Search the Community
Showing results for tags 'eddie-UI'.
Found 18 results
-
I bought 3 years thinking this would work fine, but since the minute I restarted my PC the program doesn't work. I've seen treads since 2021 and baffled this is still an issue and that the solution is to restart the PC (which isn't an actual solution, the program should run just fine). Is there anyway someone found how to actually fix this issue? Using windows 11, already added eddie to exceptions in my antivirus and run as administrator. I'm using Eddie version 2.21.8
-
connection issues ANSWERED Can't connect to any server
Empty_ch posted a topic in Troubleshooting and Problems
When I'm trying to connect in eddie-ui its disconnecting and trying to connect to another server again and again. I can connect with protocol WireGuard (port 51820). I have only windows antivirus which is turned off. Tried log out and log in, renew device in client area, changing IPv4 only to IPv4/IPv6. Month ago everything was fine. I 2024.08.10 23:13:49 - Session starting. I 2024.08.10 23:13:49 - Checking authorization ... . 2024.08.10 23:13:50 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2024.08.10 23:13:50 - Connecting to Kajam (Netherlands, Alblasserdam) . 2024.08.10 23:13:51 - Routes, add 213.152.161.87/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.10 23:13:51 - Routes, add 213.152.161.87/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", already exists. . 2024.08.10 23:13:51 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.08.10 23:13:51 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.08.10 23:13:51 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.08.10 23:13:51 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.10 23:13:51 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.10 23:13:51 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.10 23:13:51 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.10 23:13:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.87:443 . 2024.08.10 23:13:51 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.08.10 23:13:51 - OpenVPN > UDP link local: (not bound) . 2024.08.10 23:13:51 - OpenVPN > UDP link remote: [AF_INET]213.152.161.87:443 . 2024.08.10 23:13:53 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.87:443, sid=56972f66 162c8d2a . 2024.08.10 23:13:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.08.10 23:13:54 - OpenVPN > VERIFY KU OK . 2024.08.10 23:13:54 - OpenVPN > Validating certificate extended key usage . 2024.08.10 23:13:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.08.10 23:13:54 - OpenVPN > VERIFY EKU OK . 2024.08.10 23:13:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kajam, emailAddress=info@airvpn.org . 2024.08.10 23:13:54 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.08.10 23:13:54 - OpenVPN > [Kajam] Peer Connection Initiated with [AF_INET]213.152.161.87:443 . 2024.08.10 23:13:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.234.1,dhcp-option DNS6 fde6:7a:7d20:fea::1,tun-ipv6,route-gateway 10.19.234.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:fea::10ee/64 fde6:7a:7d20:fea::1,ifconfig 10.19.234.240 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2024.08.10 23:13:54 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.08.10 23:13:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.234.1' . 2024.08.10 23:13:54 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:fea::1' . 2024.08.10 23:13:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.08.10 23:13:54 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.08.10 23:13:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.08.10 23:13:54 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.08.10 23:13:54 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.08.10 23:13:54 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.08.10 23:13:54 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.08.10 23:13:54 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.08.10 23:13:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.08.10 23:13:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.08.10 23:13:54 - OpenVPN > interactive service msg_channel=0 . 2024.08.10 23:13:54 - OpenVPN > open_tun . 2024.08.10 23:13:54 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.08.10 23:13:54 - OpenVPN > Exiting due to fatal error ! 2024.08.10 23:13:54 - Disconnecting . 2024.08.10 23:13:54 - Routes, delete 213.152.161.87/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.10 23:13:55 - Routes, delete 213.152.161.87/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", not exists. . 2024.08.10 23:13:55 - Connection terminated. I 2024.08.10 23:13:58 - Checking authorization ... . 2024.08.10 23:13:59 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2024.08.10 23:13:59 - Connecting to Canis (Netherlands, Alblasserdam) . 2024.08.10 23:13:59 - Routes, add 213.152.161.221/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.10 23:13:59 - Routes, add 213.152.161.221/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", already exists. . 2024.08.10 23:13:59 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.08.10 23:13:59 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.08.10 23:13:59 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.08.10 23:13:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.10 23:13:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.10 23:13:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.10 23:13:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.10 23:13:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.221:443 . 2024.08.10 23:13:59 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.08.10 23:13:59 - OpenVPN > UDP link local: (not bound) . 2024.08.10 23:13:59 - OpenVPN > UDP link remote: [AF_INET]213.152.161.221:443 . 2024.08.10 23:13:59 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.221:443, sid=cf04e6c4 8c75719d . 2024.08.10 23:14:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.08.10 23:14:00 - OpenVPN > VERIFY KU OK . 2024.08.10 23:14:00 - OpenVPN > Validating certificate extended key usage . 2024.08.10 23:14:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.08.10 23:14:00 - OpenVPN > VERIFY EKU OK . 2024.08.10 23:14:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Canis, emailAddress=info@airvpn.org . 2024.08.10 23:14:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.08.10 23:14:00 - OpenVPN > [Canis] Peer Connection Initiated with [AF_INET]213.152.161.221:443 . 2024.08.10 23:14:00 - OpenVPN > SENT CONTROL [Canis]: 'PUSH_REQUEST' (status=1) . 2024.08.10 23:14:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.12.106.1,dhcp-option DNS6 fde6:7a:7d20:86a::1,tun-ipv6,route-gateway 10.12.106.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:86a::10f6/64 fde6:7a:7d20:86a::1,ifconfig 10.12.106.248 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2024.08.10 23:14:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.08.10 23:14:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.12.106.1' . 2024.08.10 23:14:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:86a::1' . 2024.08.10 23:14:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.08.10 23:14:00 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.08.10 23:14:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.08.10 23:14:00 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.08.10 23:14:00 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.08.10 23:14:00 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.08.10 23:14:00 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.08.10 23:14:00 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.08.10 23:14:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.08.10 23:14:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.08.10 23:14:00 - OpenVPN > interactive service msg_channel=0 . 2024.08.10 23:14:00 - OpenVPN > open_tun . 2024.08.10 23:14:00 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.08.10 23:14:00 - OpenVPN > Exiting due to fatal error ! 2024.08.10 23:14:00 - Disconnecting . 2024.08.10 23:14:00 - Routes, delete 213.152.161.221/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.10 23:14:01 - Routes, delete 213.152.161.221/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", not exists. . 2024.08.10 23:14:01 - Connection terminated. I 2024.08.10 23:14:04 - Checking authorization ... . 2024.08.10 23:14:04 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2024.08.10 23:14:04 - Connecting to Elnath (Netherlands, Alblasserdam) . 2024.08.10 23:14:05 - Routes, add 213.152.186.42/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.10 23:14:05 - Routes, add 213.152.186.42/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", already exists. . 2024.08.10 23:14:05 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.08.10 23:14:05 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.08.10 23:14:05 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.08.10 23:14:05 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.10 23:14:05 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.10 23:14:05 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.10 23:14:05 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.10 23:14:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.186.42:443 . 2024.08.10 23:14:05 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.08.10 23:14:05 - OpenVPN > UDP link local: (not bound) . 2024.08.10 23:14:05 - OpenVPN > UDP link remote: [AF_INET]213.152.186.42:443 . 2024.08.10 23:14:05 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.186.42:443, sid=a0c9d2fb 0d8b8998 . 2024.08.10 23:14:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.08.10 23:14:05 - OpenVPN > VERIFY KU OK . 2024.08.10 23:14:05 - OpenVPN > Validating certificate extended key usage . 2024.08.10 23:14:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.08.10 23:14:05 - OpenVPN > VERIFY EKU OK . 2024.08.10 23:14:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Elnath, emailAddress=info@airvpn.org . 2024.08.10 23:14:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.08.10 23:14:05 - OpenVPN > [Elnath] Peer Connection Initiated with [AF_INET]213.152.186.42:443 . 2024.08.10 23:14:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.42.1,dhcp-option DNS6 fde6:7a:7d20:c2a::1,tun-ipv6,route-gateway 10.16.42.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:c2a::1041/64 fde6:7a:7d20:c2a::1,ifconfig 10.16.42.67 255.255.255.0,peer-id 9,cipher AES-256-GCM' . 2024.08.10 23:14:05 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.08.10 23:14:05 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.16.42.1' . 2024.08.10 23:14:05 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:c2a::1' . 2024.08.10 23:14:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.08.10 23:14:05 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.08.10 23:14:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.08.10 23:14:05 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.08.10 23:14:05 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.08.10 23:14:05 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.08.10 23:14:05 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.08.10 23:14:05 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.08.10 23:14:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.08.10 23:14:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.08.10 23:14:05 - OpenVPN > interactive service msg_channel=0 . 2024.08.10 23:14:05 - OpenVPN > open_tun . 2024.08.10 23:14:05 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.08.10 23:14:05 - OpenVPN > Exiting due to fatal error ! 2024.08.10 23:14:05 - Disconnecting . 2024.08.10 23:14:06 - Routes, delete 213.152.186.42/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.10 23:14:06 - Routes, delete 213.152.186.42/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", not exists. . 2024.08.10 23:14:06 - Connection terminated. I 2024.08.10 23:14:09 - Checking authorization ... . 2024.08.10 23:14:10 - Using WinTun network interface "OpenVPN Data Channel Offload (OpenVPN Data Channel Offload)" ! 2024.08.10 23:14:10 - Connecting to Musica (Netherlands, Alblasserdam) . 2024.08.10 23:14:10 - Routes, add 213.152.161.251/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.10 23:14:10 - Routes, add 213.152.161.251/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", already exists. . 2024.08.10 23:14:10 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.08.10 23:14:10 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.08.10 23:14:10 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.08.10 23:14:10 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.10 23:14:10 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.10 23:14:10 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.08.10 23:14:10 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.08.10 23:14:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.251:443 . 2024.08.10 23:14:10 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.08.10 23:14:10 - OpenVPN > UDP link local: (not bound) . 2024.08.10 23:14:10 - OpenVPN > UDP link remote: [AF_INET]213.152.161.251:443 . 2024.08.10 23:14:10 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.251:443, sid=0247972f 8a344ede . 2024.08.10 23:14:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.08.10 23:14:11 - OpenVPN > VERIFY KU OK . 2024.08.10 23:14:11 - OpenVPN > Validating certificate extended key usage . 2024.08.10 23:14:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.08.10 23:14:11 - OpenVPN > VERIFY EKU OK . 2024.08.10 23:14:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Musica, emailAddress=info@airvpn.org . 2024.08.10 23:14:11 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.08.10 23:14:11 - OpenVPN > [Musica] Peer Connection Initiated with [AF_INET]213.152.161.251:443 . 2024.08.10 23:14:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.170.1,dhcp-option DNS6 fde6:7a:7d20:14aa::1,tun-ipv6,route-gateway 10.24.170.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:14aa::10b5/64 fde6:7a:7d20:14aa::1,ifconfig 10.24.170.183 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.08.10 23:14:11 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.08.10 23:14:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.24.170.1' . 2024.08.10 23:14:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:14aa::1' . 2024.08.10 23:14:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.08.10 23:14:11 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.08.10 23:14:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.08.10 23:14:11 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.08.10 23:14:11 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.08.10 23:14:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.08.10 23:14:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.08.10 23:14:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.08.10 23:14:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.08.10 23:14:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.08.10 23:14:11 - OpenVPN > interactive service msg_channel=0 . 2024.08.10 23:14:11 - OpenVPN > open_tun . 2024.08.10 23:14:11 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2024.08.10 23:14:11 - OpenVPN > Exiting due to fatal error ! 2024.08.10 23:14:11 - Disconnecting . 2024.08.10 23:14:11 - Routes, delete 213.152.161.251/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)". . 2024.08.10 23:14:12 - Routes, delete 213.152.161.251/32 for interface "WiFi (MediaTek Wi-Fi 6 MT7921 Wireless LAN Card)", not exists. . 2024.08.10 23:14:12 - Connection terminated. I 2024.08.10 23:14:15 - Cancel requested. ! 2024.08.10 23:14:15 - Session terminated. -
Logs -- https://eddie.website/report/bda37c11/ On ZorinOS 17 running Ubuntu 22.04 (more info here https://zorin.com/os/details/ ) Despite the option being enabled, minimizing Eddie just brings it to the taskbar without hiding it in the tray. Also worth mentioning that when Eddie is launched, it's automatically minimized and refuses to maximize. When I force-maximize it through keyboard options, I'm met with a completely black window. Only by going into tray and clicking the first option in the right click menu does the window return to normal. Another perhaps related oddity is the server screen looks like this - (see attachment) No lines between each server, and scrolling is wonky. This wasn't the case on previous installations (both Windows and Zorin 16). Please if you have any advice let me know.
-
Hello, I recently installed eddie-ui on my raspberry pi4 32bit (once via packagelist once via deb package) and cannot get it to start. If I open it via the gui it just shows a loading icon and then nothing happens. If I open it via the terminal I get an exception log. I can start the eddie cli via terminal without problems. The log: ================================================================= Native Crash Reporting ================================================================= Got a SIGSEGV while executing native code. This usually indicates a fatal error in the mono runtime or one of the native libraries used by your application. ================================================================= ================================================================= Native stacktrace: ================================================================= (No frames) ================================================================= Telemetry Dumper: ================================================================= Pkilling 0xf53a6440 from 0xf7c73040 Entering thread summarizer pause from 0xf7c73040 Finished thread summarizer pause from 0xf7c73040. Waiting for dumping threads to resume ================================================================= External Debugger Dump: ================================================================= [New LWP 1793] [New LWP 1794] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/arm-linux-gnueabihf/libthread_db.so.1". 0xf7a7a854 in __GI___wait4 (pid=1802, stat_loc=0xff8182f0, options=0, usage=0x0) at ../sysdeps/unix/sysv/linux/wait4.c:27 27 ../sysdeps/unix/sysv/linux/wait4.c: No such file or directory. Id Target Id Frame * 1 Thread 0xf7c73040 (LWP 1792) "mono" 0xf7a7a854 in __GI___wait4 (pid=1802, stat_loc=0xff8182f0, options=0, usage=0x0) at ../sysdeps/unix/sysv/linux/wait4.c:27 2 Thread 0xf6fff440 (LWP 1793) "SGen worker" futex_wait_cancelable (private=0, expected=0, futex_word=0x447698) at ../sysdeps/nptl/futex-internal.h:186 3 Thread 0xf53a6440 (LWP 1794) "Finalizer" futex_abstimed_wait_cancelable (private=0, abstime=0x0, clockid=0, expected=1, futex_word=0x43f73c) at ../sysdeps/nptl/futex-internal.h:323 Thread 3 (Thread 0xf53a6440 (LWP 1794) "Finalizer"): #0 futex_abstimed_wait_cancelable (private=0, abstime=0x0, clockid=0, expected=1, futex_word=0x43f73c) at ../sysdeps/nptl/futex-internal.h:323 #1 do_futex_wait (sem=sem@entry=0x43f73c, abstime=0x0, clockid=0) at sem_waitcommon.c:117 #2 0xf7b69c90 in __new_sem_wait_slow (sem=0x43f73c, abstime=0x0, clockid=0) at sem_waitcommon.c:285 #3 0x002c2120 in ?? () Backtrace stopped: previous frame identical to this frame (corrupt stack?) Thread 2 (Thread 0xf6fff440 (LWP 1793) "SGen worker"): #0 futex_wait_cancelable (private=0, expected=0, futex_word=0x447698) at ../sysdeps/nptl/futex-internal.h:186 #1 __pthread_cond_wait_common (abstime=0x0, clockid=0, mutex=0x0, cond=0x447670) at pthread_cond_wait.c:508 #2 __pthread_cond_wait (cond=0x447670, mutex=0x0) at pthread_cond_wait.c:638 #3 0x00327c84 in ?? () Backtrace stopped: previous frame identical to this frame (corrupt stack?) Thread 1 (Thread 0xf7c73040 (LWP 1792) "mono"): #0 0xf7a7a854 in __GI___wait4 (pid=1802, stat_loc=0xff8182f0, options=0, usage=0x0) at ../sysdeps/unix/sysv/linux/wait4.c:27 #1 0x0009f73c in ?? () Backtrace stopped: previous frame identical to this frame (corrupt stack?) [Inferior 1 (process 1792) detached] ================================================================= Basic Fault Address Reporting ================================================================= Memory around native instruction pointer (0xf7b675c0):0xf7b675b0 bc ff ff ea 98 70 00 00 f0 4f 2d e9 14 d0 4d e2 .....p...O-...M. 0xf7b675c0 24 50 90 e5 a5 31 b0 e1 28 01 00 0a 00 c0 a0 e1 $P...1..(....... 0xf7b675d0 01 50 15 e2 20 30 bc e5 00 e0 a0 e1 80 50 a0 13 .P.. 0.......P.. 0xf7b675e0 0a 00 00 ea 01 10 83 e3 9f 2f 9c e1 03 00 52 e1 ........./....R. ================================================================= Managed Stacktrace: ================================================================= at <unknown> <0xffffffff> at System.Windows.Forms.Theme:get_MenuAccessKeysUnderlined <0x0000f> at System.Windows.Forms.SystemInformation:get_MenuAccessKeysUnderlined <0x00023> at System.Windows.Forms.Control:.ctor <0x00287> at System.Windows.Forms.Control:.ctor <0x00037> at System.Windows.Forms.WindowsFormsSynchronizationContext:.cctor <0x0002b> at System.Object:runtime_invoke_void <0x0007b> at <unknown> <0xffffffff> at System.Windows.Forms.Control:.ctor <0x0004b> at System.Windows.Forms.ScrollableControl:.ctor <0x00013> at System.Windows.Forms.ContainerControl:.ctor <0x00033> at System.Windows.Forms.Form:.ctor <0x000d7> at Eddie.Forms.Skin.SkinForm:.ctor <0x00013> at Eddie.Forms.Forms.WindowSplash:.ctor <0x00013> at Eddie.Forms.Forms.WindowSplash:.ctor <0x00037> at Eddie.Forms.UiClient:Init <0x000a7> at Eddie.Forms.Linux.Program:Main <0x00243> at System.Object:runtime_invoke_void <0x000e3> ================================================================= /usr/bin/eddie-ui: line 2: 1792 Aborted mono /usr/lib/eddie-ui/eddie-ui.exe --path.resources=/usr/share/eddie-ui --path.exec="$0" "$@"
-
Description of Issue and Initial Testing: As the title states, whenever I have AirVPN with network lock enabled then starting Firefox takes an inordinately long time (for example, if I were to open the terminal and type "Firefox" it takes about 5-10 minutes before anything happens on my screen; it does not matter if I start Firefox from the GUI or terminal). The issue does not present itself when I try to open a chromium-based browser; it opens normally. It does not matter whether it is the first time launching Firefox or the nth time for n > 1. If I attempt to start Firefox, then the browser will still not open if I disconnect from the server. It will open the instant I turn off network lock. Startup speed is normal if I connect to a server without network lock enabled. Sometimes the problem intermittently comes and goes (bad days and good days) but most of the time it is there. I have tried adjusting the homepage in firefox and it made no difference, even if I set the homepage as simply a blank page. Conditions to reproduce: Use Eddie-UI on Fedora 40 (unsure if it depends on the distro/OS) Enable network lock Connect to any server Attempt to open Firefox or any Firefox-based browser. Investigating further, the following messages are printed in journalctl when the conditions above are satisfied (approximately alternating): I do not know enough about how networks are managed on gnu/linux to resolve this on my own, or make sense of this error. Nothing in the logs for Eddie seem to point to the issue either. I have attached the log from Eddie for completeness. It shows me connecting and disconnecting from various servers and attempting to open Firefox with network lock enabled. Additional info: OS: Fedora 40 (the issue is present on earlier versions of Fedora as well, at least since Fedora 35) Client: Eddie UI version 2.21.8 Firefox version: version 128.0, and present on earlier versions. Note: A separate issue that I will briefly mention here, in case it is relevant, is that on most WiFi networks I have a DNS leak visible in ipleak.net with AirVPN--with or without network lock. On a few networks this DNS leak is not present as long as network lock is enabled. When I say DNS leak I mean that ipleak.net shows the VPN DNS server as well as my router's DNS servers. Again, this may or may not be relevant. Eddie_20240715_004856.txt
-
I hope this doesn't break any rules, please let me know if it does (that's why I posted here) I'm not looking for AirVPN alternatives - more than happy with my 3 years with Air! Unfortunately though, Eddie doesn't work properly on my linux distro (ZorinOS), which I've customized quite a bit. So I'm looking for other clients that I can use AirVPN's servers on, that will hopefully work better. Any recommendations?
-
I am running Ubuntu MATE 1.26.2 with GUI and everything on a hypervisor, and i'm fairly new to linux. When in the terminal, trying to run "eddie-ui", it gives the following error: Gtk-Message: 19:56:02: Failed to load module "atk-bridge" F 2024.05.11 19:56:02 - Cannot initialize UI. Probably a DISPLAY issue, ensure your are not running as root. Error:A null reference or invalid value was found [GDI+ status: InvalidParameter] Running it with "sudo eddie-ui", i only get the "Cannot initialize UI" error I think i got it running in the cli with the --cli option, but not sure what happened after that as it didn't seem to connect to anything. I have been googling trying a bunch of stuff for a couple hours, and i am now running into a wall... What i remember trying: Installed x-tools Installed xorg read the man eddie-ui
-
Eddie was working perfectly for me yesterday, but when I turned it on today the option to enable network lock was no longer available. I was using version 2.23.2, and I then tried to update to 2.24.2* but the network lock is not displaying in that version either. I think that it is probably the same issue as described in this forum post, although the user there was on version 2.23.1. I tried to move to the 2.21.8 stable release, and the network lock was visible there**, but that release is otherwise not functional on my laptop so I am reliant on the beta version. Is there a fix for this? If not, will my connections still be secure without the network lock enabled? *Unrelated issue, but I had to update using the tar.zst. I tried the eddie-ui-git package in the AUR, but it would fail to start with the error: unknown command line option: '--path.resources=/usr/share/eddie-ui' **On first startup it was not visible, but after I rebooted my system it did appear. Rebooting did not solve the issue with 2.24.2
-
Hi, I've recently had to do a complete reset on my windows 8 PC. Following that I have tried to install the eddie-ui client. The windows 8/7 installer completed without issue, however the UI will not open giving an error of "Object reference not set to an instance of an object". To fix I have tried: The portable version of windows 8/7 gives the same error. The CLI for either version results in opening, and near immediate closure of the command prompt - I've been able to determine there are three lines printed, the first being "Method not found ... (something here I can't determine) ... System.Array.Empty". Disabling my PC's firewall has no impact on the UI executable or the CLI Running in administrator mode also does not make any change Running PC or network diagnostics (through the inbuilt windows services) does not make any change Rerunning the installer gives several errors for "Error opening file for writing: C :\Program Files\AirVPN\Eddie-UI.exe Click Abort to stop the installation, Retry to try again, or Ignore to skip this file.". Other files also impacted are Lib.Core.dll, Lib.Forms.dll, Lib.Forms.Skin.dll, and Lib.Platform.Windows.dll. The installer then completes without issue however the UI still does not open. The windows 10/11 portable version gives the same error attempting to open the UI. My installed versiono is eddie-ui_2.21.8_windows-7_x64_installer. System Details Windows 8 Processor: Intel(R) Core(TM) i5-3470 CPU @ 3.2GHz 3.20Ghz Installed memory (RAM): 10.0 GB (9.79 GB usable) System Type: 64-bit Operating System, x64-based processor Directory Contents Volume in drive C is Windows8_OS Volume Serial Number is REDACTED Directory of C:\Program Files\AirVPN 12/02/2023 08:10 AM <DIR> . 12/02/2023 08:10 AM <DIR> .. 05/26/2022 03:07 AM 323,800 Eddie-CLI-Elevated.exe 05/26/2022 03:07 AM 65,752 Eddie-CLI.exe 05/26/2022 03:08 AM 750,808 Eddie-Service-Elevated.exe 05/26/2022 03:08 AM 66,264 Eddie-UI.exe 05/26/2022 03:08 AM 343,256 Lib.Core.dll 05/26/2022 03:08 AM 2,177,752 Lib.Forms.dll 05/26/2022 03:08 AM 120,024 Lib.Forms.Skin.dll 05/26/2022 03:08 AM 78,552 Lib.Platform.Windows.dll 05/26/2022 03:08 AM 560,856 Lib.Platform.Windows.Native.dll 12/15/2021 12:57 AM 3,482,288 libcrypto-1_1-x64.dll 12/15/2021 12:57 AM 93,872 libpkcs11-helper-1.dll 12/15/2021 12:57 AM 694,448 libssl-1_1-x64.dll 12/15/2021 12:57 AM 121,008 lzo2.dll 04/19/2022 01:45 AM 1,439,328 ndp48-web.exe 12/15/2021 12:57 AM 847,536 openvpn.exe 06/12/2020 03:23 AM 678,312 plink.exe 12/02/2023 08:10 AM 0 print.txt 12/01/2023 09:45 PM <DIR> res 07/27/2021 04:06 AM 4,814,984 stunnel.exe 10/30/2019 11:34 PM 587,928 tap-windows.exe 06/17/2021 12:51 AM 45,432 tapctl.exe 12/02/2023 08:01 AM 93,256 uninstall.exe 04/21/2022 04:26 AM 25,314,320 VC_redist.x64.exe 12/16/2021 02:50 AM 3,000,552 wgtunnel.dll 06/25/2021 12:03 PM 604,848 wintun.dll 10/15/2021 11:47 PM 1,340,728 wireguard.dll 25 File(s) 47,645,904 bytes 3 Dir(s) 448,830,984,192 bytes free List of installed programs - attached. When the installer first ran it installed the latest Microsoft Visual C++ redistributable however there doesn't appear to be an issue with this. Any help getting this running would be appreciated. I previously had AirVPN working through the Eddie-UI installer on this PC before a system reset I was confident it was the same version as well. Kind Regards,
-
I have been having this issue since I installed Arch about a month ago.* When I am connected to my school's wifi and Air, and am browsing Firefox, websites like Reddit, Tumblr, and the AirVPN site itself will fail to load with the heading "Did Not Connect: Potential Security Issue" and the error "sec_error_unknown_issuer." A few other sites, the ones I've encountered being maia.crimew.gay and bandcamp.com, will fail to connect with an insecure connection and after clicking "continue to HTTP site" a few times open into Cisco Umbrella's blocked website page. I recently discovered that I can bypass all of this temporarily by turning on Firefox's DNS over HTTPS at the Increased Protection level.** However, I also experience the connection issue when attempting to open the Discord application, so the DoH on Firefox is only a partial solution. When I am connected to wifi and Air at home, or at another person's house, I do not experience any of these issues, but I have not had the opportunity to test on other public wifi connections so I do not know if it is specific to my school's wifi. When I run Eddie, the option to Connect to Recommended Server gets me stuck on the latency tests, so I have temporarily disabled them, but typically I can bypass that issue by selecting a specific server from the list of those available. At this point, everything in the connection process appears to go smoothly until the attempt to Check DNS. Occasionally it will go through on its first try or after the 4° try***, but usually it gets stuck in a loop of failing to connect and I have to disable DNS Check in order to connect to any server. I have attached eddie-system-report.txt and pasted my current logs, I hope they are useful. . 2023.12.05 11:09:48 - Eddie version: 2.21.8 / linux_x64, System: Linux, Name: Arch Linux, Version: Linux LAPTOP-WHEE-LINUX 6.6.3-arch1-1 #1 SMP PREEMPT_DYNAMIC Wed, 29 Nov 2023 00:37:40 +0000 x86_64 GNU/Linux, Mono/.Net: 6.12.0 (makepkg/d9a6e8710b3 Thu Aug 31 10:53:20 UTC 2023); Framework: v4.0.30319 . 2023.12.05 11:09:48 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2023.12.05 11:09:48 - Raise system privileges . 2023.12.05 11:09:57 - Reading options from /home/fin/.config/eddie/default.profile . 2023.12.05 11:09:58 - OpenVPN - Version: 2.6.8 - OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 (/usr/bin/openvpn) . 2023.12.05 11:09:58 - SSH - Version: OpenSSH_9.5p1, OpenSSL 3.1.4 24 Oct 2023 (/usr/bin/ssh) I 2023.12.05 11:09:58 - SSL - Not available . 2023.12.05 11:09:58 - curl - Version: 8.4.0 (/usr/bin/curl) I 2023.12.05 11:09:59 - Ready . 2023.12.05 11:10:00 - Collect information about AirVPN completed I 2023.12.05 11:10:14 - Session starting. I 2023.12.05 11:10:14 - Checking authorization ... ! 2023.12.05 11:10:15 - Connecting to Chort (Canada, Toronto, Ontario) . 2023.12.05 11:10:15 - Routes, add 104.254.90.237/32 for interface "wlan0". . 2023.12.05 11:10:15 - Routes, add 104.254.90.237/32 for interface "wlan0", already exists. . 2023.12.05 11:10:15 - OpenVPN > Note: --data-cipher-fallback with cipher 'AES-256-CBC' disables data channel offload. . 2023.12.05 11:10:15 - OpenVPN > OpenVPN 2.6.8 [git:makepkg/3b0d9489cc423da3+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Nov 17 2023 . 2023.12.05 11:10:15 - OpenVPN > library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 . 2023.12.05 11:10:15 - OpenVPN > DCO version: N/A . 2023.12.05 11:10:15 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.237:443 . 2023.12.05 11:10:15 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2023.12.05 11:10:15 - OpenVPN > UDPv4 link local: (not bound) . 2023.12.05 11:10:15 - OpenVPN > UDPv4 link remote: [AF_INET]104.254.90.237:443 . 2023.12.05 11:10:15 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.237:443, sid=d431c521 be37d7ea . 2023.12.05 11:10:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.12.05 11:10:15 - OpenVPN > VERIFY KU OK . 2023.12.05 11:10:15 - OpenVPN > Validating certificate extended key usage . 2023.12.05 11:10:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.12.05 11:10:15 - OpenVPN > VERIFY EKU OK . 2023.12.05 11:10:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chort, emailAddress=info@airvpn.org . 2023.12.05 11:10:16 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 . 2023.12.05 11:10:16 - OpenVPN > [Chort] Peer Connection Initiated with [AF_INET]104.254.90.237:443 . 2023.12.05 11:10:16 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.12.05 11:10:16 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.12.05 11:10:16 - OpenVPN > SENT CONTROL [Chort]: 'PUSH_REQUEST' (status=1) . 2023.12.05 11:10:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.14.54.1,dhcp-option DNS6 fde6:7a:7d20:a36::1,tun-ipv6,route-gateway 10.14.54.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:a36::1036/64 fde6:7a:7d20:a36::1,ifconfig 10.14.54.56 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.12.05 11:10:16 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.12.05 11:10:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.14.54.1' . 2023.12.05 11:10:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:a36::1' . 2023.12.05 11:10:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.12.05 11:10:16 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.12.05 11:10:16 - OpenVPN > TUN/TAP device tun0 opened . 2023.12.05 11:10:16 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:10:16 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:10:16 - OpenVPN > net_addr_v4_add: 10.14.54.56/24 dev tun0 . 2023.12.05 11:10:16 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:10:16 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:10:16 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:a36::1036/64 dev tun0 . 2023.12.05 11:10:16 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 2, compression: 'stub' . 2023.12.05 11:10:16 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.12.05 11:10:16 - OpenVPN > Protocol options: explicit-exit-notify 5 . 2023.12.05 11:10:22 - OpenVPN > Initialization Sequence Completed . 2023.12.05 11:10:22 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.12.05 11:10:22 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.12.05 11:10:22 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.12.05 11:10:22 - Routes, add ::/1 for interface "tun0". . 2023.12.05 11:10:22 - Routes, add 8000::/1 for interface "tun0". . 2023.12.05 11:10:22 - Routes, add 104.254.90.235/32 for interface "tun0". . 2023.12.05 11:10:22 - Routes, add 2606:6080:2001:8:df6a:e365:26ff:7f06/128 for interface "tun0". . 2023.12.05 11:10:22 - Flushing DNS I 2023.12.05 11:10:22 - Checking route IPv4 I 2023.12.05 11:10:22 - Checking route IPv6 I 2023.12.05 11:10:23 - Checking DNS . 2023.12.05 11:10:30 - Checking DNS (4° try) . 2023.12.05 11:10:34 - Checking DNS (5° try) E 2023.12.05 11:10:34 - Checking DNS failed, last reason: Checking DNS failed: ! 2023.12.05 11:10:34 - Disconnecting . 2023.12.05 11:10:34 - Sending soft termination signal . 2023.12.05 11:10:34 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4) . 2023.12.05 11:10:34 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.12.05 11:10:39 - OpenVPN > Closing TUN/TAP interface . 2023.12.05 11:10:39 - OpenVPN > net_addr_v4_del: 10.14.54.56 dev tun0 . 2023.12.05 11:10:39 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:a36::1036/64 dev tun0 . 2023.12.05 11:10:39 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.12.05 11:10:39 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:10:39 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:10:39 - Routes, delete ::/1 for interface "tun0", not exists. . 2023.12.05 11:10:39 - Routes, delete 8000::/1 for interface "tun0", not exists. . 2023.12.05 11:10:39 - Routes, delete 104.254.90.237/32 for interface "wlan0". . 2023.12.05 11:10:39 - Routes, delete 104.254.90.235/32 for interface "tun0", not exists. . 2023.12.05 11:10:39 - Routes, delete 2606:6080:2001:8:df6a:e365:26ff:7f06/128 for interface "tun0", not exists. . 2023.12.05 11:10:39 - Routes, delete 104.254.90.237/32 for interface "wlan0", not exists. . 2023.12.05 11:10:39 - DNS of the system restored to original settings (Rename method) . 2023.12.05 11:10:39 - Connection terminated. . 2023.12.05 11:10:43 - Waiting for latency tests (18 to go) I 2023.12.05 11:11:02 - Cancel requested. ! 2023.12.05 11:11:02 - Session terminated. I 2023.12.05 11:11:07 - Session starting. I 2023.12.05 11:11:07 - Checking authorization ... ! 2023.12.05 11:11:08 - Connecting to Regulus (Canada, Toronto, Ontario) . 2023.12.05 11:11:08 - Routes, add 184.75.221.37/32 for interface "wlan0". . 2023.12.05 11:11:08 - Routes, add 184.75.221.37/32 for interface "wlan0", already exists. . 2023.12.05 11:11:08 - OpenVPN > Note: --data-cipher-fallback with cipher 'AES-256-CBC' disables data channel offload. . 2023.12.05 11:11:08 - OpenVPN > OpenVPN 2.6.8 [git:makepkg/3b0d9489cc423da3+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Nov 17 2023 . 2023.12.05 11:11:08 - OpenVPN > library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 . 2023.12.05 11:11:08 - OpenVPN > DCO version: N/A . 2023.12.05 11:11:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.37:443 . 2023.12.05 11:11:08 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2023.12.05 11:11:08 - OpenVPN > UDPv4 link local: (not bound) . 2023.12.05 11:11:08 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.221.37:443 . 2023.12.05 11:11:08 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.37:443, sid=731b8854 25ebc26d . 2023.12.05 11:11:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.12.05 11:11:08 - OpenVPN > VERIFY KU OK . 2023.12.05 11:11:08 - OpenVPN > Validating certificate extended key usage . 2023.12.05 11:11:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.12.05 11:11:08 - OpenVPN > VERIFY EKU OK . 2023.12.05 11:11:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2023.12.05 11:11:08 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 . 2023.12.05 11:11:08 - OpenVPN > [Regulus] Peer Connection Initiated with [AF_INET]184.75.221.37:443 . 2023.12.05 11:11:08 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.12.05 11:11:08 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.12.05 11:11:09 - OpenVPN > SENT CONTROL [Regulus]: 'PUSH_REQUEST' (status=1) . 2023.12.05 11:11:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.22.1,dhcp-option DNS6 fde6:7a:7d20:1816::1,tun-ipv6,route-gateway 10.28.22.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1816::1040/64 fde6:7a:7d20:1816::1,ifconfig 10.28.22.66 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2023.12.05 11:11:09 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.12.05 11:11:09 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.22.1' . 2023.12.05 11:11:09 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1816::1' . 2023.12.05 11:11:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.12.05 11:11:09 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.12.05 11:11:09 - OpenVPN > TUN/TAP device tun0 opened . 2023.12.05 11:11:09 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:11:09 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:11:09 - OpenVPN > net_addr_v4_add: 10.28.22.66/24 dev tun0 . 2023.12.05 11:11:09 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:11:09 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:11:09 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:1816::1040/64 dev tun0 . 2023.12.05 11:11:09 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 5, compression: 'stub' . 2023.12.05 11:11:09 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.12.05 11:11:09 - OpenVPN > Protocol options: explicit-exit-notify 5 . 2023.12.05 11:11:15 - OpenVPN > Initialization Sequence Completed . 2023.12.05 11:11:15 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.12.05 11:11:15 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.12.05 11:11:15 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.12.05 11:11:15 - Routes, add ::/1 for interface "tun0". . 2023.12.05 11:11:15 - Routes, add 8000::/1 for interface "tun0". . 2023.12.05 11:11:15 - Routes, add 184.75.221.35/32 for interface "tun0". . 2023.12.05 11:11:15 - Routes, add 2606:6080:1001:e:2e9c:bad5:dbdd:84ea/128 for interface "tun0". . 2023.12.05 11:11:15 - Flushing DNS I 2023.12.05 11:11:15 - Checking route IPv4 I 2023.12.05 11:11:15 - Checking route IPv6 I 2023.12.05 11:11:16 - Checking DNS . 2023.12.05 11:11:23 - Checking DNS (4° try) . 2023.12.05 11:11:27 - Checking DNS (5° try) E 2023.12.05 11:11:27 - Checking DNS failed, last reason: Checking DNS failed: ! 2023.12.05 11:11:27 - Disconnecting . 2023.12.05 11:11:27 - Sending soft termination signal . 2023.12.05 11:11:27 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4) . 2023.12.05 11:11:27 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.12.05 11:11:32 - OpenVPN > Closing TUN/TAP interface . 2023.12.05 11:11:32 - OpenVPN > net_addr_v4_del: 10.28.22.66 dev tun0 . 2023.12.05 11:11:32 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:1816::1040/64 dev tun0 . 2023.12.05 11:11:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.12.05 11:11:32 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:11:32 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:11:32 - Routes, delete ::/1 for interface "tun0", not exists. . 2023.12.05 11:11:33 - Routes, delete 8000::/1 for interface "tun0", not exists. . 2023.12.05 11:11:33 - Routes, delete 184.75.221.37/32 for interface "wlan0". . 2023.12.05 11:11:33 - Routes, delete 184.75.221.35/32 for interface "tun0", not exists. . 2023.12.05 11:11:33 - Routes, delete 2606:6080:1001:e:2e9c:bad5:dbdd:84ea/128 for interface "tun0", not exists. . 2023.12.05 11:11:33 - Routes, delete 184.75.221.37/32 for interface "wlan0", not exists. . 2023.12.05 11:11:33 - DNS of the system restored to original settings (Rename method) . 2023.12.05 11:11:33 - Connection terminated. I 2023.12.05 11:11:36 - Checking authorization ... ! 2023.12.05 11:11:37 - Connecting to Lesath (Canada, Toronto, Ontario) . 2023.12.05 11:11:37 - Routes, add 184.75.221.5/32 for interface "wlan0". . 2023.12.05 11:11:37 - Routes, add 184.75.221.5/32 for interface "wlan0", already exists. . 2023.12.05 11:11:37 - OpenVPN > Note: --data-cipher-fallback with cipher 'AES-256-CBC' disables data channel offload. . 2023.12.05 11:11:37 - OpenVPN > OpenVPN 2.6.8 [git:makepkg/3b0d9489cc423da3+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Nov 17 2023 . 2023.12.05 11:11:37 - OpenVPN > library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 . 2023.12.05 11:11:37 - OpenVPN > DCO version: N/A . 2023.12.05 11:11:37 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.5:443 . 2023.12.05 11:11:37 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2023.12.05 11:11:37 - OpenVPN > UDPv4 link local: (not bound) . 2023.12.05 11:11:37 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.221.5:443 . 2023.12.05 11:11:37 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.5:443, sid=dd0a6bbd ed6eb272 . 2023.12.05 11:11:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.12.05 11:11:37 - OpenVPN > VERIFY KU OK . 2023.12.05 11:11:37 - OpenVPN > Validating certificate extended key usage . 2023.12.05 11:11:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.12.05 11:11:37 - OpenVPN > VERIFY EKU OK . 2023.12.05 11:11:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org . 2023.12.05 11:11:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 . 2023.12.05 11:11:37 - OpenVPN > [Lesath] Peer Connection Initiated with [AF_INET]184.75.221.5:443 . 2023.12.05 11:11:37 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.12.05 11:11:37 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.12.05 11:11:38 - OpenVPN > SENT CONTROL [Lesath]: 'PUSH_REQUEST' (status=1) . 2023.12.05 11:11:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.246.1,dhcp-option DNS6 fde6:7a:7d20:10f6::1,tun-ipv6,route-gateway 10.20.246.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:10f6::100e/64 fde6:7a:7d20:10f6::1,ifconfig 10.20.246.16 255.255.255.0,peer-id 10,cipher AES-256-GCM' . 2023.12.05 11:11:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.12.05 11:11:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.20.246.1' . 2023.12.05 11:11:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:10f6::1' . 2023.12.05 11:11:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.12.05 11:11:38 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.12.05 11:11:38 - OpenVPN > TUN/TAP device tun0 opened . 2023.12.05 11:11:38 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:11:38 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:11:38 - OpenVPN > net_addr_v4_add: 10.20.246.16/24 dev tun0 . 2023.12.05 11:11:38 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:11:38 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:11:38 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:10f6::100e/64 dev tun0 . 2023.12.05 11:11:38 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 10, compression: 'stub' . 2023.12.05 11:11:38 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.12.05 11:11:38 - OpenVPN > Protocol options: explicit-exit-notify 5 . 2023.12.05 11:11:43 - OpenVPN > Initialization Sequence Completed . 2023.12.05 11:11:43 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.12.05 11:11:43 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.12.05 11:11:43 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.12.05 11:11:43 - Routes, add ::/1 for interface "tun0". . 2023.12.05 11:11:43 - Routes, add 8000::/1 for interface "tun0". . 2023.12.05 11:11:43 - Routes, add 184.75.221.3/32 for interface "tun0". . 2023.12.05 11:11:43 - Routes, add 2606:6080:1001:d:c59c:6e9a:3115:6f2f/128 for interface "tun0". . 2023.12.05 11:11:43 - Flushing DNS I 2023.12.05 11:11:43 - Checking route IPv4 I 2023.12.05 11:11:44 - Checking route IPv6 I 2023.12.05 11:11:45 - Checking DNS . 2023.12.05 11:11:52 - Checking DNS (4° try) . 2023.12.05 11:11:57 - Checking DNS (5° try) E 2023.12.05 11:11:57 - Checking DNS failed, last reason: Checking DNS failed: ! 2023.12.05 11:11:57 - Disconnecting . 2023.12.05 11:11:57 - Sending soft termination signal . 2023.12.05 11:11:58 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4) . 2023.12.05 11:11:58 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.12.05 11:12:02 - OpenVPN > Closing TUN/TAP interface . 2023.12.05 11:12:02 - OpenVPN > net_addr_v4_del: 10.20.246.16 dev tun0 . 2023.12.05 11:12:02 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:10f6::100e/64 dev tun0 . 2023.12.05 11:12:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.12.05 11:12:02 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:12:02 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:12:02 - Routes, delete ::/1 for interface "tun0", not exists. . 2023.12.05 11:12:02 - Routes, delete 8000::/1 for interface "tun0", not exists. . 2023.12.05 11:12:03 - Routes, delete 184.75.221.5/32 for interface "wlan0". . 2023.12.05 11:12:03 - Routes, delete 184.75.221.3/32 for interface "tun0", not exists. . 2023.12.05 11:12:03 - Routes, delete 2606:6080:1001:d:c59c:6e9a:3115:6f2f/128 for interface "tun0", not exists. . 2023.12.05 11:12:03 - Routes, delete 184.75.221.5/32 for interface "wlan0", not exists. . 2023.12.05 11:12:03 - DNS of the system restored to original settings (Rename method) . 2023.12.05 11:12:03 - Connection terminated. I 2023.12.05 11:12:06 - Checking authorization ... ! 2023.12.05 11:12:07 - Connecting to Sargas (Canada, Toronto, Ontario) . 2023.12.05 11:12:07 - Routes, add 184.75.223.197/32 for interface "wlan0". . 2023.12.05 11:12:07 - Routes, add 184.75.223.197/32 for interface "wlan0", already exists. . 2023.12.05 11:12:07 - OpenVPN > Note: --data-cipher-fallback with cipher 'AES-256-CBC' disables data channel offload. . 2023.12.05 11:12:07 - OpenVPN > OpenVPN 2.6.8 [git:makepkg/3b0d9489cc423da3+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Nov 17 2023 . 2023.12.05 11:12:07 - OpenVPN > library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 . 2023.12.05 11:12:07 - OpenVPN > DCO version: N/A . 2023.12.05 11:12:07 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.197:443 . 2023.12.05 11:12:07 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2023.12.05 11:12:07 - OpenVPN > UDPv4 link local: (not bound) . 2023.12.05 11:12:07 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.197:443 . 2023.12.05 11:12:07 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.197:443, sid=3b54906a 5613b08f . 2023.12.05 11:12:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.12.05 11:12:07 - OpenVPN > VERIFY KU OK . 2023.12.05 11:12:07 - OpenVPN > Validating certificate extended key usage . 2023.12.05 11:12:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.12.05 11:12:07 - OpenVPN > VERIFY EKU OK . 2023.12.05 11:12:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sargas, emailAddress=info@airvpn.org . 2023.12.05 11:12:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 . 2023.12.05 11:12:07 - OpenVPN > [Sargas] Peer Connection Initiated with [AF_INET]184.75.223.197:443 . 2023.12.05 11:12:07 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.12.05 11:12:07 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.12.05 11:12:08 - OpenVPN > SENT CONTROL [Sargas]: 'PUSH_REQUEST' (status=1) . 2023.12.05 11:12:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.54.1,dhcp-option DNS6 fde6:7a:7d20:1936::1,tun-ipv6,route-gateway 10.29.54.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1936::1065/64 fde6:7a:7d20:1936::1,ifconfig 10.29.54.103 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.12.05 11:12:08 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.12.05 11:12:08 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.29.54.1' . 2023.12.05 11:12:08 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1936::1' . 2023.12.05 11:12:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.12.05 11:12:08 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.12.05 11:12:08 - OpenVPN > TUN/TAP device tun0 opened . 2023.12.05 11:12:08 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:12:08 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:12:08 - OpenVPN > net_addr_v4_add: 10.29.54.103/24 dev tun0 . 2023.12.05 11:12:08 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:12:08 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:12:08 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:1936::1065/64 dev tun0 . 2023.12.05 11:12:08 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 3, compression: 'stub' . 2023.12.05 11:12:08 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.12.05 11:12:08 - OpenVPN > Protocol options: explicit-exit-notify 5 . 2023.12.05 11:12:13 - OpenVPN > Initialization Sequence Completed . 2023.12.05 11:12:13 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.12.05 11:12:13 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.12.05 11:12:13 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.12.05 11:12:13 - Routes, add ::/1 for interface "tun0". . 2023.12.05 11:12:13 - Routes, add 8000::/1 for interface "tun0". . 2023.12.05 11:12:14 - Routes, add 184.75.223.195/32 for interface "tun0". . 2023.12.05 11:12:14 - Routes, add 2606:6080:1002:4:88e7:e893:3692:25d2/128 for interface "tun0". . 2023.12.05 11:12:14 - Flushing DNS I 2023.12.05 11:12:14 - Checking route IPv4 I 2023.12.05 11:12:14 - Checking route IPv6 I 2023.12.05 11:12:14 - Checking DNS . 2023.12.05 11:12:21 - Checking DNS (4° try) . 2023.12.05 11:12:26 - Checking DNS (5° try) E 2023.12.05 11:12:26 - Checking DNS failed, last reason: Checking DNS failed: ! 2023.12.05 11:12:26 - Disconnecting . 2023.12.05 11:12:26 - Sending soft termination signal . 2023.12.05 11:12:26 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4) . 2023.12.05 11:12:26 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.12.05 11:12:32 - OpenVPN > Closing TUN/TAP interface . 2023.12.05 11:12:32 - OpenVPN > net_addr_v4_del: 10.29.54.103 dev tun0 . 2023.12.05 11:12:32 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:1936::1065/64 dev tun0 . 2023.12.05 11:12:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.12.05 11:12:32 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:12:32 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:12:32 - Routes, delete ::/1 for interface "tun0", not exists. . 2023.12.05 11:12:32 - Routes, delete 8000::/1 for interface "tun0", not exists. . 2023.12.05 11:12:32 - Routes, delete 184.75.223.197/32 for interface "wlan0". . 2023.12.05 11:12:32 - Routes, delete 184.75.223.195/32 for interface "tun0", not exists. . 2023.12.05 11:12:32 - Routes, delete 2606:6080:1002:4:88e7:e893:3692:25d2/128 for interface "tun0", not exists. . 2023.12.05 11:12:32 - Routes, delete 184.75.223.197/32 for interface "wlan0", not exists. . 2023.12.05 11:12:32 - DNS of the system restored to original settings (Rename method) . 2023.12.05 11:12:32 - Connection terminated. I 2023.12.05 11:12:35 - Checking authorization ... ! 2023.12.05 11:12:36 - Connecting to Alwaid (Canada, Toronto, Ontario) . 2023.12.05 11:12:36 - Routes, add 184.75.221.109/32 for interface "wlan0". . 2023.12.05 11:12:36 - Routes, add 184.75.221.109/32 for interface "wlan0", already exists. . 2023.12.05 11:12:37 - OpenVPN > Note: --data-cipher-fallback with cipher 'AES-256-CBC' disables data channel offload. . 2023.12.05 11:12:37 - OpenVPN > OpenVPN 2.6.8 [git:makepkg/3b0d9489cc423da3+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Nov 17 2023 . 2023.12.05 11:12:37 - OpenVPN > library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 . 2023.12.05 11:12:37 - OpenVPN > DCO version: N/A . 2023.12.05 11:12:37 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.109:443 . 2023.12.05 11:12:37 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2023.12.05 11:12:37 - OpenVPN > UDPv4 link local: (not bound) . 2023.12.05 11:12:37 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.221.109:443 . 2023.12.05 11:12:37 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.109:443, sid=11a2f4a0 5d4c0177 . 2023.12.05 11:12:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.12.05 11:12:37 - OpenVPN > VERIFY KU OK . 2023.12.05 11:12:37 - OpenVPN > Validating certificate extended key usage . 2023.12.05 11:12:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.12.05 11:12:37 - OpenVPN > VERIFY EKU OK . 2023.12.05 11:12:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org . 2023.12.05 11:12:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 . 2023.12.05 11:12:37 - OpenVPN > [Alwaid] Peer Connection Initiated with [AF_INET]184.75.221.109:443 . 2023.12.05 11:12:37 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.12.05 11:12:37 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.12.05 11:12:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.150.1,dhcp-option DNS6 fde6:7a:7d20:496::1,tun-ipv6,route-gateway 10.8.150.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:496::106f/64 fde6:7a:7d20:496::1,ifconfig 10.8.150.113 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.12.05 11:12:37 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.12.05 11:12:37 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.8.150.1' . 2023.12.05 11:12:37 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:496::1' . 2023.12.05 11:12:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.12.05 11:12:37 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.12.05 11:12:37 - OpenVPN > TUN/TAP device tun0 opened . 2023.12.05 11:12:37 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:12:37 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:12:37 - OpenVPN > net_addr_v4_add: 10.8.150.113/24 dev tun0 . 2023.12.05 11:12:37 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:12:37 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:12:37 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:496::106f/64 dev tun0 . 2023.12.05 11:12:37 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 0, compression: 'stub' . 2023.12.05 11:12:37 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.12.05 11:12:37 - OpenVPN > Protocol options: explicit-exit-notify 5 . 2023.12.05 11:12:42 - OpenVPN > Initialization Sequence Completed . 2023.12.05 11:12:42 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.12.05 11:12:42 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.12.05 11:12:43 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.12.05 11:12:43 - Routes, add ::/1 for interface "tun0". . 2023.12.05 11:12:43 - Routes, add 8000::/1 for interface "tun0". . 2023.12.05 11:12:43 - Routes, add 184.75.221.107/32 for interface "tun0". . 2023.12.05 11:12:43 - Routes, add 2606:6080:1001:30:5f94:f242:c829:1017/128 for interface "tun0". . 2023.12.05 11:12:43 - Flushing DNS I 2023.12.05 11:12:43 - Checking route IPv4 I 2023.12.05 11:12:43 - Checking route IPv6 ! 2023.12.05 11:12:44 - Connected. . 2023.12.05 11:40:05 - Collect information about AirVPN completed . 2023.12.05 12:10:11 - Collect information about AirVPN completed . 2023.12.05 12:12:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.12.05 12:12:10 - OpenVPN > VERIFY KU OK . 2023.12.05 12:12:10 - OpenVPN > Validating certificate extended key usage . 2023.12.05 12:12:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.12.05 12:12:10 - OpenVPN > VERIFY EKU OK . 2023.12.05 12:12:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org . 2023.12.05 12:12:10 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 * I have never experienced it before so I have been assuming that somewhere it has something to do with necessary programs and processes I may have been unaware of or installed incorrectly when I started with Arch. ** This only works if I select NextDNS as the provider, Cloudflare fails with the error "(NS_ERROR_GENERATE_FAILURE(NS_ERROR_MODULE_SECURITY, SEC_ERROR_UNKNOWN_ISSUER))." *** Even if it does go through with the DNS Check enabled, the websites still fail to connect without the Firefox DoH. I do not know how to get Eddie to go through with the connection with the DNS Check enabled, so I can't test and check logs at the moment, but earlier when it worked out like that I believe an error saying something like "UHOST_UNREACHABLE" appeared (in relation to Eddie's attempts at further checking the DNS?). eddie-system-report.txt
-
Hello everyone, I have a weird problem with Eddie, I cannot connect to any server anymore. It worked for months on Windows 11 till now. From now on : Eddie is set to connect at startup, but it doesn't seem to try to connect to the servers. If I click on “Connect to a recommended server”, it doesn’t do anything at all, just as if I hadn't clicked. I cannot close Eddie, when I close I get the confirmation window, I click “Yes”, then the confirmation window close, but Eddie doesn’t close. I must use the Windows task manager to quit. I cannot change the settings, because if I try to change them, the setting window get stucked. I must then use the Windows task manager to quit. I tried uninstalling/reinstalling, disabling my antivirus, using Malwarebyte scan, it doesn’t change anything. I tried to delete the Eddie folder in Appdata. Then, after lauching Eddie, it ask for my login, then Eddie is stucked in neverending “Checking login”. I tried disabling my ethernet connection in Windows network setting before launching Eddie. Of course Eddie can’t connect to the servers, but Eddie is no longer weirdly stucked and I can quit/change the settings properly. Eddie is again stucked if I launch it with internet connection. Thanks in advance, any help would be greatly appreciated. Logs : . 2023.12.04 21:12:55 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.22631.0, Mono/.Net: v4.0.30319 . 2023.12.04 21:12:55 - Command line arguments (1): path="home" . 2023.12.04 21:12:55 - Raise system privileges . 2023.12.04 21:12:57 - Reading options from C:\Users\tmth\AppData\Local\Eddie\default.profile . 2023.12.04 21:12:57 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2023.12.04 21:12:57 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2023.12.04 21:12:57 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2023.12.04 21:12:58 - Ready
-
I can't connect AIrVPN through the TOR browser. It gives the error UDP is not allowed with a proxy. Help pls
-
Hey guys Long term user of AirVPN here. I love it, never EVER had any issues with it. I currently use on a media server that sits in the corner of a room. No monitor, etc. I use TeamViewer to connect to the machine (Peppermint Linux) and connect Eddie. When I activate the network lock, over TeamViewer, the connection stays up and I can click the "Connect to recommended server" no problem. However, when I'm finished, and I disconnect Eddie, the TeamViewer connection drops and I cannot use it to deactivate the network lock (clearly because the network lock has stopped TeamViewer from connecting) My questions are: Why doesn't activating the network lock block TeamViewer before connecting (although I'm not overly fussed about knowing why) Is there a way of telling the network lock to allow connections from the LAN? At least if TeamViewer dropped off, I could then perhaps SSH in from another machine and deactivate the network block, for instance Anyway, its a pure annoyance, and not really AirVPN's fault - its doing its job. I'd just like to know if there is a solution, currently I have to hard reset the server when it happens (I could turn on the monitor but more often than not, it doesn't receive a signal from the graphics card - dodgy GVX card I think) I'm using Eddie 2.19.7 Thanks in advance, uwu73
-
Recently Qbittorrent has begun locking withing 60 seconds of startup when running Eddie. Even if no torrents are active, it locks up. I am running Fedora 34 and have tried a bunch of kernels and roll backs to no avail. I have downgraded openvpn and qbittorrent (both were updated recently). I even built qbittorrent from source to test. No luck. I have tried upgrading eddie ui to the 2.21 beta and downgrading to 2.16 and 2.18. (Still no positive result) I have tried using just the root user with no torrents, I have tried Fedora 35 beta with the same result. Frankly, I'm stumped. Are there other RPMs I could try downgrading or changing? Anyone else seeing something like this?
-
Hi all, I have an odd problem, everything on my eddie-UI is tiny (see attached). I'm running arch-manjaro-xfce-18.0.2 I have tried increasing the font in eddies settings; it increased, but not in any significant way. Any help would be greatly appreciated, Thanks, Hubert.
-
Running Manjaro 18.0, and it occurs both with the stable and beta.
-
Is the password you use for the client the same as the password you use to login to airvpn.org? In the commandline I am passing the password as an argument but it is saying it's wrong. Well, technically it's a wrong login. I 2018.08.25 18:23:40 - Checking login ...F 2018.08.25 18:23:41 - Wrong login/password. I can't remember my settings since they are saved in the Windows client and I've never changed them.