HeyWAZZab33 0 Posted ... Hey there, I hope someone can help me out with my issue. As stated on top, Eddie only manages to pass the 'Checking route' screen and connect to a server, if I connect to my WiFi before Eddie can start up. This problem started to appear after I updated from 2.20.0 to 2.21.8. I had no issues before that. The result is a short time where my real IP is leaked to Windows and other Update servers. Reverting to 2.20.0 is not possible, as server-list and login screen remains blank no matter what I do.Log for connecting WiFi after Eddie starts up (no leakage & no connection): . 2022.05.31 12:49:09 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.19044.0, Mono/.Net: v4.0.30319 . 2022.05.31 12:49:13 - Reading options from C:\Users\ufo\AppData\Local\Eddie\default.profile . 2022.05.31 12:49:15 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2022.05.31 12:49:15 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2022.05.31 12:49:15 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) . 2022.05.31 12:49:15 - Recovery. Unexpected crash? ! 2022.05.31 12:49:15 - Deactivation of Network Lock ! 2022.05.31 12:49:15 - Activation of Network Lock - Windows Filtering Platform I 2022.05.31 12:49:16 - Ready . 2022.05.31 12:49:17 - Collect information about AirVPN completed I 2022.05.31 12:54:24 - Session starting. I 2022.05.31 12:54:24 - Checking authorization ... . 2022.05.31 12:54:25 - Added new network interface "Eddie", Wintun version 0.12 . 2022.05.31 12:54:25 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2022.05.31 12:54:25 - Connecting to Caelum (Austria, Vienna) . 2022.05.31 12:54:25 - Routes, add 217.64.127.197/32 for interface "WLAN (Intel(R) Wi-Fi 6E AX210 160MHz)". . 2022.05.31 12:54:25 - Routes, add 217.64.127.197/32 for interface "WLAN (Intel(R) Wi-Fi 6E AX210 160MHz)", already exists. . 2022.05.31 12:54:25 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.05.31 12:54:25 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.05.31 12:54:25 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.05.31 12:54:25 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.31 12:54:25 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.31 12:54:25 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.05.31 12:54:25 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.05.31 12:54:25 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]217.64.127.197:443 . 2022.05.31 12:54:25 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.05.31 12:54:25 - OpenVPN > UDP link local: (not bound) . 2022.05.31 12:54:25 - OpenVPN > UDP link remote: [AF_INET]217.64.127.197:443 . 2022.05.31 12:54:31 - OpenVPN > TLS: Initial packet from [AF_INET]217.64.127.197:443, sid=42fc2b1c cda1c8b2 . 2022.05.31 12:54:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.05.31 12:54:31 - OpenVPN > VERIFY KU OK . 2022.05.31 12:54:31 - OpenVPN > Validating certificate extended key usage . 2022.05.31 12:54:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.05.31 12:54:31 - OpenVPN > VERIFY EKU OK . 2022.05.31 12:54:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Caelum, emailAddress=info@airvpn.org . 2022.05.31 12:54:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.05.31 12:54:31 - OpenVPN > [Caelum] Peer Connection Initiated with [AF_INET]217.64.127.197:443 . 2022.05.31 12:54:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.12.26.1,dhcp-option DNS6 fde6:7a:7d20:81a::1,tun-ipv6,route-gateway 10.12.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:81a::108d/64 fde6:7a:7d20:81a::1,ifconfig 10.12.26.143 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2022.05.31 12:54:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.05.31 12:54:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.12.26.1' . 2022.05.31 12:54:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:81a::1' . 2022.05.31 12:54:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.05.31 12:54:31 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.05.31 12:54:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.05.31 12:54:31 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.05.31 12:54:31 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.05.31 12:54:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.05.31 12:54:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.05.31 12:54:31 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.05.31 12:54:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.31 12:54:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.05.31 12:54:31 - OpenVPN > interactive service msg_channel=0 . 2022.05.31 12:54:31 - OpenVPN > open_tun . 2022.05.31 12:54:31 - OpenVPN > wintun device [Eddie] opened . 2022.05.31 12:54:31 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 45 static 10.12.26.143 255.255.255.0 . 2022.05.31 12:54:32 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 45 all . 2022.05.31 12:54:32 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 45 all . 2022.05.31 12:54:32 - OpenVPN > IPv4 MTU set to 1500 on interface 45 using SetIpInterfaceEntry() . 2022.05.31 12:54:32 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 45 fde6:7a:7d20:81a::108d/128 store=active . 2022.05.31 12:54:32 - OpenVPN > add_route_ipv6(fde6:7a:7d20:81a::/64 -> fde6:7a:7d20:81a::108d metric 0) dev Eddie . 2022.05.31 12:54:32 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:81a::/64 45 fe80::8 store=active . 2022.05.31 12:54:32 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2022.05.31 12:54:32 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 45 all . 2022.05.31 12:54:32 - OpenVPN > IPv6 MTU set to 1500 on interface 45 using SetIpInterfaceEntry() . 2022.05.31 12:54:32 - OpenVPN > Initialization Sequence Completed . 2022.05.31 12:54:32 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2022.05.31 12:54:32 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2022.05.31 12:54:32 - DNS leak protection with packet filtering enabled. . 2022.05.31 12:54:32 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.12.26.1) . 2022.05.31 12:54:32 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:81a::1) . 2022.05.31 12:54:32 - DNS IPv4 of a network adapter forced (VirtualBox Host-Only Network, from automatic to 10.12.26.1) . 2022.05.31 12:54:32 - DNS IPv6 of a network adapter forced (VirtualBox Host-Only Network, from automatic to fde6:7a:7d20:81a::1) . 2022.05.31 12:54:32 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.31 12:54:33 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.31 12:54:33 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.31 12:54:33 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2022.05.31 12:54:33 - Routes, add 217.64.127.195/32 for interface "Eddie (Eddie Tunnel)". . 2022.05.31 12:54:33 - Routes, add 2001:ac8:29:b:a50:6136:ace6:d39b/128 for interface "Eddie (Eddie Tunnel)". . 2022.05.31 12:54:33 - Flushing DNS I 2022.05.31 12:54:33 - Checking route IPv4 . 2022.05.31 12:55:01 - Checking route (4° try) . 2022.05.31 12:55:26 - Checking route (5° try) Log for connecting WiFi before Eddie starts up (leakage and connection): 2022.06.02 11:30:20 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.19044.0, Mono/.Net: v4.0.30319 . 2022.06.02 11:30:24 - Reading options from C:\Users\ufo\AppData\Local\Eddie\default.profile . 2022.06.02 11:30:26 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2022.06.02 11:30:26 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2022.06.02 11:30:26 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) . 2022.06.02 11:30:26 - Recovery. Unexpected crash? ! 2022.06.02 11:30:26 - Deactivation of Network Lock ! 2022.06.02 11:30:26 - Activation of Network Lock - Windows Filtering Platform I 2022.06.02 11:30:27 - Ready . 2022.06.02 11:30:28 - Collect information about AirVPN completed I 2022.06.02 11:30:28 - Session starting. I 2022.06.02 11:30:28 - Checking authorization ... . 2022.06.02 11:30:29 - Collect information about AirVPN completed . 2022.06.02 11:30:29 - Added new network interface "Eddie", Wintun version 0.12 . 2022.06.02 11:30:29 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2022.06.02 11:30:29 - IPv6 disabled with packet filtering. ! 2022.06.02 11:30:29 - Connecting to Cervantes (Germany, Frankfurt) . 2022.06.02 11:30:29 - Routes, add 185.189.112.29/32 for interface "WLAN (Intel(R) Wi-Fi 6E AX210 160MHz)". . 2022.06.02 11:30:29 - Routes, add 185.189.112.29/32 for interface "WLAN (Intel(R) Wi-Fi 6E AX210 160MHz)", already exists. . 2022.06.02 11:30:30 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.06.02 11:30:30 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.06.02 11:30:30 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.06.02 11:30:30 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.06.02 11:30:30 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.06.02 11:30:30 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.06.02 11:30:30 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.06.02 11:30:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.189.112.29:443 . 2022.06.02 11:30:30 - OpenVPN > Socket Buffers: R=[65536->16384] S=[65536->16384] . 2022.06.02 11:30:30 - OpenVPN > UDP link local: (not bound) . 2022.06.02 11:30:30 - OpenVPN > UDP link remote: [AF_INET]185.189.112.29:443 . 2022.06.02 11:30:30 - OpenVPN > TLS: Initial packet from [AF_INET]185.189.112.29:443, sid=3b0cd3b8 3ed378ac . 2022.06.02 11:30:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.06.02 11:30:30 - OpenVPN > VERIFY KU OK . 2022.06.02 11:30:30 - OpenVPN > Validating certificate extended key usage . 2022.06.02 11:30:30 - OpenVPN > Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.06.02 11:30:30 - OpenVPN > VERIFY EKU OK . 2022.06.02 11:30:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cervantes, emailAddress=info@airvpn.org . 2022.06.02 11:30:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.06.02 11:30:30 - OpenVPN > [Cervantes] Peer Connection Initiated with [AF_INET]185.189.112.29:443 . 2022.06.02 11:30:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.13.186.1,dhcp-option DNS6 fde6:7a:7d20:9ba::1,tun-ipv6,route-gateway 10.13.186.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:9ba::1055/64 fde6:7a:7d20:9ba::1,ifconfig 10.13.186.87 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2022.06.02 11:30:30 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.06.02 11:30:30 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.13.186.1' . 2022.06.02 11:30:30 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:9ba::1' . 2022.06.02 11:30:30 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.06.02 11:30:30 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:9ba::1055/64 fde6:7a:7d20:9ba::1' . 2022.06.02 11:30:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.06.02 11:30:30 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.06.02 11:30:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.06.02 11:30:30 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.06.02 11:30:30 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.06.02 11:30:30 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.06.02 11:30:30 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.06.02 11:30:30 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.06.02 11:30:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.06.02 11:30:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.06.02 11:30:30 - OpenVPN > interactive service msg_channel=0 . 2022.06.02 11:30:30 - OpenVPN > open_tun . 2022.06.02 11:30:30 - OpenVPN > wintun device [Eddie] opened . 2022.06.02 11:30:30 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 21 static 10.13.186.87 255.255.255.0 . 2022.06.02 11:30:30 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 21 all . 2022.06.02 11:30:30 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 21 all . 2022.06.02 11:30:30 - OpenVPN > IPv4 MTU set to 1500 on interface 21 using SetIpInterfaceEntry() . 2022.06.02 11:30:30 - OpenVPN > Initialization Sequence Completed . 2022.06.02 11:30:30 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2022.06.02 11:30:30 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2022.06.02 11:30:30 - DNS leak protection with packet filtering enabled. . 2022.06.02 11:30:30 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.13.186.1) . 2022.06.02 11:30:30 - DNS IPv4 of a network adapter forced (VirtualBox Host-Only Network, from automatic to 10.13.186.1) . 2022.06.02 11:30:31 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.06.02 11:30:31 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.06.02 11:30:31 - Routes, add 185.189.112.27/32 for interface "Eddie (Eddie Tunnel)". . 2022.06.02 11:30:31 - Routes, skipped for 2001:ac8:20:2c:f0a7:566:38ea:8344 : IPv6 blocked. . 2022.06.02 11:30:31 - Flushing DNS I 2022.06.02 11:30:31 - Checking route IPv4 I 2022.06.02 11:30:35 - Checking DNS ! 2022.06.02 11:30:35 - Connected. Thanks for your help Quote Share this post Link to post
cheeze 4 Posted ... I'm having the same problem since updating to 2.21.6 and also 2.21.8 on two Linux machines.I 2022.05.31 12:54:33 - Checking route IPv4 . 2022.05.31 12:55:01 - Checking route (4° try) . 2022.05.31 12:55:26 - Checking route (5° try) I have to completely close Eddie. Connect to the internet in the clear. Then, start Eddie to circumvent this problem. This is bad because the moment the pc connects to the internet, traffic begins in the background without VPN protection. There are a few threads here discussing this issue, but so far the only solution being offered is to roll Eddie back to an earlier version. Quote Share this post Link to post
HeyWAZZab33 0 Posted ... Yeah, I was also trying out 2.21.6 and had similar issues. Support did not reply yet either 😕 I have tried to roll Eddie back to 2.20.0, but it's not working, only showing a blank server list. I think mainly because they changed something with the TAP-drivers. Quote Share this post Link to post
Clodo 176 Posted ... This issue is under investigation, will be fixed as soon as possible, please be patient. 2 HeyWAZZab33 and cheeze reacted to this Quote Share this post Link to post
Staff 9972 Posted ... @HeyWAZZab33 Hello! Please test Eddie 2.22.0 version, available in the download page by clicking "Other versions" and selecting "Experimental", and feel free to keep us posted. Kind regards Quote Share this post Link to post
ratsratsrats 1 Posted ... (edited) Bump. I'm facing a similar problem, using Eddie 2.22.0, and I think it is because default network interface isn't properly detected in Automatic mode. I'm using a laptop with a docking station. When Eddie is first started and laptop is on the dock, Windows defaults to LAN and turns wifi off. Eddie detects LAN interface is the default one, and connects to VPN successfully via LAN. When I unplug the laptop from the docking, Windows disables the LAN adapter, and enables WiFI. Eddie restarts the connection after some time, and successfully detects that WiFi Adapter is the default interface, and successfully connects. But when I plug the laptop again into the dock, Windows turns the WiFI off, Eddie loses connection, and tries to connect again. But it still thinks WiFi Adapter is the default, and that's why it freezes on "Checking Route IPv4" message. In the log, it still uses the Wifi interface, instead of LAN. I've tried restarting Eddie, turning on/off network lock, it still get stuck on Checking Route phase. If I go to Settings > Networking, and manually select "Interface used for connection", it works okay. But it's a pain having to always manually reselect the proper interface. Even so, if I manually select LAN interface, in the log file it still says the name of the WiFi interface, but connects properly through LAN (WiFi is turned off). Edited ... by ratsratsrats Quote Share this post Link to post