Search the Community
Showing results for tags 'DNS Error'.
Found 3 results
For some reason, I can't access ipleak.net at all, whether or not I'm connected to a VPN server. This is baffling me- I've used the site many times in the past to check my connection. Now I get a DNS error. (DNS_PROBE_FINISHED_NXDOMAIN) How should I troubleshoot this?
AirVPN, I'm having trouble connecting to certain sites using the VPN service. For example, I'm trying to connect to DesignShack.net but I can't seem to do it with the AirVPN Client running. I have no problem connecting to the site if I'm not running the AirVPN Client. I've tried the following trouble shooting steps. 1) Add other DNS Servers to the airvpn client - Error went from DNS_PROBE_FINISHED_NXDOMAIN to Connection Timeout error 2) Turn on/off IPv6 3) Add other DNS Servers to Wifi network adapter settings. - Same as 1) 4) Added AirVPN Dns servers on top of the previously added DNS Servers on both AirVPN Client & Wireless adapter. - Same as 1) 5) Ping Designshack.net - Request Timeout errors. I would say this happens to 3-5% of the sites I'm visiting. I'm running OS X 10.10.5. I have Network lock turned on, not running any proxies. Any ideas or suggestions would be heartily welcomed. Thanks in advance. ---------------------- Log file entries follows : I 2016.05.12 13:25:16 - AirVPN client version: 2.10.3 / x86, System: OSX, Name: 10.10.5 / x64. 2016.05.12 13:25:17 - Reading options from /Users/FrancisChung/.airvpn/AirVPN.xml. 2016.05.12 13:25:17 - Data Path: /Users/FrancisChung/.airvpn. 2016.05.12 13:25:17 - App Path: /Applications/AirVPN.app/Contents/MacOS. 2016.05.12 13:25:17 - Executable Path: /Applications/AirVPN.app/Contents/MacOS/AirVPN. 2016.05.12 13:25:17 - Command line arguments (0):. 2016.05.12 13:25:17 - Updating systems & servers data .... 2016.05.12 13:25:17 - Operating System: Unix 184.108.40.206 - Darwin GAMBIT.local 14.5.0 Darwin Kernel Version 14.5.0: Mon Jan 11 18:48:35 PST 2016; root:xnu-2782.50.2~1/RELEASE_X86_64 x86_64. 2016.05.12 13:25:17 - Systems & servers data update completedI 2016.05.12 13:25:18 - OpenVPN Driver - ExpectedI 2016.05.12 13:25:18 - OpenVPN - Version: OpenVPN 2.3.8 (/Applications/AirVPN.app/Contents/MacOS/openvpn)I 2016.05.12 13:25:18 - SSH - Version: OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 (/usr/bin/ssh)I 2016.05.12 13:25:18 - SSL - Version: stunnel 5.17 (/Applications/AirVPN.app/Contents/MacOS/stunnel)! 2016.05.12 13:25:18 - Activation of Network Lock - OS X - PF. 2016.05.12 13:25:19 - OS X - PF rules updated, reloadingI 2016.05.12 13:25:19 - Session starting.I 2016.05.12 13:25:20 - IPv6 disabled on network adapter (Wi-Fi)I 2016.05.12 13:25:20 - IPv6 disabled on network adapter (SAMSUNG_Android)I 2016.05.12 13:25:20 - IPv6 disabled on network adapter (Bluetooth DUN 2)I 2016.05.12 13:25:21 - IPv6 disabled on network adapter (Thunderbolt Ethernet Slot 1)I 2016.05.12 13:25:21 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.05.12 13:25:21 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.05.12 13:25:21 - Checking authorization ...! 2016.05.12 13:25:22 - Connecting to Velorum (Germany, Frankfurt). 2016.05.12 13:25:22 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.05.12 13:25:22 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.05.12 13:25:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3111. 2016.05.12 13:25:22 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.05.12 13:25:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.05.12 13:25:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.05.12 13:25:22 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2016.05.12 13:25:22 - OpenVPN > UDPv4 link local: [undef]. 2016.05.12 13:25:22 - OpenVPN > UDPv4 link remote: [AF_INET]220.127.116.11:443. 2016.05.12 13:25:22 - OpenVPN > TLS: Initial packet from [AF_INET]18.104.22.168:443, sid=2509709c 0cdbc1e1. 2016.05.12 13:25:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddressfirstname.lastname@example.org. 2016.05.12 13:25:22 - OpenVPN > Validating certificate key usage. 2016.05.12 13:25:22 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.05.12 13:25:22 - OpenVPN > VERIFY KU OK. 2016.05.12 13:25:22 - OpenVPN > Validating certificate extended key usage. 2016.05.12 13:25:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.05.12 13:25:22 - OpenVPN > VERIFY EKU OK. 2016.05.12 13:25:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddressemail@example.com. 2016.05.12 13:25:23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.05.12 13:25:23 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.05.12 13:25:23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.05.12 13:25:23 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.05.12 13:25:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.05.12 13:25:23 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]22.214.171.124:443. 2016.05.12 13:25:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.05.12 13:25:25 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2016.05.12 13:25:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.105 255.255.0.0'. 2016.05.12 13:25:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.05.12 13:25:25 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.05.12 13:25:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.05.12 13:25:25 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.05.12 13:25:25 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.05.12 13:25:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.05.12 13:25:25 - OpenVPN > Opened utun device utun0. 2016.05.12 13:25:25 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.05.12 13:25:25 - OpenVPN > /sbin/ifconfig utun0 delete. 2016.05.12 13:25:25 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2016.05.12 13:25:25 - OpenVPN > /sbin/ifconfig utun0 10.4.6.105 10.4.6.105 netmask 255.255.0.0 mtu 1500 up. 2016.05.12 13:25:25 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.6.105 255.255.0.0. 2016.05.12 13:25:25 - OpenVPN > add net 10.4.0.0: gateway 10.4.6.105. 2016.05.12 13:25:25 - OpenVPN > /sbin/route add -net 126.96.36.199 192.168.2.1 255.255.255.255. 2016.05.12 13:25:25 - OpenVPN > add net 188.8.131.52: gateway 192.168.2.1. 2016.05.12 13:25:25 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 184.108.40.206. 2016.05.12 13:25:25 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2016.05.12 13:25:25 - OpenVPN > /sbin/route add -net 220.127.116.11 10.4.0.1 18.104.22.168. 2016.05.12 13:25:25 - OpenVPN > add net 22.214.171.124: gateway 10.4.0.1. 2016.05.12 13:25:25 - Starting Management Interface. 2016.05.12 13:25:25 - OpenVPN > Initialization Sequence CompletedI 2016.05.12 13:25:25 - DNS of a network adapter forced (Wi-Fi)I 2016.05.12 13:25:26 - DNS of a network adapter forced (SAMSUNG_Android)I 2016.05.12 13:25:26 - DNS of a network adapter forced (Bluetooth DUN 2)I 2016.05.12 13:25:26 - DNS of a network adapter forced (Thunderbolt Ethernet Slot 1)I 2016.05.12 13:25:27 - DNS of a network adapter forced (Bluetooth PAN)I 2016.05.12 13:25:27 - DNS of a network adapter forced (Thunderbolt Bridge)I 2016.05.12 13:25:27 - Flushing DNS. 2016.05.12 13:25:28 - OS X - PF rules updated, reloadingI 2016.05.12 13:25:28 - Checking route! 2016.05.12 13:25:30 - Connected.. 2016.05.12 13:25:30 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3111. 2016.05.12 13:25:30 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
Over the past few months of using AirVPN alongside Virgin Media I have had nothing but issues. I am either unable to get the full bandwidth that I pay for, or my connection drops so frequently that it makes browsing almost impossible. I want to say a huge thank you to the AirVPN community and the people over at AirVPN as well for all of their support. I have learnt a lot over the last few months and I wanted to take the time to share my findings so that anyone else that had these issues could attempt the same things as I did and perhaps it will help you too. The Bandwidth cut Firstly lets talk about bandwidth issues. I have a fibre connection that without my VPN service I receive the 150meg I pay for. No sooner do I switch on the VPN I face drops of 75%. With the help of this post: https://airvpn.org/topic/12473-virgin-media-openvpn-low-speeds-throttlingbug/ rainmakerraw posted saying that by using the SSL protocols through EDDIE he was able to regain the lost bandwidth faced by using the VPN service. I figured this could work in the AirVPN program and after contacting the AirVPN team who advised changing this setting in AirVPN's protocols to SSL port 80 I saw that my speeds jumped to around 50% of my total bandwidth. For what I use the internet for, this was more than acceptable so I didn't mind taking a 50% cut so long as my anonymity was safe. METHOD: In the AirVPN program click the AirVPN logo in the top left corner: Next hit the preferences button: And then go to the protocols section and select the SSL port 80 radio button: This should now give you boost on your speeds while running AirVPN with Virgin Media. However, my story doesn't end there. The connection drop For a short time I was able to enjoy absolute anonymity and with only a 50% drop in service. I could live with this, until my connection began drop constantly. Initially this was very intermittent, and I simply disconnected from the current server and just hit reconnect. Issue fixed. However, this started to become extremely frequent, to the point that I was only able to browse for around 5 minutes before the connection dropped and I was shown a DNS error on websites I was trying to access. I could not seem to find anyone on these forums with the same issue, nor anyone with a solution. I knew that it had to be my ISP causing the problem as this did not exist anywhere else. However, I did find whisper on some other sites about Windows 10 causing problems with VPN services. It seems we live in a world governed by people hell bent on watching our every move, and at any cost they will try their best to succeed in this. Thankfully there are far smarter nerds out there capable of finding a solution. After a bit of searching I came across this post: https://www.bestvpn.com/blog/28318/warning-windows-10-vpn-users-at-big-risk-of-dns-leaks-2/ Which suggested that within Windows 10's group policies there was an option causing a few issues regarding DNS leaking. I had checked several times on https://dnsleaktest.com/ as well as https://ipleak.net/ as to whether this might be the cause of my problem but found no issues. That being said I wanted to add this here as I feel it could be of some use to people. Now, this is a guide for Windows 7 users but it works on Windows 10 (I will assume you are using this), however, it only works for Windows 10 pro. Windows 10 Home does not have the group policy software included, and after a little tinkering I managed to get it installed but there was no option to remove the "Smart Multi-Homed Name Resolution". So it didn't help me. However, if you have 10 pro, I see no reason not to include this as it could be an option. Never Give Up I wasn't going to be beaten that easily. I figured it was time to use the ol' process of elimination to figure out the cause of my problem, so I connected my laptop to my mobile phone via WIFI hotspot and with AirVPN connected I found there was not a single drop in a full 24 hours of web browsing. (Of course this ended up costing me a fortune but we live and learn). So then, my issue had to lie with Virgin Media. Perhaps then my Superhub was the cause. But if it was, where would I start? I figured is this was going to be any kind of software issue the firewall would be the place to look. Well by Jove I think I found it. Superhub more like SuperDUD As I type this I am now happily browsing the web at full speed, uninterrupted, and happy. SSL 80, no connection drop and I'm confident. The issue seemed to be with the PPTP and Multicast pass through. A little internet search and what should pop up as the top link: https://support.cultrix.co.uk/hc/en-gb/articles/202644875-VPN-Does-Not-Connect-When-Using-Virgin-Media-SuperHub A page regarding the issues this VM hub causes VPN services when these two options are not clicked. METHOD: Log into your Virgin Media Hub. For most of you this will be via the web browser and in the address bar you type 192.168.0.1 If this should not work refer to your particular hubs manual for the correct method, or using the sticker on the bottom of the router. Once in, you should see this screen: From here you want to type in the password to access the routers settings. I have changed mine so its no longer default, however, if you have never done this the password should be on the sticker on the router, but refer to the user manual to be sure. Next go ahead and click sign in and you will see this screen: From here we want to enter into the advanced settings option located at the bottom right of the screen. It may pop up a little warning but I assure you we are not doing anything that will break the router. On the following screen scroll down until you see the "Security" options: You are going to want to click on "Firewall". Lastly, on this next screen you should see the option for PPTP and Multicast Pass through as seen bellow. Go ahead and click both so that there is a tick in each box and then save the settings. If for some reason yours is already active, and you are facing the same issues as I am I am afraid I am at a loss as to what your issue could be. As I say, this is really just my own findings and this is as far as I got. The light at the end of the fibre Hopefully you should now be in the same boat as me, you should have a lovely consistent connection, with no loss of bandwidth and with the help of your lovely AirVPN service 100% anonymity. If for any reason these methods do not help feel free to post, perhaps this could be the central place for other VM subscribers and those using AirVPN. The small print Of course with any fixes like this they all come with inherent risks. I am merely showing you what I did and how, but please, do this at your own risk. I have had no issues doing this but I am not responsible for anything that goes wrong for you. Another note: Virgin Media from time to time release firmware updates and these can (and have) reset settings on Hubs. If you find that one day you begin to see the same dreaded drops and throttling, check the hub settings again in case they have reset them. I have seen many posts suggesting that turning the Superhub into modem mode and purchasing a router capable of the SSL 80 protocol in the routers settings is also an option. I have an old DD-WRT but its a little too old for the latest firmware and as such can not use the SSL protocol. This I think is a better option as it ensures anyone on your network is behind the VPN. But I am just finding the less expensive solution, not to mention there are far too many routers out there to determine which one can do SSL. Anyway, I hope this can be of some help to people with VM. Or if you have similar issues, maybe your router has these options, give it a go. Have a good day everyone. Updated 29/12/2016: *Title change*