Jump to content
Not connected, Your IP: 3.236.164.119
deadalus

Port Forwarding Not Working anymore

Recommended Posts

Hello,

I 've been using airVPN for a bit over a year now, read a couple of guides and have had qbittorrent successfully running with a forwarded port, until today ūüėē¬†(This might have started earlier, I haven't tried to download anything in a few weeks)

-All my torrents were showing 0/0 seeds/leechers, even though I m pretty sure they have a few thousands.
- Double checked airVPN port and qbittorrrent port, nothing was changed.
- Tried different servers, tried using a few new ports, no luck

Am I the only one with this problem, or could it be related somehow with the current situation in central Europe?

Thanks!

394539793_Annotation2020-03-22112651.thumb.png.f5ac6defc6044cdfdc0f6770057e28e7.png

 

Share this post


Link to post

Try forwarding a new random port and use that, then.


¬Ľ I am not an AirVPN team member. All opinions are my own and are not to be considered official. Only the AirVPN Staff account should be viewed as such.

¬Ľ The forums is a place where you can ask questions to the community. You are not entitled to guaranteed answer times. Answer quality may vary, too. If you need professional support, please create tickets.

¬Ľ If you're new, take some time to read LZ1's New User Guide to AirVPN. On questions, use the search function first. On errors, search for the error message instead.

¬Ľ If you choose to create a new thread, keep in mind that we don't know your setup. Give info about it. Never forget the OpenVPN logs or, for Eddie, the support file (Logs > lifebelt icon).

¬Ľ The community kindly asks you to not set up Tor exit relays when connected to AirVPN. Their IP addresses are subject to restrictions and these are relayed to all users of the affected servers.

 

¬Ľ Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, chances are you will be unique amond the mass again.

Share this post


Link to post

Yeah as I said, I already tried a few different ports on different servers -> both on canyouseeme and on airvpn/ports they still appear blocked ūüėē

Share this post


Link to post

Appear blocked as in actively rejected or a timeout? Is there a firewall you are using?
What's your client and version? OS?

Actually, some logs would be nice. If you're using Eddie, paste a support file instead (Logs > Lifebelt icon).


¬Ľ I am not an AirVPN team member. All opinions are my own and are not to be considered official. Only the AirVPN Staff account should be viewed as such.

¬Ľ The forums is a place where you can ask questions to the community. You are not entitled to guaranteed answer times. Answer quality may vary, too. If you need professional support, please create tickets.

¬Ľ If you're new, take some time to read LZ1's New User Guide to AirVPN. On questions, use the search function first. On errors, search for the error message instead.

¬Ľ If you choose to create a new thread, keep in mind that we don't know your setup. Give info about it. Never forget the OpenVPN logs or, for Eddie, the support file (Logs > lifebelt icon).

¬Ľ The community kindly asks you to not set up Tor exit relays when connected to AirVPN. Their IP addresses are subject to restrictions and these are relayed to all users of the affected servers.

 

¬Ľ Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, chances are you will be unique amond the mass again.

Share this post


Link to post

Eddie version: 2.13.6

First of all: Please update Eddie. At least to 2.16.3, but the 2.18 beta fixes a multitude of errors of 2.16.3 as well. I'm even surprised you can still connect with 2.13.
When you do this, you can paste another support file here because the amount of info changed greatly. It's more informative in current stable/beta.
 

! 2020.03.22 23:30:36 - Activation of Network Lock - Windows Filtering Platform

Do you experience the same if NetLock is off?

Does it also happen if you use vanilla OpenVPN?

I'd also like to remark that using Google Public DNS is a bad practice since they log pretty much everything. Try OpenNIC Project instead.

And about the IP/MAC things you changed, the Windows interface IDs are useless for the public, private IPv4 addresses cannot be routed by the public as well, but the MAC and certain v6 addresses were rightly hidden. :)

¬Ľ I am not an AirVPN team member. All opinions are my own and are not to be considered official. Only the AirVPN Staff account should be viewed as such.

¬Ľ The forums is a place where you can ask questions to the community. You are not entitled to guaranteed answer times. Answer quality may vary, too. If you need professional support, please create tickets.

¬Ľ If you're new, take some time to read LZ1's New User Guide to AirVPN. On questions, use the search function first. On errors, search for the error message instead.

¬Ľ If you choose to create a new thread, keep in mind that we don't know your setup. Give info about it. Never forget the OpenVPN logs or, for Eddie, the support file (Logs > lifebelt icon).

¬Ľ The community kindly asks you to not set up Tor exit relays when connected to AirVPN. Their IP addresses are subject to restrictions and these are relayed to all users of the affected servers.

 

¬Ľ Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, chances are you will be unique amond the mass again.

Share this post


Link to post

Hey, Sorry for the delay!

I guess I got really used to everything auto-updating nowadays¬†ūüėÖ
Still happens with the new version. Here's the new file!

- It still happens with network lock off unfortunately.
- By vanilla OpenVPN you mean using the default openVPN app to connect? (never tried that before)
- Note: I recently was doing testing an App's  functionality while being offline, so I disabled/re-enabled my ethernet adapter to simulate it. Could that be related? 

Thanks for the support!

log2.txt

Share this post


Link to post

Logs seem to be okay.
 

40 minutes ago, deadalus said:

- By vanilla OpenVPN you mean using the default openVPN app to connect? (never tried that before)


Yes.
 
40 minutes ago, deadalus said:

- Note: I recently was doing testing an App's  functionality while being offline, so I disabled/re-enabled my ethernet adapter to simulate it. Could that be related? 


Were you connected at that time? In this case it should normalize itself after a reconnect.
 
On 3/22/2020 at 7:58 PM, giganerd said:

Appear blocked as in actively rejected or a timeout? Is there a firewall you are using?


Can you answer this, please? Let's extend this question to security software like Kaspersky and firewalls.

¬Ľ I am not an AirVPN team member. All opinions are my own and are not to be considered official. Only the AirVPN Staff account should be viewed as such.

¬Ľ The forums is a place where you can ask questions to the community. You are not entitled to guaranteed answer times. Answer quality may vary, too. If you need professional support, please create tickets.

¬Ľ If you're new, take some time to read LZ1's New User Guide to AirVPN. On questions, use the search function first. On errors, search for the error message instead.

¬Ľ If you choose to create a new thread, keep in mind that we don't know your setup. Give info about it. Never forget the OpenVPN logs or, for Eddie, the support file (Logs > lifebelt icon).

¬Ľ The community kindly asks you to not set up Tor exit relays when connected to AirVPN. Their IP addresses are subject to restrictions and these are relayed to all users of the affected servers.

 

¬Ľ Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, chances are you will be unique amond the mass again.

Share this post


Link to post
Quote

Appear blocked as in actively rejected or a timeout?


I am just running the port test in the client Area/Forwarded ports with it reporting Checking port 20157 for internal IP 10.31.26.68 completed.   and the ports being grey like this
image.png.6d99431d2d1d04c945bfddf48807c7dd.png

And Canyouseeme reports a timeout , same as yougetsignal.com/tools/open-ports

image.png.0b1d574aa6d434701965c1d6375860fa.png

I am not using any firewalls besides the typical windows defender stuff. Connection set as private network and I even tried with Firewall off, still timed out on ports. 
ISP is Vodafone in Germany for what it's worth.
 

Share this post


Link to post

I think I'm asking superfluously, but when you run these checks, is the software running as well? Is it listening on all interfaces/IP addresses or at least on the 10.x / TAP one?

In a privileged cmd/powershell, when you're connected and the software is supposed to be reachable, can you please run netstat -a -o -n?
 

1 hour ago, deadalus said:

ISP is Vodafone in Germany for what it's worth.


That doesn't matter much. I had Vodafone Kabel DE and nothing like this ever happened. I'm being more and more sure that it's a local problem, but I got to admit that I'm slowly running out of ideas.

¬Ľ I am not an AirVPN team member. All opinions are my own and are not to be considered official. Only the AirVPN Staff account should be viewed as such.

¬Ľ The forums is a place where you can ask questions to the community. You are not entitled to guaranteed answer times. Answer quality may vary, too. If you need professional support, please create tickets.

¬Ľ If you're new, take some time to read LZ1's New User Guide to AirVPN. On questions, use the search function first. On errors, search for the error message instead.

¬Ľ If you choose to create a new thread, keep in mind that we don't know your setup. Give info about it. Never forget the OpenVPN logs or, for Eddie, the support file (Logs > lifebelt icon).

¬Ľ The community kindly asks you to not set up Tor exit relays when connected to AirVPN. Their IP addresses are subject to restrictions and these are relayed to all users of the affected servers.

 

¬Ľ Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, chances are you will be unique amond the mass again.

Share this post


Link to post


 Proto  Local Address          Foreign Address        State           PID
  TCP    0.0.0.0:135            0.0.0.0:0              LISTENING       988
  TCP    0.0.0.0:445            0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:5040           0.0.0.0:0              LISTENING       7240
  TCP    0.0.0.0:5357           0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:7680           0.0.0.0:0              LISTENING       3436
  TCP    0.0.0.0:27036          0.0.0.0:0              LISTENING       13252
  TCP    0.0.0.0:49664          0.0.0.0:0              LISTENING       576
  TCP    0.0.0.0:49665          0.0.0.0:0              LISTENING       1508
  TCP    0.0.0.0:49666          0.0.0.0:0              LISTENING       1320
  TCP    0.0.0.0:49667          0.0.0.0:0              LISTENING       2368
  TCP    0.0.0.0:49668          0.0.0.0:0              LISTENING       3644
  TCP    0.0.0.0:49669          0.0.0.0:0              LISTENING       648
  TCP    0.0.0.0:49687          0.0.0.0:0              LISTENING       668
  TCP    10.34.154.56:139       0.0.0.0:0              LISTENING       4
  TCP    10.34.154.56:7688      52.114.89.91:443       TIME_WAIT       0
  TCP    10.34.154.56:10874     52.114.89.91:443       TIME_WAIT       0
  TCP    10.34.154.56:22586     52.114.89.91:443       TIME_WAIT       0
  TCP    10.34.154.56:35013     52.114.89.91:443       TIME_WAIT       0
  TCP    10.34.154.56:38917     52.114.89.91:443       TIME_WAIT       0
  TCP    10.34.154.56:44172     52.114.89.91:443       TIME_WAIT       0
  TCP    10.34.154.56:50009     52.114.89.164:443      TIME_WAIT       0
  TCP    10.34.154.56:50019     52.114.89.164:443      TIME_WAIT       0
  TCP    10.34.154.56:50028     52.114.89.173:443      TIME_WAIT       0
  TCP    10.34.154.56:50038     52.114.89.173:443      TIME_WAIT       0
  TCP    10.34.154.56:50040     52.114.89.165:443      TIME_WAIT       0
  TCP    10.34.154.56:50043     52.114.89.165:443      TIME_WAIT       0
  TCP    10.34.154.56:50045     52.114.89.168:443      TIME_WAIT       0
  TCP    10.34.154.56:50046     52.114.89.168:443      TIME_WAIT       0
  TCP    10.34.154.56:50934     52.114.77.7:443        ESTABLISHED     12628
  TCP    10.34.154.56:50935     52.113.194.132:443     ESTABLISHED     11972
  TCP    10.34.154.56:50936     216.58.208.110:443     ESTABLISHED     11276
  TCP    10.34.154.56:50938     216.58.208.110:443     TIME_WAIT       0
  TCP    10.34.154.56:50939     172.217.17.46:443      ESTABLISHED     11276
  TCP    10.34.154.56:50940     157.240.201.24:443     ESTABLISHED     6600
  TCP    10.34.154.56:50943     134.19.179.187:89      TIME_WAIT       0
  TCP    10.34.154.56:50948     52.114.89.91:443       TIME_WAIT       0
  TCP    10.34.154.56:50952     157.240.201.50:443     ESTABLISHED     6600
  TCP    10.34.154.56:50953     51.140.157.153:443     ESTABLISHED     11972
  TCP    10.34.154.56:50954     108.177.119.188:443    ESTABLISHED     11276
  TCP    10.34.154.56:50961     52.114.75.38:443       ESTABLISHED     12628
  TCP    10.34.154.56:50969     52.114.74.89:443       ESTABLISHED     11972
  TCP    10.34.154.56:50972     5.196.64.52:443        ESTABLISHED     11276
  TCP    10.34.154.56:50974     23.196.233.47:443      ESTABLISHED     13904
  TCP    10.34.154.56:50975     13.107.21.200:443      TIME_WAIT       0
  TCP    10.34.154.56:50976     13.107.21.200:443      TIME_WAIT       0
  TCP    10.34.154.56:50977     13.107.18.11:443       TIME_WAIT       0
  TCP    10.34.154.56:50978     13.107.21.200:443      ESTABLISHED     8812
  TCP    10.34.154.56:50979     13.107.18.254:443      ESTABLISHED     8812
  TCP    10.34.154.56:50980     13.107.246.10:443      ESTABLISHED     8812
  TCP    10.34.154.56:50981     152.199.19.161:443     ESTABLISHED     8812
  TCP    10.34.154.56:50982     204.79.197.222:443     ESTABLISHED     8812
  TCP    10.34.154.56:50983     77.79.249.112:443      ESTABLISHED     13904
  TCP    10.34.154.56:50984     193.59.178.227:443     ESTABLISHED     13904
  TCP    10.34.154.56:50985     193.59.178.227:443     ESTABLISHED     13904
  TCP    10.34.154.56:50986     95.101.78.112:443      ESTABLISHED     11972
  TCP    10.34.154.56:50990     52.114.76.13:443       ESTABLISHED     11972
  TCP    10.34.154.56:50991     77.79.249.112:443      ESTABLISHED     13904
  TCP    10.34.154.56:50992     52.114.74.2:443        ESTABLISHED     11972
  TCP    10.34.154.56:50997     52.113.194.132:443     ESTABLISHED     12628
  TCP    10.34.154.56:50998     52.114.88.28:443       ESTABLISHED     12628
  TCP    10.34.154.56:59683     52.114.89.91:443       TIME_WAIT       0
  TCP    127.0.0.1:3100         0.0.0.0:0              LISTENING       9864
  TCP    127.0.0.1:3100         127.0.0.1:50928        ESTABLISHED     9864
  TCP    127.0.0.1:5939         0.0.0.0:0              LISTENING       4496
  TCP    127.0.0.1:9977         0.0.0.0:0              LISTENING       14116
  TCP    127.0.0.1:9977         127.0.0.1:49873        ESTABLISHED     14116
  TCP    127.0.0.1:27060        0.0.0.0:0              LISTENING       13252
  TCP    127.0.0.1:49725        127.0.0.1:49726        ESTABLISHED     6600
  TCP    127.0.0.1:49726        127.0.0.1:49725        ESTABLISHED     6600
  TCP    127.0.0.1:49730        127.0.0.1:49731        ESTABLISHED     6600
  TCP    127.0.0.1:49731        127.0.0.1:49730        ESTABLISHED     6600
  TCP    127.0.0.1:49733        127.0.0.1:65001        ESTABLISHED     4296
  TCP    127.0.0.1:49735        0.0.0.0:0              LISTENING       8584
  TCP    127.0.0.1:49735        127.0.0.1:49752        ESTABLISHED     8584
  TCP    127.0.0.1:49752        127.0.0.1:49735        ESTABLISHED     7476
  TCP    127.0.0.1:49873        127.0.0.1:9977         ESTABLISHED     13904
  TCP    127.0.0.1:50914        127.0.0.1:50913        TIME_WAIT       0
  TCP    127.0.0.1:50926        127.0.0.1:50925        TIME_WAIT       0
  TCP    127.0.0.1:50928        127.0.0.1:3100         ESTABLISHED     8532
  TCP    127.0.0.1:50930        127.0.0.1:5357         TIME_WAIT       0
  TCP    127.0.0.1:50932        127.0.0.1:5357         TIME_WAIT       0
  TCP    127.0.0.1:50942        127.0.0.1:50941        TIME_WAIT       0
  TCP    127.0.0.1:50945        127.0.0.1:50944        TIME_WAIT       0
  TCP    127.0.0.1:50963        127.0.0.1:50962        TIME_WAIT       0
  TCP    127.0.0.1:50966        127.0.0.1:50965        TIME_WAIT       0
  TCP    127.0.0.1:65001        0.0.0.0:0              LISTENING       4296
  TCP    127.0.0.1:65001        127.0.0.1:49733        ESTABLISHED     4296
  TCP    192.168.2.100:139      0.0.0.0:0              LISTENING       4
  TCP    192.168.2.100:50717    185.60.216.11:443      ESTABLISHED     6600
  TCP    192.168.2.100:50803    52.111.243.6:443       TIME_WAIT       0
  TCP    192.168.2.100:50915    63.33.78.166:80        TIME_WAIT       0
  TCP    192.168.2.100:50927    63.33.78.166:80        TIME_WAIT       0
  TCP    [::]:135               [::]:0                 LISTENING       988
  TCP    [::]:445               [::]:0                 LISTENING       4
  TCP    [::]:5357              [::]:0                 LISTENING       4
  TCP    [::]:7680              [::]:0                 LISTENING       3436
  TCP    [::]:49664             [::]:0                 LISTENING       576
  TCP    [::]:49665             [::]:0                 LISTENING       1508
  TCP    [::]:49666             [::]:0                 LISTENING       1320
  TCP    [::]:49667             [::]:0                 LISTENING       2368
  TCP    [::]:49668             [::]:0                 LISTENING       3644
  TCP    [::]:49669             [::]:0                 LISTENING       648
  TCP    [::]:49687             [::]:0                 LISTENING       668
  TCP    [::1]:50929            [::1]:5357             TIME_WAIT       0
  TCP    [::1]:50931            [::1]:5357             TIME_WAIT       0
  TCP    [X::1036]:50933        [X:b00c:0:2]:443       ESTABLISHED     11276
  TCP    [X::1036]:50946        [X:41:52a6:8a00]:89    TIME_WAIT       0
  TCP    [X::1036]:50956        [X:a004::bfeb:8c34]:443  ESTABLISHED     12628
  TCP    [X::1036]:50967        [X:52a6:8a00]:89       TIME_WAIT       0
  UDP    0.0.0.0:500            *:*                                    4200
  UDP    0.0.0.0:3702           *:*                                    2972
  UDP    0.0.0.0:3702           *:*                                    2972
  UDP    0.0.0.0:3702           *:*                                    3096
  UDP    0.0.0.0:3702           *:*                                    3096
  UDP    0.0.0.0:4500           *:*                                    4200
  UDP    0.0.0.0:5050           *:*                                    7240
  UDP    0.0.0.0:5353           *:*                                    14724
  UDP    0.0.0.0:5353           *:*                                    14724
  UDP    0.0.0.0:5353           *:*                                    14724
  UDP    0.0.0.0:5353           *:*                                    2228
  UDP    0.0.0.0:5353           *:*                                    14724
  UDP    0.0.0.0:5355           *:*                                    2228
  UDP    0.0.0.0:27036          *:*                                    13252
  UDP    0.0.0.0:50000          *:*                                    3096
  UDP    0.0.0.0:51434          *:*                                    12628
  UDP    0.0.0.0:51463          *:*                                    2228
  UDP    0.0.0.0:52896          *:*                                    2972
  UDP    0.0.0.0:54915          *:*                                    9776
  UDP    0.0.0.0:55446          *:*                                    4296
  UDP    0.0.0.0:55758          *:*                                    4496
  UDP    0.0.0.0:55760          *:*                                    3644
  UDP    0.0.0.0:56956          *:*                                    14116
  UDP    0.0.0.0:58433          *:*                                    9864
  UDP    0.0.0.0:58768          *:*                                    2228
  UDP    0.0.0.0:63847          *:*                                    11276
  UDP    10.34.154.56:137       *:*                                    4
  UDP    10.34.154.56:138       *:*                                    4
  UDP    10.34.154.56:1900      *:*                                    3656
  UDP    10.34.154.56:5353      *:*                                    4296
  UDP    10.34.154.56:56897     *:*                                    3656
  UDP    127.0.0.1:1900         *:*                                    3656
  UDP    127.0.0.1:10010        *:*                                    8584
  UDP    127.0.0.1:10011        *:*                                    7008
  UDP    127.0.0.1:52898        *:*                                    3932
  UDP    127.0.0.1:56898        *:*                                    3656
  UDP    127.0.0.1:57044        *:*                                    7016
  UDP    192.168.2.100:137      *:*                                    4
  UDP    192.168.2.100:138      *:*                                    4
  UDP    192.168.2.100:1900     *:*                                    3656
  UDP    192.168.2.100:5353     *:*                                    4296
  UDP    192.168.2.100:5353     *:*                                    4496
  UDP    192.168.2.100:56896    *:*                                    3656
  UDP    [::]:500               *:*                                    4200
  UDP    [::]:3702              *:*                                    3096
  UDP    [::]:3702              *:*                                    3096
  UDP    [::]:3702              *:*                                    2972
  UDP    [::]:3702              *:*                                    2972
  UDP    [::]:4500              *:*                                    4200
  UDP    [::]:5353              *:*                                    2228
  UDP    [::]:5353              *:*                                    14724
  UDP    [::]:5353              *:*                                    14724
  UDP    [::]:5355              *:*                                    2228
  UDP    [::]:50001             *:*                                    3096
  UDP    [::]:51434             *:*                                    12628
  UDP    [::]:51463             *:*                                    2228
  UDP    [::]:52897             *:*                                    2972
  UDP    [::]:54915             *:*                                    9776
  UDP    [::]:55447             *:*                                    4296
  UDP    [::]:55759             *:*                                    4496
  UDP    [::]:58768             *:*                                    2228
  UDP    [::1]:1900             *:*                                    3656
  UDP    [::1]:5353             *:*                                    4496
  UDP    [::1]:5353             *:*                                    4296
  UDP    [::1]:56895            *:*                                    3656
  UDP    [x:740e%8]:1900  *:*                                    3656
  UDP    [x:740e%8]:56893  *:*                                    3656
  UDP    [x:e4d0%14]:546  *:*                                    1912
  UDP    [x%14]:1900  *:*                                    3656
  UDP    [x:e4d0%14]:56894  *:*                                    3656

Share this post


Link to post
54 minutes ago, giganerd said:

I think I'm asking superfluously, but when you run these checks, is the software running as well? Is it listening on all interfaces/IP addresses or at least on the 10.x / TAP one?


I am checking for ports on the website (and qbittorrent is also not reaching it) when I am connected to a server while the new eddie is running, if that is what you re asking :)
I know, it seems like a weirdly specific thing, but thanks for sticking with me.

Share this post


Link to post

The interesting thing is that neither of the ports you posted earlier show up in the netstat. Are you 150%, absolutely and unequivocally sure you configured your softwares correctly to use these ports? Or did you change the ports already?
Also, I should've known that -o only posts a process ID and not also the name like on Linux. I don't know of any command line way to show the names..

Do you have another machine, preferably with the same operating system, you can test your scenario with?


¬Ľ I am not an AirVPN team member. All opinions are my own and are not to be considered official. Only the AirVPN Staff account should be viewed as such.

¬Ľ The forums is a place where you can ask questions to the community. You are not entitled to guaranteed answer times. Answer quality may vary, too. If you need professional support, please create tickets.

¬Ľ If you're new, take some time to read LZ1's New User Guide to AirVPN. On questions, use the search function first. On errors, search for the error message instead.

¬Ľ If you choose to create a new thread, keep in mind that we don't know your setup. Give info about it. Never forget the OpenVPN logs or, for Eddie, the support file (Logs > lifebelt icon).

¬Ľ The community kindly asks you to not set up Tor exit relays when connected to AirVPN. Their IP addresses are subject to restrictions and these are relayed to all users of the affected servers.

 

¬Ľ Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, chances are you will be unique amond the mass again.

Share this post


Link to post

Hey, booted up my windows 10 laptop, installed eddie and after connecting to a server tried to check the ports online, again no success ūüėē¬†

Here's netstat with qbittorent running/listening to 20157 (PID 14688 = Qbittorent according to taskmanager/details)

  Proto  Local Address          Foreign Address        State           PID
  TCP    0.0.0.0:135            0.0.0.0:0              LISTENING       1004
  TCP    0.0.0.0:445            0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:5040           0.0.0.0:0              LISTENING       6608
  TCP    0.0.0.0:5357           0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:7680           0.0.0.0:0              LISTENING       3552
  TCP    0.0.0.0:27036          0.0.0.0:0              LISTENING       11064
  TCP    0.0.0.0:49664          0.0.0.0:0              LISTENING       580
  TCP    0.0.0.0:49665          0.0.0.0:0              LISTENING       1488
  TCP    0.0.0.0:49666          0.0.0.0:0              LISTENING       1304
  TCP    0.0.0.0:49667          0.0.0.0:0              LISTENING       2256
  TCP    0.0.0.0:49668          0.0.0.0:0              LISTENING       3576
  TCP    0.0.0.0:49669          0.0.0.0:0              LISTENING       652
  TCP    0.0.0.0:49689          0.0.0.0:0              LISTENING       672
  TCP    0.0.0.0:50962          0.0.0.0:0              LISTENING       10116
  TCP    0.0.0.0:57621          0.0.0.0:0              LISTENING       10116
  TCP    10.10.122.247:139      0.0.0.0:0              LISTENING       4
  TCP    10.10.122.247:50923    77.79.249.114:443      ESTABLISHED     12564
  TCP    10.10.122.247:50924    155.133.248.34:27022   ESTABLISHED     11064
  TCP    10.10.122.247:50926    23.38.16.188:443       ESTABLISHED     12564
  TCP    10.10.122.247:50927    77.79.249.114:443      ESTABLISHED     12564
  TCP    10.10.122.247:50928    172.217.168.238:443    ESTABLISHED     1600
  TCP    10.10.122.247:50935    35.190.242.42:443      ESTABLISHED     10116
  TCP    10.10.122.247:50936    35.186.224.53:443      ESTABLISHED     10116
  TCP    10.10.122.247:50937    35.186.224.53:443      ESTABLISHED     5888
  TCP    10.10.122.247:50939    35.186.224.47:443      ESTABLISHED     10116
  TCP    10.10.122.247:50940    173.194.79.188:5228    ESTABLISHED     1600
  TCP    10.10.122.247:50943    23.66.23.40:443        ESTABLISHED     11456
  TCP    10.10.122.247:50952    23.217.99.130:443      TIME_WAIT       0
  TCP    10.10.122.247:50953    172.217.168.238:443    ESTABLISHED     11456
  TCP    10.10.122.247:50954    88.221.254.16:443      ESTABLISHED     11456
  TCP    10.10.122.247:50955    13.107.42.11:443       ESTABLISHED     1600
  TCP    10.10.122.247:50958    13.69.188.18:443       ESTABLISHED     1600
  TCP    10.10.122.247:50961    31.13.64.11:443        ESTABLISHED     6384
  TCP    10.10.122.247:50963    40.74.32.146:443       ESTABLISHED     1600
  TCP    10.10.122.247:50964    40.74.32.146:443       ESTABLISHED     1600
  TCP    10.10.122.247:50967    31.13.64.48:443        ESTABLISHED     6384
  TCP    10.10.122.247:50968    31.13.64.48:443        ESTABLISHED     6384
  TCP    10.10.122.247:50969    31.13.64.48:443        ESTABLISHED     6384
  TCP    10.10.122.247:50973    172.217.17.110:443     TIME_WAIT       0
  TCP    10.10.122.247:50975    157.240.27.27:443      TIME_WAIT       0
  TCP    10.10.122.247:50976    31.13.64.35:443        TIME_WAIT       0
  TCP    10.10.122.247:50977    31.13.64.21:443        TIME_WAIT       0
  TCP    10.10.122.247:50979    31.13.64.48:443        ESTABLISHED     6384
  TCP    10.10.122.247:50983    52.158.24.209:443      TIME_WAIT       0
  TCP    10.10.122.247:50986    52.114.77.33:443       ESTABLISHED     1600
  TCP    10.10.122.247:50987    172.217.17.133:443     ESTABLISHED     1600
  TCP    10.10.122.247:50988    172.217.17.46:443      TIME_WAIT       0
  TCP    10.10.122.247:50991    104.18.20.226:80       ESTABLISHED     4112
  TCP    10.10.122.247:50992    88.221.255.147:80      ESTABLISHED     4112
  TCP    10.10.122.247:50998    31.13.64.11:443        ESTABLISHED     6384
  TCP    10.10.122.247:51000    88.221.255.147:80      ESTABLISHED     4112
  TCP    10.10.122.247:51002    204.79.197.200:443     TIME_WAIT       0
  TCP    10.10.122.247:51003    204.79.197.200:443     TIME_WAIT       0
  TCP    10.10.122.247:51004    204.79.197.200:443     TIME_WAIT       0
  TCP    10.10.122.247:51005    13.107.18.11:443       TIME_WAIT       0
  TCP    10.10.122.247:51006    13.107.18.11:443       TIME_WAIT       0
  TCP    10.10.122.247:51010    104.20.137.9:443       ESTABLISHED     14688
  TCP    10.10.122.247:51011    188.138.70.92:80       ESTABLISHED     14688
  TCP    10.10.122.247:51012    104.27.131.137:80      ESTABLISHED     14688
  TCP    10.10.122.247:51015    167.114.44.150:80      ESTABLISHED     14688
  TCP    10.10.122.247:51016    208.83.20.110:80       ESTABLISHED     14688
  TCP    10.10.122.247:51017    138.255.103.85:80      ESTABLISHED     14688
  TCP    10.10.122.247:51020    167.114.44.150:443     ESTABLISHED     14688
  TCP    10.10.122.247:51021    208.83.20.110:443      ESTABLISHED     14688
  TCP    10.10.122.247:51025    167.114.44.150:443     TIME_WAIT       0
  TCP    10.10.122.247:51026    167.114.44.150:443     TIME_WAIT       0
  TCP    10.10.122.247:51027    167.114.44.150:443     TIME_WAIT       0
  TCP    10.10.122.247:51028    167.114.44.150:443     TIME_WAIT       0
  TCP    10.10.122.247:51029    152.199.19.161:443     ESTABLISHED     8432
  TCP    10.10.122.247:51030    13.107.255.72:443      ESTABLISHED     8432
  TCP    10.10.122.247:51031    131.253.33.254:443     ESTABLISHED     8432
  TCP    10.10.122.247:51032    204.79.197.222:443     ESTABLISHED     8432
  TCP    10.10.122.247:51033    204.79.197.200:443     ESTABLISHED     8432
  TCP    10.10.122.247:51034    52.209.210.113:443     ESTABLISHED     1600
  TCP    10.10.122.247:51036    13.107.18.11:443       ESTABLISHED     8432
  TCP    10.10.122.247:51037    13.107.246.254:443     ESTABLISHED     8432
  TCP    127.0.0.1:3100         0.0.0.0:0              LISTENING       5696
  TCP    127.0.0.1:3100         127.0.0.1:50914        ESTABLISHED     5696
  TCP    127.0.0.1:5939         0.0.0.0:0              LISTENING       4524
  TCP    127.0.0.1:9977         0.0.0.0:0              LISTENING       13844
  TCP    127.0.0.1:9977         127.0.0.1:49862        ESTABLISHED     13844
  TCP    127.0.0.1:20157        0.0.0.0:0              LISTENING       14688
  TCP    127.0.0.1:27060        0.0.0.0:0              LISTENING       11064
  TCP    127.0.0.1:49735        127.0.0.1:49736        ESTABLISHED     6384
  TCP    127.0.0.1:49736        127.0.0.1:49735        ESTABLISHED     6384
  TCP    127.0.0.1:49738        127.0.0.1:49739        ESTABLISHED     6384
  TCP    127.0.0.1:49739        127.0.0.1:49738        ESTABLISHED     6384
  TCP    127.0.0.1:49857        127.0.0.1:65001        ESTABLISHED     4328
  TCP    127.0.0.1:49862        127.0.0.1:9977         ESTABLISHED     12564
  TCP    127.0.0.1:49867        0.0.0.0:0              LISTENING       7976
  TCP    127.0.0.1:49867        127.0.0.1:49907        ESTABLISHED     7976
  TCP    127.0.0.1:49907        127.0.0.1:49867        ESTABLISHED     13952
  TCP    127.0.0.1:50914        127.0.0.1:3100         ESTABLISHED     8120
  TCP    127.0.0.1:51008        127.0.0.1:51009        ESTABLISHED     14688
  TCP    127.0.0.1:51009        127.0.0.1:51008        ESTABLISHED     14688
  TCP    127.0.0.1:65001        0.0.0.0:0              LISTENING       4328
  TCP    127.0.0.1:65001        127.0.0.1:49857        ESTABLISHED     4328
  TCP    192.168.2.100:139      0.0.0.0:0              LISTENING       4
  TCP    [::]:135               [::]:0                 LISTENING       1004
  TCP    [::]:445               [::]:0                 LISTENING       4
  TCP    [::]:5357              [::]:0                 LISTENING       4
  TCP    [::]:7680              [::]:0                 LISTENING       3552
  TCP    [::]:49664             [::]:0                 LISTENING       580
  TCP    [::]:49665             [::]:0                 LISTENING       1488
  TCP    [::]:49666             [::]:0                 LISTENING       1304
  TCP    [::]:49667             [::]:0                 LISTENING       2256
  TCP    [::]:49668             [::]:0                 LISTENING       3576
  TCP    [::]:49669             [::]:0                 LISTENING       652
  TCP    [::]:49689             [::]:0                 LISTENING       672
  TCP    [X::10f5]:50972  [X:0:2]:443  ESTABLISHED     1600
  TCP    [X::10f5]:51035  [X:c40b]:80  ESTABLISHED     11064
  UDP    0.0.0.0:500            *:*                                    4240
  UDP    0.0.0.0:3702           *:*                                    344
  UDP    0.0.0.0:3702           *:*                                    2980
  UDP    0.0.0.0:3702           *:*                                    2980
  UDP    0.0.0.0:3702           *:*                                    344
  UDP    0.0.0.0:4500           *:*                                    4240
  UDP    0.0.0.0:5050           *:*                                    6608
  UDP    0.0.0.0:5353           *:*                                    10984
  UDP    0.0.0.0:5353           *:*                                    1600
  UDP    0.0.0.0:5353           *:*                                    10984
  UDP    0.0.0.0:5353           *:*                                    10116
  UDP    0.0.0.0:5353           *:*                                    10984
  UDP    0.0.0.0:5353           *:*                                    1600
  UDP    0.0.0.0:5353           *:*                                    2180
  UDP    0.0.0.0:5353           *:*                                    10116
  UDP    0.0.0.0:5353           *:*                                    10984
  UDP    0.0.0.0:5355           *:*                                    2180
  UDP    0.0.0.0:6771           *:*                                    14688
  UDP    0.0.0.0:6771           *:*                                    14688
  UDP    0.0.0.0:27036          *:*                                    11064
  UDP    0.0.0.0:51324          *:*                                    1600
  UDP    0.0.0.0:54915          *:*                                    9284
  UDP    0.0.0.0:55104          *:*                                    4524
  UDP    0.0.0.0:55106          *:*                                    3576
  UDP    0.0.0.0:56682          *:*                                    1600
  UDP    0.0.0.0:57621          *:*                                    10116
  UDP    0.0.0.0:57926          *:*                                    14688
  UDP    0.0.0.0:57928          *:*                                    14688
  UDP    0.0.0.0:58014          *:*                                    5696
  UDP    0.0.0.0:58899          *:*                                    10116
  UDP    0.0.0.0:58900          *:*                                    10116
  UDP    0.0.0.0:59041          *:*                                    11064
  UDP    0.0.0.0:59537          *:*                                    4328
  UDP    0.0.0.0:63299          *:*                                    13844
  UDP    0.0.0.0:64383          *:*                                    1600
  UDP    0.0.0.0:64908          *:*                                    2980
  UDP    0.0.0.0:64914          *:*                                    344
  UDP    10.10.122.247:137      *:*                                    4
  UDP    10.10.122.247:138      *:*                                    4
  UDP    10.10.122.247:1900     *:*                                    3324
  UDP    10.10.122.247:5353     *:*                                    4328
  UDP    10.10.122.247:6771     *:*                                    14688
  UDP    10.10.122.247:52004    *:*                                    3324
  UDP    10.10.122.247:63487    *:*                                    14688
  UDP    127.0.0.1:1900         *:*                                    3324
  UDP    127.0.0.1:10010        *:*                                    7976
  UDP    127.0.0.1:10011        *:*                                    6660
  UDP    127.0.0.1:20157        *:*                                    14688
  UDP    127.0.0.1:52005        *:*                                    3324
  UDP    127.0.0.1:64472        *:*                                    5260
  UDP    127.0.0.1:64916        *:*                                    3992
  UDP    192.168.2.100:137      *:*                                    4
  UDP    192.168.2.100:138      *:*                                    4
  UDP    192.168.2.100:1900     *:*                                    3324
  UDP    192.168.2.100:2177     *:*                                    7660
  UDP    192.168.2.100:5353     *:*                                    4328
  UDP    192.168.2.100:5353     *:*                                    4524
  UDP    192.168.2.100:6771     *:*                                    14688
  UDP    192.168.2.100:52003    *:*                                    3324
  UDP    192.168.2.100:63488    *:*                                    14688
  UDP    [::]:500               *:*                                    4240
  UDP    [::]:3702              *:*                                    344
  UDP    [::]:3702              *:*                                    2980
  UDP    [::]:3702              *:*                                    2980
  UDP    [::]:3702              *:*                                    344
  UDP    [::]:4500              *:*                                    4240
  UDP    [::]:5353              *:*                                    10984
  UDP    [::]:5353              *:*                                    2180
  UDP    [::]:5353              *:*                                    10984
  UDP    [::]:5353              *:*                                    1600
  UDP    [::]:5355              *:*                                    2180
  UDP    [::]:6771              *:*                                    14688
  UDP    [::]:54915             *:*                                    9284
  UDP    [::]:55105             *:*                                    4524
  UDP    [::]:57927             *:*                                    14688
  UDP    [::]:57929             *:*                                    14688
  UDP    [::]:59538             *:*                                    4328
  UDP    [::]:64909             *:*                                    2980
  UDP    [::]:64915             *:*                                    344
  UDP    [::1]:1900             *:*                                    3324
  UDP    [::1]:5353             *:*                                    4328
  UDP    [::1]:5353             *:*                                    4524
  UDP    [::1]:52002            *:*                                    3324
  UDP    [X::10f5]:6771  *:*                                    14688
  UDP    [X::10f5]:57920  *:*                                    14688
  UDP    [X:7c15]:2177  *:*                                    7660
  UDP    [X:7c15]:6771  *:*                                    14688
  UDP    [X:7c15]:57923  *:*                                    14688
  UDP    [X:740e]:2177  *:*                                    7660
  UDP    [X:740e]:6771  *:*                                    14688
  UDP    [X:740e]:57922  *:*                                    14688
  UDP    [X:740e%8]:1900  *:*                                    3324
  UDP    [X:740e%8]:2177  *:*                                    7660
  UDP    [X:740e%8]:6771  *:*                                    14688
  UDP    [X:740e%8]:52000  *:*                                    3324
  UDP    [X:740e%8]:57924  *:*                                    14688
  UDP    [X:e4d0%14]:1900  *:*                                    3324
  UDP    [X:e4d0%14]:6771  *:*                                    14688
  UDP    [X:e4d0%14]:52001  *:*                                    3324
  UDP    [X:e4d0%14]:57921  *:*                                    14688

Share this post


Link to post

Okay, it should work, then. You could try binding qB to the TAP interface. Doubt it will make it work, so it'll be a desperate action. :D

I'm just going to shoot out ideas, no guarantee they're good ones :)

  • What was the last thing you did before it stopped working? Installed something? Made an update? Changed a setting anywhere, even if it was an UI setting? Something in the router?
  • Are there any other connections to AirVPN you can see in the client area? If yes, kill them all via the respective buttons, wait a moment and retry a connection.
  • Maybe try another OS? Or in another network?
  • Try another program, maybe? Though you wrote it didn't work with any program.
  • There's a tool called netcat which allows to create arbitrary sockets. It's possible to setup a listening socket using it so that one can test whether connections are actually coming through while netcat explicitly tells you the results. There's a windows version also, usage should be similar to Linux, so something like this will work:
    netcat.exe -4 -v -l -s [IPv4 of the TAP interface] -p 20157
    Then try a test on the port forwarding page or on canyouseeme.org again. If nc doesn't print any connection attempts, I don't know anymore.

¬Ľ I am not an AirVPN team member. All opinions are my own and are not to be considered official. Only the AirVPN Staff account should be viewed as such.

¬Ľ The forums is a place where you can ask questions to the community. You are not entitled to guaranteed answer times. Answer quality may vary, too. If you need professional support, please create tickets.

¬Ľ If you're new, take some time to read LZ1's New User Guide to AirVPN. On questions, use the search function first. On errors, search for the error message instead.

¬Ľ If you choose to create a new thread, keep in mind that we don't know your setup. Give info about it. Never forget the OpenVPN logs or, for Eddie, the support file (Logs > lifebelt icon).

¬Ľ The community kindly asks you to not set up Tor exit relays when connected to AirVPN. Their IP addresses are subject to restrictions and these are relayed to all users of the affected servers.

 

¬Ľ Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, chances are you will be unique amond the mass again.

Share this post


Link to post

I uninstalled eddie and openTap, reinstalled (but version 2.18) and it fails to connect while checking IPv6.

Unfortunately I dont have another OS /Network. 
Tracing back my steps, the only relevant thing that happened besides any automatic windows updates would be me re-installing openVPN in preparation for home office these weeks.
(I also tried with OpenVPN and download a configuration from the website with no more luck regarding the ports)
Here's the log while trying to connect today.

I 2020.03.29 12:28:00 - Session starting.
I 2020.03.29 12:28:00 - Checking authorization ...
! 2020.03.29 12:28:00 - Connecting to Hassaleh (Netherlands, Alblasserdam)
. 2020.03.29 12:28:00 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
. 2020.03.29 12:28:00 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.03.29 12:28:00 - OpenVPN > library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10
. 2020.03.29 12:28:00 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.03.29 12:28:00 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.03.29 12:28:00 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.03.29 12:28:00 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.03.29 12:28:00 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.42:443
. 2020.03.29 12:28:00 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.03.29 12:28:00 - OpenVPN > UDP link local: (not bound)
. 2020.03.29 12:28:00 - OpenVPN > UDP link remote: [AF_INET]213.152.161.42:443
. 2020.03.29 12:28:00 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.42:443, sid=43736556
. 2020.03.29 12:28:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.03.29 12:28:01 - OpenVPN > VERIFY KU OK
. 2020.03.29 12:28:01 - OpenVPN > Validating certificate extended key usage
. 2020.03.29 12:28:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.03.29 12:28:01 - OpenVPN > VERIFY EKU OK
. 2020.03.29 12:28:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hassaleh, emailAddress=info@airvpn.org
. 2020.03.29 12:28:01 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.03.29 12:28:01 - OpenVPN > [Hassaleh] Peer Connection Initiated with [AF_INET]213.152.161.42:443
. 2020.03.29 12:28:02 - OpenVPN > SENT CONTROL [Hassaleh]: 'PUSH_REQUEST' (status=1)
. 2020.03.29 12:28:02 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.18.154.1,dhcp-option DNS6 :e9a::1,tun-ipv6,route-gateway 10.18.154.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 :e9a::10b4/64 :e9a::1,ifconfig 10.18.154.182 255.255.255.0,peer-id 1,cipher AES-256-GCM'
. 2020.03.29 12:28:02 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.03.29 12:28:02 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.03.29 12:28:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.03.29 12:28:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.03.29 12:28:02 - OpenVPN > interactive service msg_channel=0
. 2020.03.29 12:28:02 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=8 HWADDR=:8d
. 2020.03.29 12:28:02 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.03.29 12:28:02 - OpenVPN > GetBestInterfaceEx() returned if=8
. 2020.03.29 12:28:02 - OpenVPN > GDG6: II=8 DP=::/0 NH=:feda:6b08
. 2020.03.29 12:28:02 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0
. 2020.03.29 12:28:02 - OpenVPN > ROUTE6_GATEWAY :6b08 I=8
. 2020.03.29 12:28:02 - OpenVPN > open_tun
. 2020.03.29 12:28:02 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{-ACC976A1EC99}.tap
. 2020.03.29 12:28:02 - OpenVPN > TAP-Windows Driver Version 9.24
. 2020.03.29 12:28:02 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.18.154.0/10.18.154.182/255.255.255.0 [SUCCEEDED]
. 2020.03.29 12:28:02 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.18.154.182/255.255.255.0 on interface {-ACC976A1EC99} [DHCP-serv: 10.18.154.254, lease-time: 31536000]
. 2020.03.29 12:28:02 - OpenVPN > Successful ARP Flush on interface [14] {-ACC976A1EC99}
. 2020.03.29 12:28:03 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=14 ::10b4 store=active
. 2020.03.29 12:28:04 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Local Area Connection static :e9a::1 validate=no
. 2020.03.29 12:28:04 - Detected an OpenVPN bug (On-Link route on VPN range), autofix.
. 2020.03.29 12:28:04 - OpenVPN > add_route_ipv6(::/64 -> ::10b4 metric 0) dev Local Area Connection
. 2020.03.29 12:28:04 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route :e9a::/64 interface=14 fe80::8 store=active
. 2020.03.29 12:28:04 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.03.29 12:28:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.42 MASK 255.255.255.255 192.168.2.1
. 2020.03.29 12:28:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.03.29 12:28:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.18.154.1
. 2020.03.29 12:28:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.03.29 12:28:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.18.154.1
. 2020.03.29 12:28:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.03.29 12:28:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.03.29 12:28:09 - OpenVPN > add_route_ipv6(::/3 -> f:e9a::1 metric -1) dev Local Area Connection
. 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=14 fe80::8 store=active
. 2020.03.29 12:28:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.03.29 12:28:09 - OpenVPN > add_route_ipv6(2000::/4 -> :e9a::1 metric -1) dev Local Area Connection
. 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=14 fe80::8 store=active
. 2020.03.29 12:28:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.03.29 12:28:09 - OpenVPN > add_route_ipv6(3000::/4 ->:e9a::1 metric -1) dev Local Area Connection
. 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=14 fe80::8 store=active
. 2020.03.29 12:28:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.03.29 12:28:10 - OpenVPN > add_route_ipv6(fc00::/7 -> :e9a::1 metric -1) dev Local Area Connection
. 2020.03.29 12:28:10 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=14 fe80::8 store=active
. 2020.03.29 12:28:10 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.03.29 12:28:10 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4
. 2020.03.29 12:28:10 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6
. 2020.03.29 12:28:10 - DNS leak protection with packet filtering enabled.
. 2020.03.29 12:28:10 - Routes, added a new route, 213.152.161.40 for gateway 10.18.154.1
. 2020.03.29 12:28:10 - Routes, added a new route, :3810 for gateway :e9a::1
. 2020.03.29 12:28:10 - Flushing DNS
I 2020.03.29 12:28:10 - Checking route IPv4
I 2020.03.29 12:28:10 - Checking route IPv6
. 2020.03.29 12:28:30 - curl: (28) Connection timed out after 20000 milliseconds
. 2020.03.29 12:28:30 - Checking route (2¬į try)
. 2020.03.29 12:28:51 - curl: (28) Connection timed out after 20000 milliseconds
. 2020.03.29 12:28:51 - Checking route (3¬į try)
. 2020.03.29 12:29:13 - curl: (28) Connection timed out after 20000 milliseconds
E 2020.03.29 12:29:13 - Checking route IPv6 failed.
. 2020.03.29 12:29:13 - OpenVPN > Initialization Sequence Completed
! 2020.03.29 12:29:13 - Disconnecting
. 2020.03.29 12:29:13 - Routes, removed a route previously added, 213.152.161.40 for gateway 10.18.154.1
. 2020.03.29 12:29:14 - Routes, removed a route previously added, :d71f:3810 for gateway :e9a::1
. 2020.03.29 12:29:14 - Sending soft termination signal
. 2020.03.29 12:29:17 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.03.29 12:29:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.42 MASK 255.255.255.255 192.168.2.1
. 2020.03.29 12:29:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.03.29 12:29:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.18.154.1
. 2020.03.29 12:29:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.03.29 12:29:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.18.154.1
. 2020.03.29 12:29:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.03.29 12:29:19 - OpenVPN > delete_route_ipv6(::/3)
. 2020.03.29 12:29:19 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=14 fe80::8 store=active
. 2020.03.29 12:29:19 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.03.29 12:29:20 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.03.29 12:29:20 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=14 fe80::8 store=active
. 2020.03.29 12:29:20 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.03.29 12:29:20 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.03.29 12:29:20 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=14 fe80::8 store=active
. 2020.03.29 12:29:20 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.03.29 12:29:20 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.03.29 12:29:20 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=14 fe80::8 store=active
. 2020.03.29 12:29:20 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.03.29 12:29:20 - OpenVPN > Closing TUN/TAP interface
. 2020.03.29 12:29:20 - OpenVPN > delete_route_ipv6(:e9a::/64)
. 2020.03.29 12:29:20 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route:e9a::/64 interface=14 fe80::8 store=active
. 2020.03.29 12:29:21 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Local Area Connection :e9a::10b4 store=active
. 2020.03.29 12:29:22 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Local Area Connection all
. 2020.03.29 12:29:22 - OpenVPN > TAP: DHCP address released
. 2020.03.29 12:29:22 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.03.29 12:29:22 - Connection terminated.
. 2020.03.29 12:29:22 - DNS leak protection with packet filtering disabled.
. 2020.03.29 12:29:22 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4
. 2020.03.29 12:29:22 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6
I 2020.03.29 12:29:24 - Cancel requested.
! 2020.03.29 12:29:24 - Session terminated.
! 2020.03.29 12:29:25 - Deactivation of Network Lock
 

Share this post


Link to post
7 hours ago, deadalus said:

I uninstalled eddie and openTap, reinstalled (but version 2.18) and it fails to connect while checking IPv6.


Hm, yes, that is a new one. If you do Preferences > Networking > Layer IPv6: Block, does it change anything?

Also, you called it "openTap". Is this the official TAP installation you get from Eddie/openvpn.net, or something else?

¬Ľ I am not an AirVPN team member. All opinions are my own and are not to be considered official. Only the AirVPN Staff account should be viewed as such.

¬Ľ The forums is a place where you can ask questions to the community. You are not entitled to guaranteed answer times. Answer quality may vary, too. If you need professional support, please create tickets.

¬Ľ If you're new, take some time to read LZ1's New User Guide to AirVPN. On questions, use the search function first. On errors, search for the error message instead.

¬Ľ If you choose to create a new thread, keep in mind that we don't know your setup. Give info about it. Never forget the OpenVPN logs or, for Eddie, the support file (Logs > lifebelt icon).

¬Ľ The community kindly asks you to not set up Tor exit relays when connected to AirVPN. Their IP addresses are subject to restrictions and these are relayed to all users of the affected servers.

 

¬Ľ Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, chances are you will be unique amond the mass again.

Share this post


Link to post

Nice, it connects to the server normally now, ports still not available though.
OpenTap (not sure if name was exact) was available under apps and programs installed around the same time as openVPN, in the timespan since the last time I checked qbittorent when it was working (sometime in March).
I just thought that doing a uninstall of all 3 and reinstalling eddie after that (and I went with 2.18 cause you also mentioned more potential fixes) would do the trick.

I 2020.03.29 22:15:40 - Session starting.
I 2020.03.29 22:15:41 - Checking authorization ...
. 2020.03.29 22:15:41 - IPv6 disabled with packet filtering.
! 2020.03.29 22:15:41 - Connecting to Alpheratz (Netherlands, Alblasserdam)
. 2020.03.29 22:15:41 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
. 2020.03.29 22:15:41 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.03.29 22:15:41 - OpenVPN > library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10
. 2020.03.29 22:15:41 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.03.29 22:15:41 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.03.29 22:15:41 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.03.29 22:15:41 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.03.29 22:15:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.245:443
. 2020.03.29 22:15:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.03.29 22:15:41 - OpenVPN > UDP link local: (not bound)
. 2020.03.29 22:15:41 - OpenVPN > UDP link remote: [AF_INET]134.19.179.245:443
. 2020.03.29 22:15:41 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.245:443, sid= 5795ac58
. 2020.03.29 22:15:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.03.29 22:15:42 - OpenVPN > VERIFY KU OK
. 2020.03.29 22:15:42 - OpenVPN > Validating certificate extended key usage
. 2020.03.29 22:15:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.03.29 22:15:42 - OpenVPN > VERIFY EKU OK
. 2020.03.29 22:15:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alpheratz, emailAddress=info@airvpn.org
. 2020.03.29 22:15:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.03.29 22:15:42 - OpenVPN > [Alpheratz] Peer Connection Initiated with [AF_INET]134.19.179.245:443
. 2020.03.29 22:15:43 - OpenVPN > SENT CONTROL [Alpheratz]: 'PUSH_REQUEST' (status=1)
. 2020.03.29 22:15:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.218.1,dhcp-option DNS6 :1cda::1,tun-ipv6,route-gateway 10.32.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 :1cda::106e/64 1cda::1,ifconfig 10.32.218.112 255.255.255.0,peer-id 3,cipher AES-256-GCM'
. 2020.03.29 22:15:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.03.29 22:15:43 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 :1cda::1'
. 2020.03.29 22:15:43 - OpenVPN > Pushed option removed by filter: 'tun-ipv6'
. 2020.03.29 22:15:43 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 :1cda::106e/64 :1cda::1'
. 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.03.29 22:15:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.03.29 22:15:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.03.29 22:15:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.03.29 22:15:43 - OpenVPN > interactive service msg_channel=0
. 2020.03.29 22:15:43 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=8 HWADDR=:ed:8d
. 2020.03.29 22:15:43 - OpenVPN > open_tun
. 2020.03.29 22:15:43 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{6-ACC976A1EC99}.tap
. 2020.03.29 22:15:43 - OpenVPN > TAP-Windows Driver Version 9.24
. 2020.03.29 22:15:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.32.218.0/10.32.218.112/255.255.255.0 [SUCCEEDED]
. 2020.03.29 22:15:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.32.218.112/255.255.255.0 on interface {6-ACC976A1EC99} [DHCP-serv: 10.32.218.254, lease-time: 31536000]
. 2020.03.29 22:15:43 - OpenVPN > Successful ARP Flush on interface [14] {6-ACC976A1EC99}
. 2020.03.29 22:15:48 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.03.29 22:15:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 134.19.179.245 MASK 255.255.255.255 192.168.2.1
. 2020.03.29 22:15:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.03.29 22:15:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.03.29 22:15:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.32.218.1
. 2020.03.29 22:15:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.03.29 22:15:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.03.29 22:15:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.32.218.1
. 2020.03.29 22:15:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.03.29 22:15:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.03.29 22:15:48 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4
. 2020.03.29 22:15:48 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6
. 2020.03.29 22:15:48 - DNS leak protection with packet filtering enabled.
. 2020.03.29 22:15:48 - Routes, added a new route, 134.19.179.243 for gateway 10.32.218.1
. 2020.03.29 22:15:48 - Unable to compute route for :fcac:44b9: IPv6 VPN gateway not available.
. 2020.03.29 22:15:48 - Flushing DNS
I 2020.03.29 22:15:48 - Checking route IPv4
I 2020.03.29 22:15:48 - Checking DNS
! 2020.03.29 22:15:49 - Connected.
. 2020.03.29 22:15:49 - OpenVPN > Initialization Sequence Completed

Share this post


Link to post

Okay.

Well, I'm at the end of my wisdom. If no one else got any ideas, consider opening a support ticket. If you happen to resolve it, please report back here.
Really sorry. :(


¬Ľ I am not an AirVPN team member. All opinions are my own and are not to be considered official. Only the AirVPN Staff account should be viewed as such.

¬Ľ The forums is a place where you can ask questions to the community. You are not entitled to guaranteed answer times. Answer quality may vary, too. If you need professional support, please create tickets.

¬Ľ If you're new, take some time to read LZ1's New User Guide to AirVPN. On questions, use the search function first. On errors, search for the error message instead.

¬Ľ If you choose to create a new thread, keep in mind that we don't know your setup. Give info about it. Never forget the OpenVPN logs or, for Eddie, the support file (Logs > lifebelt icon).

¬Ľ The community kindly asks you to not set up Tor exit relays when connected to AirVPN. Their IP addresses are subject to restrictions and these are relayed to all users of the affected servers.

 

¬Ľ Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, chances are you will be unique amond the mass again.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

√ó
√ó
  • Create New...