Jump to content
Not connected, Your IP: 54.158.251.104

Search the Community

Showing results for tags 'Eddie'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP
    • Mirrors

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 263 results

  1. I'm using KDE PCLinuxOS and running Eddit 2.15.2 (eddie-ui_2.15.2_linux_x64_portable) Eddie takes about 7 to 10 minutes to Flush DNS, going into VPN and comming ot of VPN. Any reason why so it takes so very long? Thank you to all who take the time to review this question.
  2. When I have the VPN active using Eddie, my DNS queries randomly come to a crawl. In Chrome I see "Resolving host" a lot. Sometimes takes 10 seconds or more to return. I disconnect the VPN, shutdown Eddie and everything is back to running fine. Even through I am running the latest Eddie and the latest Windows 10 version, I tried setting the metric cost in the various adapters, per the sticky in this forum. Set the normal ethernet adaptor to 25 and a virtual box adaptor to 35. Both for ipv4 and ipv6. Eddie set's it's TAP adaptor to 3 for both protocols. None of that helped. I'm at a loss. Thoughts/ideas? System info: Windows 10 Pro, version 1803 Eddie, version 2.15.2 Thanks.
  3. Hi, I'm running the AirVPN Eddie client on my Windows 10 64-bit machines. I was recently unable to connect to my network, but not the internet or AirVPN and remembered I had the same problem on my other machine a few months ago and this forum gave me a solution. It involved setting the IPv4 to my preferred connection through a netsh powershell command. Doing this fix I noticed that there were 50 different ethernet connections that Eddie has created and I was wondering if there is a way to delete these connections to prevent any issues moving forward? A couple screenshots for clarity:
  4. Forgive my laziness, has anyone tried Eddie for Android on a Fire TV or another android tv and does it work better than the openvpn ics?
  5. Hi, I've purchased a Windows 10 PC and I'm not overly familiar with the OS, other than the basics. I've installed Eddie and and signed in ok, but when I try to connect to any server Eddie gets to "Checking Route IPv6" and then fails to connect Then Eddie disconnects and tries to reconnect only to fail again. I'm at a loss of what to do. Any suggestions are welcomed. Thank you.
  6. (I have submitted the following to AirVPN support and decided to post it here also to identify problems and potentially get them resolved). Eddie OpenVPN UI Version 2.15.2 problems. 1. Upon startup, I receive the message: "Unable to contact provider AirVPN to obtain bootstrap information. Please check your internet connection.". After I dismiss the dialog, AirVPN seems to be working, but how can I be sure after such a message? 2. The Events tab is no longer present. 3. The list of servers seems not to scoring, for all the stars next to all of the servers are uncolored. Please advise. Thank you.
  7. I run OSX 10.12.6 I'm using Eddie 2.15.2 I'm using the latest TBB I've had no problem running Tor over Airvpn with a tor exit node prior to the Internet. I'm trying to run Airvpn over Tor with the Airvpn server prior to the internet. I've looked at https://airvpn.org/tor, as well as every other document that seemed related to my issue. I start the tor browser first, then the Eddie client. I'm able to make a connection from Eddie to tor with the test button within the Eddie client. I'm also able to connect to an airvpn server. However, when I test what my ip address is from the tor browser, it returns the tor exit node address, not the airvpn server address. And when I try another browser, which is not proxied through tor, the ip address returned is that of the airvpn server address. So essentially what I'm seeing is Tor over Airvpn, not Airvpn over Tor. The only difference between connecting using the "tor" proxy in Eddie preferences instead of "none" is that I no longer can directly access .onion sites. Any insight into this issue would be appreciated. AirvpnLog.txt AirvpnSystemReport.txt
  8. Hello lads. I have Windows 8.1 installed on my desktop for gaming purposes. I'm facing at least two problems with the newest iteration of the Eddie client. I have enabled the options "Connect at startup", "Start with Windows" and "Activate Network Lock at startup". This is what happens: I boot into WindowsEddie starts upThe bootstrap failure window is displayedAt this point, Eddie will connect successfully to a server, however this takes a much longer time than it did with older versions of the clientNow if I refresh the server browser, no server information will be available, and the servers will be sorted alphabeticallyThis means that I cannot select the optimal server should I need toI had the exact same issues on a previous install of Windows 8.1, and I went through the trouble of reinstalling Windows thinking that Windows Firewall was misconfigured or something. Eddie was the first program I installed and the Windows reinstallation did not solve the problems. My network setup is really basic and I connect via an ethernet cable to my home's router. These Eddie problems have persisted for multiple weeks and I would really appreciate help solving them. Also this is totally unrelated but since the Windows reinstallation, whenever I power on my desktop, the CPU fan briefly turns on for about two seconds, and then the whole system turns off, and then on again, and then everything proceeds to work correctly. What's up with that? Something set incorrectly in the BIOS? I've checked the boot priority list, which is as it should be with the Windows drive at the top. Pic related Thanks
  9. Hi, up until recently, Apple's AirDrop file transfer protocol would work even when network lock was turned on in Eddie. In v2.15.2 this no longer works. Does anybody know a specific setting that may have changed to enable this feature again?
  10. greetings, I'm currently testing out AirVPN before buying a longer subscription. However I currently have some trouble with WebRTC leaks of my IPv6 address. My setup is the following: Arch Linux 64 BitEddie 2.15.2Network Lock enabledChrome/FirefoxUBlock origin option to prevent WebRTC leaks enabled.ISP Unitymedia DSLite (IPv6) When I connect to a suggested server (with network lock enabled) and check IPLeak.net, it looks like this: The address seen under WebRTC IPv6 is the same when not connected, so something is definitely leaking. I tried with both Firefox and Chrome. Is there a way to solve this issue? Can WebRTC leaks be an issue when using torrents? Regards
  11. I have Cisco Anyconnect installed on one of my windows machines. This software remains installed at all times, but it is not used for as a vpn unless I need to access some work related resources. Is it possible to have Eddie installed and use when I'm not using Cisco. I understand that I would have to disconnect from Air/Eddie to briefly use Cisco. Basically what I am asking is would have two vpn softwares installed break anything?
  12. Hi Just upgraded AirVPN client from 2.13.6 to 2.15.2. I have one problem: Where is all my events options. I am closing down some programs if the vpn connection is down. In version 2.13 it was under the tap Events, this Events tap is gone in version 2.15.... Where is it?
  13. I am using the Eddie for Android latest version, and with the IPv6 setting set to "request", and when I connect to one of the IPv6 enabled servers such as Capricornus, I do not have IPv6 connectivity, only IPv4. ipleak.net only shows the VPN IPv4 address, and I am unable to view IPv6 only sites such as ipv6.google.com. how can I fix this and be able to use the VPN'S IPv6 address?
  14. Hello: eddie connects but then i have no internet access. have tried multiple canadian servers. logs below. any support would be appreciated, thank you. Eddie System/Environment Report - 6/10/2018 8:08 PM UTC Eddie version: 2.14.5Eddie OS build: windows_x64Eddie architecture: x64OS type: WindowsOS name: Windows 10 HomeOS version: Microsoft Windows NT 10.0.17134.0OS architecture: x64Mono /.Net Framework: v4.0.30319OpenVPN driver: OpenVPN: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)Profile path: C:\Users\j&a\AppData\Local\AirVPN\AirVPN.xmlData path: C:\Users\j&a\AppData\Local\AirVPNApplication path: C:\Program Files\AirVPNExecutable path: C:\Program Files\AirVPN\Eddie-UI.exeCommand line arguments: (1 args) path="home"Network Lock Active: Yes, Windows Filtering PlatformConnected to VPN: Yes, LesathDetected DNS: 10.0.0.1, 10.4.0.1, 2001:4e8:0:4007::15, 2001:4e8:0:4009::11Test DNS IPv4: OkTest DNS IPv6: FailedTest Ping IPv4: 80 msTest Ping IPv6: -1 msTest HTTP IPv4: OkTest HTTP IPv6: Error:curl: (6) Could not resolve host: ipv6.eddie.websiteTest HTTPS: Ok----------------------------Important options not at defaults: login: (omissis)password: (omissis)remember: True ----------------------------Logs: . 2018.06.10 12:45:17 - Eddie version: 2.14.5 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.17134.0, Mono/.Net: v4.0.30319. 2018.06.10 12:45:17 - Reading options from C:\Users\j&a\AppData\Local\AirVPN\AirVPN.xml. 2018.06.10 12:45:17 - Profile options not found, using defaults.. 2018.06.10 12:45:17 - Command line arguments (1): path="home". 2018.06.10 12:45:18 - Cannot find tunnel adapter.E 2018.06.10 12:45:19 - OpenVPN Driver - Not available - Will be installed at next connection.. 2018.06.10 12:45:19 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe). 2018.06.10 12:45:19 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe). 2018.06.10 12:45:19 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe). 2018.06.10 12:45:19 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe). 2018.06.10 12:45:19 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem. 2018.06.10 12:45:20 - Updating systems & servers data ...I 2018.06.10 12:45:20 - Ready. 2018.06.10 12:45:21 - Systems & servers data update completedI 2018.06.10 12:46:04 - Checking login ...! 2018.06.10 12:46:05 - Logged in.! 2018.06.10 12:46:14 - Activation of Network Lock - Windows Filtering PlatformI 2018.06.10 12:46:18 - Session starting.. 2018.06.10 12:46:18 - Cannot find tunnel adapter.! 2018.06.10 12:46:18 - Installing tunnel driverI 2018.06.10 12:46:22 - Checking authorization .... 2018.06.10 12:46:22 - IPv6 disabled with packet filtering.! 2018.06.10 12:46:22 - Connecting to Gorgonea (Canada, Toronto, Ontario). 2018.06.10 12:46:23 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.10 12:46:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.10 12:46:23 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.10 12:46:23 - Connection to OpenVPN Management Interface. 2018.06.10 12:46:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.06.10 12:46:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 12:46:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 12:46:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.250:443. 2018.06.10 12:46:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.10 12:46:23 - OpenVPN > UDP link local: (not bound). 2018.06.10 12:46:23 - OpenVPN > UDP link remote: [AF_INET]104.254.90.250:443. 2018.06.10 12:46:23 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.250:443, sid=01bc53b3 755548eb. 2018.06.10 12:46:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.06.10 12:46:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.10 12:46:23 - OpenVPN > VERIFY KU OK. 2018.06.10 12:46:23 - OpenVPN > Validating certificate extended key usage. 2018.06.10 12:46:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.10 12:46:23 - OpenVPN > VERIFY EKU OK. 2018.06.10 12:46:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.10 12:46:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.10 12:46:23 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.250:443. 2018.06.10 12:46:24 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.06.10 12:46:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.115 255.255.0.0,peer-id 26,cipher AES-256-GCM'. 2018.06.10 12:46:24 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.06.10 12:46:24 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.06.10 12:46:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.10 12:46:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.10 12:46:24 - OpenVPN > interactive service msg_channel=0. 2018.06.10 12:46:24 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b. 2018.06.10 12:46:24 - OpenVPN > open_tun. 2018.06.10 12:46:24 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap. 2018.06.10 12:46:24 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.06.10 12:46:24 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.115/255.255.0.0 [sUCCEEDED]. 2018.06.10 12:46:24 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.115/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.06.10 12:46:24 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}. 2018.06.10 12:46:24 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.10 12:46:29 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.06.10 12:46:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 104.254.90.250 MASK 255.255.255.255 10.0.0.1. 2018.06.10 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 12:46:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 12:46:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 12:46:29 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.06.10 12:46:29 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.06.10 12:46:29 - DNS leak protection with packet filtering enabled.. 2018.06.10 12:46:29 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1). 2018.06.10 12:46:29 - Routes, added a new route, 104.254.90.251 for gateway 10.4.0.1. 2018.06.10 12:46:29 - Flushing DNSI 2018.06.10 12:46:32 - Checking route IPv4I 2018.06.10 12:46:33 - Checking DNS! 2018.06.10 12:46:45 - Connected.. 2018.06.10 12:46:45 - OpenVPN > Initialization Sequence Completed. 2018.06.10 12:46:45 - OpenVpn Management > ENTER PASSWORD:! 2018.06.10 12:47:31 - Disconnecting. 2018.06.10 12:47:31 - Routes, removed a route previously added, 104.254.90.251 for gateway 10.4.0.1. 2018.06.10 12:47:31 - Sending management termination signal. 2018.06.10 12:47:31 - Management - Send 'signal SIGTERM'. 2018.06.10 12:47:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.10 12:47:32 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.10 12:47:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 104.254.90.250 MASK 255.255.255.255 10.0.0.1. 2018.06.10 12:47:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 12:47:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 12:47:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 12:47:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 12:47:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 12:47:36 - OpenVPN > Closing TUN/TAP interface. 2018.06.10 12:47:36 - OpenVPN > TAP: DHCP address released. 2018.06.10 12:47:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.06.10 12:47:36 - Connection terminated.. 2018.06.10 12:47:36 - IPv6 restored with packet filtering.. 2018.06.10 12:47:36 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic). 2018.06.10 12:47:36 - DNS leak protection with packet filtering disabled.. 2018.06.10 12:47:36 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.06.10 12:47:36 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.06.10 12:47:36 - Flushing DNS! 2018.06.10 12:47:39 - Session terminated.! 2018.06.10 12:47:40 - Deactivation of Network LockI 2018.06.10 12:49:02 - Session starting.I 2018.06.10 12:49:02 - Checking authorization .... 2018.06.10 12:49:02 - IPv6 disabled with packet filtering.! 2018.06.10 12:49:02 - Connecting to Alwaid (Canada, Toronto, Ontario). 2018.06.10 12:49:03 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.10 12:49:03 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.10 12:49:03 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.10 12:49:03 - Connection to OpenVPN Management Interface. 2018.06.10 12:49:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.06.10 12:49:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 12:49:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 12:49:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.114:443. 2018.06.10 12:49:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.10 12:49:03 - OpenVPN > UDP link local: (not bound). 2018.06.10 12:49:03 - OpenVPN > UDP link remote: [AF_INET]184.75.221.114:443. 2018.06.10 12:49:03 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.114:443, sid=820316e9 17d858a1. 2018.06.10 12:49:03 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.06.10 12:49:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.10 12:49:03 - OpenVPN > VERIFY KU OK. 2018.06.10 12:49:03 - OpenVPN > Validating certificate extended key usage. 2018.06.10 12:49:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.10 12:49:03 - OpenVPN > VERIFY EKU OK. 2018.06.10 12:49:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.10 12:49:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.10 12:49:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.114:443. 2018.06.10 12:49:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.06.10 12:49:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.174 255.255.0.0'. 2018.06.10 12:49:07 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.10 12:49:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.06.10 12:49:07 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 12:49:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.06.10 12:49:07 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 12:49:07 - OpenVPN > interactive service msg_channel=0. 2018.06.10 12:49:07 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b. 2018.06.10 12:49:07 - OpenVPN > open_tun. 2018.06.10 12:49:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap. 2018.06.10 12:49:07 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.06.10 12:49:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.174/255.255.0.0 [sUCCEEDED]. 2018.06.10 12:49:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.174/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.06.10 12:49:07 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}. 2018.06.10 12:49:07 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.10 12:49:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.06.10 12:49:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.114 MASK 255.255.255.255 10.0.0.1. 2018.06.10 12:49:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 12:49:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 12:49:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 12:49:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 12:49:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 12:49:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 12:49:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 12:49:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 12:49:12 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.06.10 12:49:12 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.06.10 12:49:12 - DNS leak protection with packet filtering enabled.. 2018.06.10 12:49:12 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1). 2018.06.10 12:49:12 - Routes, added a new route, 184.75.221.115 for gateway 10.4.0.1. 2018.06.10 12:49:12 - Flushing DNSI 2018.06.10 12:49:16 - Checking route IPv4I 2018.06.10 12:49:16 - Checking DNS! 2018.06.10 12:49:29 - Connected.. 2018.06.10 12:49:29 - OpenVPN > Initialization Sequence Completed. 2018.06.10 12:49:29 - OpenVpn Management > ENTER PASSWORD:. 2018.06.10 12:56:00 - Updating systems & servers data .... 2018.06.10 12:56:01 - Systems & servers data update completed. 2018.06.10 12:57:58 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #68630 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings. 2018.06.10 13:00:59 - Above log line repeated 19 times more! 2018.06.10 13:00:59 - Disconnecting. 2018.06.10 13:00:59 - Routes, removed a route previously added, 184.75.221.115 for gateway 10.4.0.1. 2018.06.10 13:00:59 - Sending management termination signal. 2018.06.10 13:00:59 - Management - Send 'signal SIGTERM'. 2018.06.10 13:00:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.10 13:00:59 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.10 13:01:04 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.221.114 MASK 255.255.255.255 10.0.0.1. 2018.06.10 13:01:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 13:01:04 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:01:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 13:01:04 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:01:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 13:01:04 - OpenVPN > Closing TUN/TAP interface. 2018.06.10 13:01:04 - OpenVPN > TAP: DHCP address released. 2018.06.10 13:01:04 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.06.10 13:01:04 - Connection terminated.. 2018.06.10 13:01:04 - IPv6 restored with packet filtering.. 2018.06.10 13:01:04 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic). 2018.06.10 13:01:04 - DNS leak protection with packet filtering disabled.. 2018.06.10 13:01:04 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.06.10 13:01:04 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6. 2018.06.10 13:01:04 - Flushing DNS! 2018.06.10 13:01:07 - Session terminated.! 2018.06.10 13:01:09 - Activation of Network Lock - Windows Filtering PlatformI 2018.06.10 13:01:18 - Session starting.I 2018.06.10 13:01:18 - Checking authorization .... 2018.06.10 13:01:18 - IPv6 disabled with packet filtering.! 2018.06.10 13:01:18 - Connecting to Rotanev (Canada, Toronto, Ontario). 2018.06.10 13:01:19 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.10 13:01:19 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.10 13:01:19 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.10 13:01:19 - Connection to OpenVPN Management Interface. 2018.06.10 13:01:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.06.10 13:01:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 13:01:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 13:01:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.186:443. 2018.06.10 13:01:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.10 13:01:19 - OpenVPN > UDP link local: (not bound). 2018.06.10 13:01:19 - OpenVPN > UDP link remote: [AF_INET]104.254.90.186:443. 2018.06.10 13:01:19 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.186:443, sid=047e9ced e53fae6b. 2018.06.10 13:01:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.06.10 13:01:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.10 13:01:19 - OpenVPN > VERIFY KU OK. 2018.06.10 13:01:19 - OpenVPN > Validating certificate extended key usage. 2018.06.10 13:01:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.10 13:01:19 - OpenVPN > VERIFY EKU OK. 2018.06.10 13:01:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.10 13:01:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.10 13:01:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.186:443. 2018.06.10 13:01:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.06.10 13:01:25 - Above log line repeated 1 times more. 2018.06.10 13:01:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.11.48 255.255.0.0'. 2018.06.10 13:01:25 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.10 13:01:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.06.10 13:01:25 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 13:01:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.06.10 13:01:25 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 13:01:25 - OpenVPN > interactive service msg_channel=0. 2018.06.10 13:01:25 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b. 2018.06.10 13:01:25 - OpenVPN > open_tun. 2018.06.10 13:01:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap. 2018.06.10 13:01:25 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.06.10 13:01:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.11.48/255.255.0.0 [sUCCEEDED]. 2018.06.10 13:01:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.11.48/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.06.10 13:01:25 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}. 2018.06.10 13:01:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.10 13:01:31 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.06.10 13:01:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 104.254.90.186 MASK 255.255.255.255 10.0.0.1. 2018.06.10 13:01:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 13:01:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 13:01:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:01:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 13:01:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 13:01:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:01:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 13:01:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 13:01:31 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.06.10 13:01:31 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.06.10 13:01:31 - DNS leak protection with packet filtering enabled.. 2018.06.10 13:01:31 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1). 2018.06.10 13:01:31 - Routes, added a new route, 104.254.90.187 for gateway 10.4.0.1. 2018.06.10 13:01:31 - Flushing DNSI 2018.06.10 13:01:34 - Checking route IPv4I 2018.06.10 13:01:35 - Checking DNS! 2018.06.10 13:01:47 - Connected.. 2018.06.10 13:01:47 - OpenVPN > Initialization Sequence Completed. 2018.06.10 13:01:47 - OpenVpn Management > ENTER PASSWORD:. 2018.06.10 13:06:36 - Updating systems & servers data .... 2018.06.10 13:06:38 - Systems & servers data update completed! 2018.06.10 13:06:56 - Disconnecting. 2018.06.10 13:06:56 - Routes, removed a route previously added, 104.254.90.187 for gateway 10.4.0.1. 2018.06.10 13:06:56 - Sending management termination signal. 2018.06.10 13:06:56 - Management - Send 'signal SIGTERM'. 2018.06.10 13:06:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.10 13:06:56 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.10 13:07:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 104.254.90.186 MASK 255.255.255.255 10.0.0.1. 2018.06.10 13:07:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 13:07:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:07:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 13:07:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:07:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.06.10 13:07:01 - OpenVPN > Closing TUN/TAP interface. 2018.06.10 13:07:01 - OpenVPN > TAP: DHCP address released. 2018.06.10 13:07:01 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.06.10 13:07:01 - Connection terminated.. 2018.06.10 13:07:01 - IPv6 restored with packet filtering.. 2018.06.10 13:07:01 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic). 2018.06.10 13:07:01 - DNS leak protection with packet filtering disabled.. 2018.06.10 13:07:01 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4. 2018.06.10 13:07:01 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6I 2018.06.10 13:07:01 - Checking authorization .... 2018.06.10 13:07:02 - IPv6 disabled with packet filtering.! 2018.06.10 13:07:02 - Connecting to Lesath (Canada, Toronto, Ontario). 2018.06.10 13:07:02 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.06.10 13:07:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.06.10 13:07:02 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.10 13:07:02 - Connection to OpenVPN Management Interface. 2018.06.10 13:07:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.06.10 13:07:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 13:07:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.10 13:07:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443. 2018.06.10 13:07:02 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.06.10 13:07:02 - OpenVPN > UDP link local: (not bound). 2018.06.10 13:07:02 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443. 2018.06.10 13:07:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=3f473ba1 678b1534. 2018.06.10 13:07:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.06.10 13:07:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.10 13:07:02 - OpenVPN > VERIFY KU OK. 2018.06.10 13:07:02 - OpenVPN > Validating certificate extended key usage. 2018.06.10 13:07:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.10 13:07:02 - OpenVPN > VERIFY EKU OK. 2018.06.10 13:07:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.06.10 13:07:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.10 13:07:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443. 2018.06.10 13:07:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.06.10 13:07:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.129 255.255.0.0,peer-id 35,cipher AES-256-GCM'. 2018.06.10 13:07:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.06.10 13:07:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.06.10 13:07:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.10 13:07:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.10 13:07:03 - OpenVPN > interactive service msg_channel=0. 2018.06.10 13:07:03 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b. 2018.06.10 13:07:03 - OpenVPN > open_tun. 2018.06.10 13:07:03 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap. 2018.06.10 13:07:03 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.06.10 13:07:03 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.129/255.255.0.0 [sUCCEEDED]. 2018.06.10 13:07:03 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.129/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2018.06.10 13:07:03 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}. 2018.06.10 13:07:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.10 13:07:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.06.10 13:07:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.2 MASK 255.255.255.255 10.0.0.1. 2018.06.10 13:07:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 13:07:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 13:07:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:07:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 13:07:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 13:07:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2018.06.10 13:07:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2018.06.10 13:07:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.06.10 13:07:09 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4. 2018.06.10 13:07:09 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6. 2018.06.10 13:07:09 - DNS leak protection with packet filtering enabled.. 2018.06.10 13:07:09 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1). 2018.06.10 13:07:09 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1. 2018.06.10 13:07:09 - Flushing DNSI 2018.06.10 13:07:12 - Checking route IPv4I 2018.06.10 13:07:13 - Checking DNS! 2018.06.10 13:07:25 - Connected.. 2018.06.10 13:07:25 - OpenVPN > Initialization Sequence Completed. 2018.06.10 13:07:25 - OpenVpn Management > ENTER PASSWORD: ----------------------------Network Interfaces and Routes: {"support_ipv4": true,"support_ipv6": true,"routes": [{"address": "0.0.0.0\/0","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "10.0.0.1","metric": "35"},{"address": "0.0.0.0\/1","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "10.4.0.1","metric": "3"},{"address": "10.0.0.0\/24","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "10.0.0.28","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "10.0.0.255","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "10.4.0.0\/16","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "10.4.12.129","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "10.4.255.255","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "127.0.0.0\/8","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "127.0.0.1","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "127.255.255.255","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "128.0.0.0\/1","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "10.4.0.1","metric": "3"},{"address": "184.75.221.2","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "10.0.0.1","metric": "35"},{"address": "184.75.221.3","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "10.4.0.1","metric": "4"},{"address": "224.0.0.0\/4","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "224.0.0.0\/4","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "224.0.0.0\/4","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "255.255.255.255","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "255.255.255.255","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "255.255.255.255","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "::1","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "2604:3d08:807f:fff2::\/64","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "2604:3d08:807f:fff2::4b9b","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "2604:3d08:807f:fff2:d9a:651b:8f8c:3d75","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "2604:3d08:807f:fff2:6068:eaf3:7657:beff","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "fe80::\/64","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "fe80::\/64","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "fe80::d9a:651b:8f8c:3d75","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "fe80::1923:642e:f94e:9d84","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"},{"address": "ff00::\/8","interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","gateway": "link","metric": "331"},{"address": "ff00::\/8","interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","gateway": "link","metric": "291"},{"address": "ff00::\/8","interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","gateway": "link","metric": "259"}],"interfaces": [{"friendly": "Ethernet 2","id": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}","name": "Ethernet 2","description": "TAP-Windows Adapter V9","type": "Ethernet","status": "Up","bytes_received": "187651520","bytes_sent": "8967995","support_ipv4": true,"support_ipv6": true,"ips": ["fe80::1923:642e:f94e:9d84","10.4.12.129"],"gateways": ["10.4.0.1"],"bind": true,"dns4": "10.4.0.1","dns6": ""},{"friendly": "Ethernet","id": "{3734B147-25DA-4BF8-A5D2-DC0198F2AEDE}","name": "Ethernet","description": "Intel® Ethernet Connection (2) I219-V","type": "Ethernet","status": "Down","bytes_received": "0","bytes_sent": "0","support_ipv4": true,"support_ipv6": true,"ips": ["fe80::9af:cbb8:5bf6:daf5","169.254.218.245"],"gateways": [],"bind": true,"dns4": "","dns6": ""},{"friendly": "Local Area Connection* 1","id": "{CDE07587-CBC4-4511-98F0-1DE08E03741B}","name": "Local Area Connection* 1","description": "Microsoft Wi-Fi Direct Virtual Adapter","type": "Wireless80211","status": "Down","bytes_received": "0","bytes_sent": "0","support_ipv4": true,"support_ipv6": true,"ips": ["fe80::1826:7eb5:c160:2961","169.254.41.97"],"gateways": [],"bind": true,"dns4": "","dns6": ""},{"friendly": "Local Area Connection* 2","id": "{5D425C74-E6CB-4C46-B97E-37E055CB402F}","name": "Local Area Connection* 2","description": "Microsoft Wi-Fi Direct Virtual Adapter #2","type": "Wireless80211","status": "Down","bytes_received": "0","bytes_sent": "0","support_ipv4": true,"support_ipv6": true,"ips": ["fe80::6cce:906e:581f:8776","169.254.135.118"],"gateways": [],"bind": true,"dns4": "","dns6": ""},{"friendly": "Wi-Fi","id": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}","name": "Wi-Fi","description": "D-Link DWA-582 Wireless AC1200 Dual Band PCI Express Adapter","type": "Wireless80211","status": "Up","bytes_received": "1266311438","bytes_sent": "38479803","support_ipv4": true,"support_ipv6": true,"ips": ["2604:3d08:807f:fff2::4b9b","2604:3d08:807f:fff2:d9a:651b:8f8c:3d75","2604:3d08:807f:fff2:6068:eaf3:7657:beff","fe80::d9a:651b:8f8c:3d75","10.0.0.28"],"gateways": ["10.0.0.1"],"bind": true,"dns4": "","dns6": ""},{"friendly": "Loopback Pseudo-Interface 1","id": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}","name": "Loopback Pseudo-Interface 1","description": "Software Loopback Interface 1","type": "Loopback","status": "Up","bytes_received": "0","bytes_sent": "0","support_ipv4": true,"support_ipv6": true,"ips": ["::1","127.0.0.1"],"gateways": [],"bind": true,"dns4": "","dns6": null}],"ipv4-default-gateway": "10.4.0.1","ipv4-default-interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}"}----------------------------ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : DESKTOP-UP0BGVO Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : vc.shawcable.net Ethernet adapter Ethernet 2: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-F8-AA-B3-0B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::1923:642e:f94e:9d84%40(Preferred) IPv4 Address. . . . . . . . . . . : 10.4.12.129(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.0.0 Lease Obtained. . . . . . . . . . : Sunday, June 10, 2018 1:07:03 PM Lease Expires . . . . . . . . . . : Monday, June 10, 2019 1:07:03 PM Default Gateway . . . . . . . . . : DHCP Server . . . . . . . . . . . : 10.4.255.254 DHCPv6 IAID . . . . . . . . . . . : 671154168 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-22-AF-26-EA-40--5C-E5-42-9D DNS Servers . . . . . . . . . . . : 10.4.0.1 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Intel® Ethernet Connection (2) I219-V Physical Address. . . . . . . . . : 40--5C-E5-42-9D DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 7A-32-1B-A9-F1-6B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2 Physical Address. . . . . . . . . : 78-32-1B-A9-F1-6B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi: Connection-specific DNS Suffix . : vc.shawcable.net Description . . . . . . . . . . . : D-Link DWA-582 Wireless AC1200 Dual Band PCI Express Adapter Physical Address. . . . . . . . . : 78-32-1B-A9-F1-6B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2604:3d08:807f:fff2::4b9b(Preferred) Lease Obtained. . . . . . . . . . : Sunday, June 10, 2018 11:52:40 AM Lease Expires . . . . . . . . . . : Sunday, June 17, 2018 11:31:47 AM IPv6 Address. . . . . . . . . . . : 2604:3d08:807f:fff2:d9a:651b:8f8c:3d75(Deprecated) Temporary IPv6 Address. . . . . . : 2604:3d08:807f:fff2:6068:eaf3:7657:beff(Deprecated) Link-local IPv6 Address . . . . . : fe80::d9a:651b:8f8c:3d75%17(Preferred) IPv4 Address. . . . . . . . . . . : 10.0.0.28(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Sunday, June 10, 2018 11:52:35 AM Lease Expires . . . . . . . . . . : Sunday, June 17, 2018 11:52:35 AM Default Gateway . . . . . . . . . : 10.0.0.1 DHCP Server . . . . . . . . . . . : 10.0.0.1 DHCPv6 IAID . . . . . . . . . . . : 158872091 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-22-AF-26-EA-40--5C-E5-42-9D DNS Servers . . . . . . . . . . . : 2001:4e8:0:4009::11 2001:4e8:0:4007::15 10.0.0.1 NetBIOS over Tcpip. . . . . . . . : Enabled
  15. I would like for someone to offer a clear explanation of the "Protocols" tab under "Settings" for Eddie. More specifically, what do the numbers (1, 2, 3, 4) under the heading of "IP" refer to? Also, if an explanation is necessary, how does the "IP" heading pertain to the other headings found under the "Protocols" tab? If this question has been answered elsewhere in the forums, I do apologize for my blindness and inability to find it. Thanks in advance to the person(s) answering this n00b question.
  16. I am having difficulties installing the eddie-ui_2.13.6_linux_x64_debian.deb file on my Kubuntu 18.04 install as it gives the error message "Cannot satisfy dependencies". I've searched the forums but there's been no solution to this problem. A screenshot of the installer showing the error message has been attached to the post. How can I fix this? https://i.imgur.com/EbsKYlM.png
  17. Hello, dear developers! Any news on making Linux native version of Eddie? Thank you!
  18. So when I download torrents and other data I appear to have thing configured properly. Using a forwarded port, setting QTorrent to use only ethernet (the connection AirVpn is using through Eddie) and setting eddie to Force use of the VPN or it will kill all connections. The speeds I'm getting on the server are decent like 5 MBp/s that is Megabytes per second. I've also used Ipleak and other leak tests for Qtorrent and NONE of them show any leaks to my actual IP. Ok, so that's all good news, but why when I open Eddie to the Overview page it shows that my download speed is like 60 Mbps as in Megabits per second which would be around 600 Kilobytes. This is not accurately showing the actual download speeds I get, or the upload speeds. Why is this happening? I appreciate the help!
  19. Since yesterday I cant connect to any address without using Eddie. I deactivated network lock but I'm still not able to connect. IPtables state: sudo iptables --list Chain INPUT (policy ACCEPT) target prot opt source destination Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination sudo ip6tables --list Chain INPUT (policy ACCEPT) target prot opt source destination Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Content of /etc/resolv.conf: # Dynamic resolv.conf(5) file for glibc resolver(3) generated by resolvconf(8) # DO NOT EDIT THIS FILE BY HAND -- YOUR CHANGES WILL BE OVERWRITTEN # 127.0.0.53 is the systemd-resolved stub resolver. # run "systemd-resolve --status" to see details about the actual nameservers. nameserver 127.0.0.53 Also ping to any address isnt working: ping: google.com: Name or service not known The connection through Eddie in any server of airVPN works without any troubles. Any ideas what is wrong?
  20. running headless eddie 2.12.4 on ubuntu 14.04 using this command sudo /usr/bin/airvpn -cli -login='xxx' -password='xxx' -connect -netlock i got hit with a dmca notice on my server ip. i checked logs and saw that the vpn disconnected for a moment and it looks like the netlock did not work as the real ip was exposed.
  21. Hi! We have work witout problems with eddie client , in a few days all servers its really slow some 3 or 15 mb and i dont understand why change browser , check firewall and antivirus rules , and i cannt see any error in log files any help ??or what i need check? have windows 8 service pack 1 os 64bits my connection 100 MB down 30 up regards!
  22. Hello, I'm trying to use Eddie with other VPN providers and comparing it with OpenVPN GUI. ZoogVPN, and vpnbook .ovpn config files both work with OpenVPN GUI and Eddie. FinchVPN config file works with OpenVPN GUI but does not work with Eddie. I suspect it has something to do with a FinchVPN account.key file that I have in the config directory that Eddie is not picking up or something like that. Any ideas what I should do? Thanks
  23. Question... If I just click the "X" in the upper right corner to close the program, Eddie doesn't always automatically deactivate the network lock. Sometimes it does, and sometimes it doesn't. Is this a bug, or am I using the program incorrectly? What I mean is, am I always supposed to click the Deactivate button before exiting Eddie? If I do that, it always works. I'm using Eddie 2.12.4 on Linux Mint 18.1 Serena.
  24. hi and thanks for your great software when I connecting to AirVPN, my Norton MacOs Antivirus warning me, some ip wants to connect this: "security_authtrampoline" 1-what is this? 2-its ok to allowed or not? 3-if I allowed hackers can to connecting too? or just Airvpn?
×
×
  • Create New...