Jump to content
Not connected, Your IP: 216.73.216.66
Sign in to follow this  
discov

ANSWERED Not able to connect using Eddie windows client

Recommended Posts

Please help with this issue. I am unable to connect to vpn servers using eddie windows client. Logs are attached. I have no problems in using airvpn config files with wireguard in the same system. I use windows 10. Thanks a lot

. 2025.05.30 08:35:20 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.19045.0, Mono/.Net: v4.0.30319
. 2025.05.30 08:35:20 - Command line arguments (1): path="home"
. 2025.05.30 08:35:21 - Skipped unknown option 'wireguard.interface.mtu'
. 2025.05.30 08:35:21 - Skipped unknown option 'windows.driver'
. 2025.05.30 08:35:21 - Reading options from C:\Users\kutta\AppData\Local\Eddie\default.profile
. 2025.05.30 08:35:24 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2025.05.30 08:35:24 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe)
. 2025.05.30 08:35:24 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe)
I 2025.05.30 08:35:25 - Ready
. 2025.05.30 08:35:26 - Collect information about AirVPN completed
I 2025.05.30 08:35:28 - Session starting.
I 2025.05.30 08:35:28 - Checking authorization ...
. 2025.05.30 08:35:30 - Added new network interface "Eddie", Wintun version 0.12
. 2025.05.30 08:35:30 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)"
! 2025.05.30 08:35:30 - Connecting to Aljanah (Netherlands, Alblasserdam)
. 2025.05.30 08:35:30 - Routes, add 134.19.179.173/32 for interface "Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC)".
. 2025.05.30 08:35:31 - Routes, add 134.19.179.173/32 for interface "Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC)", already exists.
. 2025.05.30 08:35:31 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2025.05.30 08:35:31 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2025.05.30 08:35:31 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2025.05.30 08:35:31 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2025.05.30 08:35:31 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2025.05.30 08:35:31 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2025.05.30 08:35:31 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2025.05.30 08:35:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.173:443
. 2025.05.30 08:35:31 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2025.05.30 08:35:31 - OpenVPN > UDP link local: (not bound)
. 2025.05.30 08:35:31 - OpenVPN > UDP link remote: [AF_INET]134.19.179.173:443
. 2025.05.30 08:35:31 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.173:443, sid=1800678f 271f5cf9
. 2025.05.30 08:35:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2025.05.30 08:35:31 - OpenVPN > VERIFY KU OK
. 2025.05.30 08:35:31 - OpenVPN > Validating certificate extended key usage
. 2025.05.30 08:35:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2025.05.30 08:35:31 - OpenVPN > VERIFY EKU OK
. 2025.05.30 08:35:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aljanah, emailAddress=info@airvpn.org
. 2025.05.30 08:35:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2025.05.30 08:35:31 - OpenVPN > [Aljanah] Peer Connection Initiated with [AF_INET]134.19.179.173:443
. 2025.05.30 08:35:32 - OpenVPN > SENT CONTROL [Aljanah]: 'PUSH_REQUEST' (status=1)
. 2025.05.30 08:35:32 - OpenVPN > AUTH: Received control message: AUTH_FAILED
W 2025.05.30 08:35:32 - Authorization failed. Look at the client area to discover the reason.
. 2025.05.30 08:35:32 - OpenVPN > SIGTERM received, sending exit notification to peer
! 2025.05.30 08:35:32 - Disconnecting
. 2025.05.30 08:35:32 - Sending soft termination signal
. 2025.05.30 08:35:35 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2025.05.30 08:35:35 - Routes, delete 134.19.179.173/32 for interface "Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC)".
. 2025.05.30 08:35:36 - Routes, delete 134.19.179.173/32 for interface "Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC)", not exists.
. 2025.05.30 08:35:36 - Connection terminated.
I 2025.05.30 08:35:39 - Checking authorization ...
. 2025.05.30 08:35:39 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)"
! 2025.05.30 08:35:39 - Connecting to Aljanah (Netherlands, Alblasserdam)
. 2025.05.30 08:35:40 - Routes, add 134.19.179.173/32 for interface "Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC)".
. 2025.05.30 08:35:40 - Routes, add 134.19.179.173/32 for interface "Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC)", already exists.
. 2025.05.30 08:35:40 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2025.05.30 08:35:40 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2025.05.30 08:35:40 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2025.05.30 08:35:40 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2025.05.30 08:35:40 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2025.05.30 08:35:40 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2025.05.30 08:35:40 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2025.05.30 08:35:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.173:443
. 2025.05.30 08:35:40 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2025.05.30 08:35:40 - OpenVPN > UDP link local: (not bound)
. 2025.05.30 08:35:40 - OpenVPN > UDP link remote: [AF_INET]134.19.179.173:443
. 2025.05.30 08:35:40 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.173:443, sid=7325dfff ecad4904
. 2025.05.30 08:35:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2025.05.30 08:35:40 - OpenVPN > VERIFY KU OK
. 2025.05.30 08:35:40 - OpenVPN > Validating certificate extended key usage
. 2025.05.30 08:35:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2025.05.30 08:35:40 - OpenVPN > VERIFY EKU OK
. 2025.05.30 08:35:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aljanah, emailAddress=info@airvpn.org
. 2025.05.30 08:35:40 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2025.05.30 08:35:40 - OpenVPN > [Aljanah] Peer Connection Initiated with [AF_INET]134.19.179.173:443
. 2025.05.30 08:35:41 - OpenVPN > SENT CONTROL [Aljanah]: 'PUSH_REQUEST' (status=1)
. 2025.05.30 08:35:41 - OpenVPN > AUTH: Received control message: AUTH_FAILED
W 2025.05.30 08:35:41 - Authorization failed. Look at the client area to discover the reason.
. 2025.05.30 08:35:41 - OpenVPN > SIGTERM received, sending exit notification to peer
! 2025.05.30 08:35:41 - Disconnecting
. 2025.05.30 08:35:41 - Sending soft termination signal
. 2025.05.30 08:35:44 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2025.05.30 08:35:45 - Routes, delete 134.19.179.173/32 for interface "Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC)".
. 2025.05.30 08:35:45 - Routes, delete 134.19.179.173/32 for interface "Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC)", not exists.
. 2025.05.30 08:35:45 - Connection terminated.
I 2025.05.30 08:35:48 - Checking authorization ...
. 2025.05.30 08:35:49 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)"
! 2025.05.30 08:35:49 - Connecting to Aljanah (Netherlands, Alblasserdam)
. 2025.05.30 08:35:49 - Routes, add 134.19.179.173/32 for interface "Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC)".
. 2025.05.30 08:35:50 - Routes, add 134.19.179.173/32 for interface "Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC)", already exists.
. 2025.05.30 08:35:50 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021
. 2025.05.30 08:35:50 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2025.05.30 08:35:50 - OpenVPN > library versions: OpenSSL 1.1.1l  24 Aug 2021, LZO 2.10
. 2025.05.30 08:35:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2025.05.30 08:35:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2025.05.30 08:35:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2025.05.30 08:35:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2025.05.30 08:35:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.173:443
. 2025.05.30 08:35:50 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2025.05.30 08:35:50 - OpenVPN > UDP link local: (not bound)
. 2025.05.30 08:35:50 - OpenVPN > UDP link remote: [AF_INET]134.19.179.173:443
. 2025.05.30 08:35:50 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.173:443, sid=bf36845c 6b01d2dc
. 2025.05.30 08:35:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2025.05.30 08:35:50 - OpenVPN > VERIFY KU OK
. 2025.05.30 08:35:50 - OpenVPN > Validating certificate extended key usage
. 2025.05.30 08:35:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2025.05.30 08:35:50 - OpenVPN > VERIFY EKU OK
. 2025.05.30 08:35:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aljanah, emailAddress=info@airvpn.org
. 2025.05.30 08:35:50 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2025.05.30 08:35:50 - OpenVPN > [Aljanah] Peer Connection Initiated with [AF_INET]134.19.179.173:443
. 2025.05.30 08:35:51 - OpenVPN > SENT CONTROL [Aljanah]: 'PUSH_REQUEST' (status=1)
. 2025.05.30 08:35:51 - OpenVPN > AUTH: Received control message: AUTH_FAILED
W 2025.05.30 08:35:51 - Authorization failed. Look at the client area to discover the reason.
. 2025.05.30 08:35:51 - OpenVPN > SIGTERM received, sending exit notification to peer
! 2025.05.30 08:35:51 - Disconnecting
. 2025.05.30 08:35:51 - Sending soft termination signal
. 2025.05.30 08:35:54 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2025.05.30 08:35:55 - Routes, delete 134.19.179.173/32 for interface "Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC)".
. 2025.05.30 08:35:55 - Routes, delete 134.19.179.173/32 for interface "Wi-Fi (Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC)", not exists.
. 2025.05.30 08:35:55 - Connection terminated.

Share this post


Link to post

RESOLVED. I logged out from the eddie and logged in as I renewed my private keys. Now everything works. Thanks to the suggestion provided by the staff in another thread.

Share this post


Link to post
Guest
This topic is now closed to further replies.
Sign in to follow this  

×
×
  • Create New...