Search the Community
Showing results for tags 'solved'.
Found 10 results
-
ANSWERED duckduckgo.com and ddg.gg blocked?
air.vpn.user.99 posted a topic in Blocked websites warning
Hello everyone. I noticed I can't use DuckDuckGo anymore while connected to any AirVPN server. The server can ping to the website, but the column of HTTP in the Route Checking tool appears filled with red in every row. DuckDuckgo is big in the web search business, I thought it was gonna be a temporary issue, but it's been blocked for weeks now. Is it only me? Lately I've been experimenting a lot more blockades everywhere but this one is the most annoying. What can I do? I do use the bang functionality in DDG a lot. Solution: In Wireguard for Android, change MTU to 1300. -
Any ideas, please? 99% of settings are set to defaults except that I manually selected Protocol OpenVPN port 443. Running Eddie as Administrator, for what it's worth. I removed some network adapters via Device Manager, tried installing OpenVPN Connect, and tried manually running *tap-windows.exe*. https://eddie.website/report/535cf4ab/ EDIT: Nevermind, figured it out. I rebooted the machine, uninstalled the OpenVPN DCO adapter (wasn't using it anyway), tried connecting, and Eddie installed the "Eddie Tunnel" adapter then connected up.
-
Eddie is no longer connecting to servers, but nothing changed with my install, internet connection, or pc to my knowledge. It started happening yesterday, but I wanted to give it time in case it was just an issue with servers or something. I've attempted to uninstall and reinstall, logging out and back in, and attempted to change protocol to both TCP and Wireguard, but none of it worked. System Report: https://eddie.website/report/23c0c7e1/ Log: I 2024.05.05 11:07:25 - Session starting. I 2024.05.05 11:07:27 - Checking authorization ... . 2024.05.05 11:07:28 - Added new network interface "Eddie", Wintun version 0.14 . 2024.05.05 11:07:28 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2024.05.05 11:07:28 - Connecting to Chort (Canada, Toronto, Ontario) . 2024.05.05 11:07:29 - Routes, add 104.254.90.237/32 for interface "ZeroTier One [3efa5cb78afd31f7] (ZeroTier Virtual Port)". . 2024.05.05 11:07:29 - Routes, add 104.254.90.237/32 for interface "ZeroTier One [3efa5cb78afd31f7] (ZeroTier Virtual Port)", already exists. . 2024.05.05 11:07:29 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.05.05 11:07:29 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.05.05 11:07:29 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.05.05 11:07:29 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.05 11:07:29 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.05 11:07:29 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.05 11:07:29 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.05 11:07:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.237:443 . 2024.05.05 11:07:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.05.05 11:07:29 - OpenVPN > UDP link local: (not bound) . 2024.05.05 11:07:29 - OpenVPN > UDP link remote: [AF_INET]104.254.90.237:443 . 2024.05.05 11:08:01 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2024.05.05 11:08:01 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.05.05 11:08:06 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2024.05.05 11:08:06 - Disconnecting . 2024.05.05 11:08:07 - Routes, delete 104.254.90.237/32 for interface "ZeroTier One [3efa5cb78afd31f7] (ZeroTier Virtual Port)". . 2024.05.05 11:08:07 - Routes, delete 104.254.90.237/32 for interface "ZeroTier One [3efa5cb78afd31f7] (ZeroTier Virtual Port)", not exists. . 2024.05.05 11:08:07 - Connection terminated. I 2024.05.05 11:08:09 - Cancel requested. ! 2024.05.05 11:08:09 - Session terminated.
-
Hi, I am having a problem with AirVPN after updating Manjaro. Since the last large update, AirVPN has the "Checking route IPv4" hanging issue. I have disabled "Check if tunnel works" (as was recommended in threads on the IPv4 stalling issue), and the client then connects, however I am seeing weird connection issues: web browsing: 99% of the time I get "[website] took too long to respond" and everything hangs. occasionally a text-based page would load, for example a google search results page. some pages start to load with basic text, but fail to load anything more complex. torrents: a little slow, but work text rss feeds are also a little slow, but work reliably telegram: text works, however images take forever to download, and fail in 80% of the time. however file transfers seem to be ok. What I have tried so far: a few different servers - no difference switching between the AirVPN DNS and 8.8.8.8 - no difference. playing with different combinations of IPv4 and IPv6 options - no difference. importing an AirVPN profile into OpenVPN and connecting through that - the connection appears successful, however the problems with web browsing remain. In the hopes of returning back to a working state I downgraded back all the Manjaro packages (166 of them) since this issue started, however the issue persists. I tried searching if anyone has similar issues and only found the "checking route ipv4" problem, but the solutions given there seemed to fix their problems, whereas they don't mine. If someone can point me in some direction as to what this could be related to, I would be very grateful. Let me know if there are some logs I need to post, or more info I could give. Thanks a lot!
-
AirVPN connects and disconnects infinitely.
Bomboclat posted a topic in Troubleshooting and Problems
I just got AirVPN and I cant get it to work. I have downloaded the latest Eddie UI on Windows 10, and it connects, disconnects, waits for 3 seconds and repeats. I have tried 2 different protocols, restarting my pc, and more from a troubleshooting forum post. These are my logs (I just copied the whole log i didnt know what was going wrong): . 2022.06.10 14:24:23 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.19044.0, Mono/.Net: v4.0.30319 . 2022.06.10 14:24:23 - Command line arguments (1): path="home" . 2022.06.10 14:24:25 - Reading options from C:\Users\06jar\AppData\Local\Eddie\default.profile . 2022.06.10 14:24:25 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2022.06.10 14:24:25 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2022.06.10 14:24:25 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2022.06.10 14:24:26 - Ready . 2022.06.10 14:24:27 - Collect information about AirVPN completed I 2022.06.10 14:25:34 - Session starting. I 2022.06.10 14:25:34 - Checking authorization ... . 2022.06.10 14:25:35 - Using WinTun network interface "Local Area Connection (TAP-ProtonVPN Windows Adapter V9)" ! 2022.06.10 14:25:35 - Connecting to Ophiuchus (Norway, Oslo) . 2022.06.10 14:25:35 - Routes, add 185.206.225.62/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2022.06.10 14:25:35 - Routes, add 185.206.225.62/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2022.06.10 14:25:35 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2022.06.10 14:25:35 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2022.06.10 14:25:35 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2022.06.10 14:25:35 - SSL > LOG5[ui]: Reading configuration from file C:\Users\06jar\AppData\Local\Eddie\5ae6a30bc1cd9f96589a543bb86767af9194517814bfde0af3b086f636de4ce3.tmp.ssl . 2022.06.10 14:25:35 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2022.06.10 14:25:35 - SSL > LOG6[ui]: Initializing service [openvpn] . 2022.06.10 14:25:35 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2022.06.10 14:25:35 - SSL > LOG5[ui]: Configuration successful . 2022.06.10 14:25:35 - SSL > LOG6[ui]: Service [openvpn] (FD=460) bound to 127.0.0.1:41653 . 2022.06.10 14:25:35 - SSL > LOG6[cron]: Executing cron jobs . 2022.06.10 14:25:35 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2022.06.10 14:25:35 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.06.10 14:25:35 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.06.10 14:25:35 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.06.10 14:25:35 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.06.10 14:25:35 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.06.10 14:25:35 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.06.10 14:25:35 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.06.10 14:25:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:41653 . 2022.06.10 14:25:35 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.06.10 14:25:35 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:41653 [nonblock] . 2022.06.10 14:25:35 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:41653 . 2022.06.10 14:25:35 - OpenVPN > TCP_CLIENT link local: (not bound) . 2022.06.10 14:25:35 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:41653 . 2022.06.10 14:25:35 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:62258 . 2022.06.10 14:25:35 - SSL > LOG6[0]: s_connect: connecting 185.206.225.62:443 . 2022.06.10 14:25:35 - SSL > LOG5[0]: s_connect: connected 185.206.225.62:443 . 2022.06.10 14:25:35 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.10.176:62259 . 2022.06.10 14:25:35 - SSL > LOG6[0]: SNI: sending servername: 185.206.225.62 . 2022.06.10 14:25:35 - SSL > LOG6[0]: Peer certificate not required . 2022.06.10 14:25:35 - SSL > LOG6[0]: Certificate verification disabled . 2022.06.10 14:25:35 - SSL > LOG6[0]: Client certificate not requested . 2022.06.10 14:25:35 - SSL > LOG6[0]: Session id: 3EBE49E458BC79989DF107F9AC13E95C027ADC5B142D77D0A38220D0B46AAE49 . 2022.06.10 14:25:35 - SSL > LOG6[0]: TLS connected: new session negotiated . 2022.06.10 14:25:35 - SSL > LOG6[0]: TLSv1.2 ciphersuite: ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption) . 2022.06.10 14:25:35 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:41653, sid=572d7d87 6c4c3fb2 . 2022.06.10 14:25:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.06.10 14:25:35 - OpenVPN > VERIFY KU OK . 2022.06.10 14:25:35 - OpenVPN > Validating certificate extended key usage . 2022.06.10 14:25:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.06.10 14:25:35 - OpenVPN > VERIFY EKU OK . 2022.06.10 14:25:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ophiuchus, emailAddress=info@airvpn.org . 2022.06.10 14:25:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.06.10 14:25:35 - OpenVPN > [Ophiuchus] Peer Connection Initiated with [AF_INET]127.0.0.1:41653 . 2022.06.10 14:25:36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.195.1,dhcp-option DNS6 fde6:7a:7d20:15c3::1,tun-ipv6,route-gateway 10.25.195.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:15c3::101d/64 fde6:7a:7d20:15c3::1,ifconfig 10.25.195.31 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.06.10 14:25:36 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.06.10 14:25:36 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.25.195.1' . 2022.06.10 14:25:36 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:15c3::1' . 2022.06.10 14:25:36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.06.10 14:25:36 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.06.10 14:25:36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.06.10 14:25:36 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.06.10 14:25:36 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.06.10 14:25:36 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2022.06.10 14:25:36 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.06.10 14:25:36 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.06.10 14:25:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.06.10 14:25:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.06.10 14:25:36 - OpenVPN > interactive service msg_channel=0 . 2022.06.10 14:25:36 - OpenVPN > open_tun . 2022.06.10 14:25:36 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2022.06.10 14:25:36 - OpenVPN > Exiting due to fatal error . 2022.06.10 14:25:36 - SSL > LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054) . 2022.06.10 14:25:36 - SSL > LOG5[0]: Connection reset: 3765 byte(s) sent to TLS, 4019 byte(s) sent to socket ! 2022.06.10 14:25:36 - Disconnecting . 2022.06.10 14:25:36 - Sending hard termination signal . 2022.06.10 14:25:36 - Routes, delete 185.206.225.62/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2022.06.10 14:25:36 - Routes, delete 185.206.225.62/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2022.06.10 14:25:36 - Connection terminated. I 2022.06.10 14:25:39 - Checking authorization ... . 2022.06.10 14:25:40 - Using WinTun network interface "Local Area Connection (TAP-ProtonVPN Windows Adapter V9)" ! 2022.06.10 14:25:40 - Connecting to Fomalhaut (Norway, Oslo) . 2022.06.10 14:25:40 - Routes, add 185.206.225.54/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2022.06.10 14:25:40 - Routes, add 185.206.225.54/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)", already exists. . 2022.06.10 14:25:40 - SSL > LOG5[ui]: stunnel 5.56 on x86-pc-mingw32-gnu platform . 2022.06.10 14:25:40 - SSL > LOG5[ui]: Compiled/running with OpenSSL 1.1.1g 21 Apr 2020 . 2022.06.10 14:25:40 - SSL > LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI . 2022.06.10 14:25:40 - SSL > LOG5[ui]: Reading configuration from file C:\Users\06jar\AppData\Local\Eddie\abeedb713eaf729fd6a5946e7856c5c1078601760412fcc10f6c37098be8845e.tmp.ssl . 2022.06.10 14:25:40 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2022.06.10 14:25:40 - SSL > LOG6[ui]: Initializing service [openvpn] . 2022.06.10 14:25:40 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2022.06.10 14:25:40 - SSL > LOG5[ui]: Configuration successful . 2022.06.10 14:25:40 - SSL > LOG6[ui]: Service [openvpn] (FD=468) bound to 127.0.0.1:45125 . 2022.06.10 14:25:40 - SSL > LOG6[cron]: Executing cron jobs . 2022.06.10 14:25:40 - SSL > LOG6[cron]: Cron jobs completed in 0 seconds . 2022.06.10 14:25:40 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2022.06.10 14:25:40 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.06.10 14:25:40 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2022.06.10 14:25:40 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.06.10 14:25:40 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.06.10 14:25:40 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.06.10 14:25:40 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.06.10 14:25:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:45125 . 2022.06.10 14:25:40 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2022.06.10 14:25:40 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:45125 [nonblock] . 2022.06.10 14:25:40 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:45125 . 2022.06.10 14:25:40 - OpenVPN > TCP_CLIENT link local: (not bound) . 2022.06.10 14:25:40 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:45125 . 2022.06.10 14:25:40 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:62265 . 2022.06.10 14:25:40 - SSL > LOG6[0]: s_connect: connecting 185.206.225.54:443 . 2022.06.10 14:25:40 - SSL > LOG5[0]: s_connect: connected 185.206.225.54:443 . 2022.06.10 14:25:40 - SSL > LOG5[0]: Service [openvpn] connected remote server from 192.168.10.176:62266 . 2022.06.10 14:25:40 - SSL > LOG6[0]: SNI: sending servername: 185.206.225.54 . 2022.06.10 14:25:40 - SSL > LOG6[0]: Peer certificate not required . 2022.06.10 14:25:40 - SSL > LOG6[0]: Certificate verification disabled . 2022.06.10 14:25:40 - SSL > LOG6[0]: Client certificate not requested . 2022.06.10 14:25:40 - SSL > LOG6[0]: Session id: 8928109A2100D955505BD15162516CCF2AC7E1883A5673B09A83FF5828236D95 . 2022.06.10 14:25:40 - SSL > LOG6[0]: TLS connected: new session negotiated . 2022.06.10 14:25:40 - SSL > LOG6[0]: TLSv1.2 ciphersuite: ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption) . 2022.06.10 14:25:40 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:45125, sid=761ba01a 92af2e62 . 2022.06.10 14:25:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.06.10 14:25:40 - OpenVPN > VERIFY KU OK . 2022.06.10 14:25:40 - OpenVPN > Validating certificate extended key usage . 2022.06.10 14:25:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.06.10 14:25:40 - OpenVPN > VERIFY EKU OK . 2022.06.10 14:25:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fomalhaut, emailAddress=info@airvpn.org . 2022.06.10 14:25:40 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.06.10 14:25:40 - OpenVPN > [Fomalhaut] Peer Connection Initiated with [AF_INET]127.0.0.1:45125 . 2022.06.10 14:25:40 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.227.1,dhcp-option DNS6 fde6:7a:7d20:ce3::1,tun-ipv6,route-gateway 10.16.227.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:ce3::101a/64 fde6:7a:7d20:ce3::1,ifconfig 10.16.227.28 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.06.10 14:25:40 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.06.10 14:25:40 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.16.227.1' . 2022.06.10 14:25:40 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:ce3::1' . 2022.06.10 14:25:40 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.06.10 14:25:40 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.06.10 14:25:40 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.06.10 14:25:40 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.06.10 14:25:40 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.06.10 14:25:40 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2022.06.10 14:25:40 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.06.10 14:25:40 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.06.10 14:25:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.06.10 14:25:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.06.10 14:25:40 - OpenVPN > interactive service msg_channel=0 . 2022.06.10 14:25:40 - OpenVPN > open_tun . 2022.06.10 14:25:40 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2022.06.10 14:25:40 - OpenVPN > Exiting due to fatal error . 2022.06.10 14:25:40 - SSL > LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054) . 2022.06.10 14:25:40 - SSL > LOG5[0]: Connection reset: 3765 byte(s) sent to TLS, 4016 byte(s) sent to socket ! 2022.06.10 14:25:40 - Disconnecting . 2022.06.10 14:25:40 - Sending hard termination signal . 2022.06.10 14:25:41 - Routes, delete 185.206.225.54/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)". . 2022.06.10 14:25:41 - Routes, delete 185.206.225.54/32 for interface "Wi-Fi (Intel(R) Wi-Fi 6 AX200 160MHz)", not exists. . 2022.06.10 14:25:41 - Connection terminated. I 2022.06.10 14:25:42 - Cancel requested. ! 2022.06.10 14:25:42 - Session terminated. Any help is appreciated. --> Just got it fixed! Turns out my old VPN (proton) was hogging the TUN, when I deleted that my problem got fixed. Such a dumb oversight by me lol. -
Cable-Router: Vodafone Station VPN-Router: Glinet Router GL-MT300N-V2 Firmware: 3.211 based on OpenWrt 19.07.8 Client: Raspberry Pi 2 Model B Rev 1.1 with dyndns ( ddclient) Hello folks, Im running an server module on my raspberry successfull over an vpn client over openvpn on the Glinet Router. But if i switch to wireguard, no connections are able to connecting from outside to the Ras Atm im use for connecting through wireguard the Customized Glinet Interface and not the Luci One which is based on that. But i have some custom iptables commands, to forward my ports: iptables -A INPUT -i tun0 -p tcp --dport 51813 -m state --state NEW,ESTABLISHED -j ACCEPT iptables -A OUTPUT -o tun0 -p tcp --dport 51813 -m state --state NEW,ESTABLISHED -j ACCEPT iptables -A INPUT -i tun0 -p udp --dport 51813 -m state --state NEW,ESTABLISHED -j ACCEPT iptables -A OUTPUT -o tun0 -p udp --dport 51813 -m state --state NEW,ESTABLISHED -j ACCEPT iptables -I FORWARD -i tun0 -p udp -d 192.168.2.12 --dport 51813 -j ACCEPT iptables -I FORWARD -i tun0 -p tcp -d 192.168.2.12 --dport 51813 -j ACCEPT iptables -t nat -I PREROUTING -i tun0 -p tcp --dport 51813 -j DNAT --to-destination 192.168.2.12:45345 iptables -t nat -I PREROUTING -i tun0 -p udp --dport 51813 -j DNAT --to-destination 192.168.2.12:45345 iptables -t nat -A PREROUTING -i tun -p udp --dport 51813 -j REDIRECT --to-ports 45345 iptables -t nat -A PREROUTING -i tun -p udp --dport 51813 -j REDIRECT --to-ports 45345 So I'm not quite sure, why openvpn works but with WG it doesnt. May someone has a clue, or know an approach to figure out on which point i have to take action. best regards
-
I have three devices, all linux, running airvpn suite (specifically bluetit on boot through systemd). All three devices are connected simulatenously and, therefore, use separate keys. All are configured to connect on boot to country ISO: US. Infrequently, but often enough, these three devices will happen to connect to the same server (whether that be 2/3 or 3/3). This creates a mess out of my port forwards. Is there a simple solution to this issue? I was thinking of setting up the server whitelist so that no device could possibly connect to another devices server, but this solution seems tedious. Is this my only option? Any suggestions are appreciated, thanks!
-
Used Eddie last night before bed no problem. Woke up this morning and forced quit the app (I usually have to do that overnight because it gets "stuck") but when I tried to reopen, it keeps getting stuck on the "Checking Route IPv4" screen and never connects to any recommended server. I must have forced quit it half a dozen times. Are the VPN servers overloads with all the new COVID self-quarantine work from home traffic? Do I just have to wait and keep trying or is there something else I can do to connect?