Search the Community
Showing results for tags 'Troubleshooting'.
Found 18 results
-
So I am running opnsense and for some reason can't get airvpn to tell me I have properly opened my port for qbitorrent. I've successfully done so with mullvad in the past, but that was also with another torrent program I think. I'm using the same port as recommended for qbitorrent though opnsense into airvpn. The only hiccup might be that I have my torrent client on a separate vlan. I seem to recall opnsense having an issue with the rules for port forwarding not properly generating when adding a port forward to a non-lan interface. Anyone know anything? Thanks!
-
Hello and thanks for this great VPN service! Clients work well until I try to combine a Network Lock with Open Snitch Our browsers and applications constantly spy on our usage, requiring secure users to block these pesky telemetry echos. A secure connection is not enough. The goal is to have Manjaro (mate) 6.1.62-1 running “Open Snitch” with the Eddie client fully locked (in/out), no LAN or DNS selected. Using any of the locking mechanisms available (iptables / nftables) *Question dose not include the use of Hummingbird in the settings.* Currently using both the cli (version 2.23.2) and UI (version 2.21.8) of the Eddie client. IPv6 is disable at the system level via grub entry. **There are two different errors with the same effect just worded differently.** - UI client gives the error “Unexpected crash of elevated helper: Connection reset by peer” - CLI client gives the error “Unexpected crash of elevated helper:Network subsystem is down” Both require disabling and re-enabling "Networking" via NetworkManager in order to communicate again. Open Snitch has 3 selections for process monitoring. EPBF Proc Audit My current configuration is using “EPBF” as auto selected by Open Snitch install. The Error in Question *What is necessary to have these both running in full; so that I can control any web browser telemetry or applications that phone home with Open Snitch. While managing and controlling my LAN/VPN connections with Eddie. There simply is no such thing as online privacy if you cannot stop telemetry and secure your connection with multiple technologies at the same time from one system. The OS. Thank You for any help and have a great weekend. Happy Thanksgiving AirVPN!
-
I can''t connect to any of the servers. Here are my logs: . 2023.08.05 02:51:38 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.19045.0, Mono/.Net: v4.0.30319 . 2023.08.05 02:51:38 - Command line arguments (1): path="home" . 2023.08.05 02:51:39 - Reading options from C:\Users\María Antonieta\AppData\Local\Eddie\default.profile . 2023.08.05 02:51:41 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2023.08.05 02:51:41 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2023.08.05 02:51:41 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2023.08.05 02:51:42 - Ready . 2023.08.05 02:51:42 - Collect information about AirVPN completed I 2023.08.05 02:51:50 - Session starting. I 2023.08.05 02:51:51 - Checking authorization ... . 2023.08.05 02:51:51 - Using WinTun network interface "Local Area Connection 2 (Windscribe Windtun420)" ! 2023.08.05 02:51:52 - Connecting to Aspidiske (Netherlands, Alblasserdam) . 2023.08.05 02:51:52 - Routes, add 134.19.179.197/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)". . 2023.08.05 02:51:52 - Routes, add 134.19.179.197/32 for interface "Wi-Fi (Intel(R) Dual Band Wireless-AC 3160)", already exists. . 2023.08.05 02:51:52 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.08.05 02:51:52 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.08.05 02:51:52 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.08.05 02:51:52 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.08.05 02:51:52 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.08.05 02:51:52 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.08.05 02:51:52 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.08.05 02:51:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.197:443 . 2023.08.05 02:51:52 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.08.05 02:51:52 - OpenVPN > UDP link local: (not bound) . 2023.08.05 02:51:52 - OpenVPN > UDP link remote: [AF_INET]134.19.179.197:443 . 2023.08.05 02:51:52 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.197:443, sid=95d29327 50668003 . 2023.08.05 02:51:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.08.05 02:51:53 - OpenVPN > VERIFY KU OK . 2023.08.05 02:51:53 - OpenVPN > Validating certificate extended key usage . 2023.08.05 02:51:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.08.05 02:51:53 - OpenVPN > VERIFY EKU OK . 2023.08.05 02:51:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aspidiske, emailAddress=info@airvpn.org . 2023.08.05 02:51:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.08.05 02:51:53 - OpenVPN > [Aspidiske] Peer Connection Initiated with [AF_INET]134.19.179.197:443 . 2023.08.05 02:51:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.33.134.1,dhcp-option DNS6 fde6:7a:7d20:1d86::1,tun-ipv6,route-gateway 10.33.134.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1d86::10c6/64 fde6:7a:7d20:1d86::1,ifconfig 10.33.134.200 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.08.05 02:51:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.08.05 02:51:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.33.134.1' . 2023.08.05 02:51:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1d86::1' . 2023.08.05 02:51:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.08.05 02:51:53 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.08.05 02:51:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.08.05 02:51:53 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.08.05 02:51:53 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.08.05 02:51:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.08.05 02:51:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.08.05 02:51:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.08.05 02:51:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.08.05 02:51:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.08.05 02:51:53 - OpenVPN > interactive service msg_channel=0 . 2023.08.05 02:51:53 - OpenVPN > open_tun . 2023.08.05 02:51:53 - OpenVPN > There are no TAP-Windows nor Wintun adapters on this system. You should be able to create an adapter by using tapctl.exe utility. . 2023.08.05 02:51:53 - OpenVPN > Exiting due to fatal error ! 2023.08.05 02:51:53 - Disconnecting Anyone got any idea what's preventing me from connecting?
-
I recently moved and have a new ISP. Since then, websites have not been loading while the VPN is active even though qbittorrent still works. Here is my system info: Eddie System/Environment Report - 6/11/2021 - 5:28 PM UTC Eddie version: 2.20.0 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 8.1 Pro OS version: Microsoft Windows NT 6.3.9600.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN driver: 0901: 9.24.2; wintun: Not found OpenVPN: 2.5.1 - OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: () SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\Dobson\AppData\Local\Eddie\default.profile Data path: C:\Users\Dobson\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (1 args) path="home" Network Lock Active: No Connected to VPN: No Detected DNS: 2600:1700:1f10:5510::1, 192.168.1.254 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 102 ms Test Ping IPv6: 100 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True netlock: True servers.scoretype: Latency areas.whitelist: us dns.servers: 10.4.0.1,10.5.0.1 netlock.allow_dns: True gui.tray_minimized: False ---------------------------- Logs: . 2021.06.11 13:10:34 - Eddie version: 2.20.0 / windows_x64, System: Windows, Name: Windows 8.1 Pro, Version: Microsoft Windows NT 6.3.9600.0, Mono/.Net: v4.0.30319 . 2021.06.11 13:10:34 - Command line arguments (1): path="home" . 2021.06.11 13:10:35 - Profile path: C:\Users\Dobson\AppData\Local\Eddie\default.profile . 2021.06.11 13:10:36 - Reading options from C:\Users\Dobson\AppData\Local\Eddie\default.profile . 2021.06.11 13:10:37 - Tun Driver - 0901: 9.24.2; wintun: Not found . 2021.06.11 13:10:37 - OpenVPN - Version: 2.5.1 - OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2021.06.11 13:10:37 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe) . 2021.06.11 13:10:37 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) . 2021.06.11 13:10:38 - Recovery. Unexpected crash? . 2021.06.11 13:10:38 - Routes, added a new route, 107.167.244.83 for gateway 10.28.138.1 . 2021.06.11 13:10:38 - Routes, added a new route, 193.37.254.11 for gateway 10.33.106.1 . 2021.06.11 13:10:39 - Routes, removed an existing route, 199.249.223.130 for gateway 10.9.170.1 . 2021.06.11 13:10:39 - Routes, removed an existing route, 193.37.254.27 for gateway 10.32.10.1 . 2021.06.11 13:10:39 - Routes, removed an existing route, 199.249.223.130 for gateway 10.9.170.1 . 2021.06.11 13:10:39 - Above log line repeated 1 times more . 2021.06.11 13:10:39 - Routes, added a new route, 107.167.244.67 for gateway 10.6.170.1 ! 2021.06.11 13:10:39 - Activation of Network Lock - Windows Filtering Platform I 2021.06.11 13:10:40 - Ready . 2021.06.11 13:10:44 - Collect information about AirVPN completed I 2021.06.11 13:10:48 - Session starting. I 2021.06.11 13:10:48 - Checking authorization ... ! 2021.06.11 13:10:48 - Connecting to Hercules (United States of America, Atlanta, Georgia) . 2021.06.11 13:10:49 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.06.11 13:10:49 - OpenVPN > Windows version 6.3 (Windows 8.1) 64bit . 2021.06.11 13:10:49 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.06.11 13:10:49 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.06.11 13:10:49 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.06.11 13:10:49 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.06.11 13:10:49 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.06.11 13:10:49 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.61:443 . 2021.06.11 13:10:49 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.06.11 13:10:49 - OpenVPN > UDP link local: (not bound) . 2021.06.11 13:10:49 - OpenVPN > UDP link remote: [AF_INET]64.42.179.61:443 . 2021.06.11 13:10:49 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.61:443, sid=792b95a4 72b84583 . 2021.06.11 13:10:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.06.11 13:10:49 - OpenVPN > VERIFY KU OK . 2021.06.11 13:10:49 - OpenVPN > Validating certificate extended key usage . 2021.06.11 13:10:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.06.11 13:10:49 - OpenVPN > VERIFY EKU OK . 2021.06.11 13:10:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hercules, emailAddress=info@airvpn.org . 2021.06.11 13:10:49 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.06.11 13:10:49 - OpenVPN > [Hercules] Peer Connection Initiated with [AF_INET]64.42.179.61:443 . 2021.06.11 13:10:49 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.246.1,dhcp-option DNS6 fde6:7a:7d20:12f6::1,tun-ipv6,route-gateway 10.22.246.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:12f6::1053/64 fde6:7a:7d20:12f6::1,ifconfig 10.22.246.85 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2021.06.11 13:10:49 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.06.11 13:10:49 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.06.11 13:10:49 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.06.11 13:10:49 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.06.11 13:10:49 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.06.11 13:10:49 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.06.11 13:10:49 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.06.11 13:10:49 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.06.11 13:10:49 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.06.11 13:10:49 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.06.11 13:10:49 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.06.11 13:10:49 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.06.11 13:10:49 - OpenVPN > interactive service msg_channel=0 . 2021.06.11 13:10:49 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=9 HWADDR=44:af:28:37:39:85 . 2021.06.11 13:10:49 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2021.06.11 13:10:49 - OpenVPN > GetBestInterfaceEx() returned if=9 . 2021.06.11 13:10:49 - OpenVPN > GDG6: II=9 DP=::/0 NH=fe80::feae:34ff:fe37:f8c0 . 2021.06.11 13:10:49 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2021.06.11 13:10:49 - OpenVPN > ROUTE6_GATEWAY fe80::feae:34ff:fe37:f8c0 I=9 . 2021.06.11 13:10:49 - OpenVPN > open_tun . 2021.06.11 13:10:50 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.06.11 13:10:50 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.06.11 13:10:50 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.22.246.0/10.22.246.85/255.255.255.0 [SUCCEEDED] . 2021.06.11 13:10:50 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.22.246.85/255.255.255.0 on interface {AA3FBE9B-E983-4E45-9A9D-9D372FDF5737} [DHCP-serv: 10.22.246.254, lease-time: 31536000] . 2021.06.11 13:10:50 - OpenVPN > Successful ARP Flush on interface [3] {AA3FBE9B-E983-4E45-9A9D-9D372FDF5737} . 2021.06.11 13:10:50 - OpenVPN > IPv4 MTU set to 1500 on interface 3 using SetIpInterfaceEntry() . 2021.06.11 13:10:50 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 3 fde6:7a:7d20:12f6::1053/128 store=active . 2021.06.11 13:10:50 - OpenVPN > add_route_ipv6(fde6:7a:7d20:12f6::/64 -> fde6:7a:7d20:12f6::1053 metric 0) dev Local Area Connection . 2021.06.11 13:10:50 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:12f6::/64 3 fe80::8 store=active . 2021.06.11 13:10:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.06.11 13:10:50 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 3 all . 2021.06.11 13:10:50 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns 3 static fde6:7a:7d20:12f6::1 validate=no . 2021.06.11 13:10:50 - OpenVPN > IPv6 MTU set to 1500 on interface 3 using SetIpInterfaceEntry() . 2021.06.11 13:10:55 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.06.11 13:10:55 - OpenVPN > C:\Windows\system32\route.exe ADD 64.42.179.61 MASK 255.255.255.255 192.168.1.254 . 2021.06.11 13:10:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2021.06.11 13:10:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.06.11 13:10:55 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.22.246.1 . 2021.06.11 13:10:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2021.06.11 13:10:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.06.11 13:10:55 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.22.246.1 . 2021.06.11 13:10:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2021.06.11 13:10:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.06.11 13:10:55 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:12f6::1 metric -1) dev Local Area Connection . 2021.06.11 13:10:55 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route ::/3 3 fe80::8 store=active . 2021.06.11 13:10:55 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.06.11 13:10:55 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:12f6::1 metric -1) dev Local Area Connection . 2021.06.11 13:10:55 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 2000::/4 3 fe80::8 store=active . 2021.06.11 13:10:55 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.06.11 13:10:55 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:12f6::1 metric -1) dev Local Area Connection . 2021.06.11 13:10:55 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 3000::/4 3 fe80::8 store=active . 2021.06.11 13:10:55 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.06.11 13:10:55 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:12f6::1 metric -1) dev Local Area Connection . 2021.06.11 13:10:55 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fc00::/7 3 fe80::8 store=active . 2021.06.11 13:10:55 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.06.11 13:10:55 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.06.11 13:10:55 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.06.11 13:10:55 - DNS leak protection with packet filtering enabled. . 2021.06.11 13:10:56 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.4.0.1, 10.5.0.1) . 2021.06.11 13:10:56 - Routes, added a new route, 64.42.179.59 for gateway 10.22.246.1 . 2021.06.11 13:10:56 - Routes, added a new route, 2605:9f80:6000:80:fc8c:43ee:267e:97ab for gateway fde6:7a:7d20:12f6::1 . 2021.06.11 13:10:56 - Flushing DNS I 2021.06.11 13:10:56 - Checking route IPv4 I 2021.06.11 13:10:57 - Checking route IPv6 ! 2021.06.11 13:11:01 - Connected. . 2021.06.11 13:11:01 - OpenVPN > Initialization Sequence Completed ! 2021.06.11 13:12:47 - Disconnecting . 2021.06.11 13:12:47 - Routes, removed a route previously added, 64.42.179.59 for gateway 10.22.246.1 . 2021.06.11 13:12:47 - Routes, removed a route previously added, 2605:9f80:6000:80:fc8c:43ee:267e:97ab for gateway fde6:7a:7d20:12f6::1 . 2021.06.11 13:12:47 - Sending soft termination signal . 2021.06.11 13:12:50 - OpenVPN > SIGTERM received, sending exit notification to peer . 2021.06.11 13:12:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 64.42.179.61 MASK 255.255.255.255 192.168.1.254 . 2021.06.11 13:12:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.06.11 13:12:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.22.246.1 . 2021.06.11 13:12:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.06.11 13:12:52 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.22.246.1 . 2021.06.11 13:12:52 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.06.11 13:12:52 - OpenVPN > delete_route_ipv6(::/3) . 2021.06.11 13:12:52 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route ::/3 3 fe80::8 store=active . 2021.06.11 13:12:52 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.06.11 13:12:52 - OpenVPN > delete_route_ipv6(2000::/4) . 2021.06.11 13:12:52 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route 2000::/4 3 fe80::8 store=active . 2021.06.11 13:12:52 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.06.11 13:12:52 - OpenVPN > delete_route_ipv6(3000::/4) . 2021.06.11 13:12:52 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route 3000::/4 3 fe80::8 store=active . 2021.06.11 13:12:52 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.06.11 13:12:52 - OpenVPN > delete_route_ipv6(fc00::/7) . 2021.06.11 13:12:52 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fc00::/7 3 fe80::8 store=active . 2021.06.11 13:12:52 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.06.11 13:12:52 - OpenVPN > Closing TUN/TAP interface . 2021.06.11 13:12:52 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 3 all . 2021.06.11 13:12:52 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:12f6::/64) . 2021.06.11 13:12:52 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:12f6::/64 3 fe80::8 store=active . 2021.06.11 13:12:52 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 3 fde6:7a:7d20:12f6::1053 store=active . 2021.06.11 13:12:53 - OpenVPN > TAP: DHCP address released . 2021.06.11 13:12:53 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2021.06.11 13:12:53 - Connection terminated. . 2021.06.11 13:12:53 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.06.11 13:12:53 - DNS leak protection with packet filtering disabled. . 2021.06.11 13:12:53 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2021.06.11 13:12:53 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2021.06.11 13:12:53 - Flushing DNS ! 2021.06.11 13:12:53 - Session terminated. ! 2021.06.11 13:12:54 - Deactivation of Network Lock ! 2021.06.11 13:15:12 - Activation of Network Lock - Windows Filtering Platform I 2021.06.11 13:15:13 - Session starting. I 2021.06.11 13:15:14 - Checking authorization ... ! 2021.06.11 13:15:14 - Connecting to Hercules (United States of America, Atlanta, Georgia) . 2021.06.11 13:15:14 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2021.06.11 13:15:14 - OpenVPN > Windows version 6.3 (Windows 8.1) 64bit . 2021.06.11 13:15:14 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.06.11 13:15:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.06.11 13:15:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.06.11 13:15:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.06.11 13:15:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.06.11 13:15:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.61:443 . 2021.06.11 13:15:14 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.06.11 13:15:14 - OpenVPN > UDP link local: (not bound) . 2021.06.11 13:15:14 - OpenVPN > UDP link remote: [AF_INET]64.42.179.61:443 . 2021.06.11 13:15:14 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.61:443, sid=882e4d8a 59eda4a7 . 2021.06.11 13:15:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.06.11 13:15:14 - OpenVPN > VERIFY KU OK . 2021.06.11 13:15:14 - OpenVPN > Validating certificate extended key usage . 2021.06.11 13:15:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.06.11 13:15:14 - OpenVPN > VERIFY EKU OK . 2021.06.11 13:15:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hercules, emailAddress=info@airvpn.org . 2021.06.11 13:15:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.06.11 13:15:14 - OpenVPN > [Hercules] Peer Connection Initiated with [AF_INET]64.42.179.61:443 . 2021.06.11 13:15:15 - OpenVPN > SENT CONTROL [Hercules]: 'PUSH_REQUEST' (status=1) . 2021.06.11 13:15:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.246.1,dhcp-option DNS6 fde6:7a:7d20:12f6::1,tun-ipv6,route-gateway 10.22.246.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:12f6::1053/64 fde6:7a:7d20:12f6::1,ifconfig 10.22.246.85 255.255.255.0,peer-id 7,cipher AES-256-GCM' . 2021.06.11 13:15:15 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.06.11 13:15:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.06.11 13:15:15 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.06.11 13:15:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.06.11 13:15:15 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.06.11 13:15:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.06.11 13:15:15 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.06.11 13:15:15 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.06.11 13:15:15 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.06.11 13:15:15 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.06.11 13:15:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.06.11 13:15:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.06.11 13:15:15 - OpenVPN > interactive service msg_channel=0 . 2021.06.11 13:15:15 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=9 HWADDR=44:af:28:37:39:85 . 2021.06.11 13:15:15 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2021.06.11 13:15:15 - OpenVPN > GetBestInterfaceEx() returned if=9 . 2021.06.11 13:15:15 - OpenVPN > GDG6: II=9 DP=::/0 NH=fe80::feae:34ff:fe37:f8c0 . 2021.06.11 13:15:15 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2021.06.11 13:15:15 - OpenVPN > ROUTE6_GATEWAY fe80::feae:34ff:fe37:f8c0 I=9 . 2021.06.11 13:15:15 - OpenVPN > open_tun . 2021.06.11 13:15:15 - OpenVPN > tap-windows6 device [Local Area Connection] opened . 2021.06.11 13:15:15 - OpenVPN > TAP-Windows Driver Version 9.24 . 2021.06.11 13:15:15 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.22.246.0/10.22.246.85/255.255.255.0 [SUCCEEDED] . 2021.06.11 13:15:15 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.22.246.85/255.255.255.0 on interface {AA3FBE9B-E983-4E45-9A9D-9D372FDF5737} [DHCP-serv: 10.22.246.254, lease-time: 31536000] . 2021.06.11 13:15:15 - OpenVPN > Successful ARP Flush on interface [3] {AA3FBE9B-E983-4E45-9A9D-9D372FDF5737} . 2021.06.11 13:15:15 - OpenVPN > IPv4 MTU set to 1500 on interface 3 using SetIpInterfaceEntry() . 2021.06.11 13:15:15 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 3 fde6:7a:7d20:12f6::1053/128 store=active . 2021.06.11 13:15:15 - OpenVPN > add_route_ipv6(fde6:7a:7d20:12f6::/64 -> fde6:7a:7d20:12f6::1053 metric 0) dev Local Area Connection . 2021.06.11 13:15:15 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:12f6::/64 3 fe80::8 store=active . 2021.06.11 13:15:15 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.06.11 13:15:15 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 3 all . 2021.06.11 13:15:15 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns 3 static fde6:7a:7d20:12f6::1 validate=no . 2021.06.11 13:15:16 - OpenVPN > IPv6 MTU set to 1500 on interface 3 using SetIpInterfaceEntry() . 2021.06.11 13:15:20 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2021.06.11 13:15:20 - OpenVPN > C:\Windows\system32\route.exe ADD 64.42.179.61 MASK 255.255.255.255 192.168.1.254 . 2021.06.11 13:15:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2021.06.11 13:15:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.06.11 13:15:20 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.22.246.1 . 2021.06.11 13:15:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2021.06.11 13:15:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.06.11 13:15:20 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.22.246.1 . 2021.06.11 13:15:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4 . 2021.06.11 13:15:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2021.06.11 13:15:20 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:12f6::1 metric -1) dev Local Area Connection . 2021.06.11 13:15:20 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route ::/3 3 fe80::8 store=active . 2021.06.11 13:15:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.06.11 13:15:20 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:12f6::1 metric -1) dev Local Area Connection . 2021.06.11 13:15:20 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 2000::/4 3 fe80::8 store=active . 2021.06.11 13:15:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.06.11 13:15:20 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:12f6::1 metric -1) dev Local Area Connection . 2021.06.11 13:15:20 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 3000::/4 3 fe80::8 store=active . 2021.06.11 13:15:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.06.11 13:15:20 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:12f6::1 metric -1) dev Local Area Connection . 2021.06.11 13:15:20 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fc00::/7 3 fe80::8 store=active . 2021.06.11 13:15:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.06.11 13:15:20 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4 . 2021.06.11 13:15:20 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6 . 2021.06.11 13:15:20 - DNS leak protection with packet filtering enabled. . 2021.06.11 13:15:21 - DNS IPv4 of a network adapter forced (Local Area Connection, from automatic to 10.4.0.1, 10.5.0.1) . 2021.06.11 13:15:21 - Routes, added a new route, 64.42.179.59 for gateway 10.22.246.1 . 2021.06.11 13:15:21 - Routes, added a new route, 2605:9f80:6000:80:fc8c:43ee:267e:97ab for gateway fde6:7a:7d20:12f6::1 . 2021.06.11 13:15:21 - Flushing DNS I 2021.06.11 13:15:21 - Checking route IPv4 I 2021.06.11 13:15:22 - Checking route IPv6 ! 2021.06.11 13:15:26 - Connected. . 2021.06.11 13:15:26 - OpenVPN > Initialization Sequence Completed ! 2021.06.11 13:24:15 - Disconnecting . 2021.06.11 13:24:15 - Routes, removed a route previously added, 64.42.179.59 for gateway 10.22.246.1 . 2021.06.11 13:24:15 - Routes, removed a route previously added, 2605:9f80:6000:80:fc8c:43ee:267e:97ab for gateway fde6:7a:7d20:12f6::1 . 2021.06.11 13:24:15 - Sending soft termination signal . 2021.06.11 13:24:18 - OpenVPN > SIGTERM received, sending exit notification to peer . 2021.06.11 13:24:20 - OpenVPN > C:\Windows\system32\route.exe DELETE 64.42.179.61 MASK 255.255.255.255 192.168.1.254 . 2021.06.11 13:24:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.06.11 13:24:20 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.22.246.1 . 2021.06.11 13:24:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.06.11 13:24:20 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.22.246.1 . 2021.06.11 13:24:20 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2021.06.11 13:24:20 - OpenVPN > delete_route_ipv6(::/3) . 2021.06.11 13:24:20 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route ::/3 3 fe80::8 store=active . 2021.06.11 13:24:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.06.11 13:24:20 - OpenVPN > delete_route_ipv6(2000::/4) . 2021.06.11 13:24:20 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route 2000::/4 3 fe80::8 store=active . 2021.06.11 13:24:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.06.11 13:24:20 - OpenVPN > delete_route_ipv6(3000::/4) . 2021.06.11 13:24:20 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route 3000::/4 3 fe80::8 store=active . 2021.06.11 13:24:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.06.11 13:24:20 - OpenVPN > delete_route_ipv6(fc00::/7) . 2021.06.11 13:24:20 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fc00::/7 3 fe80::8 store=active . 2021.06.11 13:24:20 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.06.11 13:24:20 - OpenVPN > Closing TUN/TAP interface . 2021.06.11 13:24:20 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 3 all . 2021.06.11 13:24:21 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:12f6::/64) . 2021.06.11 13:24:21 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:12f6::/64 3 fe80::8 store=active . 2021.06.11 13:24:21 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 3 fde6:7a:7d20:12f6::1053 store=active . 2021.06.11 13:24:21 - OpenVPN > TAP: DHCP address released . 2021.06.11 13:24:21 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2021.06.11 13:24:21 - Connection terminated. . 2021.06.11 13:24:21 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to automatic) . 2021.06.11 13:24:21 - DNS leak protection with packet filtering disabled. . 2021.06.11 13:24:21 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4 . 2021.06.11 13:24:21 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6 . 2021.06.11 13:24:21 - Flushing DNS ! 2021.06.11 13:24:21 - Session terminated. ! 2021.06.11 13:24:27 - Deactivation of Network Lock . 2021.06.11 13:24:33 - ping 1 . 2021.06.11 13:24:34 - ping 2 W . 2021.06.11 13:24:34 - ping 2 WE . 2021.06.11 13:28:15 - ping 1 . 2021.06.11 13:28:15 - ping 2 W . 2021.06.11 13:28:15 - ping 2 WE ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "gateway": "192.168.1.254", "metric": "30" }, { "address": "127.0.0.0\/8", "interface": "{A7A9DAF8-7AC9-11EB-824E-806E6F6E6963}", "gateway": "link", "metric": "306" }, { "address": "127.0.0.1", "interface": "{A7A9DAF8-7AC9-11EB-824E-806E6F6E6963}", "gateway": "link", "metric": "306" }, { "address": "127.255.255.255", "interface": "{A7A9DAF8-7AC9-11EB-824E-806E6F6E6963}", "gateway": "link", "metric": "306" }, { "address": "169.254.0.0\/16", "interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "gateway": "link", "metric": "311" }, { "address": "169.254.255.255", "interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "gateway": "link", "metric": "286" }, { "address": "192.168.1.0\/24", "interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "gateway": "link", "metric": "286" }, { "address": "192.168.1.93", "interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "gateway": "link", "metric": "286" }, { "address": "192.168.1.255", "interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "gateway": "link", "metric": "286" }, { "address": "224.0.0.0\/4", "interface": "{A7A9DAF8-7AC9-11EB-824E-806E6F6E6963}", "gateway": "link", "metric": "306" }, { "address": "224.0.0.0\/4", "interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "gateway": "link", "metric": "286" }, { "address": "255.255.255.255", "interface": "{A7A9DAF8-7AC9-11EB-824E-806E6F6E6963}", "gateway": "link", "metric": "306" }, { "address": "255.255.255.255", "interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "gateway": "link", "metric": "286" }, { "address": "::\/0", "interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "gateway": "fe80::feae:34ff:fe37:f8c0", "metric": "286" }, { "address": "::1", "interface": "{A7A9DAF8-7AC9-11EB-824E-806E6F6E6963}", "gateway": "link", "metric": "306" }, { "address": "2001::\/32", "interface": "{E776AEB5-9061-4800-B5F4-7B7BCE90BF12}", "gateway": "link", "metric": "306" }, { "address": "2001:0:17dd:defa:c3c:d10:3f57:fea2", "interface": "{E776AEB5-9061-4800-B5F4-7B7BCE90BF12}", "gateway": "link", "metric": "306" }, { "address": "2600:1700:1f10:5510::\/60", "interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "gateway": "fe80::feae:34ff:fe37:f8c0", "metric": "46" }, { "address": "2600:1700:1f10:5510::\/64", "interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "gateway": "link", "metric": "286" }, { "address": "2600:1700:1f10:5510::49", "interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "gateway": "link", "metric": "286" }, { "address": "2600:1700:1f10:5510:846:c021:bae4:df89", "interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "gateway": "link", "metric": "286" }, { "address": "2600:1700:1f10:5510:3419:c7a8:7499:f383", "interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "gateway": "link", "metric": "286" }, { "address": "fe80::\/64", "interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "gateway": "link", "metric": "286" }, { "address": "fe80::\/64", "interface": "{E776AEB5-9061-4800-B5F4-7B7BCE90BF12}", "gateway": "link", "metric": "306" }, { "address": "fe80::c3c:d10:3f57:fea2", "interface": "{E776AEB5-9061-4800-B5F4-7B7BCE90BF12}", "gateway": "link", "metric": "306" }, { "address": "fe80::3419:c7a8:7499:f383", "interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "gateway": "link", "metric": "286" }, { "address": "ff00::\/8", "interface": "{A7A9DAF8-7AC9-11EB-824E-806E6F6E6963}", "gateway": "link", "metric": "306" }, { "address": "ff00::\/8", "interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "gateway": "link", "metric": "286" }, { "address": "ff00::\/8", "interface": "{E776AEB5-9061-4800-B5F4-7B7BCE90BF12}", "gateway": "link", "metric": "306" } ], "interfaces": [ { "friendly": "Ethernet 2", "id": "{F7620C16-B99A-458E-936C-C4DC764F1D9A}", "name": "Ethernet 2", "description": "Realtek PCIe GBE Family Controller", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::7530:79a1:db2:3730", "169.254.55.48" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Ethernet", "id": "{DBE78E3B-93FB-417C-BAF7-28E80020F075}", "name": "Ethernet", "description": "Kaspersky Security Data Escort Adapter", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::407f:890d:2d10:c072", "169.254.192.114" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection* 4", "id": "{DF96D348-2BB4-46A5-AABC-34738949EF97}", "name": "Local Area Connection* 4", "description": "Microsoft Wi-Fi Direct Virtual Adapter", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::8c48:4ebb:b095:e6e9", "169.254.230.233" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Wi-Fi 2", "id": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "name": "Wi-Fi 2", "description": "Intel(R) Dual Band Wireless-AC 7265", "type": "Wireless80211", "status": "Up", "bytes_received": "2110980697", "bytes_sent": "91458904", "support_ipv4": true, "support_ipv6": true, "ips": [ "2600:1700:1f10:5510::49", "2600:1700:1f10:5510:3419:c7a8:7499:f383", "2600:1700:1f10:5510:846:c021:bae4:df89", "fe80::3419:c7a8:7499:f383", "192.168.1.93" ], "gateways": [ "192.168.1.254", "fe80::feae:34ff:fe37:f8c0" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Bluetooth Network Connection 2", "id": "{5B008366-39BC-489D-AED8-98D516CCF0E9}", "name": "Bluetooth Network Connection 2", "description": "Bluetooth Device (Personal Area Network) #2", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::80ef:b6b4:9e28:b903", "169.254.185.3" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Local Area Connection", "id": "{AA3FBE9B-E983-4E45-9A9D-9D372FDF5737}", "name": "Local Area Connection", "description": "TAP-Windows Adapter V9", "type": "Virtual", "status": "Down", "bytes_received": "262917185", "bytes_sent": "16065652", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::99fe:165a:c132:687", "169.254.6.135" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{A7A9DAF8-7AC9-11EB-824E-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Teredo Tunneling Pseudo-Interface", "id": "{E776AEB5-9061-4800-B5F4-7B7BCE90BF12}", "name": "Teredo Tunneling Pseudo-Interface", "description": "Teredo Tunneling Pseudo-Interface", "type": "Tunnel", "status": "Up", "bytes_received": "2128", "bytes_sent": "125720", "support_ipv4": false, "support_ipv6": true, "ips": [ "2001:0:17dd:defa:c3c:d10:3f57:fea2", "fe80::c3c:d10:3f57:fea2" ], "gateways": [], "bind": true, "dns4": null, "dns6": null }, { "friendly": "isatap.attlocal.net", "id": "{65FB8B66-0F39-4FDF-8A5A-6A4374BECABA}", "name": "isatap.attlocal.net", "description": "Microsoft ISATAP Adapter #2", "type": "Tunnel", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": false, "support_ipv6": true, "ips": [ "fe80::5efe:192.168.1.93" ], "gateways": [], "bind": true, "dns4": null, "dns6": null } ], "ipv4-default-gateway": "192.168.1.254", "ipv4-default-interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}", "ipv6-default-gateway": "fe80::feae:34ff:fe37:f8c0", "ipv6-default-interface": "{3D4C6E24-D5BE-4F0B-A383-7818664162A2}" } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : CRISPR Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : attlocal.net Ethernet adapter Ethernet 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek PCIe GBE Family Controller Physical Address. . . . . . . . . : 70-85-C2-06-0A-16 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Kaspersky Security Data Escort Adapter Physical Address. . . . . . . . . : 00-FF-DB-E7-8E-3B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Local Area Connection* 4: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 44-AF-28-37-39-86 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi 2: Connection-specific DNS Suffix . : attlocal.net Description . . . . . . . . . . . : Intel(R) Dual Band Wireless-AC 7265 Physical Address. . . . . . . . . : 44-AF-28-37-39-85 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2600:1700:1f10:5510::49(Preferred) Lease Obtained. . . . . . . . . . : Friday, June 11, 2021 1:01:51 PM Lease Expires . . . . . . . . . . : Friday, June 11, 2021 2:01:55 PM IPv6 Address. . . . . . . . . . . : 2600:1700:1f10:5510:3419:c7a8:7499:f383(Preferred) Temporary IPv6 Address. . . . . . : 2600:1700:1f10:5510:846:c021:bae4:df89(Preferred) Link-local IPv6 Address . . . . . : fe80::3419:c7a8:7499:f383%9(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.1.93(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Thursday, June 10, 2021 11:27:17 AM Lease Expires . . . . . . . . . . : Saturday, June 12, 2021 1:10:20 PM Default Gateway . . . . . . . . . : fe80::feae:34ff:fe37:f8c0%9 192.168.1.254 DHCP Server . . . . . . . . . . . : 192.168.1.254 DHCPv6 IAID . . . . . . . . . . . : 306491176 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-28-0A-B9-3D-44-AF-28-37-39-85 DNS Servers . . . . . . . . . . . : 2600:1700:1f10:5510::1 192.168.1.254 NetBIOS over Tcpip. . . . . . . . : Enabled Connection-specific DNS Suffix Search List : attlocal.net Ethernet adapter Bluetooth Network Connection 2: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) #2 Physical Address. . . . . . . . . : 44-AF-28-37-39-89 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Unknown adapter Local Area Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-AA-3F-BE-9B DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Tunnel adapter Teredo Tunneling Pseudo-Interface: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : 2001:0:17dd:defa:c3c:d10:3f57:fea2(Preferred) Link-local IPv6 Address . . . . . : fe80::c3c:d10:3f57:fea2%13(Preferred) Default Gateway . . . . . . . . . : DHCPv6 IAID . . . . . . . . . . . : 520093696 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-28-0A-B9-3D-44-AF-28-37-39-85 NetBIOS over Tcpip. . . . . . . . : Disabled Tunnel adapter isatap.attlocal.net: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : attlocal.net Description . . . . . . . . . . . : Microsoft ISATAP Adapter #2 Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes I have tried updating Eddie and changing the Network Lock to Windows only but it did not solve the problem. Any help is appreciated!
-
I've just installed Eddie 2.16.3 on a new Windows 10 system. When Network Lock is active, I can't seem to get Eddie to connect to any of the servers because it gets stuck at "Checking route IPv6" and the connection keeps timing out. I have put exceptions in both Malwarebytes and Windows Firewall for all components used by Eddie including the OpenVPN Daemon but it still refuses to connect when Network Lock has been activated. It works fine otherwise, but it is annoying since Network Lock is a useful feature for preventing DNS leaks. I have attached a log file to see if anyone can help me figure out what's causing the problem. Bizarrely this problem is not present in earlier builds of Eddie such as 2.14.5, which I don't want to use for security reasons. I am using Windows 10 Home, Version 1803, OS build 17134.345. I hope this information is sufficient to help resolve the issue. Eddie_20181011_131408.txt
-
Hello, this is my first time posting here. Whenever I try to connect to Eddie, the software seems to be stuck in a loop, with an error message appearing in my Windows Explorer saying "netsh command failed". This happens continually with no connection in the client software happening. Here are my logs: . 2018.12.11 17:42:12 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 7 Ultimate, Version: Microsoft Windows NT 6.1.7601 Service Pack 1, Mono/.Net: v2.0.50727. 2018.12.11 17:42:12 - Reading options from C:\Users\Luke\AppData\Local\AirVPN\default.xml. 2018.12.11 17:42:12 - Command line arguments (1): path="home". 2018.12.11 17:42:12 - Profile path: C:\Users\Luke\AppData\Local\AirVPN\default.xml. 2018.12.11 17:42:14 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2. 2018.12.11 17:42:14 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe). 2018.12.11 17:42:14 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe). 2018.12.11 17:42:14 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe). 2018.12.11 17:42:14 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe). 2018.12.11 17:42:14 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem. 2018.12.11 17:42:14 - Updating systems & servers data ...I 2018.12.11 17:42:15 - Ready. 2018.12.11 17:42:15 - Systems & servers data update completedI 2018.12.11 17:42:16 - Session starting.I 2018.12.11 17:42:18 - Checking authorization ...! 2018.12.11 17:42:19 - Connecting to Rana (Canada, Toronto, Ontario). 2018.12.11 17:42:19 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.12.11 17:42:19 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2018.12.11 17:42:19 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.12.11 17:42:19 - Connection to OpenVPN Management Interface. 2018.12.11 17:42:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.12.11 17:42:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.12.11 17:42:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.12.11 17:42:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.19.94.132:443. 2018.12.11 17:42:19 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2018.12.11 17:42:19 - OpenVPN > UDP link local: (not bound). 2018.12.11 17:42:19 - OpenVPN > UDP link remote: [AF_INET]199.19.94.132:443. 2018.12.11 17:42:19 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.94.132:443, sid=69378094 58631959. 2018.12.11 17:42:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.12.11 17:42:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.12.11 17:42:19 - OpenVPN > VERIFY KU OK. 2018.12.11 17:42:19 - OpenVPN > Validating certificate extended key usage. 2018.12.11 17:42:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.12.11 17:42:19 - OpenVPN > VERIFY EKU OK. 2018.12.11 17:42:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.12.11 17:42:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.12.11 17:42:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.94.132:443. 2018.12.11 17:42:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.12.11 17:42:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.196.1,dhcp-option DNS6 fde6:7a:7d20:17c4::1,tun-ipv6,route-gateway 10.27.196.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:17c4::10ee/64 fde6:7a:7d20:17c4::1,ifconfig 10.27.196.240 255.255.255.0,peer-id 33,cipher AES-256-GCM'. 2018.12.11 17:42:21 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.12.11 17:42:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.12.11 17:42:21 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.12.11 17:42:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.12.11 17:42:21 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.12.11 17:42:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.12.11 17:42:21 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.12.11 17:42:21 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.12.11 17:42:21 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.12.11 17:42:21 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.12.11 17:42:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.12.11 17:42:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.12.11 17:42:21 - OpenVPN > interactive service msg_channel=0. 2018.12.11 17:42:21 - OpenVPN > ROUTE_GATEWAY 10.1.42.1/255.255.252.0 I=11 HWADDR=94:de:80:00:20:6c. 2018.12.11 17:42:21 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2018.12.11 17:42:21 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found. (code=1168). 2018.12.11 17:42:21 - OpenVPN > ROUTE6: default_gateway=UNDEF. 2018.12.11 17:42:21 - OpenVPN > open_tun. 2018.12.11 17:42:21 - OpenVPN > TAP-WIN32 device [{665DA1EA-26CB-446A-9FB9-F07C091EAB47}] opened: \\.\Global\{665DA1EA-26CB-446A-9FB9-F07C091EAB47}.tap. 2018.12.11 17:42:21 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.12.11 17:42:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.27.196.0/10.27.196.240/255.255.255.0 [sUCCEEDED]. 2018.12.11 17:42:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.27.196.240/255.255.255.0 on interface {665DA1EA-26CB-446A-9FB9-F07C091EAB47} [DHCP-serv: 10.27.196.254, lease-time: 31536000]. 2018.12.11 17:42:21 - OpenVPN > Successful ARP Flush on interface [22] {665DA1EA-26CB-446A-9FB9-F07C091EAB47}. 2018.12.11 17:42:21 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1. 2018.12.11 17:42:22 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=22 fde6:7a:7d20:17c4::10ee store=active. 2018.12.11 17:42:23 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns {665DA1EA-26CB-446A-9FB9-F07C091EAB47} static fde6:7a:7d20:17c4::1 validate=noE 2018.12.11 17:42:23 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2018.12.11 17:42:27 - OpenVPN > NETSH: command failed. 2018.12.11 17:42:27 - OpenVPN > Exiting due to fatal error! 2018.12.11 17:42:27 - Disconnecting. 2018.12.11 17:42:27 - Connection terminated.I 2018.12.11 17:42:30 - Checking authorization ...! 2018.12.11 17:42:30 - Connecting to Chort (Canada, Toronto, Ontario). 2018.12.11 17:42:31 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018. 2018.12.11 17:42:31 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2018.12.11 17:42:31 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.12.11 17:42:31 - Connection to OpenVPN Management Interface. 2018.12.11 17:42:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.12.11 17:42:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.12.11 17:42:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.12.11 17:42:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.234:443. 2018.12.11 17:42:31 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2018.12.11 17:42:31 - OpenVPN > UDP link local: (not bound). 2018.12.11 17:42:31 - OpenVPN > UDP link remote: [AF_INET]104.254.90.234:443. 2018.12.11 17:42:31 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.234:443, sid=93330ae1 caeb538a. 2018.12.11 17:42:31 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.12.11 17:42:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.12.11 17:42:31 - OpenVPN > VERIFY KU OK. 2018.12.11 17:42:31 - OpenVPN > Validating certificate extended key usage. 2018.12.11 17:42:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.12.11 17:42:31 - OpenVPN > VERIFY EKU OK. 2018.12.11 17:42:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chort, emailAddress=info@airvpn.org. 2018.12.11 17:42:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.12.11 17:42:31 - OpenVPN > [Chort] Peer Connection Initiated with [AF_INET]104.254.90.234:443. 2018.12.11 17:42:32 - OpenVPN > SENT CONTROL [Chort]: 'PUSH_REQUEST' (status=1). 2018.12.11 17:42:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.14.52.1,dhcp-option DNS6 fde6:7a:7d20:a34::1,tun-ipv6,route-gateway 10.14.52.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:a34::1069/64 fde6:7a:7d20:a34::1,ifconfig 10.14.52.107 255.255.255.0,peer-id 15,cipher AES-256-GCM'. 2018.12.11 17:42:32 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.12.11 17:42:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.12.11 17:42:32 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.12.11 17:42:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.12.11 17:42:32 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.12.11 17:42:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.12.11 17:42:32 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.12.11 17:42:32 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.12.11 17:42:32 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.12.11 17:42:32 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.12.11 17:42:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.12.11 17:42:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.12.11 17:42:32 - OpenVPN > interactive service msg_channel=0. 2018.12.11 17:42:32 - OpenVPN > ROUTE_GATEWAY 10.1.42.1/255.255.252.0 I=11 HWADDR=94:de:80:00:20:6c. 2018.12.11 17:42:32 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2018.12.11 17:42:32 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found. (code=1168). 2018.12.11 17:42:32 - OpenVPN > ROUTE6: default_gateway=UNDEF. 2018.12.11 17:42:32 - OpenVPN > open_tun. 2018.12.11 17:42:32 - OpenVPN > TAP-WIN32 device [{665DA1EA-26CB-446A-9FB9-F07C091EAB47}] opened: \\.\Global\{665DA1EA-26CB-446A-9FB9-F07C091EAB47}.tap. 2018.12.11 17:42:32 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.12.11 17:42:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.14.52.0/10.14.52.107/255.255.255.0 [sUCCEEDED]. 2018.12.11 17:42:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.14.52.107/255.255.255.0 on interface {665DA1EA-26CB-446A-9FB9-F07C091EAB47} [DHCP-serv: 10.14.52.254, lease-time: 31536000]. 2018.12.11 17:42:32 - OpenVPN > Successful ARP Flush on interface [22] {665DA1EA-26CB-446A-9FB9-F07C091EAB47}. 2018.12.11 17:42:32 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1. 2018.12.11 17:42:33 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=22 fde6:7a:7d20:a34::1069 store=active! 2018.12.11 17:42:34 - Disconnecting. 2018.12.11 17:42:34 - Sending management termination signal. 2018.12.11 17:42:34 - Management - Send 'signal SIGTERM'. 2018.12.11 17:42:34 - OpenVPN > MANAGEMENT: CMD '261840d1cc7ba859bc123f622ad701fa2d56365a67babaf5d722b48dc2e70a5a'. 2018.12.11 17:42:34 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns {665DA1EA-26CB-446A-9FB9-F07C091EAB47} static fde6:7a:7d20:a34::1 validate=noE 2018.12.11 17:42:34 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2018.12.11 17:42:38 - OpenVPN > MANAGEMENT: Client disconnected. 2018.12.11 17:42:38 - OpenVPN > NETSH: command failed. 2018.12.11 17:42:38 - OpenVPN > Exiting due to fatal error. 2018.12.11 17:42:38 - Connection terminated.I 2018.12.11 17:42:38 - Cancel requested.! 2018.12.11 17:42:38 - Session terminated. If anyone knows what is happening from looking at these logs
-
Since using a computer with Windows 7. Eddie has not been working with UTorrent no matter the protocol I choose. Any suggestions. I am a novice with this and need some clarification.
-
Hy guys, so i´ve been using Air VPN on a regular basis, but not since 1 Month or so. Today i´ve tried o connect via "automatic connection" and everything went fine until after the connection has been established it always "restarts". Strange thing is, i have to log into AirVPN via browser and disconnect my client from those connections because i get the max of 5 connections per user very fast. Manual connection does the same. Creators Update? Im using an up to date Windows 10, my internet works fine aside from Eddy. I will attach my Log file in case u will need it. Thanks in advance Eddie_20171226_080649.txt
-
Okay, so basically, I want to host a server for a game, but the game requires port 53640 to be open. I tried to do this, however, it is tooken by another user. On another forum, Somebody said to leave the remote port blank and just fill in the local port. Will this open the port for me or not?
-
I'm running into some difficulties setting up Air VPN on my Android 6 phone. Following the directions detailed here https://airvpn.org/topic/11476-using-airvpn-with-openvpn-for-android/ I installed OpenVPN for Android, and created a config file from the Air VPN config generator, on Chrome. I created both UDP and TCP versions of the .ovpn files. However, when I opened OpenVPN for Android and attempted to import a VPN profile, the ovpn files in my downloads folder were grayed out. Also, it's been suggested that I append my logfiles, but I'm not sure how this is done. Anyone have any suggestions? I'd be grateful for any help anyone can give
-
Hello, I'm using "OpenVPN Settings" on Android, because of an unfixed bug of Android which completely prevents me from using OpenVPN for Android. So I am sorry that I cannot use the recommended app. I created an "Android" config file in the client area, but my first problem is that "/sbin/ip" was not found: iproute was at "/system/bin/ip" instead. I figured out that adding `iproute /system/bin/ip` to my ovpn config file fixed this. Now the openvpn successfully connects either from terminal using `openvpn <filename.ovpn` or using OpenVPN Settings app. But, my browser is still going straight to the web from my mobile network. My IP address is still my normal IP address when I look it up, though OpenVPN logs appear normal and successfully connected. I have tried adding 'redirect-gateway' to the config file but it doesn't work. I would love some support making this connection successful and secure as I would like to use my phone through VPN only for some tasks. I have attached my logs. Thanks!
-
Hello, While Airvnp works fine on MacOs, Kali Linux i386 and even Windows10, I just can't seem to get it working on Kali Linux 64. Eddie will not install either with the .dep or tar.gz packages (don't get me started with mono!), and using sudo ovpn will not get me connected. Does somebody else have this issue and maybe a workaround? Thx in advance and happy holidays!
-
So, I'm running a distro of Linux called GalliumOS. It's made from the ground up to work better with Chromebooks (I'm using an Acer CB3-131 Chromebook) than other distros, but it's based on Xubuntu. It should, in theory, work fine with the Linux version of AirVPN. I wasn't able to get the .deb version of the installer working, but the official non-mono portable version launched just fine. However, when I tried to log in, I got a "Cannot login. (Bad PKCS7 padding. Invalid length 0.)" error message. I have NO idea what this could be about, and I'm looking for any help I can get. I'd like to add that I'm new to Linux in general, so this may have something to do with my difficulty in resolving this issue. Anyway, thanks for any help. It's appreciated.
-
Hey so I'm new to AirVPN and don't know if I'm doing something wrong, but when I try to connect to any server I get put into a constant connect/disconnect loop. From the logs it seems my DNS checking is failing. How can I go about fixing this? I 2016.06.08 12:41:43 - Session starting. I 2016.06.08 12:41:43 - IPv6 disabled on network adapter (FT232R USB UART) I 2016.06.08 12:41:43 - IPv6 disabled on network adapter (Ethernet) I 2016.06.08 12:41:44 - IPv6 disabled on network adapter (Ethernet Adaptor (en4)) I 2016.06.08 12:41:44 - IPv6 disabled on network adapter (Wi-Fi) I 2016.06.08 12:41:44 - IPv6 disabled on network adapter (iPhone USB) I 2016.06.08 12:41:44 - IPv6 disabled on network adapter (Bluetooth PAN) I 2016.06.08 12:41:44 - IPv6 disabled on network adapter (FireWire) I 2016.06.08 12:41:44 - IPv6 disabled on network adapter (Thunderbolt Bridge) I 2016.06.08 12:41:44 - Checking authorization ... ! 2016.06.08 12:41:44 - Connecting to Subra (Netherlands, Alblasserdam) . 2016.06.08 12:41:44 - SSL > 2016.06.08 12:41:44 LOG5[ui]: stunnel 5.17 on x86_64-apple-darwin14.3.0 platform . 2016.06.08 12:41:44 - SSL > 2016.06.08 12:41:44 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015 . 2016.06.08 12:41:44 - SSL > 2016.06.08 12:41:44 LOG5[ui]: Threading:PTHREAD Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2016.06.08 12:41:44 - SSL > 2016.06.08 12:41:44 LOG5[ui]: Reading configuration from file /Users/Cameron/.airvpn/fe07179097d02cbd4d2b60104cd3818cea8dd82b7743cf30233f704a1adca703.tmp.ssl . 2016.06.08 12:41:44 - SSL > 2016.06.08 12:41:44 LOG5[ui]: UTF-8 byte order mark not detected . 2016.06.08 12:41:44 - SSL > 2016.06.08 12:41:44 LOG6[ui]: Initializing service [openvpn] . 2016.06.08 12:41:44 - SSL > 2016.06.08 12:41:44 LOG5[ui]: Configuration successful . 2016.06.08 12:41:45 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015 . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:50663 . 2016.06.08 12:41:45 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG6[0]: Failover strategy: round-robin . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG6[0]: s_connect: connecting 213.152.162.100:443 . 2016.06.08 12:41:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.06.08 12:41:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG5[0]: s_connect: connected 213.152.162.100:443 . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.12:50664 . 2016.06.08 12:41:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG6[0]: SNI: sending servername: 213.152.162.100 . 2016.06.08 12:41:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG6[0]: CERT: Locally installed certificate matched . 2016.06.08 12:41:45 - OpenVPN > Socket Buffers: R=[131072->131072] S=[131072->131072] . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org . 2016.06.08 12:41:45 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:23734 [nonblock] . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG6[0]: SSL connected: new session negotiated . 2016.06.08 12:41:45 - SSL > 2016.06.08 12:41:45 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption) . 2016.06.08 12:41:46 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:23734 . 2016.06.08 12:41:46 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.06.08 12:41:46 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:23734 . 2016.06.08 12:41:46 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:23734, sid=3affd201 a6ded6bb . 2016.06.08 12:41:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.06.08 12:41:46 - OpenVPN > Validating certificate key usage . 2016.06.08 12:41:46 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.06.08 12:41:46 - OpenVPN > VERIFY KU OK . 2016.06.08 12:41:46 - OpenVPN > Validating certificate extended key usage . 2016.06.08 12:41:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.06.08 12:41:46 - OpenVPN > VERIFY EKU OK . 2016.06.08 12:41:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.06.08 12:41:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.08 12:41:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.08 12:41:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.08 12:41:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.08 12:41:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.06.08 12:41:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:23734 . 2016.06.08 12:41:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.06.08 12:41:49 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.6.89 255.255.0.0' . 2016.06.08 12:41:49 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.06.08 12:41:49 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.06.08 12:41:49 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2016.06.08 12:41:49 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.06.08 12:41:49 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.06.08 12:41:49 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.06.08 12:41:49 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.06.08 12:41:49 - OpenVPN > Opened utun device utun0 . 2016.06.08 12:41:49 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.06.08 12:41:49 - OpenVPN > /sbin/ifconfig utun0 delete . 2016.06.08 12:41:49 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2016.06.08 12:41:49 - OpenVPN > /sbin/ifconfig utun0 10.50.6.89 10.50.6.89 netmask 255.255.0.0 mtu 1500 up . 2016.06.08 12:41:49 - OpenVPN > /sbin/route add -net 10.50.0.0 10.50.6.89 255.255.0.0 . 2016.06.08 12:41:49 - OpenVPN > add net 10.50.0.0: gateway 10.50.6.89 . 2016.06.08 12:41:49 - OpenVPN > /sbin/route add -net 127.0.0.1 192.168.0.1 255.255.255.255 . 2016.06.08 12:41:49 - OpenVPN > add net 127.0.0.1: gateway 192.168.0.1 . 2016.06.08 12:41:49 - OpenVPN > /sbin/route add -net 0.0.0.0 10.50.0.1 128.0.0.0 . 2016.06.08 12:41:49 - OpenVPN > add net 0.0.0.0: gateway 10.50.0.1 . 2016.06.08 12:41:49 - OpenVPN > /sbin/route add -net 128.0.0.0 10.50.0.1 128.0.0.0 . 2016.06.08 12:41:49 - OpenVPN > add net 128.0.0.0: gateway 10.50.0.1 . 2016.06.08 12:41:49 - OpenVPN > /sbin/route add -net 213.152.162.100 192.168.0.1 255.255.255.255 . 2016.06.08 12:41:49 - OpenVPN > add net 213.152.162.100: gateway 192.168.0.1 . 2016.06.08 12:41:49 - Starting Management Interface . 2016.06.08 12:41:49 - OpenVPN > Initialization Sequence Completed I 2016.06.08 12:41:49 - DNS of a network adapter forced (FT232R USB UART) I 2016.06.08 12:41:49 - DNS of a network adapter forced (Ethernet) I 2016.06.08 12:41:49 - DNS of a network adapter forced (Ethernet Adaptor (en4)) . 2016.06.08 12:41:49 - Unknown networksetup output: '' for interface 'Wi-Fi' I 2016.06.08 12:41:49 - DNS of a network adapter forced (iPhone USB) I 2016.06.08 12:41:49 - DNS of a network adapter forced (Bluetooth PAN) I 2016.06.08 12:41:50 - DNS of a network adapter forced (FireWire) I 2016.06.08 12:41:50 - DNS of a network adapter forced (Thunderbolt Bridge) I 2016.06.08 12:41:50 - Flushing DNS I 2016.06.08 12:41:50 - Checking route I 2016.06.08 12:41:50 - Checking DNS E 2016.06.08 12:41:50 - DNS checking failed. . 2016.06.08 12:41:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2016.06.08 12:41:50 - Disconnecting . 2016.06.08 12:41:50 - Management - Send 'signal SIGTERM' . 2016.06.08 12:41:50 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.06.08 12:41:50 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.06.08 12:41:50 - SSL > 2016.06.08 12:41:50 LOG6[0]: Read socket closed (readsocket) . 2016.06.08 12:41:51 - OpenVPN > /sbin/route delete -net 213.152.162.100 192.168.0.1 255.255.255.255 . 2016.06.08 12:41:51 - SSL > 2016.06.08 12:41:50 LOG6[0]: SSL_shutdown successfully sent close_notify alert . 2016.06.08 12:41:51 - SSL > 2016.06.08 12:41:50 LOG3[0]: transfer: s_poll_wait: TIMEOUTclose exceeded: closing . 2016.06.08 12:41:51 - OpenVPN > delete net 213.152.162.100: gateway 192.168.0.1 . 2016.06.08 12:41:51 - SSL > 2016.06.08 12:41:50 LOG5[0]: Connection closed: 9970 byte(s) sent to SSL, 10271 byte(s) sent to socket . 2016.06.08 12:41:51 - OpenVPN > /sbin/route delete -net 127.0.0.1 192.168.0.1 255.255.255.255 . 2016.06.08 12:41:51 - OpenVPN > delete net 127.0.0.1: gateway 192.168.0.1 . 2016.06.08 12:41:51 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.50.0.1 128.0.0.0 . 2016.06.08 12:41:51 - OpenVPN > delete net 0.0.0.0: gateway 10.50.0.1 . 2016.06.08 12:41:51 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.50.0.1 128.0.0.0 . 2016.06.08 12:41:51 - OpenVPN > delete net 128.0.0.0: gateway 10.50.0.1 . 2016.06.08 12:41:51 - Connection terminated. I 2016.06.08 12:41:51 - DNS of a network adapter restored to original settings (FT232R USB UART) . 2016.06.08 12:41:51 - OpenVPN > Closing TUN/TAP interface . 2016.06.08 12:41:51 - OpenVPN > SIGTERM[hard,] received, process exiting I 2016.06.08 12:41:51 - DNS of a network adapter restored to original settings (Ethernet) I 2016.06.08 12:41:51 - DNS of a network adapter restored to original settings (Ethernet Adaptor (en4)) I 2016.06.08 12:41:51 - DNS of a network adapter restored to original settings (iPhone USB) I 2016.06.08 12:41:51 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2016.06.08 12:41:51 - DNS of a network adapter restored to original settings (FireWire) I 2016.06.08 12:41:51 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) I 2016.06.08 12:41:54 - Checking authorization ... ! 2016.06.08 12:41:55 - Connecting to Subra (Netherlands, Alblasserdam) . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[ui]: stunnel 5.17 on x86_64-apple-darwin14.3.0 platform . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015 . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[ui]: Threading:PTHREAD Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[ui]: Reading configuration from file /Users/Cameron/.airvpn/076998ce2835bcd7f333f7ce592ff251783a4d0dccdd75463117af3565c0f2d2.tmp.ssl . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[ui]: UTF-8 byte order mark not detected . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG6[ui]: Initializing service [openvpn] . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[ui]: Configuration successful . 2016.06.08 12:41:55 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015 . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:50670 . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG6[0]: Failover strategy: round-robin . 2016.06.08 12:41:55 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG6[0]: s_connect: connecting 213.152.162.100:443 . 2016.06.08 12:41:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.06.08 12:41:55 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.06.08 12:41:55 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.08 12:41:55 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.08 12:41:55 - OpenVPN > Socket Buffers: R=[131072->131072] S=[131072->131072] . 2016.06.08 12:41:55 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:42680 [nonblock] . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[0]: s_connect: connected 213.152.162.100:443 . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.12:50671 . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG6[0]: SNI: sending servername: 213.152.162.100 . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG6[0]: CERT: Locally installed certificate matched . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG6[0]: SSL connected: new session negotiated . 2016.06.08 12:41:55 - SSL > 2016.06.08 12:41:55 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption) . 2016.06.08 12:41:56 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:42680 . 2016.06.08 12:41:56 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.06.08 12:41:56 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:42680 . 2016.06.08 12:41:56 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:42680, sid=e868f59a 41de3c84 . 2016.06.08 12:41:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.06.08 12:41:56 - OpenVPN > Validating certificate key usage . 2016.06.08 12:41:56 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.06.08 12:41:56 - OpenVPN > VERIFY KU OK . 2016.06.08 12:41:56 - OpenVPN > Validating certificate extended key usage . 2016.06.08 12:41:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.06.08 12:41:56 - OpenVPN > VERIFY EKU OK . 2016.06.08 12:41:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.06.08 12:41:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.08 12:41:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.08 12:41:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.06.08 12:41:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.06.08 12:41:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2016.06.08 12:41:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:42680 . 2016.06.08 12:41:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.06.08 12:41:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.6.89 255.255.0.0' . 2016.06.08 12:41:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.06.08 12:41:59 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.06.08 12:41:59 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2016.06.08 12:41:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.06.08 12:41:59 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.06.08 12:41:59 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.06.08 12:41:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.06.08 12:41:59 - OpenVPN > Opened utun device utun0 . 2016.06.08 12:41:59 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.06.08 12:41:59 - OpenVPN > /sbin/ifconfig utun0 delete . 2016.06.08 12:41:59 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2016.06.08 12:41:59 - OpenVPN > /sbin/ifconfig utun0 10.50.6.89 10.50.6.89 netmask 255.255.0.0 mtu 1500 up . 2016.06.08 12:41:59 - OpenVPN > /sbin/route add -net 10.50.0.0 10.50.6.89 255.255.0.0 . 2016.06.08 12:41:59 - OpenVPN > add net 10.50.0.0: gateway 10.50.6.89 . 2016.06.08 12:41:59 - OpenVPN > /sbin/route add -net 127.0.0.1 192.168.0.1 255.255.255.255 . 2016.06.08 12:41:59 - OpenVPN > add net 127.0.0.1: gateway 192.168.0.1 . 2016.06.08 12:41:59 - OpenVPN > /sbin/route add -net 0.0.0.0 10.50.0.1 128.0.0.0 . 2016.06.08 12:41:59 - OpenVPN > add net 0.0.0.0: gateway 10.50.0.1 . 2016.06.08 12:41:59 - OpenVPN > /sbin/route add -net 128.0.0.0 10.50.0.1 128.0.0.0 . 2016.06.08 12:41:59 - OpenVPN > add net 128.0.0.0: gateway 10.50.0.1 . 2016.06.08 12:41:59 - OpenVPN > /sbin/route add -net 213.152.162.100 192.168.0.1 255.255.255.255 . 2016.06.08 12:41:59 - OpenVPN > add net 213.152.162.100: gateway 192.168.0.1 . 2016.06.08 12:41:59 - Starting Management Interface . 2016.06.08 12:41:59 - OpenVPN > Initialization Sequence Completed I 2016.06.08 12:41:59 - DNS of a network adapter forced (FT232R USB UART) I 2016.06.08 12:41:59 - DNS of a network adapter forced (Ethernet) I 2016.06.08 12:41:59 - DNS of a network adapter forced (Ethernet Adaptor (en4)) . 2016.06.08 12:41:59 - Unknown networksetup output: '' for interface 'Wi-Fi' I 2016.06.08 12:41:59 - DNS of a network adapter forced (iPhone USB) I 2016.06.08 12:42:00 - DNS of a network adapter forced (Bluetooth PAN) I 2016.06.08 12:42:00 - DNS of a network adapter forced (FireWire) I 2016.06.08 12:42:00 - DNS of a network adapter forced (Thunderbolt Bridge) I 2016.06.08 12:42:00 - Flushing DNS I 2016.06.08 12:42:00 - Checking route I 2016.06.08 12:42:00 - Checking DNS E 2016.06.08 12:42:00 - DNS checking failed. . 2016.06.08 12:42:00 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2016.06.08 12:42:00 - Disconnecting . 2016.06.08 12:42:00 - Management - Send 'signal SIGTERM' . 2016.06.08 12:42:01 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.06.08 12:42:01 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2016.06.08 12:42:01 - SSL > 2016.06.08 12:42:01 LOG6[0]: Read socket closed (readsocket) . 2016.06.08 12:42:01 - OpenVPN > /sbin/route delete -net 213.152.162.100 192.168.0.1 255.255.255.255 . 2016.06.08 12:42:01 - SSL > 2016.06.08 12:42:01 LOG6[0]: SSL_shutdown successfully sent close_notify alert . 2016.06.08 12:42:01 - SSL > 2016.06.08 12:42:01 LOG3[0]: transfer: s_poll_wait: TIMEOUTclose exceeded: closing . 2016.06.08 12:42:01 - OpenVPN > delete net 213.152.162.100: gateway 192.168.0.1 . 2016.06.08 12:42:01 - OpenVPN > /sbin/route delete -net 127.0.0.1 192.168.0.1 255.255.255.255 . 2016.06.08 12:42:01 - SSL > 2016.06.08 12:42:01 LOG5[0]: Connection closed: 9970 byte(s) sent to SSL, 10271 byte(s) sent to socket . 2016.06.08 12:42:01 - OpenVPN > delete net 127.0.0.1: gateway 192.168.0.1 . 2016.06.08 12:42:01 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.50.0.1 128.0.0.0 . 2016.06.08 12:42:01 - OpenVPN > delete net 0.0.0.0: gateway 10.50.0.1 . 2016.06.08 12:42:01 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.50.0.1 128.0.0.0 . 2016.06.08 12:42:01 - OpenVPN > delete net 128.0.0.0: gateway 10.50.0.1 . 2016.06.08 12:42:01 - OpenVPN > Closing TUN/TAP interface . 2016.06.08 12:42:01 - OpenVPN > SIGTERM[hard,] received, process exiting . 2016.06.08 12:42:01 - Connection terminated. I 2016.06.08 12:42:01 - DNS of a network adapter restored to original settings (FT232R USB UART) I 2016.06.08 12:42:01 - DNS of a network adapter restored to original settings (Ethernet) I 2016.06.08 12:42:01 - DNS of a network adapter restored to original settings (Ethernet Adaptor (en4)) I 2016.06.08 12:42:01 - DNS of a network adapter restored to original settings (iPhone USB) I 2016.06.08 12:42:01 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2016.06.08 12:42:01 - DNS of a network adapter restored to original settings (FireWire) I 2016.06.08 12:42:01 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) I 2016.06.08 12:42:02 - Cancel requested. I 2016.06.08 12:42:02 - IPv6 restored on network adapter (FT232R USB UART) I 2016.06.08 12:42:02 - IPv6 restored on network adapter (Ethernet) I 2016.06.08 12:42:02 - IPv6 restored on network adapter (Ethernet Adaptor (en4)) I 2016.06.08 12:42:03 - IPv6 restored on network adapter (Wi-Fi) I 2016.06.08 12:42:03 - IPv6 restored on network adapter (iPhone USB) I 2016.06.08 12:42:03 - IPv6 restored on network adapter (Bluetooth PAN) I 2016.06.08 12:42:03 - IPv6 restored on network adapter (FireWire) I 2016.06.08 12:42:03 - IPv6 restored on network adapter (Thunderbolt Bridge) ! 2016.06.08 12:42:03 - Session terminated.
-
Hi, I installed the Eddie client from the .deb package, but when I try to connect I get the error Driver Installation Failed The logs show an error when I installed the client which says: OpenVPN Driver - Not available however, `open-vpn` and `bridge-utils` are installed. Any suggestions to get it working?
-
must have RSA 4096 BIt when it doesnt impact performance and doesnt cost then why not ?? it is never been late to do the right thing other VPN giving RSA 4096 since 2013 and so many more and more higher encryption this is more important than Water after dinner and sex after party must have RSA 4096 Bit encryption guys
-
Hey guys, I followed the instructions and when attempting to connect I get to Initalization Sequence Completed and then.. Nothing. It just hangs it seems like. Anyone have any suggestions? I did an alt+C to cancel at the end to restore internet access. Mon Jun 17 12:04:40 2013 OpenVPN 2.2.1 x86_64-linux-gnu [sSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [iPv6 payload 20110424-2 (2.2RC2)] built on Feb 27 2013Mon Jun 17 12:04:40 2013 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executablesMon Jun 17 12:04:40 2013 WARNING: file 'user.key' is group or others accessibleMon Jun 17 12:04:40 2013 LZO compression initializedMon Jun 17 12:04:40 2013 Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]Mon Jun 17 12:04:40 2013 Socket Buffers: R=[229376->131072] S=[229376->131072]Mon Jun 17 12:04:40 2013 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]Mon Jun 17 12:04:40 2013 Local Options hash (VER=V4): '22188c5b'Mon Jun 17 12:04:40 2013 Expected Remote Options hash (VER=V4): 'a8f55717'Mon Jun 17 12:04:40 2013 UDPv4 link local: [undef]Mon Jun 17 12:04:40 2013 UDPv4 link remote: [AF_INET]149.255.33.154:443Mon Jun 17 12:04:40 2013 TLS: Initial packet from [AF_INET]149.255.33.154:443, sid=73901bca b6551ec2Mon Jun 17 12:04:40 2013 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.orgMon Jun 17 12:04:40 2013 VERIFY OK: nsCertType=SERVERMon Jun 17 12:04:40 2013 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.orgMon Jun 17 12:04:41 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit keyMon Jun 17 12:04:41 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationMon Jun 17 12:04:41 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit keyMon Jun 17 12:04:41 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationMon Jun 17 12:04:41 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSAMon Jun 17 12:04:41 2013 [server] Peer Connection Initiated with [AF_INET]149.255.33.154:443Mon Jun 17 12:04:43 2013 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)Mon Jun 17 12:04:43 2013 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.39.62 10.4.39.61'Mon Jun 17 12:04:43 2013 OPTIONS IMPORT: timers and/or timeouts modifiedMon Jun 17 12:04:43 2013 OPTIONS IMPORT: LZO parms modifiedMon Jun 17 12:04:43 2013 OPTIONS IMPORT: --ifconfig/up options modifiedMon Jun 17 12:04:43 2013 OPTIONS IMPORT: route options modifiedMon Jun 17 12:04:43 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modifiedMon Jun 17 12:04:43 2013 ROUTE default_gateway=192.168.3.30Mon Jun 17 12:04:43 2013 TUN/TAP device tun0 openedMon Jun 17 12:04:43 2013 TUN/TAP TX queue length set to 100Mon Jun 17 12:04:43 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0Mon Jun 17 12:04:43 2013 /sbin/ifconfig tun0 10.4.39.62 pointopoint 10.4.39.61 mtu 1500Mon Jun 17 12:04:43 2013 /sbin/route add -net 149.255.33.154 netmask 255.255.255.255 gw 192.168.3.30Mon Jun 17 12:04:43 2013 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.4.39.61Mon Jun 17 12:04:43 2013 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.4.39.61Mon Jun 17 12:04:43 2013 /sbin/route add -net 10.4.0.1 netmask 255.255.255.255 gw 10.4.39.61Mon Jun 17 12:04:43 2013 Initialization Sequence Completed^CMon Jun 17 12:05:10 2013 event_wait : Interrupted system call (code=4)