Jump to content
Not connected, Your IP: 13.59.36.203
Sign in to follow this  
zaphod323

[SOLVED] DNS leak other than Comodo

Recommended Posts

It won't let me browse to airvpn.org.

Hello!

Here you're probably wrong, because you wrote your message while connected to the VPN.

My dos prompt stuff is attached.

It shows that you have connectivity inside the VPN but your computer can't resolve names. You can only browse to airvpn.org because it's in the hosts file and does not need DNS resolution. It is a DNS issue. Can you please try to change DNS on your physical interface and set 10.4.0.1 as primary (preferred) DNS IP address?

I attached the client logs in the previous message, if the client logs are the output from COmodo.

Please right-click on the Air dock icon when you're connected to the VPN, select "Logs", click "Copy to clipboard" and paste in a message.

Kind regards

Share this post


Link to post

12/5/2012 - 5:32 PM AirVPN client version: 1.7

12/5/2012 - 5:32 PM Reading options from C:\Users\madglee\AppData\Roaming\AirVPN\Air\1.0.0.0\AirVPN.xml

12/5/2012 - 5:32 PM OpenVPN bundle version: OpenVPN 2.2.2

12/5/2012 - 5:32 PM OpenVPN current version: OpenVPN 2.2.2

12/5/2012 - 5:32 PM Ready.

12/5/2012 - 5:33 PM Login...

12/5/2012 - 5:33 PM Login success.

12/5/2012 - 5:33 PM Contacting service...

12/5/2012 - 5:33 PM Connecting...

12/5/2012 - 5:33 PM OpenVPN 2.2.2 Win32-MSVC++ [sSL] [LZO2] [PKCS11] built on Dec 15 2011

12/5/2012 - 5:33 PM NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

12/5/2012 - 5:33 PM LZO compression initialized

12/5/2012 - 5:33 PM Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]

12/5/2012 - 5:33 PM Socket Buffers: R=[8192->8192] S=[8192->8192]

12/5/2012 - 5:33 PM Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]

12/5/2012 - 5:33 PM Local Options hash (VER=V4): '22188c5b'

12/5/2012 - 5:33 PM Expected Remote Options hash (VER=V4): 'a8f55717'

12/5/2012 - 5:33 PM UDPv4 link local: [undef]

12/5/2012 - 5:33 PM UDPv4 link remote: 69.163.36.106:443

12/5/2012 - 5:33 PM TLS: Initial packet from 69.163.36.106:443, sid=4855cff8 f1d82094

12/5/2012 - 5:33 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

12/5/2012 - 5:33 PM VERIFY OK: nsCertType=SERVER

12/5/2012 - 5:33 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

12/5/2012 - 5:33 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

12/5/2012 - 5:33 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

12/5/2012 - 5:33 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

12/5/2012 - 5:33 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

12/5/2012 - 5:33 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

12/5/2012 - 5:33 PM [server] Peer Connection Initiated with 69.163.36.106:443

12/5/2012 - 5:33 PM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

12/5/2012 - 5:33 PM PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.3.118 10.4.3.117'

12/5/2012 - 5:33 PM OPTIONS IMPORT: timers and/or timeouts modified

12/5/2012 - 5:33 PM OPTIONS IMPORT: LZO parms modified

12/5/2012 - 5:33 PM OPTIONS IMPORT: --ifconfig/up options modified

12/5/2012 - 5:33 PM OPTIONS IMPORT: route options modified

12/5/2012 - 5:33 PM OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

12/5/2012 - 5:33 PM ROUTE default_gateway=192.168.1.1

12/5/2012 - 5:33 PM TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{A4B902C7-C304-48AF-A43B-D012D4E536DE}.tap

12/5/2012 - 5:33 PM TAP-Win32 Driver Version 9.9

12/5/2012 - 5:33 PM TAP-Win32 MTU=1500

12/5/2012 - 5:33 PM Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.4.3.118/255.255.255.252 on interface {A4B902C7-C304-48AF-A43B-D012D4E536DE} [DHCP-serv: 10.4.3.117, lease-time: 31536000]

12/5/2012 - 5:33 PM Successful ARP Flush on interface [16] {A4B902C7-C304-48AF-A43B-D012D4E536DE}

12/5/2012 - 5:33 PM TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

12/5/2012 - 5:33 PM C:\WINDOWS\system32\route.exe ADD 69.163.36.106 MASK 255.255.255.255 192.168.1.1

12/5/2012 - 5:33 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4

12/5/2012 - 5:33 PM Route addition via IPAPI succeeded [adaptive]

12/5/2012 - 5:33 PM C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.3.117

12/5/2012 - 5:33 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

12/5/2012 - 5:33 PM Route addition via IPAPI succeeded [adaptive]

12/5/2012 - 5:33 PM C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.3.117

12/5/2012 - 5:33 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

12/5/2012 - 5:33 PM Route addition via IPAPI succeeded [adaptive]

12/5/2012 - 5:33 PM C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.3.117

12/5/2012 - 5:33 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

12/5/2012 - 5:33 PM Route addition via IPAPI succeeded [adaptive]

12/5/2012 - 5:33 PM Initialization Sequence Completed

12/5/2012 - 5:33 PM Starting Management Interface...

12/5/2012 - 5:33 PM Checking...

12/5/2012 - 5:33 PM Retrieve statistics...

12/5/2012 - 5:33 PM Connected.

12/5/2012 - 5:42 PM Disconnecting...

12/5/2012 - 5:42 PM SIGTERM received, sending exit notification to peer

12/5/2012 - 5:42 PM TCP/UDP: Closing socket

12/5/2012 - 5:42 PM Disconnected.

12/5/2012 - 5:42 PM C:\WINDOWS\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.3.117

12/5/2012 - 5:42 PM Route deletion via IPAPI succeeded [adaptive]

12/5/2012 - 5:42 PM C:\WINDOWS\system32\route.exe DELETE 69.163.36.106 MASK 255.255.255.255 192.168.1.1

12/5/2012 - 5:42 PM Route deletion via IPAPI succeeded [adaptive]

12/5/2012 - 5:42 PM C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.3.117

12/5/2012 - 5:42 PM Route deletion via IPAPI succeeded [adaptive]

12/5/2012 - 5:42 PM C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.3.117

12/5/2012 - 5:42 PM Route deletion via IPAPI succeeded [adaptive]

12/5/2012 - 5:42 PM Closing TUN/TAP interface

12/5/2012 - 5:42 PM SIGTERM[hard,] received, process exiting

12/5/2012 - 5:42 PM Login...

12/5/2012 - 5:42 PM Login success.

12/5/2012 - 5:42 PM Contacting service...

12/5/2012 - 5:42 PM Connecting...

12/5/2012 - 5:42 PM OpenVPN 2.2.2 Win32-MSVC++ [sSL] [LZO2] [PKCS11] built on Dec 15 2011

12/5/2012 - 5:42 PM NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

12/5/2012 - 5:42 PM LZO compression initialized

12/5/2012 - 5:42 PM Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]

12/5/2012 - 5:42 PM Socket Buffers: R=[8192->8192] S=[8192->8192]

12/5/2012 - 5:42 PM Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]

12/5/2012 - 5:42 PM Local Options hash (VER=V4): '22188c5b'

12/5/2012 - 5:42 PM Expected Remote Options hash (VER=V4): 'a8f55717'

12/5/2012 - 5:42 PM UDPv4 link local: [undef]

12/5/2012 - 5:42 PM UDPv4 link remote: 69.163.36.106:443

12/5/2012 - 5:42 PM TLS: Initial packet from 69.163.36.106:443, sid=905d7e40 c41c889f

12/5/2012 - 5:42 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

12/5/2012 - 5:42 PM VERIFY OK: nsCertType=SERVER

12/5/2012 - 5:42 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

12/5/2012 - 5:42 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

12/5/2012 - 5:42 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

12/5/2012 - 5:42 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

12/5/2012 - 5:42 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

12/5/2012 - 5:42 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

12/5/2012 - 5:42 PM [server] Peer Connection Initiated with 69.163.36.106:443

12/5/2012 - 5:42 PM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

12/5/2012 - 5:42 PM PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.3.118 10.4.3.117'

12/5/2012 - 5:42 PM OPTIONS IMPORT: timers and/or timeouts modified

12/5/2012 - 5:42 PM OPTIONS IMPORT: LZO parms modified

12/5/2012 - 5:42 PM OPTIONS IMPORT: --ifconfig/up options modified

12/5/2012 - 5:42 PM OPTIONS IMPORT: route options modified

12/5/2012 - 5:42 PM OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

12/5/2012 - 5:42 PM ROUTE default_gateway=192.168.1.1

12/5/2012 - 5:42 PM TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{A4B902C7-C304-48AF-A43B-D012D4E536DE}.tap

12/5/2012 - 5:42 PM TAP-Win32 Driver Version 9.9

12/5/2012 - 5:42 PM TAP-Win32 MTU=1500

12/5/2012 - 5:42 PM Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.4.3.118/255.255.255.252 on interface {A4B902C7-C304-48AF-A43B-D012D4E536DE} [DHCP-serv: 10.4.3.117, lease-time: 31536000]

12/5/2012 - 5:42 PM Successful ARP Flush on interface [16] {A4B902C7-C304-48AF-A43B-D012D4E536DE}

12/5/2012 - 5:43 PM TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

12/5/2012 - 5:43 PM C:\WINDOWS\system32\route.exe ADD 69.163.36.106 MASK 255.255.255.255 192.168.1.1

12/5/2012 - 5:43 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4

12/5/2012 - 5:43 PM Route addition via IPAPI succeeded [adaptive]

12/5/2012 - 5:43 PM C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.3.117

12/5/2012 - 5:43 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

12/5/2012 - 5:43 PM Route addition via IPAPI succeeded [adaptive]

12/5/2012 - 5:43 PM C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.3.117

12/5/2012 - 5:43 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

12/5/2012 - 5:43 PM Route addition via IPAPI succeeded [adaptive]

12/5/2012 - 5:43 PM C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.3.117

12/5/2012 - 5:43 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

12/5/2012 - 5:43 PM Route addition via IPAPI succeeded [adaptive]

12/5/2012 - 5:43 PM Initialization Sequence Completed

12/5/2012 - 5:43 PM Starting Management Interface...

12/5/2012 - 5:43 PM Checking...

12/5/2012 - 5:43 PM Retrieve statistics...

12/5/2012 - 5:43 PM Connected.

How do I change my physical adapter IP number? Sorry I'm not sure if you mean my router or my network card or how to do that.

Share this post


Link to post

Wait a sec..since I changed that preferred DNS I think it's working. The block rule is on and I'm on the VPN and I don't see leaks on DNSleaktest. I also can browse. I think.

Share this post


Link to post

Not sure how that DNS preferred server was 0.0.0.0 before. I think everything is working. The 3 IPs that show up on dnsleaktest.com are

in the range of 74.125.186.152 74.125.186.151 and 74.125.186.145 and I think those are from you guys, right?

Thank you so much for taking so much time to help me! This is truly excellent customer service and I really appreciate it.

Share this post


Link to post

Not sure how that DNS preferred server was 0.0.0.0 before. I think everything is working. The 3 IPs that show up on dnsleaktest.com are

in the range of 74.125.186.152 74.125.186.151 and 74.125.186.145 and I think those are from you guys, right?

Hello!

Glad to know that the problem is solved. In dnsleaktest.com you correctly see only Google DNS, which is the last DNS queried by the Air servers.

Thank you so much for taking so much time to help me! This is truly excellent customer service and I really appreciate it.

Thank you!

Kind regards

Share this post


Link to post

One last thing: What are the entry IP addresses and/or rule I'd create for this network zone (as I may want to try some different servers to determine how fast my speeds are):

My speeds are currently like 1.2MB/s and they're usually about 25MB/s. Maybe this is because in my details I see all UDP and I notice you mention that if there's a speed problem, use TCP? I'm not sure how to set it so that when I connect it's through TCP. I'm trying to learn; sorry, just missing fundamental understanding of routing and network rules but I'm starting to get it.

For your comfort, you might define a Network Zone (for example [Air servers entry IPs]) containing only the entry-IP addresses of our servers and then set two rules like

Allow TCP or UDP In/Out From In [Air servers entry IPs] To MAC Any Where Source Port Is Any And Destination Port Is Any

Allow TCP or UDP In/Out From MAC Any To In [Air servers entry IPs] Where Source Port Is Any And Destination Port Is Any

Thanks again.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...