Search the Community
Showing results for tags 'wifi'.
Found 21 results
-
Good day, I have been using Eddie quite happily for a few years now and most everything works fine. I have only one nuance I would be happy to fix, if possible. I can readily boot Windows into an Ethernet connection and Eddie (in my Startup) connects immediately (WiFi disabled). I can also readily boot Windows into a WiFi connection and Eddie (in my Startup) connects immediately (no Ethernet is connected). However, if I am in one or the other, then close Eddie, Hibernate, unplug Ethernet, power up, enable WiFi and then start Eddie, Eddie appears to make a connection, but the System Tray displays the "no Internet connection" icon and I don't have any Internet. The same applies if I am using Eddie on WiFi, then close Eddie, Hibernate, plug in Ethernet, power up laptop, start Eddie, I get the same thing. If I am in either Ethernet or WiFi mode, I can open/close Eddie repeatedly with no issue. It's when I try to switch from one to the other that Eddie doesn't work. Is there a setting I can adjust to remedy this? Otherwise, it works like a charm. BTW, while I have a IT background, it's not a very techie one, so go easy on me please. All suggestions and thoughts are welcome and most appreciative of your time. Thanks
-
When I try to connect to a server, my computer disconnects from the internet. My ISP is RCN. I'm on WiFi. I just did a factory reset of my modem and router, Arris s33 and TP-Link Ax6000, respectively. My connection is fine when the VPN is not connected to a server. . 2024.05.27 19:18:58 - Eddie version: 2.21.8 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.22631.0, Mono/.Net: v4.0.30319 . 2024.05.27 19:18:58 - Command line arguments (1): path="home" . 2024.05.27 19:18:58 - Raise system privileges . 2024.05.27 19:19:01 - Reading options from C:\Users\Acer\AppData\Local\Eddie\default.profile . 2024.05.27 19:19:02 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2024.05.27 19:19:02 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2024.05.27 19:19:02 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) W 2024.05.27 19:19:02 - Windows WFP, recovery of pending rules. . 2024.05.27 19:19:02 - Recovery. Unexpected crash? ! 2024.05.27 19:19:02 - Deactivation of Network Lock I 2024.05.27 19:19:02 - Ready . 2024.05.27 19:19:03 - Collect information about AirVPN completed ! 2024.05.27 19:19:04 - Logged out. I 2024.05.27 19:19:05 - Checking login ... ! 2024.05.27 19:19:05 - Logged in. I 2024.05.27 19:19:12 - Session starting. I 2024.05.27 19:19:13 - Checking authorization ... . 2024.05.27 19:19:14 - Added new network interface "Eddie", Wintun version 0.12 . 2024.05.27 19:19:14 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.05.27 19:19:14 - Connecting to Alnitak (Serbia, Belgrade) . 2024.05.27 19:19:14 - Routes, add 152.89.160.133/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)". . 2024.05.27 19:19:14 - Routes, add 152.89.160.133/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)", already exists. . 2024.05.27 19:19:14 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.05.27 19:19:14 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.05.27 19:19:14 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.05.27 19:19:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.27 19:19:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.27 19:19:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.27 19:19:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.27 19:19:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]152.89.160.133:443 . 2024.05.27 19:19:14 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.05.27 19:19:14 - OpenVPN > UDP link local: (not bound) . 2024.05.27 19:19:14 - OpenVPN > UDP link remote: [AF_INET]152.89.160.133:443 . 2024.05.27 19:19:14 - OpenVPN > TLS: Initial packet from [AF_INET]152.89.160.133:443, sid=3162c042 7accb1f0 . 2024.05.27 19:19:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.05.27 19:19:14 - OpenVPN > VERIFY KU OK . 2024.05.27 19:19:14 - OpenVPN > Validating certificate extended key usage . 2024.05.27 19:19:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.05.27 19:19:14 - OpenVPN > VERIFY EKU OK . 2024.05.27 19:19:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alnitak, emailAddress=info@airvpn.org . 2024.05.27 19:19:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.05.27 19:19:15 - OpenVPN > [Alnitak] Peer Connection Initiated with [AF_INET]152.89.160.133:443 . 2024.05.27 19:19:15 - OpenVPN > SENT CONTROL [Alnitak]: 'PUSH_REQUEST' (status=1) . 2024.05.27 19:19:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.11.146.1,dhcp-option DNS6 fde6:7a:7d20:792::1,tun-ipv6,route-gateway 10.11.146.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:792::1058/64 fde6:7a:7d20:792::1,ifconfig 10.11.146.90 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.05.27 19:19:15 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.05.27 19:19:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.11.146.1' . 2024.05.27 19:19:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:792::1' . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.05.27 19:19:15 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.05.27 19:19:15 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.05.27 19:19:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.05.27 19:19:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.05.27 19:19:15 - OpenVPN > interactive service msg_channel=0 . 2024.05.27 19:19:15 - OpenVPN > open_tun . 2024.05.27 19:19:15 - OpenVPN > wintun device [Eddie] opened . 2024.05.27 19:19:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 47 static 10.11.146.90 255.255.255.0 . 2024.05.27 19:19:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 47 all . 2024.05.27 19:19:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 47 all . 2024.05.27 19:19:15 - OpenVPN > IPv4 MTU set to 1500 on interface 47 using SetIpInterfaceEntry() . 2024.05.27 19:19:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 47 fde6:7a:7d20:792::1058/128 store=active . 2024.05.27 19:19:15 - OpenVPN > add_route_ipv6(fde6:7a:7d20:792::/64 -> fde6:7a:7d20:792::1058 metric 0) dev Eddie . 2024.05.27 19:19:15 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:792::/64 47 fe80::8 store=active . 2024.05.27 19:19:15 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.05.27 19:19:15 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 47 all . 2024.05.27 19:19:15 - OpenVPN > IPv6 MTU set to 1500 on interface 47 using SetIpInterfaceEntry() . 2024.05.27 19:19:15 - OpenVPN > Initialization Sequence Completed . 2024.05.27 19:19:15 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.05.27 19:19:15 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.05.27 19:19:15 - DNS leak protection with packet filtering enabled. . 2024.05.27 19:19:15 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.11.146.1) . 2024.05.27 19:19:16 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:792::1) . 2024.05.27 19:19:16 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:19:16 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:19:16 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:19:16 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:19:16 - Routes, add 152.89.160.131/32 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:19:17 - Routes, add 2001:ac8:7d:1e11:3b82:4ed7:b05:3386/128 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:19:17 - Flushing DNS I 2024.05.27 19:19:17 - Checking route IPv4 . 2024.05.27 19:19:44 - Checking route (4° try) . 2024.05.27 19:20:09 - Checking route (5° try) E 2024.05.27 19:20:30 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2024.05.27 19:20:30 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:20:30 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:20:30 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:20:30 - Above log line repeated 20 times more ! 2024.05.27 19:20:30 - Disconnecting . 2024.05.27 19:20:30 - Sending soft termination signal . 2024.05.27 19:20:33 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.05.27 19:20:35 - OpenVPN > Closing TUN/TAP interface . 2024.05.27 19:20:35 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:792::/64) . 2024.05.27 19:20:35 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:792::/64 47 fe80::8 store=active . 2024.05.27 19:20:35 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 47 fde6:7a:7d20:792::1058 store=active . 2024.05.27 19:20:35 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 47 10.11.146.90 store=active . 2024.05.27 19:20:35 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.05.27 19:20:35 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:36 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:36 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:36 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:36 - Routes, delete 152.89.160.133/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)". . 2024.05.27 19:20:36 - Routes, delete 152.89.160.131/32 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:36 - Routes, delete 2001:ac8:7d:1e11:3b82:4ed7:b05:3386/128 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:36 - Routes, delete 152.89.160.133/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)", not exists. . 2024.05.27 19:20:36 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.05.27 19:20:37 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.05.27 19:20:37 - DNS leak protection with packet filtering disabled. . 2024.05.27 19:20:37 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.05.27 19:20:37 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.05.27 19:20:37 - Connection terminated. I 2024.05.27 19:20:40 - Checking authorization ... . 2024.05.27 19:20:40 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.05.27 19:20:40 - Connecting to Sharatan (Canada, Toronto, Ontario) . 2024.05.27 19:20:40 - Routes, add 104.254.90.197/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)". . 2024.05.27 19:20:41 - Routes, add 104.254.90.197/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)", already exists. . 2024.05.27 19:20:41 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.05.27 19:20:41 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.05.27 19:20:41 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.05.27 19:20:41 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.27 19:20:41 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.27 19:20:41 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.27 19:20:41 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.27 19:20:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.197:443 . 2024.05.27 19:20:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.05.27 19:20:41 - OpenVPN > UDP link local: (not bound) . 2024.05.27 19:20:41 - OpenVPN > UDP link remote: [AF_INET]104.254.90.197:443 . 2024.05.27 19:20:41 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.197:443, sid=8b799069 f4142b47 . 2024.05.27 19:20:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.05.27 19:20:41 - OpenVPN > VERIFY KU OK . 2024.05.27 19:20:41 - OpenVPN > Validating certificate extended key usage . 2024.05.27 19:20:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.05.27 19:20:41 - OpenVPN > VERIFY EKU OK . 2024.05.27 19:20:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sharatan, emailAddress=info@airvpn.org . 2024.05.27 19:20:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.05.27 19:20:41 - OpenVPN > [Sharatan] Peer Connection Initiated with [AF_INET]104.254.90.197:443 . 2024.05.27 19:20:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.242.1,dhcp-option DNS6 fde6:7a:7d20:19f2::1,tun-ipv6,route-gateway 10.29.242.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:19f2::1024/64 fde6:7a:7d20:19f2::1,ifconfig 10.29.242.38 255.255.255.0,peer-id 13,cipher AES-256-GCM' . 2024.05.27 19:20:41 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.05.27 19:20:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.29.242.1' . 2024.05.27 19:20:41 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:19f2::1' . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.05.27 19:20:41 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.05.27 19:20:41 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.05.27 19:20:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.05.27 19:20:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.05.27 19:20:41 - OpenVPN > interactive service msg_channel=0 . 2024.05.27 19:20:41 - OpenVPN > open_tun . 2024.05.27 19:20:41 - OpenVPN > wintun device [Eddie] opened . 2024.05.27 19:20:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 47 static 10.29.242.38 255.255.255.0 . 2024.05.27 19:20:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 47 all . 2024.05.27 19:20:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 47 all . 2024.05.27 19:20:41 - OpenVPN > IPv4 MTU set to 1500 on interface 47 using SetIpInterfaceEntry() . 2024.05.27 19:20:41 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 47 fde6:7a:7d20:19f2::1024/128 store=active . 2024.05.27 19:20:41 - OpenVPN > add_route_ipv6(fde6:7a:7d20:19f2::/64 -> fde6:7a:7d20:19f2::1024 metric 0) dev Eddie . 2024.05.27 19:20:41 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:19f2::/64 47 fe80::8 store=active . 2024.05.27 19:20:41 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.05.27 19:20:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 47 all . 2024.05.27 19:20:42 - OpenVPN > IPv6 MTU set to 1500 on interface 47 using SetIpInterfaceEntry() . 2024.05.27 19:20:42 - OpenVPN > Initialization Sequence Completed . 2024.05.27 19:20:42 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.05.27 19:20:42 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.05.27 19:20:42 - DNS leak protection with packet filtering enabled. . 2024.05.27 19:20:42 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.29.242.1) . 2024.05.27 19:20:42 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:19f2::1) . 2024.05.27 19:20:42 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:42 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:42 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:42 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:43 - Routes, add 104.254.90.195/32 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:43 - Routes, add 2606:6080:2001:6:e14e:c3f3:8562:6916/128 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:20:43 - Flushing DNS I 2024.05.27 19:20:43 - Checking route IPv4 . 2024.05.27 19:21:10 - Checking route (4° try) . 2024.05.27 19:21:35 - Checking route (5° try) E 2024.05.27 19:21:56 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2024.05.27 19:21:56 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:21:56 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:21:56 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:21:56 - Above log line repeated 15 times more ! 2024.05.27 19:21:56 - Disconnecting . 2024.05.27 19:21:56 - Sending soft termination signal . 2024.05.27 19:21:59 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.05.27 19:22:01 - OpenVPN > Closing TUN/TAP interface . 2024.05.27 19:22:01 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:19f2::/64) . 2024.05.27 19:22:01 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:19f2::/64 47 fe80::8 store=active . 2024.05.27 19:22:01 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 47 fde6:7a:7d20:19f2::1024 store=active . 2024.05.27 19:22:01 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 47 10.29.242.38 store=active . 2024.05.27 19:22:01 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.05.27 19:22:01 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:01 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:01 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:01 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:02 - Routes, delete 104.254.90.197/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)". . 2024.05.27 19:22:02 - Routes, delete 104.254.90.195/32 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:02 - Routes, delete 2606:6080:2001:6:e14e:c3f3:8562:6916/128 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:02 - Routes, delete 104.254.90.197/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)", not exists. . 2024.05.27 19:22:02 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.05.27 19:22:02 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.05.27 19:22:02 - DNS leak protection with packet filtering disabled. . 2024.05.27 19:22:02 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.05.27 19:22:02 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.05.27 19:22:02 - Connection terminated. I 2024.05.27 19:22:05 - Checking authorization ... . 2024.05.27 19:22:06 - Using WinTun network interface "Eddie (Eddie Tunnel)" ! 2024.05.27 19:22:06 - Connecting to Enif (Canada, Toronto, Ontario) . 2024.05.27 19:22:06 - Routes, add 104.254.90.245/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)". . 2024.05.27 19:22:06 - Routes, add 104.254.90.245/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)", already exists. . 2024.05.27 19:22:06 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2024.05.27 19:22:06 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2024.05.27 19:22:06 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2024.05.27 19:22:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.27 19:22:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.27 19:22:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.05.27 19:22:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.05.27 19:22:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.245:443 . 2024.05.27 19:22:06 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2024.05.27 19:22:06 - OpenVPN > UDP link local: (not bound) . 2024.05.27 19:22:06 - OpenVPN > UDP link remote: [AF_INET]104.254.90.245:443 . 2024.05.27 19:22:06 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.245:443, sid=3683630a a2432df3 . 2024.05.27 19:22:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.05.27 19:22:06 - OpenVPN > VERIFY KU OK . 2024.05.27 19:22:06 - OpenVPN > Validating certificate extended key usage . 2024.05.27 19:22:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.05.27 19:22:06 - OpenVPN > VERIFY EKU OK . 2024.05.27 19:22:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Enif, emailAddress=info@airvpn.org . 2024.05.27 19:22:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.05.27 19:22:06 - OpenVPN > [Enif] Peer Connection Initiated with [AF_INET]104.254.90.245:443 . 2024.05.27 19:22:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.16.82.1,dhcp-option DNS6 fde6:7a:7d20:c52::1,tun-ipv6,route-gateway 10.16.82.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:c52::1016/64 fde6:7a:7d20:c52::1,ifconfig 10.16.82.24 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2024.05.27 19:22:06 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.05.27 19:22:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.16.82.1' . 2024.05.27 19:22:06 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:c52::1' . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.05.27 19:22:06 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.05.27 19:22:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.05.27 19:22:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.05.27 19:22:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.05.27 19:22:06 - OpenVPN > interactive service msg_channel=0 . 2024.05.27 19:22:06 - OpenVPN > open_tun . 2024.05.27 19:22:06 - OpenVPN > wintun device [Eddie] opened . 2024.05.27 19:22:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 47 static 10.16.82.24 255.255.255.0 . 2024.05.27 19:22:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 47 all . 2024.05.27 19:22:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 47 all . 2024.05.27 19:22:07 - OpenVPN > IPv4 MTU set to 1500 on interface 47 using SetIpInterfaceEntry() . 2024.05.27 19:22:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 47 fde6:7a:7d20:c52::1016/128 store=active . 2024.05.27 19:22:07 - OpenVPN > add_route_ipv6(fde6:7a:7d20:c52::/64 -> fde6:7a:7d20:c52::1016 metric 0) dev Eddie . 2024.05.27 19:22:07 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:c52::/64 47 fe80::8 store=active . 2024.05.27 19:22:07 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2024.05.27 19:22:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 47 all . 2024.05.27 19:22:07 - OpenVPN > IPv6 MTU set to 1500 on interface 47 using SetIpInterfaceEntry() . 2024.05.27 19:22:07 - OpenVPN > Initialization Sequence Completed . 2024.05.27 19:22:07 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2024.05.27 19:22:07 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2024.05.27 19:22:07 - DNS leak protection with packet filtering enabled. . 2024.05.27 19:22:07 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.16.82.1) . 2024.05.27 19:22:07 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:c52::1) . 2024.05.27 19:22:07 - Routes, add 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:07 - Routes, add 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:07 - Routes, add ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:08 - Routes, add 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:08 - Routes, add 104.254.90.243/32 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:08 - Routes, add 2606:6080:2001:9:2679:addd:655:8142/128 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:08 - Flushing DNS I 2024.05.27 19:22:08 - Checking route IPv4 . 2024.05.27 19:22:32 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:22:32 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:22:32 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.05.27 19:22:32 - Above log line repeated 11 times more ! 2024.05.27 19:22:32 - Disconnecting . 2024.05.27 19:22:32 - Sending soft termination signal . 2024.05.27 19:22:35 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.05.27 19:22:37 - OpenVPN > Closing TUN/TAP interface . 2024.05.27 19:22:37 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:c52::/64) . 2024.05.27 19:22:37 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:c52::/64 47 fe80::8 store=active . 2024.05.27 19:22:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 47 fde6:7a:7d20:c52::1016 store=active . 2024.05.27 19:22:37 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 47 10.16.82.24 store=active . 2024.05.27 19:22:37 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.05.27 19:22:37 - Routes, delete 0.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:38 - Routes, delete 128.0.0.0/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:38 - Routes, delete ::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:38 - Routes, delete 8000::/1 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:38 - Routes, delete 104.254.90.245/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)". . 2024.05.27 19:22:38 - Routes, delete 104.254.90.243/32 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:38 - Routes, delete 2606:6080:2001:9:2679:addd:655:8142/128 for interface "Eddie (Eddie Tunnel)". . 2024.05.27 19:22:38 - Routes, delete 104.254.90.245/32 for interface "Ethernet (Killer E2600 Gigabit Ethernet Controller)", not exists. . 2024.05.27 19:22:39 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2024.05.27 19:22:39 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2024.05.27 19:22:39 - DNS leak protection with packet filtering disabled. . 2024.05.27 19:22:39 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2024.05.27 19:22:39 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2024.05.27 19:22:39 - Connection terminated. I 2024.05.27 19:22:39 - Cancel requested. ! 2024.05.27 19:22:39 - Session terminated.
-
I urge everyone who can to change or add an open WiFi SSID (2.4GHz preferably for longer range) called openwireless.org. It seems everywhere I go there are so many WiFi networks but none of them are open except for the occasional ISP advertised one that requires a login. I disabled mine. Hey, if I'm advertising them then I want some kickbacks for people connecting to that network and maybe since they're probably tracking or able to track MAC addresses then if someone opens an account after using my network then I should get a tiny bit of referral money, no? lol. I'll keep dreaming. Here's a copy+paste from the site. Has anyone else done this? Will you? Why or why not? Also, you could bridge another router to handle this. Maybe even set it up so that everyone's using Tor and/or a VPN this way your ISP doesn't bug you if someone does something they don't like. You could also set bandwidth throttling etc. Using Open-WRT, Tomato, pfSense, etc is for another thread but would be interesting to discuss.
-
I just got a 100/10 Mbps connection, coming from a 50/10 Mbps one. Both machines run Win 10 2004. I have the most recent Eddie client and the same settings on each machine. Using the Ookla speedtest the desktop on WiFi is hitting @ 93 Mbps and the other is only getting @ 50 Mbps on Ethernet (sits next to router, gigabit NIC). Both max out at >100 Mbps with the VPN off, and I can't figure out why there's a difference with it on. I know that the CPU can make a difference, and that plus RAM is the difference in the setups: WiFi Desktop: AMD Phenom II X4 B65 @ 3.4 GHz | 8 GB DDR3-1866MHz Ethernet Desktop: Intel Pentium J2900 @ 2.41 GHz | 4 GB DDR3-1600MHz Does anyone think the CPU is the issue here, or have any other ideas/suggestions?
-
When visiting a new location, such as an airport or coffee shop, it is my intention to have Network Lock active before even connecting to this new Wifi. I have not successfully accomplished this -- it seems I must have Network Lock disabled in order to connect to the new network. So long as Network Lock is disabled, it will connect to the Wifi immediately then work as normal. How can I have only the Wifi login bypass the Network Lock tunnel such that all other traffic is still locked to the tunnel? FYI my last attempt at using the advanced features of Eddie to allow my corporate VPN to bypass the tunnel was an epic failure....maybe I'll write up another thread on that someday. macOS Mojave 10.14.6 Eddie 2.16.3 Thanks, Snowplow
-
Hi, I'm running a Windows 8.1 laptop that has a WiFi-only connection to my WiFi router/broadband modem. Sometimes, it is convenient for me to run a "WiFi router" application on that laptop as an easy way to get WiFi connection sharing for a kindle and an iPad onto the internet as well, rather than connect those devices directly to my main router - it also acts like a range extender. This all works splendidly. Now, if I then start the Eddie client on the laptop, my assumption is that the kindle and iPad that are connection sharing to the laptop will have all their traffic pass through the VPN, as well as traffic from the laptop itself, which is a good thing. Is there any flaw in my assumptions? Maybe I'm overthinking about where the VPN sits in the stack compared with how wireless-only internet connection sharing works.... Thanks for any re-assurances!
-
Hello, I was messing around with a local web page hosted on my raspberry pi for local projects, and using that web page works fine from my pc which has an ethernet cable to my router. However when I try to access the page with my android phone, I cannot connect to the web page. I can also not reach my router admin page from my android device, something that DOES work on my pc... All three devices: pc, android phone, raspberry pi are running on AirVPN. The moment I disconnect from the VPN, I can access the admin panel and the website from my phone. Is there a way to make devices connected via wifi while using the VPN able to access my router / other local machines? Thanks in advance.
-
Problem: I have devices on different subnets ( 192.168.15.x, 192.168.35.x ) and would like for them to be able to discover each other. Specifically I want them so see each others minecraft (bedrock/pocket) worlds. the 15.x network is the "privileged" home network, where as the 35.x network is intended as guest-wifi network with no internet access ( also vpn clients would be given a IP here ) currently they cannot see each other - if I add a route with 192.168.15.x to the vpn config then vpn clients can access webservers in this subnet but minecraft clients still can't see each other. My router is a N66 running tomatoUSB and both subnets are entirely controlled by it. Question: Is this even possible? If so - how? Any help would be appreciated I currently do not know enough to even successfully google for marginally useful information
-
I use Eddie on a Windows 10 x64 laptop, and had very few issues, and I solved all of them through very simple settings within Eddie after reading here. Recently I went to stay with a friend for a few weeks, I had been there before and haven't experienced any AirVPN-related issue associated with these visits. This time around, when I got back home again, I simply couldn't connect to the internet. All my other devices could connect to the internet (both cable and wireless), one of them (Xbox One) did suffer pretty badly from dc's if connected through wifi, but the phone and the Smart TV had good and stable wireless connection throughout the whole ordeal (and the Xbox worked flawless if connected through cable). The laptop, however, couldn't connect at all, cable or wireless didn't matter. I uninstalled Eddie, problem remained. Before this I had of course rebooted all hardware and powercycled everything in the entire network several times, I updated (or checked for updates) everything I could - hardware, software, firmware. Double and tripple checked all DNS- and IP-related settings, flushed, released and reset pretty much everything I could. On the third day I found a working combo.. change and give the laptop a static IP, uninstall VMWare Workstation, use OpenVPN instead of Eddie. If I try to use Eddie, then I can't connect to internet at all. If I re-install VMWare Workstation, same thing. If either of these are installed, I can't connect to internet even with Eddie not even running. And even with my working current config (static IP, no VMWare Workstation or Eddie installed, only OpenVPN, internet dies if I change back to DHCP / assign automatic IP. As long as it's on static, however, everything works just like it used to do with Eddie and VMWare - can connect with and without VPN, can use virtual machines and virtual network adapters (but with VirtualBox and so on instead of VMWare), nothing changes if I temporary use it on another WiFi and then get back home to my own network (cable or wireless doesn't make any difference). Anyone know what could be the issue here? I can connect now, and I guess OpenVPN serves me well although I have to learn a new application to modify the config file to be as safe as the setup I had in Eddie, but it's weird and I'd rather use the software I actually want to use. Especially when it comes to VMWare Workstation (it also worked fine with AirVPN before my trip / switching wifi temporary). I know, I should've saved logs, and I understand that I might not be able to recieve a very specific awnser here. But it's so weird and I have a feeling that I really must have missed something very, very basic..?
- ...
-
- AirVPN
- Windows 10
- VMWare
- Virtual Machines
- Different
- Wifi
- Networks
- Connectivity
-
(and 7 more)
Tagged with:
-
I'll start by adnitting that this sounds really odd to me so I would welcome a more rational explanation. I have a dual-homed server which connects to AirVPN via the Netherlands servers, and acts as a gateway for my LAN Connection to the Internet is via an ordinary cable ISP router. I never have a problem connecting. Every so often (several weeks apart), however I notice two symptoms on a Windows laptop, connected to my LAN over wifi. Access to certain websites which normally require just a password requst captcha verification. The wifi dies on my laptop, and won't connect to any access point on my LAN (either internal or external)Logging on to my server and restarting the VPN service fixes both problems. I can understand the first one (shared IP being used for nefarious purposes) but what's going on with the WiFi?
-
I've noticed that the number of public WiFi operators making AirVPN unuseable is increasing. To be honest, I don't think it is specifically AirVPN being targeted. I can establish an outbound tunnel quickly and easily, but am then unable to connect to anything via the tunnel. When I look at the stats, the packet counters just stop incrementing. So far I've seen this behaviour with: BT WiFi (any flavour) - Never workedO2 WiFi (certain branded outlets, including Sainsbury, Asda)The Cloud (just started recently).Other providers (including my home broadband, guest wireless at work and (I think) IKEA) work fine so I think the config which comes directly from OpenVPN anyway is OK. Are they likely to be inspecting the traffic and discarding it because it's encrypted, or can it be resolved by reducing frame size, and/or using a different AirVPN transport?
-
Hello, I am away from home for some time, staying at a hospital. Luckily they have wifi I got a personal SSID Wlan with a personal key here. I am using TOR as protocol. However since I'm connected with this wifi none of the AIR-VPN servers show me a ping, neither I can connect when TOR is open. (TOR itself works fine) Any ideas how to fix this? I already tried to ipconfig /flushdns because I read it somewhere. However nothing changed. If I change the protocol to automatic no servers are pingable as well... Greetings
-
Hello fellow AirVPN users, Here is my issue that I'm experiencing with AirVPN: Problem: I'm experiencing issues with IPv4 and IPv6 connectivity on my Windows 10 machine. I started experiencing this shortly after installing the AirVPN client. I mainly use this machine on one of two WiFi networks (home and work) and the issue behaves differently on each network. Work Network: On my work network, "No Network Access" is displayed for both IPv4 and IPv6 connectivity on my WiFi status dialog box. I cannot make any sort of internet connection on any application on this network nor can I log-in or connect to AirVPN. I also see a yellow triangle over my WiFi icon on my Windows notifications taskbar. Home Network: After restarting/rebooting/booting/waking the computer, the WiFi status lists "No Network Access" for both IPv4 & 6 connectivity. However, when I try to log-in and start an AirVPN server connection through the client, the IPv4 connectivity status changes to "Internet" while the IPv6 connection remains on "No Network Access." The yellow triangle disappears over my taskbar WiFi icon and I'm able to connect to the internet with my browser. My IP address seems to be properly displayed as my AirVPN server's IP and no DNS leak is detected by dnsleaktest.com. However, I used to have IPv6 connectivity on this network prior to installing AirVPN client on this machine. If I disconnect and close AirVPN, the IPv4 connection remains on. Attempted Solutions: 1. Disabled network lock 2. Ran Windows Network Diagnosis: stated that machine seems to be configured correctly yet DNS connectivity cannot be obtained. 3. Ran a series of "netsh int tcp set..." commands based on the instructions at this website. No success. Any help would be appreciated. AirVPN works well on my Linux machines but it's critical that I'm able to use it on this Windows machine. Thanks!!
- ...
- 3 replies
-
- Windows 10
- Windows
- IPv4
- IPv6
- No Network Access
- DNS
- Connectivity
- WiFi
-
(and 7 more)
Tagged with:
-
Hello community, just wanted to ask your opinion, when VPN's are blocked on public wifi services (mall, airport, coffee shop etc.) is it done with the malicious intent to enforce the AUP or monitor their users activities for their own self defined reasons (aka i have the right to see your shit so imma snoop through all day because i can). Really, what are your feelings on public VPN blockages in general? Are they hurting privacy minded users by blocking VPNs? etc
-
I tried using airvpn in an open wifi but the standard config (udp 443) was not working. I didn't received any packages. I tried to download other configs with other ports and also with alternate entry ip, nothing worked. The only config which was working was a tcp config (every port was working with tcp). Outside the VPN I couldn't connect to my sip provider (I guess same problem as above). What kind of "censorship" is this? Why are all udp ports blocked? Does anyone has seen something similiar?
-
Hi there, I recently had to travel for business for some weeks through Poland and while using AirVPN in Hotels over WiFi worked great, I noticed on two different airports that I did not get a connection to any of the servers. While being at the airport, I switched to the public/free WiFi, opened up my OpenVPN app (I am using iOS 8) and noticed that it get's stuck while "waiting for server" (see attached screenshot). Since I've had this issue now on two different airports (Warsaw/Poland and Berlin/Germany), I am eager to know why this is the case. Could it be that the port is blocked on the airport WiFi? The DNS resolving for the server seems to have worked if I remember correctly.
-
hi, I'm using airvpn since two months. It works fine when my laptop is connected through 3G data modem but I have some problems on hotel public hotspot. The first month of use it was ok. The behavior of hotel wifi is: 1. connect to wifi network 2. browser automatically redirects to login page 3. after login you can surf the internet access is time limited but it seems random and lower than 24 hours. Since some weeks, this behavior changed: it doesn't prompt the login page anymore (but it affects my user only, I know for sure that others in the hotel still need to use the login page every day). And the connection problem arised. The problem is that I lose connectivity to the server that I am connected to easily and randomly, even after 5 minutes (but airvpn client starts to count the login time from 2h:00:00). When I lose connection I must shutdown airvpn client and disconnect from the wifi network. Then reconnect it and restart airvpn client and hope that the connection will be solid. I am pretty sure that the problem is the hotel wifi network but why this happens? Logs are attached (network disconnection and reconnection failed). Thanks p.s.: 1. I use comodo firewall with rules described in your howto and win 8.1 2. I use airvpn client 3. It works fine with 3G mobile data connection log03.txt log04.txt
-
Hi! After AirVPN Major System Update of April 2014 user can use three alternative connections simultaneously on three different devices with only one bought account. I would like to use my laptop (with Windows 8.1 Pro 64-bit and Comodo Firewall configured to prevent ip leaks) as a hotspot. When Comodo Firewall is turned off, everything works perfectly. I can connect my netbook to internet via my laptop and, of course, use AirVPN clients on both machines. However, when Comodo Firewall is turned on, it blocks device, which is connected to hotspot providing computer, from obtaining the internet data transmission. My Comodo Firewall on host is set to prevent leakage according to to the description given here (https://airvpn.org/t...-prevent-leaks/). To let device (connected to host) be connected to internet, I have to disable the main firewall rule (Block And Log IP In/Out From MAC Any To MAC Any Where Protocol Is Any) by changing the command "Block and Log" into "Allow and Log". After the moment when device was just connected and AirVPN client started the encryption of all the communication with the network, the rule can be restored. Is there a possibility to modify configuration of Comodo Firewall to let devices be connected to network through hotspot providing computer without any manual operations within the firewall of the latter? If yes, tell me how, please. I would like to be still protected against ip leakage of course. Thank you for your responses.
-
Please help, VPN we regularly work on: Scene 1: ddwrt (OpenVPN) -> WLAN -> WAN (Internet) This works prerfektno! But when I go to push through OpenVPN Local Proxy I do not know how to make a route to the local proxy. Port: 8080 Proxy Server = 172.20.0.122 You should somehow make the iptables command to ddwrt WLAN (client) proxies to access the Interent. Scene 2 ddwrt (OpenVPN) -> WLAN -> Proxy Server -> WAN (Internet) Details: Local Network (192.168.2.1) -> WLAN (192.168.1.2) / ddwrt (VPN) -> Proxy server (172.20.0.122:8080) -> Internet (OpenVPN server). pfSense heve that options: Thank you for the reply,
-
Hi all, I've been using AirVPN for some time now and I'm pretty pleased with its speed and functionality. I'm trying to get the program to work on my SurfaceRt, but no luck so far. I thought as a work around I could transform my windows8 laptop (connected to the internet using airvpn) to a WiFi hotspot, connecting my surface and voila! However, if I'm checking my IP address on my surface using the wifihotspot, it still shows the ip issued by my isp. Is there something i'm doing wrong? If this is not supposed to work this way, any suggestions on using airvpn on my surface rt? Thanks in advance!