Jump to content
Not connected, Your IP: 52.14.0.24

Search the Community

Showing results for tags 'eddie-UI'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 10 results

  1. I have been having this issue since I installed Arch about a month ago.* When I am connected to my school's wifi and Air, and am browsing Firefox, websites like Reddit, Tumblr, and the AirVPN site itself will fail to load with the heading "Did Not Connect: Potential Security Issue" and the error "sec_error_unknown_issuer." A few other sites, the ones I've encountered being maia.crimew.gay and bandcamp.com, will fail to connect with an insecure connection and after clicking "continue to HTTP site" a few times open into Cisco Umbrella's blocked website page. I recently discovered that I can bypass all of this temporarily by turning on Firefox's DNS over HTTPS at the Increased Protection level.** However, I also experience the connection issue when attempting to open the Discord application, so the DoH on Firefox is only a partial solution. When I am connected to wifi and Air at home, or at another person's house, I do not experience any of these issues, but I have not had the opportunity to test on other public wifi connections so I do not know if it is specific to my school's wifi. When I run Eddie, the option to Connect to Recommended Server gets me stuck on the latency tests, so I have temporarily disabled them, but typically I can bypass that issue by selecting a specific server from the list of those available. At this point, everything in the connection process appears to go smoothly until the attempt to Check DNS. Occasionally it will go through on its first try or after the 4° try***, but usually it gets stuck in a loop of failing to connect and I have to disable DNS Check in order to connect to any server. I have attached eddie-system-report.txt and pasted my current logs, I hope they are useful. . 2023.12.05 11:09:48 - Eddie version: 2.21.8 / linux_x64, System: Linux, Name: Arch Linux, Version: Linux LAPTOP-WHEE-LINUX 6.6.3-arch1-1 #1 SMP PREEMPT_DYNAMIC Wed, 29 Nov 2023 00:37:40 +0000 x86_64 GNU/Linux, Mono/.Net: 6.12.0 (makepkg/d9a6e8710b3 Thu Aug 31 10:53:20 UTC 2023); Framework: v4.0.30319 . 2023.12.05 11:09:48 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2023.12.05 11:09:48 - Raise system privileges . 2023.12.05 11:09:57 - Reading options from /home/fin/.config/eddie/default.profile . 2023.12.05 11:09:58 - OpenVPN - Version: 2.6.8 - OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 (/usr/bin/openvpn) . 2023.12.05 11:09:58 - SSH - Version: OpenSSH_9.5p1, OpenSSL 3.1.4 24 Oct 2023 (/usr/bin/ssh) I 2023.12.05 11:09:58 - SSL - Not available . 2023.12.05 11:09:58 - curl - Version: 8.4.0 (/usr/bin/curl) I 2023.12.05 11:09:59 - Ready . 2023.12.05 11:10:00 - Collect information about AirVPN completed I 2023.12.05 11:10:14 - Session starting. I 2023.12.05 11:10:14 - Checking authorization ... ! 2023.12.05 11:10:15 - Connecting to Chort (Canada, Toronto, Ontario) . 2023.12.05 11:10:15 - Routes, add 104.254.90.237/32 for interface "wlan0". . 2023.12.05 11:10:15 - Routes, add 104.254.90.237/32 for interface "wlan0", already exists. . 2023.12.05 11:10:15 - OpenVPN > Note: --data-cipher-fallback with cipher 'AES-256-CBC' disables data channel offload. . 2023.12.05 11:10:15 - OpenVPN > OpenVPN 2.6.8 [git:makepkg/3b0d9489cc423da3+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Nov 17 2023 . 2023.12.05 11:10:15 - OpenVPN > library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 . 2023.12.05 11:10:15 - OpenVPN > DCO version: N/A . 2023.12.05 11:10:15 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.237:443 . 2023.12.05 11:10:15 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2023.12.05 11:10:15 - OpenVPN > UDPv4 link local: (not bound) . 2023.12.05 11:10:15 - OpenVPN > UDPv4 link remote: [AF_INET]104.254.90.237:443 . 2023.12.05 11:10:15 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.237:443, sid=d431c521 be37d7ea . 2023.12.05 11:10:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.12.05 11:10:15 - OpenVPN > VERIFY KU OK . 2023.12.05 11:10:15 - OpenVPN > Validating certificate extended key usage . 2023.12.05 11:10:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.12.05 11:10:15 - OpenVPN > VERIFY EKU OK . 2023.12.05 11:10:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chort, emailAddress=info@airvpn.org . 2023.12.05 11:10:16 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 . 2023.12.05 11:10:16 - OpenVPN > [Chort] Peer Connection Initiated with [AF_INET]104.254.90.237:443 . 2023.12.05 11:10:16 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.12.05 11:10:16 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.12.05 11:10:16 - OpenVPN > SENT CONTROL [Chort]: 'PUSH_REQUEST' (status=1) . 2023.12.05 11:10:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.14.54.1,dhcp-option DNS6 fde6:7a:7d20:a36::1,tun-ipv6,route-gateway 10.14.54.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:a36::1036/64 fde6:7a:7d20:a36::1,ifconfig 10.14.54.56 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.12.05 11:10:16 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.12.05 11:10:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.14.54.1' . 2023.12.05 11:10:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:a36::1' . 2023.12.05 11:10:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.12.05 11:10:16 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.12.05 11:10:16 - OpenVPN > TUN/TAP device tun0 opened . 2023.12.05 11:10:16 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:10:16 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:10:16 - OpenVPN > net_addr_v4_add: 10.14.54.56/24 dev tun0 . 2023.12.05 11:10:16 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:10:16 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:10:16 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:a36::1036/64 dev tun0 . 2023.12.05 11:10:16 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 2, compression: 'stub' . 2023.12.05 11:10:16 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.12.05 11:10:16 - OpenVPN > Protocol options: explicit-exit-notify 5 . 2023.12.05 11:10:22 - OpenVPN > Initialization Sequence Completed . 2023.12.05 11:10:22 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.12.05 11:10:22 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.12.05 11:10:22 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.12.05 11:10:22 - Routes, add ::/1 for interface "tun0". . 2023.12.05 11:10:22 - Routes, add 8000::/1 for interface "tun0". . 2023.12.05 11:10:22 - Routes, add 104.254.90.235/32 for interface "tun0". . 2023.12.05 11:10:22 - Routes, add 2606:6080:2001:8:df6a:e365:26ff:7f06/128 for interface "tun0". . 2023.12.05 11:10:22 - Flushing DNS I 2023.12.05 11:10:22 - Checking route IPv4 I 2023.12.05 11:10:22 - Checking route IPv6 I 2023.12.05 11:10:23 - Checking DNS . 2023.12.05 11:10:30 - Checking DNS (4° try) . 2023.12.05 11:10:34 - Checking DNS (5° try) E 2023.12.05 11:10:34 - Checking DNS failed, last reason: Checking DNS failed: ! 2023.12.05 11:10:34 - Disconnecting . 2023.12.05 11:10:34 - Sending soft termination signal . 2023.12.05 11:10:34 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4) . 2023.12.05 11:10:34 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.12.05 11:10:39 - OpenVPN > Closing TUN/TAP interface . 2023.12.05 11:10:39 - OpenVPN > net_addr_v4_del: 10.14.54.56 dev tun0 . 2023.12.05 11:10:39 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:a36::1036/64 dev tun0 . 2023.12.05 11:10:39 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.12.05 11:10:39 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:10:39 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:10:39 - Routes, delete ::/1 for interface "tun0", not exists. . 2023.12.05 11:10:39 - Routes, delete 8000::/1 for interface "tun0", not exists. . 2023.12.05 11:10:39 - Routes, delete 104.254.90.237/32 for interface "wlan0". . 2023.12.05 11:10:39 - Routes, delete 104.254.90.235/32 for interface "tun0", not exists. . 2023.12.05 11:10:39 - Routes, delete 2606:6080:2001:8:df6a:e365:26ff:7f06/128 for interface "tun0", not exists. . 2023.12.05 11:10:39 - Routes, delete 104.254.90.237/32 for interface "wlan0", not exists. . 2023.12.05 11:10:39 - DNS of the system restored to original settings (Rename method) . 2023.12.05 11:10:39 - Connection terminated. . 2023.12.05 11:10:43 - Waiting for latency tests (18 to go) I 2023.12.05 11:11:02 - Cancel requested. ! 2023.12.05 11:11:02 - Session terminated. I 2023.12.05 11:11:07 - Session starting. I 2023.12.05 11:11:07 - Checking authorization ... ! 2023.12.05 11:11:08 - Connecting to Regulus (Canada, Toronto, Ontario) . 2023.12.05 11:11:08 - Routes, add 184.75.221.37/32 for interface "wlan0". . 2023.12.05 11:11:08 - Routes, add 184.75.221.37/32 for interface "wlan0", already exists. . 2023.12.05 11:11:08 - OpenVPN > Note: --data-cipher-fallback with cipher 'AES-256-CBC' disables data channel offload. . 2023.12.05 11:11:08 - OpenVPN > OpenVPN 2.6.8 [git:makepkg/3b0d9489cc423da3+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Nov 17 2023 . 2023.12.05 11:11:08 - OpenVPN > library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 . 2023.12.05 11:11:08 - OpenVPN > DCO version: N/A . 2023.12.05 11:11:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.37:443 . 2023.12.05 11:11:08 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2023.12.05 11:11:08 - OpenVPN > UDPv4 link local: (not bound) . 2023.12.05 11:11:08 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.221.37:443 . 2023.12.05 11:11:08 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.37:443, sid=731b8854 25ebc26d . 2023.12.05 11:11:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.12.05 11:11:08 - OpenVPN > VERIFY KU OK . 2023.12.05 11:11:08 - OpenVPN > Validating certificate extended key usage . 2023.12.05 11:11:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.12.05 11:11:08 - OpenVPN > VERIFY EKU OK . 2023.12.05 11:11:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2023.12.05 11:11:08 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 . 2023.12.05 11:11:08 - OpenVPN > [Regulus] Peer Connection Initiated with [AF_INET]184.75.221.37:443 . 2023.12.05 11:11:08 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.12.05 11:11:08 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.12.05 11:11:09 - OpenVPN > SENT CONTROL [Regulus]: 'PUSH_REQUEST' (status=1) . 2023.12.05 11:11:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.22.1,dhcp-option DNS6 fde6:7a:7d20:1816::1,tun-ipv6,route-gateway 10.28.22.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1816::1040/64 fde6:7a:7d20:1816::1,ifconfig 10.28.22.66 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2023.12.05 11:11:09 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.12.05 11:11:09 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.22.1' . 2023.12.05 11:11:09 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1816::1' . 2023.12.05 11:11:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.12.05 11:11:09 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.12.05 11:11:09 - OpenVPN > TUN/TAP device tun0 opened . 2023.12.05 11:11:09 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:11:09 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:11:09 - OpenVPN > net_addr_v4_add: 10.28.22.66/24 dev tun0 . 2023.12.05 11:11:09 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:11:09 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:11:09 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:1816::1040/64 dev tun0 . 2023.12.05 11:11:09 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 5, compression: 'stub' . 2023.12.05 11:11:09 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.12.05 11:11:09 - OpenVPN > Protocol options: explicit-exit-notify 5 . 2023.12.05 11:11:15 - OpenVPN > Initialization Sequence Completed . 2023.12.05 11:11:15 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.12.05 11:11:15 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.12.05 11:11:15 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.12.05 11:11:15 - Routes, add ::/1 for interface "tun0". . 2023.12.05 11:11:15 - Routes, add 8000::/1 for interface "tun0". . 2023.12.05 11:11:15 - Routes, add 184.75.221.35/32 for interface "tun0". . 2023.12.05 11:11:15 - Routes, add 2606:6080:1001:e:2e9c:bad5:dbdd:84ea/128 for interface "tun0". . 2023.12.05 11:11:15 - Flushing DNS I 2023.12.05 11:11:15 - Checking route IPv4 I 2023.12.05 11:11:15 - Checking route IPv6 I 2023.12.05 11:11:16 - Checking DNS . 2023.12.05 11:11:23 - Checking DNS (4° try) . 2023.12.05 11:11:27 - Checking DNS (5° try) E 2023.12.05 11:11:27 - Checking DNS failed, last reason: Checking DNS failed: ! 2023.12.05 11:11:27 - Disconnecting . 2023.12.05 11:11:27 - Sending soft termination signal . 2023.12.05 11:11:27 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4) . 2023.12.05 11:11:27 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.12.05 11:11:32 - OpenVPN > Closing TUN/TAP interface . 2023.12.05 11:11:32 - OpenVPN > net_addr_v4_del: 10.28.22.66 dev tun0 . 2023.12.05 11:11:32 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:1816::1040/64 dev tun0 . 2023.12.05 11:11:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.12.05 11:11:32 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:11:32 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:11:32 - Routes, delete ::/1 for interface "tun0", not exists. . 2023.12.05 11:11:33 - Routes, delete 8000::/1 for interface "tun0", not exists. . 2023.12.05 11:11:33 - Routes, delete 184.75.221.37/32 for interface "wlan0". . 2023.12.05 11:11:33 - Routes, delete 184.75.221.35/32 for interface "tun0", not exists. . 2023.12.05 11:11:33 - Routes, delete 2606:6080:1001:e:2e9c:bad5:dbdd:84ea/128 for interface "tun0", not exists. . 2023.12.05 11:11:33 - Routes, delete 184.75.221.37/32 for interface "wlan0", not exists. . 2023.12.05 11:11:33 - DNS of the system restored to original settings (Rename method) . 2023.12.05 11:11:33 - Connection terminated. I 2023.12.05 11:11:36 - Checking authorization ... ! 2023.12.05 11:11:37 - Connecting to Lesath (Canada, Toronto, Ontario) . 2023.12.05 11:11:37 - Routes, add 184.75.221.5/32 for interface "wlan0". . 2023.12.05 11:11:37 - Routes, add 184.75.221.5/32 for interface "wlan0", already exists. . 2023.12.05 11:11:37 - OpenVPN > Note: --data-cipher-fallback with cipher 'AES-256-CBC' disables data channel offload. . 2023.12.05 11:11:37 - OpenVPN > OpenVPN 2.6.8 [git:makepkg/3b0d9489cc423da3+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Nov 17 2023 . 2023.12.05 11:11:37 - OpenVPN > library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 . 2023.12.05 11:11:37 - OpenVPN > DCO version: N/A . 2023.12.05 11:11:37 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.5:443 . 2023.12.05 11:11:37 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2023.12.05 11:11:37 - OpenVPN > UDPv4 link local: (not bound) . 2023.12.05 11:11:37 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.221.5:443 . 2023.12.05 11:11:37 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.5:443, sid=dd0a6bbd ed6eb272 . 2023.12.05 11:11:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.12.05 11:11:37 - OpenVPN > VERIFY KU OK . 2023.12.05 11:11:37 - OpenVPN > Validating certificate extended key usage . 2023.12.05 11:11:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.12.05 11:11:37 - OpenVPN > VERIFY EKU OK . 2023.12.05 11:11:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org . 2023.12.05 11:11:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 . 2023.12.05 11:11:37 - OpenVPN > [Lesath] Peer Connection Initiated with [AF_INET]184.75.221.5:443 . 2023.12.05 11:11:37 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.12.05 11:11:37 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.12.05 11:11:38 - OpenVPN > SENT CONTROL [Lesath]: 'PUSH_REQUEST' (status=1) . 2023.12.05 11:11:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.246.1,dhcp-option DNS6 fde6:7a:7d20:10f6::1,tun-ipv6,route-gateway 10.20.246.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:10f6::100e/64 fde6:7a:7d20:10f6::1,ifconfig 10.20.246.16 255.255.255.0,peer-id 10,cipher AES-256-GCM' . 2023.12.05 11:11:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.12.05 11:11:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.20.246.1' . 2023.12.05 11:11:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:10f6::1' . 2023.12.05 11:11:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.12.05 11:11:38 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.12.05 11:11:38 - OpenVPN > TUN/TAP device tun0 opened . 2023.12.05 11:11:38 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:11:38 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:11:38 - OpenVPN > net_addr_v4_add: 10.20.246.16/24 dev tun0 . 2023.12.05 11:11:38 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:11:38 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:11:38 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:10f6::100e/64 dev tun0 . 2023.12.05 11:11:38 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 10, compression: 'stub' . 2023.12.05 11:11:38 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.12.05 11:11:38 - OpenVPN > Protocol options: explicit-exit-notify 5 . 2023.12.05 11:11:43 - OpenVPN > Initialization Sequence Completed . 2023.12.05 11:11:43 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.12.05 11:11:43 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.12.05 11:11:43 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.12.05 11:11:43 - Routes, add ::/1 for interface "tun0". . 2023.12.05 11:11:43 - Routes, add 8000::/1 for interface "tun0". . 2023.12.05 11:11:43 - Routes, add 184.75.221.3/32 for interface "tun0". . 2023.12.05 11:11:43 - Routes, add 2606:6080:1001:d:c59c:6e9a:3115:6f2f/128 for interface "tun0". . 2023.12.05 11:11:43 - Flushing DNS I 2023.12.05 11:11:43 - Checking route IPv4 I 2023.12.05 11:11:44 - Checking route IPv6 I 2023.12.05 11:11:45 - Checking DNS . 2023.12.05 11:11:52 - Checking DNS (4° try) . 2023.12.05 11:11:57 - Checking DNS (5° try) E 2023.12.05 11:11:57 - Checking DNS failed, last reason: Checking DNS failed: ! 2023.12.05 11:11:57 - Disconnecting . 2023.12.05 11:11:57 - Sending soft termination signal . 2023.12.05 11:11:58 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4) . 2023.12.05 11:11:58 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.12.05 11:12:02 - OpenVPN > Closing TUN/TAP interface . 2023.12.05 11:12:02 - OpenVPN > net_addr_v4_del: 10.20.246.16 dev tun0 . 2023.12.05 11:12:02 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:10f6::100e/64 dev tun0 . 2023.12.05 11:12:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.12.05 11:12:02 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:12:02 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:12:02 - Routes, delete ::/1 for interface "tun0", not exists. . 2023.12.05 11:12:02 - Routes, delete 8000::/1 for interface "tun0", not exists. . 2023.12.05 11:12:03 - Routes, delete 184.75.221.5/32 for interface "wlan0". . 2023.12.05 11:12:03 - Routes, delete 184.75.221.3/32 for interface "tun0", not exists. . 2023.12.05 11:12:03 - Routes, delete 2606:6080:1001:d:c59c:6e9a:3115:6f2f/128 for interface "tun0", not exists. . 2023.12.05 11:12:03 - Routes, delete 184.75.221.5/32 for interface "wlan0", not exists. . 2023.12.05 11:12:03 - DNS of the system restored to original settings (Rename method) . 2023.12.05 11:12:03 - Connection terminated. I 2023.12.05 11:12:06 - Checking authorization ... ! 2023.12.05 11:12:07 - Connecting to Sargas (Canada, Toronto, Ontario) . 2023.12.05 11:12:07 - Routes, add 184.75.223.197/32 for interface "wlan0". . 2023.12.05 11:12:07 - Routes, add 184.75.223.197/32 for interface "wlan0", already exists. . 2023.12.05 11:12:07 - OpenVPN > Note: --data-cipher-fallback with cipher 'AES-256-CBC' disables data channel offload. . 2023.12.05 11:12:07 - OpenVPN > OpenVPN 2.6.8 [git:makepkg/3b0d9489cc423da3+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Nov 17 2023 . 2023.12.05 11:12:07 - OpenVPN > library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 . 2023.12.05 11:12:07 - OpenVPN > DCO version: N/A . 2023.12.05 11:12:07 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.197:443 . 2023.12.05 11:12:07 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2023.12.05 11:12:07 - OpenVPN > UDPv4 link local: (not bound) . 2023.12.05 11:12:07 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.197:443 . 2023.12.05 11:12:07 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.197:443, sid=3b54906a 5613b08f . 2023.12.05 11:12:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.12.05 11:12:07 - OpenVPN > VERIFY KU OK . 2023.12.05 11:12:07 - OpenVPN > Validating certificate extended key usage . 2023.12.05 11:12:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.12.05 11:12:07 - OpenVPN > VERIFY EKU OK . 2023.12.05 11:12:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sargas, emailAddress=info@airvpn.org . 2023.12.05 11:12:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 . 2023.12.05 11:12:07 - OpenVPN > [Sargas] Peer Connection Initiated with [AF_INET]184.75.223.197:443 . 2023.12.05 11:12:07 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.12.05 11:12:07 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.12.05 11:12:08 - OpenVPN > SENT CONTROL [Sargas]: 'PUSH_REQUEST' (status=1) . 2023.12.05 11:12:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.54.1,dhcp-option DNS6 fde6:7a:7d20:1936::1,tun-ipv6,route-gateway 10.29.54.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1936::1065/64 fde6:7a:7d20:1936::1,ifconfig 10.29.54.103 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.12.05 11:12:08 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.12.05 11:12:08 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.29.54.1' . 2023.12.05 11:12:08 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1936::1' . 2023.12.05 11:12:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.12.05 11:12:08 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.12.05 11:12:08 - OpenVPN > TUN/TAP device tun0 opened . 2023.12.05 11:12:08 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:12:08 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:12:08 - OpenVPN > net_addr_v4_add: 10.29.54.103/24 dev tun0 . 2023.12.05 11:12:08 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:12:08 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:12:08 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:1936::1065/64 dev tun0 . 2023.12.05 11:12:08 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 3, compression: 'stub' . 2023.12.05 11:12:08 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.12.05 11:12:08 - OpenVPN > Protocol options: explicit-exit-notify 5 . 2023.12.05 11:12:13 - OpenVPN > Initialization Sequence Completed . 2023.12.05 11:12:13 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.12.05 11:12:13 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.12.05 11:12:13 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.12.05 11:12:13 - Routes, add ::/1 for interface "tun0". . 2023.12.05 11:12:13 - Routes, add 8000::/1 for interface "tun0". . 2023.12.05 11:12:14 - Routes, add 184.75.223.195/32 for interface "tun0". . 2023.12.05 11:12:14 - Routes, add 2606:6080:1002:4:88e7:e893:3692:25d2/128 for interface "tun0". . 2023.12.05 11:12:14 - Flushing DNS I 2023.12.05 11:12:14 - Checking route IPv4 I 2023.12.05 11:12:14 - Checking route IPv6 I 2023.12.05 11:12:14 - Checking DNS . 2023.12.05 11:12:21 - Checking DNS (4° try) . 2023.12.05 11:12:26 - Checking DNS (5° try) E 2023.12.05 11:12:26 - Checking DNS failed, last reason: Checking DNS failed: ! 2023.12.05 11:12:26 - Disconnecting . 2023.12.05 11:12:26 - Sending soft termination signal . 2023.12.05 11:12:26 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4) . 2023.12.05 11:12:26 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.12.05 11:12:32 - OpenVPN > Closing TUN/TAP interface . 2023.12.05 11:12:32 - OpenVPN > net_addr_v4_del: 10.29.54.103 dev tun0 . 2023.12.05 11:12:32 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:1936::1065/64 dev tun0 . 2023.12.05 11:12:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.12.05 11:12:32 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:12:32 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:12:32 - Routes, delete ::/1 for interface "tun0", not exists. . 2023.12.05 11:12:32 - Routes, delete 8000::/1 for interface "tun0", not exists. . 2023.12.05 11:12:32 - Routes, delete 184.75.223.197/32 for interface "wlan0". . 2023.12.05 11:12:32 - Routes, delete 184.75.223.195/32 for interface "tun0", not exists. . 2023.12.05 11:12:32 - Routes, delete 2606:6080:1002:4:88e7:e893:3692:25d2/128 for interface "tun0", not exists. . 2023.12.05 11:12:32 - Routes, delete 184.75.223.197/32 for interface "wlan0", not exists. . 2023.12.05 11:12:32 - DNS of the system restored to original settings (Rename method) . 2023.12.05 11:12:32 - Connection terminated. I 2023.12.05 11:12:35 - Checking authorization ... ! 2023.12.05 11:12:36 - Connecting to Alwaid (Canada, Toronto, Ontario) . 2023.12.05 11:12:36 - Routes, add 184.75.221.109/32 for interface "wlan0". . 2023.12.05 11:12:36 - Routes, add 184.75.221.109/32 for interface "wlan0", already exists. . 2023.12.05 11:12:37 - OpenVPN > Note: --data-cipher-fallback with cipher 'AES-256-CBC' disables data channel offload. . 2023.12.05 11:12:37 - OpenVPN > OpenVPN 2.6.8 [git:makepkg/3b0d9489cc423da3+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Nov 17 2023 . 2023.12.05 11:12:37 - OpenVPN > library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 . 2023.12.05 11:12:37 - OpenVPN > DCO version: N/A . 2023.12.05 11:12:37 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.109:443 . 2023.12.05 11:12:37 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2023.12.05 11:12:37 - OpenVPN > UDPv4 link local: (not bound) . 2023.12.05 11:12:37 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.221.109:443 . 2023.12.05 11:12:37 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.109:443, sid=11a2f4a0 5d4c0177 . 2023.12.05 11:12:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.12.05 11:12:37 - OpenVPN > VERIFY KU OK . 2023.12.05 11:12:37 - OpenVPN > Validating certificate extended key usage . 2023.12.05 11:12:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.12.05 11:12:37 - OpenVPN > VERIFY EKU OK . 2023.12.05 11:12:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org . 2023.12.05 11:12:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 . 2023.12.05 11:12:37 - OpenVPN > [Alwaid] Peer Connection Initiated with [AF_INET]184.75.221.109:443 . 2023.12.05 11:12:37 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.12.05 11:12:37 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.12.05 11:12:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.150.1,dhcp-option DNS6 fde6:7a:7d20:496::1,tun-ipv6,route-gateway 10.8.150.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:496::106f/64 fde6:7a:7d20:496::1,ifconfig 10.8.150.113 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.12.05 11:12:37 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.12.05 11:12:37 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.8.150.1' . 2023.12.05 11:12:37 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:496::1' . 2023.12.05 11:12:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.12.05 11:12:37 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.12.05 11:12:37 - OpenVPN > TUN/TAP device tun0 opened . 2023.12.05 11:12:37 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:12:37 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:12:37 - OpenVPN > net_addr_v4_add: 10.8.150.113/24 dev tun0 . 2023.12.05 11:12:37 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:12:37 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:12:37 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:496::106f/64 dev tun0 . 2023.12.05 11:12:37 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 0, compression: 'stub' . 2023.12.05 11:12:37 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.12.05 11:12:37 - OpenVPN > Protocol options: explicit-exit-notify 5 . 2023.12.05 11:12:42 - OpenVPN > Initialization Sequence Completed . 2023.12.05 11:12:42 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.12.05 11:12:42 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.12.05 11:12:43 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.12.05 11:12:43 - Routes, add ::/1 for interface "tun0". . 2023.12.05 11:12:43 - Routes, add 8000::/1 for interface "tun0". . 2023.12.05 11:12:43 - Routes, add 184.75.221.107/32 for interface "tun0". . 2023.12.05 11:12:43 - Routes, add 2606:6080:1001:30:5f94:f242:c829:1017/128 for interface "tun0". . 2023.12.05 11:12:43 - Flushing DNS I 2023.12.05 11:12:43 - Checking route IPv4 I 2023.12.05 11:12:43 - Checking route IPv6 ! 2023.12.05 11:12:44 - Connected. . 2023.12.05 11:40:05 - Collect information about AirVPN completed . 2023.12.05 12:10:11 - Collect information about AirVPN completed . 2023.12.05 12:12:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.12.05 12:12:10 - OpenVPN > VERIFY KU OK . 2023.12.05 12:12:10 - OpenVPN > Validating certificate extended key usage . 2023.12.05 12:12:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.12.05 12:12:10 - OpenVPN > VERIFY EKU OK . 2023.12.05 12:12:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org . 2023.12.05 12:12:10 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 * I have never experienced it before so I have been assuming that somewhere it has something to do with necessary programs and processes I may have been unaware of or installed incorrectly when I started with Arch. ** This only works if I select NextDNS as the provider, Cloudflare fails with the error "(NS_ERROR_GENERATE_FAILURE(NS_ERROR_MODULE_SECURITY, SEC_ERROR_UNKNOWN_ISSUER))." *** Even if it does go through with the DNS Check enabled, the websites still fail to connect without the Firefox DoH. I do not know how to get Eddie to go through with the connection with the DNS Check enabled, so I can't test and check logs at the moment, but earlier when it worked out like that I believe an error saying something like "UHOST_UNREACHABLE" appeared (in relation to Eddie's attempts at further checking the DNS?). eddie-system-report.txt
  2. Hello everyone, I have a weird problem with Eddie, I cannot connect to any server anymore. It worked for months on Windows 11 till now. From now on : Eddie is set to connect at startup, but it doesn't seem to try to connect to the servers. If I click on “Connect to a recommended server”, it doesn’t do anything at all, just as if I hadn't clicked. I cannot close Eddie, when I close I get the confirmation window, I click “Yes”, then the confirmation window close, but Eddie doesn’t close. I must use the Windows task manager to quit. I cannot change the settings, because if I try to change them, the setting window get stucked. I must then use the Windows task manager to quit. I tried uninstalling/reinstalling, disabling my antivirus, using Malwarebyte scan, it doesn’t change anything. I tried to delete the Eddie folder in Appdata. Then, after lauching Eddie, it ask for my login, then Eddie is stucked in neverending “Checking login”. I tried disabling my ethernet connection in Windows network setting before launching Eddie. Of course Eddie can’t connect to the servers, but Eddie is no longer weirdly stucked and I can quit/change the settings properly. Eddie is again stucked if I launch it with internet connection. Thanks in advance, any help would be greatly appreciated. Logs : . 2023.12.04 21:12:55 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.22631.0, Mono/.Net: v4.0.30319 . 2023.12.04 21:12:55 - Command line arguments (1): path="home" . 2023.12.04 21:12:55 - Raise system privileges . 2023.12.04 21:12:57 - Reading options from C:\Users\tmth\AppData\Local\Eddie\default.profile . 2023.12.04 21:12:57 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2023.12.04 21:12:57 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2023.12.04 21:12:57 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2023.12.04 21:12:58 - Ready
  3. Hi, I've recently had to do a complete reset on my windows 8 PC. Following that I have tried to install the eddie-ui client. The windows 8/7 installer completed without issue, however the UI will not open giving an error of "Object reference not set to an instance of an object". To fix I have tried: The portable version of windows 8/7 gives the same error. The CLI for either version results in opening, and near immediate closure of the command prompt - I've been able to determine there are three lines printed, the first being "Method not found ... (something here I can't determine) ... System.Array.Empty". Disabling my PC's firewall has no impact on the UI executable or the CLI Running in administrator mode also does not make any change Running PC or network diagnostics (through the inbuilt windows services) does not make any change Rerunning the installer gives several errors for "Error opening file for writing: C :\Program Files\AirVPN\Eddie-UI.exe Click Abort to stop the installation, Retry to try again, or Ignore to skip this file.". Other files also impacted are Lib.Core.dll, Lib.Forms.dll, Lib.Forms.Skin.dll, and Lib.Platform.Windows.dll. The installer then completes without issue however the UI still does not open. The windows 10/11 portable version gives the same error attempting to open the UI. My installed versiono is eddie-ui_2.21.8_windows-7_x64_installer. System Details Windows 8 Processor: Intel(R) Core(TM) i5-3470 CPU @ 3.2GHz 3.20Ghz Installed memory (RAM): 10.0 GB (9.79 GB usable) System Type: 64-bit Operating System, x64-based processor Directory Contents Volume in drive C is Windows8_OS Volume Serial Number is REDACTED Directory of C:\Program Files\AirVPN 12/02/2023 08:10 AM <DIR> . 12/02/2023 08:10 AM <DIR> .. 05/26/2022 03:07 AM 323,800 Eddie-CLI-Elevated.exe 05/26/2022 03:07 AM 65,752 Eddie-CLI.exe 05/26/2022 03:08 AM 750,808 Eddie-Service-Elevated.exe 05/26/2022 03:08 AM 66,264 Eddie-UI.exe 05/26/2022 03:08 AM 343,256 Lib.Core.dll 05/26/2022 03:08 AM 2,177,752 Lib.Forms.dll 05/26/2022 03:08 AM 120,024 Lib.Forms.Skin.dll 05/26/2022 03:08 AM 78,552 Lib.Platform.Windows.dll 05/26/2022 03:08 AM 560,856 Lib.Platform.Windows.Native.dll 12/15/2021 12:57 AM 3,482,288 libcrypto-1_1-x64.dll 12/15/2021 12:57 AM 93,872 libpkcs11-helper-1.dll 12/15/2021 12:57 AM 694,448 libssl-1_1-x64.dll 12/15/2021 12:57 AM 121,008 lzo2.dll 04/19/2022 01:45 AM 1,439,328 ndp48-web.exe 12/15/2021 12:57 AM 847,536 openvpn.exe 06/12/2020 03:23 AM 678,312 plink.exe 12/02/2023 08:10 AM 0 print.txt 12/01/2023 09:45 PM <DIR> res 07/27/2021 04:06 AM 4,814,984 stunnel.exe 10/30/2019 11:34 PM 587,928 tap-windows.exe 06/17/2021 12:51 AM 45,432 tapctl.exe 12/02/2023 08:01 AM 93,256 uninstall.exe 04/21/2022 04:26 AM 25,314,320 VC_redist.x64.exe 12/16/2021 02:50 AM 3,000,552 wgtunnel.dll 06/25/2021 12:03 PM 604,848 wintun.dll 10/15/2021 11:47 PM 1,340,728 wireguard.dll 25 File(s) 47,645,904 bytes 3 Dir(s) 448,830,984,192 bytes free List of installed programs - attached. When the installer first ran it installed the latest Microsoft Visual C++ redistributable however there doesn't appear to be an issue with this. Any help getting this running would be appreciated. I previously had AirVPN working through the Eddie-UI installer on this PC before a system reset I was confident it was the same version as well. Kind Regards,
  4. Everytime I try "Connect to a recommended server" or just try one of the servers from the server list it tries to connect to it and then instantly fails. I will include the logs here below, I'm kinda new to this so any help would be highly appreciated! :D Eddie_20231114_155636.txt
  5. I can't connect AIrVPN through the TOR browser. It gives the error UDP is not allowed with a proxy. Help pls
  6. Hey guys Long term user of AirVPN here. I love it, never EVER had any issues with it. I currently use on a media server that sits in the corner of a room. No monitor, etc. I use TeamViewer to connect to the machine (Peppermint Linux) and connect Eddie. When I activate the network lock, over TeamViewer, the connection stays up and I can click the "Connect to recommended server" no problem. However, when I'm finished, and I disconnect Eddie, the TeamViewer connection drops and I cannot use it to deactivate the network lock (clearly because the network lock has stopped TeamViewer from connecting) My questions are: Why doesn't activating the network lock block TeamViewer before connecting (although I'm not overly fussed about knowing why) Is there a way of telling the network lock to allow connections from the LAN? At least if TeamViewer dropped off, I could then perhaps SSH in from another machine and deactivate the network block, for instance Anyway, its a pure annoyance, and not really AirVPN's fault - its doing its job. I'd just like to know if there is a solution, currently I have to hard reset the server when it happens (I could turn on the monitor but more often than not, it doesn't receive a signal from the graphics card - dodgy GVX card I think) I'm using Eddie 2.19.7 Thanks in advance, uwu73
  7. Recently Qbittorrent has begun locking withing 60 seconds of startup when running Eddie. Even if no torrents are active, it locks up. I am running Fedora 34 and have tried a bunch of kernels and roll backs to no avail. I have downgraded openvpn and qbittorrent (both were updated recently). I even built qbittorrent from source to test. No luck. I have tried upgrading eddie ui to the 2.21 beta and downgrading to 2.16 and 2.18. (Still no positive result) I have tried using just the root user with no torrents, I have tried Fedora 35 beta with the same result. Frankly, I'm stumped. Are there other RPMs I could try downgrading or changing? Anyone else seeing something like this?
  8. Hi all, I have an odd problem, everything on my eddie-UI is tiny (see attached). I'm running arch-manjaro-xfce-18.0.2 I have tried increasing the font in eddies settings; it increased, but not in any significant way. Any help would be greatly appreciated, Thanks, Hubert.
  9. Running Manjaro 18.0, and it occurs both with the stable and beta.
  10. Is the password you use for the client the same as the password you use to login to airvpn.org? In the commandline I am passing the password as an argument but it is saying it's wrong. Well, technically it's a wrong login. I 2018.08.25 18:23:40 - Checking login ...F 2018.08.25 18:23:41 - Wrong login/password. I can't remember my settings since they are saved in the Windows client and I've never changed them.
×
×
  • Create New...