Jump to content


Photo

dns 0 servers 100 faults (solved)


  • Please log in to reply
2 replies to this topic

#1 stripe

stripe

    Newbie

  • New Members
  • Pip
  • 3 posts

Posted 13 April 2018 - 10:56 AM

Hi all

normally ipleak.net works instantly (30 seconds at most and returns no errors)

but today I ran a ipleak.net test

took 4-5 minutes to run

and returned in the webrtc section

dns servers 0 100 faults but the indicator was still green (I have webrtc disabled)

after I ran ipleak no pages would load in the browser unless it was closed and restarted

the error happens on various browers and various operating systems

running dig it returns the airvpn dns address 10.4.0.1 so it seems I am using the correct dns server

any ideas on resolving the issue?

cheers

 

edit (more information): just checked on https://browserleaks.com/ip and it shows my ip as 213.152.161.211 (which is the same as eddie)

 

issue resolved itself (for whatever reason) 14:21 (BST)



#2 Philiberti

Philiberti

    Advanced Member

  • Members
  • PipPipPip
  • 52 posts

Posted 13 April 2018 - 11:30 AM

I'm getting a similar problem - with Network Lock enabled I can't load any web pages. Disabling Network Lock and using VPNcheck allows pages to load but I'm still getting the zero DNS servers / multiple faults error on IP Leak (see screen cap). I'm running Windows 10 64 bit and was updated this morning prior to all of these problems - could there be a link? Logs posted below

 

I 2018.04.13 12:06:06 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319
. 2018.04.13 12:06:06 - Reading options from C:\Program Files\AirVPN\AirVPN.xml
. 2018.04.13 12:06:06 - Command line arguments (0):
I 2018.04.13 12:06:08 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.9.2
I 2018.04.13 12:06:08 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
I 2018.04.13 12:06:08 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2018.04.13 12:06:08 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
I 2018.04.13 12:06:08 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
I 2018.04.13 12:06:08 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem
. 2018.04.13 12:06:08 - Updating systems & servers data ...
! 2018.04.13 12:06:08 - Ready
. 2018.04.13 12:06:09 - Systems & servers data update completed
! 2018.04.13 12:06:11 - Activation of Network Lock - Windows Filtering Platform
I 2018.04.13 12:06:28 - Session starting.
. 2018.04.13 12:06:28 - IPv6 disabled with packet filtering.
I 2018.04.13 12:06:28 - Checking authorization ...
! 2018.04.13 12:06:28 - Connecting to Musica (Netherlands, Alblasserdam)
. 2018.04.13 12:06:29 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.04.13 12:06:29 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.04.13 12:06:29 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.04.13 12:06:29 - Connection to OpenVPN Management Interface
. 2018.04.13 12:06:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.04.13 12:06:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.13 12:06:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.13 12:06:29 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.248:443
. 2018.04.13 12:06:29 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.04.13 12:06:29 - OpenVPN > UDP link local: (not bound)
. 2018.04.13 12:06:29 - OpenVPN > UDP link remote: [AF_INET]213.152.161.248:443
. 2018.04.13 12:06:29 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.04.13 12:06:29 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.248:443, sid=b22c2b91 27e53abb
. 2018.04.13 12:06:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.04.13 12:06:29 - OpenVPN > VERIFY KU OK
. 2018.04.13 12:06:29 - OpenVPN > Validating certificate extended key usage
. 2018.04.13 12:06:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.04.13 12:06:29 - OpenVPN > VERIFY EKU OK
. 2018.04.13 12:06:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Musica, emailAddress=info@airvpn.org
. 2018.04.13 12:06:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.04.13 12:06:29 - OpenVPN > [Musica] Peer Connection Initiated with [AF_INET]213.152.161.248:443
. 2018.04.13 12:06:30 - OpenVPN > SENT CONTROL [Musica]: 'PUSH_REQUEST' (status=1)
. 2018.04.13 12:06:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.116 255.255.0.0,peer-id 9,cipher AES-256-GCM'
. 2018.04.13 12:06:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.04.13 12:06:30 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.04.13 12:06:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.04.13 12:06:30 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.04.13 12:06:30 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.04.13 12:06:30 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.04.13 12:06:30 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.04.13 12:06:30 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.04.13 12:06:30 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.04.13 12:06:30 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.04.13 12:06:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.04.13 12:06:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.04.13 12:06:30 - OpenVPN > interactive service msg_channel=0
. 2018.04.13 12:06:30 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=22 HWADDR=bc:5f:f4:42:84:86
. 2018.04.13 12:06:30 - OpenVPN > open_tun
. 2018.04.13 12:06:30 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{9B2102FF-F038-4B15-B652-DA62DBBD1DE8}.tap
. 2018.04.13 12:06:30 - OpenVPN > TAP-Windows Driver Version 9.9
. 2018.04.13 12:06:30 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.2.116/255.255.0.0 [SUCCEEDED]
. 2018.04.13 12:06:30 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.2.116/255.255.0.0 on interface {9B2102FF-F038-4B15-B652-DA62DBBD1DE8} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.04.13 12:06:30 - OpenVPN > Successful ARP Flush on interface [15] {9B2102FF-F038-4B15-B652-DA62DBBD1DE8}
. 2018.04.13 12:06:30 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.04.13 12:06:35 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.04.13 12:06:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.248 MASK 255.255.255.255 192.168.1.254
. 2018.04.13 12:06:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.04.13 12:06:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.04.13 12:06:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.04.13 12:06:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
. 2018.04.13 12:06:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.04.13 12:06:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.04.13 12:06:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
. 2018.04.13 12:06:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.04.13 12:06:36 - Interface Ethernet metric changed from Automatic to 3, layer IPv4
. 2018.04.13 12:06:36 - DNS leak protection with packet filtering enabled.
. 2018.04.13 12:06:36 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
. 2018.04.13 12:06:36 - Flushing DNS
I 2018.04.13 12:06:39 - Checking route
I 2018.04.13 12:06:40 - Checking DNS
! 2018.04.13 12:06:52 - Connected.
. 2018.04.13 12:06:52 - OpenVPN > Initialization Sequence Completed
! 2018.04.13 12:09:08 - Disconnecting
. 2018.04.13 12:09:08 - Sending management termination signal
. 2018.04.13 12:09:08 - Management - Send 'signal SIGTERM'
. 2018.04.13 12:09:13 - Connection terminated.
. 2018.04.13 12:09:14 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to automatic)
. 2018.04.13 12:09:14 - DNS leak protection with packet filtering disabled.
. 2018.04.13 12:09:14 - Interface Ethernet metric restored from 3 to Automatic, layer IPv4
. 2018.04.13 12:09:14 - Flushing DNS
. 2018.04.13 12:09:17 - IPv6 restored with packet filtering.
! 2018.04.13 12:09:17 - Session terminated.
! 2018.04.13 12:09:18 - Deactivation of Network Lock
I 2018.04.13 12:09:26 - Session starting.
. 2018.04.13 12:09:27 - IPv6 disabled with packet filtering.
I 2018.04.13 12:09:27 - Checking authorization ...
! 2018.04.13 12:09:27 - Connecting to Atik (Netherlands, Alblasserdam)
. 2018.04.13 12:09:27 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.04.13 12:09:27 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.04.13 12:09:27 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.04.13 12:09:27 - Connection to OpenVPN Management Interface
. 2018.04.13 12:09:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.04.13 12:09:27 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.13 12:09:27 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.13 12:09:27 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.9:443
. 2018.04.13 12:09:27 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.04.13 12:09:27 - OpenVPN > UDP link local: (not bound)
. 2018.04.13 12:09:27 - OpenVPN > UDP link remote: [AF_INET]213.152.161.9:443
. 2018.04.13 12:09:27 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.04.13 12:09:27 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.9:443, sid=015850b5 a0d361be
. 2018.04.13 12:09:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.04.13 12:09:27 - OpenVPN > VERIFY KU OK
. 2018.04.13 12:09:27 - OpenVPN > Validating certificate extended key usage
. 2018.04.13 12:09:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.04.13 12:09:27 - OpenVPN > VERIFY EKU OK
. 2018.04.13 12:09:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.04.13 12:09:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.04.13 12:09:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.9:443
. 2018.04.13 12:09:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.04.13 12:09:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.8.253 255.255.0.0'
. 2018.04.13 12:09:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.04.13 12:09:29 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.04.13 12:09:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.04.13 12:09:29 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.04.13 12:09:29 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.04.13 12:09:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.04.13 12:09:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.04.13 12:09:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.13 12:09:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.04.13 12:09:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.04.13 12:09:29 - OpenVPN > interactive service msg_channel=0
. 2018.04.13 12:09:29 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 I=22 HWADDR=bc:5f:f4:42:84:86
. 2018.04.13 12:09:29 - OpenVPN > open_tun
. 2018.04.13 12:09:29 - OpenVPN > TAP-WIN32 device [Ethernet] opened: \\.\Global\{9B2102FF-F038-4B15-B652-DA62DBBD1DE8}.tap
. 2018.04.13 12:09:29 - OpenVPN > TAP-Windows Driver Version 9.9
. 2018.04.13 12:09:29 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.8.253/255.255.0.0 [SUCCEEDED]
. 2018.04.13 12:09:29 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.8.253/255.255.0.0 on interface {9B2102FF-F038-4B15-B652-DA62DBBD1DE8} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.04.13 12:09:29 - OpenVPN > Successful ARP Flush on interface [15] {9B2102FF-F038-4B15-B652-DA62DBBD1DE8}
. 2018.04.13 12:09:29 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.04.13 12:09:34 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.04.13 12:09:34 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.9 MASK 255.255.255.255 192.168.1.254
. 2018.04.13 12:09:34 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.04.13 12:09:34 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.04.13 12:09:34 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.04.13 12:09:34 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
. 2018.04.13 12:09:34 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.04.13 12:09:34 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.04.13 12:09:34 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=55 and dwForwardType=4
. 2018.04.13 12:09:34 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.04.13 12:09:34 - Interface Ethernet metric changed from Automatic to 3, layer IPv4
. 2018.04.13 12:09:34 - DNS leak protection with packet filtering enabled.
. 2018.04.13 12:09:34 - DNS of a network adapter forced (TAP-Windows Adapter V9, from automatic (10.4.0.1) to 10.4.0.1)
. 2018.04.13 12:09:34 - Flushing DNS
I 2018.04.13 12:09:38 - Checking route
I 2018.04.13 12:09:38 - Checking DNS
! 2018.04.13 12:09:51 - Connected.
. 2018.04.13 12:09:51 - OpenVPN > Initialization Sequence Completed
. 2018.04.13 12:16:14 - Updating systems & servers data ...
. 2018.04.13 12:16:14 - Systems & servers data update completed

 

DNS Problem.JPG
 



#3 Philiberti

Philiberti

    Advanced Member

  • Members
  • PipPipPip
  • 52 posts

Posted 13 April 2018 - 11:35 AM

Just re-engaged Network Lock and tried again - all is OK!  Weird - ain't technology wonderful






1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users

Servers online. Online Sessions: 13432 - BW: 40205 Mbit/sYour IP: 54.198.195.11Guest Access.