Jump to content
Not connected, Your IP: 44.222.169.36
deadalus

Port Forwarding Not Working anymore

Recommended Posts

Hello,

I 've been using airVPN for a bit over a year now, read a couple of guides and have had qbittorrent successfully running with a forwarded port, until today 😕 (This might have started earlier, I haven't tried to download anything in a few weeks)

-All my torrents were showing 0/0 seeds/leechers, even though I m pretty sure they have a few thousands.
- Double checked airVPN port and qbittorrrent port, nothing was changed.
- Tried different servers, tried using a few new ports, no luck

Am I the only one with this problem, or could it be related somehow with the current situation in central Europe?

Thanks!

394539793_Annotation2020-03-22112651.thumb.png.f5ac6defc6044cdfdc0f6770057e28e7.png

Share this post


Link to post

Yeah as I said, I already tried a few different ports on different servers -> both on canyouseeme and on airvpn/ports they still appear blocked 😕

Share this post


Link to post

Appear blocked as in actively rejected or a timeout? Is there a firewall you are using?
What's your client and version? OS?

Actually, some logs would be nice. If you're using Eddie, paste a support file instead (Logs > Lifebelt icon).


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Eddie version: 2.13.6

First of all: Please update Eddie. At least to 2.16.3, but the 2.18 beta fixes a multitude of errors of 2.16.3 as well. I'm even surprised you can still connect with 2.13.
When you do this, you can paste another support file here because the amount of info changed greatly. It's more informative in current stable/beta.
 

! 2020.03.22 23:30:36 - Activation of Network Lock - Windows Filtering Platform

Do you experience the same if NetLock is off?

Does it also happen if you use vanilla OpenVPN?

I'd also like to remark that using Google Public DNS is a bad practice since they log pretty much everything. Try OpenNIC Project instead.

And about the IP/MAC things you changed, the Windows interface IDs are useless for the public, private IPv4 addresses cannot be routed by the public as well, but the MAC and certain v6 addresses were rightly hidden. :)

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Hey, Sorry for the delay!

I guess I got really used to everything auto-updating nowadays 😅
Still happens with the new version. Here's the new file!

- It still happens with network lock off unfortunately.
- By vanilla OpenVPN you mean using the default openVPN app to connect? (never tried that before)
- Note: I recently was doing testing an App's functionality while being offline, so I disabled/re-enabled my ethernet adapter to simulate it. Could that be related?

Thanks for the support!

log2.txt

Share this post


Link to post

Logs seem to be okay.
 

40 minutes ago, deadalus said:

- By vanilla OpenVPN you mean using the default openVPN app to connect? (never tried that before)


Yes.
 
40 minutes ago, deadalus said:

- Note: I recently was doing testing an App's  functionality while being offline, so I disabled/re-enabled my ethernet adapter to simulate it. Could that be related? 


Were you connected at that time? In this case it should normalize itself after a reconnect.
 
On 3/22/2020 at 7:58 PM, giganerd said:

Appear blocked as in actively rejected or a timeout? Is there a firewall you are using?


Can you answer this, please? Let's extend this question to security software like Kaspersky and firewalls.

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
Quote

Appear blocked as in actively rejected or a timeout?


I am just running the port test in the client Area/Forwarded ports with it reporting Checking port 20157 for internal IP 10.31.26.68 completed.   and the ports being grey like this
image.png.6d99431d2d1d04c945bfddf48807c7dd.png

And Canyouseeme reports a timeout , same as yougetsignal.com/tools/open-ports

image.png.0b1d574aa6d434701965c1d6375860fa.png

I am not using any firewalls besides the typical windows defender stuff. Connection set as private network and I even tried with Firewall off, still timed out on ports. 
ISP is Vodafone in Germany for what it's worth.
 

Share this post


Link to post

I think I'm asking superfluously, but when you run these checks, is the software running as well? Is it listening on all interfaces/IP addresses or at least on the 10.x / TAP one?

In a privileged cmd/powershell, when you're connected and the software is supposed to be reachable, can you please run netstat -a -o -n?
 

1 hour ago, deadalus said:

ISP is Vodafone in Germany for what it's worth.


That doesn't matter much. I had Vodafone Kabel DE and nothing like this ever happened. I'm being more and more sure that it's a local problem, but I got to admit that I'm slowly running out of ideas.

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post


 Proto  Local Address          Foreign Address        State           PID
  TCP    0.0.0.0:135            0.0.0.0:0              LISTENING       988
  TCP    0.0.0.0:445            0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:5040           0.0.0.0:0              LISTENING       7240
  TCP    0.0.0.0:5357           0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:7680           0.0.0.0:0              LISTENING       3436
  TCP    0.0.0.0:27036          0.0.0.0:0              LISTENING       13252
  TCP    0.0.0.0:49664          0.0.0.0:0              LISTENING       576
  TCP    0.0.0.0:49665          0.0.0.0:0              LISTENING       1508
  TCP    0.0.0.0:49666          0.0.0.0:0              LISTENING       1320
  TCP    0.0.0.0:49667          0.0.0.0:0              LISTENING       2368
  TCP    0.0.0.0:49668          0.0.0.0:0              LISTENING       3644
  TCP    0.0.0.0:49669          0.0.0.0:0              LISTENING       648
  TCP    0.0.0.0:49687          0.0.0.0:0              LISTENING       668
  TCP    10.34.154.56:139       0.0.0.0:0              LISTENING       4
  TCP    10.34.154.56:7688      52.114.89.91:443       TIME_WAIT       0
  TCP    10.34.154.56:10874     52.114.89.91:443       TIME_WAIT       0
  TCP    10.34.154.56:22586     52.114.89.91:443       TIME_WAIT       0
  TCP    10.34.154.56:35013     52.114.89.91:443       TIME_WAIT       0
  TCP    10.34.154.56:38917     52.114.89.91:443       TIME_WAIT       0
  TCP    10.34.154.56:44172     52.114.89.91:443       TIME_WAIT       0
  TCP    10.34.154.56:50009     52.114.89.164:443      TIME_WAIT       0
  TCP    10.34.154.56:50019     52.114.89.164:443      TIME_WAIT       0
  TCP    10.34.154.56:50028     52.114.89.173:443      TIME_WAIT       0
  TCP    10.34.154.56:50038     52.114.89.173:443      TIME_WAIT       0
  TCP    10.34.154.56:50040     52.114.89.165:443      TIME_WAIT       0
  TCP    10.34.154.56:50043     52.114.89.165:443      TIME_WAIT       0
  TCP    10.34.154.56:50045     52.114.89.168:443      TIME_WAIT       0
  TCP    10.34.154.56:50046     52.114.89.168:443      TIME_WAIT       0
  TCP    10.34.154.56:50934     52.114.77.7:443        ESTABLISHED     12628
  TCP    10.34.154.56:50935     52.113.194.132:443     ESTABLISHED     11972
  TCP    10.34.154.56:50936     216.58.208.110:443     ESTABLISHED     11276
  TCP    10.34.154.56:50938     216.58.208.110:443     TIME_WAIT       0
  TCP    10.34.154.56:50939     172.217.17.46:443      ESTABLISHED     11276
  TCP    10.34.154.56:50940     157.240.201.24:443     ESTABLISHED     6600
  TCP    10.34.154.56:50943     134.19.179.187:89      TIME_WAIT       0
  TCP    10.34.154.56:50948     52.114.89.91:443       TIME_WAIT       0
  TCP    10.34.154.56:50952     157.240.201.50:443     ESTABLISHED     6600
  TCP    10.34.154.56:50953     51.140.157.153:443     ESTABLISHED     11972
  TCP    10.34.154.56:50954     108.177.119.188:443    ESTABLISHED     11276
  TCP    10.34.154.56:50961     52.114.75.38:443       ESTABLISHED     12628
  TCP    10.34.154.56:50969     52.114.74.89:443       ESTABLISHED     11972
  TCP    10.34.154.56:50972     5.196.64.52:443        ESTABLISHED     11276
  TCP    10.34.154.56:50974     23.196.233.47:443      ESTABLISHED     13904
  TCP    10.34.154.56:50975     13.107.21.200:443      TIME_WAIT       0
  TCP    10.34.154.56:50976     13.107.21.200:443      TIME_WAIT       0
  TCP    10.34.154.56:50977     13.107.18.11:443       TIME_WAIT       0
  TCP    10.34.154.56:50978     13.107.21.200:443      ESTABLISHED     8812
  TCP    10.34.154.56:50979     13.107.18.254:443      ESTABLISHED     8812
  TCP    10.34.154.56:50980     13.107.246.10:443      ESTABLISHED     8812
  TCP    10.34.154.56:50981     152.199.19.161:443     ESTABLISHED     8812
  TCP    10.34.154.56:50982     204.79.197.222:443     ESTABLISHED     8812
  TCP    10.34.154.56:50983     77.79.249.112:443      ESTABLISHED     13904
  TCP    10.34.154.56:50984     193.59.178.227:443     ESTABLISHED     13904
  TCP    10.34.154.56:50985     193.59.178.227:443     ESTABLISHED     13904
  TCP    10.34.154.56:50986     95.101.78.112:443      ESTABLISHED     11972
  TCP    10.34.154.56:50990     52.114.76.13:443       ESTABLISHED     11972
  TCP    10.34.154.56:50991     77.79.249.112:443      ESTABLISHED     13904
  TCP    10.34.154.56:50992     52.114.74.2:443        ESTABLISHED     11972
  TCP    10.34.154.56:50997     52.113.194.132:443     ESTABLISHED     12628
  TCP    10.34.154.56:50998     52.114.88.28:443       ESTABLISHED     12628
  TCP    10.34.154.56:59683     52.114.89.91:443       TIME_WAIT       0
  TCP    127.0.0.1:3100         0.0.0.0:0              LISTENING       9864
  TCP    127.0.0.1:3100         127.0.0.1:50928        ESTABLISHED     9864
  TCP    127.0.0.1:5939         0.0.0.0:0              LISTENING       4496
  TCP    127.0.0.1:9977         0.0.0.0:0              LISTENING       14116
  TCP    127.0.0.1:9977         127.0.0.1:49873        ESTABLISHED     14116
  TCP    127.0.0.1:27060        0.0.0.0:0              LISTENING       13252
  TCP    127.0.0.1:49725        127.0.0.1:49726        ESTABLISHED     6600
  TCP    127.0.0.1:49726        127.0.0.1:49725        ESTABLISHED     6600
  TCP    127.0.0.1:49730        127.0.0.1:49731        ESTABLISHED     6600
  TCP    127.0.0.1:49731        127.0.0.1:49730        ESTABLISHED     6600
  TCP    127.0.0.1:49733        127.0.0.1:65001        ESTABLISHED     4296
  TCP    127.0.0.1:49735        0.0.0.0:0              LISTENING       8584
  TCP    127.0.0.1:49735        127.0.0.1:49752        ESTABLISHED     8584
  TCP    127.0.0.1:49752        127.0.0.1:49735        ESTABLISHED     7476
  TCP    127.0.0.1:49873        127.0.0.1:9977         ESTABLISHED     13904
  TCP    127.0.0.1:50914        127.0.0.1:50913        TIME_WAIT       0
  TCP    127.0.0.1:50926        127.0.0.1:50925        TIME_WAIT       0
  TCP    127.0.0.1:50928        127.0.0.1:3100         ESTABLISHED     8532
  TCP    127.0.0.1:50930        127.0.0.1:5357         TIME_WAIT       0
  TCP    127.0.0.1:50932        127.0.0.1:5357         TIME_WAIT       0
  TCP    127.0.0.1:50942        127.0.0.1:50941        TIME_WAIT       0
  TCP    127.0.0.1:50945        127.0.0.1:50944        TIME_WAIT       0
  TCP    127.0.0.1:50963        127.0.0.1:50962        TIME_WAIT       0
  TCP    127.0.0.1:50966        127.0.0.1:50965        TIME_WAIT       0
  TCP    127.0.0.1:65001        0.0.0.0:0              LISTENING       4296
  TCP    127.0.0.1:65001        127.0.0.1:49733        ESTABLISHED     4296
  TCP    192.168.2.100:139      0.0.0.0:0              LISTENING       4
  TCP    192.168.2.100:50717    185.60.216.11:443      ESTABLISHED     6600
  TCP    192.168.2.100:50803    52.111.243.6:443       TIME_WAIT       0
  TCP    192.168.2.100:50915    63.33.78.166:80        TIME_WAIT       0
  TCP    192.168.2.100:50927    63.33.78.166:80        TIME_WAIT       0
  TCP    [::]:135               [::]:0                 LISTENING       988
  TCP    [::]:445               [::]:0                 LISTENING       4
  TCP    [::]:5357              [::]:0                 LISTENING       4
  TCP    [::]:7680              [::]:0                 LISTENING       3436
  TCP    [::]:49664             [::]:0                 LISTENING       576
  TCP    [::]:49665             [::]:0                 LISTENING       1508
  TCP    [::]:49666             [::]:0                 LISTENING       1320
  TCP    [::]:49667             [::]:0                 LISTENING       2368
  TCP    [::]:49668             [::]:0                 LISTENING       3644
  TCP    [::]:49669             [::]:0                 LISTENING       648
  TCP    [::]:49687             [::]:0                 LISTENING       668
  TCP    [::1]:50929            [::1]:5357             TIME_WAIT       0
  TCP    [::1]:50931            [::1]:5357             TIME_WAIT       0
  TCP    [X::1036]:50933        [X:b00c:0:2]:443       ESTABLISHED     11276
  TCP    [X::1036]:50946        [X:41:52a6:8a00]:89    TIME_WAIT       0
  TCP    [X::1036]:50956        [X:a004::bfeb:8c34]:443  ESTABLISHED     12628
  TCP    [X::1036]:50967        [X:52a6:8a00]:89       TIME_WAIT       0
  UDP    0.0.0.0:500            *:*                                    4200
  UDP    0.0.0.0:3702           *:*                                    2972
  UDP    0.0.0.0:3702           *:*                                    2972
  UDP    0.0.0.0:3702           *:*                                    3096
  UDP    0.0.0.0:3702           *:*                                    3096
  UDP    0.0.0.0:4500           *:*                                    4200
  UDP    0.0.0.0:5050           *:*                                    7240
  UDP    0.0.0.0:5353           *:*                                    14724
  UDP    0.0.0.0:5353           *:*                                    14724
  UDP    0.0.0.0:5353           *:*                                    14724
  UDP    0.0.0.0:5353           *:*                                    2228
  UDP    0.0.0.0:5353           *:*                                    14724
  UDP    0.0.0.0:5355           *:*                                    2228
  UDP    0.0.0.0:27036          *:*                                    13252
  UDP    0.0.0.0:50000          *:*                                    3096
  UDP    0.0.0.0:51434          *:*                                    12628
  UDP    0.0.0.0:51463          *:*                                    2228
  UDP    0.0.0.0:52896          *:*                                    2972
  UDP    0.0.0.0:54915          *:*                                    9776
  UDP    0.0.0.0:55446          *:*                                    4296
  UDP    0.0.0.0:55758          *:*                                    4496
  UDP    0.0.0.0:55760          *:*                                    3644
  UDP    0.0.0.0:56956          *:*                                    14116
  UDP    0.0.0.0:58433          *:*                                    9864
  UDP    0.0.0.0:58768          *:*                                    2228
  UDP    0.0.0.0:63847          *:*                                    11276
  UDP    10.34.154.56:137       *:*                                    4
  UDP    10.34.154.56:138       *:*                                    4
  UDP    10.34.154.56:1900      *:*                                    3656
  UDP    10.34.154.56:5353      *:*                                    4296
  UDP    10.34.154.56:56897     *:*                                    3656
  UDP    127.0.0.1:1900         *:*                                    3656
  UDP    127.0.0.1:10010        *:*                                    8584
  UDP    127.0.0.1:10011        *:*                                    7008
  UDP    127.0.0.1:52898        *:*                                    3932
  UDP    127.0.0.1:56898        *:*                                    3656
  UDP    127.0.0.1:57044        *:*                                    7016
  UDP    192.168.2.100:137      *:*                                    4
  UDP    192.168.2.100:138      *:*                                    4
  UDP    192.168.2.100:1900     *:*                                    3656
  UDP    192.168.2.100:5353     *:*                                    4296
  UDP    192.168.2.100:5353     *:*                                    4496
  UDP    192.168.2.100:56896    *:*                                    3656
  UDP    [::]:500               *:*                                    4200
  UDP    [::]:3702              *:*                                    3096
  UDP    [::]:3702              *:*                                    3096
  UDP    [::]:3702              *:*                                    2972
  UDP    [::]:3702              *:*                                    2972
  UDP    [::]:4500              *:*                                    4200
  UDP    [::]:5353              *:*                                    2228
  UDP    [::]:5353              *:*                                    14724
  UDP    [::]:5353              *:*                                    14724
  UDP    [::]:5355              *:*                                    2228
  UDP    [::]:50001             *:*                                    3096
  UDP    [::]:51434             *:*                                    12628
  UDP    [::]:51463             *:*                                    2228
  UDP    [::]:52897             *:*                                    2972
  UDP    [::]:54915             *:*                                    9776
  UDP    [::]:55447             *:*                                    4296
  UDP    [::]:55759             *:*                                    4496
  UDP    [::]:58768             *:*                                    2228
  UDP    [::1]:1900             *:*                                    3656
  UDP    [::1]:5353             *:*                                    4496
  UDP    [::1]:5353             *:*                                    4296
  UDP    [::1]:56895            *:*                                    3656
  UDP    [x:740e%8]:1900  *:*                                    3656
  UDP    [x:740e%8]:56893  *:*                                    3656
  UDP    [x:e4d0%14]:546  *:*                                    1912
  UDP    [x%14]:1900  *:*                                    3656
  UDP    [x:e4d0%14]:56894  *:*                                    3656

Share this post


Link to post
54 minutes ago, giganerd said:

I think I'm asking superfluously, but when you run these checks, is the software running as well? Is it listening on all interfaces/IP addresses or at least on the 10.x / TAP one?


I am checking for ports on the website (and qbittorrent is also not reaching it) when I am connected to a server while the new eddie is running, if that is what you re asking :)
I know, it seems like a weirdly specific thing, but thanks for sticking with me.

Share this post


Link to post

The interesting thing is that neither of the ports you posted earlier show up in the netstat. Are you 150%, absolutely and unequivocally sure you configured your softwares correctly to use these ports? Or did you change the ports already?
Also, I should've known that -o only posts a process ID and not also the name like on Linux. I don't know of any command line way to show the names..

Do you have another machine, preferably with the same operating system, you can test your scenario with?


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Hey, booted up my windows 10 laptop, installed eddie and after connecting to a server tried to check the ports online, again no success 😕

Here's netstat with qbittorent running/listening to 20157 (PID 14688 = Qbittorent according to taskmanager/details)

Proto Local Address Foreign Address State PID
TCP 0.0.0.0:135 0.0.0.0:0 LISTENING 1004
TCP 0.0.0.0:445 0.0.0.0:0 LISTENING 4
TCP 0.0.0.0:5040 0.0.0.0:0 LISTENING 6608
TCP 0.0.0.0:5357 0.0.0.0:0 LISTENING 4
TCP 0.0.0.0:7680 0.0.0.0:0 LISTENING 3552
TCP 0.0.0.0:27036 0.0.0.0:0 LISTENING 11064
TCP 0.0.0.0:49664 0.0.0.0:0 LISTENING 580
TCP 0.0.0.0:49665 0.0.0.0:0 LISTENING 1488
TCP 0.0.0.0:49666 0.0.0.0:0 LISTENING 1304
TCP 0.0.0.0:49667 0.0.0.0:0 LISTENING 2256
TCP 0.0.0.0:49668 0.0.0.0:0 LISTENING 3576
TCP 0.0.0.0:49669 0.0.0.0:0 LISTENING 652
TCP 0.0.0.0:49689 0.0.0.0:0 LISTENING 672
TCP 0.0.0.0:50962 0.0.0.0:0 LISTENING 10116
TCP 0.0.0.0:57621 0.0.0.0:0 LISTENING 10116
TCP 10.10.122.247:139 0.0.0.0:0 LISTENING 4
TCP 10.10.122.247:50923 77.79.249.114:443 ESTABLISHED 12564
TCP 10.10.122.247:50924 155.133.248.34:27022 ESTABLISHED 11064
TCP 10.10.122.247:50926 23.38.16.188:443 ESTABLISHED 12564
TCP 10.10.122.247:50927 77.79.249.114:443 ESTABLISHED 12564
TCP 10.10.122.247:50928 172.217.168.238:443 ESTABLISHED 1600
TCP 10.10.122.247:50935 35.190.242.42:443 ESTABLISHED 10116
TCP 10.10.122.247:50936 35.186.224.53:443 ESTABLISHED 10116
TCP 10.10.122.247:50937 35.186.224.53:443 ESTABLISHED 5888
TCP 10.10.122.247:50939 35.186.224.47:443 ESTABLISHED 10116
TCP 10.10.122.247:50940 173.194.79.188:5228 ESTABLISHED 1600
TCP 10.10.122.247:50943 23.66.23.40:443 ESTABLISHED 11456
TCP 10.10.122.247:50952 23.217.99.130:443 TIME_WAIT 0
TCP 10.10.122.247:50953 172.217.168.238:443 ESTABLISHED 11456
TCP 10.10.122.247:50954 88.221.254.16:443 ESTABLISHED 11456
TCP 10.10.122.247:50955 13.107.42.11:443 ESTABLISHED 1600
TCP 10.10.122.247:50958 13.69.188.18:443 ESTABLISHED 1600
TCP 10.10.122.247:50961 31.13.64.11:443 ESTABLISHED 6384
TCP 10.10.122.247:50963 40.74.32.146:443 ESTABLISHED 1600
TCP 10.10.122.247:50964 40.74.32.146:443 ESTABLISHED 1600
TCP 10.10.122.247:50967 31.13.64.48:443 ESTABLISHED 6384
TCP 10.10.122.247:50968 31.13.64.48:443 ESTABLISHED 6384
TCP 10.10.122.247:50969 31.13.64.48:443 ESTABLISHED 6384
TCP 10.10.122.247:50973 172.217.17.110:443 TIME_WAIT 0
TCP 10.10.122.247:50975 157.240.27.27:443 TIME_WAIT 0
TCP 10.10.122.247:50976 31.13.64.35:443 TIME_WAIT 0
TCP 10.10.122.247:50977 31.13.64.21:443 TIME_WAIT 0
TCP 10.10.122.247:50979 31.13.64.48:443 ESTABLISHED 6384
TCP 10.10.122.247:50983 52.158.24.209:443 TIME_WAIT 0
TCP 10.10.122.247:50986 52.114.77.33:443 ESTABLISHED 1600
TCP 10.10.122.247:50987 172.217.17.133:443 ESTABLISHED 1600
TCP 10.10.122.247:50988 172.217.17.46:443 TIME_WAIT 0
TCP 10.10.122.247:50991 104.18.20.226:80 ESTABLISHED 4112
TCP 10.10.122.247:50992 88.221.255.147:80 ESTABLISHED 4112
TCP 10.10.122.247:50998 31.13.64.11:443 ESTABLISHED 6384
TCP 10.10.122.247:51000 88.221.255.147:80 ESTABLISHED 4112
TCP 10.10.122.247:51002 204.79.197.200:443 TIME_WAIT 0
TCP 10.10.122.247:51003 204.79.197.200:443 TIME_WAIT 0
TCP 10.10.122.247:51004 204.79.197.200:443 TIME_WAIT 0
TCP 10.10.122.247:51005 13.107.18.11:443 TIME_WAIT 0
TCP 10.10.122.247:51006 13.107.18.11:443 TIME_WAIT 0
TCP 10.10.122.247:51010 104.20.137.9:443 ESTABLISHED 14688
TCP 10.10.122.247:51011 188.138.70.92:80 ESTABLISHED 14688
TCP 10.10.122.247:51012 104.27.131.137:80 ESTABLISHED 14688
TCP 10.10.122.247:51015 167.114.44.150:80 ESTABLISHED 14688
TCP 10.10.122.247:51016 208.83.20.110:80 ESTABLISHED 14688
TCP 10.10.122.247:51017 138.255.103.85:80 ESTABLISHED 14688
TCP 10.10.122.247:51020 167.114.44.150:443 ESTABLISHED 14688
TCP 10.10.122.247:51021 208.83.20.110:443 ESTABLISHED 14688
TCP 10.10.122.247:51025 167.114.44.150:443 TIME_WAIT 0
TCP 10.10.122.247:51026 167.114.44.150:443 TIME_WAIT 0
TCP 10.10.122.247:51027 167.114.44.150:443 TIME_WAIT 0
TCP 10.10.122.247:51028 167.114.44.150:443 TIME_WAIT 0
TCP 10.10.122.247:51029 152.199.19.161:443 ESTABLISHED 8432
TCP 10.10.122.247:51030 13.107.255.72:443 ESTABLISHED 8432
TCP 10.10.122.247:51031 131.253.33.254:443 ESTABLISHED 8432
TCP 10.10.122.247:51032 204.79.197.222:443 ESTABLISHED 8432
TCP 10.10.122.247:51033 204.79.197.200:443 ESTABLISHED 8432
TCP 10.10.122.247:51034 52.209.210.113:443 ESTABLISHED 1600
TCP 10.10.122.247:51036 13.107.18.11:443 ESTABLISHED 8432
TCP 10.10.122.247:51037 13.107.246.254:443 ESTABLISHED 8432
TCP 127.0.0.1:3100 0.0.0.0:0 LISTENING 5696
TCP 127.0.0.1:3100 127.0.0.1:50914 ESTABLISHED 5696
TCP 127.0.0.1:5939 0.0.0.0:0 LISTENING 4524
TCP 127.0.0.1:9977 0.0.0.0:0 LISTENING 13844
TCP 127.0.0.1:9977 127.0.0.1:49862 ESTABLISHED 13844
TCP 127.0.0.1:20157 0.0.0.0:0 LISTENING 14688
TCP 127.0.0.1:27060 0.0.0.0:0 LISTENING 11064
TCP 127.0.0.1:49735 127.0.0.1:49736 ESTABLISHED 6384
TCP 127.0.0.1:49736 127.0.0.1:49735 ESTABLISHED 6384
TCP 127.0.0.1:49738 127.0.0.1:49739 ESTABLISHED 6384
TCP 127.0.0.1:49739 127.0.0.1:49738 ESTABLISHED 6384
TCP 127.0.0.1:49857 127.0.0.1:65001 ESTABLISHED 4328
TCP 127.0.0.1:49862 127.0.0.1:9977 ESTABLISHED 12564
TCP 127.0.0.1:49867 0.0.0.0:0 LISTENING 7976
TCP 127.0.0.1:49867 127.0.0.1:49907 ESTABLISHED 7976
TCP 127.0.0.1:49907 127.0.0.1:49867 ESTABLISHED 13952
TCP 127.0.0.1:50914 127.0.0.1:3100 ESTABLISHED 8120
TCP 127.0.0.1:51008 127.0.0.1:51009 ESTABLISHED 14688
TCP 127.0.0.1:51009 127.0.0.1:51008 ESTABLISHED 14688
TCP 127.0.0.1:65001 0.0.0.0:0 LISTENING 4328
TCP 127.0.0.1:65001 127.0.0.1:49857 ESTABLISHED 4328
TCP 192.168.2.100:139 0.0.0.0:0 LISTENING 4
TCP [::]:135 [::]:0 LISTENING 1004
TCP [::]:445 [::]:0 LISTENING 4
TCP [::]:5357 [::]:0 LISTENING 4
TCP [::]:7680 [::]:0 LISTENING 3552
TCP [::]:49664 [::]:0 LISTENING 580
TCP [::]:49665 [::]:0 LISTENING 1488
TCP [::]:49666 [::]:0 LISTENING 1304
TCP [::]:49667 [::]:0 LISTENING 2256
TCP [::]:49668 [::]:0 LISTENING 3576
TCP [::]:49669 [::]:0 LISTENING 652
TCP [::]:49689 [::]:0 LISTENING 672
TCP [X::10f5]:50972 [X:0:2]:443 ESTABLISHED 1600
TCP [X::10f5]:51035 [X:c40b]:80 ESTABLISHED 11064
UDP 0.0.0.0:500 *:* 4240
UDP 0.0.0.0:3702 *:* 344
UDP 0.0.0.0:3702 *:* 2980
UDP 0.0.0.0:3702 *:* 2980
UDP 0.0.0.0:3702 *:* 344
UDP 0.0.0.0:4500 *:* 4240
UDP 0.0.0.0:5050 *:* 6608
UDP 0.0.0.0:5353 *:* 10984
UDP 0.0.0.0:5353 *:* 1600
UDP 0.0.0.0:5353 *:* 10984
UDP 0.0.0.0:5353 *:* 10116
UDP 0.0.0.0:5353 *:* 10984
UDP 0.0.0.0:5353 *:* 1600
UDP 0.0.0.0:5353 *:* 2180
UDP 0.0.0.0:5353 *:* 10116
UDP 0.0.0.0:5353 *:* 10984
UDP 0.0.0.0:5355 *:* 2180
UDP 0.0.0.0:6771 *:* 14688
UDP 0.0.0.0:6771 *:* 14688
UDP 0.0.0.0:27036 *:* 11064
UDP 0.0.0.0:51324 *:* 1600
UDP 0.0.0.0:54915 *:* 9284
UDP 0.0.0.0:55104 *:* 4524
UDP 0.0.0.0:55106 *:* 3576
UDP 0.0.0.0:56682 *:* 1600
UDP 0.0.0.0:57621 *:* 10116
UDP 0.0.0.0:57926 *:* 14688
UDP 0.0.0.0:57928 *:* 14688
UDP 0.0.0.0:58014 *:* 5696
UDP 0.0.0.0:58899 *:* 10116
UDP 0.0.0.0:58900 *:* 10116
UDP 0.0.0.0:59041 *:* 11064
UDP 0.0.0.0:59537 *:* 4328
UDP 0.0.0.0:63299 *:* 13844
UDP 0.0.0.0:64383 *:* 1600
UDP 0.0.0.0:64908 *:* 2980
UDP 0.0.0.0:64914 *:* 344
UDP 10.10.122.247:137 *:* 4
UDP 10.10.122.247:138 *:* 4
UDP 10.10.122.247:1900 *:* 3324
UDP 10.10.122.247:5353 *:* 4328
UDP 10.10.122.247:6771 *:* 14688
UDP 10.10.122.247:52004 *:* 3324
UDP 10.10.122.247:63487 *:* 14688
UDP 127.0.0.1:1900 *:* 3324
UDP 127.0.0.1:10010 *:* 7976
UDP 127.0.0.1:10011 *:* 6660
UDP 127.0.0.1:20157 *:* 14688
UDP 127.0.0.1:52005 *:* 3324
UDP 127.0.0.1:64472 *:* 5260
UDP 127.0.0.1:64916 *:* 3992
UDP 192.168.2.100:137 *:* 4
UDP 192.168.2.100:138 *:* 4
UDP 192.168.2.100:1900 *:* 3324
UDP 192.168.2.100:2177 *:* 7660
UDP 192.168.2.100:5353 *:* 4328
UDP 192.168.2.100:5353 *:* 4524
UDP 192.168.2.100:6771 *:* 14688
UDP 192.168.2.100:52003 *:* 3324
UDP 192.168.2.100:63488 *:* 14688
UDP [::]:500 *:* 4240
UDP [::]:3702 *:* 344
UDP [::]:3702 *:* 2980
UDP [::]:3702 *:* 2980
UDP [::]:3702 *:* 344
UDP [::]:4500 *:* 4240
UDP [::]:5353 *:* 10984
UDP [::]:5353 *:* 2180
UDP [::]:5353 *:* 10984
UDP [::]:5353 *:* 1600
UDP [::]:5355 *:* 2180
UDP [::]:6771 *:* 14688
UDP [::]:54915 *:* 9284
UDP [::]:55105 *:* 4524
UDP [::]:57927 *:* 14688
UDP [::]:57929 *:* 14688
UDP [::]:59538 *:* 4328
UDP [::]:64909 *:* 2980
UDP [::]:64915 *:* 344
UDP [::1]:1900 *:* 3324
UDP [::1]:5353 *:* 4328
UDP [::1]:5353 *:* 4524
UDP [::1]:52002 *:* 3324
UDP [X::10f5]:6771 *:* 14688
UDP [X::10f5]:57920 *:* 14688
UDP [X:7c15]:2177 *:* 7660
UDP [X:7c15]:6771 *:* 14688
UDP [X:7c15]:57923 *:* 14688
UDP [X:740e]:2177 *:* 7660
UDP [X:740e]:6771 *:* 14688
UDP [X:740e]:57922 *:* 14688
UDP [X:740e%8]:1900 *:* 3324
UDP [X:740e%8]:2177 *:* 7660
UDP [X:740e%8]:6771 *:* 14688
UDP [X:740e%8]:52000 *:* 3324
UDP [X:740e%8]:57924 *:* 14688
UDP [X:e4d0%14]:1900 *:* 3324
UDP [X:e4d0%14]:6771 *:* 14688
UDP [X:e4d0%14]:52001 *:* 3324
UDP [X:e4d0%14]:57921 *:* 14688

Share this post


Link to post

Okay, it should work, then. You could try binding qB to the TAP interface. Doubt it will make it work, so it'll be a desperate action. :D

I'm just going to shoot out ideas, no guarantee they're good ones :)

  • What was the last thing you did before it stopped working? Installed something? Made an update? Changed a setting anywhere, even if it was an UI setting? Something in the router?
  • Are there any other connections to AirVPN you can see in the client area? If yes, kill them all via the respective buttons, wait a moment and retry a connection.
  • Maybe try another OS? Or in another network?
  • Try another program, maybe? Though you wrote it didn't work with any program.
  • There's a tool called netcat which allows to create arbitrary sockets. It's possible to setup a listening socket using it so that one can test whether connections are actually coming through while netcat explicitly tells you the results. There's a windows version also, usage should be similar to Linux, so something like this will work:
    netcat.exe -4 -v -l -s [IPv4 of the TAP interface] -p 20157
    Then try a test on the port forwarding page or on canyouseeme.org again. If nc doesn't print any connection attempts, I don't know anymore.

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

I uninstalled eddie and openTap, reinstalled (but version 2.18) and it fails to connect while checking IPv6.

Unfortunately I dont have another OS /Network. 
Tracing back my steps, the only relevant thing that happened besides any automatic windows updates would be me re-installing openVPN in preparation for home office these weeks.
(I also tried with OpenVPN and download a configuration from the website with no more luck regarding the ports)
Here's the log while trying to connect today.

I 2020.03.29 12:28:00 - Session starting.
I 2020.03.29 12:28:00 - Checking authorization ...
! 2020.03.29 12:28:00 - Connecting to Hassaleh (Netherlands, Alblasserdam)
. 2020.03.29 12:28:00 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
. 2020.03.29 12:28:00 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.03.29 12:28:00 - OpenVPN > library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10
. 2020.03.29 12:28:00 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.03.29 12:28:00 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.03.29 12:28:00 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.03.29 12:28:00 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.03.29 12:28:00 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.42:443
. 2020.03.29 12:28:00 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.03.29 12:28:00 - OpenVPN > UDP link local: (not bound)
. 2020.03.29 12:28:00 - OpenVPN > UDP link remote: [AF_INET]213.152.161.42:443
. 2020.03.29 12:28:00 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.42:443, sid=43736556
. 2020.03.29 12:28:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.03.29 12:28:01 - OpenVPN > VERIFY KU OK
. 2020.03.29 12:28:01 - OpenVPN > Validating certificate extended key usage
. 2020.03.29 12:28:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.03.29 12:28:01 - OpenVPN > VERIFY EKU OK
. 2020.03.29 12:28:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hassaleh, emailAddress=info@airvpn.org
. 2020.03.29 12:28:01 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.03.29 12:28:01 - OpenVPN > [Hassaleh] Peer Connection Initiated with [AF_INET]213.152.161.42:443
. 2020.03.29 12:28:02 - OpenVPN > SENT CONTROL [Hassaleh]: 'PUSH_REQUEST' (status=1)
. 2020.03.29 12:28:02 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.18.154.1,dhcp-option DNS6 :e9a::1,tun-ipv6,route-gateway 10.18.154.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 :e9a::10b4/64 :e9a::1,ifconfig 10.18.154.182 255.255.255.0,peer-id 1,cipher AES-256-GCM'
. 2020.03.29 12:28:02 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.03.29 12:28:02 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.03.29 12:28:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.03.29 12:28:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.03.29 12:28:02 - OpenVPN > interactive service msg_channel=0
. 2020.03.29 12:28:02 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=8 HWADDR=:8d
. 2020.03.29 12:28:02 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.03.29 12:28:02 - OpenVPN > GetBestInterfaceEx() returned if=8
. 2020.03.29 12:28:02 - OpenVPN > GDG6: II=8 DP=::/0 NH=:feda:6b08
. 2020.03.29 12:28:02 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0
. 2020.03.29 12:28:02 - OpenVPN > ROUTE6_GATEWAY :6b08 I=8
. 2020.03.29 12:28:02 - OpenVPN > open_tun
. 2020.03.29 12:28:02 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{-ACC976A1EC99}.tap
. 2020.03.29 12:28:02 - OpenVPN > TAP-Windows Driver Version 9.24
. 2020.03.29 12:28:02 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.18.154.0/10.18.154.182/255.255.255.0 [SUCCEEDED]
. 2020.03.29 12:28:02 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.18.154.182/255.255.255.0 on interface {-ACC976A1EC99} [DHCP-serv: 10.18.154.254, lease-time: 31536000]
. 2020.03.29 12:28:02 - OpenVPN > Successful ARP Flush on interface [14] {-ACC976A1EC99}
. 2020.03.29 12:28:03 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=14 ::10b4 store=active
. 2020.03.29 12:28:04 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Local Area Connection static :e9a::1 validate=no
. 2020.03.29 12:28:04 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.
. 2020.03.29 12:28:04 - OpenVPN > add_route_ipv6(::/64 -> ::10b4 metric 0) dev Local Area Connection
. 2020.03.29 12:28:04 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route :e9a::/64 interface=14 fe80::8 store=active
. 2020.03.29 12:28:04 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.03.29 12:28:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.42 MASK 255.255.255.255 192.168.2.1
. 2020.03.29 12:28:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.03.29 12:28:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.18.154.1
. 2020.03.29 12:28:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.03.29 12:28:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.18.154.1
. 2020.03.29 12:28:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.03.29 12:28:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.03.29 12:28:09 - OpenVPN > add_route_ipv6(::/3 -> f:e9a::1 metric -1) dev Local Area Connection
. 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=14 fe80::8 store=active
. 2020.03.29 12:28:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.03.29 12:28:09 - OpenVPN > add_route_ipv6(2000::/4 -> :e9a::1 metric -1) dev Local Area Connection
. 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=14 fe80::8 store=active
. 2020.03.29 12:28:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.03.29 12:28:09 - OpenVPN > add_route_ipv6(3000::/4 ->:e9a::1 metric -1) dev Local Area Connection
. 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=14 fe80::8 store=active
. 2020.03.29 12:28:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.03.29 12:28:10 - OpenVPN > add_route_ipv6(fc00::/7 -> :e9a::1 metric -1) dev Local Area Connection
. 2020.03.29 12:28:10 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=14 fe80::8 store=active
. 2020.03.29 12:28:10 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.03.29 12:28:10 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4
. 2020.03.29 12:28:10 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6
. 2020.03.29 12:28:10 - DNS leak protection with packet filtering enabled.
. 2020.03.29 12:28:10 - Routes, added a new route, 213.152.161.40 for gateway 10.18.154.1
. 2020.03.29 12:28:10 - Routes, added a new route, :3810 for gateway :e9a::1
. 2020.03.29 12:28:10 - Flushing DNS
I 2020.03.29 12:28:10 - Checking route IPv4
I 2020.03.29 12:28:10 - Checking route IPv6
. 2020.03.29 12:28:30 - curl: (28) Connection timed out after 20000 milliseconds
. 2020.03.29 12:28:30 - Checking route (2° try)
. 2020.03.29 12:28:51 - curl: (28) Connection timed out after 20000 milliseconds
. 2020.03.29 12:28:51 - Checking route (3° try)
. 2020.03.29 12:29:13 - curl: (28) Connection timed out after 20000 milliseconds
E 2020.03.29 12:29:13 - Checking route IPv6 failed.
. 2020.03.29 12:29:13 - OpenVPN > Initialization Sequence Completed
! 2020.03.29 12:29:13 - Disconnecting
. 2020.03.29 12:29:13 - Routes, removed a route previously added, 213.152.161.40 for gateway 10.18.154.1
. 2020.03.29 12:29:14 - Routes, removed a route previously added, :d71f:3810 for gateway :e9a::1
. 2020.03.29 12:29:14 - Sending soft termination signal
. 2020.03.29 12:29:17 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.03.29 12:29:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.42 MASK 255.255.255.255 192.168.2.1
. 2020.03.29 12:29:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.03.29 12:29:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.18.154.1
. 2020.03.29 12:29:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.03.29 12:29:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.18.154.1
. 2020.03.29 12:29:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.03.29 12:29:19 - OpenVPN > delete_route_ipv6(::/3)
. 2020.03.29 12:29:19 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=14 fe80::8 store=active
. 2020.03.29 12:29:19 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.03.29 12:29:20 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.03.29 12:29:20 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=14 fe80::8 store=active
. 2020.03.29 12:29:20 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.03.29 12:29:20 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.03.29 12:29:20 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=14 fe80::8 store=active
. 2020.03.29 12:29:20 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.03.29 12:29:20 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.03.29 12:29:20 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=14 fe80::8 store=active
. 2020.03.29 12:29:20 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.03.29 12:29:20 - OpenVPN > Closing TUN/TAP interface
. 2020.03.29 12:29:20 - OpenVPN > delete_route_ipv6(:e9a::/64)
. 2020.03.29 12:29:20 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route:e9a::/64 interface=14 fe80::8 store=active
. 2020.03.29 12:29:21 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Local Area Connection :e9a::10b4 store=active
. 2020.03.29 12:29:22 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Local Area Connection all
. 2020.03.29 12:29:22 - OpenVPN > TAP: DHCP address released
. 2020.03.29 12:29:22 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.03.29 12:29:22 - Connection terminated.
. 2020.03.29 12:29:22 - DNS leak protection with packet filtering disabled.
. 2020.03.29 12:29:22 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4
. 2020.03.29 12:29:22 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6
I 2020.03.29 12:29:24 - Cancel requested.
! 2020.03.29 12:29:24 - Session terminated.
! 2020.03.29 12:29:25 - Deactivation of Network Lock
 

Share this post


Link to post
7 hours ago, deadalus said:

I uninstalled eddie and openTap, reinstalled (but version 2.18) and it fails to connect while checking IPv6.


Hm, yes, that is a new one. If you do Preferences > Networking > Layer IPv6: Block, does it change anything?

Also, you called it "openTap". Is this the official TAP installation you get from Eddie/openvpn.net, or something else?

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Nice, it connects to the server normally now, ports still not available though.
OpenTap (not sure if name was exact) was available under apps and programs installed around the same time as openVPN, in the timespan since the last time I checked qbittorent when it was working (sometime in March).
I just thought that doing a uninstall of all 3 and reinstalling eddie after that (and I went with 2.18 cause you also mentioned more potential fixes) would do the trick.

I 2020.03.29 22:15:40 - Session starting.
I 2020.03.29 22:15:41 - Checking authorization ...
. 2020.03.29 22:15:41 - IPv6 disabled with packet filtering.
! 2020.03.29 22:15:41 - Connecting to Alpheratz (Netherlands, Alblasserdam)
. 2020.03.29 22:15:41 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
. 2020.03.29 22:15:41 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.03.29 22:15:41 - OpenVPN > library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10
. 2020.03.29 22:15:41 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.03.29 22:15:41 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.03.29 22:15:41 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.03.29 22:15:41 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.03.29 22:15:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.245:443
. 2020.03.29 22:15:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.03.29 22:15:41 - OpenVPN > UDP link local: (not bound)
. 2020.03.29 22:15:41 - OpenVPN > UDP link remote: [AF_INET]134.19.179.245:443
. 2020.03.29 22:15:41 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.245:443, sid= 5795ac58
. 2020.03.29 22:15:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.03.29 22:15:42 - OpenVPN > VERIFY KU OK
. 2020.03.29 22:15:42 - OpenVPN > Validating certificate extended key usage
. 2020.03.29 22:15:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.03.29 22:15:42 - OpenVPN > VERIFY EKU OK
. 2020.03.29 22:15:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alpheratz, emailAddress=info@airvpn.org
. 2020.03.29 22:15:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.03.29 22:15:42 - OpenVPN > [Alpheratz] Peer Connection Initiated with [AF_INET]134.19.179.245:443
. 2020.03.29 22:15:43 - OpenVPN > SENT CONTROL [Alpheratz]: 'PUSH_REQUEST' (status=1)
. 2020.03.29 22:15:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.218.1,dhcp-option DNS6 :1cda::1,tun-ipv6,route-gateway 10.32.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 :1cda::106e/64 1cda::1,ifconfig 10.32.218.112 255.255.255.0,peer-id 3,cipher AES-256-GCM'
. 2020.03.29 22:15:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.03.29 22:15:43 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 :1cda::1'
. 2020.03.29 22:15:43 - OpenVPN > Pushed option removed by filter: 'tun-ipv6'
. 2020.03.29 22:15:43 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 :1cda::106e/64 :1cda::1'
. 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.03.29 22:15:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.03.29 22:15:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.03.29 22:15:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.03.29 22:15:43 - OpenVPN > interactive service msg_channel=0
. 2020.03.29 22:15:43 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=8 HWADDR=:ed:8d
. 2020.03.29 22:15:43 - OpenVPN > open_tun
. 2020.03.29 22:15:43 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{6-ACC976A1EC99}.tap
. 2020.03.29 22:15:43 - OpenVPN > TAP-Windows Driver Version 9.24
. 2020.03.29 22:15:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.32.218.0/10.32.218.112/255.255.255.0 [SUCCEEDED]
. 2020.03.29 22:15:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.32.218.112/255.255.255.0 on interface {6-ACC976A1EC99} [DHCP-serv: 10.32.218.254, lease-time: 31536000]
. 2020.03.29 22:15:43 - OpenVPN > Successful ARP Flush on interface [14] {6-ACC976A1EC99}
. 2020.03.29 22:15:48 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.03.29 22:15:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 134.19.179.245 MASK 255.255.255.255 192.168.2.1
. 2020.03.29 22:15:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.03.29 22:15:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.03.29 22:15:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.32.218.1
. 2020.03.29 22:15:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.03.29 22:15:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.03.29 22:15:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.32.218.1
. 2020.03.29 22:15:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.03.29 22:15:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.03.29 22:15:48 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4
. 2020.03.29 22:15:48 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6
. 2020.03.29 22:15:48 - DNS leak protection with packet filtering enabled.
. 2020.03.29 22:15:48 - Routes, added a new route, 134.19.179.243 for gateway 10.32.218.1
. 2020.03.29 22:15:48 - Unable to compute route for :fcac:44b9: IPv6 VPN gateway not available.
. 2020.03.29 22:15:48 - Flushing DNS
I 2020.03.29 22:15:48 - Checking route IPv4
I 2020.03.29 22:15:48 - Checking DNS
! 2020.03.29 22:15:49 - Connected.
. 2020.03.29 22:15:49 - OpenVPN > Initialization Sequence Completed

Share this post


Link to post

Okay.

Well, I'm at the end of my wisdom. If no one else got any ideas, consider opening a support ticket. If you happen to resolve it, please report back here.
Really sorry. :(


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
4 hours ago, alfredox123 said:

what should i do?


Opening your own thread; this is Mr. deadalus' thread and the cause for your port forwarding problem can be very different. I prefer those two setups not to be mixed.

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...