Jump to content
Not connected, Your IP: 18.206.187.81
Point Zero

Constant drop outs in data transfer

Recommended Posts

For a while now I've been getting annoying drop outs when any device is connected to any AirVPN server, the connection to the server remains up but all traffic in or out suddenly ceases, they start at random and typically last between 10-40 seconds, once they start they seem to typically get more and more frequent until they are happening every 2 to 3 minutes.
Its not the Internet connection I'm using as this remains running fine and all connections outside of the VPN continue at expected speeds when these drop outs occur.
I've tried changing protocols incase the ISP is deliberately interfering but nothing seems to help.
While 10-40 seconds may sound trivial, it makes some transfers downright painful (and occasionally impossible), especially when its at its most frequent 2-3 minute range.

If I change server eventually it will start again there maybe after an hour or so, sometimes just a few minutes.

I expect its something on the serverside, overload perhaps? (although I have tried on servers that your own stats say are virtually empty). I've also checked the logs and nothing appears there (or on the server graphs) when the drop outs occur.  Its just like the server falls into a catatonic state (but doesn't drop the VPN connection) then continues as if nothing ever happened.  If it was infrequent or was just a temporary drop in throughput I wouldn't mind, but it isn't.

Apart from this, I am very happy with the service, but unless it improves (I don't unrealisticly expect 100% perfect uptime from any VPN, but this is getting extremely annoying and troublesome) I will have to reconsider my use and re-subscription to this service.


 

Share this post


Link to post

We need those logs. In Eddie > Logs, click the lifebelt icon and paste or upload the output here. If you choose to paste it, consider using LOG formatting – it's the top left button in the post editor.
If you don't use Eddie, in the .ovpn config change the directive verb from 3 to 4 and connect. Let the connection drop a few times, then paste or upload that output here.
 

9 hours ago, Point Zero said:

I expect its something on the serverside, overload perhaps?


Very unlikely, otherwise the forums would be submerged in similar threads (by experience), but you're the only one as of now. :)
 
9 hours ago, Point Zero said:

Apart from this, I am very happy with the service, but unless it improves (I don't unrealisticly expect 100% perfect uptime from any VPN, but this is getting extremely annoying and troublesome) I will have to reconsider my use and re-subscription to this service.


You are free to reconsider your choices without writing this to the AirVPN community. Right now you effectively threatened said community with cancelling the service which makes it a wee bit peculiar. :)

» I am not an AirVPN team member. All opinions are my own and are not to be considered official. Only the AirVPN Staff account should be viewed as such.

» The forums is a place where you can ask questions to the community. You are not entitled to guaranteed answer times. Answer quality may vary, too. If you need professional support, please create tickets.

» If you're new, take some time to read LZ1's New User Guide to AirVPN. On questions, use the search function first. On errors, search for the error message instead.

» If you choose to create a new thread, keep in mind that we don't know your setup. Give info about it. Never forget the OpenVPN logs or, for Eddie, the support file (Logs > lifebelt icon).

» The community kindly asks you to not set up Tor exit relays when connected to AirVPN. Their IP addresses are subject to restrictions and these are relayed to all users of the affected servers.

 

» Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, chances are you will be unique amond the mass again.

Share this post


Link to post

Ok, log as requested, in this period of around 4 hours, there were atleast 5 drops (far less than the average I've been seeing lately) each lasting about 15-20 seconds each. Hope it helps.
If you want Eddie speed graphs of drop outs occuring I'll provide them.
 

Eddie System/Environment Report - 19/05/2020 - 21:47 UTC

Eddie version: 2.18.9
Eddie OS build: windows_x64
Eddie architecture: x64
OS type: Windows
OS name: Windows 10 Pro
OS version: Microsoft Windows NT 10.0.18363.0
OS architecture: x64
Mono /.Net Framework: v4.0.30319
TUN driver: 0901: 9.24.2; wintun: Not found
OpenVPN: 2.4.8 - OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
Hummingbird:  ()
SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
curl: 7.68.0 (C:\Program Files\AirVPN\curl.exe)
Profile path: C:\Users\Enigma\AppData\Local\Eddie\default.profile
Data path: C:\Users\Enigma\AppData\Local\Eddie
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\Eddie-UI.exe
Command line arguments: (0 args)
Network Lock Active: No
Connected to VPN: No
Detected DNS: 212.159.6.10, 212.159.6.9
Test DNS IPv4: Ok
Test DNS IPv6: Failed
Test Ping IPv4: 19 ms
Test Ping IPv6: -1 ms
Test HTTP IPv4: Ok
Test HTTP IPv6: Error:curl: (7) Failed to connect to 2a03:b0c0:2:d0::11b4:6001 port 80: Network unreachable
Test HTTPS: Ok
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
key: (omissis)
servers.scoretype: Latency
routes.custom: 192.168.0.0/16,out,Allow Data on outside subnet (required for some programs)
openvpn.custom: sndbuf 0
rcvbuf 0
compress lz4-v2

openvpn.sndbuf: -1
openvpn.rcvbuf: -1
gui.start_minimized: True

----------------------------
Logs:

. 2020.05.19 18:48:51 - Eddie version: 2.18.9 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.18363.0, Mono/.Net: v4.0.30319
. 2020.05.19 18:48:51 - Command line arguments (0):
. 2020.05.19 18:48:52 - Profile path: C:\Users\Enigma\AppData\Local\Eddie\default.profile
. 2020.05.19 18:48:52 - Reading options from C:\Users\Enigma\AppData\Local\Eddie\default.profile
. 2020.05.19 18:48:53 - Tun Driver - 0901: 9.24.2; wintun: Not found
. 2020.05.19 18:48:53 - OpenVPN - Version: 2.4.8 - OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2020.05.19 18:48:53 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2020.05.19 18:48:53 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2020.05.19 18:48:53 - curl - Version: 7.68.0 (C:\Program Files\AirVPN\curl.exe)
. 2020.05.19 18:48:53 - Recovery. Unexpected crash?
. 2020.05.19 18:48:53 - Routes, removed an existing route, 192.168.0.0/16 for gateway 192.168.1.254
. 2020.05.19 18:48:54 - Routes, removed an existing route, 217.151.98.168 for gateway 10.10.34.1
. 2020.05.19 18:48:54 - Routes, removed an existing route, 2001:ac8:31:4:1ce5:5dfc:8948:fb43 for gateway fde6:7a:7d20:622::1
I 2020.05.19 18:48:54 - Ready
. 2020.05.19 18:48:54 - Collect information about AirVPN completed
I 2020.05.19 18:49:54 - Session starting.
I 2020.05.19 18:49:54 - Checking authorization ...
! 2020.05.19 18:49:54 - Connecting to Alshain (United Kingdom of Great Britain and Northern Ireland, London)
. 2020.05.19 18:49:54 - Routes, restored a previously deleted route, 192.168.0.0/16 for gateway 192.168.1.254
. 2020.05.19 18:49:54 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
. 2020.05.19 18:49:54 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2020.05.19 18:49:54 - OpenVPN > library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10
. 2020.05.19 18:49:54 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.05.19 18:49:54 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.05.19 18:49:54 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.05.19 18:49:54 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.05.19 18:49:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]217.151.98.165:443
. 2020.05.19 18:49:54 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]
. 2020.05.19 18:49:54 - OpenVPN > UDP link local: (not bound)
. 2020.05.19 18:49:54 - OpenVPN > UDP link remote: [AF_INET]217.151.98.165:443
. 2020.05.19 18:49:54 - OpenVPN > TLS: Initial packet from [AF_INET]217.151.98.165:443, sid=3d9c99a4 e69f7a95
. 2020.05.19 18:49:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.19 18:49:55 - OpenVPN > VERIFY KU OK
. 2020.05.19 18:49:55 - OpenVPN > Validating certificate extended key usage
. 2020.05.19 18:49:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.19 18:49:55 - OpenVPN > VERIFY EKU OK
. 2020.05.19 18:49:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alshain, emailAddress=info@airvpn.org
. 2020.05.19 18:49:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.19 18:49:55 - OpenVPN > [Alshain] Peer Connection Initiated with [AF_INET]217.151.98.165:443
. 2020.05.19 18:49:56 - OpenVPN > SENT CONTROL [Alshain]: 'PUSH_REQUEST' (status=1)
. 2020.05.19 18:49:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.7.194.1,dhcp-option DNS6 fde6:7a:7d20:3c2::1,tun-ipv6,route-gateway 10.7.194.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:3c2::102b/64 fde6:7a:7d20:3c2::1,ifconfig 10.7.194.45 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2020.05.19 18:49:56 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.05.19 18:49:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.05.19 18:49:56 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.05.19 18:49:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.05.19 18:49:56 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.05.19 18:49:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.05.19 18:49:56 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.05.19 18:49:56 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.05.19 18:49:56 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.05.19 18:49:56 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.05.19 18:49:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.19 18:49:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.19 18:49:56 - OpenVPN > interactive service msg_channel=0
. 2020.05.19 18:49:56 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=24 HWADDR=08:62:66:80:96:33
. 2020.05.19 18:49:56 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.05.19 18:49:56 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found.   (code=1168)
. 2020.05.19 18:49:56 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.05.19 18:49:56 - OpenVPN > open_tun
. 2020.05.19 18:49:56 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{D7C4440C-D43E-4E37-B9CF-DF5F3A799605}.tap
. 2020.05.19 18:49:56 - OpenVPN > TAP-Windows Driver Version 9.24
. 2020.05.19 18:49:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.7.194.0/10.7.194.45/255.255.255.0 [SUCCEEDED]
. 2020.05.19 18:49:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.7.194.45/255.255.255.0 on interface {D7C4440C-D43E-4E37-B9CF-DF5F3A799605} [DHCP-serv: 10.7.194.254, lease-time: 31536000]
. 2020.05.19 18:49:56 - OpenVPN > Successful ARP Flush on interface [17] {D7C4440C-D43E-4E37-B9CF-DF5F3A799605}
. 2020.05.19 18:49:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=17 fde6:7a:7d20:3c2::102b store=active
. 2020.05.19 18:49:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Local Area Connection static fde6:7a:7d20:3c2::1 validate=no
. 2020.05.19 18:49:58 - OpenVPN > add_route_ipv6(fde6:7a:7d20:3c2::/64 -> fde6:7a:7d20:3c2::102b metric 0) dev Local Area Connection
. 2020.05.19 18:49:58 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:3c2::/64 interface=17 fe80::8 store=active
. 2020.05.19 18:49:58 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.05.19 18:50:03 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2020.05.19 18:50:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 217.151.98.165 MASK 255.255.255.255 192.168.1.254
. 2020.05.19 18:50:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2020.05.19 18:50:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.19 18:50:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.7.194.1
. 2020.05.19 18:50:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.05.19 18:50:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.19 18:50:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.7.194.1
. 2020.05.19 18:50:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2020.05.19 18:50:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2020.05.19 18:50:03 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:3c2::1 metric -1) dev Local Area Connection
. 2020.05.19 18:50:03 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=17 fe80::8 store=active
. 2020.05.19 18:50:03 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.05.19 18:50:03 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:3c2::1 metric -1) dev Local Area Connection
. 2020.05.19 18:50:03 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=17 fe80::8 store=active
. 2020.05.19 18:50:03 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.05.19 18:50:03 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:3c2::1 metric -1) dev Local Area Connection
. 2020.05.19 18:50:03 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=17 fe80::8 store=active
. 2020.05.19 18:50:03 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.05.19 18:50:03 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:3c2::1 metric -1) dev Local Area Connection
. 2020.05.19 18:50:03 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=17 fe80::8 store=active
. 2020.05.19 18:50:03 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.05.19 18:50:03 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4
. 2020.05.19 18:50:03 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6
. 2020.05.19 18:50:03 - DNS leak protection with packet filtering enabled.
. 2020.05.19 18:50:03 - Routes, added a new route, 217.151.98.163 for gateway 10.7.194.1
. 2020.05.19 18:50:04 - Routes, added a new route, 2001:ac8:31:3:2926:7fe8:9d5e:812a for gateway fde6:7a:7d20:3c2::1
. 2020.05.19 18:50:04 - Flushing DNS
I 2020.05.19 18:50:04 - Checking route IPv4
I 2020.05.19 18:50:04 - Checking route IPv6
I 2020.05.19 18:50:07 - Checking DNS
! 2020.05.19 18:50:07 - Connected.
. 2020.05.19 18:50:07 - OpenVPN > Initialization Sequence Completed
. 2020.05.19 19:19:02 - Collect information about AirVPN completed
. 2020.05.19 19:49:55 - Above log line repeated 1 times more
. 2020.05.19 19:49:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.19 19:49:55 - OpenVPN > VERIFY KU OK
. 2020.05.19 19:49:55 - OpenVPN > Validating certificate extended key usage
. 2020.05.19 19:49:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.19 19:49:55 - OpenVPN > VERIFY EKU OK
. 2020.05.19 19:49:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alshain, emailAddress=info@airvpn.org
. 2020.05.19 19:49:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.19 19:49:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.19 19:49:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.19 20:19:04 - Collect information about AirVPN completed
. 2020.05.19 20:49:54 - Above log line repeated 1 times more
. 2020.05.19 20:49:54 - Renewing TLS key
. 2020.05.19 20:49:54 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.19 20:49:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.19 20:49:55 - OpenVPN > VERIFY KU OK
. 2020.05.19 20:49:55 - OpenVPN > Validating certificate extended key usage
. 2020.05.19 20:49:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.19 20:49:55 - OpenVPN > VERIFY EKU OK
. 2020.05.19 20:49:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alshain, emailAddress=info@airvpn.org
. 2020.05.19 20:49:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.19 20:49:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.19 20:49:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.19 21:19:15 - Collect information about AirVPN completed
. 2020.05.19 21:49:54 - Above log line repeated 1 times more
. 2020.05.19 21:49:54 - Renewing TLS key
. 2020.05.19 21:49:54 - OpenVPN > TLS: tls_process: killed expiring key
. 2020.05.19 21:49:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.05.19 21:49:55 - OpenVPN > VERIFY KU OK
. 2020.05.19 21:49:55 - OpenVPN > Validating certificate extended key usage
. 2020.05.19 21:49:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.05.19 21:49:55 - OpenVPN > VERIFY EKU OK
. 2020.05.19 21:49:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alshain, emailAddress=info@airvpn.org
. 2020.05.19 21:49:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.19 21:49:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.05.19 21:49:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.05.19 22:19:17 - Collect information about AirVPN completed
! 2020.05.19 22:41:17 - Disconnecting
. 2020.05.19 22:41:17 - Routes, removed an existing route, 192.168.0.0/16 for gateway 192.168.1.254
. 2020.05.19 22:41:17 - Routes, removed a route previously added, 217.151.98.163 for gateway 10.7.194.1
. 2020.05.19 22:41:18 - Routes, removed a route previously added, 2001:ac8:31:3:2926:7fe8:9d5e:812a for gateway fde6:7a:7d20:3c2::1
. 2020.05.19 22:41:18 - Sending soft termination signal
. 2020.05.19 22:41:21 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.05.19 22:41:23 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 217.151.98.165 MASK 255.255.255.255 192.168.1.254
. 2020.05.19 22:41:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.19 22:41:23 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.7.194.1
. 2020.05.19 22:41:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.19 22:41:23 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.7.194.1
. 2020.05.19 22:41:23 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2020.05.19 22:41:23 - OpenVPN > delete_route_ipv6(::/3)
. 2020.05.19 22:41:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=17 fe80::8 store=active
. 2020.05.19 22:41:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.05.19 22:41:23 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.05.19 22:41:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=17 fe80::8 store=active
. 2020.05.19 22:41:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.05.19 22:41:23 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.05.19 22:41:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=17 fe80::8 store=active
. 2020.05.19 22:41:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.05.19 22:41:23 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.05.19 22:41:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=17 fe80::8 store=active
. 2020.05.19 22:41:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2020.05.19 22:41:23 - OpenVPN > Closing TUN/TAP interface
. 2020.05.19 22:41:23 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:3c2::/64)
. 2020.05.19 22:41:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:3c2::/64 interface=17 fe80::8 store=active
. 2020.05.19 22:41:25 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Local Area Connection fde6:7a:7d20:3c2::102b store=active
. 2020.05.19 22:41:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Local Area Connection all
. 2020.05.19 22:41:26 - OpenVPN > TAP: DHCP address released
. 2020.05.19 22:41:26 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.05.19 22:41:26 - Connection terminated.
. 2020.05.19 22:41:26 - DNS leak protection with packet filtering disabled.
. 2020.05.19 22:41:26 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4
. 2020.05.19 22:41:26 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6
. 2020.05.19 22:41:26 - Flushing DNS
! 2020.05.19 22:41:28 - Session terminated.

----------------------------
Network Interfaces and Routes:

{
    "support_ipv4": true,
    "support_ipv6": true,
    "routes": [
        {
            "address": "0.0.0.0\/0",
            "interface": "{F884EA4F-90DA-4B5E-AD73-A0F3CF03C311}",
            "gateway": "192.168.1.254",
            "metric": "35"
        },
        {
            "address": "127.0.0.0\/8",
            "interface": "{F9F4C633-B41A-11E7-B378-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "127.0.0.1",
            "interface": "{F9F4C633-B41A-11E7-B378-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "127.255.255.255",
            "interface": "{F9F4C633-B41A-11E7-B378-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "192.168.1.0\/24",
            "interface": "{F884EA4F-90DA-4B5E-AD73-A0F3CF03C311}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "192.168.1.64",
            "interface": "{F884EA4F-90DA-4B5E-AD73-A0F3CF03C311}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "192.168.1.255",
            "interface": "{F884EA4F-90DA-4B5E-AD73-A0F3CF03C311}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{F9F4C633-B41A-11E7-B378-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "224.0.0.0\/4",
            "interface": "{F884EA4F-90DA-4B5E-AD73-A0F3CF03C311}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "255.255.255.255",
            "interface": "{F9F4C633-B41A-11E7-B378-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "255.255.255.255",
            "interface": "{F884EA4F-90DA-4B5E-AD73-A0F3CF03C311}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "::1",
            "interface": "{F9F4C633-B41A-11E7-B378-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "fe80::\/64",
            "interface": "{F884EA4F-90DA-4B5E-AD73-A0F3CF03C311}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "fe80::ec5a:bfb2:35ae:e632",
            "interface": "{F884EA4F-90DA-4B5E-AD73-A0F3CF03C311}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "ff00::\/8",
            "interface": "{F9F4C633-B41A-11E7-B378-806E6F6E6963}",
            "gateway": "link",
            "metric": "331"
        },
        {
            "address": "ff00::\/8",
            "interface": "{F884EA4F-90DA-4B5E-AD73-A0F3CF03C311}",
            "gateway": "link",
            "metric": "291"
        },
        {
            "address": "2001:ac8:31:4:1ce5:5dfc:8948:fb43",
            "gateway": "fde6:7a:7d20:623::1",
            "metric": "4294967295"
        },
        {
            "address": "2a00:1678:2470:44:cf2:ef3e:d71f:3810",
            "gateway": "fde6:7a:7d20:e82::1",
            "metric": "4294967295"
        }
    ],
    "interfaces": [
        {
            "friendly": "VPN - VPN Client",
            "id": "{D617E002-5A84-4539-9192-BA6BF1B5A0D6}",
            "name": "VPN - VPN Client",
            "description": "VPN Client Adapter - VPN",
            "type": "53",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::29a9:e472:afac:d27c",
                "169.254.210.124"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Local Area Connection",
            "id": "{D7C4440C-D43E-4E37-B9CF-DF5F3A799605}",
            "name": "Local Area Connection",
            "description": "TAP-Windows Adapter V9",
            "type": "53",
            "status": "Down",
            "bytes_received": "1534620453",
            "bytes_sent": "6669632829",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::5507:f1af:964f:1f2d",
                "169.254.31.45"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Ethernet 5",
            "id": "{F884EA4F-90DA-4B5E-AD73-A0F3CF03C311}",
            "name": "Ethernet 5",
            "description": "Intel(R) Ethernet Connection (2) I218-V",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "1864745693",
            "bytes_sent": "7033835638",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::ec5a:bfb2:35ae:e632",
                "192.168.1.64"
            ],
            "gateways": [
                "192.168.1.254"
            ],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Loopback Pseudo-Interface 1",
            "id": "{F9F4C633-B41A-11E7-B378-806E6F6E6963}",
            "name": "Loopback Pseudo-Interface 1",
            "description": "Software Loopback Interface 1",
            "type": "Loopback",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "::1",
                "127.0.0.1"
            ],
            "gateways": [],
            "bind": true,
            "dns4": "",
            "dns6": null
        }
    ],
    "ipv4-default-gateway": "192.168.1.254",
    "ipv4-default-interface": "{F884EA4F-90DA-4B5E-AD73-A0F3CF03C311}"
}
----------------------------
ipconfig /all:

Windows IP Configuration

   Host Name . . . . . . . . . . . . : Saturn
   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : lan

Unknown adapter VPN - VPN Client:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : VPN Client Adapter - VPN
   Physical Address. . . . . . . . . : 5E-5D-78-EB-FC-85
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Unknown adapter Local Area Connection:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : TAP-Windows Adapter V9
   Physical Address. . . . . . . . . : 00-FF-D7-C4-44-0C
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Ethernet adapter Ethernet 5:

   Connection-specific DNS Suffix  . : lan
   Description . . . . . . . . . . . : Intel(R) Ethernet Connection (2) I218-V
   Physical Address. . . . . . . . . : 08-62-66-80-96-33
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::ec5a:bfb2:35ae:e632%24(Preferred)
   IPv4 Address. . . . . . . . . . . : 192.168.1.64(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : 19 May 2020 18:48:20
   Lease Expires . . . . . . . . . . : 20 May 2020 00:46:25
   Default Gateway . . . . . . . . . : 192.168.1.254
   DHCP Server . . . . . . . . . . . : 192.168.1.254
   DHCPv6 IAID . . . . . . . . . . . : 252207718
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1D-7E-3D-46-08-62-66-80-9B-0B
   DNS Servers . . . . . . . . . . . : 212.159.6.9
                                       212.159.6.10
   NetBIOS over Tcpip. . . . . . . . : Enabled

Share this post


Link to post
15 hours ago, Point Zero said:

openvpn.custom: sndbuf 0
rcvbuf 0
compress lz4-v2


First of all, you can delete all these custom directives.
Setting the buffers twice, in Preferences and in OVPN directives, is superfluous. Eddie already explicitly sets them to -1 which amounts to "use defaults".
The compress parameter can be omitted as well, unless you're still on 3G or ADSL. Have you tried connecting without it?

Apart from that, it looks.. boringly normal. Are you using any internet security programs, firewalls, download managers?
If you want to optimize your system-wide buffers (amongst other networking-related things), I suggest TCP Optimizer. Greatly helped some people here in the past. Open as admin, in the first tab set your connection speed to whatever yours is, then down at "Choose settings" click "Optimal", confirm, reboot. Retry a connection then.

» I am not an AirVPN team member. All opinions are my own and are not to be considered official. Only the AirVPN Staff account should be viewed as such.

» The forums is a place where you can ask questions to the community. You are not entitled to guaranteed answer times. Answer quality may vary, too. If you need professional support, please create tickets.

» If you're new, take some time to read LZ1's New User Guide to AirVPN. On questions, use the search function first. On errors, search for the error message instead.

» If you choose to create a new thread, keep in mind that we don't know your setup. Give info about it. Never forget the OpenVPN logs or, for Eddie, the support file (Logs > lifebelt icon).

» The community kindly asks you to not set up Tor exit relays when connected to AirVPN. Their IP addresses are subject to restrictions and these are relayed to all users of the affected servers.

 

» Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, chances are you will be unique amond the mass again.

Share this post


Link to post
@giganerd Those buffer setting I was experimenting with makes no difference as you stated, I was trying them after suggestions elsewhere on the net to do with openvpn.
As for that compression option I was told this might help thoughput regardless of connection, I'm on a VDSL2 (FTTC) connection @ 80Mbit/20Mbit, you think its worthwhile using or a waste of time (it seems to slightly boost, but it could just be wishful thinking, as I've done no real comparison test)?

@Staff Thanks for the suggestion, I'm going to try it soon.  I'll post back if theres any difference

 

Share this post


Link to post
10 hours ago, Point Zero said:

you think its worthwhile using or a waste of time (it seems to slightly boost, but it could just be wishful thinking, as I've done no real comparison test)?


It may do so, problem is, compression and encryption lead to security problems in the past, not only in OpenVPN, and is therefore not advisable.

» I am not an AirVPN team member. All opinions are my own and are not to be considered official. Only the AirVPN Staff account should be viewed as such.

» The forums is a place where you can ask questions to the community. You are not entitled to guaranteed answer times. Answer quality may vary, too. If you need professional support, please create tickets.

» If you're new, take some time to read LZ1's New User Guide to AirVPN. On questions, use the search function first. On errors, search for the error message instead.

» If you choose to create a new thread, keep in mind that we don't know your setup. Give info about it. Never forget the OpenVPN logs or, for Eddie, the support file (Logs > lifebelt icon).

» The community kindly asks you to not set up Tor exit relays when connected to AirVPN. Their IP addresses are subject to restrictions and these are relayed to all users of the affected servers.

 

» Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, chances are you will be unique amond the mass again.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...