Jump to content
Not connected, Your IP: 3.137.177.116

Search the Community

Showing results for tags 'internet'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 18 results

  1. When I try to connect to a server, my computer disconnects from the internet. My ISP is RCN. I'm on WiFi. I just did a factory reset of my modem and router, Arris s33 and TP-Link Ax6000, respectively. My connection is fine when the VPN is not connected to a server. . 2024.05.27 19:18:58 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.22631.0, Mono/.Net: v4.0.30319 . 2024.05.27 19:18:58 - Command line arguments (1): path="home" . 2024.05.27 19:18:58 - Raise system privileges . 2024.05.27 19:19:01 - Reading options from C:\Users\Acer\AppData\Local\Eddie\default.profile . 2024.05.27 19:19:02 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2024.05.27 19:19:02 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2024.05.27 19:19:02 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) W 2024.05.27 19:19:02 - Windows WFP, recovery of pending rules. . 2024.05.27 19:19:02 - Recovery. Unexpected crash? ! 2024.05.27 19:19:02 - Deactivation of Network Lock I 2024.05.27 19:19:02 - Ready . 2024.05.27 19:19:03 - Collect information about AirVPN completed ! 2024.05.27 19:19:04 - Logged out. I 2024.05.27 19:19:05 - Checking login ... ! 2024.05.27 19:19:05 - Logged in. I 2024.05.27 19:19:12 - Session starting. I 2024.05.27 19:19:13 - Checking authorization ... . 2024.05.27 19:19:14 - Added new network interface "Eddie", Wintun version 0.12 . 2024.05.27 19:19:14 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.05.27 19:19:14 - Connecting to Alnitak (Serbia, Belgrade) . 2024.05.27 19:19:14 - Routes, add 152.89.160.133/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)". . 2024.05.27 19:19:14 - Routes, add 152.89.160.133/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)", already exists. . 2024.05.27 19:19:14 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.05.27 19:19:14 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.05.27 19:19:14 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.05.27 19:19:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.27 19:19:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.27 19:19:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.27 19:19:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.27 19:19:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]152.89.160.133:443 . 2024.05.27 19:19:14 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.05.27 19:19:14 - OpenVPN > UDP link local: (not bound) . 2024.05.27 19:19:14 - OpenVPN > UDP link remote: [AF_INET]152.89.160.133:443 . 2024.05.27 19:19:14 - OpenVPN > TLS: Initial packet from [AF_INET]152.89.160.133:443, sid=3162c042 7accb1f0 . 2024.05.27 19:19:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.05.27 19:19:14 - OpenVPN > VERIFY KU OK . 2024.05.27 19:19:14 - OpenVPN > Validating certificate extended key usage . 2024.05.27 19:19:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.05.27 19:19:14 - OpenVPN > VERIFY EKU OK . 2024.05.27 19:19:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alnitak, emailAddress=info@airvpn.org . 2024.05.27 19:19:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.05.27 19:19:15 - OpenVPN > [Alnitak] Peer Connection Initiated with [AF_INET]152.89.160.133:443 . 2024.05.27 19:19:15 - OpenVPN > SENT CONTROL [Alnitak]: 'PUSH_REQUEST' (status=1) . 2024.05.27 19:19:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.11.146.1,dhcp-option DNS6 fde6:7a:7d20:792::1,tun-ipv6,route-gateway 10.11.146.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:792::1058/64 fde6:7a:7d20:792::1,ifconfig 10.11.146.90 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.05.27 19:19:15 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.05.27 19:19:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.11.146.1' . 2024.05.27 19:19:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:792::1' . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.05.27 19:19:15 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.05.27 19:19:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.05.27 19:19:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.05.27 19:19:15 - OpenVPN > interactive service msg_channel=0 . 2024.05.27 19:19:15 - OpenVPN > open_tun . 2024.05.27 19:19:15 - OpenVPN > wintun device [Eddie] opened . 2024.05.27 19:19:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 47 static 10.11.146.90 255.255.255.0 . 2024.05.27 19:19:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 47 all . 2024.05.27 19:19:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 47 all . 2024.05.27 19:19:15 - OpenVPN > IPv4 MTU set to 1500 on interface 47 using SetIpInterfaceEntry() . 2024.05.27 19:19:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 47 fde6:7a:7d20:792::1058/128 store=active . 2024.05.27 19:19:15 - OpenVPN > add_route_ipv6(fde6:7a:7d20:792::/64 -> fde6:7a:7d20:792::1058 metric 0) dev Eddie . 2024.05.27 19:19:15 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:792::/64 47 fe80::8 store=active . 2024.05.27 19:19:15 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.05.27 19:19:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 47 all . 2024.05.27 19:19:15 - OpenVPN > IPv6 MTU set to 1500 on interface 47 using SetIpInterfaceEntry() . 2024.05.27 19:19:15 - OpenVPN > Initialization Sequence Completed . 2024.05.27 19:19:15 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.05.27 19:19:15 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.05.27 19:19:15 - DNS leak protection with packet filtering enabled. . 2024.05.27 19:19:15 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.11.146.1) . 2024.05.27 19:19:16 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:792::1) . 2024.05.27 19:19:16 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:19:16 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:19:16 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:19:16 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:19:16 - Routes, add 152.89.160.131/32 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:19:17 - Routes, add 2001:ac8:7d:1e11:3b82:4ed7:b05:3386/128 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:19:17 - Flushing DNS I 2024.05.27 19:19:17 - Checking route IPv4 . 2024.05.27 19:19:44 - Checking route (4° try) . 2024.05.27 19:20:09 - Checking route (5° try) E 2024.05.27 19:20:30 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2024.05.27 19:20:30 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:20:30 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:20:30 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:20:30 - Above log line repeated 20 times more ! 2024.05.27 19:20:30 - Disconnecting . 2024.05.27 19:20:30 - Sending soft termination signal . 2024.05.27 19:20:33 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.05.27 19:20:35 - OpenVPN > Closing TUN/TAP interface . 2024.05.27 19:20:35 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:792::/64) . 2024.05.27 19:20:35 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:792::/64 47 fe80::8 store=active . 2024.05.27 19:20:35 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 47 fde6:7a:7d20:792::1058 store=active . 2024.05.27 19:20:35 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 47 10.11.146.90 store=active . 2024.05.27 19:20:35 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.05.27 19:20:35 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:36 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:36 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:36 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:36 - Routes, delete 152.89.160.133/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)". . 2024.05.27 19:20:36 - Routes, delete 152.89.160.131/32 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:36 - Routes, delete 2001:ac8:7d:1e11:3b82:4ed7:b05:3386/128 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:36 - Routes, delete 152.89.160.133/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)", not exists. . 2024.05.27 19:20:36 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.05.27 19:20:37 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.05.27 19:20:37 - DNS leak protection with packet filtering disabled. . 2024.05.27 19:20:37 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.05.27 19:20:37 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.05.27 19:20:37 - Connection terminated. I 2024.05.27 19:20:40 - Checking authorization ... . 2024.05.27 19:20:40 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.05.27 19:20:40 - Connecting to Sharatan (Canada, Toronto, Ontario) . 2024.05.27 19:20:40 - Routes, add 104.254.90.197/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)". . 2024.05.27 19:20:41 - Routes, add 104.254.90.197/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)", already exists. . 2024.05.27 19:20:41 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.05.27 19:20:41 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.05.27 19:20:41 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.05.27 19:20:41 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.27 19:20:41 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.27 19:20:41 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.27 19:20:41 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.27 19:20:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.197:443 . 2024.05.27 19:20:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.05.27 19:20:41 - OpenVPN > UDP link local: (not bound) . 2024.05.27 19:20:41 - OpenVPN > UDP link remote: [AF_INET]104.254.90.197:443 . 2024.05.27 19:20:41 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.197:443, sid=8b799069 f4142b47 . 2024.05.27 19:20:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.05.27 19:20:41 - OpenVPN > VERIFY KU OK . 2024.05.27 19:20:41 - OpenVPN > Validating certificate extended key usage . 2024.05.27 19:20:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.05.27 19:20:41 - OpenVPN > VERIFY EKU OK . 2024.05.27 19:20:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2024.05.27 19:20:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.05.27 19:20:41 - OpenVPN > [Sharatan] Peer Connection Initiated with [AF_INET]104.254.90.197:443 . 2024.05.27 19:20:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.242.1,dhcp-option DNS6 fde6:7a:7d20:19f2::1,tun-ipv6,route-gateway 10.29.242.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:19f2::1024/64 fde6:7a:7d20:19f2::1,ifconfig 10.29.242.38 255.255.255.0,peer-id 13,cipher AES-256-GCM' . 2024.05.27 19:20:41 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.05.27 19:20:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.29.242.1' . 2024.05.27 19:20:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:19f2::1' . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.05.27 19:20:41 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.05.27 19:20:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.05.27 19:20:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.05.27 19:20:41 - OpenVPN > interactive service msg_channel=0 . 2024.05.27 19:20:41 - OpenVPN > open_tun . 2024.05.27 19:20:41 - OpenVPN > wintun device [Eddie] opened . 2024.05.27 19:20:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 47 static 10.29.242.38 255.255.255.0 . 2024.05.27 19:20:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 47 all . 2024.05.27 19:20:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 47 all . 2024.05.27 19:20:41 - OpenVPN > IPv4 MTU set to 1500 on interface 47 using SetIpInterfaceEntry() . 2024.05.27 19:20:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 47 fde6:7a:7d20:19f2::1024/128 store=active . 2024.05.27 19:20:41 - OpenVPN > add_route_ipv6(fde6:7a:7d20:19f2::/64 -> fde6:7a:7d20:19f2::1024 metric 0) dev Eddie . 2024.05.27 19:20:41 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:19f2::/64 47 fe80::8 store=active . 2024.05.27 19:20:41 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.05.27 19:20:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 47 all . 2024.05.27 19:20:42 - OpenVPN > IPv6 MTU set to 1500 on interface 47 using SetIpInterfaceEntry() . 2024.05.27 19:20:42 - OpenVPN > Initialization Sequence Completed . 2024.05.27 19:20:42 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.05.27 19:20:42 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.05.27 19:20:42 - DNS leak protection with packet filtering enabled. . 2024.05.27 19:20:42 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.29.242.1) . 2024.05.27 19:20:42 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:19f2::1) . 2024.05.27 19:20:42 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:42 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:42 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:42 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:43 - Routes, add 104.254.90.195/32 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:43 - Routes, add 2606:6080:2001:6:e14e:c3f3:8562:6916/128 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:43 - Flushing DNS I 2024.05.27 19:20:43 - Checking route IPv4 . 2024.05.27 19:21:10 - Checking route (4° try) . 2024.05.27 19:21:35 - Checking route (5° try) E 2024.05.27 19:21:56 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2024.05.27 19:21:56 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:21:56 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:21:56 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:21:56 - Above log line repeated 15 times more ! 2024.05.27 19:21:56 - Disconnecting . 2024.05.27 19:21:56 - Sending soft termination signal . 2024.05.27 19:21:59 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.05.27 19:22:01 - OpenVPN > Closing TUN/TAP interface . 2024.05.27 19:22:01 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:19f2::/64) . 2024.05.27 19:22:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:19f2::/64 47 fe80::8 store=active . 2024.05.27 19:22:01 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 47 fde6:7a:7d20:19f2::1024 store=active . 2024.05.27 19:22:01 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 47 10.29.242.38 store=active . 2024.05.27 19:22:01 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.05.27 19:22:01 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:01 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:01 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:01 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:02 - Routes, delete 104.254.90.197/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)". . 2024.05.27 19:22:02 - Routes, delete 104.254.90.195/32 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:02 - Routes, delete 2606:6080:2001:6:e14e:c3f3:8562:6916/128 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:02 - Routes, delete 104.254.90.197/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)", not exists. . 2024.05.27 19:22:02 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.05.27 19:22:02 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.05.27 19:22:02 - DNS leak protection with packet filtering disabled. . 2024.05.27 19:22:02 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.05.27 19:22:02 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.05.27 19:22:02 - Connection terminated. I 2024.05.27 19:22:05 - Checking authorization ... . 2024.05.27 19:22:06 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.05.27 19:22:06 - Connecting to Enif (Canada, Toronto, Ontario) . 2024.05.27 19:22:06 - Routes, add 104.254.90.245/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)". . 2024.05.27 19:22:06 - Routes, add 104.254.90.245/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)", already exists. . 2024.05.27 19:22:06 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.05.27 19:22:06 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.05.27 19:22:06 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.05.27 19:22:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.27 19:22:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.27 19:22:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.27 19:22:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.27 19:22:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.245:443 . 2024.05.27 19:22:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.05.27 19:22:06 - OpenVPN > UDP link local: (not bound) . 2024.05.27 19:22:06 - OpenVPN > UDP link remote: [AF_INET]104.254.90.245:443 . 2024.05.27 19:22:06 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.245:443, sid=3683630a a2432df3 . 2024.05.27 19:22:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.05.27 19:22:06 - OpenVPN > VERIFY KU OK . 2024.05.27 19:22:06 - OpenVPN > Validating certificate extended key usage . 2024.05.27 19:22:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.05.27 19:22:06 - OpenVPN > VERIFY EKU OK . 2024.05.27 19:22:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2024.05.27 19:22:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.05.27 19:22:06 - OpenVPN > [Enif] Peer Connection Initiated with [AF_INET]104.254.90.245:443 . 2024.05.27 19:22:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.82.1,dhcp-option DNS6 fde6:7a:7d20:c52::1,tun-ipv6,route-gateway 10.16.82.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:c52::1016/64 fde6:7a:7d20:c52::1,ifconfig 10.16.82.24 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2024.05.27 19:22:06 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.05.27 19:22:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.16.82.1' . 2024.05.27 19:22:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:c52::1' . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.05.27 19:22:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.05.27 19:22:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.05.27 19:22:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.05.27 19:22:06 - OpenVPN > interactive service msg_channel=0 . 2024.05.27 19:22:06 - OpenVPN > open_tun . 2024.05.27 19:22:06 - OpenVPN > wintun device [Eddie] opened . 2024.05.27 19:22:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 47 static 10.16.82.24 255.255.255.0 . 2024.05.27 19:22:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 47 all . 2024.05.27 19:22:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 47 all . 2024.05.27 19:22:07 - OpenVPN > IPv4 MTU set to 1500 on interface 47 using SetIpInterfaceEntry() . 2024.05.27 19:22:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 47 fde6:7a:7d20:c52::1016/128 store=active . 2024.05.27 19:22:07 - OpenVPN > add_route_ipv6(fde6:7a:7d20:c52::/64 -> fde6:7a:7d20:c52::1016 metric 0) dev Eddie . 2024.05.27 19:22:07 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:c52::/64 47 fe80::8 store=active . 2024.05.27 19:22:07 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.05.27 19:22:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 47 all . 2024.05.27 19:22:07 - OpenVPN > IPv6 MTU set to 1500 on interface 47 using SetIpInterfaceEntry() . 2024.05.27 19:22:07 - OpenVPN > Initialization Sequence Completed . 2024.05.27 19:22:07 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.05.27 19:22:07 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.05.27 19:22:07 - DNS leak protection with packet filtering enabled. . 2024.05.27 19:22:07 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.16.82.1) . 2024.05.27 19:22:07 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:c52::1) . 2024.05.27 19:22:07 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:07 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:07 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:08 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:08 - Routes, add 104.254.90.243/32 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:08 - Routes, add 2606:6080:2001:9:2679:addd:655:8142/128 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:08 - Flushing DNS I 2024.05.27 19:22:08 - Checking route IPv4 . 2024.05.27 19:22:32 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:22:32 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:22:32 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:22:32 - Above log line repeated 11 times more ! 2024.05.27 19:22:32 - Disconnecting . 2024.05.27 19:22:32 - Sending soft termination signal . 2024.05.27 19:22:35 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.05.27 19:22:37 - OpenVPN > Closing TUN/TAP interface . 2024.05.27 19:22:37 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:c52::/64) . 2024.05.27 19:22:37 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:c52::/64 47 fe80::8 store=active . 2024.05.27 19:22:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 47 fde6:7a:7d20:c52::1016 store=active . 2024.05.27 19:22:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 47 10.16.82.24 store=active . 2024.05.27 19:22:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.05.27 19:22:37 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:38 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:38 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:38 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:38 - Routes, delete 104.254.90.245/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)". . 2024.05.27 19:22:38 - Routes, delete 104.254.90.243/32 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:38 - Routes, delete 2606:6080:2001:9:2679:addd:655:8142/128 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:38 - Routes, delete 104.254.90.245/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)", not exists. . 2024.05.27 19:22:39 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.05.27 19:22:39 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.05.27 19:22:39 - DNS leak protection with packet filtering disabled. . 2024.05.27 19:22:39 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.05.27 19:22:39 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.05.27 19:22:39 - Connection terminated. I 2024.05.27 19:22:39 - Cancel requested. ! 2024.05.27 19:22:39 - Session terminated.
  2. Hi guys, iv'e tried a few distros with WireGuard but for some reason they all connect, but I loose internet connectivity right after. I always use the config generator with IPv4 only and Europe. I then import the file in to the Network Manager in KDE, connect without any problems and from then on my Internet is down. I am currently running Manjaro on a Raspberry Pi. Does anybody have any similar issues? Running the VPN over my Router directly works fine, which is confusing me. Although, this won't help me with my project. Thanks in advance for any answers!
  3. I finished reading https://jigsaw.google.com/the-current/shutdown/ the other day, this beautiful presentation highlights mostly the spectrum of political 'lights out' events when entire regions are denied access to the Internet, for example during elections. I commend them for including a lot of references there, the kind of action modern journalists don't need to do apparently. One of these references linked this UN document: https://undocs.org/A/HRC/47/24/Add.2 One of the most flagrant attacks on the Internet that had an immediate impact on me personally were commited in Belarus and Russia in the recent years. In the past 7 or 8 years Russia had been tightening their control over the Internet and that included banning websites (like EVE Online and their wiki article about an in-game drug LOL) or bloggers/apps that did not agree with the mandatory "registry" registration, e.g. Telegram. In their attempt to ban Telegram, the government has had over 2 million IPs of Google and Amazon blocked which led to massive and unrelated service failures. Some of the international traffic in and out of Belarus is routed through big russian transit providers and as a result some of these blocks have unlawfully hit belarussian citizens. And of course these laws were used to block political websites. How often does Russia appear in this report? Answer: ONCE. As a footnote 78 on page 12. This doesn't reference law changes from 2012-2014 and later that lead to current blocks! Belarus' internet censorship. I don't think I have to explain much because this was so recent during the last "election". At least the report acknowledges it fully, five times no less: I can confirm there were disruptions, but I'm still here thanks to AirVPN : ) Thanks for non-standard connection options. I don't know who exactly they're talking about, but this reminds me of Cisco helping to build the Great Firewall of China! The UN welcomes internet censorship How often does China appear in this report? Occurrences: 0. What's legal today can quickly become illegal tomorrow, no matter justified or not, morally correct or not. The UN completely agrees with such laws: just please don't block the entire internet, ok? Basically totalitarian governments can do whatever if they take 2 months time to write it as law. Maybe the new law was put together by a lobby group, doesn't matter. You are allowed to censor then. American services banning Iranian users if connected without VPN? Totally cool with that! Russia banning 2 million IPs? Haha at least you didn't ban 4 milliard IPs, you get a free pass! Ukraine blocks access to all russian social networks due to war in the east? Ukraine, occurrences = 0. The UN loves "lawful" internet censorship.
  4. OK here it is: I updated my imac to the latest mojave and airvpn started acting up. Specifically when i went to shut it down prior to turning the computer off it would lock everything up. The only way I could shut off the mac was to hold down the start button until it shut down. Subsequent start up seemed normal but a repeat of the above issues trying to shut it down. So I decided to delete airvpn and reinstall in via the airvpn site. The moment I removed it the internet connection was lost and I am at my wits end trying to get it back. Any ideas from our mac experts? The only other anomilty was my avira virus said to follow a procedure to make sure it was up to date which i did but it periodically kept repeating itself on the update. I am typing this on a windows computer so the wifi is good and it even shows a strong signal on the mac. The mac just says "failed to open page". Again any expert suggestions welcome but be advised I'm not the sharpest tool in the shed lol. Thanks.
  5. hi First, I would like to thank you finally fixed Eddie for Mac OS X. Sadly, there is another issues...since your client crashes from time to time...it leaves all its crap in system. There is too many adapters that never were there. I managed to "ifconfig destroy" some of them but something still in system that blocks internet connection. If I disconnect VPN, my internet connection doesn't work anymore (I do not have kill switch on). Any suggestions, please?
  6. Hello. I live in the US and have been using VPN services here fine for around 2 years, but next week I am planning on going on a 3 week trip to Iran and am only bringing my mobile phone (Samsung Galaxy S9+ running Android 8.0.0) . I would like to know which VPN protocols, ports, and locations would be best for me to use while in Iran both in terms of effectively blocking censorship, and also in speed. Thank you
  7. I am experiencing a problem on my Linux Mint 18.2 Cinnamon 64-bit, GNOME. I use the AirVPN client. Recently, my AirVPN subscription expired (I plan on extending it). Occasionally when I boot my system, I can't establish a connection to the internet until I connect to an AirVPN server. Since my subscription expired, I can't remedy this issue now by connecting to an AirVPN server. The AirVPN client does show the servers. How can I remedy this issue and gain access to the internet without being connected to an AirVPN server? - IPv4 DNS *is* set to automatic - Firewall is currently off
  8. hello all I have some trouble with airvpn on pfsense 2.3 I setup on esxi 6 pfsense and followed the instruction to route all my hosts trough airvpn the problem now is that all my hosts don't have an internet example windows server 2012 R2 shows that I have internet, but I can't open a single page I used almighty PING to troubleshooting the problem and I can ping the pfsense, but I can't ping the cable modem(I am not sure that I suppose to ping the cable modem) I follow the the steps once again and I found something in "Step 4-b: Setting the AirVpn Gateway" Gateways After Editing AirVPN_WAN System: Gateways | Gateways | ______________________________________________________________________________________________________________________________________________ | Name | Interface | Gateway | Monitor IP | Description | Actions | | | | | | | | |_____________________|________________|___________________________|___________________________|________________________________|____________| | WAN_DHCP | WAN | 192.168.1.1 | 192.168.1.1 | Interface WAN_DHCP Gateway | | | (default) | | | | | ✐ ☐ Ø π | |_____________________|________________|___________________________|___________________________|________________________________|____________| | AirVPN_WAN | AirVPN_WAN | | | AirVPN_WAN | | | | | | | | ✐ ☐ Ø π | |_____________________|________________|___________________________|___________________________|________________________________|____________| in main WAN_DHCP (default) is under the AirVPN_WAN Is that going to make a difference ?????? Thank you
  9. Entire countries are redirected to US IP addresses. Either might be an IP problem, or the servers are really in the United States. If you cannot tell if the server is where they say it is, that's quite a problem! By comparison, i have only found about two AirVPN servers that Geolocate incorrectly, and there are plenty of alternative servers in those regions to supplement. Because PIA does not allow you to connect to specific servers, you have to roll a dice and hope that you connect to a server with good speeds and proper geo location. AirVPN by contrast allows you to pick these specifically, don't like a server? Don't use it. If its slow or has improper geolocation just connect to another server in the region.
  10. Greetings, I have recently switched from a wired connection to wi-fi. Since doing so, when I connect to to a server everything is working fine. Then approximately 1-5 minutes later, the internet just stops working. Nothing has changed. Airvpn says I'm still connected....however my internet just stops. This never happened when I was using my wired connection. Any thoughts/help would be awesome! I am using Windows 10 and Comodo Dragon. Anything else you need just let me know. Here are logs: ! 2016.11.11 15:26:48 - Logged in.I 2016.11.11 15:27:11 - Session starting.I 2016.11.11 15:27:11 - IPv6 disabled.I 2016.11.11 15:27:11 - Checking authorization ...! 2016.11.11 15:27:12 - Connecting to Dheneb (Canada, Toronto, Ontario). 2016.11.11 15:27:12 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.11.11 15:27:12 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.11 15:27:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.11 15:27:12 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.11 15:27:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.11 15:27:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.11 15:27:12 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2016.11.11 15:27:12 - OpenVPN > UDPv4 link local: [undef]. 2016.11.11 15:27:12 - OpenVPN > UDPv4 link remote: [AF_INET]199.21.149.44:443. 2016.11.11 15:27:12 - OpenVPN > TLS: Initial packet from [AF_INET]199.21.149.44:443, sid=63c430ab b1f5404f. 2016.11.11 15:27:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.11 15:27:12 - OpenVPN > Validating certificate key usage. 2016.11.11 15:27:12 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.11 15:27:12 - OpenVPN > VERIFY KU OK. 2016.11.11 15:27:12 - OpenVPN > Validating certificate extended key usage. 2016.11.11 15:27:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.11 15:27:12 - OpenVPN > VERIFY EKU OK. 2016.11.11 15:27:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.11 15:27:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.11 15:27:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.11 15:27:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.11 15:27:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.11 15:27:13 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.11 15:27:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.21.149.44:443. 2016.11.11 15:27:15 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.11 15:27:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.30 255.255.0.0'. 2016.11.11 15:27:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.11 15:27:15 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.11 15:27:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.11 15:27:15 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.11 15:27:15 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.11 15:27:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.11 15:27:15 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.11 15:27:15 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.11 15:27:15 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{F8663A1D-EFAC-413D-A549-4671748B60FD}.tap. 2016.11.11 15:27:15 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.11 15:27:15 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.2.30/255.255.0.0 [sUCCEEDED]. 2016.11.11 15:27:15 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.2.30/255.255.0.0 on interface {F8663A1D-EFAC-413D-A549-4671748B60FD} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2016.11.11 15:27:15 - OpenVPN > Successful ARP Flush on interface [19] {F8663A1D-EFAC-413D-A549-4671748B60FD}. 2016.11.11 15:27:20 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.11.11 15:27:20 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 199.21.149.44 MASK 255.255.255.255 172.20.20.1. 2016.11.11 15:27:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4. 2016.11.11 15:27:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.11 15:27:20 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 172.20.20.1 MASK 255.255.255.255 172.20.20.1 IF 13. 2016.11.11 15:27:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4. 2016.11.11 15:27:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.11 15:27:20 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.11 15:27:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.11 15:27:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.11 15:27:20 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2016.11.11 15:27:20 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.11 15:27:20 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.11 15:27:20 - Starting Management Interface. 2016.11.11 15:27:20 - OpenVPN > Initialization Sequence CompletedI 2016.11.11 15:27:20 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.11.11 15:27:20 - DNS of a network adapter forced (Belkin USB Wireless Adaptor)I 2016.11.11 15:27:20 - Flushing DNSI 2016.11.11 15:27:20 - Checking routeI 2016.11.11 15:27:20 - Checking DNS! 2016.11.11 15:27:33 - Connected.. 2016.11.11 15:27:33 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.11.11 15:27:33 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
  11. A few minutes after I connect to AirVPN, my web browsers will stop connecting to the internet. Firefox reads: "Server not found." Chrome reads: "This site can’t be reached. ----.com’s server DNS address could not be found." Internet Explorer reads: "This page can’t be displayed" Bittorrent works stays connected and works, but the ipleak ip address check torrent reads: "The server name or address could not be resolved" When I turn of the VPN client, my web browsers connect again. How do I fix the problem? Logs below: I 2016.09.28 12:28:11 - Session starting. I 2016.09.28 12:28:11 - Installing tunnel driver I 2016.09.28 12:28:11 - Network adapter DHCP switched to static (Intel® Centrino® Wireless-N 2200) I 2016.09.28 12:28:15 - DNS of a network adapter forced (Intel® Centrino® Wireless-N 2200) I 2016.09.28 12:28:15 - Checking authorization ... ! 2016.09.28 12:28:16 - Connecting to Spica (Canada, Toronto, Ontario) . 2016.09.28 12:28:16 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015 . 2016.09.28 12:28:16 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08 . 2016.09.28 12:28:16 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.09.28 12:28:17 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.09.28 12:28:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.28 12:28:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.28 12:28:17 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536] . 2016.09.28 12:28:17 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.19.94.19:443 [nonblock] . 2016.09.28 12:28:18 - OpenVPN > TCP connection established with [AF_INET]199.19.94.19:443 . 2016.09.28 12:28:18 - OpenVPN > TCPv4_CLIENT link local: [undef] . 2016.09.28 12:28:18 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]199.19.94.19:443 . 2016.09.28 12:28:18 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.94.19:443, sid=74a370d8 f073d096 . 2016.09.28 12:28:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2016.09.28 12:28:18 - OpenVPN > Validating certificate key usage . 2016.09.28 12:28:18 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2016.09.28 12:28:18 - OpenVPN > VERIFY KU OK . 2016.09.28 12:28:18 - OpenVPN > Validating certificate extended key usage . 2016.09.28 12:28:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2016.09.28 12:28:18 - OpenVPN > VERIFY EKU OK . 2016.09.28 12:28:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2016.09.28 12:28:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.28 12:28:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.28 12:28:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2016.09.28 12:28:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.28 12:28:19 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2016.09.28 12:28:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.94.19:443 . 2016.09.28 12:28:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2016.09.28 12:28:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.1.55 255.255.0.0' . 2016.09.28 12:28:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2016.09.28 12:28:22 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2016.09.28 12:28:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2016.09.28 12:28:22 - OpenVPN > OPTIONS IMPORT: route options modified . 2016.09.28 12:28:22 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2016.09.28 12:28:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2016.09.28 12:28:22 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2016.09.28 12:28:22 - OpenVPN > open_tun, tt->ipv6=0 . 2016.09.28 12:28:22 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{AB6F2DBB-AFD6-455B-BA1F-0ADB98063D07}.tap . 2016.09.28 12:28:22 - OpenVPN > TAP-Windows Driver Version 9.9 . 2016.09.28 12:28:22 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.1.55/255.255.0.0 [sUCCEEDED] . 2016.09.28 12:28:22 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.1.55/255.255.0.0 on interface {AB6F2DBB-AFD6-455B-BA1F-0ADB98063D07} [DHCP-serv: 10.5.255.254, lease-time: 31536000] . 2016.09.28 12:28:22 - OpenVPN > Successful ARP Flush on interface [14] {AB6F2DBB-AFD6-455B-BA1F-0ADB98063D07} . 2016.09.28 12:28:27 - OpenVPN > TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down . 2016.09.28 12:28:27 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2016.09.28 12:28:27 - AirVPN Windows Interface Hack executed (Ethernet) . 2016.09.28 12:28:32 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2016.09.28 12:28:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 199.19.94.19 MASK 255.255.255.255 192.168.1.1 . 2016.09.28 12:28:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2016.09.28 12:28:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.09.28 12:28:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.09.28 12:28:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2016.09.28 12:28:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.09.28 12:28:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1 . 2016.09.28 12:28:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4 . 2016.09.28 12:28:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2016.09.28 12:28:32 - Starting Management Interface . 2016.09.28 12:28:32 - OpenVPN > Initialization Sequence Completed I 2016.09.28 12:28:32 - Flushing DNS I 2016.09.28 12:28:32 - Checking DNS ! 2016.09.28 12:28:44 - Connected. . 2016.09.28 12:28:44 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2016.09.28 12:28:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2016.09.28 12:29:14 - Updating systems & servers data ... . 2016.09.28 12:29:16 - Systems & servers data update completed . 2016.09.28 12:59:32 - Updating systems & servers data ... . 2016.09.28 12:59:35 - Systems & servers data update completed
  12. Hi, Im using AirVPN for a couple of days now with no issues however this morning when i woke up it seems that non of my devices connected to the VPN will have no internet access. I restarted everything and came with the conclusion that when im not connected everything works fine but once im connected nothing (internet related) wont work, web browsing, emails etc etc. What is the issue here and how can in troubleshoot or fix it? Kind regards, Kevin
  13. Hi, I'm a new user of AirPVN and I can't find a solution to my problem : I'm a Windows 10 user, and sometimes I might have to use an internet connection without the AirVPN, I have also the Internet Lock enable when I use AirVPN. But even after exiting properly AirVPN (disconnect to the server and then click on "Disable Internet Lock") I can't reach internet, seems like I don't successfully close the Internet Lock, any idea ? Thanks !
  14. Hello everyone, I have AirVPN installed on a second desktop of mine, and I'm having an odd problem with it. I can connect to AirVPN servers fine and get acceptable speeds, however, when I shut down the VPN, I can no longer connect to the internet. So, I need to be connected to some VPN server to be able to connect to the internet. I suspect this is due to a bug with the Network Lock feature, which I'm using on both desktops (one of which is not having any problems). Both desktops are connected to the save network via Ethernet cable. I tried disabling network lock on the afflicted desktop, but had no results. I also tried uninstalling AirVPN (and restarting the PC), which also did not help. Is this a known bug, or perhaps something entirely different? I tried searching online for a solution, but all I get are threads about people not being able to connect with a VPN, not without. Thanks in advance!
  15. Hi I have airvpn installed on PC whiich has web server running on port 80 I don't what to put on port forwarding page and what ip should I use to access the web server from outside world internet what should I use in picture is it 1 or 2? and does the other client from outside internet need to connect to airvpn too?
  16. Hello AirVPN As stated in the title, I'm fairly new to this way of 'interneting' but hopefully this works out in the long run. My reason for joining AirVPN is due to my father working for my isp and I fear he may be spying on my downloads and internet browsing. I found this vpn via Reddit in search of ways to keep prying eyes out of my internet life. I guess I have just a few questions about just how private vpns are when it comes to things like that. -Am I really invisible from my isp? -What are the dangers of using VPNs? -Can an ISP bypass a VPN to access someone's searches? -How much can isp employees/supervisors see when looking at a client's internet usage? (If this isn't supposed to be on this forum please let me know T_T) Thank you in advance SSC
  17. Hello, I can be online only with airvpn, if I'm not connected to airvpn I can't connect my pc to internet. I've windows 10, and I never used Network Lock. Thanks for help and sorry for my english.
  18. I just found this on Reddit: So, australian internet users: Can you confirm having bad speeds or high latency? Can you maybe even confirm the speeds you get are not what your ISP advertised?
×
×
  • Create New...