Jump to content
Not connected, Your IP: 44.212.50.220
toup

Eddie Checking DNS failed on WIn10

Recommended Posts

Posted ... (edited)

here is the log :

. 2023.03.05 12:34:41 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.19044.0, Mono/.Net: v4.0.30319
. 2023.03.05 12:34:43 - Reading options from C:\Program Files\AirVPN\default.profile
. 2023.03.05 12:34:43 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2023.03.05 12:34:43 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe)
. 2023.03.05 12:34:43 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe)
I 2023.03.05 12:34:43 - Ready
. 2023.03.05 12:34:44 - Collect information about AirVPN completed
I 2023.03.05 12:34:58 - Session starting.
I 2023.03.05 12:34:58 - Checking authorization ...
. 2023.03.05 12:34:59 - Added new network interface "Eddie", Wintun version 0.12
. 2023.03.05 12:34:59 - Using WinTun network interface "Eddie (Eddie Tunnel)"
. 2023.03.05 12:34:59 - IPv6 disabled with packet filtering.
! 2023.03.05 12:34:59 - Connecting to Meissa (Latvia, Riga)
. 2023.03.05 12:34:59 - Routes, add 109.248.148.197/32 for interface "Ethernet (Realtek PCIe 2.5GbE Family Controller)".
. 2023.03.05 12:34:59 - Routes, add 109.248.148.197/32 for interface "Ethernet (Realtek PCIe 2.5GbE Family Controller)", already exists.
. 2023.03.05 12:34:59 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2023.03.05 12:34:59 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2023.03.05 12:34:59 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2023.03.05 12:34:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.03.05 12:34:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.03.05 12:34:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.03.05 12:34:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.03.05 12:34:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.248.148.197:443
. 2023.03.05 12:34:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2023.03.05 12:34:59 - OpenVPN > UDP link local: (not bound)
. 2023.03.05 12:34:59 - OpenVPN > UDP link remote: [AF_INET]109.248.148.197:443
. 2023.03.05 12:34:59 - OpenVPN > TLS: Initial packet from [AF_INET]109.248.148.197:443, sid=4d88b5da 677b034e
. 2023.03.05 12:34:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.03.05 12:34:59 - OpenVPN > VERIFY KU OK
. 2023.03.05 12:34:59 - OpenVPN > Validating certificate extended key usage
. 2023.03.05 12:34:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.03.05 12:34:59 - OpenVPN > VERIFY EKU OK
. 2023.03.05 12:34:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Meissa, emailAddress=info@airvpn.org
. 2023.03.05 12:34:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.03.05 12:34:59 - OpenVPN > [Meissa] Peer Connection Initiated with [AF_INET]109.248.148.197:443
. 2023.03.05 12:34:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.21.162.1,dhcp-option DNS6 fde6:7a:7d20:11a2::1,tun-ipv6,route-gateway 10.21.162.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:11a2::106c/64 fde6:7a:7d20:11a2::1,ifconfig 10.21.162.110 255.255.255.0,peer-id 5,cipher AES-256-GCM'
. 2023.03.05 12:34:59 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2023.03.05 12:34:59 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.21.162.1'
. 2023.03.05 12:34:59 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:11a2::1'
. 2023.03.05 12:34:59 - OpenVPN > Pushed option removed by filter: 'tun-ipv6'
. 2023.03.05 12:34:59 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:11a2::106c/64 fde6:7a:7d20:11a2::1'
. 2023.03.05 12:34:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2023.03.05 12:34:59 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2023.03.05 12:34:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2023.03.05 12:34:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2023.03.05 12:34:59 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2023.03.05 12:34:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2023.03.05 12:34:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2023.03.05 12:34:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2023.03.05 12:34:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.03.05 12:34:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.03.05 12:34:59 - OpenVPN > interactive service msg_channel=0
. 2023.03.05 12:34:59 - OpenVPN > open_tun
. 2023.03.05 12:34:59 - OpenVPN > wintun device [Eddie] opened
. 2023.03.05 12:34:59 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address 35 static 10.21.162.110 255.255.255.0
. 2023.03.05 12:34:59 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip delete dns 35 all
. 2023.03.05 12:34:59 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip delete wins 35 all
. 2023.03.05 12:34:59 - OpenVPN > IPv4 MTU set to 1500 on interface 35 using SetIpInterfaceEntry()
. 2023.03.05 12:34:59 - OpenVPN > Initialization Sequence Completed
. 2023.03.05 12:34:59 - Interface Eddie metric changed from Automatic to 3, layer IPv4
. 2023.03.05 12:34:59 - Interface Eddie metric changed from Automatic to 3, layer IPv6
. 2023.03.05 12:34:59 - DNS leak protection with packet filtering enabled.
. 2023.03.05 12:35:00 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.21.162.1)
. 2023.03.05 12:35:00 - DNS IPv4 of a network adapter forced (Ethernet, from manual (1.1.1.1, 1.0.0.1) to 10.21.162.1)
. 2023.03.05 12:35:00 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.05 12:35:00 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.05 12:35:00 - Routes, add 109.248.148.195/32 for interface "Eddie (Eddie Tunnel)".
. 2023.03.05 12:35:00 - Routes, skipped for 2a02:4840:2:238:6de5:948f:73f4:e625 : IPv6 blocked.
. 2023.03.05 12:35:00 - Flushing DNS
I 2023.03.05 12:35:00 - Checking route IPv4
I 2023.03.05 12:35:04 - Checking DNS
. 2023.03.05 12:35:47 - Checking DNS (4° try)
. 2023.03.05 12:36:03 - Checking DNS (5° try)
E 2023.03.05 12:36:15 - Checking DNS failed, last reason: Checking DNS failed:
! 2023.03.05 12:36:15 - Disconnecting
. 2023.03.05 12:36:15 - Sending soft termination signal
. 2023.03.05 12:36:18 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2023.03.05 12:36:20 - OpenVPN > Closing TUN/TAP interface
. 2023.03.05 12:36:20 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv4 delete address 35 10.21.162.110 store=active
. 2023.03.05 12:36:21 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2023.03.05 12:36:21 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.05 12:36:21 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.05 12:36:21 - Routes, delete 109.248.148.197/32 for interface "Ethernet (Realtek PCIe 2.5GbE Family Controller)".
. 2023.03.05 12:36:21 - Routes, delete 109.248.148.195/32 for interface "Eddie (Eddie Tunnel)".
. 2023.03.05 12:36:21 - Routes, skipped for 2a02:4840:2:238:6de5:948f:73f4:e625 : IPv6 blocked.
. 2023.03.05 12:36:21 - Routes, delete 109.248.148.197/32 for interface "Ethernet (Realtek PCIe 2.5GbE Family Controller)", not exists.
. 2023.03.05 12:36:21 - IPv6 restored with packet filtering.
. 2023.03.05 12:36:21 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic)
. 2023.03.05 12:36:21 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to 1.1.1.1, 1.0.0.1)
. 2023.03.05 12:36:21 - DNS leak protection with packet filtering disabled.
. 2023.03.05 12:36:21 - Interface Eddie metric restored from 3 to Automatic, layer IPv4
. 2023.03.05 12:36:21 - Interface Eddie metric restored from 3 to Automatic, layer IPv6
. 2023.03.05 12:36:21 - Connection terminated.
I 2023.03.05 12:36:23 - Cancel requested.
! 2023.03.05 12:36:23 - Session terminated.


 

Edited ... by OpenSourcerer
Apply LOG format to logs

Share this post


Link to post

This won't do. I didn't ask for the logs. The reason a system report is necessary is because the configuration and various other info is printed with it, which can be used to troubleshoot this further.

See, if Network Lock is enabled, DNS checking can be disabled, as your configured DNS servers are outside your local network. It'd serve as something of a fix. But I don't see NetLock being enabled in the logs you provided, so I may assume it's not enabled. To verify that, though, the system report is needed, as one of the lines in its output is whether NetLock is on or off. One of the reasons why the logs alone are not enough.
So, please read carefully what is requested of you in the future. If this request is connected to a little bit of reading for you, then that's what it is. Can't do all the homework for you, now, can I? :)Thank you for your understanding.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

I had this issue as well. I had to reset my DNS through settings, They were either disabled or on manual but blank. After resetting and changing the DNS through settings-network-ethernet then the issue was quickly resolved.

Share this post


Link to post
Posted ... (edited)

Sorry my understanding o f english isn't perfect, i'll do my best :

Eddie System/Environment Report - 05/03/2023 - 13:26 UTC

Eddie version: 2.21.8
Eddie OS build: windows_x64
Eddie architecture: x64
OS type: Windows
OS name: Windows 10 Pro
OS version: Microsoft Windows NT 10.0.19044.0
OS architecture: x64
Mono /.Net Framework: v4.0.30319
OpenVPN: 2.5.5 - OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
Hummingbird: Not available
WireGuard: 0.5.2
SSH: plink 0.73 (C:\Program Files\AirVPN\plink.exe)
SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe)
Profile path: C:\Program Files\AirVPN\default.profile
Data path: C:\Program Files\AirVPN
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\Eddie-UI.exe
Command line arguments: (0 args)
Network Lock Active: Yes, Windows Filtering Platform
Connected to VPN: No
OS support IPv4: Yes
OS support IPv6: Yes
Detected DNS: 1.1.1.1, 1.0.0.1, 2a01:cb19:975:400:a87:c6ff:fe52:bd30
Test DNS IPv4: Failed
Test DNS IPv6: Failed
Test Ping IPv4: 26 ms
Test Ping IPv6: Failed
Test HTTP IPv4: Ok
Test HTTP IPv6: Error: Fetch url error:Timeout was reached
Test HTTPS: Error: Fetch url error:Couldn't resolve host name
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
key: (omissis)
areas.allowlist: ro,ee,bg,be,cz,lv
proxy.mode: none
network.ipv6.mode: block
network.ipv4.autoswitch: True

----------------------------
Logs:

. 2023.03.05 14:24:07 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.19044.0, Mono/.Net: v4.0.30319
. 2023.03.05 14:24:08 - Reading options from C:\Program Files\AirVPN\default.profile
. 2023.03.05 14:24:09 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2023.03.05 14:24:09 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe)
. 2023.03.05 14:24:09 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe)
I 2023.03.05 14:24:09 - Ready
. 2023.03.05 14:24:10 - Collect information about AirVPN completed
! 2023.03.05 14:24:15 - Activation of Network Lock - Windows Filtering Platform
I 2023.03.05 14:24:23 - Session starting.
I 2023.03.05 14:24:23 - Checking authorization ...
. 2023.03.05 14:24:26 - Added new network interface "Eddie", Wintun version 0.12
. 2023.03.05 14:24:26 - Using WinTun network interface "Eddie (Eddie Tunnel)"
. 2023.03.05 14:24:26 - IPv6 disabled with packet filtering.
! 2023.03.05 14:24:26 - Connecting to Meissa (Latvia, Riga)
. 2023.03.05 14:24:26 - Routes, add 109.248.148.197/32 for interface "Ethernet (Realtek PCIe 2.5GbE Family Controller)".
. 2023.03.05 14:24:26 - Routes, add 109.248.148.197/32 for interface "Ethernet (Realtek PCIe 2.5GbE Family Controller)", already exists.
. 2023.03.05 14:24:26 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2023.03.05 14:24:26 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2023.03.05 14:24:26 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2023.03.05 14:24:26 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.03.05 14:24:26 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.03.05 14:24:26 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.03.05 14:24:26 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.03.05 14:24:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.248.148.197:443
. 2023.03.05 14:24:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2023.03.05 14:24:26 - OpenVPN > UDP link local: (not bound)
. 2023.03.05 14:24:26 - OpenVPN > UDP link remote: [AF_INET]109.248.148.197:443
. 2023.03.05 14:24:27 - OpenVPN > TLS: Initial packet from [AF_INET]109.248.148.197:443, sid=db2c4c5e 42612699
. 2023.03.05 14:24:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.03.05 14:24:27 - OpenVPN > VERIFY KU OK
. 2023.03.05 14:24:27 - OpenVPN > Validating certificate extended key usage
. 2023.03.05 14:24:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.03.05 14:24:27 - OpenVPN > VERIFY EKU OK
. 2023.03.05 14:24:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Meissa, emailAddress=info@airvpn.org
. 2023.03.05 14:24:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.03.05 14:24:27 - OpenVPN > [Meissa] Peer Connection Initiated with [AF_INET]109.248.148.197:443
. 2023.03.05 14:24:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.21.162.1,dhcp-option DNS6 fde6:7a:7d20:11a2::1,tun-ipv6,route-gateway 10.21.162.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:11a2::106c/64 fde6:7a:7d20:11a2::1,ifconfig 10.21.162.110 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2023.03.05 14:24:27 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2023.03.05 14:24:27 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.21.162.1'
. 2023.03.05 14:24:27 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:11a2::1'
. 2023.03.05 14:24:27 - OpenVPN > Pushed option removed by filter: 'tun-ipv6'
. 2023.03.05 14:24:27 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:11a2::106c/64 fde6:7a:7d20:11a2::1'
. 2023.03.05 14:24:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2023.03.05 14:24:27 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2023.03.05 14:24:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2023.03.05 14:24:27 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2023.03.05 14:24:27 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2023.03.05 14:24:27 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2023.03.05 14:24:27 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2023.03.05 14:24:27 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2023.03.05 14:24:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.03.05 14:24:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.03.05 14:24:27 - OpenVPN > interactive service msg_channel=0
. 2023.03.05 14:24:27 - OpenVPN > open_tun
. 2023.03.05 14:24:27 - OpenVPN > wintun device [Eddie] opened
. 2023.03.05 14:24:27 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address 35 static 10.21.162.110 255.255.255.0
. 2023.03.05 14:24:27 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip delete dns 35 all
. 2023.03.05 14:24:28 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip delete wins 35 all
. 2023.03.05 14:24:28 - OpenVPN > IPv4 MTU set to 1500 on interface 35 using SetIpInterfaceEntry()
. 2023.03.05 14:24:28 - OpenVPN > Initialization Sequence Completed
. 2023.03.05 14:24:28 - Interface Eddie metric changed from Automatic to 3, layer IPv4
. 2023.03.05 14:24:28 - Interface Eddie metric changed from Automatic to 3, layer IPv6
. 2023.03.05 14:24:28 - DNS leak protection with packet filtering enabled.
. 2023.03.05 14:24:28 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.21.162.1)
. 2023.03.05 14:24:28 - DNS IPv4 of a network adapter forced (Ethernet, from manual (1.1.1.1, 1.0.0.1) to 10.21.162.1)
. 2023.03.05 14:24:28 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.05 14:24:28 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.05 14:24:28 - Routes, add 109.248.148.195/32 for interface "Eddie (Eddie Tunnel)".
. 2023.03.05 14:24:28 - Routes, skipped for 2a02:4840:2:238:6de5:948f:73f4:e625 : IPv6 blocked.
. 2023.03.05 14:24:28 - Flushing DNS
I 2023.03.05 14:24:28 - Checking route IPv4
I 2023.03.05 14:24:34 - Checking DNS
. 2023.03.05 14:25:17 - Checking DNS (4° try)
. 2023.03.05 14:25:33 - Checking DNS (5° try)
E 2023.03.05 14:25:45 - Checking DNS failed, last reason: Checking DNS failed:
! 2023.03.05 14:25:45 - Disconnecting
. 2023.03.05 14:25:45 - Sending soft termination signal
. 2023.03.05 14:25:49 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2023.03.05 14:25:50 - OpenVPN > Closing TUN/TAP interface
. 2023.03.05 14:25:50 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv4 delete address 35 10.21.162.110 store=active
. 2023.03.05 14:25:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2023.03.05 14:25:51 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.05 14:25:51 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)".
. 2023.03.05 14:25:51 - Routes, delete 109.248.148.197/32 for interface "Ethernet (Realtek PCIe 2.5GbE Family Controller)".
. 2023.03.05 14:25:51 - Routes, delete 109.248.148.195/32 for interface "Eddie (Eddie Tunnel)".
. 2023.03.05 14:25:51 - Routes, skipped for 2a02:4840:2:238:6de5:948f:73f4:e625 : IPv6 blocked.
. 2023.03.05 14:25:51 - Routes, delete 109.248.148.197/32 for interface "Ethernet (Realtek PCIe 2.5GbE Family Controller)", not exists.
. 2023.03.05 14:25:51 - IPv6 restored with packet filtering.
. 2023.03.05 14:25:51 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic)
. 2023.03.05 14:25:51 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to 1.1.1.1, 1.0.0.1)
. 2023.03.05 14:25:51 - DNS leak protection with packet filtering disabled.
. 2023.03.05 14:25:51 - Interface Eddie metric restored from 3 to Automatic, layer IPv4
. 2023.03.05 14:25:51 - Interface Eddie metric restored from 3 to Automatic, layer IPv6
. 2023.03.05 14:25:51 - Connection terminated.
I 2023.03.05 14:25:52 - Cancel requested.
! 2023.03.05 14:25:52 - Session terminated.

----------------------------
Network Interfaces and Routes:

{
    "routes": [
        {
            "destination": "0.0.0.0\/0",
            "gateway": "192.168.1.1",
            "interface_index": 4,
            "metric": 0,
            "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}"
        },
        {
            "destination": "127.0.0.0\/8",
            "gateway": "0.0.0.0",
            "interface_index": 1,
            "metric": 256,
            "interface": "{FC23185C-4A45-11EC-8282-806E6F6E6963}"
        },
        {
            "destination": "127.0.0.1\/32",
            "gateway": "0.0.0.0",
            "interface_index": 1,
            "metric": 256,
            "interface": "{FC23185C-4A45-11EC-8282-806E6F6E6963}"
        },
        {
            "destination": "127.255.255.255\/32",
            "gateway": "0.0.0.0",
            "interface_index": 1,
            "metric": 256,
            "interface": "{FC23185C-4A45-11EC-8282-806E6F6E6963}"
        },
        {
            "destination": "192.168.1.0\/24",
            "gateway": "0.0.0.0",
            "interface_index": 4,
            "metric": 256,
            "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}"
        },
        {
            "destination": "192.168.1.16\/32",
            "gateway": "0.0.0.0",
            "interface_index": 4,
            "metric": 256,
            "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}"
        },
        {
            "destination": "192.168.1.255\/32",
            "gateway": "0.0.0.0",
            "interface_index": 4,
            "metric": 256,
            "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}"
        },
        {
            "destination": "224.0.0.0\/4",
            "gateway": "0.0.0.0",
            "interface_index": 1,
            "metric": 256,
            "interface": "{FC23185C-4A45-11EC-8282-806E6F6E6963}"
        },
        {
            "destination": "224.0.0.0\/4",
            "gateway": "0.0.0.0",
            "interface_index": 15,
            "metric": 256,
            "interface": "{DF6A64C7-7CF9-4ED3-88B3-262450D0DB39}"
        },
        {
            "destination": "224.0.0.0\/4",
            "gateway": "0.0.0.0",
            "interface_index": 4,
            "metric": 256,
            "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}"
        },
        {
            "destination": "255.255.255.255\/32",
            "gateway": "0.0.0.0",
            "interface_index": 1,
            "metric": 256,
            "interface": "{FC23185C-4A45-11EC-8282-806E6F6E6963}"
        },
        {
            "destination": "255.255.255.255\/32",
            "gateway": "0.0.0.0",
            "interface_index": 15,
            "metric": 256,
            "interface": "{DF6A64C7-7CF9-4ED3-88B3-262450D0DB39}"
        },
        {
            "destination": "255.255.255.255\/32",
            "gateway": "0.0.0.0",
            "interface_index": 4,
            "metric": 256,
            "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}"
        },
        {
            "destination": "::\/0",
            "gateway": "fe80::a87:c6ff:fe52:bd30",
            "interface_index": 4,
            "metric": 16,
            "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}"
        },
        {
            "destination": "::1\/128",
            "gateway": "::",
            "interface_index": 1,
            "metric": 256,
            "interface": "{FC23185C-4A45-11EC-8282-806E6F6E6963}"
        },
        {
            "destination": "2a01:cb19:975:400::\/64",
            "gateway": "::",
            "interface_index": 4,
            "metric": 16,
            "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}"
        },
        {
            "destination": "2a01:cb19:975:400:1d79:a9cc:b5e6:e398\/128",
            "gateway": "::",
            "interface_index": 4,
            "metric": 256,
            "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}"
        },
        {
            "destination": "2a02:4840:2:237:b0bd:6f2c:c975:5bf0\/128",
            "gateway": "fde6:7a:7d20:16ae::1",
            "interface_index": 15,
            "metric": 256,
            "interface": "{DF6A64C7-7CF9-4ED3-88B3-262450D0DB39}"
        },
        {
            "destination": "2a04:9dc0:c1:53:bb5c:c0f8:c89:e06c\/128",
            "gateway": "fde6:7a:7d20:11e::1",
            "interface_index": 15,
            "metric": 256,
            "interface": "{DF6A64C7-7CF9-4ED3-88B3-262450D0DB39}"
        },
        {
            "destination": "fe80::\/64",
            "gateway": "::",
            "interface_index": 15,
            "metric": 256,
            "interface": "{DF6A64C7-7CF9-4ED3-88B3-262450D0DB39}"
        },
        {
            "destination": "fe80::\/64",
            "gateway": "::",
            "interface_index": 4,
            "metric": 256,
            "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}"
        },
        {
            "destination": "fe80::38f9:d494:7c44:f8bb\/128",
            "gateway": "::",
            "interface_index": 15,
            "metric": 256,
            "interface": "{DF6A64C7-7CF9-4ED3-88B3-262450D0DB39}"
        },
        {
            "destination": "fe80::cd2a:617d:54ee:1a1b\/128",
            "gateway": "::",
            "interface_index": 4,
            "metric": 256,
            "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}"
        },
        {
            "destination": "ff00::\/8",
            "gateway": "::",
            "interface_index": 1,
            "metric": 256,
            "interface": "{FC23185C-4A45-11EC-8282-806E6F6E6963}"
        },
        {
            "destination": "ff00::\/8",
            "gateway": "::",
            "interface_index": 15,
            "metric": 256,
            "interface": "{DF6A64C7-7CF9-4ED3-88B3-262450D0DB39}"
        },
        {
            "destination": "ff00::\/8",
            "gateway": "::",
            "interface_index": 4,
            "metric": 256,
            "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}"
        }
    ],
    "ipv4-default-gateway": "192.168.1.1",
    "ipv4-default-interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}",
    "ipv6-default-gateway": "fe80::a87:c6ff:fe52:bd30",
    "ipv6-default-interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}",
    "interfaces": [
        {
            "friendly": "Ethernet",
            "id": "{1C580432-DE36-456F-86DB-64EDAED0488C}",
            "name": "Ethernet",
            "description": "Realtek PCIe 2.5GbE Family Controller",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "101099309",
            "bytes_sent": "9377662",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "2a01:cb19:975:400:1d79:a9cc:b5e6:e398",
                "fe80::cd2a:617d:54ee:1a1b",
                "192.168.1.16"
            ],
            "bind": true,
            "dns4": "1.1.1.1,1.0.0.1",
            "dns6": null
        },
        {
            "friendly": "Connexion au r\u00e9seau local",
            "id": "{DF6A64C7-7CF9-4ED3-88B3-262450D0DB39}",
            "name": "Connexion au r\u00e9seau local",
            "description": "TAP-Windows Adapter V9",
            "type": "Virtual",
            "status": "Down",
            "bytes_received": "5398395",
            "bytes_sent": "696288",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::38f9:d494:7c44:f8bb",
                "169.254.39.234"
            ],
            "bind": true,
            "dns4": "",
            "dns6": null
        },
        {
            "friendly": "Loopback Pseudo-Interface 1",
            "id": "{FC23185C-4A45-11EC-8282-806E6F6E6963}",
            "name": "Loopback Pseudo-Interface 1",
            "description": "Software Loopback Interface 1",
            "type": "Loopback",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "::1",
                "127.0.0.1"
            ],
            "bind": true,
            "dns4": null,
            "dns6": null
        }
    ]
}
----------------------------
ipconfig /all:

Configuration IP de Windows

   Nom de l'h“te . . . . . . . . . . : Win10Pro
   Suffixe DNS principal . . . . . . :
   Type de noeud. . . . . . . . . .  : Hybride
   Routage IP activ‚ . . . . . . . . : Non
   Proxy WINS activ‚ . . . . . . . . : Non
   Liste de recherche du suffixe DNS.: home

Carte Ethernet Ethernet :

   Suffixe DNS propre … la connexion. . . : home
   Description. . . . . . . . . . . . . . : Realtek PCIe 2.5GbE Family Controller
   Adresse physique . . . . . . . . . . . :
   DHCP activ‚. . . . . . . . . . . . . . : Oui
   Configuration automatique activ‚e. . . : Oui
   Adresse IPv6. . . . . . . . . . .ÿ. . .: 2a01:cb19:975:400:1d79:a9cc:b5e6:e398(pr‚f‚r‚)
   Adresse IPv6 de liaison locale. . . . .: fe80::cd2a:617d:54ee:1a1b%4(pr‚f‚r‚)
   Adresse IPv4. . . . . . . . . . . . . .: 192.168.1.16(pr‚f‚r‚)
   Masque de sous-r‚seau. . . .ÿ. . . . . : 255.255.255.0
   Bail obtenu. . . . . . . . .ÿ. . . . . : dimanche 5 mars 2023 11:11:43
   Bail expirant. . . . . . . . .ÿ. . . . : lundi 6 mars 2023 12:00:32
   Passerelle par d‚faut. . . .ÿ. . . . . : fe80::a87:c6ff:fe52:bd30%4
                                   192.168.1.1
   Serveur DHCP . . . . . . . . . . . . . : 192.168.1.1
   IAID DHCPv6 . . . . . . . . . . . : 217855127
   DUID de client DHCPv6. . . . . . . . : 00-01-00-01-29-37-03-AB-FC-34-97-9E-E7-6E
   Serveurs DNS. . .  . . . . . . . . . . : 1.1.1.1
                                   1.0.0.1
                                   2a01:cb19:975:400:a87:c6ff:fe52:bd30
   NetBIOS sur Tcpip. . . . . . . . . . . : Activ‚
   Liste de recherche de suffixesÿDNS propres … la connexionÿ:
                                   home

Carte inconnue Connexion au r‚seau localÿ:

   Statut du m‚dia. . . . . . . . . . . . : M‚dia d‚connect‚
   Suffixe DNS propre … la connexion. . . :
   Description. . . . . . . . . . . . . . : TAP-Windows Adapter V9
   Adresse physique . . . . . . . . . . . :
   DHCP activ‚. . . . . . . . . . . . . . : Oui
   Configuration automatique activ‚e. . . : Oui

Edited ... by OpenSourcerer
Apply LOG format to system report

Share this post


Link to post
7 minutes ago, toup said:

Sorry my understanding o f english isn't perfect, i'll do my best :


I see. I will try to use easier words. :)

Check Mr. Stacula's answer above first. If they are not empty, disable the checking. NetLock is enabled, so it shouldn't be a problem:
 
7 minutes ago, toup said:

Network Lock Active: Yes, Windows Filtering Platform


In Eddie Preferences > DNS, uncheck Check AirVPN DNS. Try to connect again.

You can then check your DNS with IPLeak or some other service. If only the AirVPN server shows up in the DNS section, you're good. :)

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...