deadalus 0 Posted ... Hello, I 've been using airVPN for a bit over a year now, read a couple of guides and have had qbittorrent successfully running with a forwarded port, until today 😕 (This might have started earlier, I haven't tried to download anything in a few weeks) -All my torrents were showing 0/0 seeds/leechers, even though I m pretty sure they have a few thousands. - Double checked airVPN port and qbittorrrent port, nothing was changed. - Tried different servers, tried using a few new ports, no luck Am I the only one with this problem, or could it be related somehow with the current situation in central Europe? Thanks! Quote Share this post Link to post
OpenSourcerer 1467 Posted ... Try forwarding a new random port and use that, then. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
deadalus 0 Posted ... Yeah as I said, I already tried a few different ports on different servers -> both on canyouseeme and on airvpn/ports they still appear blocked 😕 Quote Share this post Link to post
SurprisedItWorks 52 Posted ... FWIW, port forwarding is working fine for me (US server), and my port-forwarding setup hasn't changed in at least a month. Quote Share this post Link to post
OpenSourcerer 1467 Posted ... Appear blocked as in actively rejected or a timeout? Is there a firewall you are using? What's your client and version? OS? Actually, some logs would be nice. If you're using Eddie, paste a support file instead (Logs > Lifebelt icon). Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
deadalus 0 Posted ... Sure, here! (I did some minor editing of IPs/MAC, let me know if you need anything explicitly from the original file)logClean.txt logClean.txt Quote Share this post Link to post
OpenSourcerer 1467 Posted ... Eddie version: 2.13.6 First of all: Please update Eddie. At least to 2.16.3, but the 2.18 beta fixes a multitude of errors of 2.16.3 as well. I'm even surprised you can still connect with 2.13. When you do this, you can paste another support file here because the amount of info changed greatly. It's more informative in current stable/beta. ! 2020.03.22 23:30:36 - Activation of Network Lock - Windows Filtering Platform Do you experience the same if NetLock is off? Does it also happen if you use vanilla OpenVPN? I'd also like to remark that using Google Public DNS is a bad practice since they log pretty much everything. Try OpenNIC Project instead. And about the IP/MAC things you changed, the Windows interface IDs are useless for the public, private IPv4 addresses cannot be routed by the public as well, but the MAC and certain v6 addresses were rightly hidden. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
deadalus 0 Posted ... Hey, Sorry for the delay! I guess I got really used to everything auto-updating nowadays 😅 Still happens with the new version. Here's the new file! - It still happens with network lock off unfortunately. - By vanilla OpenVPN you mean using the default openVPN app to connect? (never tried that before) - Note: I recently was doing testing an App's functionality while being offline, so I disabled/re-enabled my ethernet adapter to simulate it. Could that be related? Thanks for the support!log2.txt Quote Share this post Link to post
OpenSourcerer 1467 Posted ... Logs seem to be okay. 40 minutes ago, deadalus said: - By vanilla OpenVPN you mean using the default openVPN app to connect? (never tried that before) Yes. 40 minutes ago, deadalus said: - Note: I recently was doing testing an App's functionality while being offline, so I disabled/re-enabled my ethernet adapter to simulate it. Could that be related? Were you connected at that time? In this case it should normalize itself after a reconnect. On 3/22/2020 at 7:58 PM, giganerd said: Appear blocked as in actively rejected or a timeout? Is there a firewall you are using? Can you answer this, please? Let's extend this question to security software like Kaspersky and firewalls. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
deadalus 0 Posted ... Quote Appear blocked as in actively rejected or a timeout? I am just running the port test in the client Area/Forwarded ports with it reporting Checking port 20157 for internal IP 10.31.26.68 completed. and the ports being grey like this And Canyouseeme reports a timeout , same as yougetsignal.com/tools/open-ports I am not using any firewalls besides the typical windows defender stuff. Connection set as private network and I even tried with Firewall off, still timed out on ports. ISP is Vodafone in Germany for what it's worth. Quote Share this post Link to post
OpenSourcerer 1467 Posted ... I think I'm asking superfluously, but when you run these checks, is the software running as well? Is it listening on all interfaces/IP addresses or at least on the 10.x / TAP one? In a privileged cmd/powershell, when you're connected and the software is supposed to be reachable, can you please run netstat -a -o -n? 1 hour ago, deadalus said: ISP is Vodafone in Germany for what it's worth. That doesn't matter much. I had Vodafone Kabel DE and nothing like this ever happened. I'm being more and more sure that it's a local problem, but I got to admit that I'm slowly running out of ideas. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
deadalus 0 Posted ... Proto Local Address Foreign Address State PID TCP 0.0.0.0:135 0.0.0.0:0 LISTENING 988 TCP 0.0.0.0:445 0.0.0.0:0 LISTENING 4 TCP 0.0.0.0:5040 0.0.0.0:0 LISTENING 7240 TCP 0.0.0.0:5357 0.0.0.0:0 LISTENING 4 TCP 0.0.0.0:7680 0.0.0.0:0 LISTENING 3436 TCP 0.0.0.0:27036 0.0.0.0:0 LISTENING 13252 TCP 0.0.0.0:49664 0.0.0.0:0 LISTENING 576 TCP 0.0.0.0:49665 0.0.0.0:0 LISTENING 1508 TCP 0.0.0.0:49666 0.0.0.0:0 LISTENING 1320 TCP 0.0.0.0:49667 0.0.0.0:0 LISTENING 2368 TCP 0.0.0.0:49668 0.0.0.0:0 LISTENING 3644 TCP 0.0.0.0:49669 0.0.0.0:0 LISTENING 648 TCP 0.0.0.0:49687 0.0.0.0:0 LISTENING 668 TCP 10.34.154.56:139 0.0.0.0:0 LISTENING 4 TCP 10.34.154.56:7688 52.114.89.91:443 TIME_WAIT 0 TCP 10.34.154.56:10874 52.114.89.91:443 TIME_WAIT 0 TCP 10.34.154.56:22586 52.114.89.91:443 TIME_WAIT 0 TCP 10.34.154.56:35013 52.114.89.91:443 TIME_WAIT 0 TCP 10.34.154.56:38917 52.114.89.91:443 TIME_WAIT 0 TCP 10.34.154.56:44172 52.114.89.91:443 TIME_WAIT 0 TCP 10.34.154.56:50009 52.114.89.164:443 TIME_WAIT 0 TCP 10.34.154.56:50019 52.114.89.164:443 TIME_WAIT 0 TCP 10.34.154.56:50028 52.114.89.173:443 TIME_WAIT 0 TCP 10.34.154.56:50038 52.114.89.173:443 TIME_WAIT 0 TCP 10.34.154.56:50040 52.114.89.165:443 TIME_WAIT 0 TCP 10.34.154.56:50043 52.114.89.165:443 TIME_WAIT 0 TCP 10.34.154.56:50045 52.114.89.168:443 TIME_WAIT 0 TCP 10.34.154.56:50046 52.114.89.168:443 TIME_WAIT 0 TCP 10.34.154.56:50934 52.114.77.7:443 ESTABLISHED 12628 TCP 10.34.154.56:50935 52.113.194.132:443 ESTABLISHED 11972 TCP 10.34.154.56:50936 216.58.208.110:443 ESTABLISHED 11276 TCP 10.34.154.56:50938 216.58.208.110:443 TIME_WAIT 0 TCP 10.34.154.56:50939 172.217.17.46:443 ESTABLISHED 11276 TCP 10.34.154.56:50940 157.240.201.24:443 ESTABLISHED 6600 TCP 10.34.154.56:50943 134.19.179.187:89 TIME_WAIT 0 TCP 10.34.154.56:50948 52.114.89.91:443 TIME_WAIT 0 TCP 10.34.154.56:50952 157.240.201.50:443 ESTABLISHED 6600 TCP 10.34.154.56:50953 51.140.157.153:443 ESTABLISHED 11972 TCP 10.34.154.56:50954 108.177.119.188:443 ESTABLISHED 11276 TCP 10.34.154.56:50961 52.114.75.38:443 ESTABLISHED 12628 TCP 10.34.154.56:50969 52.114.74.89:443 ESTABLISHED 11972 TCP 10.34.154.56:50972 5.196.64.52:443 ESTABLISHED 11276 TCP 10.34.154.56:50974 23.196.233.47:443 ESTABLISHED 13904 TCP 10.34.154.56:50975 13.107.21.200:443 TIME_WAIT 0 TCP 10.34.154.56:50976 13.107.21.200:443 TIME_WAIT 0 TCP 10.34.154.56:50977 13.107.18.11:443 TIME_WAIT 0 TCP 10.34.154.56:50978 13.107.21.200:443 ESTABLISHED 8812 TCP 10.34.154.56:50979 13.107.18.254:443 ESTABLISHED 8812 TCP 10.34.154.56:50980 13.107.246.10:443 ESTABLISHED 8812 TCP 10.34.154.56:50981 152.199.19.161:443 ESTABLISHED 8812 TCP 10.34.154.56:50982 204.79.197.222:443 ESTABLISHED 8812 TCP 10.34.154.56:50983 77.79.249.112:443 ESTABLISHED 13904 TCP 10.34.154.56:50984 193.59.178.227:443 ESTABLISHED 13904 TCP 10.34.154.56:50985 193.59.178.227:443 ESTABLISHED 13904 TCP 10.34.154.56:50986 95.101.78.112:443 ESTABLISHED 11972 TCP 10.34.154.56:50990 52.114.76.13:443 ESTABLISHED 11972 TCP 10.34.154.56:50991 77.79.249.112:443 ESTABLISHED 13904 TCP 10.34.154.56:50992 52.114.74.2:443 ESTABLISHED 11972 TCP 10.34.154.56:50997 52.113.194.132:443 ESTABLISHED 12628 TCP 10.34.154.56:50998 52.114.88.28:443 ESTABLISHED 12628 TCP 10.34.154.56:59683 52.114.89.91:443 TIME_WAIT 0 TCP 127.0.0.1:3100 0.0.0.0:0 LISTENING 9864 TCP 127.0.0.1:3100 127.0.0.1:50928 ESTABLISHED 9864 TCP 127.0.0.1:5939 0.0.0.0:0 LISTENING 4496 TCP 127.0.0.1:9977 0.0.0.0:0 LISTENING 14116 TCP 127.0.0.1:9977 127.0.0.1:49873 ESTABLISHED 14116 TCP 127.0.0.1:27060 0.0.0.0:0 LISTENING 13252 TCP 127.0.0.1:49725 127.0.0.1:49726 ESTABLISHED 6600 TCP 127.0.0.1:49726 127.0.0.1:49725 ESTABLISHED 6600 TCP 127.0.0.1:49730 127.0.0.1:49731 ESTABLISHED 6600 TCP 127.0.0.1:49731 127.0.0.1:49730 ESTABLISHED 6600 TCP 127.0.0.1:49733 127.0.0.1:65001 ESTABLISHED 4296 TCP 127.0.0.1:49735 0.0.0.0:0 LISTENING 8584 TCP 127.0.0.1:49735 127.0.0.1:49752 ESTABLISHED 8584 TCP 127.0.0.1:49752 127.0.0.1:49735 ESTABLISHED 7476 TCP 127.0.0.1:49873 127.0.0.1:9977 ESTABLISHED 13904 TCP 127.0.0.1:50914 127.0.0.1:50913 TIME_WAIT 0 TCP 127.0.0.1:50926 127.0.0.1:50925 TIME_WAIT 0 TCP 127.0.0.1:50928 127.0.0.1:3100 ESTABLISHED 8532 TCP 127.0.0.1:50930 127.0.0.1:5357 TIME_WAIT 0 TCP 127.0.0.1:50932 127.0.0.1:5357 TIME_WAIT 0 TCP 127.0.0.1:50942 127.0.0.1:50941 TIME_WAIT 0 TCP 127.0.0.1:50945 127.0.0.1:50944 TIME_WAIT 0 TCP 127.0.0.1:50963 127.0.0.1:50962 TIME_WAIT 0 TCP 127.0.0.1:50966 127.0.0.1:50965 TIME_WAIT 0 TCP 127.0.0.1:65001 0.0.0.0:0 LISTENING 4296 TCP 127.0.0.1:65001 127.0.0.1:49733 ESTABLISHED 4296 TCP 192.168.2.100:139 0.0.0.0:0 LISTENING 4 TCP 192.168.2.100:50717 185.60.216.11:443 ESTABLISHED 6600 TCP 192.168.2.100:50803 52.111.243.6:443 TIME_WAIT 0 TCP 192.168.2.100:50915 63.33.78.166:80 TIME_WAIT 0 TCP 192.168.2.100:50927 63.33.78.166:80 TIME_WAIT 0 TCP [::]:135 [::]:0 LISTENING 988 TCP [::]:445 [::]:0 LISTENING 4 TCP [::]:5357 [::]:0 LISTENING 4 TCP [::]:7680 [::]:0 LISTENING 3436 TCP [::]:49664 [::]:0 LISTENING 576 TCP [::]:49665 [::]:0 LISTENING 1508 TCP [::]:49666 [::]:0 LISTENING 1320 TCP [::]:49667 [::]:0 LISTENING 2368 TCP [::]:49668 [::]:0 LISTENING 3644 TCP [::]:49669 [::]:0 LISTENING 648 TCP [::]:49687 [::]:0 LISTENING 668 TCP [::1]:50929 [::1]:5357 TIME_WAIT 0 TCP [::1]:50931 [::1]:5357 TIME_WAIT 0 TCP [X::1036]:50933 [X:b00c:0:2]:443 ESTABLISHED 11276 TCP [X::1036]:50946 [X:41:52a6:8a00]:89 TIME_WAIT 0 TCP [X::1036]:50956 [X:a004::bfeb:8c34]:443 ESTABLISHED 12628 TCP [X::1036]:50967 [X:52a6:8a00]:89 TIME_WAIT 0 UDP 0.0.0.0:500 *:* 4200 UDP 0.0.0.0:3702 *:* 2972 UDP 0.0.0.0:3702 *:* 2972 UDP 0.0.0.0:3702 *:* 3096 UDP 0.0.0.0:3702 *:* 3096 UDP 0.0.0.0:4500 *:* 4200 UDP 0.0.0.0:5050 *:* 7240 UDP 0.0.0.0:5353 *:* 14724 UDP 0.0.0.0:5353 *:* 14724 UDP 0.0.0.0:5353 *:* 14724 UDP 0.0.0.0:5353 *:* 2228 UDP 0.0.0.0:5353 *:* 14724 UDP 0.0.0.0:5355 *:* 2228 UDP 0.0.0.0:27036 *:* 13252 UDP 0.0.0.0:50000 *:* 3096 UDP 0.0.0.0:51434 *:* 12628 UDP 0.0.0.0:51463 *:* 2228 UDP 0.0.0.0:52896 *:* 2972 UDP 0.0.0.0:54915 *:* 9776 UDP 0.0.0.0:55446 *:* 4296 UDP 0.0.0.0:55758 *:* 4496 UDP 0.0.0.0:55760 *:* 3644 UDP 0.0.0.0:56956 *:* 14116 UDP 0.0.0.0:58433 *:* 9864 UDP 0.0.0.0:58768 *:* 2228 UDP 0.0.0.0:63847 *:* 11276 UDP 10.34.154.56:137 *:* 4 UDP 10.34.154.56:138 *:* 4 UDP 10.34.154.56:1900 *:* 3656 UDP 10.34.154.56:5353 *:* 4296 UDP 10.34.154.56:56897 *:* 3656 UDP 127.0.0.1:1900 *:* 3656 UDP 127.0.0.1:10010 *:* 8584 UDP 127.0.0.1:10011 *:* 7008 UDP 127.0.0.1:52898 *:* 3932 UDP 127.0.0.1:56898 *:* 3656 UDP 127.0.0.1:57044 *:* 7016 UDP 192.168.2.100:137 *:* 4 UDP 192.168.2.100:138 *:* 4 UDP 192.168.2.100:1900 *:* 3656 UDP 192.168.2.100:5353 *:* 4296 UDP 192.168.2.100:5353 *:* 4496 UDP 192.168.2.100:56896 *:* 3656 UDP [::]:500 *:* 4200 UDP [::]:3702 *:* 3096 UDP [::]:3702 *:* 3096 UDP [::]:3702 *:* 2972 UDP [::]:3702 *:* 2972 UDP [::]:4500 *:* 4200 UDP [::]:5353 *:* 2228 UDP [::]:5353 *:* 14724 UDP [::]:5353 *:* 14724 UDP [::]:5355 *:* 2228 UDP [::]:50001 *:* 3096 UDP [::]:51434 *:* 12628 UDP [::]:51463 *:* 2228 UDP [::]:52897 *:* 2972 UDP [::]:54915 *:* 9776 UDP [::]:55447 *:* 4296 UDP [::]:55759 *:* 4496 UDP [::]:58768 *:* 2228 UDP [::1]:1900 *:* 3656 UDP [::1]:5353 *:* 4496 UDP [::1]:5353 *:* 4296 UDP [::1]:56895 *:* 3656 UDP [x:740e%8]:1900 *:* 3656 UDP [x:740e%8]:56893 *:* 3656 UDP [x:e4d0%14]:546 *:* 1912 UDP [x%14]:1900 *:* 3656 UDP [x:e4d0%14]:56894 *:* 3656 Quote Share this post Link to post
deadalus 0 Posted ... 54 minutes ago, giganerd said: I think I'm asking superfluously, but when you run these checks, is the software running as well? Is it listening on all interfaces/IP addresses or at least on the 10.x / TAP one? I am checking for ports on the website (and qbittorrent is also not reaching it) when I am connected to a server while the new eddie is running, if that is what you re asking I know, it seems like a weirdly specific thing, but thanks for sticking with me. Quote Share this post Link to post
OpenSourcerer 1467 Posted ... The interesting thing is that neither of the ports you posted earlier show up in the netstat. Are you 150%, absolutely and unequivocally sure you configured your softwares correctly to use these ports? Or did you change the ports already? Also, I should've known that -o only posts a process ID and not also the name like on Linux. I don't know of any command line way to show the names.. Do you have another machine, preferably with the same operating system, you can test your scenario with? Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
deadalus 0 Posted ... Hey, booted up my windows 10 laptop, installed eddie and after connecting to a server tried to check the ports online, again no success 😕 Here's netstat with qbittorent running/listening to 20157 (PID 14688 = Qbittorent according to taskmanager/details) Proto Local Address Foreign Address State PID TCP 0.0.0.0:135 0.0.0.0:0 LISTENING 1004 TCP 0.0.0.0:445 0.0.0.0:0 LISTENING 4 TCP 0.0.0.0:5040 0.0.0.0:0 LISTENING 6608 TCP 0.0.0.0:5357 0.0.0.0:0 LISTENING 4 TCP 0.0.0.0:7680 0.0.0.0:0 LISTENING 3552 TCP 0.0.0.0:27036 0.0.0.0:0 LISTENING 11064 TCP 0.0.0.0:49664 0.0.0.0:0 LISTENING 580 TCP 0.0.0.0:49665 0.0.0.0:0 LISTENING 1488 TCP 0.0.0.0:49666 0.0.0.0:0 LISTENING 1304 TCP 0.0.0.0:49667 0.0.0.0:0 LISTENING 2256 TCP 0.0.0.0:49668 0.0.0.0:0 LISTENING 3576 TCP 0.0.0.0:49669 0.0.0.0:0 LISTENING 652 TCP 0.0.0.0:49689 0.0.0.0:0 LISTENING 672 TCP 0.0.0.0:50962 0.0.0.0:0 LISTENING 10116 TCP 0.0.0.0:57621 0.0.0.0:0 LISTENING 10116 TCP 10.10.122.247:139 0.0.0.0:0 LISTENING 4 TCP 10.10.122.247:50923 77.79.249.114:443 ESTABLISHED 12564 TCP 10.10.122.247:50924 155.133.248.34:27022 ESTABLISHED 11064 TCP 10.10.122.247:50926 23.38.16.188:443 ESTABLISHED 12564 TCP 10.10.122.247:50927 77.79.249.114:443 ESTABLISHED 12564 TCP 10.10.122.247:50928 172.217.168.238:443 ESTABLISHED 1600 TCP 10.10.122.247:50935 35.190.242.42:443 ESTABLISHED 10116 TCP 10.10.122.247:50936 35.186.224.53:443 ESTABLISHED 10116 TCP 10.10.122.247:50937 35.186.224.53:443 ESTABLISHED 5888 TCP 10.10.122.247:50939 35.186.224.47:443 ESTABLISHED 10116 TCP 10.10.122.247:50940 173.194.79.188:5228 ESTABLISHED 1600 TCP 10.10.122.247:50943 23.66.23.40:443 ESTABLISHED 11456 TCP 10.10.122.247:50952 23.217.99.130:443 TIME_WAIT 0 TCP 10.10.122.247:50953 172.217.168.238:443 ESTABLISHED 11456 TCP 10.10.122.247:50954 88.221.254.16:443 ESTABLISHED 11456 TCP 10.10.122.247:50955 13.107.42.11:443 ESTABLISHED 1600 TCP 10.10.122.247:50958 13.69.188.18:443 ESTABLISHED 1600 TCP 10.10.122.247:50961 31.13.64.11:443 ESTABLISHED 6384 TCP 10.10.122.247:50963 40.74.32.146:443 ESTABLISHED 1600 TCP 10.10.122.247:50964 40.74.32.146:443 ESTABLISHED 1600 TCP 10.10.122.247:50967 31.13.64.48:443 ESTABLISHED 6384 TCP 10.10.122.247:50968 31.13.64.48:443 ESTABLISHED 6384 TCP 10.10.122.247:50969 31.13.64.48:443 ESTABLISHED 6384 TCP 10.10.122.247:50973 172.217.17.110:443 TIME_WAIT 0 TCP 10.10.122.247:50975 157.240.27.27:443 TIME_WAIT 0 TCP 10.10.122.247:50976 31.13.64.35:443 TIME_WAIT 0 TCP 10.10.122.247:50977 31.13.64.21:443 TIME_WAIT 0 TCP 10.10.122.247:50979 31.13.64.48:443 ESTABLISHED 6384 TCP 10.10.122.247:50983 52.158.24.209:443 TIME_WAIT 0 TCP 10.10.122.247:50986 52.114.77.33:443 ESTABLISHED 1600 TCP 10.10.122.247:50987 172.217.17.133:443 ESTABLISHED 1600 TCP 10.10.122.247:50988 172.217.17.46:443 TIME_WAIT 0 TCP 10.10.122.247:50991 104.18.20.226:80 ESTABLISHED 4112 TCP 10.10.122.247:50992 88.221.255.147:80 ESTABLISHED 4112 TCP 10.10.122.247:50998 31.13.64.11:443 ESTABLISHED 6384 TCP 10.10.122.247:51000 88.221.255.147:80 ESTABLISHED 4112 TCP 10.10.122.247:51002 204.79.197.200:443 TIME_WAIT 0 TCP 10.10.122.247:51003 204.79.197.200:443 TIME_WAIT 0 TCP 10.10.122.247:51004 204.79.197.200:443 TIME_WAIT 0 TCP 10.10.122.247:51005 13.107.18.11:443 TIME_WAIT 0 TCP 10.10.122.247:51006 13.107.18.11:443 TIME_WAIT 0 TCP 10.10.122.247:51010 104.20.137.9:443 ESTABLISHED 14688 TCP 10.10.122.247:51011 188.138.70.92:80 ESTABLISHED 14688 TCP 10.10.122.247:51012 104.27.131.137:80 ESTABLISHED 14688 TCP 10.10.122.247:51015 167.114.44.150:80 ESTABLISHED 14688 TCP 10.10.122.247:51016 208.83.20.110:80 ESTABLISHED 14688 TCP 10.10.122.247:51017 138.255.103.85:80 ESTABLISHED 14688 TCP 10.10.122.247:51020 167.114.44.150:443 ESTABLISHED 14688 TCP 10.10.122.247:51021 208.83.20.110:443 ESTABLISHED 14688 TCP 10.10.122.247:51025 167.114.44.150:443 TIME_WAIT 0 TCP 10.10.122.247:51026 167.114.44.150:443 TIME_WAIT 0 TCP 10.10.122.247:51027 167.114.44.150:443 TIME_WAIT 0 TCP 10.10.122.247:51028 167.114.44.150:443 TIME_WAIT 0 TCP 10.10.122.247:51029 152.199.19.161:443 ESTABLISHED 8432 TCP 10.10.122.247:51030 13.107.255.72:443 ESTABLISHED 8432 TCP 10.10.122.247:51031 131.253.33.254:443 ESTABLISHED 8432 TCP 10.10.122.247:51032 204.79.197.222:443 ESTABLISHED 8432 TCP 10.10.122.247:51033 204.79.197.200:443 ESTABLISHED 8432 TCP 10.10.122.247:51034 52.209.210.113:443 ESTABLISHED 1600 TCP 10.10.122.247:51036 13.107.18.11:443 ESTABLISHED 8432 TCP 10.10.122.247:51037 13.107.246.254:443 ESTABLISHED 8432 TCP 127.0.0.1:3100 0.0.0.0:0 LISTENING 5696 TCP 127.0.0.1:3100 127.0.0.1:50914 ESTABLISHED 5696 TCP 127.0.0.1:5939 0.0.0.0:0 LISTENING 4524 TCP 127.0.0.1:9977 0.0.0.0:0 LISTENING 13844 TCP 127.0.0.1:9977 127.0.0.1:49862 ESTABLISHED 13844 TCP 127.0.0.1:20157 0.0.0.0:0 LISTENING 14688 TCP 127.0.0.1:27060 0.0.0.0:0 LISTENING 11064 TCP 127.0.0.1:49735 127.0.0.1:49736 ESTABLISHED 6384 TCP 127.0.0.1:49736 127.0.0.1:49735 ESTABLISHED 6384 TCP 127.0.0.1:49738 127.0.0.1:49739 ESTABLISHED 6384 TCP 127.0.0.1:49739 127.0.0.1:49738 ESTABLISHED 6384 TCP 127.0.0.1:49857 127.0.0.1:65001 ESTABLISHED 4328 TCP 127.0.0.1:49862 127.0.0.1:9977 ESTABLISHED 12564 TCP 127.0.0.1:49867 0.0.0.0:0 LISTENING 7976 TCP 127.0.0.1:49867 127.0.0.1:49907 ESTABLISHED 7976 TCP 127.0.0.1:49907 127.0.0.1:49867 ESTABLISHED 13952 TCP 127.0.0.1:50914 127.0.0.1:3100 ESTABLISHED 8120 TCP 127.0.0.1:51008 127.0.0.1:51009 ESTABLISHED 14688 TCP 127.0.0.1:51009 127.0.0.1:51008 ESTABLISHED 14688 TCP 127.0.0.1:65001 0.0.0.0:0 LISTENING 4328 TCP 127.0.0.1:65001 127.0.0.1:49857 ESTABLISHED 4328 TCP 192.168.2.100:139 0.0.0.0:0 LISTENING 4 TCP [::]:135 [::]:0 LISTENING 1004 TCP [::]:445 [::]:0 LISTENING 4 TCP [::]:5357 [::]:0 LISTENING 4 TCP [::]:7680 [::]:0 LISTENING 3552 TCP [::]:49664 [::]:0 LISTENING 580 TCP [::]:49665 [::]:0 LISTENING 1488 TCP [::]:49666 [::]:0 LISTENING 1304 TCP [::]:49667 [::]:0 LISTENING 2256 TCP [::]:49668 [::]:0 LISTENING 3576 TCP [::]:49669 [::]:0 LISTENING 652 TCP [::]:49689 [::]:0 LISTENING 672 TCP [X::10f5]:50972 [X:0:2]:443 ESTABLISHED 1600 TCP [X::10f5]:51035 [X:c40b]:80 ESTABLISHED 11064 UDP 0.0.0.0:500 *:* 4240 UDP 0.0.0.0:3702 *:* 344 UDP 0.0.0.0:3702 *:* 2980 UDP 0.0.0.0:3702 *:* 2980 UDP 0.0.0.0:3702 *:* 344 UDP 0.0.0.0:4500 *:* 4240 UDP 0.0.0.0:5050 *:* 6608 UDP 0.0.0.0:5353 *:* 10984 UDP 0.0.0.0:5353 *:* 1600 UDP 0.0.0.0:5353 *:* 10984 UDP 0.0.0.0:5353 *:* 10116 UDP 0.0.0.0:5353 *:* 10984 UDP 0.0.0.0:5353 *:* 1600 UDP 0.0.0.0:5353 *:* 2180 UDP 0.0.0.0:5353 *:* 10116 UDP 0.0.0.0:5353 *:* 10984 UDP 0.0.0.0:5355 *:* 2180 UDP 0.0.0.0:6771 *:* 14688 UDP 0.0.0.0:6771 *:* 14688 UDP 0.0.0.0:27036 *:* 11064 UDP 0.0.0.0:51324 *:* 1600 UDP 0.0.0.0:54915 *:* 9284 UDP 0.0.0.0:55104 *:* 4524 UDP 0.0.0.0:55106 *:* 3576 UDP 0.0.0.0:56682 *:* 1600 UDP 0.0.0.0:57621 *:* 10116 UDP 0.0.0.0:57926 *:* 14688 UDP 0.0.0.0:57928 *:* 14688 UDP 0.0.0.0:58014 *:* 5696 UDP 0.0.0.0:58899 *:* 10116 UDP 0.0.0.0:58900 *:* 10116 UDP 0.0.0.0:59041 *:* 11064 UDP 0.0.0.0:59537 *:* 4328 UDP 0.0.0.0:63299 *:* 13844 UDP 0.0.0.0:64383 *:* 1600 UDP 0.0.0.0:64908 *:* 2980 UDP 0.0.0.0:64914 *:* 344 UDP 10.10.122.247:137 *:* 4 UDP 10.10.122.247:138 *:* 4 UDP 10.10.122.247:1900 *:* 3324 UDP 10.10.122.247:5353 *:* 4328 UDP 10.10.122.247:6771 *:* 14688 UDP 10.10.122.247:52004 *:* 3324 UDP 10.10.122.247:63487 *:* 14688 UDP 127.0.0.1:1900 *:* 3324 UDP 127.0.0.1:10010 *:* 7976 UDP 127.0.0.1:10011 *:* 6660 UDP 127.0.0.1:20157 *:* 14688 UDP 127.0.0.1:52005 *:* 3324 UDP 127.0.0.1:64472 *:* 5260 UDP 127.0.0.1:64916 *:* 3992 UDP 192.168.2.100:137 *:* 4 UDP 192.168.2.100:138 *:* 4 UDP 192.168.2.100:1900 *:* 3324 UDP 192.168.2.100:2177 *:* 7660 UDP 192.168.2.100:5353 *:* 4328 UDP 192.168.2.100:5353 *:* 4524 UDP 192.168.2.100:6771 *:* 14688 UDP 192.168.2.100:52003 *:* 3324 UDP 192.168.2.100:63488 *:* 14688 UDP [::]:500 *:* 4240 UDP [::]:3702 *:* 344 UDP [::]:3702 *:* 2980 UDP [::]:3702 *:* 2980 UDP [::]:3702 *:* 344 UDP [::]:4500 *:* 4240 UDP [::]:5353 *:* 10984 UDP [::]:5353 *:* 2180 UDP [::]:5353 *:* 10984 UDP [::]:5353 *:* 1600 UDP [::]:5355 *:* 2180 UDP [::]:6771 *:* 14688 UDP [::]:54915 *:* 9284 UDP [::]:55105 *:* 4524 UDP [::]:57927 *:* 14688 UDP [::]:57929 *:* 14688 UDP [::]:59538 *:* 4328 UDP [::]:64909 *:* 2980 UDP [::]:64915 *:* 344 UDP [::1]:1900 *:* 3324 UDP [::1]:5353 *:* 4328 UDP [::1]:5353 *:* 4524 UDP [::1]:52002 *:* 3324 UDP [X::10f5]:6771 *:* 14688 UDP [X::10f5]:57920 *:* 14688 UDP [X:7c15]:2177 *:* 7660 UDP [X:7c15]:6771 *:* 14688 UDP [X:7c15]:57923 *:* 14688 UDP [X:740e]:2177 *:* 7660 UDP [X:740e]:6771 *:* 14688 UDP [X:740e]:57922 *:* 14688 UDP [X:740e%8]:1900 *:* 3324 UDP [X:740e%8]:2177 *:* 7660 UDP [X:740e%8]:6771 *:* 14688 UDP [X:740e%8]:52000 *:* 3324 UDP [X:740e%8]:57924 *:* 14688 UDP [X:e4d0%14]:1900 *:* 3324 UDP [X:e4d0%14]:6771 *:* 14688 UDP [X:e4d0%14]:52001 *:* 3324 UDP [X:e4d0%14]:57921 *:* 14688 Quote Share this post Link to post
OpenSourcerer 1467 Posted ... Okay, it should work, then. You could try binding qB to the TAP interface. Doubt it will make it work, so it'll be a desperate action. I'm just going to shoot out ideas, no guarantee they're good ones What was the last thing you did before it stopped working? Installed something? Made an update? Changed a setting anywhere, even if it was an UI setting? Something in the router? Are there any other connections to AirVPN you can see in the client area? If yes, kill them all via the respective buttons, wait a moment and retry a connection. Maybe try another OS? Or in another network? Try another program, maybe? Though you wrote it didn't work with any program. There's a tool called netcat which allows to create arbitrary sockets. It's possible to setup a listening socket using it so that one can test whether connections are actually coming through while netcat explicitly tells you the results. There's a windows version also, usage should be similar to Linux, so something like this will work: netcat.exe -4 -v -l -s [IPv4 of the TAP interface] -p 20157 Then try a test on the port forwarding page or on canyouseeme.org again. If nc doesn't print any connection attempts, I don't know anymore. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
deadalus 0 Posted ... I uninstalled eddie and openTap, reinstalled (but version 2.18) and it fails to connect while checking IPv6. Unfortunately I dont have another OS /Network. Tracing back my steps, the only relevant thing that happened besides any automatic windows updates would be me re-installing openVPN in preparation for home office these weeks. (I also tried with OpenVPN and download a configuration from the website with no more luck regarding the ports) Here's the log while trying to connect today. I 2020.03.29 12:28:00 - Session starting. I 2020.03.29 12:28:00 - Checking authorization ... ! 2020.03.29 12:28:00 - Connecting to Hassaleh (Netherlands, Alblasserdam) . 2020.03.29 12:28:00 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.03.29 12:28:00 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.03.29 12:28:00 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.03.29 12:28:00 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.03.29 12:28:00 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.03.29 12:28:00 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.03.29 12:28:00 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.03.29 12:28:00 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.42:443 . 2020.03.29 12:28:00 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.03.29 12:28:00 - OpenVPN > UDP link local: (not bound) . 2020.03.29 12:28:00 - OpenVPN > UDP link remote: [AF_INET]213.152.161.42:443 . 2020.03.29 12:28:00 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.42:443, sid=43736556 . 2020.03.29 12:28:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.03.29 12:28:01 - OpenVPN > VERIFY KU OK . 2020.03.29 12:28:01 - OpenVPN > Validating certificate extended key usage . 2020.03.29 12:28:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.03.29 12:28:01 - OpenVPN > VERIFY EKU OK . 2020.03.29 12:28:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hassaleh, emailAddress=info@airvpn.org . 2020.03.29 12:28:01 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.03.29 12:28:01 - OpenVPN > [Hassaleh] Peer Connection Initiated with [AF_INET]213.152.161.42:443 . 2020.03.29 12:28:02 - OpenVPN > SENT CONTROL [Hassaleh]: 'PUSH_REQUEST' (status=1) . 2020.03.29 12:28:02 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.18.154.1,dhcp-option DNS6 :e9a::1,tun-ipv6,route-gateway 10.18.154.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 :e9a::10b4/64 :e9a::1,ifconfig 10.18.154.182 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2020.03.29 12:28:02 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.03.29 12:28:02 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.03.29 12:28:02 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.03.29 12:28:02 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.03.29 12:28:02 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.03.29 12:28:02 - OpenVPN > interactive service msg_channel=0 . 2020.03.29 12:28:02 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=8 HWADDR=:8d . 2020.03.29 12:28:02 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.03.29 12:28:02 - OpenVPN > GetBestInterfaceEx() returned if=8 . 2020.03.29 12:28:02 - OpenVPN > GDG6: II=8 DP=::/0 NH=:feda:6b08 . 2020.03.29 12:28:02 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2020.03.29 12:28:02 - OpenVPN > ROUTE6_GATEWAY :6b08 I=8 . 2020.03.29 12:28:02 - OpenVPN > open_tun . 2020.03.29 12:28:02 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{-ACC976A1EC99}.tap . 2020.03.29 12:28:02 - OpenVPN > TAP-Windows Driver Version 9.24 . 2020.03.29 12:28:02 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.18.154.0/10.18.154.182/255.255.255.0 [SUCCEEDED] . 2020.03.29 12:28:02 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.18.154.182/255.255.255.0 on interface {-ACC976A1EC99} [DHCP-serv: 10.18.154.254, lease-time: 31536000] . 2020.03.29 12:28:02 - OpenVPN > Successful ARP Flush on interface [14] {-ACC976A1EC99} . 2020.03.29 12:28:03 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=14 ::10b4 store=active . 2020.03.29 12:28:04 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Local Area Connection static :e9a::1 validate=no . 2020.03.29 12:28:04 - Detected an OpenVPN bug (On-Link route on VPN range), autofix. . 2020.03.29 12:28:04 - OpenVPN > add_route_ipv6(::/64 -> ::10b4 metric 0) dev Local Area Connection . 2020.03.29 12:28:04 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route :e9a::/64 interface=14 fe80::8 store=active . 2020.03.29 12:28:04 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.03.29 12:28:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.42 MASK 255.255.255.255 192.168.2.1 . 2020.03.29 12:28:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.03.29 12:28:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.18.154.1 . 2020.03.29 12:28:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.03.29 12:28:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.18.154.1 . 2020.03.29 12:28:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.03.29 12:28:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.03.29 12:28:09 - OpenVPN > add_route_ipv6(::/3 -> f:e9a::1 metric -1) dev Local Area Connection . 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=14 fe80::8 store=active . 2020.03.29 12:28:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.03.29 12:28:09 - OpenVPN > add_route_ipv6(2000::/4 -> :e9a::1 metric -1) dev Local Area Connection . 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=14 fe80::8 store=active . 2020.03.29 12:28:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.03.29 12:28:09 - OpenVPN > add_route_ipv6(3000::/4 ->:e9a::1 metric -1) dev Local Area Connection . 2020.03.29 12:28:09 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=14 fe80::8 store=active . 2020.03.29 12:28:09 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.03.29 12:28:10 - OpenVPN > add_route_ipv6(fc00::/7 -> :e9a::1 metric -1) dev Local Area Connection . 2020.03.29 12:28:10 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=14 fe80::8 store=active . 2020.03.29 12:28:10 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.03.29 12:28:10 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2020.03.29 12:28:10 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2020.03.29 12:28:10 - DNS leak protection with packet filtering enabled. . 2020.03.29 12:28:10 - Routes, added a new route, 213.152.161.40 for gateway 10.18.154.1 . 2020.03.29 12:28:10 - Routes, added a new route, :3810 for gateway :e9a::1 . 2020.03.29 12:28:10 - Flushing DNS I 2020.03.29 12:28:10 - Checking route IPv4 I 2020.03.29 12:28:10 - Checking route IPv6 . 2020.03.29 12:28:30 - curl: (28) Connection timed out after 20000 milliseconds . 2020.03.29 12:28:30 - Checking route (2° try) . 2020.03.29 12:28:51 - curl: (28) Connection timed out after 20000 milliseconds . 2020.03.29 12:28:51 - Checking route (3° try) . 2020.03.29 12:29:13 - curl: (28) Connection timed out after 20000 milliseconds E 2020.03.29 12:29:13 - Checking route IPv6 failed. . 2020.03.29 12:29:13 - OpenVPN > Initialization Sequence Completed ! 2020.03.29 12:29:13 - Disconnecting . 2020.03.29 12:29:13 - Routes, removed a route previously added, 213.152.161.40 for gateway 10.18.154.1 . 2020.03.29 12:29:14 - Routes, removed a route previously added, :d71f:3810 for gateway :e9a::1 . 2020.03.29 12:29:14 - Sending soft termination signal . 2020.03.29 12:29:17 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.03.29 12:29:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.42 MASK 255.255.255.255 192.168.2.1 . 2020.03.29 12:29:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.03.29 12:29:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.18.154.1 . 2020.03.29 12:29:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.03.29 12:29:19 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.18.154.1 . 2020.03.29 12:29:19 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.03.29 12:29:19 - OpenVPN > delete_route_ipv6(::/3) . 2020.03.29 12:29:19 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=14 fe80::8 store=active . 2020.03.29 12:29:19 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.03.29 12:29:20 - OpenVPN > delete_route_ipv6(2000::/4) . 2020.03.29 12:29:20 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=14 fe80::8 store=active . 2020.03.29 12:29:20 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.03.29 12:29:20 - OpenVPN > delete_route_ipv6(3000::/4) . 2020.03.29 12:29:20 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=14 fe80::8 store=active . 2020.03.29 12:29:20 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.03.29 12:29:20 - OpenVPN > delete_route_ipv6(fc00::/7) . 2020.03.29 12:29:20 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=14 fe80::8 store=active . 2020.03.29 12:29:20 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2020.03.29 12:29:20 - OpenVPN > Closing TUN/TAP interface . 2020.03.29 12:29:20 - OpenVPN > delete_route_ipv6(:e9a::/64) . 2020.03.29 12:29:20 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route:e9a::/64 interface=14 fe80::8 store=active . 2020.03.29 12:29:21 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Local Area Connection :e9a::10b4 store=active . 2020.03.29 12:29:22 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Local Area Connection all . 2020.03.29 12:29:22 - OpenVPN > TAP: DHCP address released . 2020.03.29 12:29:22 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.03.29 12:29:22 - Connection terminated. . 2020.03.29 12:29:22 - DNS leak protection with packet filtering disabled. . 2020.03.29 12:29:22 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2020.03.29 12:29:22 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 I 2020.03.29 12:29:24 - Cancel requested. ! 2020.03.29 12:29:24 - Session terminated. ! 2020.03.29 12:29:25 - Deactivation of Network Lock Quote Share this post Link to post
OpenSourcerer 1467 Posted ... 7 hours ago, deadalus said: I uninstalled eddie and openTap, reinstalled (but version 2.18) and it fails to connect while checking IPv6. Hm, yes, that is a new one. If you do Preferences > Networking > Layer IPv6: Block, does it change anything? Also, you called it "openTap". Is this the official TAP installation you get from Eddie/openvpn.net, or something else? Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
deadalus 0 Posted ... Nice, it connects to the server normally now, ports still not available though. OpenTap (not sure if name was exact) was available under apps and programs installed around the same time as openVPN, in the timespan since the last time I checked qbittorent when it was working (sometime in March). I just thought that doing a uninstall of all 3 and reinstalling eddie after that (and I went with 2.18 cause you also mentioned more potential fixes) would do the trick. I 2020.03.29 22:15:40 - Session starting. I 2020.03.29 22:15:41 - Checking authorization ... . 2020.03.29 22:15:41 - IPv6 disabled with packet filtering. ! 2020.03.29 22:15:41 - Connecting to Alpheratz (Netherlands, Alblasserdam) . 2020.03.29 22:15:41 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.03.29 22:15:41 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.03.29 22:15:41 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.03.29 22:15:41 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.03.29 22:15:41 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.03.29 22:15:41 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.03.29 22:15:41 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.03.29 22:15:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.245:443 . 2020.03.29 22:15:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.03.29 22:15:41 - OpenVPN > UDP link local: (not bound) . 2020.03.29 22:15:41 - OpenVPN > UDP link remote: [AF_INET]134.19.179.245:443 . 2020.03.29 22:15:41 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.245:443, sid= 5795ac58 . 2020.03.29 22:15:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.03.29 22:15:42 - OpenVPN > VERIFY KU OK . 2020.03.29 22:15:42 - OpenVPN > Validating certificate extended key usage . 2020.03.29 22:15:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.03.29 22:15:42 - OpenVPN > VERIFY EKU OK . 2020.03.29 22:15:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alpheratz, emailAddress=info@airvpn.org . 2020.03.29 22:15:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.03.29 22:15:42 - OpenVPN > [Alpheratz] Peer Connection Initiated with [AF_INET]134.19.179.245:443 . 2020.03.29 22:15:43 - OpenVPN > SENT CONTROL [Alpheratz]: 'PUSH_REQUEST' (status=1) . 2020.03.29 22:15:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.218.1,dhcp-option DNS6 :1cda::1,tun-ipv6,route-gateway 10.32.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 :1cda::106e/64 1cda::1,ifconfig 10.32.218.112 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2020.03.29 22:15:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.03.29 22:15:43 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 :1cda::1' . 2020.03.29 22:15:43 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2020.03.29 22:15:43 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 :1cda::106e/64 :1cda::1' . 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.03.29 22:15:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.03.29 22:15:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.03.29 22:15:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.03.29 22:15:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.03.29 22:15:43 - OpenVPN > interactive service msg_channel=0 . 2020.03.29 22:15:43 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=8 HWADDR=:ed:8d . 2020.03.29 22:15:43 - OpenVPN > open_tun . 2020.03.29 22:15:43 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{6-ACC976A1EC99}.tap . 2020.03.29 22:15:43 - OpenVPN > TAP-Windows Driver Version 9.24 . 2020.03.29 22:15:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.32.218.0/10.32.218.112/255.255.255.0 [SUCCEEDED] . 2020.03.29 22:15:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.32.218.112/255.255.255.0 on interface {6-ACC976A1EC99} [DHCP-serv: 10.32.218.254, lease-time: 31536000] . 2020.03.29 22:15:43 - OpenVPN > Successful ARP Flush on interface [14] {6-ACC976A1EC99} . 2020.03.29 22:15:48 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.03.29 22:15:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 134.19.179.245 MASK 255.255.255.255 192.168.2.1 . 2020.03.29 22:15:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.03.29 22:15:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.03.29 22:15:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.32.218.1 . 2020.03.29 22:15:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.03.29 22:15:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.03.29 22:15:48 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.32.218.1 . 2020.03.29 22:15:48 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.03.29 22:15:48 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.03.29 22:15:48 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2020.03.29 22:15:48 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2020.03.29 22:15:48 - DNS leak protection with packet filtering enabled. . 2020.03.29 22:15:48 - Routes, added a new route, 134.19.179.243 for gateway 10.32.218.1 . 2020.03.29 22:15:48 - Unable to compute route for :fcac:44b9: IPv6 VPN gateway not available. . 2020.03.29 22:15:48 - Flushing DNS I 2020.03.29 22:15:48 - Checking route IPv4 I 2020.03.29 22:15:48 - Checking DNS ! 2020.03.29 22:15:49 - Connected. . 2020.03.29 22:15:49 - OpenVPN > Initialization Sequence Completed Quote Share this post Link to post
OpenSourcerer 1467 Posted ... Okay. Well, I'm at the end of my wisdom. If no one else got any ideas, consider opening a support ticket. If you happen to resolve it, please report back here. Really sorry. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
Alfredox123 0 Posted ... port forward is not working for me either what should i do? Quote Share this post Link to post
OpenSourcerer 1467 Posted ... 4 hours ago, alfredox123 said: what should i do? Opening your own thread; this is Mr. deadalus' thread and the cause for your port forwarding problem can be very different. I prefer those two setups not to be mixed. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post