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{-ACC976A1EC99}.tap . 2020.03.29 12:28:02 - OpenVPN > TAP-Windows Driver Version 9.24 . 2020.03.29 12:28:02 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.18.154.0/10.18.154.182/255.255.255.0 [SUCCEEDED] . 2020.03.29 12:28:02 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.18.154.182/255.255.255.0 on interface {-ACC976A1EC99} [DHCP-serv: 10.18.154.254, lease-time: 31536000] . 2020.03.29 12:28:02 - OpenVPN > Successful ARP Flush on interface [14] {-ACC976A1EC99} . 2020.03.29 12:28:03 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=14 ::10b4 store=active . 2020.03.29 12:28:04 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Local Area Connection static :e9a::1 validate=no . 2020.03.29 12:28:04 - Detected an OpenVPN bug (On-Link route on VPN range), autofix. . 2020.03.29 12:28:04 - OpenVPN > add_route_ipv6(::/64 -> ::10b4 metric 0) dev Local Area Connection . 2020.03.29 12:28:04 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route :e9a::/64 interface=14 fe80::8 store=active . 2020.03.29 12:28:04 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.03.29 12:28:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.42 MASK 255.255.255.255 192.168.2.1 . 2020.03.29 12:28:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.03.29 12:28:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.18.154.1 . 2020.03.29 12:28:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.03.29 12:28:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.18.154.1 . 2020.03.29 12:28:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.03.29 12:28:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.03.29 12:28:09 - OpenVPN > add_route_ipv6(::/3 -> f:e9a::1 metric -1) dev Local Area Connection . 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=14 fe80::8 store=active . 2020.03.29 12:28:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.03.29 12:28:09 - OpenVPN > add_route_ipv6(2000::/4 -> :e9a::1 metric -1) dev Local Area Connection . 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=14 fe80::8 store=active . 2020.03.29 12:28:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.03.29 12:28:09 - OpenVPN > add_route_ipv6(3000::/4 ->:e9a::1 metric -1) dev Local Area Connection . 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=14 fe80::8 store=active . 2020.03.29 12:28:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.03.29 12:28:10 - OpenVPN > add_route_ipv6(fc00::/7 -> :e9a::1 metric -1) dev Local Area Connection . 2020.03.29 12:28:10 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=14 fe80::8 store=active . 2020.03.29 12:28:10 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.03.29 12:28:10 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2020.03.29 12:28:10 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2020.03.29 12:28:10 - DNS leak protection with packet filtering enabled. . 2020.03.29 12:28:10 - Routes, added a new route, 213.152.161.40 for gateway 10.18.154.1 . 2020.03.29 12:28:10 - Routes, added a new route, :3810 for gateway :e9a::1 . 2020.03.29 12:28:10 - Flushing DNS I 2020.03.29 12:28:10 - Checking route IPv4 I 2020.03.29 12:28:10 - Checking route IPv6 . 2020.03.29 12:28:30 - curl: (28) Connection timed out after 20000 milliseconds . 2020.03.29 12:28:30 - Checking route (2° try) . 2020.03.29 12:28:51 - curl: (28) Connection timed out after 20000 milliseconds . 2020.03.29 12:28:51 - Checking route (3° try) . 2020.03.29 12:29:13 - curl: (28) Connection timed out after 20000 milliseconds E 2020.03.29 12:29:13 - Checking route IPv6 failed. . 2020.03.29 12:29:13 - OpenVPN > Initialization Sequence Completed ! 2020.03.29 12:29:13 - Disconnecting . 2020.03.29 12:29:13 - Routes, removed a route previously added, 213.152.161.40 for gateway 10.18.154.1 . 2020.03.29 12:29:14 - Routes, removed a route previously added, :d71f:3810 for gateway :e9a::1 . 2020.03.29 12:29:14 - Sending soft termination signal . 2020.03.29 12:29:17 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.03.29 12:29:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.42 MASK 255.255.255.255 192.168.2.1 . 2020.03.29 12:29:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.03.29 12:29:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.18.154.1 . 2020.03.29 12:29:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.03.29 12:29:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.18.154.1 . 2020.03.29 12:29:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.03.29 12:29:19 - OpenVPN > delete_route_ipv6(::/3) . 2020.03.29 12:29:19 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=14 fe80::8 store=active . 2020.03.29 12:29:19 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.03.29 12:29:20 - OpenVPN > delete_route_ipv6(2000::/4) . 2020.03.29 12:29:20 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=14 fe80::8 store=active . 2020.03.29 12:29:20 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.03.29 12:29:20 - OpenVPN > delete_route_ipv6(3000::/4) . 2020.03.29 12:29:20 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=14 fe80::8 store=active . 2020.03.29 12:29:20 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.03.29 12:29:20 - OpenVPN > delete_route_ipv6(fc00::/7) . 2020.03.29 12:29:20 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=14 fe80::8 store=active . 2020.03.29 12:29:20 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.03.29 12:29:20 - OpenVPN > Closing TUN/TAP interface . 2020.03.29 12:29:20 - OpenVPN > delete_route_ipv6(:e9a::/64) . 2020.03.29 12:29:20 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route:e9a::/64 interface=14 fe80::8 store=active . 2020.03.29 12:29:21 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Local Area Connection :e9a::10b4 store=active . 2020.03.29 12:29:22 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Local Area Connection all . 2020.03.29 12:29:22 - OpenVPN > TAP: DHCP address released . 2020.03.29 12:29:22 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.03.29 12:29:22 - Connection terminated. . 2020.03.29 12:29:22 - DNS leak protection with packet filtering disabled. . 2020.03.29 12:29:22 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2020.03.29 12:29:22 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 I 2020.03.29 12:29:24 - Cancel requested. ! 2020.03.29 12:29:24 - Session terminated. ! 2020.03.29 12:29:25 - Deactivation of Network Lock  Quote Share this post Link to post
OpenSourcerer   1441 Posted ... 7 hours ago, deadalus said: I uninstalled eddie and openTap, reinstalled (but version 2.18) and it fails to connect while checking IPv6. Hm, yes, that is a new one. If you do Preferences > Networking > Layer IPv6: Block, does it change anything? Also, you called it "openTap". Is this the official TAP installation you get from Eddie/openvpn.net, or something else? Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
deadalus   0 Posted ... Nice, it connects to the server normally now, ports still not available though. OpenTap (not sure if name was exact) was available under apps and programs installed around the same time as openVPN, in the timespan since the last time I checked qbittorent when it was working (sometime in March). I just thought that doing a uninstall of all 3 and reinstalling eddie after that (and I went with 2.18 cause you also mentioned more potential fixes) would do the trick. I 2020.03.29 22:15:40 - Session starting. I 2020.03.29 22:15:41 - Checking authorization ... . 2020.03.29 22:15:41 - IPv6 disabled with packet filtering. ! 2020.03.29 22:15:41 - Connecting to Alpheratz (Netherlands, Alblasserdam) . 2020.03.29 22:15:41 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.03.29 22:15:41 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.03.29 22:15:41 - OpenVPN > library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10 . 2020.03.29 22:15:41 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.03.29 22:15:41 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.03.29 22:15:41 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.03.29 22:15:41 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.03.29 22:15:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.245:443 . 2020.03.29 22:15:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.03.29 22:15:41 - OpenVPN > UDP link local: (not bound) . 2020.03.29 22:15:41 - OpenVPN > UDP link remote: [AF_INET]134.19.179.245:443 . 2020.03.29 22:15:41 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.245:443, sid= 5795ac58 . 2020.03.29 22:15:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.03.29 22:15:42 - OpenVPN > VERIFY KU OK . 2020.03.29 22:15:42 - OpenVPN > Validating certificate extended key usage . 2020.03.29 22:15:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.03.29 22:15:42 - OpenVPN > VERIFY EKU OK . 2020.03.29 22:15:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alpheratz, emailAddress=info@airvpn.org . 2020.03.29 22:15:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.03.29 22:15:42 - OpenVPN > [Alpheratz] Peer Connection Initiated with [AF_INET]134.19.179.245:443 . 2020.03.29 22:15:43 - OpenVPN > SENT CONTROL [Alpheratz]: 'PUSH_REQUEST' (status=1) . 2020.03.29 22:15:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.218.1,dhcp-option DNS6 :1cda::1,tun-ipv6,route-gateway 10.32.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 :1cda::106e/64 1cda::1,ifconfig 10.32.218.112 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2020.03.29 22:15:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.03.29 22:15:43 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 :1cda::1' . 2020.03.29 22:15:43 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2020.03.29 22:15:43 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 :1cda::106e/64 :1cda::1' . 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.03.29 22:15:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.03.29 22:15:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.03.29 22:15:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.03.29 22:15:43 - OpenVPN > interactive service msg_channel=0 . 2020.03.29 22:15:43 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=8 HWADDR=:ed:8d . 2020.03.29 22:15:43 - OpenVPN > open_tun . 2020.03.29 22:15:43 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{6-ACC976A1EC99}.tap . 2020.03.29 22:15:43 - OpenVPN > TAP-Windows Driver Version 9.24 . 2020.03.29 22:15:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.32.218.0/10.32.218.112/255.255.255.0 [SUCCEEDED] . 2020.03.29 22:15:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.32.218.112/255.255.255.0 on interface {6-ACC976A1EC99} [DHCP-serv: 10.32.218.254, lease-time: 31536000] . 2020.03.29 22:15:43 - OpenVPN > Successful ARP Flush on interface [14] {6-ACC976A1EC99} . 2020.03.29 22:15:48 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.03.29 22:15:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 134.19.179.245 MASK 255.255.255.255 192.168.2.1 . 2020.03.29 22:15:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.03.29 22:15:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.03.29 22:15:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.32.218.1 . 2020.03.29 22:15:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.03.29 22:15:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.03.29 22:15:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.32.218.1 . 2020.03.29 22:15:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.03.29 22:15:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.03.29 22:15:48 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2020.03.29 22:15:48 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2020.03.29 22:15:48 - DNS leak protection with packet filtering enabled. . 2020.03.29 22:15:48 - Routes, added a new route, 134.19.179.243 for gateway 10.32.218.1 . 2020.03.29 22:15:48 - Unable to compute route for :fcac:44b9: IPv6 VPN gateway not available. . 2020.03.29 22:15:48 - Flushing DNS I 2020.03.29 22:15:48 - Checking route IPv4 I 2020.03.29 22:15:48 - Checking DNS ! 2020.03.29 22:15:49 - Connected. . 2020.03.29 22:15:49 - OpenVPN > Initialization Sequence Completed Quote Share this post Link to post
OpenSourcerer   1441 Posted ... Okay. Well, I'm at the end of my wisdom. If no one else got any ideas, consider opening a support ticket. If you happen to resolve it, please report back here. Really sorry. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
Alfredox123 Â Â 0 Posted ... port forward is not working for me either what should i do? Quote Share this post Link to post
OpenSourcerer   1441 Posted ... 4 hours ago, alfredox123 said: what should i do? Opening your own thread; this is Mr. deadalus' thread and the cause for your port forwarding problem can be very different. I prefer those two setups not to be mixed. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post