jssi 0 Posted ... Hello everyone, I just made an account for AirVPN and firstly installed it on my laptop (Win 11), where it immediately worked without any issue. I then proceeded to install it to my PC (Win 10) but it won't connect to any server. Both times i downloaded the Eddie client for Windows 10/11, 64bit, Installer with GUI from the website. I already checked the VPN settings and they're the exact same, so it probably has something to do with the Windows settings, but i have no clue as to what exactly it could be. As stated in the title my PC is directly connected to my Router via cable while I use my Laptop via WLAN. Googling the issue has brought me to threads where people have a similar problem to mine but none of the solutions have worked for me thus far. Here are the logs for comparison, trying to connect to the exact same server Andromeda (Netherlands): PC Log I 2024.10.12 16:45:10 - Session starting. I 2024.10.12 16:45:10 - Checking authorization ... . 2024.10.12 16:45:11 - Added new network interface "Eddie", Wintun version 0.14 . 2024.10.12 16:45:11 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.10.12 16:45:11 - Connecting to Andromeda (Netherlands, Alblasserdam) . 2024.10.12 16:45:11 - Routes, add 213.152.161.231/32 for interface "Ethernet (Broadcom NetXtreme 57xx Gigabit Controller)". . 2024.10.12 16:45:11 - Routes, add 213.152.161.231/32 for interface "Ethernet (Broadcom NetXtreme 57xx Gigabit Controller)", already exists. . 2024.10.12 16:45:11 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.10.12 16:45:11 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.10.12 16:45:11 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.10.12 16:45:11 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.10.12 16:45:11 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.10.12 16:45:11 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.10.12 16:45:11 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.10.12 16:45:11 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.231:443 . 2024.10.12 16:45:11 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.10.12 16:45:11 - OpenVPN > UDP link local: (not bound) . 2024.10.12 16:45:11 - OpenVPN > UDP link remote: [AF_INET]213.152.161.231:443 . 2024.10.12 16:45:44 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2024.10.12 16:45:44 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.10.12 16:45:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2024.10.12 16:45:49 - Disconnecting Laptop Log I 2024.10.12 16:39:03 - Session starting. I 2024.10.12 16:39:03 - Checking authorization ... . 2024.10.12 16:39:05 - Added new network interface "Eddie", Wintun version 0.12 . 2024.10.12 16:39:05 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.10.12 16:39:05 - Connecting to Andromeda (Netherlands, Alblasserdam) . 2024.10.12 16:39:05 - Routes, add 213.152.161.231/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2024.10.12 16:39:05 - Routes, add 213.152.161.231/32 for interface "WLAN (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2024.10.12 16:39:06 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.10.12 16:39:06 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.10.12 16:39:06 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.10.12 16:39:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.10.12 16:39:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.10.12 16:39:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.10.12 16:39:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.10.12 16:39:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.231:443 . 2024.10.12 16:39:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.10.12 16:39:06 - OpenVPN > UDP link local: (not bound) . 2024.10.12 16:39:06 - OpenVPN > UDP link remote: [AF_INET]213.152.161.231:443 . 2024.10.12 16:39:06 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.231:443, sid=68d94654 f1ea56c8 . 2024.10.12 16:39:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.10.12 16:39:06 - OpenVPN > VERIFY KU OK . 2024.10.12 16:39:06 - OpenVPN > Validating certificate extended key usage . 2024.10.12 16:39:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.10.12 16:39:06 - OpenVPN > VERIFY EKU OK . 2024.10.12 16:39:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Andromeda, emailAddress=info@airvpn.org . 2024.10.12 16:39:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.10.12 16:39:06 - OpenVPN > [Andromeda] Peer Connection Initiated with [AF_INET]213.152.161.231:443 . 2024.10.12 16:39:06 - OpenVPN > SENT CONTROL [Andromeda]: 'PUSH_REQUEST' (status=1) . 2024.10.12 16:39:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.9.22.1,dhcp-option DNS6 fde6:7a:7d20:516::1,tun-ipv6,route-gateway 10.9.22.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:516::107f/64 fde6:7a:7d20:516::1,ifconfig 10.9.22.129 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.10.12 16:39:06 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.10.12 16:39:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.9.22.1' . 2024.10.12 16:39:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:516::1' . 2024.10.12 16:39:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.10.12 16:39:06 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.10.12 16:39:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.10.12 16:39:06 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.10.12 16:39:06 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.10.12 16:39:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.10.12 16:39:06 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.10.12 16:39:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.10.12 16:39:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.10.12 16:39:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.10.12 16:39:06 - OpenVPN > interactive service msg_channel=0 . 2024.10.12 16:39:06 - OpenVPN > open_tun . 2024.10.12 16:39:06 - OpenVPN > wintun device [Eddie] opened . 2024.10.12 16:39:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 20 static 10.9.22.129 255.255.255.0 . 2024.10.12 16:39:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 20 all . 2024.10.12 16:39:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 20 all . 2024.10.12 16:39:06 - OpenVPN > IPv4 MTU set to 1500 on interface 20 using SetIpInterfaceEntry() . 2024.10.12 16:39:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 20 fde6:7a:7d20:516::107f/128 store=active . 2024.10.12 16:39:06 - OpenVPN > add_route_ipv6(fde6:7a:7d20:516::/64 -> fde6:7a:7d20:516::107f metric 0) dev Eddie . 2024.10.12 16:39:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:516::/64 20 fe80::8 store=active . 2024.10.12 16:39:06 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.10.12 16:39:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 20 all . 2024.10.12 16:39:07 - OpenVPN > IPv6 MTU set to 1500 on interface 20 using SetIpInterfaceEntry() . 2024.10.12 16:39:07 - OpenVPN > Initialization Sequence Completed . 2024.10.12 16:39:07 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.10.12 16:39:07 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.10.12 16:39:07 - DNS leak protection with packet filtering enabled. . 2024.10.12 16:39:07 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.9.22.1) . 2024.10.12 16:39:07 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:516::1) . 2024.10.12 16:39:08 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.10.12 16:39:08 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.10.12 16:39:08 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.10.12 16:39:09 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.10.12 16:39:09 - Routes, add 213.152.161.229/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.10.12 16:39:09 - Routes, add 2a00:1678:2470:46:87f7:5087:ccb3:f7e2/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2024.10.12 16:39:09 - Flushing DNS I 2024.10.12 16:39:09 - Checking route IPv4 I 2024.10.12 16:39:10 - Checking route IPv6 I 2024.10.12 16:39:10 - Checking DNS ! 2024.10.12 16:39:10 - Connected. Quote Share this post Link to post
Staff 9969 Posted ... @jssi Hello! Please post a system report generated by Eddie on the "problematic" machine. Generate the report after the problem has occurred: https://airvpn.org/forums/topic/50663-youve-been-asked-for-a-support-filesystem-report-–-heres-what-to-do/ Kind regards Quote Share this post Link to post
jssi 0 Posted ... Hi, here is the system report: https://eddie.website/report/9c4aa184/ Kind regards Quote Share this post Link to post
Staff 9969 Posted ... @jssi Hello! UDP seems blocked. Also, the Mullvad tunnel we see in the report is up, therefore conflicts will arise on the main routing table and also for the overlapping of Mullvad/AirVPN VPN range (subnet). Please check any packet filtering tool both on your Fritz!Box and your system and make sure that they do not block UDP. Moreover, please do not keep the Mullvad tunnel up while you run Eddie (and vice-versa). You may also test a connection with WireGuard. You can switch to WireGuard on Eddie's "Preferences" > "Protocols" window. Kind regards Quote Share this post Link to post