Eddie System/Environment Report - 2/18/2022 - 5:18 AM UTC Eddie version: 2.21.3beta Eddie OS build: linux_aarch64 Eddie architecture: x64 OS type: Linux OS name: Debian GNU/Linux 11 (bullseye) OS version: 11 (bullseye) OS architecture: aarch64 Mono /.Net Framework: 6.8.0.105 (Debian 6.8.0.105+dfsg-3.2 Tue Jun 29 21:11:52 UTC 2021); Framework: v4.0.30319 OpenVPN: 2.5.1 - OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 (/usr/sbin/openvpn) Hummingbird: Not available WireGuard: 1.0.0 SSH: OpenSSH_8.4p1 Debian-5, OpenSSL 1.1.1k 25 Mar 2021 (/usr/bin/ssh) SSL: stunnel 5.56 (/usr/bin/stunnel4) curl: 7.74.0 (/usr/bin/curl) Profile path: /home/jack/.config/eddie/default.profile Data path: /home/jack/.config/eddie Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/eddie-ui.exe Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" Network Lock Active: Yes, Linux nftables Connected to VPN: Yes, Luhman Detected DNS: 10.34.218.1, fde6:7a:7d20:1eda::1 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 162 ms Test Ping IPv6: 124 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True netlock: True areas.allowlist: nl netlock.allow_dns: True netlock.allowlist.incoming.ips: 192.168.1.0/24 netlock.allowlist.outgoing.ips: 192.168.1.0/24 ui.unit: bytes gui.tray_minimized: True gui.font.normal.name: Noto Sans gui.font.normal.size: 12 ---------------------------- Logs: . 2022.02.17 00:48:18 - Eddie version: 2.21.3beta / linux_aarch64, System: Linux, Name: Debian GNU/Linux 11 (bullseye), Version: 11 (bullseye), Mono/.Net: 6.8.0.105 (Debian 6.8.0.105+dfsg-3.2 Tue Jun 29 21:11:52 UTC 2021); Framework: v4.0.30319 . 2022.02.17 00:48:18 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2022.02.17 00:48:20 - Reading options from /home/jack/.config/eddie/default.profile . 2022.02.17 00:48:23 - OpenVPN - Version: 2.5.1 - OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 (/usr/sbin/openvpn) . 2022.02.17 00:48:23 - SSH - Version: OpenSSH_8.4p1 Debian-5, OpenSSL 1.1.1k 25 Mar 2021 (/usr/bin/ssh) . 2022.02.17 00:48:23 - SSL - Version: stunnel 5.56 (/usr/bin/stunnel4) . 2022.02.17 00:48:23 - curl - Version: 7.74.0 (/usr/bin/curl) ! 2022.02.17 00:48:23 - Activation of Network Lock - Linux nftables I 2022.02.17 00:48:29 - Ready . 2022.02.17 00:48:31 - Collect information about AirVPN completed I 2022.02.17 00:49:27 - Session starting. I 2022.02.17 00:49:27 - Checking authorization ... ! 2022.02.17 00:49:28 - Logged out. I 2022.02.17 00:49:28 - Checking login ... ! 2022.02.17 00:49:29 - Logged in. ! 2022.02.17 00:49:30 - Connecting to Luhman (Netherlands, Alblasserdam) . 2022.02.17 00:49:30 - Routes, add 213.152.186.170/32 for interface "eth0". . 2022.02.17 00:49:30 - Routes, add 213.152.186.170/32 for interface "eth0", already exists. . 2022.02.17 00:49:30 - OpenVPN > OpenVPN 2.5.1 aarch64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021 . 2022.02.17 00:49:30 - OpenVPN > library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 . 2022.02.17 00:49:30 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.17 00:49:30 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.17 00:49:30 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.17 00:49:30 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.17 00:49:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.186.170:443 . 2022.02.17 00:49:30 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.02.17 00:49:30 - OpenVPN > UDP link local: (not bound) . 2022.02.17 00:49:30 - OpenVPN > UDP link remote: [AF_INET]213.152.186.170:443 . 2022.02.17 00:49:30 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.186.170:443, sid=c09693d1 d61d2a52 . 2022.02.17 00:49:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 00:49:30 - OpenVPN > VERIFY KU OK . 2022.02.17 00:49:30 - OpenVPN > Validating certificate extended key usage . 2022.02.17 00:49:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 00:49:30 - OpenVPN > VERIFY EKU OK . 2022.02.17 00:49:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 00:49:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 00:49:31 - OpenVPN > [Luhman] Peer Connection Initiated with [AF_INET]213.152.186.170:443 . 2022.02.17 00:49:31 - OpenVPN > SENT CONTROL [Luhman]: 'PUSH_REQUEST' (status=1) . 2022.02.17 00:49:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.34.218.1,dhcp-option DNS6 fde6:7a:7d20:1eda::1,tun-ipv6,route-gateway 10.34.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1eda::100e/64 fde6:7a:7d20:1eda::1,ifconfig 10.34.218.16 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.02.17 00:49:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.02.17 00:49:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.34.218.1' . 2022.02.17 00:49:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1eda::1' . 2022.02.17 00:49:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.02.17 00:49:31 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.02.17 00:49:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.02.17 00:49:31 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.02.17 00:49:31 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.02.17 00:49:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.02.17 00:49:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.02.17 00:49:31 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.02.17 00:49:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 00:49:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 00:49:31 - OpenVPN > TUN/TAP device tun0 opened . 2022.02.17 00:49:32 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.02.17 00:49:32 - OpenVPN > net_iface_up: set tun0 up . 2022.02.17 00:49:32 - OpenVPN > net_addr_v4_add: 10.34.218.16/24 dev tun0 . 2022.02.17 00:49:32 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.02.17 00:49:32 - OpenVPN > net_iface_up: set tun0 up . 2022.02.17 00:49:32 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:1eda::100e/64 dev tun0 . 2022.02.17 00:49:36 - OpenVPN > Initialization Sequence Completed . 2022.02.17 00:49:36 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2022.02.17 00:49:36 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.02.17 00:49:36 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.02.17 00:49:36 - Routes, add ::/1 for interface "tun0". . 2022.02.17 00:49:37 - Routes, add 8000::/1 for interface "tun0". . 2022.02.17 00:49:37 - Routes, add 213.152.186.168/32 for interface "tun0". . 2022.02.17 00:49:37 - Routes, add 2a00:1678:1337:2429:4c19:55f8:dbef:d67e/128 for interface "tun0". . 2022.02.17 00:49:37 - Flushing DNS I 2022.02.17 00:49:37 - Checking route IPv4 I 2022.02.17 00:49:38 - Checking route IPv6 I 2022.02.17 00:49:39 - Checking DNS ! 2022.02.17 00:49:40 - Connected. . 2022.02.17 01:18:40 - Collect information about AirVPN completed E 2022.02.17 01:18:40 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 01:18:40 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 01:18:40 - ^^^^ . 2022.02.17 01:44:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 01:44:33 - OpenVPN > VERIFY KU OK . 2022.02.17 01:44:33 - OpenVPN > Validating certificate extended key usage . 2022.02.17 01:44:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 01:44:33 - OpenVPN > VERIFY EKU OK . 2022.02.17 01:44:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 01:44:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 01:44:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 01:44:33 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 01:48:49 - Collect information about AirVPN completed E 2022.02.17 01:48:50 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 01:48:50 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 01:48:50 - ^^^^ . 2022.02.17 02:18:49 - Collect information about AirVPN completed E 2022.02.17 02:18:50 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 02:18:50 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 02:18:50 - ^^^^ . 2022.02.17 02:39:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 02:39:35 - OpenVPN > VERIFY KU OK . 2022.02.17 02:39:35 - OpenVPN > Validating certificate extended key usage . 2022.02.17 02:39:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 02:39:35 - OpenVPN > VERIFY EKU OK . 2022.02.17 02:39:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 02:39:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 02:39:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 02:39:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 02:48:49 - Collect information about AirVPN completed E 2022.02.17 02:48:50 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 02:48:50 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 02:48:50 - ^^^^ . 2022.02.17 03:18:58 - Collect information about AirVPN completed E 2022.02.17 03:18:59 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 03:18:59 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 03:18:59 - ^^^^ . 2022.02.17 03:34:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 03:34:37 - OpenVPN > VERIFY KU OK . 2022.02.17 03:34:37 - OpenVPN > Validating certificate extended key usage . 2022.02.17 03:34:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 03:34:37 - OpenVPN > VERIFY EKU OK . 2022.02.17 03:34:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 03:34:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 03:34:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 03:34:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 03:49:05 - Collect information about AirVPN completed E 2022.02.17 03:49:06 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 03:49:06 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 03:49:06 - ^^^^ . 2022.02.17 04:19:11 - Collect information about AirVPN completed E 2022.02.17 04:19:11 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 04:19:11 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 04:19:11 - ^^^^ . 2022.02.17 04:29:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 04:29:39 - OpenVPN > VERIFY KU OK . 2022.02.17 04:29:39 - OpenVPN > Validating certificate extended key usage . 2022.02.17 04:29:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 04:29:39 - OpenVPN > VERIFY EKU OK . 2022.02.17 04:29:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 04:29:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 04:29:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 04:29:39 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 04:49:16 - Collect information about AirVPN completed E 2022.02.17 04:49:17 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 04:49:17 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 04:49:17 - ^^^^ . 2022.02.17 05:19:22 - Collect information about AirVPN completed E 2022.02.17 05:19:22 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 05:19:22 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 05:19:22 - ^^^^ . 2022.02.17 05:24:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 05:24:41 - OpenVPN > VERIFY KU OK . 2022.02.17 05:24:41 - OpenVPN > Validating certificate extended key usage . 2022.02.17 05:24:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 05:24:41 - OpenVPN > VERIFY EKU OK . 2022.02.17 05:24:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 05:24:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 05:24:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 05:24:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 05:49:27 - Collect information about AirVPN completed E 2022.02.17 05:49:27 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 05:49:27 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 05:49:27 - ^^^^ . 2022.02.17 06:19:32 - Collect information about AirVPN completed E 2022.02.17 06:19:33 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 06:19:33 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 06:19:33 - ^^^^ . 2022.02.17 06:19:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 06:19:43 - OpenVPN > VERIFY KU OK . 2022.02.17 06:19:43 - OpenVPN > Validating certificate extended key usage . 2022.02.17 06:19:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 06:19:43 - OpenVPN > VERIFY EKU OK . 2022.02.17 06:19:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 06:19:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 06:19:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 06:19:43 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 06:49:37 - Collect information about AirVPN completed E 2022.02.17 06:49:38 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 06:49:38 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 06:49:38 - ^^^^ . 2022.02.17 07:14:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 07:14:45 - OpenVPN > VERIFY KU OK . 2022.02.17 07:14:45 - OpenVPN > Validating certificate extended key usage . 2022.02.17 07:14:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 07:14:45 - OpenVPN > VERIFY EKU OK . 2022.02.17 07:14:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 07:14:45 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 07:14:45 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 07:14:45 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 07:19:42 - Collect information about AirVPN completed E 2022.02.17 07:19:43 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 07:19:43 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 07:19:43 - ^^^^ . 2022.02.17 07:49:48 - Collect information about AirVPN completed E 2022.02.17 07:49:49 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 07:49:49 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 07:49:49 - ^^^^ . 2022.02.17 08:09:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 08:09:47 - OpenVPN > VERIFY KU OK . 2022.02.17 08:09:47 - OpenVPN > Validating certificate extended key usage . 2022.02.17 08:09:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 08:09:47 - OpenVPN > VERIFY EKU OK . 2022.02.17 08:09:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 08:09:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 08:09:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 08:09:48 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 08:19:53 - Collect information about AirVPN completed E 2022.02.17 08:19:54 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 08:19:54 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 08:19:54 - ^^^^ . 2022.02.17 08:49:59 - Collect information about AirVPN completed E 2022.02.17 08:49:59 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 08:49:59 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 08:49:59 - ^^^^ . 2022.02.17 09:04:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 09:04:50 - OpenVPN > VERIFY KU OK . 2022.02.17 09:04:50 - OpenVPN > Validating certificate extended key usage . 2022.02.17 09:04:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 09:04:50 - OpenVPN > VERIFY EKU OK . 2022.02.17 09:04:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 09:04:50 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 09:04:50 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 09:04:50 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 09:20:05 - Collect information about AirVPN completed E 2022.02.17 09:20:05 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 09:20:05 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 09:20:05 - ^^^^ . 2022.02.17 09:50:12 - Collect information about AirVPN completed E 2022.02.17 09:50:12 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 09:50:12 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 09:50:12 - ^^^^ . 2022.02.17 09:59:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 09:59:52 - OpenVPN > VERIFY KU OK . 2022.02.17 09:59:52 - OpenVPN > Validating certificate extended key usage . 2022.02.17 09:59:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 09:59:52 - OpenVPN > VERIFY EKU OK . 2022.02.17 09:59:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 09:59:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 09:59:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 09:59:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 10:20:17 - Collect information about AirVPN completed E 2022.02.17 10:20:18 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 10:20:18 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 10:20:18 - ^^^^ . 2022.02.17 10:50:23 - Collect information about AirVPN completed E 2022.02.17 10:50:23 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 10:50:23 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 10:50:23 - ^^^^ . 2022.02.17 10:54:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 10:54:54 - OpenVPN > VERIFY KU OK . 2022.02.17 10:54:54 - OpenVPN > Validating certificate extended key usage . 2022.02.17 10:54:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 10:54:54 - OpenVPN > VERIFY EKU OK . 2022.02.17 10:54:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 10:54:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 10:54:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 10:54:54 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 11:20:30 - Collect information about AirVPN completed E 2022.02.17 11:20:30 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 11:20:30 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 11:20:30 - ^^^^ . 2022.02.17 11:49:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 11:49:56 - OpenVPN > VERIFY KU OK . 2022.02.17 11:49:56 - OpenVPN > Validating certificate extended key usage . 2022.02.17 11:49:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 11:49:56 - OpenVPN > VERIFY EKU OK . 2022.02.17 11:49:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 11:49:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 11:49:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 11:49:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 11:50:35 - Collect information about AirVPN completed E 2022.02.17 11:50:35 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 11:50:35 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 11:50:35 - ^^^^ . 2022.02.17 12:20:40 - Collect information about AirVPN completed E 2022.02.17 12:20:41 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 12:20:41 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 12:20:41 - ^^^^ . 2022.02.17 12:44:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 12:44:58 - OpenVPN > VERIFY KU OK . 2022.02.17 12:44:58 - OpenVPN > Validating certificate extended key usage . 2022.02.17 12:44:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 12:44:58 - OpenVPN > VERIFY EKU OK . 2022.02.17 12:44:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 12:44:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 12:44:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 12:44:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 12:50:46 - Collect information about AirVPN completed E 2022.02.17 12:50:46 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 12:50:46 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 12:50:46 - ^^^^ . 2022.02.17 13:20:51 - Collect information about AirVPN completed E 2022.02.17 13:20:52 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 13:20:52 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 13:20:52 - ^^^^ . 2022.02.17 13:40:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 13:40:00 - OpenVPN > VERIFY KU OK . 2022.02.17 13:40:00 - OpenVPN > Validating certificate extended key usage . 2022.02.17 13:40:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 13:40:00 - OpenVPN > VERIFY EKU OK . 2022.02.17 13:40:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 13:40:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 13:40:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 13:40:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 13:50:56 - Collect information about AirVPN completed E 2022.02.17 13:50:57 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 13:50:57 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 13:50:57 - ^^^^ . 2022.02.17 14:21:02 - Collect information about AirVPN completed E 2022.02.17 14:21:02 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 14:21:02 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 14:21:02 - ^^^^ . 2022.02.17 14:35:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 14:35:03 - OpenVPN > VERIFY KU OK . 2022.02.17 14:35:03 - OpenVPN > Validating certificate extended key usage . 2022.02.17 14:35:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 14:35:03 - OpenVPN > VERIFY EKU OK . 2022.02.17 14:35:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 14:35:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 14:35:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 14:35:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 14:51:07 - Collect information about AirVPN completed E 2022.02.17 14:51:08 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 14:51:08 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 14:51:08 - ^^^^ . 2022.02.17 15:21:13 - Collect information about AirVPN completed E 2022.02.17 15:21:13 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 15:21:13 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 15:21:13 - ^^^^ . 2022.02.17 15:30:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 15:30:05 - OpenVPN > VERIFY KU OK . 2022.02.17 15:30:05 - OpenVPN > Validating certificate extended key usage . 2022.02.17 15:30:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 15:30:06 - OpenVPN > VERIFY EKU OK . 2022.02.17 15:30:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 15:30:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 15:30:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 15:30:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 15:51:19 - Collect information about AirVPN completed E 2022.02.17 15:51:19 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 15:51:19 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 15:51:19 - ^^^^ . 2022.02.17 16:21:24 - Collect information about AirVPN completed E 2022.02.17 16:21:25 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 16:21:25 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 16:21:25 - ^^^^ . 2022.02.17 16:25:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 16:25:08 - OpenVPN > VERIFY KU OK . 2022.02.17 16:25:08 - OpenVPN > Validating certificate extended key usage . 2022.02.17 16:25:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 16:25:08 - OpenVPN > VERIFY EKU OK . 2022.02.17 16:25:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 16:25:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 16:25:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 16:25:08 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 16:51:30 - Collect information about AirVPN completed E 2022.02.17 16:51:30 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 16:51:30 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 16:51:30 - ^^^^ . 2022.02.17 17:20:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 17:20:10 - OpenVPN > VERIFY KU OK . 2022.02.17 17:20:10 - OpenVPN > Validating certificate extended key usage . 2022.02.17 17:20:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 17:20:10 - OpenVPN > VERIFY EKU OK . 2022.02.17 17:20:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 17:20:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 17:20:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 17:20:10 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 17:21:36 - Collect information about AirVPN completed E 2022.02.17 17:21:37 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 17:21:37 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 17:21:37 - ^^^^ . 2022.02.17 17:51:42 - Collect information about AirVPN completed E 2022.02.17 17:51:43 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 17:51:43 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 17:51:43 - ^^^^ . 2022.02.17 18:15:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 18:15:12 - OpenVPN > VERIFY KU OK . 2022.02.17 18:15:12 - OpenVPN > Validating certificate extended key usage . 2022.02.17 18:15:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 18:15:12 - OpenVPN > VERIFY EKU OK . 2022.02.17 18:15:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 18:15:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 18:15:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 18:15:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 18:21:48 - Collect information about AirVPN completed E 2022.02.17 18:21:48 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 18:21:48 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 18:21:48 - ^^^^ . 2022.02.17 18:51:53 - Collect information about AirVPN completed E 2022.02.17 18:51:54 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 18:51:54 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 18:51:54 - ^^^^ . 2022.02.17 19:10:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 19:10:15 - OpenVPN > VERIFY KU OK . 2022.02.17 19:10:15 - OpenVPN > Validating certificate extended key usage . 2022.02.17 19:10:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 19:10:15 - OpenVPN > VERIFY EKU OK . 2022.02.17 19:10:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 19:10:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 19:10:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 19:10:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 19:21:59 - Collect information about AirVPN completed E 2022.02.17 19:21:59 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 19:21:59 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 19:21:59 - ^^^^ . 2022.02.17 19:52:04 - Collect information about AirVPN completed E 2022.02.17 19:52:05 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 19:52:05 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 19:52:05 - ^^^^ . 2022.02.17 20:05:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 20:05:17 - OpenVPN > VERIFY KU OK . 2022.02.17 20:05:17 - OpenVPN > Validating certificate extended key usage . 2022.02.17 20:05:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 20:05:17 - OpenVPN > VERIFY EKU OK . 2022.02.17 20:05:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 20:05:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 20:05:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 20:05:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 20:22:10 - Collect information about AirVPN completed E 2022.02.17 20:22:11 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 20:22:11 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 20:22:11 - ^^^^ . 2022.02.17 20:52:18 - Collect information about AirVPN completed E 2022.02.17 20:52:18 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 20:52:18 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 20:52:18 - ^^^^ . 2022.02.17 21:00:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 21:00:20 - OpenVPN > VERIFY KU OK . 2022.02.17 21:00:20 - OpenVPN > Validating certificate extended key usage . 2022.02.17 21:00:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 21:00:20 - OpenVPN > VERIFY EKU OK . 2022.02.17 21:00:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 21:00:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 21:00:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 21:00:22 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 21:22:23 - Collect information about AirVPN completed E 2022.02.17 21:22:24 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 21:22:24 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 21:22:24 - ^^^^ . 2022.02.17 21:52:28 - Collect information about AirVPN completed E 2022.02.17 21:52:29 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 21:52:29 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 21:52:29 - ^^^^ . 2022.02.17 21:55:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 21:55:25 - OpenVPN > VERIFY KU OK . 2022.02.17 21:55:25 - OpenVPN > Validating certificate extended key usage . 2022.02.17 21:55:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 21:55:25 - OpenVPN > VERIFY EKU OK . 2022.02.17 21:55:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 21:55:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 21:55:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 21:55:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 22:22:35 - Collect information about AirVPN completed E 2022.02.17 22:22:36 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 22:22:36 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 22:22:36 - ^^^^ . 2022.02.17 22:50:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.17 22:50:27 - OpenVPN > VERIFY KU OK . 2022.02.17 22:50:27 - OpenVPN > Validating certificate extended key usage . 2022.02.17 22:50:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.17 22:50:27 - OpenVPN > VERIFY EKU OK . 2022.02.17 22:50:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Luhman, emailAddress=info@airvpn.org . 2022.02.17 22:50:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 22:50:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.17 22:50:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.17 22:52:42 - Collect information about AirVPN completed E 2022.02.17 22:52:42 - Exception: nft issue: exit:1; err:Error: syntax error, unexpected rule, expecting string E 2022.02.17 22:52:42 - del rule ip filter OUTPUT ip daddr 192.168.1.1 counter accept E 2022.02.17 22:52:42 - ^^^^ . 2022.02.17 22:58:55 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #53337 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2022.02.17 23:01:36 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #671993 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings . 2022.02.17 23:01:36 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #671994 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "destination": "0.0.0.0\/1", "interface": "tun0", "scope": "link" }, { "destination": "0.0.0.0\/0", "gateway": "192.168.1.1", "interface": "eth0", "metric": "202", "proto": "dhcp", "src": "192.168.1.30" }, { "destination": "10.34.218.0\/24", "interface": "tun0", "proto": "kernel", "scope": "link", "src": "10.34.218.16" }, { "destination": "128.0.0.0\/1", "interface": "tun0", "scope": "link" }, { "destination": "192.168.1.0\/24", "interface": "eth0", "metric": "202", "proto": "dhcp", "scope": "link", "src": "192.168.1.30" }, { "destination": "213.152.186.168\/32", "interface": "tun0", "scope": "link" }, { "destination": "213.152.186.170\/32", "gateway": "192.168.1.1", "interface": "eth0" }, { "destination": "::1\/128", "interface": "lo", "metric": "256", "pref": "medium", "proto": "kernel" }, { "destination": "2a00:1678:1337:2429:4c19:55f8:dbef:d67e\/128", "interface": "tun0", "metric": "1024", "pref": "medium" }, { "destination": "::\/1", "interface": "tun0", "metric": "1024", "pref": "medium" }, { "destination": "fde6:7a:7d20:1eda::\/64", "interface": "tun0", "metric": "256", "pref": "medium", "proto": "kernel" }, { "destination": "fe80::\/64", "interface": "eth0", "metric": "100", "pref": "medium", "proto": "kernel" }, { "destination": "fe80::\/64", "interface": "tun0", "metric": "256", "pref": "medium", "proto": "kernel" }, { "destination": "8000::\/1", "interface": "tun0", "metric": "1024", "pref": "medium" } ], "ipv4-default-gateway": "192.168.1.1", "ipv4-default-interface": "eth0", "interfaces": [ { "friendly": "lo", "id": "lo", "name": "lo", "description": "lo", "type": "Loopback", "status": "Unknown", "bytes_received": "79261918", "bytes_sent": "79261918", "support_ipv4": true, "support_ipv6": true, "ips": [ "127.0.0.1", "::1" ], "bind": true }, { "friendly": "eth0", "id": "eth0", "name": "eth0", "description": "eth0", "type": "Ethernet", "status": "Up", "bytes_received": "32804122648", "bytes_sent": "37112648114", "support_ipv4": true, "support_ipv6": true, "ips": [ "192.168.1.30", "fe80::2a91:7e1e:b228:62c5" ], "bind": true }, { "friendly": "wlan0", "id": "wlan0", "name": "wlan0", "description": "wlan0", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "tun0", "id": "tun0", "name": "tun0", "description": "tun0", "type": "0", "status": "Unknown", "bytes_received": "30316844957", "bytes_sent": "2322934664", "support_ipv4": true, "support_ipv6": true, "ips": [ "10.34.218.16", "fde6:7a:7d20:1eda::100e", "fe80::1035:50c4:6abb:3eb5" ], "bind": true } ] } ---------------------------- ip addr show: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: eth0: mtu 1500 qdisc mq state UP group default qlen 1000 link/ether e4:5f:01:66:dc:04 brd ff:ff:ff:ff:ff:ff inet 192.168.1.30/24 brd 192.168.1.255 scope global dynamic noprefixroute eth0 valid_lft 79517sec preferred_lft 65880sec inet6 fe80::2a91:7e1e:b228:62c5/64 scope link noprefixroute valid_lft forever preferred_lft forever 3: wlan0: mtu 1500 qdisc pfifo_fast state DOWN group default qlen 1000 link/ether 82:41:79:b6:be:97 brd ff:ff:ff:ff:ff:ff permaddr e4:5f:01:66:dc:05 4: tun0: mtu 1500 qdisc pfifo_fast state UNKNOWN group default qlen 500 link/none inet 10.34.218.16/24 scope global tun0 valid_lft forever preferred_lft forever inet6 fde6:7a:7d20:1eda::100e/64 scope global valid_lft forever preferred_lft forever inet6 fe80::1035:50c4:6abb:3eb5/64 scope link stable-privacy valid_lft forever preferred_lft forever ---------------------------- ip link show: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000 link/ether e4:5f:01:66:dc:04 brd ff:ff:ff:ff:ff:ff 3: wlan0: mtu 1500 qdisc pfifo_fast state DOWN mode DEFAULT group default qlen 1000 link/ether 82:41:79:b6:be:97 brd ff:ff:ff:ff:ff:ff permaddr e4:5f:01:66:dc:05 4: tun0: mtu 1500 qdisc pfifo_fast state UNKNOWN mode DEFAULT group default qlen 500 link/none