OpenSourcerer 1441 Posted ... Close and reopen Eddie, try a connection, then: Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
toup 0 Posted ... (edited) here is the log : . 2023.03.05 12:34:41 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.19044.0, Mono/.Net: v4.0.30319 . 2023.03.05 12:34:43 - Reading options from C:\Program Files\AirVPN\default.profile . 2023.03.05 12:34:43 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2023.03.05 12:34:43 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2023.03.05 12:34:43 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2023.03.05 12:34:43 - Ready . 2023.03.05 12:34:44 - Collect information about AirVPN completed I 2023.03.05 12:34:58 - Session starting. I 2023.03.05 12:34:58 - Checking authorization ... . 2023.03.05 12:34:59 - Added new network interface "Eddie", Wintun version 0.12 . 2023.03.05 12:34:59 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2023.03.05 12:34:59 - IPv6 disabled with packet filtering. ! 2023.03.05 12:34:59 - Connecting to Meissa (Latvia, Riga) . 2023.03.05 12:34:59 - Routes, add 109.248.148.197/32 for interface "Ethernet (Realtek PCIe 2.5GbE Family Controller)". . 2023.03.05 12:34:59 - Routes, add 109.248.148.197/32 for interface "Ethernet (Realtek PCIe 2.5GbE Family Controller)", already exists. . 2023.03.05 12:34:59 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.03.05 12:34:59 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.03.05 12:34:59 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.03.05 12:34:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.05 12:34:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.05 12:34:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.05 12:34:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.05 12:34:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.248.148.197:443 . 2023.03.05 12:34:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.03.05 12:34:59 - OpenVPN > UDP link local: (not bound) . 2023.03.05 12:34:59 - OpenVPN > UDP link remote: [AF_INET]109.248.148.197:443 . 2023.03.05 12:34:59 - OpenVPN > TLS: Initial packet from [AF_INET]109.248.148.197:443, sid=4d88b5da 677b034e . 2023.03.05 12:34:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.03.05 12:34:59 - OpenVPN > VERIFY KU OK . 2023.03.05 12:34:59 - OpenVPN > Validating certificate extended key usage . 2023.03.05 12:34:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.03.05 12:34:59 - OpenVPN > VERIFY EKU OK . 2023.03.05 12:34:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Meissa, emailAddress=info@airvpn.org . 2023.03.05 12:34:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.03.05 12:34:59 - OpenVPN > [Meissa] Peer Connection Initiated with [AF_INET]109.248.148.197:443 . 2023.03.05 12:34:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.21.162.1,dhcp-option DNS6 fde6:7a:7d20:11a2::1,tun-ipv6,route-gateway 10.21.162.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:11a2::106c/64 fde6:7a:7d20:11a2::1,ifconfig 10.21.162.110 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2023.03.05 12:34:59 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.03.05 12:34:59 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.21.162.1' . 2023.03.05 12:34:59 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:11a2::1' . 2023.03.05 12:34:59 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2023.03.05 12:34:59 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:11a2::106c/64 fde6:7a:7d20:11a2::1' . 2023.03.05 12:34:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.03.05 12:34:59 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.03.05 12:34:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.03.05 12:34:59 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.03.05 12:34:59 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.03.05 12:34:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.03.05 12:34:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.03.05 12:34:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.03.05 12:34:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.05 12:34:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.05 12:34:59 - OpenVPN > interactive service msg_channel=0 . 2023.03.05 12:34:59 - OpenVPN > open_tun . 2023.03.05 12:34:59 - OpenVPN > wintun device [Eddie] opened . 2023.03.05 12:34:59 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address 35 static 10.21.162.110 255.255.255.0 . 2023.03.05 12:34:59 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip delete dns 35 all . 2023.03.05 12:34:59 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip delete wins 35 all . 2023.03.05 12:34:59 - OpenVPN > IPv4 MTU set to 1500 on interface 35 using SetIpInterfaceEntry() . 2023.03.05 12:34:59 - OpenVPN > Initialization Sequence Completed . 2023.03.05 12:34:59 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.03.05 12:34:59 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.03.05 12:34:59 - DNS leak protection with packet filtering enabled. . 2023.03.05 12:35:00 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.21.162.1) . 2023.03.05 12:35:00 - DNS IPv4 of a network adapter forced (Ethernet, from manual (1.1.1.1, 1.0.0.1) to 10.21.162.1) . 2023.03.05 12:35:00 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.05 12:35:00 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.05 12:35:00 - Routes, add 109.248.148.195/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.05 12:35:00 - Routes, skipped for 2a02:4840:2:238:6de5:948f:73f4:e625 : IPv6 blocked. . 2023.03.05 12:35:00 - Flushing DNS I 2023.03.05 12:35:00 - Checking route IPv4 I 2023.03.05 12:35:04 - Checking DNS . 2023.03.05 12:35:47 - Checking DNS (4° try) . 2023.03.05 12:36:03 - Checking DNS (5° try) E 2023.03.05 12:36:15 - Checking DNS failed, last reason: Checking DNS failed: ! 2023.03.05 12:36:15 - Disconnecting . 2023.03.05 12:36:15 - Sending soft termination signal . 2023.03.05 12:36:18 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.03.05 12:36:20 - OpenVPN > Closing TUN/TAP interface . 2023.03.05 12:36:20 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv4 delete address 35 10.21.162.110 store=active . 2023.03.05 12:36:21 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.03.05 12:36:21 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.05 12:36:21 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.05 12:36:21 - Routes, delete 109.248.148.197/32 for interface "Ethernet (Realtek PCIe 2.5GbE Family Controller)". . 2023.03.05 12:36:21 - Routes, delete 109.248.148.195/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.05 12:36:21 - Routes, skipped for 2a02:4840:2:238:6de5:948f:73f4:e625 : IPv6 blocked. . 2023.03.05 12:36:21 - Routes, delete 109.248.148.197/32 for interface "Ethernet (Realtek PCIe 2.5GbE Family Controller)", not exists. . 2023.03.05 12:36:21 - IPv6 restored with packet filtering. . 2023.03.05 12:36:21 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.03.05 12:36:21 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to 1.1.1.1, 1.0.0.1) . 2023.03.05 12:36:21 - DNS leak protection with packet filtering disabled. . 2023.03.05 12:36:21 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.03.05 12:36:21 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.03.05 12:36:21 - Connection terminated. I 2023.03.05 12:36:23 - Cancel requested. ! 2023.03.05 12:36:23 - Session terminated. Edited ... by OpenSourcerer Apply LOG format to logs Quote Share this post Link to post
OpenSourcerer 1441 Posted ... This won't do. I didn't ask for the logs. The reason a system report is necessary is because the configuration and various other info is printed with it, which can be used to troubleshoot this further. See, if Network Lock is enabled, DNS checking can be disabled, as your configured DNS servers are outside your local network. It'd serve as something of a fix. But I don't see NetLock being enabled in the logs you provided, so I may assume it's not enabled. To verify that, though, the system report is needed, as one of the lines in its output is whether NetLock is on or off. One of the reasons why the logs alone are not enough. So, please read carefully what is requested of you in the future. If this request is connected to a little bit of reading for you, then that's what it is. Can't do all the homework for you, now, can I? Thank you for your understanding. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
Luis-fer 0 Posted ... I had this issue as well. I had to reset my DNS through settings, They were either disabled or on manual but blank. After resetting and changing the DNS through settings-network-ethernet then the issue was quickly resolved. Quote Share this post Link to post
toup 0 Posted ... (edited) Sorry my understanding o f english isn't perfect, i'll do my best : Eddie System/Environment Report - 05/03/2023 - 13:26 UTC Eddie version: 2.21.8 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Pro OS version: Microsoft Windows NT 10.0.19044.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: Not available WireGuard: 0.5.2 SSH: plink 0.73 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Program Files\AirVPN\default.profile Data path: C:\Program Files\AirVPN Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (0 args) Network Lock Active: Yes, Windows Filtering Platform Connected to VPN: No OS support IPv4: Yes OS support IPv6: Yes Detected DNS: 1.1.1.1, 1.0.0.1, 2a01:cb19:975:400:a87:c6ff:fe52:bd30 Test DNS IPv4: Failed Test DNS IPv6: Failed Test Ping IPv4: 26 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: Fetch url error:Timeout was reached Test HTTPS: Error: Fetch url error:Couldn't resolve host name ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True key: (omissis) areas.allowlist: ro,ee,bg,be,cz,lv proxy.mode: none network.ipv6.mode: block network.ipv4.autoswitch: True ---------------------------- Logs: . 2023.03.05 14:24:07 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.19044.0, Mono/.Net: v4.0.30319 . 2023.03.05 14:24:08 - Reading options from C:\Program Files\AirVPN\default.profile . 2023.03.05 14:24:09 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2023.03.05 14:24:09 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2023.03.05 14:24:09 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2023.03.05 14:24:09 - Ready . 2023.03.05 14:24:10 - Collect information about AirVPN completed ! 2023.03.05 14:24:15 - Activation of Network Lock - Windows Filtering Platform I 2023.03.05 14:24:23 - Session starting. I 2023.03.05 14:24:23 - Checking authorization ... . 2023.03.05 14:24:26 - Added new network interface "Eddie", Wintun version 0.12 . 2023.03.05 14:24:26 - Using WinTun network interface "Eddie (Eddie Tunnel)" . 2023.03.05 14:24:26 - IPv6 disabled with packet filtering. ! 2023.03.05 14:24:26 - Connecting to Meissa (Latvia, Riga) . 2023.03.05 14:24:26 - Routes, add 109.248.148.197/32 for interface "Ethernet (Realtek PCIe 2.5GbE Family Controller)". . 2023.03.05 14:24:26 - Routes, add 109.248.148.197/32 for interface "Ethernet (Realtek PCIe 2.5GbE Family Controller)", already exists. . 2023.03.05 14:24:26 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.03.05 14:24:26 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.03.05 14:24:26 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.03.05 14:24:26 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.05 14:24:26 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.05 14:24:26 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.03.05 14:24:26 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.03.05 14:24:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.248.148.197:443 . 2023.03.05 14:24:26 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.03.05 14:24:26 - OpenVPN > UDP link local: (not bound) . 2023.03.05 14:24:26 - OpenVPN > UDP link remote: [AF_INET]109.248.148.197:443 . 2023.03.05 14:24:27 - OpenVPN > TLS: Initial packet from [AF_INET]109.248.148.197:443, sid=db2c4c5e 42612699 . 2023.03.05 14:24:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.03.05 14:24:27 - OpenVPN > VERIFY KU OK . 2023.03.05 14:24:27 - OpenVPN > Validating certificate extended key usage . 2023.03.05 14:24:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.03.05 14:24:27 - OpenVPN > VERIFY EKU OK . 2023.03.05 14:24:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Meissa, emailAddress=info@airvpn.org . 2023.03.05 14:24:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.03.05 14:24:27 - OpenVPN > [Meissa] Peer Connection Initiated with [AF_INET]109.248.148.197:443 . 2023.03.05 14:24:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.21.162.1,dhcp-option DNS6 fde6:7a:7d20:11a2::1,tun-ipv6,route-gateway 10.21.162.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:11a2::106c/64 fde6:7a:7d20:11a2::1,ifconfig 10.21.162.110 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.03.05 14:24:27 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.03.05 14:24:27 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.21.162.1' . 2023.03.05 14:24:27 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:11a2::1' . 2023.03.05 14:24:27 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2023.03.05 14:24:27 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:11a2::106c/64 fde6:7a:7d20:11a2::1' . 2023.03.05 14:24:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.03.05 14:24:27 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.03.05 14:24:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.03.05 14:24:27 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.03.05 14:24:27 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.03.05 14:24:27 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.03.05 14:24:27 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.03.05 14:24:27 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.03.05 14:24:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.05 14:24:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.03.05 14:24:27 - OpenVPN > interactive service msg_channel=0 . 2023.03.05 14:24:27 - OpenVPN > open_tun . 2023.03.05 14:24:27 - OpenVPN > wintun device [Eddie] opened . 2023.03.05 14:24:27 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address 35 static 10.21.162.110 255.255.255.0 . 2023.03.05 14:24:27 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip delete dns 35 all . 2023.03.05 14:24:28 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip delete wins 35 all . 2023.03.05 14:24:28 - OpenVPN > IPv4 MTU set to 1500 on interface 35 using SetIpInterfaceEntry() . 2023.03.05 14:24:28 - OpenVPN > Initialization Sequence Completed . 2023.03.05 14:24:28 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.03.05 14:24:28 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.03.05 14:24:28 - DNS leak protection with packet filtering enabled. . 2023.03.05 14:24:28 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.21.162.1) . 2023.03.05 14:24:28 - DNS IPv4 of a network adapter forced (Ethernet, from manual (1.1.1.1, 1.0.0.1) to 10.21.162.1) . 2023.03.05 14:24:28 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.05 14:24:28 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.05 14:24:28 - Routes, add 109.248.148.195/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.05 14:24:28 - Routes, skipped for 2a02:4840:2:238:6de5:948f:73f4:e625 : IPv6 blocked. . 2023.03.05 14:24:28 - Flushing DNS I 2023.03.05 14:24:28 - Checking route IPv4 I 2023.03.05 14:24:34 - Checking DNS . 2023.03.05 14:25:17 - Checking DNS (4° try) . 2023.03.05 14:25:33 - Checking DNS (5° try) E 2023.03.05 14:25:45 - Checking DNS failed, last reason: Checking DNS failed: ! 2023.03.05 14:25:45 - Disconnecting . 2023.03.05 14:25:45 - Sending soft termination signal . 2023.03.05 14:25:49 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.03.05 14:25:50 - OpenVPN > Closing TUN/TAP interface . 2023.03.05 14:25:50 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ipv4 delete address 35 10.21.162.110 store=active . 2023.03.05 14:25:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.03.05 14:25:51 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.05 14:25:51 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2023.03.05 14:25:51 - Routes, delete 109.248.148.197/32 for interface "Ethernet (Realtek PCIe 2.5GbE Family Controller)". . 2023.03.05 14:25:51 - Routes, delete 109.248.148.195/32 for interface "Eddie (Eddie Tunnel)". . 2023.03.05 14:25:51 - Routes, skipped for 2a02:4840:2:238:6de5:948f:73f4:e625 : IPv6 blocked. . 2023.03.05 14:25:51 - Routes, delete 109.248.148.197/32 for interface "Ethernet (Realtek PCIe 2.5GbE Family Controller)", not exists. . 2023.03.05 14:25:51 - IPv6 restored with packet filtering. . 2023.03.05 14:25:51 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.03.05 14:25:51 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to 1.1.1.1, 1.0.0.1) . 2023.03.05 14:25:51 - DNS leak protection with packet filtering disabled. . 2023.03.05 14:25:51 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.03.05 14:25:51 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.03.05 14:25:51 - Connection terminated. I 2023.03.05 14:25:52 - Cancel requested. ! 2023.03.05 14:25:52 - Session terminated. ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/0", "gateway": "192.168.1.1", "interface_index": 4, "metric": 0, "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}" }, { "destination": "127.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{FC23185C-4A45-11EC-8282-806E6F6E6963}" }, { "destination": "127.0.0.1\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{FC23185C-4A45-11EC-8282-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{FC23185C-4A45-11EC-8282-806E6F6E6963}" }, { "destination": "192.168.1.0\/24", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}" }, { "destination": "192.168.1.16\/32", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}" }, { "destination": "192.168.1.255\/32", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{FC23185C-4A45-11EC-8282-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 15, "metric": 256, "interface": "{DF6A64C7-7CF9-4ED3-88B3-262450D0DB39}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{FC23185C-4A45-11EC-8282-806E6F6E6963}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 15, "metric": 256, "interface": "{DF6A64C7-7CF9-4ED3-88B3-262450D0DB39}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}" }, { "destination": "::\/0", "gateway": "fe80::a87:c6ff:fe52:bd30", "interface_index": 4, "metric": 16, "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}" }, { "destination": "::1\/128", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{FC23185C-4A45-11EC-8282-806E6F6E6963}" }, { "destination": "2a01:cb19:975:400::\/64", "gateway": "::", "interface_index": 4, "metric": 16, "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}" }, { "destination": "2a01:cb19:975:400:1d79:a9cc:b5e6:e398\/128", "gateway": "::", "interface_index": 4, "metric": 256, "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}" }, { "destination": "2a02:4840:2:237:b0bd:6f2c:c975:5bf0\/128", "gateway": "fde6:7a:7d20:16ae::1", "interface_index": 15, "metric": 256, "interface": "{DF6A64C7-7CF9-4ED3-88B3-262450D0DB39}" }, { "destination": "2a04:9dc0:c1:53:bb5c:c0f8:c89:e06c\/128", "gateway": "fde6:7a:7d20:11e::1", "interface_index": 15, "metric": 256, "interface": "{DF6A64C7-7CF9-4ED3-88B3-262450D0DB39}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 15, "metric": 256, "interface": "{DF6A64C7-7CF9-4ED3-88B3-262450D0DB39}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 4, "metric": 256, "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}" }, { "destination": "fe80::38f9:d494:7c44:f8bb\/128", "gateway": "::", "interface_index": 15, "metric": 256, "interface": "{DF6A64C7-7CF9-4ED3-88B3-262450D0DB39}" }, { "destination": "fe80::cd2a:617d:54ee:1a1b\/128", "gateway": "::", "interface_index": 4, "metric": 256, "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{FC23185C-4A45-11EC-8282-806E6F6E6963}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 15, "metric": 256, "interface": "{DF6A64C7-7CF9-4ED3-88B3-262450D0DB39}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 4, "metric": 256, "interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}" } ], "ipv4-default-gateway": "192.168.1.1", "ipv4-default-interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}", "ipv6-default-gateway": "fe80::a87:c6ff:fe52:bd30", "ipv6-default-interface": "{1C580432-DE36-456F-86DB-64EDAED0488C}", "interfaces": [ { "friendly": "Ethernet", "id": "{1C580432-DE36-456F-86DB-64EDAED0488C}", "name": "Ethernet", "description": "Realtek PCIe 2.5GbE Family Controller", "type": "Ethernet", "status": "Up", "bytes_received": "101099309", "bytes_sent": "9377662", "support_ipv4": true, "support_ipv6": true, "ips": [ "2a01:cb19:975:400:1d79:a9cc:b5e6:e398", "fe80::cd2a:617d:54ee:1a1b", "192.168.1.16" ], "bind": true, "dns4": "1.1.1.1,1.0.0.1", "dns6": null }, { "friendly": "Connexion au r\u00e9seau local", "id": "{DF6A64C7-7CF9-4ED3-88B3-262450D0DB39}", "name": "Connexion au r\u00e9seau local", "description": "TAP-Windows Adapter V9", "type": "Virtual", "status": "Down", "bytes_received": "5398395", "bytes_sent": "696288", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::38f9:d494:7c44:f8bb", "169.254.39.234" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{FC23185C-4A45-11EC-8282-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "bind": true, "dns4": null, "dns6": null } ] } ---------------------------- ipconfig /all: Configuration IP de Windows Nom de l'h“te . . . . . . . . . . : Win10Pro Suffixe DNS principal . . . . . . : Type de noeud. . . . . . . . . . : Hybride Routage IP activ‚ . . . . . . . . : Non Proxy WINS activ‚ . . . . . . . . : Non Liste de recherche du suffixe DNS.: home Carte Ethernet Ethernet : Suffixe DNS propre … la connexion. . . : home Description. . . . . . . . . . . . . . : Realtek PCIe 2.5GbE Family Controller Adresse physique . . . . . . . . . . . : DHCP activ‚. . . . . . . . . . . . . . : Oui Configuration automatique activ‚e. . . : Oui Adresse IPv6. . . . . . . . . . .ÿ. . .: 2a01:cb19:975:400:1d79:a9cc:b5e6:e398(pr‚f‚r‚) Adresse IPv6 de liaison locale. . . . .: fe80::cd2a:617d:54ee:1a1b%4(pr‚f‚r‚) Adresse IPv4. . . . . . . . . . . . . .: 192.168.1.16(pr‚f‚r‚) Masque de sous-r‚seau. . . .ÿ. . . . . : 255.255.255.0 Bail obtenu. . . . . . . . .ÿ. . . . . : dimanche 5 mars 2023 11:11:43 Bail expirant. . . . . . . . .ÿ. . . . : lundi 6 mars 2023 12:00:32 Passerelle par d‚faut. . . .ÿ. . . . . : fe80::a87:c6ff:fe52:bd30%4 192.168.1.1 Serveur DHCP . . . . . . . . . . . . . : 192.168.1.1 IAID DHCPv6 . . . . . . . . . . . : 217855127 DUID de client DHCPv6. . . . . . . . : 00-01-00-01-29-37-03-AB-FC-34-97-9E-E7-6E Serveurs DNS. . . . . . . . . . . . . : 1.1.1.1 1.0.0.1 2a01:cb19:975:400:a87:c6ff:fe52:bd30 NetBIOS sur Tcpip. . . . . . . . . . . : Activ‚ Liste de recherche de suffixesÿDNS propres … la connexionÿ: home Carte inconnue Connexion au r‚seau localÿ: Statut du m‚dia. . . . . . . . . . . . : M‚dia d‚connect‚ Suffixe DNS propre … la connexion. . . : Description. . . . . . . . . . . . . . : TAP-Windows Adapter V9 Adresse physique . . . . . . . . . . . : DHCP activ‚. . . . . . . . . . . . . . : Oui Configuration automatique activ‚e. . . : Oui Edited ... by OpenSourcerer Apply LOG format to system report Quote Share this post Link to post
OpenSourcerer 1441 Posted ... 7 minutes ago, toup said: Sorry my understanding o f english isn't perfect, i'll do my best : I see. I will try to use easier words. Check Mr. Stacula's answer above first. If they are not empty, disable the checking. NetLock is enabled, so it shouldn't be a problem: 7 minutes ago, toup said: Network Lock Active: Yes, Windows Filtering Platform In Eddie Preferences > DNS, uncheck Check AirVPN DNS. Try to connect again. You can then check your DNS with IPLeak or some other service. If only the AirVPN server shows up in the DNS section, you're good. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post