gunnarspunk 0 Posted ... hey im very new to all of this but this is the log . 2023.09.02 11:53:22 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.22621.0, Mono/.Net: v4.0.30319 . 2023.09.02 11:53:22 - Command line arguments (1): path="home" . 2023.09.02 11:53:24 - Reading options from C:\Users\gunna\AppData\Local\Eddie\default.profile . 2023.09.02 11:53:26 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2023.09.02 11:53:26 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2023.09.02 11:53:26 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2023.09.02 11:53:27 - Ready . 2023.09.02 11:53:28 - Collect information about AirVPN completed I 2023.09.02 11:53:38 - Checking login ... ! 2023.09.02 11:53:39 - Logged in. I 2023.09.02 11:53:40 - Session starting. I 2023.09.02 11:53:43 - Checking authorization ... . 2023.09.02 11:53:43 - Using WinTun network interface "Local Area Connection (OpenVPN Data Channel Offload)" ! 2023.09.02 11:53:43 - Connecting to Lich (United States of America, New York City) . 2023.09.02 11:53:44 - Routes, add 194.36.111.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.09.02 11:53:44 - Routes, add 194.36.111.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.09.02 11:53:44 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.09.02 11:53:44 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.09.02 11:53:44 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.09.02 11:53:44 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.02 11:53:44 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.02 11:53:44 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.02 11:53:44 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.02 11:53:44 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]194.36.111.61:443 . 2023.09.02 11:53:44 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2023.09.02 11:53:44 - OpenVPN > UDP link local: (not bound) . 2023.09.02 11:53:44 - OpenVPN > UDP link remote: [AF_INET]194.36.111.61:443 . 2023.09.02 11:53:44 - OpenVPN > TLS: Initial packet from [AF_INET]194.36.111.61:443, sid=042d3ec3 c3a6bf4f . 2023.09.02 11:53:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.09.02 11:53:44 - OpenVPN > VERIFY KU OK . 2023.09.02 11:53:44 - OpenVPN > Validating certificate extended key usage . 2023.09.02 11:53:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.02 11:53:44 - OpenVPN > VERIFY EKU OK . 2023.09.02 11:53:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lich, emailAddress=info@airvpn.org . 2023.09.02 11:53:44 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.02 11:53:44 - OpenVPN > [Lich] Peer Connection Initiated with [AF_INET]194.36.111.61:443 . 2023.09.02 11:53:44 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.17.30.1,dhcp-option DNS6 fde6:7a:7d20:d1e::1,tun-ipv6,route-gateway 10.17.30.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:d1e::1091/64 fde6:7a:7d20:d1e::1,ifconfig 10.17.30.147 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.09.02 11:53:44 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.09.02 11:53:44 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.17.30.1' . 2023.09.02 11:53:44 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:d1e::1' . 2023.09.02 11:53:44 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.09.02 11:53:44 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.09.02 11:53:44 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.09.02 11:53:44 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.09.02 11:53:44 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.09.02 11:53:44 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.09.02 11:53:44 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.09.02 11:53:44 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.09.02 11:53:44 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.02 11:53:44 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.02 11:53:44 - OpenVPN > interactive service msg_channel=0 . 2023.09.02 11:53:44 - OpenVPN > open_tun . 2023.09.02 11:53:44 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.09.02 11:53:44 - OpenVPN > Exiting due to fatal error ! 2023.09.02 11:53:44 - Disconnecting . 2023.09.02 11:53:45 - Routes, delete 194.36.111.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.09.02 11:53:45 - Routes, delete 194.36.111.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.09.02 11:53:45 - Connection terminated. I 2023.09.02 11:53:48 - Checking authorization ... . 2023.09.02 11:53:48 - Using WinTun network interface "Local Area Connection (OpenVPN Data Channel Offload)" ! 2023.09.02 11:53:48 - Connecting to Lich (United States of America, New York City) . 2023.09.02 11:53:49 - Routes, add 194.36.111.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.09.02 11:53:49 - Routes, add 194.36.111.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.09.02 11:53:49 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.09.02 11:53:49 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.09.02 11:53:49 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.09.02 11:53:49 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.02 11:53:49 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.02 11:53:49 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.02 11:53:49 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.02 11:53:49 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]194.36.111.61:443 . 2023.09.02 11:53:49 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2023.09.02 11:53:49 - OpenVPN > UDP link local: (not bound) . 2023.09.02 11:53:49 - OpenVPN > UDP link remote: [AF_INET]194.36.111.61:443 . 2023.09.02 11:53:49 - OpenVPN > TLS: Initial packet from [AF_INET]194.36.111.61:443, sid=f44854cf c13544b3 . 2023.09.02 11:53:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.09.02 11:53:49 - OpenVPN > VERIFY KU OK . 2023.09.02 11:53:49 - OpenVPN > Validating certificate extended key usage . 2023.09.02 11:53:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.02 11:53:49 - OpenVPN > VERIFY EKU OK . 2023.09.02 11:53:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lich, emailAddress=info@airvpn.org . 2023.09.02 11:53:49 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.02 11:53:49 - OpenVPN > [Lich] Peer Connection Initiated with [AF_INET]194.36.111.61:443 . 2023.09.02 11:53:50 - OpenVPN > SENT CONTROL [Lich]: 'PUSH_REQUEST' (status=1) . 2023.09.02 11:53:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.17.30.1,dhcp-option DNS6 fde6:7a:7d20:d1e::1,tun-ipv6,route-gateway 10.17.30.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:d1e::1091/64 fde6:7a:7d20:d1e::1,ifconfig 10.17.30.147 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2023.09.02 11:53:50 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.09.02 11:53:50 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.17.30.1' . 2023.09.02 11:53:50 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:d1e::1' . 2023.09.02 11:53:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.09.02 11:53:50 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.09.02 11:53:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.09.02 11:53:50 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.09.02 11:53:50 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.09.02 11:53:50 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.09.02 11:53:50 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.09.02 11:53:50 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.09.02 11:53:50 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.02 11:53:50 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.02 11:53:50 - OpenVPN > interactive service msg_channel=0 . 2023.09.02 11:53:50 - OpenVPN > open_tun . 2023.09.02 11:53:50 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.09.02 11:53:50 - OpenVPN > Exiting due to fatal error ! 2023.09.02 11:53:50 - Disconnecting . 2023.09.02 11:53:50 - Routes, delete 194.36.111.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.09.02 11:53:50 - Routes, delete 194.36.111.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.09.02 11:53:50 - Connection terminated. I 2023.09.02 11:53:54 - Checking authorization ... . 2023.09.02 11:53:54 - Using WinTun network interface "Local Area Connection (OpenVPN Data Channel Offload)" ! 2023.09.02 11:53:54 - Connecting to Lich (United States of America, New York City) . 2023.09.02 11:53:55 - Routes, add 194.36.111.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.09.02 11:53:55 - Routes, add 194.36.111.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", already exists. . 2023.09.02 11:53:55 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.09.02 11:53:55 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.09.02 11:53:55 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.09.02 11:53:55 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.02 11:53:55 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.02 11:53:55 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.09.02 11:53:55 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.09.02 11:53:55 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]194.36.111.61:443 . 2023.09.02 11:53:55 - OpenVPN > Socket Buffers: R=[65536->262144] S=[64512->262144] . 2023.09.02 11:53:55 - OpenVPN > UDP link local: (not bound) . 2023.09.02 11:53:55 - OpenVPN > UDP link remote: [AF_INET]194.36.111.61:443 . 2023.09.02 11:53:55 - OpenVPN > TLS: Initial packet from [AF_INET]194.36.111.61:443, sid=b05128a2 1d4591d8 . 2023.09.02 11:53:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.09.02 11:53:55 - OpenVPN > VERIFY KU OK . 2023.09.02 11:53:55 - OpenVPN > Validating certificate extended key usage . 2023.09.02 11:53:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.09.02 11:53:55 - OpenVPN > VERIFY EKU OK . 2023.09.02 11:53:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lich, emailAddress=info@airvpn.org . 2023.09.02 11:53:55 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.09.02 11:53:55 - OpenVPN > [Lich] Peer Connection Initiated with [AF_INET]194.36.111.61:443 ! 2023.09.02 11:53:56 - Disconnecting . 2023.09.02 11:53:56 - Sending soft termination signal . 2023.09.02 11:53:59 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.09.02 11:53:59 - OpenVPN > SENT CONTROL [Lich]: 'PUSH_REQUEST' (status=1) . 2023.09.02 11:53:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.17.30.1,dhcp-option DNS6 fde6:7a:7d20:d1e::1,tun-ipv6,route-gateway 10.17.30.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:d1e::1091/64 fde6:7a:7d20:d1e::1,ifconfig 10.17.30.147 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.09.02 11:53:59 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.09.02 11:53:59 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.17.30.1' . 2023.09.02 11:53:59 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:d1e::1' . 2023.09.02 11:53:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.09.02 11:53:59 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.09.02 11:53:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.09.02 11:53:59 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.09.02 11:53:59 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.09.02 11:53:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.09.02 11:53:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.09.02 11:53:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.09.02 11:53:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.02 11:53:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.09.02 11:53:59 - OpenVPN > interactive service msg_channel=0 . 2023.09.02 11:53:59 - OpenVPN > open_tun . 2023.09.02 11:53:59 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.09.02 11:53:59 - OpenVPN > Exiting due to fatal error . 2023.09.02 11:53:59 - Routes, delete 194.36.111.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)". . 2023.09.02 11:53:59 - Routes, delete 194.36.111.61/32 for interface "Ethernet (Realtek PCIe GbE Family Controller)", not exists. . 2023.09.02 11:53:59 - Connection terminated. I 2023.09.02 11:53:59 - Cancel requested. ! 2023.09.02 11:53:59 - Session terminated. Share this post Link to post
Staff 9973 Posted ... Hello! The problem: Quote . 2023.09.02 11:53:43 - Using WinTun network interface "Local Area Connection (OpenVPN Data Channel Offload)" ... . 2023.09.02 11:53:44 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 ... . 2023.09.02 11:53:44 - OpenVPN > open_tun . 2023.09.02 11:53:44 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2023.09.02 11:53:44 - OpenVPN > Exiting due to fatal error DCO can be used only by OpenVPN 2.6 (or higher version), it is not supported by 2.5.5, the OpenVPN version launched by Eddie in your case. Quickly solve the problem by telling Eddie to create its own interface and ignore DCO: from Eddie's main window select "Preferences" > "Networking" type eddie in the "VPN interface name" field click "Save" Alternatively you can configure Eddie to run OpenVPN 2.6 with DCO but at the moment DCO is highly experimental so if you want a stable environment just don't use DCO at the moment. If you want a VPN software working mainly in the kernel space then please consider WireGuard, as at this stage it's definitely more stable than OpenVPN with DCO. To switch to WireGuard via Eddie (you can then go back to OpenVPN anytime of course): from Eddie's main window select "Preferences" > "Protocols" uncheck "Automatic" select a line with WireGuard. The line will be highlighted click "Save" Kind regards 2 poseidolginko and jason.reeve@protonmail.com reacted to this Share this post Link to post