GraveBride 1 Posted ... I just paid for this VPN on a recommendation after some issues with the last one I was using, but I'm unable to connect to any server because I always get stuck on Checking route IPv4 for a while before it fails and tries to connect to a new server before inevitably running into the same issue. I've seen from searching that I've far from the only person to encounter this problem, but even after reading several threads I've failed to really find a solution to this problem that actually works for me. I've never had a problem like this with any other VPN I've tried so I'm at a bit of a loss right now. I 2023.10.28 03:47:23 - Session starting. I 2023.10.28 03:47:23 - Checking authorization ... . 2023.10.28 03:47:24 - Added new network interface "Eddie", Wintun version 0.12 . 2023.10.28 03:47:24 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.10.28 03:47:24 - Connecting to Kang (United States of America, Miami) . 2023.10.28 03:47:24 - Routes, add 104.129.48.69/32 for interface "Wi-Fi (Realtek RTL8852BE WiFi 6 802.11ax PCIe Adapter)". . 2023.10.28 03:47:24 - Routes, add 104.129.48.69/32 for interface "Wi-Fi (Realtek RTL8852BE WiFi 6 802.11ax PCIe Adapter)", already exists. . 2023.10.28 03:47:25 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.10.28 03:47:25 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.10.28 03:47:25 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.10.28 03:47:25 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.10.28 03:47:25 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.10.28 03:47:25 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.10.28 03:47:25 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.10.28 03:47:25 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.129.48.69:443 . 2023.10.28 03:47:25 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.10.28 03:47:25 - OpenVPN > UDP link local: (not bound) . 2023.10.28 03:47:25 - OpenVPN > UDP link remote: [AF_INET]104.129.48.69:443 . 2023.10.28 03:47:25 - OpenVPN > TLS: Initial packet from [AF_INET]104.129.48.69:443, sid=3ff692df 9427b1af . 2023.10.28 03:47:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.28 03:47:25 - OpenVPN > VERIFY KU OK . 2023.10.28 03:47:25 - OpenVPN > Validating certificate extended key usage . 2023.10.28 03:47:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.28 03:47:25 - OpenVPN > VERIFY EKU OK . 2023.10.28 03:47:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kang, emailAddress=info@airvpn.org . 2023.10.28 03:47:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.28 03:47:25 - OpenVPN > [Kang] Peer Connection Initiated with [AF_INET]104.129.48.69:443 . 2023.10.28 03:47:25 - OpenVPN > SENT CONTROL [Kang]: 'PUSH_REQUEST' (status=1) . 2023.10.28 03:47:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.138.1,dhcp-option DNS6 fde6:7a:7d20:1c8a::1,tun-ipv6,route-gateway 10.32.138.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1c8a::107c/64 fde6:7a:7d20:1c8a::1,ifconfig 10.32.138.126 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.10.28 03:47:25 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.10.28 03:47:25 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.32.138.1' . 2023.10.28 03:47:25 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1c8a::1' . 2023.10.28 03:47:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.10.28 03:47:25 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.10.28 03:47:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.10.28 03:47:25 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.10.28 03:47:25 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.10.28 03:47:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.10.28 03:47:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.10.28 03:47:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.10.28 03:47:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.10.28 03:47:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.10.28 03:47:25 - OpenVPN > interactive service msg_channel=0 . 2023.10.28 03:47:25 - OpenVPN > open_tun . 2023.10.28 03:47:25 - OpenVPN > wintun device [Eddie] opened . 2023.10.28 03:47:25 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 42 static 10.32.138.126 255.255.255.0 . 2023.10.28 03:47:25 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 42 all . 2023.10.28 03:47:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 42 all . 2023.10.28 03:47:26 - OpenVPN > IPv4 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.10.28 03:47:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 42 fde6:7a:7d20:1c8a::107c/128 store=active . 2023.10.28 03:47:26 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1c8a::/64 -> fde6:7a:7d20:1c8a::107c metric 0) dev Eddie . 2023.10.28 03:47:26 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1c8a::/64 42 fe80::8 store=active . 2023.10.28 03:47:26 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.10.28 03:47:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 42 all . 2023.10.28 03:47:26 - OpenVPN > IPv6 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.10.28 03:47:26 - OpenVPN > Initialization Sequence Completed . 2023.10.28 03:47:26 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.10.28 03:47:26 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.10.28 03:47:26 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.32.138.1) . 2023.10.28 03:47:26 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1c8a::1) . 2023.10.28 03:47:26 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.32.138.1) . 2023.10.28 03:47:26 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1c8a::1) . 2023.10.28 03:47:26 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:47:26 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:47:26 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:47:26 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:47:27 - Routes, add 104.129.48.67/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:47:27 - Routes, add 2607:ff48:aa81:202:5b4:b37f:fc76:1b1f/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:47:27 - Flushing DNS I 2023.10.28 03:47:27 - Checking route IPv4 . 2023.10.28 03:47:54 - Checking route (4° try) . 2023.10.28 03:48:19 - Checking route (5° try) E 2023.10.28 03:48:40 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2023.10.28 03:48:40 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.10.28 03:48:40 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.10.28 03:48:40 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.10.28 03:48:40 - Above log line repeated 77 times more ! 2023.10.28 03:48:40 - Disconnecting . 2023.10.28 03:48:40 - Sending soft termination signal . 2023.10.28 03:48:43 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.10.28 03:48:45 - OpenVPN > Closing TUN/TAP interface . 2023.10.28 03:48:45 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1c8a::/64) . 2023.10.28 03:48:45 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1c8a::/64 42 fe80::8 store=active . 2023.10.28 03:48:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 42 fde6:7a:7d20:1c8a::107c store=active . 2023.10.28 03:48:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 42 10.32.138.126 store=active . 2023.10.28 03:48:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.10.28 03:48:45 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:48:45 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:48:46 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:48:46 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:48:46 - Routes, delete 104.129.48.69/32 for interface "Wi-Fi (Realtek RTL8852BE WiFi 6 802.11ax PCIe Adapter)". . 2023.10.28 03:48:46 - Routes, delete 104.129.48.67/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:48:46 - Routes, delete 2607:ff48:aa81:202:5b4:b37f:fc76:1b1f/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:48:46 - Routes, delete 104.129.48.69/32 for interface "Wi-Fi (Realtek RTL8852BE WiFi 6 802.11ax PCIe Adapter)", not exists. . 2023.10.28 03:48:46 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.10.28 03:48:46 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.10.28 03:48:46 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.10.28 03:48:46 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.10.28 03:48:46 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.10.28 03:48:46 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.10.28 03:48:46 - Connection terminated. I 2023.10.28 03:48:47 - Cancel requested. ! 2023.10.28 03:48:48 - Session terminated. 1 Salvy reacted to this Quote Share this post Link to post
Staff 9969 Posted ... Hello! From here: E 2023.10.28 03:48:40 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2023.10.28 03:48:40 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.10.28 03:48:40 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.10.28 03:48:40 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.10.28 03:48:40 - Above log line repeated 77 times more it's plausible that UDP is blocked. Please make sure that no packet filtering tool in the router blocks UDP. If the problem persists, please try a connection in TCP (OpenVPN, protocol TCP, entry-IP addtress 3, port 443) and check what happens. You can change connection mode in Eddie's "Preferences" > "Protocols" window. Uncheck "Automatic", select the line with the mentioned connection mode (the line will be highlighted), click "Save" and test again connections. Kind regards 1 thekvpn reacted to this Quote Share this post Link to post
d4jj4l 0 Posted ... I was having the same problem. I tried manually setting the port to one that said TCP and that fixed it! Quote Share this post Link to post
GreatGrey 0 Posted ... A switch to Windows 11 and the problems started. This being the main one. The attempts at switching to Wireguard all failed. This one worked. Perfectly. Thank you. Quote Share this post Link to post