gmini 0 Posted ... Hello, I've been having this very annoying problem with the service for a long time now. Some days the vpn is working just fine and providing normal speeds, then suddenly and randomly it slows down to a crawl to the point it's unusable, slowing down my entire internet connection. This slowdown can last anywhere from few hours to several days, effectively restricting me from using the vpn for that time period. Now the vpn is used mainly with P2P. I've tried changing a million things. I have done many many tests, tried tweaking options anywhere I can including Eddie, my qbittorrent client, and Windows itself. I went through dozens of posts here on the forums trying to do what people suggested but nothing solved this problem. Tried different versions of both qbittorrent and Eddie (currently on newest version), different P2P clients, all the suggested protocols on Eddie, changed all the popular settings on qbittorrent, port forwarding, even the new wintun driver option. Nothing. From all my tests the problem seems to originate in either the vpn itself or specifically in the interaction between the vpn and P2P. The slowdowns are immediately solved by simply turning off the vpn. qbittorrent then immediately goes back to normal speeds when i'm on my regular ISP server! Speed tests agree with that pattern. My normal download speed is 100-110Mbps; when the the vpn works normally the speed is right around 90Mbps; when the slowdowns occur it's around 1-10Mbps-- unusable. Important to emphasize, slowdowns never occur with the vpn turned off. It feels as though I'm being throttled by the service but hopefully that's not the case. Does anyone know why this is happening? Quote Share this post Link to post
OpenSourcerer 1441 Posted ... How do you connect to AirVPN? Which settings? Something like Eddie support file (Logs > lifebelt icon) or OpenVPN config and logs can help narrow it down. With your description alone no troubleshooting can commence. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
gmini 0 Posted ... 33 minutes ago, OpenSourcerer said: How do you connect to AirVPN? Which settings? Something like Eddie support file (Logs > lifebelt icon) or OpenVPN config and logs can help narrow it down. With your description alone no troubleshooting can commence. Thanks for the reply. Here is a log from just now: Eddie System/Environment Report - 4/19/2021 - 8:34 PM UTC Eddie version: 2.20.0 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Home OS version: Microsoft Windows NT 10.0.19041.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN driver: 0901: 9.24.6; wintun: 0.8 OpenVPN: 2.5.1 - OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: () ---------------------------- SSH: plink 0.73 Build platform: 64-bit x86 Windows Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800 Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe) ---------------------------- SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Program Files\AirVPN\default.profile Data path: C:\Program Files\AirVPN Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (0 args) Network Lock Active: Yes, Windows Filtering Platform Connected to VPN: Yes, Alwaid Detected DNS: 10.8.158.1, 2001:558:feed::1, 2001:558:feed::2, 75.75.75.75, 75.75.76.76 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 120 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: Fetch url error:Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True netlock: True network.entry.iplayer: ipv4-only network.ipv6.mode: block gui.notifications: False ---------------------------- Logs: . 2021.04.19 12:53:34 - Eddie version: 2.20.0 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.19041.0, Mono/.Net: v4.0.30319 . 2021.04.19 12:53:34 - Command line arguments (0): . 2021.04.19 12:53:35 - Profile path: C:\Program Files\AirVPN\default.profile . 2021.04.19 12:53:35 - Reading options from C:\Program Files\AirVPN\default.profile . 2021.04.19 12:53:36 - Tun Driver - 0901: 9.24.6; wintun: 0.8 . 2021.04.19 12:53:36 - OpenVPN - Version: 2.5.1 - OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2021.04.19 12:53:36 - SSH - Version: plink 0.73 . 2021.04.19 12:53:36 - Build platform: 64-bit x86 Windows . 2021.04.19 12:53:36 - Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800 . 2021.04.19 12:53:36 - Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe) . 2021.04.19 12:53:36 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) . 2021.04.19 12:53:36 - Recovery. Unexpected crash? . 2021.04.19 12:53:36 - Routes, removed an existing route, 184.75.214.163 for gateway 10.13.126.1 . 2021.04.19 12:53:36 - Routes, added a new route, 134.19.179.155 for gateway 10.34.102.1 . 2021.04.19 12:53:36 - Routes, removed an existing route, 184.75.221.43 for gateway 10.30.222.1 ! 2021.04.19 12:53:36 - Activation of Network Lock - Windows Filtering Platform I 2021.04.19 12:53:37 - Ready . 2021.04.19 12:53:37 - Collect information about AirVPN completed I 2021.04.19 12:53:37 - Session starting. . 2021.04.19 12:53:38 - Waiting for latency tests (192 to go) . 2021.04.19 12:53:40 - Waiting for latency tests (168 to go) . 2021.04.19 12:53:42 - Waiting for latency tests (143 to go) . 2021.04.19 12:53:45 - Waiting for latency tests (118 to go) . 2021.04.19 12:53:48 - Waiting for latency tests (92 to go) . 2021.04.19 12:53:49 - Waiting for latency tests (42 to go) . 2021.04.19 12:53:50 - Waiting for latency tests (18 to go) I 2021.04.19 12:53:53 - Checking authorization ... . 2021.04.19 12:53:54 - IPv6 disabled with packet filtering. ! 2021.04.19 12:53:54 - Connecting to Alwaid (Canada, Toronto, Ontario) . 2021.04.19 12:53:54 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.04.19 12:53:54 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.04.19 12:53:54 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.04.19 12:53:54 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.04.19 12:53:54 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.04.19 12:53:54 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.04.19 12:53:54 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.04.19 12:53:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.117:443 . 2021.04.19 12:53:54 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.04.19 12:53:54 - OpenVPN > UDP link local: (not bound) . 2021.04.19 12:53:54 - OpenVPN > UDP link remote: [AF_INET]184.75.221.117:443 . 2021.04.19 12:53:54 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.117:443, sid=f984cc93 782bb18e . 2021.04.19 12:53:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.04.19 12:53:54 - OpenVPN > VERIFY KU OK . 2021.04.19 12:53:54 - OpenVPN > Validating certificate extended key usage . 2021.04.19 12:53:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.04.19 12:53:54 - OpenVPN > VERIFY EKU OK . 2021.04.19 12:53:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org . 2021.04.19 12:53:54 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.04.19 12:53:54 - OpenVPN > [Alwaid] Peer Connection Initiated with [AF_INET]184.75.221.117:443 . 2021.04.19 12:53:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.158.1,dhcp-option DNS6 fde6:7a:7d20:49e::1,tun-ipv6,route-gateway 10.8.158.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:49e::100f/64 fde6:7a:7d20:49e::1,ifconfig 10.8.158.17 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2021.04.19 12:53:54 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.04.19 12:53:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:49e::1' . 2021.04.19 12:53:54 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2021.04.19 12:53:54 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:49e::100f/64 fde6:7a:7d20:49e::1' . 2021.04.19 12:53:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.04.19 12:53:54 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.04.19 12:53:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.04.19 12:53:54 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.04.19 12:53:54 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.04.19 12:53:54 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.04.19 12:53:54 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.04.19 12:53:54 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.04.19 12:53:54 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.04.19 12:53:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.19 12:53:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.19 12:53:54 - OpenVPN > interactive service msg_channel=0 . 2021.04.19 12:53:54 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=3 HWADDR=9c:29:76:74:4a:d7 . 2021.04.19 12:53:54 - OpenVPN > open_tun . 2021.04.19 12:53:54 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.04.19 12:53:54 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.04.19 12:53:54 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.158.0/10.8.158.17/255.255.255.0 [SUCCEEDED] . 2021.04.19 12:53:54 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.158.17/255.255.255.0 on interface {657D23F1-C10A-4FB3-A370-950E0BB8E9F5} [DHCP-serv: 10.8.158.254, lease-time: 31536000] . 2021.04.19 12:53:54 - OpenVPN > Successful ARP Flush on interface [10] {657D23F1-C10A-4FB3-A370-950E0BB8E9F5} . 2021.04.19 12:53:54 - OpenVPN > IPv4 MTU set to 1500 on interface 10 using SetIpInterfaceEntry() . 2021.04.19 12:53:59 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.04.19 12:53:59 - OpenVPN > C:\Windows\system32\route.exe ADD 184.75.221.117 MASK 255.255.255.255 10.0.0.1 . 2021.04.19 12:53:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2021.04.19 12:53:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.04.19 12:53:59 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.158.1 . 2021.04.19 12:53:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.04.19 12:53:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.04.19 12:53:59 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.158.1 . 2021.04.19 12:53:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.04.19 12:53:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.04.19 12:53:59 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.04.19 12:53:59 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.04.19 12:53:59 - DNS leak protection with packet filtering enabled. . 2021.04.19 12:53:59 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.8.158.1) . 2021.04.19 12:53:59 - Routes, added a new route, 184.75.221.115 for gateway 10.8.158.1 . 2021.04.19 12:53:59 - Unable to compute route for 2606:6080:1001:11:60bc:461c:1305:bb4b: IPv6 VPN gateway not available. . 2021.04.19 12:53:59 - Flushing DNS I 2021.04.19 12:53:59 - Checking route IPv4 I 2021.04.19 12:54:00 - Checking DNS ! 2021.04.19 12:54:00 - Connected. . 2021.04.19 12:54:00 - OpenVPN > Initialization Sequence Completed . 2021.04.19 12:58:30 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #1178427 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2021.04.19 13:23:42 - Above log line repeated 157 times more . 2021.04.19 13:23:42 - Collect information about AirVPN completed . 2021.04.19 13:44:37 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #9180640 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2021.04.19 13:48:03 - Above log line repeated 85 times more . 2021.04.19 13:48:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.04.19 13:48:03 - OpenVPN > VERIFY KU OK . 2021.04.19 13:48:03 - OpenVPN > Validating certificate extended key usage . 2021.04.19 13:48:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.04.19 13:48:03 - OpenVPN > VERIFY EKU OK . 2021.04.19 13:48:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org . 2021.04.19 13:48:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.19 13:48:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.19 13:48:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.04.19 13:53:45 - Collect information about AirVPN completed . 2021.04.19 14:04:57 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #4153196 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2021.04.19 14:24:02 - Above log line repeated 355 times more . 2021.04.19 14:24:02 - Collect information about AirVPN completed . 2021.04.19 14:24:12 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #12681232 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2021.04.19 14:42:11 - Above log line repeated 482 times more . 2021.04.19 14:42:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.04.19 14:42:11 - OpenVPN > VERIFY KU OK . 2021.04.19 14:42:11 - OpenVPN > Validating certificate extended key usage . 2021.04.19 14:42:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.04.19 14:42:11 - OpenVPN > VERIFY EKU OK . 2021.04.19 14:42:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org . 2021.04.19 14:42:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.19 14:42:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.19 14:42:11 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.04.19 14:53:59 - Collect information about AirVPN completed . 2021.04.19 14:58:55 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #8864719 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2021.04.19 15:24:03 - Above log line repeated 151 times more . 2021.04.19 15:24:03 - Collect information about AirVPN completed . 2021.04.19 15:31:46 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #16113368 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2021.04.19 15:34:23 - Above log line repeated 172 times more . 2021.04.19 15:34:23 - ping 1 . 2021.04.19 15:34:23 - ping 2 W . 2021.04.19 15:34:23 - ping 2 WE ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "10.0.0.1", "metric": "40" }, { "address": "0.0.0.0\/1", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "10.8.158.1", "metric": "3" }, { "address": "10.0.0.0\/24", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "10.0.0.110", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "10.0.0.255", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "10.8.158.0\/24", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "10.8.158.17", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "10.8.158.255", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "127.0.0.0\/8", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.0.0.1", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.255.255.255", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "128.0.0.0\/1", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "10.8.158.1", "metric": "3" }, { "address": "134.19.179.155", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "10.34.102.1", "metric": "4" }, { "address": "184.75.221.115", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "10.8.158.1", "metric": "4" }, { "address": "184.75.221.117", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "10.0.0.1", "metric": "40" }, { "address": "224.0.0.0\/4", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "224.0.0.0\/4", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "224.0.0.0\/4", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "255.255.255.255", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "255.255.255.255", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "255.255.255.255", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "::1", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "2601:243:2080:bb60::\/64", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "2601:243:2080:bb60::ef2b", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "2601:243:2080:bb60:2d83:777f:ab00:89b5", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "2601:243:2080:bb60:f921:713:14d9:272f", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "fe80::\/64", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "fe80::\/64", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "fe80::590:986:efed:d2f9", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "fe80::f921:713:14d9:272f", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "ff00::\/8", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "ff00::\/8", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "ff00::\/8", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" } ], "interfaces": [ { "friendly": "Local Area Connection", "id": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "name": "Local Area Connection", "description": "TAP-Windows Adapter V9", "type": "Virtual", "status": "Up", "bytes_received": "201990094197", "bytes_sent": "18976339463", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::590:986:efed:d2f9", "10.8.158.17" ], "gateways": [ "10.8.158.1", "10.34.102.1" ], "bind": true, "dns4": "10.8.158.1", "dns6": null }, { "friendly": "Ethernet", "id": "{B840C4DB-70F3-491D-AFCB-4B49C2FA08A5}", "name": "Ethernet", "description": "Killer E2500 Gigabit Ethernet Controller", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::60bf:ddf0:c28f:10fd", "169.254.16.253" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection 2", "id": "{97B134A8-373C-4275-A0A3-2FF79942D169}", "name": "Local Area Connection 2", "description": "Wintun Userspace Tunnel", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::10b2:2784:1df9:5c5c", "10.8.222.21", "169.254.92.92" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 1", "id": "{9B7C5F17-218C-451C-B0D8-83A294E5F8EA}", "name": "Local Area Connection* 1", "description": "Microsoft Wi-Fi Direct Virtual Adapter", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::d03:a697:e978:7bf0", "169.254.123.240" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 2", "id": "{52D96744-02CA-4182-85E7-1CF2A51161AF}", "name": "Local Area Connection* 2", "description": "Microsoft Wi-Fi Direct Virtual Adapter #2", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::74cc:fd5b:8f6e:a9c", "169.254.10.156" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Wi-Fi", "id": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "name": "Wi-Fi", "description": "Killer(R) Wi-Fi 6 AX1650i 160MHz Wireless Network Adapter (201NGW)", "type": "Wireless80211", "status": "Up", "bytes_received": "81516973715", "bytes_sent": "9588699683", "support_ipv4": true, "support_ipv6": true, "ips": [ "2601:243:2080:bb60::ef2b", "2601:243:2080:bb60:f921:713:14d9:272f", "2601:243:2080:bb60:2d83:777f:ab00:89b5", "fe80::f921:713:14d9:272f", "10.0.0.110" ], "gateways": [ "10.0.0.1" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "gateways": [], "bind": true, "dns4": "", "dns6": null } ], "ipv4-default-gateway": "10.8.158.1", "ipv4-default-interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}" } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : LAPTOP-VL5VL7T4 Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : hsd1.il.comcast.net Unknown adapter Local Area Connection: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-65-7D-23-F1 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::590:986:efed:d2f9%10(Preferred) IPv4 Address. . . . . . . . . . . : 10.8.158.17(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Monday, April 19, 2021 12:53:54 PM Lease Expires . . . . . . . . . . : Tuesday, April 19, 2022 12:53:55 PM Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.8.158.254 DHCPv6 IAID . . . . . . . . . . . : 671154021 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-26-FF-86-6C-7C-D3-0A-83-CE-7D DNS Servers . . . . . . . . . . . : 10.8.158.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Killer E2500 Gigabit Ethernet Controller Physical Address. . . . . . . . . : 7C-D3-0A-83-CE-7D DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Unknown adapter Local Area Connection 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Wintun Userspace Tunnel Physical Address. . . . . . . . . : DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 9C-29-76-74-4A-D8 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2 Physical Address. . . . . . . . . : 9E-29-76-74-4A-D7 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi: Connection-specific DNS Suffix . : hsd1.il.comcast.net Description . . . . . . . . . . . : Killer(R) Wi-Fi 6 AX1650i 160MHz Wireless Network Adapter (201NGW) Physical Address. . . . . . . . . : 9C-29-76-74-4A-D7 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2601:243:2080:bb60::ef2b(Preferred) Lease Obtained. . . . . . . . . . : Monday, April 19, 2021 11:25:07 AM Lease Expires . . . . . . . . . . : Sunday, April 25, 2021 3:17:48 PM IPv6 Address. . . . . . . . . . . : 2601:243:2080:bb60:f921:713:14d9:272f(Preferred) Temporary IPv6 Address. . . . . . : 2601:243:2080:bb60:2d83:777f:ab00:89b5(Preferred) Link-local IPv6 Address . . . . . : fe80::f921:713:14d9:272f%3(Preferred) IPv4 Address. . . . . . . . . . . : 10.0.0.110(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Monday, April 19, 2021 11:25:06 AM Lease Expires . . . . . . . . . . : Wednesday, April 21, 2021 12:31:15 PM Default Gateway . . . . . . . . . : 10.0.0.1 DHCP Server . . . . . . . . . . . : 10.0.0.1 DHCPv6 IAID . . . . . . . . . . . : 77343094 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-26-FF-86-6C-7C-D3-0A-83-CE-7D DNS Servers . . . . . . . . . . . : 2001:558:feed::1 2001:558:feed::2 75.75.75.75 75.75.76.76 NetBIOS over Tcpip. . . . . . . . : Enabled Quote Share this post Link to post
OpenSourcerer 1441 Posted ... 2 minutes ago, gmini said: . 2021.04.19 14:24:12 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #12681232 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2021.04.19 14:42:11 - Above log line repeated 482 times more This is why. OpenVPN's replay protection kicks in. Are you by any chance on a Cable/DOCSIS connection? Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
gmini 0 Posted ... 21 minutes ago, OpenSourcerer said: This is why. OpenVPN's replay protection kicks in. Are you by any chance on a Cable/DOCSIS connection? No, I am only using a Wi-Fi connection. ISP is Comcast. I am using their standard-issue modem, model is Arris TG1682G. What exactly is this OpenVPN replay protection and why is it happening? And is this really the cause for this problem that i've been tearing my hair out over for probably a year now? Thanks for your help Quote Share this post Link to post
OpenSourcerer 1441 Posted ... 13 hours ago, gmini said: ISP is Comcast. The way I understood it, it's Cable with Comcast all the way. These forums have had their fair share of threads about throughput problems with Comcast, some when only the VPN is involved, some reported the same happening with the ISP connection. Just searching for the word comcast yields good results generally. 13 hours ago, gmini said: What exactly is this OpenVPN replay protection and why is it happening? I can use Sherlock-level deduction here to explain what exactly might be happening on the line, but I simply have no clear idea. What I do know is that OpenVPN's replay protection is triggered due to dynamic routing changes in Comcast's network, usually triggered for load-balancing reasons. Basically, it's a mechanism to for example prevent a third party in the middle between you and the server from resending you packets. Every packet sent by OpenVPN gets an ID that is unique to the key used in the connection, so the receiving OpenVPN client can validate a packet. A replay is detected either if packets are missing, are received out of order or are duplicated, simplified: 1 2 3 4 5 6 7 8 are sent and received, so you'd expect 9 10 11 12 to follow. The sender sends 9 10 11 12, but the receiver gets 5 6 7 8 again, and only then 9 10 11 12. That's where OpenVPN objects and drops those "false" duplicate packages 5 6 7 8. It's okay for just those four packages and you don't even see a problem. But if that happens for hundreds of packages in a row, the slowdowns you had is what you experience. OpenVPN has got an option for how big that replay window is in seconds and how many packages may be out of order or missing. Tweaking it is one thing you can do, but using TCP solves the problem entirely, albeit representing different challenges. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
gmini 0 Posted ... @OpenSourcerer Thank you very much for the explanation. So what can I do to solve this? I already have uTP disabled in qbittorrent. Do you mean to also use a TCP protocol in Eddie? Well I tried that as well and it did not help. 4 hours ago, OpenSourcerer said: OpenVPN has got an option for how big that replay window is in seconds and how many packages may be out of order or missing. Please can you tell how to adjust this option? I am dying to solve this problem once and for all. Quote Share this post Link to post
OpenSourcerer 1441 Posted ... 19 minutes ago, gmini said: Do you mean to also use a TCP protocol in Eddie? Well I tried that as well and it did not help. Well, it gets rid of the replay warnings because, as I wrote, TCP wants packets to be sent and received in order. If one is missing, it's resent. It does not necessarily solve the poor performance, but for some it does because some networks treat TCP differently, I'd even write, more gracefully. 40 minutes ago, gmini said: Please can you tell how to adjust this option? I am dying to solve this problem once and for all. Well, as it's said in the logs, the directive is replay-window: Quote --replay-window args Modify the replay protection sliding-window size and time window. Valid syntax: replay-window n [t] Use a replay protection sliding-window of size n and a time window of t seconds. By default n is 64 (the IPSec default) and t is 15 seconds. […] The default is 64 packets in 15 seconds. What intermittently worked for me when I was on a DOCSIS connection: I counted how many packets OpenVPN would print a bad packet ID for, then rounded up to the next number to the power of 2. What you could do is first set the time window to just 1 second. Set this directive in Eddie Preferences > OVPN directives: replay-windows 64 1 If that betters the situation, leave it. If "not really", increase the value multiplying it by two everytime (= 128, 256 and so on), then try a connection again until you found a setting where it doesn't crash right away. If you reach 1024… always keep in mind that if you find yourself to really be attacked, the gate might not hold. Increasing this setting will effectively tear down replay protection brick by brick until it's not really effective any more. The other setting that helped me immensely is reducing global BitTorrent connections. I found that if I downloaded something over an end-to-end connection like HTTP or even a Steam download, I got full throughput out of the OpenVPN tunnel. So I tried setting the overall connections to just 50-100 and that helped immensely. Stlll got one or two bad packet IDs, but overall much more stable. Though it cuts both ways: Sometimes you get 50-100 "bad" peers, i.e., without much throughput behind them, and this too can impact your own throughput. Test and report back. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
gmini 0 Posted ... @OpenSourcerer (how do I tag you so your name is in blue lol?) Regarding BitTorrent connections, I did play a lot with those settings in my qbittorrent client, both max global connections and connections per torrent. The result overall was no significant change. Sometimes it *seemed* to relieve the problem a bit, sometimes just momentarily, but most of the time it did nothing at all. I will try to adjust the replay window and report back to you. Just to make sure, am I increasing the n value or t value by two? or both? Quote Share this post Link to post
OpenSourcerer 1441 Posted ... n * 2. t = 1. Quote (how do I tag you so your name is in blue lol?) Type an @ and the first letters of my nick. You'll see a little menu where you can select my name. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
gmini 0 Posted ... @OpenSourcerer Ah great 😉. Don't know why it didn't work before. I have a couple more questions for you. As I understand, my modem from Comcast is an older model (xFi Wireless Gateway). They mention DOCSIS 3.0 as being their latest system. If I upgrade to their newer equipment (one of these Overview of Xfinity Gateways - Xfinity Support ; maybe xFi Advanced Gateway or xFi Gateway 3rd Generation), will it change anything in regards to these AEAD Decrypt errors? Or maybe if I buy my own specialized modem/router-- can it change anything? I also received answer from support that the ISP might be choking bandwidth on high UDP traffic and apparently AirVPN relies on UDP. So is my only real solution to change ISPs or to a different VPN service (obviously the less complicated choice)? Thank you Quote Share this post Link to post
OpenSourcerer 1441 Posted ... 3 hours ago, gmini said: I have a couple more questions for you. As I understand, my modem from Comcast is an older model (xFi Wireless Gateway). They mention DOCSIS 3.0 as being their latest system. If I upgrade to their newer equipment (one of these Overview of Xfinity Gateways - Xfinity Support ; maybe xFi Advanced Gateway or xFi Gateway 3rd Generation), will it change anything in regards to these AEAD Decrypt errors? Or maybe if I buy my own specialized modem/router-- can it change anything? I prefer not to answer this question. I don't want to recommend you spending money on something I don't know will help you or not. 3 hours ago, gmini said: I also received answer from support that the ISP might be choking bandwidth on high UDP traffic and apparently AirVPN relies on UDP. So is my only real solution to change ISPs or to a different VPN service (obviously the less complicated choice)? AirVPN doesn't rely on anything. OpenVPN by default simply uses UDP, and it's also the better option for the use case of a tunnel. Changing the VPN provider likely won't fix anything for you as they mostly use OpenVPN, too. Providers offering other protocols could yield different results, though, so you can always try that. Wireguard and IPsec are two options you can try. I won't post VPN provider recommendations, though, so if you need one, write me a personal message or simply research for yourself a bit. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
gmini 0 Posted ... 51 minutes ago, OpenSourcerer said: AirVPN doesn't rely on anything. OpenVPN by default simply uses UDP, and it's also the better option for the use case of a tunnel. Oh I see, I just went off the reply I got from staff: "...Since with AirVPN you use exclusively UDP, you might trigger that specific traffic shaping,,,". Maybe I understood it wrong. But in any case changing to TCP protocol makes matters even worse for me 😅, giving me even worse speed than my original problem gives me 😓. Well I guess for now I'll try what you suggested and see what happens. One thing I notice already happening when I put "replay-windows 64 1" in OVPN directives is it's not letting me connect to a server, being stuck in a Restart loop. Is that supposed to happen? Quote Share this post Link to post
OpenSourcerer 1441 Posted ... 10 hours ago, gmini said: One thing I notice already happening when I put "replay-windows 64 1" in OVPN directives is it's not letting me connect to a server, being stuck in a Restart loop. Is that supposed to happen? No, because the directive is singular: replay-window 64 1. It has nothing to do with Microsoft Windows Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
gmini 0 Posted ... 8 hours ago, OpenSourcerer said: No, because the directive is singular: replay-window 64 1. It has nothing to do with Microsoft Windows Aha! Well I just copy pasted your instruction a few posts up: replay-windows 64 1 Indeed now it's no longer stuck in a restart loop 😃 Thanks again for the help mate. Much appreciated! I will try that and report back to you in some time. Quote Share this post Link to post
gmini 0 Posted ... @OpenSourcerer Alright. So I tried increasing replay-window in OVPN directives n by 2 (t=1) as you said, immediately when the slowdown occurs, without restarting Eddie or disconnecting then connecting again. Meaning I just insert the directive while connected to a server. Would that be the right way? If indeed I did it in the right way, then unfortunately it does not affect the slowdown in any way (unless again I am missing something🤨). I went all the way to 1024. It looks like the decrypt error even reached a record of 990 after plugging in the directive. I don't know if it's related or not. Eddie System/Environment Report - 4/22/2021 - 8:03 PM UTC Eddie version: 2.20.0 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Home OS version: Microsoft Windows NT 10.0.19041.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN driver: 0901: 9.24.6; wintun: 0.8 OpenVPN: 2.5.1 - OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: () ---------------------------- SSH: plink 0.73 Build platform: 64-bit x86 Windows Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800 Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe) ---------------------------- SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Program Files\AirVPN\default.profile Data path: C:\Program Files\AirVPN Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (0 args) Network Lock Active: Yes, Windows Filtering Platform Connected to VPN: Yes, Alhena Detected DNS: 10.6.126.1, 2001:558:feed::1, 2001:558:feed::2, 75.75.75.75, 75.75.76.76 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 172 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: Fetch url error:Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True netlock: True network.entry.iplayer: ipv4-only network.ipv6.mode: block openvpn.custom: replay-window 1024 1 gui.notifications: False ---------------------------- Logs: . 2021.04.22 12:31:00 - Eddie version: 2.20.0 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.19041.0, Mono/.Net: v4.0.30319 . 2021.04.22 12:31:00 - Command line arguments (0): . 2021.04.22 12:31:05 - Profile path: C:\Program Files\AirVPN\default.profile . 2021.04.22 12:31:06 - Reading options from C:\Program Files\AirVPN\default.profile . 2021.04.22 12:31:09 - Tun Driver - 0901: 9.24.6; wintun: 0.8 . 2021.04.22 12:31:09 - OpenVPN - Version: 2.5.1 - OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2021.04.22 12:31:09 - SSH - Version: plink 0.73 . 2021.04.22 12:31:09 - Build platform: 64-bit x86 Windows . 2021.04.22 12:31:09 - Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800 . 2021.04.22 12:31:09 - Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe) . 2021.04.22 12:31:09 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) . 2021.04.22 12:31:09 - Recovery. Unexpected crash? . 2021.04.22 12:31:09 - Routes, removed an existing route, 134.19.179.155 for gateway 10.34.102.1 . 2021.04.22 12:31:10 - Routes, added a new route, 184.75.221.43 for gateway 10.30.222.1 . 2021.04.22 12:31:10 - Routes, removed an existing route, 184.75.221.35 for gateway 10.28.26.1 . 2021.04.22 12:31:10 - Routes, added a new route, 184.75.214.163 for gateway 10.13.126.1 ! 2021.04.22 12:31:10 - Activation of Network Lock - Windows Filtering Platform I 2021.04.22 12:31:11 - Ready . 2021.04.22 12:31:12 - Collect information about AirVPN completed I 2021.04.22 12:31:28 - Session starting. I 2021.04.22 12:31:29 - Checking authorization ... . 2021.04.22 12:31:29 - IPv6 disabled with packet filtering. ! 2021.04.22 12:31:29 - Connecting to Alhena (Canada, Toronto, Ontario) . 2021.04.22 12:31:30 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.04.22 12:31:30 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.04.22 12:31:30 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.04.22 12:31:30 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.04.22 12:31:30 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.04.22 12:31:30 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.04.22 12:31:30 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.04.22 12:31:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.5:443 . 2021.04.22 12:31:30 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.04.22 12:31:30 - OpenVPN > UDP link local: (not bound) . 2021.04.22 12:31:30 - OpenVPN > UDP link remote: [AF_INET]162.219.176.5:443 . 2021.04.22 12:31:30 - OpenVPN > TLS: Initial packet from [AF_INET]162.219.176.5:443, sid=e234de6a 0eef517a . 2021.04.22 12:31:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.04.22 12:31:30 - OpenVPN > VERIFY KU OK . 2021.04.22 12:31:30 - OpenVPN > Validating certificate extended key usage . 2021.04.22 12:31:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.04.22 12:31:30 - OpenVPN > VERIFY EKU OK . 2021.04.22 12:31:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alhena, emailAddress=info@airvpn.org . 2021.04.22 12:31:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.04.22 12:31:30 - OpenVPN > [Alhena] Peer Connection Initiated with [AF_INET]162.219.176.5:443 . 2021.04.22 12:31:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.126.1,dhcp-option DNS6 fde6:7a:7d20:27e::1,tun-ipv6,route-gateway 10.6.126.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:27e::106f/64 fde6:7a:7d20:27e::1,ifconfig 10.6.126.113 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2021.04.22 12:31:30 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.04.22 12:31:30 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:27e::1' . 2021.04.22 12:31:30 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2021.04.22 12:31:30 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:27e::106f/64 fde6:7a:7d20:27e::1' . 2021.04.22 12:31:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.04.22 12:31:30 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.04.22 12:31:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.04.22 12:31:30 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.04.22 12:31:30 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.04.22 12:31:30 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.04.22 12:31:30 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.04.22 12:31:30 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.04.22 12:31:30 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.04.22 12:31:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.22 12:31:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.22 12:31:30 - OpenVPN > interactive service msg_channel=0 . 2021.04.22 12:31:30 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=3 HWADDR=9c:29:76:74:4a:d7 . 2021.04.22 12:31:30 - OpenVPN > open_tun . 2021.04.22 12:31:30 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.04.22 12:31:30 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.04.22 12:31:30 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.126.0/10.6.126.113/255.255.255.0 [SUCCEEDED] . 2021.04.22 12:31:30 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.126.113/255.255.255.0 on interface {657D23F1-C10A-4FB3-A370-950E0BB8E9F5} [DHCP-serv: 10.6.126.254, lease-time: 31536000] . 2021.04.22 12:31:30 - OpenVPN > Successful ARP Flush on interface [10] {657D23F1-C10A-4FB3-A370-950E0BB8E9F5} . 2021.04.22 12:31:30 - OpenVPN > IPv4 MTU set to 1500 on interface 10 using SetIpInterfaceEntry() . 2021.04.22 12:31:35 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.04.22 12:31:35 - OpenVPN > C:\Windows\system32\route.exe ADD 162.219.176.5 MASK 255.255.255.255 10.0.0.1 . 2021.04.22 12:31:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2021.04.22 12:31:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.04.22 12:31:35 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.126.1 . 2021.04.22 12:31:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.04.22 12:31:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.04.22 12:31:35 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.126.1 . 2021.04.22 12:31:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.04.22 12:31:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.04.22 12:31:35 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.04.22 12:31:35 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.04.22 12:31:35 - DNS leak protection with packet filtering enabled. . 2021.04.22 12:31:36 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.6.126.1) . 2021.04.22 12:31:36 - Routes, added a new route, 162.219.176.3 for gateway 10.6.126.1 . 2021.04.22 12:31:36 - Unable to compute route for 2606:6080:1002:3:1da3:d12a:3e5:ae70: IPv6 VPN gateway not available. . 2021.04.22 12:31:36 - Flushing DNS I 2021.04.22 12:31:36 - Checking route IPv4 I 2021.04.22 12:31:37 - Checking DNS ! 2021.04.22 12:31:37 - Connected. . 2021.04.22 12:31:37 - OpenVPN > Initialization Sequence Completed . 2021.04.22 12:39:02 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #421169 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2021.04.22 13:01:16 - Above log line repeated 389 times more . 2021.04.22 13:01:16 - Collect information about AirVPN completed . 2021.04.22 13:02:19 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #8691872 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2021.04.22 13:26:11 - Above log line repeated 236 times more . 2021.04.22 13:26:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.04.22 13:26:11 - OpenVPN > VERIFY KU OK . 2021.04.22 13:26:11 - OpenVPN > Validating certificate extended key usage . 2021.04.22 13:26:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.04.22 13:26:11 - OpenVPN > VERIFY EKU OK . 2021.04.22 13:26:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alhena, emailAddress=info@airvpn.org . 2021.04.22 13:26:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.22 13:26:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.22 13:26:11 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.04.22 13:27:41 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #38009 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2021.04.22 13:31:17 - Above log line repeated 70 times more . 2021.04.22 13:31:17 - Collect information about AirVPN completed . 2021.04.22 13:54:49 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #5295895 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2021.04.22 14:01:20 - Above log line repeated 8 times more . 2021.04.22 14:01:20 - Collect information about AirVPN completed . 2021.04.22 14:13:15 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #9941461 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2021.04.22 14:20:52 - Above log line repeated 111 times more . 2021.04.22 14:20:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.04.22 14:20:52 - OpenVPN > VERIFY KU OK . 2021.04.22 14:20:52 - OpenVPN > Validating certificate extended key usage . 2021.04.22 14:20:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.04.22 14:20:52 - OpenVPN > VERIFY EKU OK . 2021.04.22 14:20:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alhena, emailAddress=info@airvpn.org . 2021.04.22 14:20:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.22 14:20:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.22 14:20:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.04.22 14:31:28 - Collect information about AirVPN completed . 2021.04.22 14:37:27 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #3542771 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2021.04.22 15:01:44 - Above log line repeated 990 times more . 2021.04.22 15:01:44 - Collect information about AirVPN completed . 2021.04.22 15:03:23 - ping 1 . 2021.04.22 15:03:23 - ping 2 W . 2021.04.22 15:03:23 - ping 2 WE . 2021.04.22 15:03:47 - ping 1 . 2021.04.22 15:03:47 - ping 2 W . 2021.04.22 15:03:47 - ping 2 WE ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "10.0.0.1", "metric": "40" }, { "address": "0.0.0.0\/1", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "10.6.126.1", "metric": "3" }, { "address": "10.0.0.0\/24", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "10.0.0.110", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "10.0.0.255", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "10.6.126.0\/24", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "10.6.126.113", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "10.6.126.255", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "127.0.0.0\/8", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.0.0.1", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.255.255.255", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "128.0.0.0\/1", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "10.6.126.1", "metric": "3" }, { "address": "162.219.176.3", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "10.6.126.1", "metric": "4" }, { "address": "162.219.176.5", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "10.0.0.1", "metric": "40" }, { "address": "184.75.214.163", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "10.13.126.1", "metric": "4" }, { "address": "184.75.221.43", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "10.30.222.1", "metric": "4" }, { "address": "224.0.0.0\/4", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "224.0.0.0\/4", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "224.0.0.0\/4", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "255.255.255.255", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "255.255.255.255", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "255.255.255.255", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "::1", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "2601:243:2080:bb60::\/64", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "2601:243:2080:bb60::3cda", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "2601:243:2080:bb60:313e:ebe4:34e7:c7d9", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "2601:243:2080:bb60:f921:713:14d9:272f", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "fe80::\/64", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "fe80::\/64", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "fe80::590:986:efed:d2f9", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "fe80::f921:713:14d9:272f", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "ff00::\/8", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "ff00::\/8", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "ff00::\/8", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" } ], "interfaces": [ { "friendly": "Local Area Connection", "id": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "name": "Local Area Connection", "description": "TAP-Windows Adapter V9", "type": "Virtual", "status": "Up", "bytes_received": "150012013883", "bytes_sent": "14088685114", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::590:986:efed:d2f9", "10.6.126.113" ], "gateways": [ "10.6.126.1", "10.13.126.1", "10.30.222.1" ], "bind": true, "dns4": "10.6.126.1", "dns6": null }, { "friendly": "Ethernet", "id": "{B840C4DB-70F3-491D-AFCB-4B49C2FA08A5}", "name": "Ethernet", "description": "Killer E2500 Gigabit Ethernet Controller", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::60bf:ddf0:c28f:10fd", "169.254.16.253" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection 2", "id": "{97B134A8-373C-4275-A0A3-2FF79942D169}", "name": "Local Area Connection 2", "description": "Wintun Userspace Tunnel", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::10b2:2784:1df9:5c5c", "10.8.222.21", "169.254.92.92" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 1", "id": "{9B7C5F17-218C-451C-B0D8-83A294E5F8EA}", "name": "Local Area Connection* 1", "description": "Microsoft Wi-Fi Direct Virtual Adapter", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::d03:a697:e978:7bf0", "169.254.123.240" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 2", "id": "{52D96744-02CA-4182-85E7-1CF2A51161AF}", "name": "Local Area Connection* 2", "description": "Microsoft Wi-Fi Direct Virtual Adapter #2", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::74cc:fd5b:8f6e:a9c", "169.254.10.156" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Wi-Fi", "id": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "name": "Wi-Fi", "description": "Killer(R) Wi-Fi 6 AX1650i 160MHz Wireless Network Adapter (201NGW)", "type": "Wireless80211", "status": "Up", "bytes_received": "44080910278", "bytes_sent": "6181910826", "support_ipv4": true, "support_ipv6": true, "ips": [ "2601:243:2080:bb60::3cda", "2601:243:2080:bb60:f921:713:14d9:272f", "2601:243:2080:bb60:313e:ebe4:34e7:c7d9", "fe80::f921:713:14d9:272f", "10.0.0.110" ], "gateways": [ "10.0.0.1" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "gateways": [], "bind": true, "dns4": "", "dns6": null } ], "ipv4-default-gateway": "10.6.126.1", "ipv4-default-interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}" } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : LAPTOP-VL5VL7T4 Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : hsd1.il.comcast.net Unknown adapter Local Area Connection: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-65-7D-23-F1 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::590:986:efed:d2f9%10(Preferred) IPv4 Address. . . . . . . . . . . : 10.6.126.113(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Thursday, April 22, 2021 12:31:30 PM Lease Expires . . . . . . . . . . : Friday, April 22, 2022 12:31:30 PM Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.6.126.254 DHCPv6 IAID . . . . . . . . . . . : 671154021 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-26-FF-86-6C-7C-D3-0A-83-CE-7D DNS Servers . . . . . . . . . . . : 10.6.126.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Killer E2500 Gigabit Ethernet Controller Physical Address. . . . . . . . . : 7C-D3-0A-83-CE-7D DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Unknown adapter Local Area Connection 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Wintun Userspace Tunnel Physical Address. . . . . . . . . : DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 9C-29-76-74-4A-D8 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2 Physical Address. . . . . . . . . : 9E-29-76-74-4A-D7 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi: Connection-specific DNS Suffix . : hsd1.il.comcast.net Description . . . . . . . . . . . : Killer(R) Wi-Fi 6 AX1650i 160MHz Wireless Network Adapter (201NGW) Physical Address. . . . . . . . . : 9C-29-76-74-4A-D7 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2601:243:2080:bb60::3cda(Preferred) Lease Obtained. . . . . . . . . . : Thursday, April 22, 2021 11:30:32 AM Lease Expires . . . . . . . . . . : Thursday, April 29, 2021 11:30:32 AM IPv6 Address. . . . . . . . . . . : 2601:243:2080:bb60:f921:713:14d9:272f(Preferred) Temporary IPv6 Address. . . . . . : 2601:243:2080:bb60:313e:ebe4:34e7:c7d9(Preferred) Link-local IPv6 Address . . . . . : fe80::f921:713:14d9:272f%3(Preferred) IPv4 Address. . . . . . . . . . . : 10.0.0.110(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Thursday, April 22, 2021 11:30:31 AM Lease Expires . . . . . . . . . . : Saturday, April 24, 2021 11:30:30 AM Default Gateway . . . . . . . . . : 10.0.0.1 DHCP Server . . . . . . . . . . . : 10.0.0.1 DHCPv6 IAID . . . . . . . . . . . : 77343094 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-26-FF-86-6C-7C-D3-0A-83-CE-7D DNS Servers . . . . . . . . . . . : 2001:558:feed::1 2001:558:feed::2 75.75.75.75 75.75.76.76 NetBIOS over Tcpip. . . . . . . . : Enabled Quote Share this post Link to post
OpenSourcerer 1441 Posted ... 3 hours ago, gmini said: Aha! Well I just copy pasted your instruction a few posts up: Oh. Right. Be right back, spanking my left hand. 1 hour ago, gmini said: Would that be the right way? A config file is read once when OpenVPN is launched. To reread it and use new options, you must reconnect. I think the same would go for Eddie, since in the background it compiles a config file out of all settings before connecting. So, no, not completely the right way. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
gmini 0 Posted ... Okay. I tried again, this time restarting Eddie completely after inserting the directive. Still experiencing the same exact slowdowns. Correct me if I'm wrong though, I don't see any decrypt error in this latest log: Eddie System/Environment Report - 4/23/2021 - 12:07 AM UTC Eddie version: 2.20.0 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Home OS version: Microsoft Windows NT 10.0.19041.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN driver: 0901: 9.24.6; wintun: 0.8 OpenVPN: 2.5.1 - OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: () ---------------------------- SSH: plink 0.73 Build platform: 64-bit x86 Windows Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800 Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe) ---------------------------- SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Program Files\AirVPN\default.profile Data path: C:\Program Files\AirVPN Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (0 args) Network Lock Active: Yes, Windows Filtering Platform Connected to VPN: Yes, Alwaid Detected DNS: 10.8.158.1, 75.75.75.75, 75.75.76.76 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 170 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: Fetch url error:Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True netlock: True network.entry.iplayer: ipv4-only network.ipv6.mode: block openvpn.custom: replay-window 1024 1 gui.notifications: False ---------------------------- Logs: . 2021.04.22 17:36:58 - Eddie version: 2.20.0 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.19041.0, Mono/.Net: v4.0.30319 . 2021.04.22 17:36:58 - Command line arguments (0): . 2021.04.22 17:36:59 - Profile path: C:\Program Files\AirVPN\default.profile . 2021.04.22 17:36:59 - Reading options from C:\Program Files\AirVPN\default.profile . 2021.04.22 17:37:00 - Tun Driver - 0901: 9.24.6; wintun: 0.8 . 2021.04.22 17:37:00 - OpenVPN - Version: 2.5.1 - OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2021.04.22 17:37:00 - SSH - Version: plink 0.73 . 2021.04.22 17:37:00 - Build platform: 64-bit x86 Windows . 2021.04.22 17:37:00 - Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800 . 2021.04.22 17:37:00 - Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe) . 2021.04.22 17:37:00 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) . 2021.04.22 17:37:01 - Recovery. Unexpected crash? . 2021.04.22 17:37:01 - Routes, removed an existing route, 134.19.179.155 for gateway 10.34.102.1 . 2021.04.22 17:37:01 - Routes, added a new route, 184.75.221.43 for gateway 10.30.222.1 . 2021.04.22 17:37:01 - Routes, removed an existing route, 184.75.221.35 for gateway 10.28.26.1 . 2021.04.22 17:37:01 - Routes, added a new route, 184.75.214.163 for gateway 10.13.126.1 ! 2021.04.22 17:37:01 - Activation of Network Lock - Windows Filtering Platform I 2021.04.22 17:37:01 - Ready . 2021.04.22 17:37:02 - Collect information about AirVPN completed I 2021.04.22 17:37:02 - Session starting. . 2021.04.22 17:37:02 - Waiting for latency tests (192 to go) . 2021.04.22 17:37:04 - Waiting for latency tests (168 to go) . 2021.04.22 17:37:06 - Waiting for latency tests (167 to go) . 2021.04.22 17:37:07 - Waiting for latency tests (119 to go) . 2021.04.22 17:37:10 - Waiting for latency tests (93 to go) . 2021.04.22 17:37:11 - Waiting for latency tests (43 to go) . 2021.04.22 17:37:12 - Waiting for latency tests (13 to go) I 2021.04.22 17:37:13 - Checking authorization ... . 2021.04.22 17:37:14 - IPv6 disabled with packet filtering. ! 2021.04.22 17:37:14 - Connecting to Alwaid (Canada, Toronto, Ontario) . 2021.04.22 17:37:14 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.04.22 17:37:14 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.04.22 17:37:14 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.04.22 17:37:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.04.22 17:37:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.04.22 17:37:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.04.22 17:37:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.04.22 17:37:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.117:443 . 2021.04.22 17:37:14 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.04.22 17:37:14 - OpenVPN > UDP link local: (not bound) . 2021.04.22 17:37:14 - OpenVPN > UDP link remote: [AF_INET]184.75.221.117:443 . 2021.04.22 17:37:14 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.117:443, sid=2b1849b9 f453d852 . 2021.04.22 17:37:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.04.22 17:37:14 - OpenVPN > VERIFY KU OK . 2021.04.22 17:37:14 - OpenVPN > Validating certificate extended key usage . 2021.04.22 17:37:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.04.22 17:37:14 - OpenVPN > VERIFY EKU OK . 2021.04.22 17:37:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org . 2021.04.22 17:37:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.04.22 17:37:14 - OpenVPN > [Alwaid] Peer Connection Initiated with [AF_INET]184.75.221.117:443 . 2021.04.22 17:37:15 - OpenVPN > SENT CONTROL [Alwaid]: 'PUSH_REQUEST' (status=1) . 2021.04.22 17:37:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.158.1,dhcp-option DNS6 fde6:7a:7d20:49e::1,tun-ipv6,route-gateway 10.8.158.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:49e::100f/64 fde6:7a:7d20:49e::1,ifconfig 10.8.158.17 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2021.04.22 17:37:15 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.04.22 17:37:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:49e::1' . 2021.04.22 17:37:15 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2021.04.22 17:37:15 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:49e::100f/64 fde6:7a:7d20:49e::1' . 2021.04.22 17:37:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.04.22 17:37:15 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.04.22 17:37:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.04.22 17:37:15 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.04.22 17:37:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.04.22 17:37:15 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.04.22 17:37:15 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.04.22 17:37:15 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.04.22 17:37:15 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.04.22 17:37:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.22 17:37:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.22 17:37:15 - OpenVPN > interactive service msg_channel=0 . 2021.04.22 17:37:15 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=3 HWADDR=9c:29:76:74:4a:d7 . 2021.04.22 17:37:15 - OpenVPN > open_tun . 2021.04.22 17:37:15 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.04.22 17:37:15 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.04.22 17:37:15 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.158.0/10.8.158.17/255.255.255.0 [SUCCEEDED] . 2021.04.22 17:37:15 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.158.17/255.255.255.0 on interface {657D23F1-C10A-4FB3-A370-950E0BB8E9F5} [DHCP-serv: 10.8.158.254, lease-time: 31536000] . 2021.04.22 17:37:15 - OpenVPN > Successful ARP Flush on interface [10] {657D23F1-C10A-4FB3-A370-950E0BB8E9F5} . 2021.04.22 17:37:15 - OpenVPN > IPv4 MTU set to 1500 on interface 10 using SetIpInterfaceEntry() . 2021.04.22 17:37:20 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.04.22 17:37:20 - OpenVPN > C:\Windows\system32\route.exe ADD 184.75.221.117 MASK 255.255.255.255 10.0.0.1 . 2021.04.22 17:37:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4 . 2021.04.22 17:37:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.04.22 17:37:20 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.158.1 . 2021.04.22 17:37:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.04.22 17:37:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.04.22 17:37:20 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.158.1 . 2021.04.22 17:37:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.04.22 17:37:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.04.22 17:37:20 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.04.22 17:37:20 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.04.22 17:37:20 - DNS leak protection with packet filtering enabled. . 2021.04.22 17:37:20 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.8.158.1) . 2021.04.22 17:37:20 - Routes, added a new route, 184.75.221.115 for gateway 10.8.158.1 . 2021.04.22 17:37:20 - Unable to compute route for 2606:6080:1001:11:60bc:461c:1305:bb4b: IPv6 VPN gateway not available. . 2021.04.22 17:37:20 - Flushing DNS I 2021.04.22 17:37:20 - Checking route IPv4 I 2021.04.22 17:37:21 - Checking DNS ! 2021.04.22 17:37:21 - Connected. . 2021.04.22 17:37:21 - OpenVPN > Initialization Sequence Completed ! 2021.04.22 17:37:48 - Disconnecting . 2021.04.22 17:37:48 - Routes, removed a route previously added, 184.75.221.115 for gateway 10.8.158.1 . 2021.04.22 17:37:48 - Sending soft termination signal . 2021.04.22 17:37:51 - OpenVPN > SIGTERM received, sending exit notification to peer . 2021.04.22 17:37:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 184.75.221.117 MASK 255.255.255.255 10.0.0.1 . 2021.04.22 17:37:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.04.22 17:37:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.158.1 . 2021.04.22 17:37:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.04.22 17:37:53 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.8.158.1 . 2021.04.22 17:37:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.04.22 17:37:53 - OpenVPN > Closing TUN/TAP interface . 2021.04.22 17:37:53 - OpenVPN > TAP: DHCP address released . 2021.04.22 17:37:53 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2021.04.22 17:37:53 - Connection terminated. . 2021.04.22 17:37:53 - IPv6 restored with packet filtering. . 2021.04.22 17:37:53 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.04.22 17:37:53 - DNS leak protection with packet filtering disabled. . 2021.04.22 17:37:53 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2021.04.22 17:37:53 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2021.04.22 17:37:53 - Flushing DNS ! 2021.04.22 17:37:53 - Session terminated. I 2021.04.22 17:38:19 - Session starting. I 2021.04.22 17:38:19 - Checking authorization ... . 2021.04.22 17:38:20 - IPv6 disabled with packet filtering. ! 2021.04.22 17:38:20 - Connecting to Alwaid (Canada, Toronto, Ontario) . 2021.04.22 17:38:20 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.04.22 17:38:20 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.04.22 17:38:20 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.04.22 17:38:20 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.04.22 17:38:20 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.04.22 17:38:20 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.04.22 17:38:20 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.04.22 17:38:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.117:443 . 2021.04.22 17:38:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.04.22 17:38:20 - OpenVPN > UDP link local: (not bound) . 2021.04.22 17:38:20 - OpenVPN > UDP link remote: [AF_INET]184.75.221.117:443 . 2021.04.22 17:38:20 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.117:443, sid=8fa12da0 3d4f2d71 . 2021.04.22 17:38:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.04.22 17:38:20 - OpenVPN > VERIFY KU OK . 2021.04.22 17:38:20 - OpenVPN > Validating certificate extended key usage . 2021.04.22 17:38:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.04.22 17:38:20 - OpenVPN > VERIFY EKU OK . 2021.04.22 17:38:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org . 2021.04.22 17:38:20 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.04.22 17:38:20 - OpenVPN > [Alwaid] Peer Connection Initiated with [AF_INET]184.75.221.117:443 . 2021.04.22 17:38:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.158.1,dhcp-option DNS6 fde6:7a:7d20:49e::1,tun-ipv6,route-gateway 10.8.158.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:49e::100f/64 fde6:7a:7d20:49e::1,ifconfig 10.8.158.17 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2021.04.22 17:38:20 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.04.22 17:38:20 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:49e::1' . 2021.04.22 17:38:20 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2021.04.22 17:38:20 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:49e::100f/64 fde6:7a:7d20:49e::1' . 2021.04.22 17:38:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.04.22 17:38:20 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.04.22 17:38:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.04.22 17:38:20 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.04.22 17:38:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.04.22 17:38:20 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.04.22 17:38:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.04.22 17:38:20 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.04.22 17:38:20 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.04.22 17:38:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.22 17:38:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.22 17:38:20 - OpenVPN > interactive service msg_channel=0 . 2021.04.22 17:38:20 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=3 HWADDR=9c:29:76:74:4a:d7 . 2021.04.22 17:38:20 - OpenVPN > open_tun . 2021.04.22 17:38:20 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.04.22 17:38:20 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.04.22 17:38:20 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.158.0/10.8.158.17/255.255.255.0 [SUCCEEDED] . 2021.04.22 17:38:20 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.158.17/255.255.255.0 on interface {657D23F1-C10A-4FB3-A370-950E0BB8E9F5} [DHCP-serv: 10.8.158.254, lease-time: 31536000] . 2021.04.22 17:38:20 - OpenVPN > Successful ARP Flush on interface [10] {657D23F1-C10A-4FB3-A370-950E0BB8E9F5} . 2021.04.22 17:38:20 - OpenVPN > IPv4 MTU set to 1500 on interface 10 using SetIpInterfaceEntry() . 2021.04.22 17:38:25 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.04.22 17:38:25 - OpenVPN > C:\Windows\system32\route.exe ADD 184.75.221.117 MASK 255.255.255.255 10.0.0.1 . 2021.04.22 17:38:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=60 and dwForwardType=4 . 2021.04.22 17:38:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.04.22 17:38:25 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.158.1 . 2021.04.22 17:38:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.04.22 17:38:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.04.22 17:38:25 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.158.1 . 2021.04.22 17:38:25 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.04.22 17:38:25 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.04.22 17:38:25 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.04.22 17:38:25 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.04.22 17:38:25 - DNS leak protection with packet filtering enabled. . 2021.04.22 17:38:25 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.8.158.1) . 2021.04.22 17:38:25 - Routes, added a new route, 184.75.221.115 for gateway 10.8.158.1 . 2021.04.22 17:38:25 - Unable to compute route for 2606:6080:1001:11:60bc:461c:1305:bb4b: IPv6 VPN gateway not available. . 2021.04.22 17:38:25 - Flushing DNS I 2021.04.22 17:38:25 - Checking route IPv4 I 2021.04.22 17:38:26 - Checking DNS ! 2021.04.22 17:38:26 - Connected. . 2021.04.22 17:38:26 - OpenVPN > Initialization Sequence Completed . 2021.04.22 18:07:06 - Collect information about AirVPN completed . 2021.04.22 18:38:19 - Above log line repeated 1 times more . 2021.04.22 18:38:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.04.22 18:38:19 - OpenVPN > VERIFY KU OK . 2021.04.22 18:38:19 - OpenVPN > Validating certificate extended key usage . 2021.04.22 18:38:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.04.22 18:38:19 - OpenVPN > VERIFY EKU OK . 2021.04.22 18:38:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org . 2021.04.22 18:38:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.22 18:38:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.22 18:38:19 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.04.22 19:07:08 - ping 1 . 2021.04.22 19:07:08 - ping 2 W . 2021.04.22 19:07:08 - ping 2 WE ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "10.0.0.1", "metric": "40" }, { "address": "0.0.0.0\/1", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "10.8.158.1", "metric": "3" }, { "address": "10.0.0.0\/24", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "10.0.0.110", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "10.0.0.255", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "10.8.158.0\/24", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "10.8.158.17", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "10.8.158.255", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "127.0.0.0\/8", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.0.0.1", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.255.255.255", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "128.0.0.0\/1", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "10.8.158.1", "metric": "3" }, { "address": "184.75.214.163", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "10.13.126.1", "metric": "4" }, { "address": "184.75.221.43", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "10.30.222.1", "metric": "4" }, { "address": "184.75.221.115", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "10.8.158.1", "metric": "4" }, { "address": "184.75.221.117", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "10.0.0.1", "metric": "40" }, { "address": "224.0.0.0\/4", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "224.0.0.0\/4", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "224.0.0.0\/4", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "255.255.255.255", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "255.255.255.255", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "255.255.255.255", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "::1", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "fe80::\/64", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "fe80::\/64", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "fe80::590:986:efed:d2f9", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "fe80::f921:713:14d9:272f", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" }, { "address": "ff00::\/8", "interface": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "ff00::\/8", "interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "gateway": "link", "metric": "259" }, { "address": "ff00::\/8", "interface": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "gateway": "link", "metric": "296" } ], "interfaces": [ { "friendly": "Local Area Connection", "id": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}", "name": "Local Area Connection", "description": "TAP-Windows Adapter V9", "type": "Virtual", "status": "Up", "bytes_received": "200309068202", "bytes_sent": "18692609858", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::590:986:efed:d2f9", "10.8.158.17" ], "gateways": [ "10.8.158.1", "10.13.126.1", "10.30.222.1" ], "bind": true, "dns4": "10.8.158.1", "dns6": null }, { "friendly": "Ethernet", "id": "{B840C4DB-70F3-491D-AFCB-4B49C2FA08A5}", "name": "Ethernet", "description": "Killer E2500 Gigabit Ethernet Controller", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::60bf:ddf0:c28f:10fd", "169.254.16.253" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection 2", "id": "{97B134A8-373C-4275-A0A3-2FF79942D169}", "name": "Local Area Connection 2", "description": "Wintun Userspace Tunnel", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::10b2:2784:1df9:5c5c", "10.8.222.21", "169.254.92.92" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 1", "id": "{9B7C5F17-218C-451C-B0D8-83A294E5F8EA}", "name": "Local Area Connection* 1", "description": "Microsoft Wi-Fi Direct Virtual Adapter", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::d03:a697:e978:7bf0", "169.254.123.240" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 2", "id": "{52D96744-02CA-4182-85E7-1CF2A51161AF}", "name": "Local Area Connection* 2", "description": "Microsoft Wi-Fi Direct Virtual Adapter #2", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::74cc:fd5b:8f6e:a9c", "169.254.10.156" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Wi-Fi", "id": "{21562BE1-52B6-4916-B4A6-E482C8257ADF}", "name": "Wi-Fi", "description": "Killer(R) Wi-Fi 6 AX1650i 160MHz Wireless Network Adapter (201NGW)", "type": "Wireless80211", "status": "Up", "bytes_received": "24224568355", "bytes_sent": "2726414641", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::f921:713:14d9:272f", "10.0.0.110" ], "gateways": [ "10.0.0.1" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{D5941305-FF26-11EA-9E56-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "gateways": [], "bind": true, "dns4": "", "dns6": null } ], "ipv4-default-gateway": "10.8.158.1", "ipv4-default-interface": "{657D23F1-C10A-4FB3-A370-950E0BB8E9F5}" } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : LAPTOP-VL5VL7T4 Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : hsd1.il.comcast.net Unknown adapter Local Area Connection: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-65-7D-23-F1 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::590:986:efed:d2f9%10(Preferred) IPv4 Address. . . . . . . . . . . : 10.8.158.17(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Thursday, April 22, 2021 5:38:20 PM Lease Expires . . . . . . . . . . : Friday, April 22, 2022 5:38:20 PM Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.8.158.254 DHCPv6 IAID . . . . . . . . . . . : 671154021 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-26-FF-86-6C-7C-D3-0A-83-CE-7D DNS Servers . . . . . . . . . . . : 10.8.158.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Killer E2500 Gigabit Ethernet Controller Physical Address. . . . . . . . . : 7C-D3-0A-83-CE-7D DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Unknown adapter Local Area Connection 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Wintun Userspace Tunnel Physical Address. . . . . . . . . : DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 9C-29-76-74-4A-D8 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2 Physical Address. . . . . . . . . : 9E-29-76-74-4A-D7 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi: Connection-specific DNS Suffix . : hsd1.il.comcast.net Description . . . . . . . . . . . : Killer(R) Wi-Fi 6 AX1650i 160MHz Wireless Network Adapter (201NGW) Physical Address. . . . . . . . . : 9C-29-76-74-4A-D7 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::f921:713:14d9:272f%3(Preferred) IPv4 Address. . . . . . . . . . . : 10.0.0.110(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Thursday, April 22, 2021 5:20:13 PM Lease Expires . . . . . . . . . . : Saturday, April 24, 2021 5:38:09 PM Default Gateway . . . . . . . . . : 10.0.0.1 DHCP Server . . . . . . . . . . . : 10.0.0.1 DHCPv6 IAID . . . . . . . . . . . : 77343094 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-26-FF-86-6C-7C-D3-0A-83-CE-7D DNS Servers . . . . . . . . . . . : 75.75.75.75 75.75.76.76 NetBIOS over Tcpip. . . . . . . . : Enabled Quote Share this post Link to post
OpenSourcerer 1441 Posted ... Remove the replay-window directive and try connecting with OpenVPN over SSL. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
gmini 0 Posted ... @OpenSourcerer You mean in OpenVPN GUI, without Eddie? I am unable to connect to SSL there, stuck on this: Fri Apr 23 12:05:46 2021 OpenVPN 2.5.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 21 2021 Fri Apr 23 12:05:46 2021 Windows version 10.0 (Windows 10 or greater) 64bit Fri Apr 23 12:05:46 2021 library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 Fri Apr 23 12:05:46 2021 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341 Fri Apr 23 12:05:46 2021 Need hold release from management interface, waiting... Fri Apr 23 12:05:46 2021 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341 Fri Apr 23 12:05:46 2021 MANAGEMENT: CMD 'state on' Fri Apr 23 12:05:46 2021 MANAGEMENT: CMD 'log all on' Fri Apr 23 12:05:46 2021 MANAGEMENT: CMD 'echo all on' Fri Apr 23 12:05:46 2021 MANAGEMENT: CMD 'bytecount 5' Fri Apr 23 12:05:46 2021 MANAGEMENT: CMD 'hold off' Fri Apr 23 12:05:46 2021 MANAGEMENT: CMD 'hold release' Fri Apr 23 12:05:46 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Apr 23 12:05:46 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Apr 23 12:05:46 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1413 Fri Apr 23 12:05:46 2021 Socket Buffers: R=[65536->262144] S=[65536->262144] Fri Apr 23 12:05:46 2021 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 [nonblock] Fri Apr 23 12:05:46 2021 MANAGEMENT: >STATE:1619197546,TCP_CONNECT,,,,,, I can successfully connect to UDP through the openvpn gui but it leaks my IP and DNS addresses... But I tried SSL protocols in Eddie and it did not solve the issue. Quote Share this post Link to post
OpenSourcerer 1441 Posted ... Hm. I reached the end of my wits on this issue, then. I will blame it on Comcast, based on threads of the last few years where people tried different things, too, without much avail. You can try searching the forums for your ISP or router name and contact professional support via ticket, maybe they know something the community doesn't. Sorry! Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
gmini 0 Posted ... 33 minutes ago, OpenSourcerer said: Hm. I reached the end of my wits on this issue, then. I will blame it on Comcast, based on threads of the last few years where people tried different things, too, without much avail. You can try searching the forums for your ISP or router name and contact professional support via ticket, maybe they know something the community doesn't. Sorry! Well nonetheless, thanks for trying to help. I fucking despise Comcast and would absolutely love to change to a better option, but in my area I think they are the best option for price per speed. Although recently in my area (Chicago) T-Mobile has introduced their home internet service. By any chance have you heard anything about them from forum members in regards to compatibility with AirVPN? Quote Share this post Link to post
OpenSourcerer 1441 Posted ... Difficult to say, Deutsche Telekom is almost a global provider of telecommunication services. Their services are solid here in Germany (being their domestic market, I know, weak argument), but I've also heard good things from Romania about them, out of all countries. One could extrapolate and say, a similar service is offered in other countries as well. What I can say is, switching to them back from Cable normalized my VPN throughput once again; it was horrible with Vodafone. Still, cannot answer your question directly. You'll need to find subscribers among your neighbors or acquaintances. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
gmini 0 Posted ... @OpenSourcerer Yea I guess then the issue is all in those goddamn ISPs. But also AirVPN not hiding traffic well enough from said ISPs, I would assume. Heard several people already with Comcast mentioning new technologies like WireGuard solved throttling for them. Maybe this is something AirVPN can look into implementing? Anyways, thanks for the help mate! Might private message you to ask a couple more questions, if it's not a bother. 😊 Quote Share this post Link to post
OpenSourcerer 1441 Posted ... 44 minutes ago, gmini said: But also AirVPN not hiding traffic well enough from said ISPs, I would assume. Heard several people already with Comcast mentioning new technologies like WireGuard solved throttling for them. Maybe this is something AirVPN can look into implementing? They've been looking into implementing it for at least half a year now. No news is dripping out anywhere about those efforts unfortunately. 44 minutes ago, gmini said: Might private message you to ask a couple more questions, if it's not a bother. 😊 Not at all, ask away. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post