8854 1 Posted ... I have used AirVPN for years with no issues. When I use it now, I am getting copy rite violation notices from my ISP. The notice I got was while I was STILL CONNECTED to AirVPN. This is the second notice that I have received in the past 30 days. Any idea what is going on? Quote Share this post Link to post
ProdBreakingMonkey 0 Posted ... Hard to say without some additional context. If you have visibility to the traffic at the edge of your local network then you could ensure all traffic is being routed over the tunnel correctly. If they didn't cite some particular content they might just be basing assumptions off DNS calls outside the tunnel if some of it is going out the naked wire. A site owned by Air can provide a lot of information at https://ipleak.net/ Quote Share this post Link to post
Flx 76 Posted ... Where are your log files?...Send the log to Staff...if you don't want to post them in the forum. Quote Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
8854 1 Posted ... . 2022.10.25 13:08:00 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Education, Version: Microsoft Windows NT 10.0.19044.0, Mono/.Net: v4.0.30319 . 2022.10.25 13:08:00 - Command line arguments (1): path="home" . 2022.10.25 13:08:01 - Reading options from C:\Users\mm\AppData\Local\Eddie\default.profile . 2022.10.25 13:08:03 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2022.10.25 13:08:03 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2022.10.25 13:08:03 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2022.10.25 13:08:03 - Ready . 2022.10.25 13:08:05 - Collect information about AirVPN completed ! 2022.10.25 13:08:16 - Activation of Network Lock - Windows Filtering Platform I 2022.10.25 13:08:19 - Session starting. I 2022.10.25 13:08:20 - Checking authorization ... . 2022.10.25 13:08:21 - Using WinTun network interface "torguardwintun (Wintun Userspace Tunnel #2)" ! 2022.10.25 13:08:21 - Connecting to Sculptor (United States of America, Atlanta, Georgia) . 2022.10.25 13:08:22 - Routes, add 64.42.179.37/32 for interface "Ethernet (Intel(R) I211 Gigabit Network Connection)". . 2022.10.25 13:08:22 - Routes, add 64.42.179.37/32 for interface "Ethernet (Intel(R) I211 Gigabit Network Connection)", already exists. . 2022.10.25 13:08:22 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.10.25 13:08:22 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.10.25 13:08:22 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.10.25 13:08:22 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.10.25 13:08:22 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.10.25 13:08:22 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.10.25 13:08:22 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.10.25 13:08:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.37:443 . 2022.10.25 13:08:22 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.10.25 13:08:22 - OpenVPN > UDP link local: (not bound) . 2022.10.25 13:08:22 - OpenVPN > UDP link remote: [AF_INET]64.42.179.37:443 . 2022.10.25 13:08:22 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.37:443, sid=4719a08d 49b58d17 . 2022.10.25 13:08:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.10.25 13:08:22 - OpenVPN > VERIFY KU OK . 2022.10.25 13:08:22 - OpenVPN > Validating certificate extended key usage . 2022.10.25 13:08:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.10.25 13:08:22 - OpenVPN > VERIFY EKU OK . 2022.10.25 13:08:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sculptor, emailAddress=info@airvpn.org . 2022.10.25 13:08:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.10.25 13:08:22 - OpenVPN > [Sculptor] Peer Connection Initiated with [AF_INET]64.42.179.37:443 . 2022.10.25 13:08:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.74.1,dhcp-option DNS6 fde6:7a:7d20:134a::1,tun-ipv6,route-gateway 10.23.74.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:134a::10c3/64 fde6:7a:7d20:134a::1,ifconfig 10.23.74.197 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.10.25 13:08:23 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.10.25 13:08:23 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.23.74.1' . 2022.10.25 13:08:23 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:134a::1' . 2022.10.25 13:08:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.10.25 13:08:23 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.10.25 13:08:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.10.25 13:08:23 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.10.25 13:08:23 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.10.25 13:08:23 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.10.25 13:08:23 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.10.25 13:08:23 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.10.25 13:08:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.10.25 13:08:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.10.25 13:08:23 - OpenVPN > interactive service msg_channel=0 . 2022.10.25 13:08:23 - OpenVPN > open_tun . 2022.10.25 13:08:23 - OpenVPN > wintun device [torguardwintun] opened . 2022.10.25 13:08:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 20 static 10.23.74.197 255.255.255.0 . 2022.10.25 13:08:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 20 all . 2022.10.25 13:08:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 20 all . 2022.10.25 13:08:23 - OpenVPN > IPv4 MTU set to 1500 on interface 20 using SetIpInterfaceEntry() . 2022.10.25 13:08:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 20 fde6:7a:7d20:134a::10c3/128 store=active . 2022.10.25 13:08:23 - OpenVPN > add_route_ipv6(fde6:7a:7d20:134a::/64 -> fde6:7a:7d20:134a::10c3 metric 0) dev torguardwintun . 2022.10.25 13:08:23 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:134a::/64 20 fe80::8 store=active . 2022.10.25 13:08:23 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.10.25 13:08:24 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 20 all . 2022.10.25 13:08:24 - OpenVPN > IPv6 MTU set to 1500 on interface 20 using SetIpInterfaceEntry() . 2022.10.25 13:08:24 - OpenVPN > Initialization Sequence Completed . 2022.10.25 13:08:24 - Interface torguardwintun metric changed from Automatic to 3, layer IPv4 . 2022.10.25 13:08:24 - Interface torguardwintun metric changed from Automatic to 3, layer IPv6 . 2022.10.25 13:08:24 - DNS leak protection with packet filtering enabled. . 2022.10.25 13:08:25 - DNS IPv4 of a network adapter forced (torguardwintun, from automatic to 10.23.74.1) . 2022.10.25 13:08:25 - DNS IPv6 of a network adapter forced (torguardwintun, from automatic to fde6:7a:7d20:134a::1) . 2022.10.25 13:08:25 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.23.74.1) . 2022.10.25 13:08:25 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:134a::1) . 2022.10.25 13:08:25 - DNS IPv4 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to 10.23.74.1) . 2022.10.25 13:08:25 - DNS IPv6 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to fde6:7a:7d20:134a::1) . 2022.10.25 13:08:26 - Routes, add 0.0.0.0/1 for interface "torguardwintun (Wintun Userspace Tunnel #2)". . 2022.10.25 13:08:27 - Routes, add 128.0.0.0/1 for interface "torguardwintun (Wintun Userspace Tunnel #2)". . 2022.10.25 13:08:28 - Routes, add ::/1 for interface "torguardwintun (Wintun Userspace Tunnel #2)". . 2022.10.25 13:08:29 - Routes, add 8000::/1 for interface "torguardwintun (Wintun Userspace Tunnel #2)". . 2022.10.25 13:08:29 - Routes, add 64.42.179.35/32 for interface "torguardwintun (Wintun Userspace Tunnel #2)". . 2022.10.25 13:08:30 - Routes, add 2605:9f80:6000:77:25ba:81d8:c17b:536b/128 for interface "torguardwintun (Wintun Userspace Tunnel #2)". . 2022.10.25 13:08:30 - Flushing DNS I 2022.10.25 13:08:30 - Checking route IPv4 I 2022.10.25 13:08:31 - Checking route IPv6 I 2022.10.25 13:08:31 - Checking DNS ! 2022.10.25 13:08:32 - Connected. . 2022.10.25 13:38:08 - Collect information about AirVPN completed . 2022.10.25 14:05:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.10.25 14:05:25 - OpenVPN > VERIFY KU OK . 2022.10.25 14:05:25 - OpenVPN > Validating certificate extended key usage . 2022.10.25 14:05:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.10.25 14:05:25 - OpenVPN > VERIFY EKU OK . 2022.10.25 14:05:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sculptor, emailAddress=info@airvpn.org . 2022.10.25 14:05:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.10.25 14:05:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.10.25 14:05:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.10.25 14:08:09 - Collect information about AirVPN completed . 2022.10.25 14:38:09 - Collect information about AirVPN completed . 2022.10.25 15:02:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.10.25 15:02:30 - OpenVPN > VERIFY KU OK . 2022.10.25 15:02:30 - OpenVPN > Validating certificate extended key usage . 2022.10.25 15:02:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.10.25 15:02:30 - OpenVPN > VERIFY EKU OK . 2022.10.25 15:02:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sculptor, emailAddress=info@airvpn.org . 2022.10.25 15:02:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.10.25 15:02:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.10.25 15:02:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.10.25 15:08:11 - Collect information about AirVPN completed . 2022.10.25 15:38:13 - Collect information about AirVPN completed 1 Flx reacted to this Quote Share this post Link to post
8854 1 Posted ... I turned off webRTC and turned on network lock. ISP leak shows no torrent detection outside of the tunnel. But, if I do not turn off geolocation in Firefox, ISP Leak sees my real location. Quote Share this post Link to post
OpenSourcerer 1438 Posted ... 3 hours ago, 8854 said: . 2022.10.25 13:08:23 - OpenVPN > wintun device [torguardwintun] opened Eddie chooses the wrong interface. It's been shown in the past that Eddie doesn't work with WinTun interfaces installed by other VPN providers' clients. Either uninstall the interfaces (or even their clients, if installed) or see that you're running an Eddie version >= 2.22.1 which fixes conflicting with these. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
OpenSourcerer 1438 Posted ... 9 hours ago, 8854 said: I am running the current version of Eddie. You're running the current stable, yes. But the fix is in a newer one. On the Downloads page, click on Other versions and select Experimental to download Eddie 2.22.2. As I wrote, the alternative is uninstalling all those other clients installing their own WinTun driver. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
8854 1 Posted ... Done. I don't see any issues on IP Leak, to include torrent address detection . 2022.10.26 11:10:32 - Eddie version: 2.22.2 / windows_x64, System: Windows, Name: Windows 10 Education, Version: Microsoft Windows NT 10.0.19044.0, Mono/.Net: v4.0.30319 . 2022.10.26 11:10:32 - Command line arguments (1): path="home" . 2022.10.26 11:10:33 - Collect network information . 2022.10.26 11:10:36 - Reading options from C:\Users\mm\AppData\Local\Eddie\default.profile . 2022.10.26 11:10:37 - OpenVPN - Version: 2.5.7 - OpenSSL 1.1.1o 3 May 2022, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2022.10.26 11:10:37 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2022.10.26 11:10:37 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2022.10.26 11:10:37 - Ready . 2022.10.26 11:10:39 - Collect information about AirVPN completed ! 2022.10.26 11:10:49 - Activation of Network Lock - Windows Filtering Platform I 2022.10.26 11:10:51 - Session starting. I 2022.10.26 11:10:52 - Checking authorization ... . 2022.10.26 11:10:52 - Collect network information . 2022.10.26 11:10:55 - Using WinTun network interface "torguardwintun (Wintun Userspace Tunnel #2)" ! 2022.10.26 11:10:55 - Connecting to Equuleus (United States of America, Dallas, Texas) . 2022.10.26 11:10:55 - Routes, add 199.249.230.39/32 for interface "Ethernet (Intel(R) I211 Gigabit Network Connection)". . 2022.10.26 11:10:56 - Routes, add 199.249.230.39/32 for interface "Ethernet (Intel(R) I211 Gigabit Network Connection)", already exists. . 2022.10.26 11:10:56 - OpenVPN > OpenVPN 2.5.7 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on May 27 2022 . 2022.10.26 11:10:56 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.10.26 11:10:56 - OpenVPN > library versions: OpenSSL 1.1.1o 3 May 2022, LZO 2.10 . 2022.10.26 11:10:56 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.10.26 11:10:56 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.10.26 11:10:56 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.10.26 11:10:56 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.10.26 11:10:56 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.249.230.39:443 . 2022.10.26 11:10:56 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.10.26 11:10:56 - OpenVPN > UDP link local: (not bound) . 2022.10.26 11:10:56 - OpenVPN > UDP link remote: [AF_INET]199.249.230.39:443 . 2022.10.26 11:10:56 - OpenVPN > TLS: Initial packet from [AF_INET]199.249.230.39:443, sid=a60c8503 81929eb5 . 2022.10.26 11:10:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.10.26 11:10:56 - OpenVPN > VERIFY KU OK . 2022.10.26 11:10:56 - OpenVPN > Validating certificate extended key usage . 2022.10.26 11:10:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.10.26 11:10:56 - OpenVPN > VERIFY EKU OK . 2022.10.26 11:10:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Equuleus, emailAddress=info@airvpn.org . 2022.10.26 11:10:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.10.26 11:10:56 - OpenVPN > [Equuleus] Peer Connection Initiated with [AF_INET]199.249.230.39:443 . 2022.10.26 11:10:56 - OpenVPN > SENT CONTROL [Equuleus]: 'PUSH_REQUEST' (status=1) . 2022.10.26 11:10:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.106.1,dhcp-option DNS6 fde6:7a:7d20:c6a::1,tun-ipv6,route-gateway 10.16.106.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:c6a::1031/64 fde6:7a:7d20:c6a::1,ifconfig 10.16.106.51 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.10.26 11:10:56 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.10.26 11:10:56 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.16.106.1' . 2022.10.26 11:10:56 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:c6a::1' . 2022.10.26 11:10:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.10.26 11:10:56 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.10.26 11:10:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.10.26 11:10:56 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.10.26 11:10:56 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.10.26 11:10:56 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.10.26 11:10:56 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.10.26 11:10:56 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.10.26 11:10:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.10.26 11:10:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.10.26 11:10:56 - OpenVPN > interactive service msg_channel=0 . 2022.10.26 11:10:56 - OpenVPN > open_tun . 2022.10.26 11:10:56 - OpenVPN > wintun device [torguardwintun] opened . 2022.10.26 11:10:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 19 static 10.16.106.51 255.255.255.0 . 2022.10.26 11:10:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 19 all . 2022.10.26 11:10:57 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 19 all . 2022.10.26 11:10:57 - OpenVPN > IPv4 MTU set to 1500 on interface 19 using SetIpInterfaceEntry() . 2022.10.26 11:10:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 19 fde6:7a:7d20:c6a::1031/128 store=active . 2022.10.26 11:10:58 - OpenVPN > add_route_ipv6(fde6:7a:7d20:c6a::/64 -> fde6:7a:7d20:c6a::1031 metric 0) dev torguardwintun . 2022.10.26 11:10:58 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:c6a::/64 19 fe80::8 store=active . 2022.10.26 11:10:58 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.10.26 11:10:58 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 19 all . 2022.10.26 11:10:58 - OpenVPN > IPv6 MTU set to 1500 on interface 19 using SetIpInterfaceEntry() . 2022.10.26 11:10:58 - OpenVPN > Initialization Sequence Completed . 2022.10.26 11:10:58 - Interface torguardwintun metric changed from Automatic to 3, layer IPv4 . 2022.10.26 11:10:58 - Interface torguardwintun metric changed from Automatic to 3, layer IPv6 . 2022.10.26 11:10:58 - DNS leak protection with packet filtering enabled. . 2022.10.26 11:11:00 - DNS IPv4 of a network adapter forced (torguardwintun, from automatic to 10.16.106.1) . 2022.10.26 11:11:01 - DNS IPv6 of a network adapter forced (torguardwintun, from automatic to fde6:7a:7d20:c6a::1) . 2022.10.26 11:11:01 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.16.106.1) . 2022.10.26 11:11:01 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:c6a::1) . 2022.10.26 11:11:01 - DNS IPv4 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to 10.16.106.1) . 2022.10.26 11:11:01 - DNS IPv6 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to fde6:7a:7d20:c6a::1) . 2022.10.26 11:11:02 - Routes, add 0.0.0.0/1 for interface "torguardwintun (Wintun Userspace Tunnel #2)". . 2022.10.26 11:11:03 - Routes, add 128.0.0.0/1 for interface "torguardwintun (Wintun Userspace Tunnel #2)". . 2022.10.26 11:11:03 - Routes, add ::/1 for interface "torguardwintun (Wintun Userspace Tunnel #2)". . 2022.10.26 11:11:04 - Routes, add 8000::/1 for interface "torguardwintun (Wintun Userspace Tunnel #2)". . 2022.10.26 11:11:05 - Routes, add 199.249.230.37/32 for interface "torguardwintun (Wintun Userspace Tunnel #2)". . 2022.10.26 11:11:05 - Routes, add 2620:7:6001:b0ec:2f3a:a3d0:966f:e483/128 for interface "torguardwintun (Wintun Userspace Tunnel #2)". . 2022.10.26 11:11:05 - Flushing DNS I 2022.10.26 11:11:06 - Checking route IPv4 I 2022.10.26 11:11:06 - Checking route IPv6 I 2022.10.26 11:11:07 - Checking DNS ! 2022.10.26 11:11:07 - Connected. Quote Share this post Link to post
OpenSourcerer 1438 Posted ... 1 hour ago, 8854 said: . 2022.10.26 11:10:55 - Using WinTun network interface "torguardwintun (Wintun Userspace Tunnel #2)" It's still using that. This probably is relevant for the developers, then. Could you post this in the relevant thread, please? Either link to this thread or describe the symptoms there.In the meantime, your only option is to uninstall the conflicting WinTun drivers, sorry. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
8854 1 Posted ... I don't know how to do that. This is my first time here. IP Leak says I am fine, but you are saying I am not? Quote Share this post Link to post
OpenSourcerer 1438 Posted ... 38 minutes ago, 8854 said: I don't know how to do that. This is my first time here. Uninstall the relevant VPN clients, in this case it's TorGuard VPN. It should remove the WinTun driver, too. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
8854 1 Posted ... Done. Here is my new logs: ! 2022.10.26 18:46:39 - Disconnecting . 2022.10.26 18:46:39 - Sending soft termination signal . 2022.10.26 18:46:42 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.10.26 18:46:44 - OpenVPN > Closing TUN/TAP interface . 2022.10.26 18:46:44 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:eca::/64) . 2022.10.26 18:46:44 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:eca::/64 21 fe80::8 store=active . 2022.10.26 18:46:44 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 21 fde6:7a:7d20:eca::10c7 store=active . 2022.10.26 18:46:44 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 21 10.18.202.201 store=active . 2022.10.26 18:46:44 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.10.26 18:46:45 - Routes, delete 0.0.0.0/1 for interface "OpenVPN Wintun (Wintun Userspace Tunnel)". . 2022.10.26 18:46:46 - Routes, delete 128.0.0.0/1 for interface "OpenVPN Wintun (Wintun Userspace Tunnel)". . 2022.10.26 18:46:46 - Routes, delete ::/1 for interface "OpenVPN Wintun (Wintun Userspace Tunnel)". . 2022.10.26 18:46:47 - Routes, delete 8000::/1 for interface "OpenVPN Wintun (Wintun Userspace Tunnel)". . 2022.10.26 18:46:48 - Routes, delete 199.249.230.49/32 for interface "Ethernet (Intel(R) I211 Gigabit Network Connection)". . 2022.10.26 18:46:48 - Routes, delete 199.249.230.47/32 for interface "OpenVPN Wintun (Wintun Userspace Tunnel)". . 2022.10.26 18:46:49 - Routes, delete 2620:7:6001:c024:c74a:96e4:16bd:fff/128 for interface "OpenVPN Wintun (Wintun Userspace Tunnel)". . 2022.10.26 18:46:49 - Routes, delete 199.249.230.49/32 for interface "Ethernet (Intel(R) I211 Gigabit Network Connection)", not exists. . 2022.10.26 18:46:49 - DNS IPv4 of a network adapter restored to original settings (OpenVPN Wintun, to automatic) . 2022.10.26 18:46:49 - DNS IPv6 of a network adapter restored to original settings (OpenVPN Wintun, to automatic) . 2022.10.26 18:46:49 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2022.10.26 18:46:49 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2022.10.26 18:46:50 - DNS IPv4 of a network adapter restored to original settings (Loopback Pseudo-Interface 1, to automatic) . 2022.10.26 18:46:50 - DNS IPv6 of a network adapter restored to original settings (Loopback Pseudo-Interface 1, to automatic) . 2022.10.26 18:46:50 - DNS leak protection with packet filtering disabled. . 2022.10.26 18:46:50 - Interface OpenVPN Wintun metric restored from 3 to Automatic, layer IPv4 . 2022.10.26 18:46:50 - Interface OpenVPN Wintun metric restored from 3 to Automatic, layer IPv6 . 2022.10.26 18:46:50 - Connection terminated. . 2022.10.26 18:46:50 - Flushing DNS ! 2022.10.26 18:46:50 - Session terminated. I 2022.10.26 18:46:52 - Session starting. I 2022.10.26 18:46:53 - Checking authorization ... . 2022.10.26 18:46:54 - Collect network information . 2022.10.26 18:46:56 - Using WinTun network interface "OpenVPN Wintun (Wintun Userspace Tunnel)" ! 2022.10.26 18:46:56 - Connecting to Helvetios (United States of America, Dallas, Texas) . 2022.10.26 18:46:57 - Routes, add 199.249.230.49/32 for interface "Ethernet (Intel(R) I211 Gigabit Network Connection)". . 2022.10.26 18:46:57 - Routes, add 199.249.230.49/32 for interface "Ethernet (Intel(R) I211 Gigabit Network Connection)", already exists. . 2022.10.26 18:46:57 - OpenVPN > OpenVPN 2.5.7 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on May 27 2022 . 2022.10.26 18:46:57 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.10.26 18:46:57 - OpenVPN > library versions: OpenSSL 1.1.1o 3 May 2022, LZO 2.10 . 2022.10.26 18:46:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.10.26 18:46:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.10.26 18:46:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.10.26 18:46:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.10.26 18:46:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.249.230.49:443 . 2022.10.26 18:46:57 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.10.26 18:46:57 - OpenVPN > UDP link local: (not bound) . 2022.10.26 18:46:57 - OpenVPN > UDP link remote: [AF_INET]199.249.230.49:443 . 2022.10.26 18:46:57 - OpenVPN > TLS: Initial packet from [AF_INET]199.249.230.49:443, sid=30a3d9e1 d1fc7dad . 2022.10.26 18:46:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.10.26 18:46:57 - OpenVPN > VERIFY KU OK . 2022.10.26 18:46:57 - OpenVPN > Validating certificate extended key usage . 2022.10.26 18:46:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.10.26 18:46:57 - OpenVPN > VERIFY EKU OK . 2022.10.26 18:46:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Helvetios, emailAddress=info@airvpn.org . 2022.10.26 18:46:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.10.26 18:46:58 - OpenVPN > [Helvetios] Peer Connection Initiated with [AF_INET]199.249.230.49:443 . 2022.10.26 18:46:58 - OpenVPN > SENT CONTROL [Helvetios]: 'PUSH_REQUEST' (status=1) . 2022.10.26 18:46:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.18.202.1,dhcp-option DNS6 fde6:7a:7d20:eca::1,tun-ipv6,route-gateway 10.18.202.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:eca::10c7/64 fde6:7a:7d20:eca::1,ifconfig 10.18.202.201 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.10.26 18:46:58 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.10.26 18:46:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.18.202.1' . 2022.10.26 18:46:58 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:eca::1' . 2022.10.26 18:46:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.10.26 18:46:58 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.10.26 18:46:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.10.26 18:46:58 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.10.26 18:46:58 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.10.26 18:46:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.10.26 18:46:58 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.10.26 18:46:58 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.10.26 18:46:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.10.26 18:46:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.10.26 18:46:58 - OpenVPN > interactive service msg_channel=0 . 2022.10.26 18:46:58 - OpenVPN > open_tun . 2022.10.26 18:46:58 - OpenVPN > wintun device [OpenVPN Wintun] opened . 2022.10.26 18:46:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 21 static 10.18.202.201 255.255.255.0 . 2022.10.26 18:46:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 21 all . 2022.10.26 18:46:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 21 all . 2022.10.26 18:46:59 - OpenVPN > IPv4 MTU set to 1500 on interface 21 using SetIpInterfaceEntry() . 2022.10.26 18:46:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 21 fde6:7a:7d20:eca::10c7/128 store=active . 2022.10.26 18:46:59 - OpenVPN > add_route_ipv6(fde6:7a:7d20:eca::/64 -> fde6:7a:7d20:eca::10c7 metric 0) dev OpenVPN Wintun . 2022.10.26 18:46:59 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:eca::/64 21 fe80::8 store=active . 2022.10.26 18:46:59 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.10.26 18:46:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 21 all . 2022.10.26 18:46:59 - OpenVPN > IPv6 MTU set to 1500 on interface 21 using SetIpInterfaceEntry() . 2022.10.26 18:46:59 - OpenVPN > Initialization Sequence Completed . 2022.10.26 18:46:59 - Interface OpenVPN Wintun metric changed from Automatic to 3, layer IPv4 . 2022.10.26 18:46:59 - Interface OpenVPN Wintun metric changed from Automatic to 3, layer IPv6 . 2022.10.26 18:47:00 - DNS leak protection with packet filtering enabled. . 2022.10.26 18:47:03 - DNS IPv4 of a network adapter forced (OpenVPN Wintun, from automatic to 10.18.202.1) . 2022.10.26 18:47:03 - DNS IPv6 of a network adapter forced (OpenVPN Wintun, from automatic to fde6:7a:7d20:eca::1) . 2022.10.26 18:47:03 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.18.202.1) . 2022.10.26 18:47:03 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:eca::1) . 2022.10.26 18:47:03 - DNS IPv4 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to 10.18.202.1) . 2022.10.26 18:47:03 - DNS IPv6 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to fde6:7a:7d20:eca::1) . 2022.10.26 18:47:04 - Routes, add 0.0.0.0/1 for interface "OpenVPN Wintun (Wintun Userspace Tunnel)". . 2022.10.26 18:47:05 - Routes, add 128.0.0.0/1 for interface "OpenVPN Wintun (Wintun Userspace Tunnel)". . 2022.10.26 18:47:05 - Routes, add ::/1 for interface "OpenVPN Wintun (Wintun Userspace Tunnel)". . 2022.10.26 18:47:06 - Routes, add 8000::/1 for interface "OpenVPN Wintun (Wintun Userspace Tunnel)". . 2022.10.26 18:47:07 - Routes, add 199.249.230.47/32 for interface "OpenVPN Wintun (Wintun Userspace Tunnel)". . 2022.10.26 18:47:07 - Routes, add 2620:7:6001:c024:c74a:96e4:16bd:fff/128 for interface "OpenVPN Wintun (Wintun Userspace Tunnel)". . 2022.10.26 18:47:07 - Flushing DNS I 2022.10.26 18:47:08 - Checking route IPv4 I 2022.10.26 18:47:08 - Checking route IPv6 I 2022.10.26 18:47:09 - Checking DNS ! 2022.10.26 18:47:09 - Connected. Quote Share this post Link to post
Staff 10000 Posted ... 14 hours ago, OpenSourcerer said: It's still using that. This probably is relevant for the developers, then. Could you post this in the relevant thread, please? Either link to this thread or describe the symptoms there. In the meantime, your only option is to uninstall the conflicting WinTun drivers, sorry. Hello! We confirm that the issue is under investigation. For the readers who don't want to uninstall other drivers, for example because they want to use multiple VPNs, a faster solution is just telling Eddie not to use alien interfaces by filling in, on "Preferences" > "Networking" window, the "VPN interface name" field with a short name (for example "Eddie", without quotes). See https://www.clodo.it/host/images/f625221af86ac02e33238f0aaaffca81bae26bbf.png Kind regards 1 OpenSourcerer reacted to this Quote Share this post Link to post
OpenSourcerer 1438 Posted ... 10 hours ago, 8854 said: Done Well, Eddie still chooses the wrong interface. But it looks like it resorted to using the default OpenVPN one. It should work as good as Eddie's, but you can of course follow Staff's recommendation, too, to force it to use Eddie's. It's more or less guaranteed to work. In addition to enabling Network Lock, configure your torrent client to bind to the tunnel interface. This is to really make sure you're not going to suffer any more of those notices. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
go558a83nk 362 Posted ... I am concerned that with this matter the network lock isn't really working and that's why the OP gets leaks. (or maybe the OP wasn't using network lock traditionally?) You see, if network lock rules are created based on the wrong interface/network adapter (i.e. traffic can go through only the wrong adapter and no other) then it seems network lock and its rules will do no good anyway. Quote Share this post Link to post
8854 1 Posted ... TorGuard was not a VPN, it was a Firefox extension that was meant to enhance VPN security. As I indicated, I removed the extension. I appreciate everyone's help. Sadly, I have no idea how to do the additional steps outlines. Quote Share this post Link to post
OpenSourcerer 1438 Posted ... 23 minutes ago, 8854 said: TorGuard was not a VPN, it was a Firefox extension that was meant to enhance VPN security It doesn't add up in my mind. Is it even technically possible for browser extensions to install network devices? I've never heard of such a thing. 36 minutes ago, 8854 said: Sadly, I have no idea how to do the additional steps outlines That's sad indeed. Have you tried searching a little, or even delving into the settings yourself? The question was answered here on the forums and on the internet thousandfold, I'm sure. Try to follow in the footsteps of Those Who Came Before You. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
8854 1 Posted ... (edited) I tried adjusting Eddie like was shown in the photo. Not seeing any issues according to IPLeak ! 2022.10.27 12:18:35 - Disconnecting . 2022.10.27 12:18:35 - Sending soft termination signal . 2022.10.27 12:18:38 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.10.27 12:18:40 - OpenVPN > Closing TUN/TAP interface . 2022.10.27 12:18:40 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:194a::/64) . 2022.10.27 12:18:40 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:194a::/64 19 fe80::8 store=active . 2022.10.27 12:18:40 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 19 fde6:7a:7d20:194a::105e store=active . 2022.10.27 12:18:40 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 19 10.29.74.96 store=active . 2022.10.27 12:18:40 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.10.27 12:18:41 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2022.10.27 12:18:42 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2022.10.27 12:18:43 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2022.10.27 12:18:43 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2022.10.27 12:18:44 - Routes, delete 146.70.115.221/32 for interface "Ethernet (Intel(R) I211 Gigabit Network Connection)". . 2022.10.27 12:18:45 - Routes, delete 146.70.115.219/32 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2022.10.27 12:18:45 - Routes, delete 2a0d:5600:24:211:b360:997d:5199:6758/128 for interface "Eddie (Wintun Userspace Tunnel #2)". . 2022.10.27 12:18:45 - Routes, delete 146.70.115.221/32 for interface "Ethernet (Intel(R) I211 Gigabit Network Connection)", not exists. . 2022.10.27 12:18:46 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2022.10.27 12:18:46 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2022.10.27 12:18:46 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2022.10.27 12:18:46 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2022.10.27 12:18:46 - DNS IPv4 of a network adapter restored to original settings (Loopback Pseudo-Interface 1, to automatic) . 2022.10.27 12:18:46 - DNS IPv6 of a network adapter restored to original settings (Loopback Pseudo-Interface 1, to automatic) . 2022.10.27 12:18:46 - DNS leak protection with packet filtering disabled. . 2022.10.27 12:18:46 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2022.10.27 12:18:46 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2022.10.27 12:18:46 - Connection terminated. . 2022.10.27 12:18:46 - Flushing DNS ! 2022.10.27 12:18:47 - Session terminated. ! 2022.10.27 12:19:08 - Activation of Network Lock - Windows Filtering Platform I 2022.10.27 12:19:10 - Session starting. I 2022.10.27 12:19:11 - Checking authorization ... . 2022.10.27 12:19:12 - Collect network information . 2022.10.27 12:19:15 - Added new network interface "Eddie", Wintun version 0.12 . 2022.10.27 12:19:15 - Collect network information . 2022.10.27 12:19:17 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2022.10.27 12:19:17 - Connecting to Iklil (United States of America, New York City) . 2022.10.27 12:19:18 - Routes, add 146.70.115.221/32 for interface "Ethernet (Intel(R) I211 Gigabit Network Connection)". . 2022.10.27 12:19:19 - Routes, add 146.70.115.221/32 for interface "Ethernet (Intel(R) I211 Gigabit Network Connection)", already exists. . 2022.10.27 12:19:19 - OpenVPN > OpenVPN 2.5.7 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on May 27 2022 . 2022.10.27 12:19:19 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.10.27 12:19:19 - OpenVPN > library versions: OpenSSL 1.1.1o 3 May 2022, LZO 2.10 . 2022.10.27 12:19:19 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.10.27 12:19:19 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.10.27 12:19:19 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.10.27 12:19:19 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.10.27 12:19:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]146.70.115.221:443 . 2022.10.27 12:19:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.10.27 12:19:19 - OpenVPN > UDP link local: (not bound) . 2022.10.27 12:19:19 - OpenVPN > UDP link remote: [AF_INET]146.70.115.221:443 . 2022.10.27 12:19:19 - OpenVPN > TLS: Initial packet from [AF_INET]146.70.115.221:443, sid=9448be27 cacf74de . 2022.10.27 12:19:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.10.27 12:19:19 - OpenVPN > VERIFY KU OK . 2022.10.27 12:19:19 - OpenVPN > Validating certificate extended key usage . 2022.10.27 12:19:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.10.27 12:19:19 - OpenVPN > VERIFY EKU OK . 2022.10.27 12:19:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Iklil, emailAddress=info@airvpn.org . 2022.10.27 12:19:19 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.10.27 12:19:19 - OpenVPN > [Iklil] Peer Connection Initiated with [AF_INET]146.70.115.221:443 . 2022.10.27 12:19:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.74.1,dhcp-option DNS6 fde6:7a:7d20:194a::1,tun-ipv6,route-gateway 10.29.74.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:194a::105e/64 fde6:7a:7d20:194a::1,ifconfig 10.29.74.96 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2022.10.27 12:19:20 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.10.27 12:19:20 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.29.74.1' . 2022.10.27 12:19:20 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:194a::1' . 2022.10.27 12:19:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.10.27 12:19:20 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.10.27 12:19:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.10.27 12:19:20 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.10.27 12:19:20 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.10.27 12:19:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.10.27 12:19:20 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.10.27 12:19:20 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.10.27 12:19:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.10.27 12:19:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.10.27 12:19:20 - OpenVPN > interactive service msg_channel=0 . 2022.10.27 12:19:20 - OpenVPN > open_tun . 2022.10.27 12:19:20 - OpenVPN > wintun device [Eddie] opened . 2022.10.27 12:19:21 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 19 static 10.29.74.96 255.255.255.0 . 2022.10.27 12:19:21 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 19 all . 2022.10.27 12:19:21 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 19 all . 2022.10.27 12:19:21 - OpenVPN > IPv4 MTU set to 1500 on interface 19 using SetIpInterfaceEntry() . 2022.10.27 12:19:21 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 19 fde6:7a:7d20:194a::105e/128 store=active . 2022.10.27 12:19:21 - OpenVPN > add_route_ipv6(fde6:7a:7d20:194a::/64 -> fde6:7a:7d20:194a::105e metric 0) dev Eddie . 2022.10.27 12:19:21 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:194a::/64 19 fe80::8 store=active . 2022.10.27 12:19:21 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.10.27 12:19:21 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 19 all . 2022.10.27 12:19:21 - OpenVPN > IPv6 MTU set to 1500 on interface 19 using SetIpInterfaceEntry() . 2022.10.27 12:19:21 - OpenVPN > Initialization Sequence Completed . 2022.10.27 12:19:21 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2022.10.27 12:19:21 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2022.10.27 12:19:21 - DNS leak protection with packet filtering enabled. . 2022.10.27 12:19:25 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.29.74.1) . 2022.10.27 12:19:25 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:194a::1) . 2022.10.27 12:19:25 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.29.74.1) . 2022.10.27 12:19:25 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:194a::1) . 2022.10.27 12:19:25 - DNS IPv4 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to 10.29.74.1) . 2022.10.27 12:19:26 - DNS IPv6 of a network adapter forced (Loopback Pseudo-Interface 1, from automatic to fde6:7a:7d20:194a::1) . 2022.10.27 12:19:26 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.10.27 12:19:27 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2022.10.27 12:19:28 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2022.10.27 12:19:29 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2022.10.27 12:19:29 - Routes, add 146.70.115.219/32 for interface "Eddie (Eddie Tunnel)". . 2022.10.27 12:19:30 - Routes, add 2a0d:5600:24:211:b360:997d:5199:6758/128 for interface "Eddie (Eddie Tunnel)". . 2022.10.27 12:19:30 - Flushing DNS I 2022.10.27 12:19:30 - Checking route IPv4 I 2022.10.27 12:19:31 - Checking route IPv6 I 2022.10.27 12:19:31 - Checking DNS ! 2022.10.27 12:19:31 - Connected. Edited ... by 8854 Wrong info Quote Share this post Link to post
Flx 76 Posted ... 5 hours ago, OpenSourcerer said: delving into the settings That will do him no good either with the Windows Education version in question here (you'll need Pro or Enterprise). Quote Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
8854 1 Posted ... I could be wrong, but the Education version is just a relabeled Enterprise version. The only difference is the Ed Version was free with a college acct. I don't see any functional difference between it and Pro either. I don't think there is a setting or function that I can't adjust. If you see something specific in the log that I should do, I will attempt to do it. But, as I said, IPLeak shows no problems, to include tunnel address or reported location. Quote Share this post Link to post
Flx 76 Posted ... Can you run gpedit.msc on your system? Quote Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
Flx 76 Posted ... 26 minutes ago, 8854 said: Yes Great....Start "tweaking". Quote Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
OpenSourcerer 1438 Posted ... I'm confused. What's the Windows edition got to do with how to bind a torrent client to a specific interface? Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post