Wachtwoord: local:~ # journalctl | grep bluetit Feb 09 11:34:13 local bluetit[2103]: Starting Bluetit - AirVPN OpenVPN 3 Service 1.2.0 Beta 1 - 7 February 2022 Feb 09 11:34:13 local bluetit[2103]: OpenVPN core 3.7.1 AirVPN linux x86_64 64-bit Feb 09 11:34:13 local bluetit[2103]: Copyright (C) 2012-2020 OpenVPN Inc. All rights reserved. Feb 09 11:34:13 local bluetit[2103]: SSL Library: OpenSSL 1.1.0l 10 Sep 2019 Feb 09 11:34:13 local bluetit[2117]: Bluetit daemon started with PID 2117 Feb 09 11:34:13 local bluetit[2117]: External network is reachable via gateway 192.168.178.1 through interface eth0 Feb 09 11:34:13 local bluetit[2117]: Successfully connected to D-Bus Feb 09 11:34:13 local bluetit[2117]: Reading run control directives from file /etc/airvpn/bluetit.rc Feb 09 11:34:13 local bluetit[2117]: IPv6 is available in this system Feb 09 11:34:13 local bluetit[2117]: Bluetit successfully initialized and ready Feb 09 11:34:13 local bluetit[2117]: Requesting network IP and country to AirVPN ipleak.net via secure connection Feb 09 11:34:13 local bluetit[2117]: ERROR: Cannot detect system location: Unknown error: Problem with the SSL CA cert (path? access rights?) Feb 09 11:34:13 local bluetit[2117]: AirVPN Manifest updater thread started Feb 09 11:34:13 local bluetit[2117]: AirVPN Manifest update interval is 15 minutes Feb 09 11:34:13 local bluetit[2117]: Updating AirVPN Manifest Feb 09 11:34:13 local bluetit[2117]: Trying connection to AirVPN bootstrap server at http://63.33.78.166 Feb 09 11:34:14 local bluetit[2117]: AirVPN Manifest successfully retrieved from server Feb 09 11:34:30 local bluetit[2117]: Requested method "version" Feb 09 11:34:30 local bluetit[2117]: Requested method "openvpn_info" Feb 09 11:34:30 local bluetit[2117]: Requested method "openvpn_copyright" Feb 09 11:34:30 local bluetit[2117]: Requested method "ssl_library_version" Feb 09 11:34:30 local bluetit[2117]: Requested method "bluetit_status -> Bluetit is ready" Feb 09 11:34:30 local bluetit[2117]: Requested method "reset_bluetit_options -> Bluetit options successfully reset" Feb 09 11:34:30 local bluetit[2117]: Requested method "set_openvpn_profile -> OK" Feb 09 11:34:30 local bluetit[2117]: Requested method "start_connection" Feb 09 11:34:30 local bluetit[2117]: OpenVPN3 connection successfully started Feb 09 11:34:30 local bluetit[2117]: Network filter and lock are using nftables Feb 09 11:34:30 local bluetit[2117]: Successfully loaded kernel module nf_tables Feb 09 11:34:30 local bluetit[2117]: WARNING: firewalld is running on this system and may interfere with network filter and lock Feb 09 11:34:30 local bluetit[2117]: Network filter successfully initialized Feb 09 11:34:30 local bluetit[2117]: Starting VPN Connection Feb 09 11:34:30 local bluetit[2117]: OpenVPN3 client successfully created and initialized. Feb 09 11:34:30 local bluetit[2117]: TUN persistence is enabled. Feb 09 11:34:30 local bluetit[2117]: Successfully set OpenVPN3 client configuration Feb 09 11:34:30 local bluetit[2117]: Starting OpenVPN3 connection thread Feb 09 11:34:30 local bluetit[2117]: Connection statistics updater thread started Feb 09 11:34:30 local bluetit[2117]: OpenVPN core 3.7.1 AirVPN linux x86_64 64-bit Feb 09 11:34:30 local bluetit[2117]: Frame=512/2048/512 mssfix-ctrl=1250 Feb 09 11:34:30 local bluetit[2117]: UNUSED OPTIONS Feb 09 11:34:30 local bluetit[2117]: EVENT: RESOLVE Feb 09 11:34:30 local bluetit[2117]: Local IPv4 address 192.168.178.11 Feb 09 11:34:30 local bluetit[2117]: Local IPv6 address 2001:1c04:581:e700:4865:dde8:fbca:7d68 Feb 09 11:34:30 local bluetit[2117]: Local IPv6 address 2001:1c04:581:e700:aaa1:59ff:fe2f:523e Feb 09 11:34:30 local bluetit[2117]: Local IPv6 address fe80::aaa1:59ff:fe2f:523e Feb 09 11:34:30 local bluetit[2117]: Local interface eth0 Feb 09 11:34:30 local bluetit[2117]: Setting up network filter and lock Feb 09 11:34:30 local bluetit[2117]: Allowing system DNS 84.116.46.20 to pass through the network filter Feb 09 11:34:30 local bluetit[2117]: Allowing system DNS 84.116.46.21 to pass through the network filter Feb 09 11:34:32 local bluetit[2117]: Resolved server nl3.vpn.airdns.org into IPv4 134.19.179.237 Feb 09 11:34:32 local bluetit[2117]: Adding IPv4 server 134.19.179.237 to network filter Feb 09 11:34:32 local bluetit[2117]: Network filter and lock successfully activated Feb 09 11:34:32 local bluetit[2117]: Contacting 134.19.179.237:443 via UDP Feb 09 11:34:32 local bluetit[2117]: EVENT: WAIT Feb 09 11:34:32 local bluetit[2117]: net_route_best_gw query IPv4: 134.19.179.237/32 Feb 09 11:34:32 local bluetit[2117]: sitnl_route_best_gw result: via 192.168.178.1 dev eth0 Feb 09 11:34:32 local bluetit[2117]: net_route_add: 134.19.179.237/32 via 192.168.178.1 dev eth0 table 0 metric 0 Feb 09 11:34:32 local bluetit[2117]: Connecting to [nl3.vpn.airdns.org]:443 (134.19.179.237) via UDPv4 Feb 09 11:34:32 local bluetit[2117]: EVENT: CONNECTING Feb 09 11:34:32 local bluetit[2117]: Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Feb 09 11:34:32 local bluetit[2117]: Peer Info: Feb 09 11:34:32 local bluetit[2117]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Feb 09 11:34:32 local bluetit[2117]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Tiaki/emailAddress=info@airvpn.org, signature: RSA-SHA512 Feb 09 11:34:32 local bluetit[2117]: SSL Handshake: peer certificate: CN=Tiaki, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Feb 09 11:34:32 local bluetit[2117]: Session is ACTIVE Feb 09 11:34:32 local bluetit[2117]: EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Feb 09 11:34:32 local bluetit[2117]: EVENT: GET_CONFIG Feb 09 11:34:32 local bluetit[2117]: Sending PUSH_REQUEST to server... Feb 09 11:34:32 local bluetit[2117]: OPTIONS: Feb 09 11:34:32 local bluetit[2117]: PROTOCOL OPTIONS: Feb 09 11:34:32 local bluetit[2117]: EVENT: ASSIGN_IP Feb 09 11:34:32 local bluetit[2117]: VPN Server has pushed IPv4 DNS server 10.34.178.1 Feb 09 11:34:32 local bluetit[2117]: Setting pushed IPv4 DNS server 10.34.178.1 in resolv.conf Feb 09 11:34:32 local bluetit[2117]: VPN Server has pushed IPv6 DNS server fde6:7a:7d20:1eb2::1 Feb 09 11:34:32 local bluetit[2117]: Setting pushed IPv6 DNS server fde6:7a:7d20:1eb2::1 in resolv.conf Feb 09 11:34:32 local bluetit[2117]: net_iface_mtu_set: mtu 1500 for tun0 Feb 09 11:34:32 local bluetit[2117]: net_iface_up: set tun0 up Feb 09 11:34:32 local bluetit[2117]: net_addr_add: 10.34.178.116/24 brd 10.34.178.255 dev tun0 Feb 09 11:34:32 local bluetit[2117]: net_addr_add: fde6:7a:7d20:1eb2::1072/64 dev tun0 Feb 09 11:34:32 local bluetit[2117]: net_route_add: 0.0.0.0/1 via 10.34.178.1 dev tun0 table 0 metric 0 Feb 09 11:34:32 local bluetit[2117]: net_route_add: 128.0.0.0/1 via 10.34.178.1 dev tun0 table 0 metric 0 Feb 09 11:34:32 local bluetit[2117]: net_route_add: ::/1 via fde6:7a:7d20:1eb2::1 dev tun0 table 0 metric 0 Feb 09 11:34:32 local bluetit[2117]: net_route_add: 8000::/1 via fde6:7a:7d20:1eb2::1 dev tun0 table 0 metric 0 Feb 09 11:34:32 local bluetit[2117]: TunPersist: saving tun context: Feb 09 11:34:32 local bluetit[2117]: Connected via tun Feb 09 11:34:32 local bluetit[2117]: Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Feb 09 11:34:32 local bluetit[2117]: Client terminated, restarting in 2000 ms... Feb 09 11:34:34 local bluetit[2117]: EVENT: RECONNECTING Feb 09 11:34:34 local bluetit[2117]: ERROR: N_RECONNECT Feb 09 11:34:34 local bluetit[2117]: Contacting 134.19.179.237:443 via UDP Feb 09 11:34:34 local bluetit[2117]: EVENT: WAIT Feb 09 11:34:34 local bluetit[2117]: Connecting to [nl3.vpn.airdns.org]:443 (134.19.179.237) via UDPv4 Feb 09 11:34:34 local bluetit[2117]: EVENT: CONNECTING Feb 09 11:34:34 local bluetit[2117]: Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Feb 09 11:34:34 local bluetit[2117]: Peer Info: Feb 09 11:34:34 local bluetit[2117]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Feb 09 11:34:34 local bluetit[2117]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Tiaki/emailAddress=info@airvpn.org, signature: RSA-SHA512 Feb 09 11:34:34 local bluetit[2117]: SSL Handshake: peer certificate: CN=Tiaki, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Feb 09 11:34:34 local bluetit[2117]: Session is ACTIVE Feb 09 11:34:34 local bluetit[2117]: EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Feb 09 11:34:34 local bluetit[2117]: EVENT: GET_CONFIG Feb 09 11:34:34 local bluetit[2117]: Sending PUSH_REQUEST to server... Feb 09 11:34:34 local bluetit[2117]: OPTIONS: Feb 09 11:34:34 local bluetit[2117]: PROTOCOL OPTIONS: Feb 09 11:34:34 local bluetit[2117]: TunPersist: reused tun context Feb 09 11:34:34 local bluetit[2117]: Connected via tun Feb 09 11:34:34 local bluetit[2117]: Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Feb 09 11:34:34 local bluetit[2117]: Client terminated, restarting in 2000 ms... Feb 09 11:34:36 local bluetit[2117]: EVENT: RECONNECTING Feb 09 11:34:36 local bluetit[2117]: ERROR: N_RECONNECT Feb 09 11:34:36 local bluetit[2117]: Contacting 134.19.179.237:443 via UDP Feb 09 11:34:36 local bluetit[2117]: EVENT: WAIT Feb 09 11:34:36 local bluetit[2117]: Connecting to [nl3.vpn.airdns.org]:443 (134.19.179.237) via UDPv4 Feb 09 11:34:36 local bluetit[2117]: EVENT: CONNECTING Feb 09 11:34:36 local bluetit[2117]: Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Feb 09 11:34:36 local bluetit[2117]: Peer Info: Feb 09 11:34:36 local bluetit[2117]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Feb 09 11:34:36 local bluetit[2117]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Tiaki/emailAddress=info@airvpn.org, signature: RSA-SHA512 Feb 09 11:34:36 local bluetit[2117]: SSL Handshake: peer certificate: CN=Tiaki, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Feb 09 11:34:36 local bluetit[2117]: Session is ACTIVE Feb 09 11:34:36 local bluetit[2117]: EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Feb 09 11:34:36 local bluetit[2117]: EVENT: GET_CONFIG Feb 09 11:34:36 local bluetit[2117]: Sending PUSH_REQUEST to server... Feb 09 11:34:37 local bluetit[2117]: OPTIONS: Feb 09 11:34:37 local bluetit[2117]: PROTOCOL OPTIONS: Feb 09 11:34:37 local bluetit[2117]: TunPersist: reused tun context Feb 09 11:34:37 local bluetit[2117]: Connected via tun Feb 09 11:34:37 local bluetit[2117]: Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Feb 09 11:34:37 local bluetit[2117]: Client terminated, restarting in 2000 ms... Feb 09 11:34:39 local bluetit[2117]: EVENT: RECONNECTING Feb 09 11:34:39 local bluetit[2117]: ERROR: N_RECONNECT Feb 09 11:34:39 local bluetit[2117]: Contacting 134.19.179.237:443 via UDP Feb 09 11:34:39 local bluetit[2117]: EVENT: WAIT Feb 09 11:34:39 local bluetit[2117]: Connecting to [nl3.vpn.airdns.org]:443 (134.19.179.237) via UDPv4 Feb 09 11:34:39 local bluetit[2117]: EVENT: CONNECTING Feb 09 11:34:39 local bluetit[2117]: Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Feb 09 11:34:39 local bluetit[2117]: Peer Info: Feb 09 11:34:39 local bluetit[2117]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Feb 09 11:34:39 local bluetit[2117]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Tiaki/emailAddress=info@airvpn.org, signature: RSA-SHA512 Feb 09 11:34:39 local bluetit[2117]: SSL Handshake: peer certificate: CN=Tiaki, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Feb 09 11:34:39 local bluetit[2117]: Session is ACTIVE Feb 09 11:34:39 local bluetit[2117]: EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Feb 09 11:34:39 local bluetit[2117]: EVENT: GET_CONFIG Feb 09 11:34:39 local bluetit[2117]: Sending PUSH_REQUEST to server... Feb 09 11:34:39 local bluetit[2117]: OPTIONS: Feb 09 11:34:39 local bluetit[2117]: PROTOCOL OPTIONS: Feb 09 11:34:39 local bluetit[2117]: TunPersist: reused tun context Feb 09 11:34:39 local bluetit[2117]: Connected via tun Feb 09 11:34:39 local bluetit[2117]: Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Feb 09 11:34:39 local bluetit[2117]: Client terminated, restarting in 2000 ms... Feb 09 11:34:41 local bluetit[2117]: EVENT: RECONNECTING Feb 09 11:34:41 local bluetit[2117]: ERROR: N_RECONNECT Feb 09 11:34:41 local bluetit[2117]: Contacting 134.19.179.237:443 via UDP Feb 09 11:34:41 local bluetit[2117]: EVENT: WAIT Feb 09 11:34:41 local bluetit[2117]: Connecting to [nl3.vpn.airdns.org]:443 (134.19.179.237) via UDPv4 Feb 09 11:34:41 local bluetit[2117]: EVENT: CONNECTING Feb 09 11:34:41 local bluetit[2117]: Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Feb 09 11:34:41 local bluetit[2117]: Peer Info: Feb 09 11:34:41 local bluetit[2117]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Feb 09 11:34:41 local bluetit[2117]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Tiaki/emailAddress=info@airvpn.org, signature: RSA-SHA512 Feb 09 11:34:41 local bluetit[2117]: SSL Handshake: peer certificate: CN=Tiaki, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Feb 09 11:34:41 local bluetit[2117]: Session is ACTIVE Feb 09 11:34:41 local bluetit[2117]: EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Feb 09 11:34:41 local bluetit[2117]: EVENT: GET_CONFIG Feb 09 11:34:41 local bluetit[2117]: Sending PUSH_REQUEST to server... Feb 09 11:34:41 local bluetit[2117]: OPTIONS: Feb 09 11:34:41 local bluetit[2117]: PROTOCOL OPTIONS: Feb 09 11:34:41 local bluetit[2117]: TunPersist: reused tun context Feb 09 11:34:41 local bluetit[2117]: Connected via tun Feb 09 11:34:41 local bluetit[2117]: Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Feb 09 11:34:41 local bluetit[2117]: Client terminated, restarting in 2000 ms... Feb 09 11:34:43 local bluetit[2117]: EVENT: RECONNECTING Feb 09 11:34:43 local bluetit[2117]: ERROR: N_RECONNECT Feb 09 11:34:43 local bluetit[2117]: Contacting 134.19.179.237:443 via UDP Feb 09 11:34:43 local bluetit[2117]: EVENT: WAIT Feb 09 11:34:43 local bluetit[2117]: Connecting to [nl3.vpn.airdns.org]:443 (134.19.179.237) via UDPv4 Feb 09 11:34:43 local bluetit[2117]: EVENT: CONNECTING Feb 09 11:34:43 local bluetit[2117]: Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Feb 09 11:34:43 local bluetit[2117]: Peer Info: Feb 09 11:34:43 local bluetit[2117]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Feb 09 11:34:43 local bluetit[2117]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Tiaki/emailAddress=info@airvpn.org, signature: RSA-SHA512 Feb 09 11:34:43 local bluetit[2117]: SSL Handshake: peer certificate: CN=Tiaki, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Feb 09 11:34:43 local bluetit[2117]: Session is ACTIVE Feb 09 11:34:43 local bluetit[2117]: EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Feb 09 11:34:43 local bluetit[2117]: EVENT: GET_CONFIG Feb 09 11:34:43 local bluetit[2117]: Sending PUSH_REQUEST to server... Feb 09 11:34:43 local bluetit[2117]: OPTIONS: Feb 09 11:34:43 local bluetit[2117]: PROTOCOL OPTIONS: Feb 09 11:34:43 local bluetit[2117]: TunPersist: reused tun context Feb 09 11:34:43 local bluetit[2117]: Connected via tun Feb 09 11:34:43 local bluetit[2117]: Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Feb 09 11:34:43 local bluetit[2117]: Client terminated, restarting in 2000 ms... Feb 09 11:34:45 local bluetit[2117]: EVENT: RECONNECTING Feb 09 11:34:45 local bluetit[2117]: ERROR: N_RECONNECT Feb 09 11:34:45 local bluetit[2117]: Contacting 134.19.179.237:443 via UDP Feb 09 11:34:45 local bluetit[2117]: EVENT: WAIT Feb 09 11:34:45 local bluetit[2117]: Connecting to [nl3.vpn.airdns.org]:443 (134.19.179.237) via UDPv4 Feb 09 11:34:45 local bluetit[2117]: EVENT: CONNECTING Feb 09 11:34:45 local bluetit[2117]: Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Feb 09 11:34:45 local bluetit[2117]: Peer Info: Feb 09 11:34:45 local bluetit[2117]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Feb 09 11:34:45 local bluetit[2117]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Tiaki/emailAddress=info@airvpn.org, signature: RSA-SHA512 Feb 09 11:34:45 local bluetit[2117]: SSL Handshake: peer certificate: CN=Tiaki, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Feb 09 11:34:45 local bluetit[2117]: Session is ACTIVE Feb 09 11:34:45 local bluetit[2117]: EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Feb 09 11:34:45 local bluetit[2117]: EVENT: GET_CONFIG Feb 09 11:34:45 local bluetit[2117]: Sending PUSH_REQUEST to server... Feb 09 11:34:45 local bluetit[2117]: OPTIONS: Feb 09 11:34:45 local bluetit[2117]: PROTOCOL OPTIONS: Feb 09 11:34:45 local bluetit[2117]: TunPersist: reused tun context Feb 09 11:34:45 local bluetit[2117]: Connected via tun Feb 09 11:34:45 local bluetit[2117]: Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Feb 09 11:34:45 local bluetit[2117]: Client terminated, restarting in 2000 ms... Feb 09 11:34:47 local bluetit[2117]: Requested method "bluetit_status -> Bluetit is connected to VPN" Feb 09 11:34:47 local bluetit[2117]: Requested method "stop_connection" Feb 09 11:34:47 local bluetit[2117]: Stopping OpenVPN3 connection thread Feb 09 11:34:47 local bluetit[2117]: Connection statistics updater thread finished Feb 09 11:34:47 local bluetit[2117]: net_route_del: 8000::/1 via fde6:7a:7d20:1eb2::1 dev tun0 table 0 metric 0 Feb 09 11:34:47 local bluetit[2117]: net_route_del: ::/1 via fde6:7a:7d20:1eb2::1 dev tun0 table 0 metric 0 Feb 09 11:34:47 local bluetit[2117]: net_route_del: 128.0.0.0/1 via 10.34.178.1 dev tun0 table 0 metric 0 Feb 09 11:34:47 local bluetit[2117]: net_route_del: 0.0.0.0/1 via 10.34.178.1 dev tun0 table 0 metric 0 Feb 09 11:34:47 local bluetit[2117]: net_addr_del: fde6:7a:7d20:1eb2::1072/64 dev tun0 Feb 09 11:34:47 local bluetit[2117]: net_addr_del: 10.34.178.116/24 dev tun0 Feb 09 11:34:47 local bluetit[2117]: net_iface_mtu_set: mtu 1500 for tun0 Feb 09 11:34:47 local bluetit[2117]: net_iface_up: set tun0 down Feb 09 11:34:47 local bluetit[2117]: net_route_del: 134.19.179.237/32 via 192.168.178.1 dev eth0 table 0 metric 0 Feb 09 11:34:47 local bluetit[2117]: EVENT: DISCONNECTED Feb 09 11:34:47 local bluetit[2117]: Successfully restored DNS settings Feb 09 11:34:47 local bluetit[2117]: Network filter successfully restored Feb 09 11:34:47 local bluetit[2117]: OpenVPN3 connection thread finished Feb 09 11:34:47 local bluetit[2117]: OpenVPN3 connection thread successfully terminated Feb 09 11:34:47 local dbus-daemon[1308]: [system] Rejected send message, 3 matched rules; type="error", sender=":1.86" (uid=1000 pid=4197 comm="./goldcrest AirVPN_Netherlands_UDP-443-Entry3.ovpn") interface="(unset)" member="(unset)" error name="org.freedesktop.DBus.Error.UnknownMethod" requested_reply="0" destination=":1.20" (uid=0 pid=2117 comm="/sbin/bluetit ") Feb 09 11:35:48 local bluetit[2117]: Requested method "version" Feb 09 11:35:48 local bluetit[2117]: Requested method "openvpn_info" Feb 09 11:35:48 local bluetit[2117]: Requested method "openvpn_copyright" Feb 09 11:35:48 local bluetit[2117]: Requested method "ssl_library_version" Feb 09 11:35:48 local bluetit[2117]: Requested method "bluetit_status -> Bluetit is ready" Feb 09 11:35:48 local bluetit[2117]: Requested method "reset_bluetit_options -> Bluetit options successfully reset" Feb 09 11:35:48 local bluetit[2117]: Requested method "set_openvpn_profile -> OK" Feb 09 11:35:48 local bluetit[2117]: Requested method "start_connection" Feb 09 11:35:48 local bluetit[2117]: OpenVPN3 connection successfully started Feb 09 11:35:48 local bluetit[2117]: Network filter and lock are using nftables Feb 09 11:35:48 local bluetit[2117]: Successfully loaded kernel module nf_tables Feb 09 11:35:48 local bluetit[2117]: WARNING: firewalld is running on this system and may interfere with network filter and lock Feb 09 11:35:48 local bluetit[2117]: Network filter successfully initialized Feb 09 11:35:48 local bluetit[2117]: Starting VPN Connection Feb 09 11:35:48 local bluetit[2117]: OpenVPN3 client successfully created and initialized. Feb 09 11:35:48 local bluetit[2117]: TUN persistence is enabled. Feb 09 11:35:48 local bluetit[2117]: Successfully set OpenVPN3 client configuration Feb 09 11:35:48 local bluetit[2117]: Starting OpenVPN3 connection thread Feb 09 11:35:48 local bluetit[2117]: Connection statistics updater thread started Feb 09 11:35:48 local bluetit[2117]: OpenVPN core 3.7.1 AirVPN linux x86_64 64-bit Feb 09 11:35:48 local bluetit[2117]: Frame=512/2048/512 mssfix-ctrl=1250 Feb 09 11:35:48 local bluetit[2117]: UNUSED OPTIONS Feb 09 11:35:48 local bluetit[2117]: EVENT: RESOLVE Feb 09 11:35:48 local bluetit[2117]: Local IPv4 address 192.168.178.11 Feb 09 11:35:48 local bluetit[2117]: Local IPv6 address 2001:1c04:581:e700:4865:dde8:fbca:7d68 Feb 09 11:35:48 local bluetit[2117]: Local IPv6 address 2001:1c04:581:e700:aaa1:59ff:fe2f:523e Feb 09 11:35:48 local bluetit[2117]: Local IPv6 address fe80::aaa1:59ff:fe2f:523e Feb 09 11:35:48 local bluetit[2117]: Local interface eth0 Feb 09 11:35:48 local bluetit[2117]: Setting up network filter and lock Feb 09 11:35:48 local bluetit[2117]: Allowing system DNS 84.116.46.20 to pass through the network filter Feb 09 11:35:48 local bluetit[2117]: Allowing system DNS 84.116.46.21 to pass through the network filter Feb 09 11:35:50 local bluetit[2117]: Resolved server nl3.vpn.airdns.org into IPv4 213.152.161.17 Feb 09 11:35:50 local bluetit[2117]: Adding IPv4 server 213.152.161.17 to network filter Feb 09 11:35:50 local bluetit[2117]: Network filter and lock successfully activated Feb 09 11:35:50 local bluetit[2117]: Contacting 213.152.161.17:443 via UDP Feb 09 11:35:50 local bluetit[2117]: EVENT: WAIT Feb 09 11:35:50 local bluetit[2117]: net_route_best_gw query IPv4: 213.152.161.17/32 Feb 09 11:35:50 local bluetit[2117]: sitnl_route_best_gw result: via 192.168.178.1 dev eth0 Feb 09 11:35:50 local bluetit[2117]: net_route_add: 213.152.161.17/32 via 192.168.178.1 dev eth0 table 0 metric 0 Feb 09 11:35:50 local bluetit[2117]: Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.17) via UDPv4 Feb 09 11:35:50 local bluetit[2117]: EVENT: CONNECTING Feb 09 11:35:50 local bluetit[2117]: Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Feb 09 11:35:50 local bluetit[2117]: Peer Info: Feb 09 11:35:50 local bluetit[2117]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Feb 09 11:35:50 local bluetit[2117]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Situla/emailAddress=info@airvpn.org, signature: RSA-SHA512 Feb 09 11:35:50 local bluetit[2117]: SSL Handshake: peer certificate: CN=Situla, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Feb 09 11:35:50 local bluetit[2117]: Session is ACTIVE Feb 09 11:35:50 local bluetit[2117]: EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Feb 09 11:35:50 local bluetit[2117]: EVENT: GET_CONFIG Feb 09 11:35:50 local bluetit[2117]: Sending PUSH_REQUEST to server... Feb 09 11:35:50 local bluetit[2117]: OPTIONS: Feb 09 11:35:50 local bluetit[2117]: PROTOCOL OPTIONS: Feb 09 11:35:50 local bluetit[2117]: EVENT: ASSIGN_IP Feb 09 11:35:50 local bluetit[2117]: VPN Server has pushed IPv4 DNS server 10.30.114.1 Feb 09 11:35:50 local bluetit[2117]: Setting pushed IPv4 DNS server 10.30.114.1 in resolv.conf Feb 09 11:35:50 local bluetit[2117]: VPN Server has pushed IPv6 DNS server fde6:7a:7d20:1a72::1 Feb 09 11:35:50 local bluetit[2117]: Setting pushed IPv6 DNS server fde6:7a:7d20:1a72::1 in resolv.conf Feb 09 11:35:50 local bluetit[2117]: net_iface_mtu_set: mtu 1500 for tun0 Feb 09 11:35:50 local bluetit[2117]: net_iface_up: set tun0 up Feb 09 11:35:50 local bluetit[2117]: net_addr_add: 10.30.114.221/24 brd 10.30.114.255 dev tun0 Feb 09 11:35:50 local bluetit[2117]: net_addr_add: fde6:7a:7d20:1a72::10db/64 dev tun0 Feb 09 11:35:50 local bluetit[2117]: net_route_add: 0.0.0.0/1 via 10.30.114.1 dev tun0 table 0 metric 0 Feb 09 11:35:50 local bluetit[2117]: net_route_add: 128.0.0.0/1 via 10.30.114.1 dev tun0 table 0 metric 0 Feb 09 11:35:50 local bluetit[2117]: net_route_add: ::/1 via fde6:7a:7d20:1a72::1 dev tun0 table 0 metric 0 Feb 09 11:35:50 local bluetit[2117]: net_route_add: 8000::/1 via fde6:7a:7d20:1a72::1 dev tun0 table 0 metric 0 Feb 09 11:35:50 local bluetit[2117]: TunPersist: saving tun context: Feb 09 11:35:50 local bluetit[2117]: Connected via tun Feb 09 11:35:50 local bluetit[2117]: Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Feb 09 11:35:50 local bluetit[2117]: Client terminated, restarting in 2000 ms... Feb 09 11:35:52 local bluetit[2117]: EVENT: RECONNECTING Feb 09 11:35:52 local bluetit[2117]: ERROR: N_RECONNECT Feb 09 11:35:52 local bluetit[2117]: Contacting 213.152.161.17:443 via UDP Feb 09 11:35:52 local bluetit[2117]: EVENT: WAIT Feb 09 11:35:52 local bluetit[2117]: Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.17) via UDPv4 Feb 09 11:35:52 local bluetit[2117]: EVENT: CONNECTING Feb 09 11:35:52 local bluetit[2117]: Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Feb 09 11:35:52 local bluetit[2117]: Peer Info: Feb 09 11:35:52 local bluetit[2117]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Feb 09 11:35:52 local bluetit[2117]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Situla/emailAddress=info@airvpn.org, signature: RSA-SHA512 Feb 09 11:35:52 local bluetit[2117]: SSL Handshake: peer certificate: CN=Situla, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Feb 09 11:35:52 local bluetit[2117]: Session is ACTIVE Feb 09 11:35:52 local bluetit[2117]: EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Feb 09 11:35:52 local bluetit[2117]: EVENT: GET_CONFIG Feb 09 11:35:52 local bluetit[2117]: Sending PUSH_REQUEST to server... Feb 09 11:35:52 local bluetit[2117]: OPTIONS: Feb 09 11:35:52 local bluetit[2117]: PROTOCOL OPTIONS: Feb 09 11:35:52 local bluetit[2117]: TunPersist: reused tun context Feb 09 11:35:52 local bluetit[2117]: Connected via tun Feb 09 11:35:52 local bluetit[2117]: Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Feb 09 11:35:52 local bluetit[2117]: Client terminated, restarting in 2000 ms... Feb 09 11:35:54 local bluetit[2117]: EVENT: RECONNECTING Feb 09 11:35:54 local bluetit[2117]: ERROR: N_RECONNECT Feb 09 11:35:54 local bluetit[2117]: Contacting 213.152.161.17:443 via UDP Feb 09 11:35:54 local bluetit[2117]: EVENT: WAIT Feb 09 11:35:54 local bluetit[2117]: Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.17) via UDPv4 Feb 09 11:35:54 local bluetit[2117]: EVENT: CONNECTING Feb 09 11:35:54 local bluetit[2117]: Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Feb 09 11:35:54 local bluetit[2117]: Peer Info: Feb 09 11:35:54 local bluetit[2117]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Feb 09 11:35:54 local bluetit[2117]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Situla/emailAddress=info@airvpn.org, signature: RSA-SHA512 Feb 09 11:35:54 local bluetit[2117]: SSL Handshake: peer certificate: CN=Situla, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Feb 09 11:35:54 local bluetit[2117]: Session is ACTIVE Feb 09 11:35:54 local bluetit[2117]: EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Feb 09 11:35:54 local bluetit[2117]: EVENT: GET_CONFIG Feb 09 11:35:54 local bluetit[2117]: Sending PUSH_REQUEST to server... Feb 09 11:35:55 local bluetit[2117]: OPTIONS: Feb 09 11:35:55 local bluetit[2117]: PROTOCOL OPTIONS: Feb 09 11:35:55 local bluetit[2117]: TunPersist: reused tun context Feb 09 11:35:55 local bluetit[2117]: Connected via tun Feb 09 11:35:55 local bluetit[2117]: Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Feb 09 11:35:55 local bluetit[2117]: Client terminated, restarting in 2000 ms... Feb 09 11:35:57 local bluetit[2117]: EVENT: RECONNECTING Feb 09 11:35:57 local bluetit[2117]: ERROR: N_RECONNECT Feb 09 11:35:57 local bluetit[2117]: Contacting 213.152.161.17:443 via UDP Feb 09 11:35:57 local bluetit[2117]: EVENT: WAIT Feb 09 11:35:57 local bluetit[2117]: Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.17) via UDPv4 Feb 09 11:35:57 local bluetit[2117]: EVENT: CONNECTING Feb 09 11:35:57 local bluetit[2117]: Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Feb 09 11:35:57 local bluetit[2117]: Peer Info: Feb 09 11:35:57 local bluetit[2117]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Feb 09 11:35:57 local bluetit[2117]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Situla/emailAddress=info@airvpn.org, signature: RSA-SHA512 Feb 09 11:35:57 local bluetit[2117]: SSL Handshake: peer certificate: CN=Situla, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Feb 09 11:35:57 local bluetit[2117]: Session is ACTIVE Feb 09 11:35:57 local bluetit[2117]: EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Feb 09 11:35:57 local bluetit[2117]: EVENT: GET_CONFIG Feb 09 11:35:57 local bluetit[2117]: Sending PUSH_REQUEST to server... Feb 09 11:35:57 local bluetit[2117]: OPTIONS: Feb 09 11:35:57 local bluetit[2117]: PROTOCOL OPTIONS: Feb 09 11:35:57 local bluetit[2117]: TunPersist: reused tun context Feb 09 11:35:57 local bluetit[2117]: Connected via tun Feb 09 11:35:57 local bluetit[2117]: Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Feb 09 11:35:57 local bluetit[2117]: Client terminated, restarting in 2000 ms... Feb 09 11:35:59 local bluetit[2117]: EVENT: RECONNECTING Feb 09 11:35:59 local bluetit[2117]: ERROR: N_RECONNECT Feb 09 11:35:59 local bluetit[2117]: Contacting 213.152.161.17:443 via UDP Feb 09 11:35:59 local bluetit[2117]: EVENT: WAIT Feb 09 11:35:59 local bluetit[2117]: Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.17) via UDPv4 Feb 09 11:35:59 local bluetit[2117]: EVENT: CONNECTING Feb 09 11:35:59 local bluetit[2117]: Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Feb 09 11:35:59 local bluetit[2117]: Peer Info: Feb 09 11:35:59 local bluetit[2117]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Feb 09 11:35:59 local bluetit[2117]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Situla/emailAddress=info@airvpn.org, signature: RSA-SHA512 Feb 09 11:35:59 local bluetit[2117]: SSL Handshake: peer certificate: CN=Situla, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Feb 09 11:35:59 local bluetit[2117]: Session is ACTIVE Feb 09 11:35:59 local bluetit[2117]: EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Feb 09 11:35:59 local bluetit[2117]: EVENT: GET_CONFIG Feb 09 11:35:59 local bluetit[2117]: Sending PUSH_REQUEST to server... Feb 09 11:35:59 local bluetit[2117]: OPTIONS: Feb 09 11:35:59 local bluetit[2117]: PROTOCOL OPTIONS: Feb 09 11:35:59 local bluetit[2117]: TunPersist: reused tun context Feb 09 11:35:59 local bluetit[2117]: Connected via tun Feb 09 11:35:59 local bluetit[2117]: Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Feb 09 11:35:59 local bluetit[2117]: Client terminated, restarting in 2000 ms... Feb 09 11:36:01 local bluetit[2117]: EVENT: RECONNECTING Feb 09 11:36:01 local bluetit[2117]: ERROR: N_RECONNECT Feb 09 11:36:01 local bluetit[2117]: Contacting 213.152.161.17:443 via UDP Feb 09 11:36:01 local bluetit[2117]: EVENT: WAIT Feb 09 11:36:01 local bluetit[2117]: Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.17) via UDPv4 Feb 09 11:36:01 local bluetit[2117]: EVENT: CONNECTING Feb 09 11:36:01 local bluetit[2117]: Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Feb 09 11:36:01 local bluetit[2117]: Peer Info: Feb 09 11:36:01 local bluetit[2117]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Feb 09 11:36:01 local bluetit[2117]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Situla/emailAddress=info@airvpn.org, signature: RSA-SHA512 Feb 09 11:36:01 local bluetit[2117]: SSL Handshake: peer certificate: CN=Situla, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Feb 09 11:36:01 local bluetit[2117]: Session is ACTIVE Feb 09 11:36:01 local bluetit[2117]: EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Feb 09 11:36:01 local bluetit[2117]: EVENT: GET_CONFIG Feb 09 11:36:01 local bluetit[2117]: Sending PUSH_REQUEST to server... Feb 09 11:36:01 local bluetit[2117]: OPTIONS: Feb 09 11:36:01 local bluetit[2117]: PROTOCOL OPTIONS: Feb 09 11:36:01 local bluetit[2117]: TunPersist: reused tun context Feb 09 11:36:01 local bluetit[2117]: Connected via tun Feb 09 11:36:01 local bluetit[2117]: Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Feb 09 11:36:01 local bluetit[2117]: Client terminated, restarting in 2000 ms... Feb 09 11:36:03 local bluetit[2117]: EVENT: RECONNECTING Feb 09 11:36:03 local bluetit[2117]: ERROR: N_RECONNECT Feb 09 11:36:03 local bluetit[2117]: Contacting 213.152.161.17:443 via UDP Feb 09 11:36:03 local bluetit[2117]: EVENT: WAIT Feb 09 11:36:03 local bluetit[2117]: Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.17) via UDPv4 Feb 09 11:36:03 local bluetit[2117]: EVENT: CONNECTING Feb 09 11:36:03 local bluetit[2117]: Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Feb 09 11:36:03 local bluetit[2117]: Peer Info: Feb 09 11:36:03 local bluetit[2117]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Feb 09 11:36:03 local bluetit[2117]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Situla/emailAddress=info@airvpn.org, signature: RSA-SHA512 Feb 09 11:36:03 local bluetit[2117]: SSL Handshake: peer certificate: CN=Situla, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Feb 09 11:36:03 local bluetit[2117]: Session is ACTIVE Feb 09 11:36:03 local bluetit[2117]: EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Feb 09 11:36:03 local bluetit[2117]: EVENT: GET_CONFIG Feb 09 11:36:03 local bluetit[2117]: Sending PUSH_REQUEST to server... Feb 09 11:36:04 local bluetit[2117]: OPTIONS: Feb 09 11:36:04 local bluetit[2117]: PROTOCOL OPTIONS: Feb 09 11:36:04 local bluetit[2117]: TunPersist: reused tun context Feb 09 11:36:04 local bluetit[2117]: Connected via tun Feb 09 11:36:04 local bluetit[2117]: Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Feb 09 11:36:04 local bluetit[2117]: Client terminated, restarting in 2000 ms... Feb 09 11:36:06 local bluetit[2117]: EVENT: RECONNECTING Feb 09 11:36:06 local bluetit[2117]: ERROR: N_RECONNECT Feb 09 11:36:06 local bluetit[2117]: Contacting 213.152.161.17:443 via UDP Feb 09 11:36:06 local bluetit[2117]: EVENT: WAIT Feb 09 11:36:06 local bluetit[2117]: Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.17) via UDPv4 Feb 09 11:36:06 local bluetit[2117]: EVENT: CONNECTING Feb 09 11:36:06 local bluetit[2117]: Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Feb 09 11:36:06 local bluetit[2117]: Peer Info: Feb 09 11:36:06 local bluetit[2117]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Feb 09 11:36:06 local bluetit[2117]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Situla/emailAddress=info@airvpn.org, signature: RSA-SHA512 Feb 09 11:36:06 local bluetit[2117]: SSL Handshake: peer certificate: CN=Situla, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Feb 09 11:36:06 local bluetit[2117]: Session is ACTIVE Feb 09 11:36:06 local bluetit[2117]: EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Feb 09 11:36:06 local bluetit[2117]: EVENT: GET_CONFIG Feb 09 11:36:06 local bluetit[2117]: Sending PUSH_REQUEST to server... Feb 09 11:36:06 local bluetit[2117]: OPTIONS: Feb 09 11:36:06 local bluetit[2117]: PROTOCOL OPTIONS: Feb 09 11:36:06 local bluetit[2117]: TunPersist: reused tun context Feb 09 11:36:06 local bluetit[2117]: Connected via tun Feb 09 11:36:06 local bluetit[2117]: Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Feb 09 11:36:06 local bluetit[2117]: Client terminated, restarting in 2000 ms... Feb 09 11:36:08 local bluetit[2117]: EVENT: RECONNECTING Feb 09 11:36:08 local bluetit[2117]: ERROR: N_RECONNECT Feb 09 11:36:08 local bluetit[2117]: Contacting 213.152.161.17:443 via UDP Feb 09 11:36:08 local bluetit[2117]: EVENT: WAIT Feb 09 11:36:08 local bluetit[2117]: Connecting to [nl3.vpn.airdns.org]:443 (213.152.161.17) via UDPv4 Feb 09 11:36:08 local bluetit[2117]: EVENT: CONNECTING Feb 09 11:36:08 local bluetit[2117]: Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Feb 09 11:36:08 local bluetit[2117]: Peer Info: Feb 09 11:36:08 local bluetit[2117]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Feb 09 11:36:08 local bluetit[2117]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Situla/emailAddress=info@airvpn.org, signature: RSA-SHA512 Feb 09 11:36:08 local bluetit[2117]: SSL Handshake: peer certificate: CN=Situla, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Feb 09 11:36:08 local bluetit[2117]: Session is ACTIVE Feb 09 11:36:08 local bluetit[2117]: EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Feb 09 11:36:08 local bluetit[2117]: EVENT: GET_CONFIG Feb 09 11:36:08 local bluetit[2117]: Sending PUSH_REQUEST to server... Feb 09 11:36:08 local bluetit[2117]: OPTIONS: Feb 09 11:36:08 local bluetit[2117]: PROTOCOL OPTIONS: Feb 09 11:36:08 local bluetit[2117]: TunPersist: reused tun context Feb 09 11:36:08 local bluetit[2117]: Connected via tun Feb 09 11:36:08 local bluetit[2117]: Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Feb 09 11:36:08 local bluetit[2117]: Client terminated, restarting in 2000 ms... Feb 09 11:36:08 local bluetit[2117]: Requested method "bluetit_status -> Bluetit is connected to VPN" Feb 09 11:36:09 local bluetit[2117]: Requested method "stop_connection" Feb 09 11:36:09 local bluetit[2117]: Stopping OpenVPN3 connection thread Feb 09 11:36:09 local bluetit[2117]: Connection statistics updater thread finished Feb 09 11:36:09 local bluetit[2117]: net_route_del: 8000::/1 via fde6:7a:7d20:1a72::1 dev tun0 table 0 metric 0 Feb 09 11:36:09 local bluetit[2117]: net_route_del: ::/1 via fde6:7a:7d20:1a72::1 dev tun0 table 0 metric 0 Feb 09 11:36:09 local bluetit[2117]: net_route_del: 128.0.0.0/1 via 10.30.114.1 dev tun0 table 0 metric 0 Feb 09 11:36:09 local bluetit[2117]: net_route_del: 0.0.0.0/1 via 10.30.114.1 dev tun0 table 0 metric 0 Feb 09 11:36:09 local bluetit[2117]: net_addr_del: fde6:7a:7d20:1a72::10db/64 dev tun0 Feb 09 11:36:09 local bluetit[2117]: net_addr_del: 10.30.114.221/24 dev tun0 Feb 09 11:36:09 local bluetit[2117]: net_iface_mtu_set: mtu 1500 for tun0 Feb 09 11:36:09 local bluetit[2117]: net_iface_up: set tun0 down Feb 09 11:36:09 local bluetit[2117]: net_route_del: 213.152.161.17/32 via 192.168.178.1 dev eth0 table 0 metric 0 Feb 09 11:36:09 local bluetit[2117]: EVENT: DISCONNECTED Feb 09 11:36:09 local bluetit[2117]: Successfully restored DNS settings Feb 09 11:36:09 local bluetit[2117]: Network filter successfully restored Feb 09 11:36:09 local bluetit[2117]: OpenVPN3 connection thread finished Feb 09 11:36:09 local bluetit[2117]: OpenVPN3 connection thread successfully terminated Feb 09 11:36:09 local dbus-daemon[1308]: [system] Rejected send message, 3 matched rules; type="error", sender=":1.92" (uid=1000 pid=6911 comm="./goldcrest AirVPN_Netherlands_UDP-443-Entry3.ovpn") interface="(unset)" member="(unset)" error name="org.freedesktop.DBus.Error.UnknownMethod" requested_reply="0" destination=":1.20" (uid=0 pid=2117 comm="/sbin/bluetit ") local:~ #