Eddie System/Environment Report - 12/5/2023 - 5:28 PM UTC Eddie version: 2.21.8 Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: Arch Linux OS version: Linux LAPTOP-WHEE-LINUX 6.6.3-arch1-1 #1 SMP PREEMPT_DYNAMIC Wed, 29 Nov 2023 00:37:40 +0000 x86_64 GNU/Linux OS architecture: x64 Mono /.Net Framework: 6.12.0 (makepkg/d9a6e8710b3 Thu Aug 31 10:53:20 UTC 2023); Framework: v4.0.30319 OpenVPN: 2.6.8 - OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 (/usr/bin/openvpn) Hummingbird: Not available WireGuard: 1.0.0 SSH: OpenSSH_9.5p1, OpenSSL 3.1.4 24 Oct 2023 (/usr/bin/ssh) SSL: Not available curl: 8.4.0 (/usr/bin/curl) Profile path: /home/fin/.config/eddie/default.profile Data path: /home/fin/.config/eddie Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/eddie-ui.exe Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" Network Lock Active: No Connected to VPN: Yes, Alwaid OS support IPv4: Yes OS support IPv6: Yes Detected DNS: 10.8.150.1, fde6:7a:7d20:496::1 Test DNS IPv4: Failed Test DNS IPv6: Failed Test Ping IPv4: 316 ms Test Ping IPv6: 405 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok ---------------------------- Test HTTPS: Error: curl: (60) SSL certificate problem: unable to get local issuer certificate More details here: https://curl.se/docs/sslcerts.html curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above. ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True key: (omissis) proxy.mode: none pinger.enabled: False ---------------------------- Logs: . 2023.12.05 11:09:48 - Eddie version: 2.21.8 / linux_x64, System: Linux, Name: Arch Linux, Version: Linux LAPTOP-WHEE-LINUX 6.6.3-arch1-1 #1 SMP PREEMPT_DYNAMIC Wed, 29 Nov 2023 00:37:40 +0000 x86_64 GNU/Linux, Mono/.Net: 6.12.0 (makepkg/d9a6e8710b3 Thu Aug 31 10:53:20 UTC 2023); Framework: v4.0.30319 . 2023.12.05 11:09:48 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2023.12.05 11:09:48 - Raise system privileges . 2023.12.05 11:09:57 - Reading options from /home/fin/.config/eddie/default.profile . 2023.12.05 11:09:58 - OpenVPN - Version: 2.6.8 - OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 (/usr/bin/openvpn) . 2023.12.05 11:09:58 - SSH - Version: OpenSSH_9.5p1, OpenSSL 3.1.4 24 Oct 2023 (/usr/bin/ssh) I 2023.12.05 11:09:58 - SSL - Not available . 2023.12.05 11:09:58 - curl - Version: 8.4.0 (/usr/bin/curl) I 2023.12.05 11:09:59 - Ready . 2023.12.05 11:10:00 - Collect information about AirVPN completed I 2023.12.05 11:10:14 - Session starting. I 2023.12.05 11:10:14 - Checking authorization ... ! 2023.12.05 11:10:15 - Connecting to Chort (Canada, Toronto, Ontario) . 2023.12.05 11:10:15 - Routes, add 104.254.90.237/32 for interface "wlan0". . 2023.12.05 11:10:15 - Routes, add 104.254.90.237/32 for interface "wlan0", already exists. . 2023.12.05 11:10:15 - OpenVPN > Note: --data-cipher-fallback with cipher 'AES-256-CBC' disables data channel offload. . 2023.12.05 11:10:15 - OpenVPN > OpenVPN 2.6.8 [git:makepkg/3b0d9489cc423da3+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Nov 17 2023 . 2023.12.05 11:10:15 - OpenVPN > library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 . 2023.12.05 11:10:15 - OpenVPN > DCO version: N/A . 2023.12.05 11:10:15 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.237:443 . 2023.12.05 11:10:15 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2023.12.05 11:10:15 - OpenVPN > UDPv4 link local: (not bound) . 2023.12.05 11:10:15 - OpenVPN > UDPv4 link remote: [AF_INET]104.254.90.237:443 . 2023.12.05 11:10:15 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.237:443, sid=d431c521 be37d7ea . 2023.12.05 11:10:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.12.05 11:10:15 - OpenVPN > VERIFY KU OK . 2023.12.05 11:10:15 - OpenVPN > Validating certificate extended key usage . 2023.12.05 11:10:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.12.05 11:10:15 - OpenVPN > VERIFY EKU OK . 2023.12.05 11:10:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chort, emailAddress=info@airvpn.org . 2023.12.05 11:10:16 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 . 2023.12.05 11:10:16 - OpenVPN > [Chort] Peer Connection Initiated with [AF_INET]104.254.90.237:443 . 2023.12.05 11:10:16 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.12.05 11:10:16 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.12.05 11:10:16 - OpenVPN > SENT CONTROL [Chort]: 'PUSH_REQUEST' (status=1) . 2023.12.05 11:10:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.14.54.1,dhcp-option DNS6 fde6:7a:7d20:a36::1,tun-ipv6,route-gateway 10.14.54.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:a36::1036/64 fde6:7a:7d20:a36::1,ifconfig 10.14.54.56 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.12.05 11:10:16 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.12.05 11:10:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.14.54.1' . 2023.12.05 11:10:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:a36::1' . 2023.12.05 11:10:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.12.05 11:10:16 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.12.05 11:10:16 - OpenVPN > TUN/TAP device tun0 opened . 2023.12.05 11:10:16 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:10:16 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:10:16 - OpenVPN > net_addr_v4_add: 10.14.54.56/24 dev tun0 . 2023.12.05 11:10:16 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:10:16 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:10:16 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:a36::1036/64 dev tun0 . 2023.12.05 11:10:16 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 2, compression: 'stub' . 2023.12.05 11:10:16 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.12.05 11:10:16 - OpenVPN > Protocol options: explicit-exit-notify 5 . 2023.12.05 11:10:22 - OpenVPN > Initialization Sequence Completed . 2023.12.05 11:10:22 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.12.05 11:10:22 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.12.05 11:10:22 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.12.05 11:10:22 - Routes, add ::/1 for interface "tun0". . 2023.12.05 11:10:22 - Routes, add 8000::/1 for interface "tun0". . 2023.12.05 11:10:22 - Routes, add 104.254.90.235/32 for interface "tun0". . 2023.12.05 11:10:22 - Routes, add 2606:6080:2001:8:df6a:e365:26ff:7f06/128 for interface "tun0". . 2023.12.05 11:10:22 - Flushing DNS I 2023.12.05 11:10:22 - Checking route IPv4 I 2023.12.05 11:10:22 - Checking route IPv6 I 2023.12.05 11:10:23 - Checking DNS . 2023.12.05 11:10:30 - Checking DNS (4° try) . 2023.12.05 11:10:34 - Checking DNS (5° try) E 2023.12.05 11:10:34 - Checking DNS failed, last reason: Checking DNS failed: ! 2023.12.05 11:10:34 - Disconnecting . 2023.12.05 11:10:34 - Sending soft termination signal . 2023.12.05 11:10:34 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4) . 2023.12.05 11:10:34 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.12.05 11:10:39 - OpenVPN > Closing TUN/TAP interface . 2023.12.05 11:10:39 - OpenVPN > net_addr_v4_del: 10.14.54.56 dev tun0 . 2023.12.05 11:10:39 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:a36::1036/64 dev tun0 . 2023.12.05 11:10:39 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.12.05 11:10:39 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:10:39 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:10:39 - Routes, delete ::/1 for interface "tun0", not exists. . 2023.12.05 11:10:39 - Routes, delete 8000::/1 for interface "tun0", not exists. . 2023.12.05 11:10:39 - Routes, delete 104.254.90.237/32 for interface "wlan0". . 2023.12.05 11:10:39 - Routes, delete 104.254.90.235/32 for interface "tun0", not exists. . 2023.12.05 11:10:39 - Routes, delete 2606:6080:2001:8:df6a:e365:26ff:7f06/128 for interface "tun0", not exists. . 2023.12.05 11:10:39 - Routes, delete 104.254.90.237/32 for interface "wlan0", not exists. . 2023.12.05 11:10:39 - DNS of the system restored to original settings (Rename method) . 2023.12.05 11:10:39 - Connection terminated. . 2023.12.05 11:10:43 - Waiting for latency tests (18 to go) I 2023.12.05 11:11:02 - Cancel requested. ! 2023.12.05 11:11:02 - Session terminated. I 2023.12.05 11:11:07 - Session starting. I 2023.12.05 11:11:07 - Checking authorization ... ! 2023.12.05 11:11:08 - Connecting to Regulus (Canada, Toronto, Ontario) . 2023.12.05 11:11:08 - Routes, add 184.75.221.37/32 for interface "wlan0". . 2023.12.05 11:11:08 - Routes, add 184.75.221.37/32 for interface "wlan0", already exists. . 2023.12.05 11:11:08 - OpenVPN > Note: --data-cipher-fallback with cipher 'AES-256-CBC' disables data channel offload. . 2023.12.05 11:11:08 - OpenVPN > OpenVPN 2.6.8 [git:makepkg/3b0d9489cc423da3+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Nov 17 2023 . 2023.12.05 11:11:08 - OpenVPN > library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 . 2023.12.05 11:11:08 - OpenVPN > DCO version: N/A . 2023.12.05 11:11:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.37:443 . 2023.12.05 11:11:08 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2023.12.05 11:11:08 - OpenVPN > UDPv4 link local: (not bound) . 2023.12.05 11:11:08 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.221.37:443 . 2023.12.05 11:11:08 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.37:443, sid=731b8854 25ebc26d . 2023.12.05 11:11:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.12.05 11:11:08 - OpenVPN > VERIFY KU OK . 2023.12.05 11:11:08 - OpenVPN > Validating certificate extended key usage . 2023.12.05 11:11:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.12.05 11:11:08 - OpenVPN > VERIFY EKU OK . 2023.12.05 11:11:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Regulus, emailAddress=info@airvpn.org . 2023.12.05 11:11:08 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 . 2023.12.05 11:11:08 - OpenVPN > [Regulus] Peer Connection Initiated with [AF_INET]184.75.221.37:443 . 2023.12.05 11:11:08 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.12.05 11:11:08 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.12.05 11:11:09 - OpenVPN > SENT CONTROL [Regulus]: 'PUSH_REQUEST' (status=1) . 2023.12.05 11:11:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.22.1,dhcp-option DNS6 fde6:7a:7d20:1816::1,tun-ipv6,route-gateway 10.28.22.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1816::1040/64 fde6:7a:7d20:1816::1,ifconfig 10.28.22.66 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2023.12.05 11:11:09 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.12.05 11:11:09 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.22.1' . 2023.12.05 11:11:09 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1816::1' . 2023.12.05 11:11:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.12.05 11:11:09 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.12.05 11:11:09 - OpenVPN > TUN/TAP device tun0 opened . 2023.12.05 11:11:09 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:11:09 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:11:09 - OpenVPN > net_addr_v4_add: 10.28.22.66/24 dev tun0 . 2023.12.05 11:11:09 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:11:09 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:11:09 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:1816::1040/64 dev tun0 . 2023.12.05 11:11:09 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 5, compression: 'stub' . 2023.12.05 11:11:09 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.12.05 11:11:09 - OpenVPN > Protocol options: explicit-exit-notify 5 . 2023.12.05 11:11:15 - OpenVPN > Initialization Sequence Completed . 2023.12.05 11:11:15 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.12.05 11:11:15 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.12.05 11:11:15 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.12.05 11:11:15 - Routes, add ::/1 for interface "tun0". . 2023.12.05 11:11:15 - Routes, add 8000::/1 for interface "tun0". . 2023.12.05 11:11:15 - Routes, add 184.75.221.35/32 for interface "tun0". . 2023.12.05 11:11:15 - Routes, add 2606:6080:1001:e:2e9c:bad5:dbdd:84ea/128 for interface "tun0". . 2023.12.05 11:11:15 - Flushing DNS I 2023.12.05 11:11:15 - Checking route IPv4 I 2023.12.05 11:11:15 - Checking route IPv6 I 2023.12.05 11:11:16 - Checking DNS . 2023.12.05 11:11:23 - Checking DNS (4° try) . 2023.12.05 11:11:27 - Checking DNS (5° try) E 2023.12.05 11:11:27 - Checking DNS failed, last reason: Checking DNS failed: ! 2023.12.05 11:11:27 - Disconnecting . 2023.12.05 11:11:27 - Sending soft termination signal . 2023.12.05 11:11:27 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4) . 2023.12.05 11:11:27 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.12.05 11:11:32 - OpenVPN > Closing TUN/TAP interface . 2023.12.05 11:11:32 - OpenVPN > net_addr_v4_del: 10.28.22.66 dev tun0 . 2023.12.05 11:11:32 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:1816::1040/64 dev tun0 . 2023.12.05 11:11:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.12.05 11:11:32 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:11:32 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:11:32 - Routes, delete ::/1 for interface "tun0", not exists. . 2023.12.05 11:11:33 - Routes, delete 8000::/1 for interface "tun0", not exists. . 2023.12.05 11:11:33 - Routes, delete 184.75.221.37/32 for interface "wlan0". . 2023.12.05 11:11:33 - Routes, delete 184.75.221.35/32 for interface "tun0", not exists. . 2023.12.05 11:11:33 - Routes, delete 2606:6080:1001:e:2e9c:bad5:dbdd:84ea/128 for interface "tun0", not exists. . 2023.12.05 11:11:33 - Routes, delete 184.75.221.37/32 for interface "wlan0", not exists. . 2023.12.05 11:11:33 - DNS of the system restored to original settings (Rename method) . 2023.12.05 11:11:33 - Connection terminated. I 2023.12.05 11:11:36 - Checking authorization ... ! 2023.12.05 11:11:37 - Connecting to Lesath (Canada, Toronto, Ontario) . 2023.12.05 11:11:37 - Routes, add 184.75.221.5/32 for interface "wlan0". . 2023.12.05 11:11:37 - Routes, add 184.75.221.5/32 for interface "wlan0", already exists. . 2023.12.05 11:11:37 - OpenVPN > Note: --data-cipher-fallback with cipher 'AES-256-CBC' disables data channel offload. . 2023.12.05 11:11:37 - OpenVPN > OpenVPN 2.6.8 [git:makepkg/3b0d9489cc423da3+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Nov 17 2023 . 2023.12.05 11:11:37 - OpenVPN > library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 . 2023.12.05 11:11:37 - OpenVPN > DCO version: N/A . 2023.12.05 11:11:37 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.5:443 . 2023.12.05 11:11:37 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2023.12.05 11:11:37 - OpenVPN > UDPv4 link local: (not bound) . 2023.12.05 11:11:37 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.221.5:443 . 2023.12.05 11:11:37 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.5:443, sid=dd0a6bbd ed6eb272 . 2023.12.05 11:11:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.12.05 11:11:37 - OpenVPN > VERIFY KU OK . 2023.12.05 11:11:37 - OpenVPN > Validating certificate extended key usage . 2023.12.05 11:11:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.12.05 11:11:37 - OpenVPN > VERIFY EKU OK . 2023.12.05 11:11:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org . 2023.12.05 11:11:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 . 2023.12.05 11:11:37 - OpenVPN > [Lesath] Peer Connection Initiated with [AF_INET]184.75.221.5:443 . 2023.12.05 11:11:37 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.12.05 11:11:37 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.12.05 11:11:38 - OpenVPN > SENT CONTROL [Lesath]: 'PUSH_REQUEST' (status=1) . 2023.12.05 11:11:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.246.1,dhcp-option DNS6 fde6:7a:7d20:10f6::1,tun-ipv6,route-gateway 10.20.246.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:10f6::100e/64 fde6:7a:7d20:10f6::1,ifconfig 10.20.246.16 255.255.255.0,peer-id 10,cipher AES-256-GCM' . 2023.12.05 11:11:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.12.05 11:11:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.20.246.1' . 2023.12.05 11:11:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:10f6::1' . 2023.12.05 11:11:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.12.05 11:11:38 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.12.05 11:11:38 - OpenVPN > TUN/TAP device tun0 opened . 2023.12.05 11:11:38 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:11:38 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:11:38 - OpenVPN > net_addr_v4_add: 10.20.246.16/24 dev tun0 . 2023.12.05 11:11:38 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:11:38 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:11:38 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:10f6::100e/64 dev tun0 . 2023.12.05 11:11:38 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 10, compression: 'stub' . 2023.12.05 11:11:38 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.12.05 11:11:38 - OpenVPN > Protocol options: explicit-exit-notify 5 . 2023.12.05 11:11:43 - OpenVPN > Initialization Sequence Completed . 2023.12.05 11:11:43 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.12.05 11:11:43 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.12.05 11:11:43 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.12.05 11:11:43 - Routes, add ::/1 for interface "tun0". . 2023.12.05 11:11:43 - Routes, add 8000::/1 for interface "tun0". . 2023.12.05 11:11:43 - Routes, add 184.75.221.3/32 for interface "tun0". . 2023.12.05 11:11:43 - Routes, add 2606:6080:1001:d:c59c:6e9a:3115:6f2f/128 for interface "tun0". . 2023.12.05 11:11:43 - Flushing DNS I 2023.12.05 11:11:43 - Checking route IPv4 I 2023.12.05 11:11:44 - Checking route IPv6 I 2023.12.05 11:11:45 - Checking DNS . 2023.12.05 11:11:52 - Checking DNS (4° try) . 2023.12.05 11:11:57 - Checking DNS (5° try) E 2023.12.05 11:11:57 - Checking DNS failed, last reason: Checking DNS failed: ! 2023.12.05 11:11:57 - Disconnecting . 2023.12.05 11:11:57 - Sending soft termination signal . 2023.12.05 11:11:58 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4) . 2023.12.05 11:11:58 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.12.05 11:12:02 - OpenVPN > Closing TUN/TAP interface . 2023.12.05 11:12:02 - OpenVPN > net_addr_v4_del: 10.20.246.16 dev tun0 . 2023.12.05 11:12:02 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:10f6::100e/64 dev tun0 . 2023.12.05 11:12:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.12.05 11:12:02 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:12:02 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:12:02 - Routes, delete ::/1 for interface "tun0", not exists. . 2023.12.05 11:12:02 - Routes, delete 8000::/1 for interface "tun0", not exists. . 2023.12.05 11:12:03 - Routes, delete 184.75.221.5/32 for interface "wlan0". . 2023.12.05 11:12:03 - Routes, delete 184.75.221.3/32 for interface "tun0", not exists. . 2023.12.05 11:12:03 - Routes, delete 2606:6080:1001:d:c59c:6e9a:3115:6f2f/128 for interface "tun0", not exists. . 2023.12.05 11:12:03 - Routes, delete 184.75.221.5/32 for interface "wlan0", not exists. . 2023.12.05 11:12:03 - DNS of the system restored to original settings (Rename method) . 2023.12.05 11:12:03 - Connection terminated. I 2023.12.05 11:12:06 - Checking authorization ... ! 2023.12.05 11:12:07 - Connecting to Sargas (Canada, Toronto, Ontario) . 2023.12.05 11:12:07 - Routes, add 184.75.223.197/32 for interface "wlan0". . 2023.12.05 11:12:07 - Routes, add 184.75.223.197/32 for interface "wlan0", already exists. . 2023.12.05 11:12:07 - OpenVPN > Note: --data-cipher-fallback with cipher 'AES-256-CBC' disables data channel offload. . 2023.12.05 11:12:07 - OpenVPN > OpenVPN 2.6.8 [git:makepkg/3b0d9489cc423da3+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Nov 17 2023 . 2023.12.05 11:12:07 - OpenVPN > library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 . 2023.12.05 11:12:07 - OpenVPN > DCO version: N/A . 2023.12.05 11:12:07 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.197:443 . 2023.12.05 11:12:07 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2023.12.05 11:12:07 - OpenVPN > UDPv4 link local: (not bound) . 2023.12.05 11:12:07 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.197:443 . 2023.12.05 11:12:07 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.197:443, sid=3b54906a 5613b08f . 2023.12.05 11:12:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.12.05 11:12:07 - OpenVPN > VERIFY KU OK . 2023.12.05 11:12:07 - OpenVPN > Validating certificate extended key usage . 2023.12.05 11:12:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.12.05 11:12:07 - OpenVPN > VERIFY EKU OK . 2023.12.05 11:12:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sargas, emailAddress=info@airvpn.org . 2023.12.05 11:12:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 . 2023.12.05 11:12:07 - OpenVPN > [Sargas] Peer Connection Initiated with [AF_INET]184.75.223.197:443 . 2023.12.05 11:12:07 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.12.05 11:12:07 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.12.05 11:12:08 - OpenVPN > SENT CONTROL [Sargas]: 'PUSH_REQUEST' (status=1) . 2023.12.05 11:12:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.29.54.1,dhcp-option DNS6 fde6:7a:7d20:1936::1,tun-ipv6,route-gateway 10.29.54.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1936::1065/64 fde6:7a:7d20:1936::1,ifconfig 10.29.54.103 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2023.12.05 11:12:08 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.12.05 11:12:08 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.29.54.1' . 2023.12.05 11:12:08 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1936::1' . 2023.12.05 11:12:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.12.05 11:12:08 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.12.05 11:12:08 - OpenVPN > TUN/TAP device tun0 opened . 2023.12.05 11:12:08 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:12:08 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:12:08 - OpenVPN > net_addr_v4_add: 10.29.54.103/24 dev tun0 . 2023.12.05 11:12:08 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:12:08 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:12:08 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:1936::1065/64 dev tun0 . 2023.12.05 11:12:08 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 3, compression: 'stub' . 2023.12.05 11:12:08 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.12.05 11:12:08 - OpenVPN > Protocol options: explicit-exit-notify 5 . 2023.12.05 11:12:13 - OpenVPN > Initialization Sequence Completed . 2023.12.05 11:12:13 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.12.05 11:12:13 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.12.05 11:12:13 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.12.05 11:12:13 - Routes, add ::/1 for interface "tun0". . 2023.12.05 11:12:13 - Routes, add 8000::/1 for interface "tun0". . 2023.12.05 11:12:14 - Routes, add 184.75.223.195/32 for interface "tun0". . 2023.12.05 11:12:14 - Routes, add 2606:6080:1002:4:88e7:e893:3692:25d2/128 for interface "tun0". . 2023.12.05 11:12:14 - Flushing DNS I 2023.12.05 11:12:14 - Checking route IPv4 I 2023.12.05 11:12:14 - Checking route IPv6 I 2023.12.05 11:12:14 - Checking DNS . 2023.12.05 11:12:21 - Checking DNS (4° try) . 2023.12.05 11:12:26 - Checking DNS (5° try) E 2023.12.05 11:12:26 - Checking DNS failed, last reason: Checking DNS failed: ! 2023.12.05 11:12:26 - Disconnecting . 2023.12.05 11:12:26 - Sending soft termination signal . 2023.12.05 11:12:26 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4) . 2023.12.05 11:12:26 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.12.05 11:12:32 - OpenVPN > Closing TUN/TAP interface . 2023.12.05 11:12:32 - OpenVPN > net_addr_v4_del: 10.29.54.103 dev tun0 . 2023.12.05 11:12:32 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:1936::1065/64 dev tun0 . 2023.12.05 11:12:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.12.05 11:12:32 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:12:32 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2023.12.05 11:12:32 - Routes, delete ::/1 for interface "tun0", not exists. . 2023.12.05 11:12:32 - Routes, delete 8000::/1 for interface "tun0", not exists. . 2023.12.05 11:12:32 - Routes, delete 184.75.223.197/32 for interface "wlan0". . 2023.12.05 11:12:32 - Routes, delete 184.75.223.195/32 for interface "tun0", not exists. . 2023.12.05 11:12:32 - Routes, delete 2606:6080:1002:4:88e7:e893:3692:25d2/128 for interface "tun0", not exists. . 2023.12.05 11:12:32 - Routes, delete 184.75.223.197/32 for interface "wlan0", not exists. . 2023.12.05 11:12:32 - DNS of the system restored to original settings (Rename method) . 2023.12.05 11:12:32 - Connection terminated. I 2023.12.05 11:12:35 - Checking authorization ... ! 2023.12.05 11:12:36 - Connecting to Alwaid (Canada, Toronto, Ontario) . 2023.12.05 11:12:36 - Routes, add 184.75.221.109/32 for interface "wlan0". . 2023.12.05 11:12:36 - Routes, add 184.75.221.109/32 for interface "wlan0", already exists. . 2023.12.05 11:12:37 - OpenVPN > Note: --data-cipher-fallback with cipher 'AES-256-CBC' disables data channel offload. . 2023.12.05 11:12:37 - OpenVPN > OpenVPN 2.6.8 [git:makepkg/3b0d9489cc423da3+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Nov 17 2023 . 2023.12.05 11:12:37 - OpenVPN > library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10 . 2023.12.05 11:12:37 - OpenVPN > DCO version: N/A . 2023.12.05 11:12:37 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.109:443 . 2023.12.05 11:12:37 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2023.12.05 11:12:37 - OpenVPN > UDPv4 link local: (not bound) . 2023.12.05 11:12:37 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.221.109:443 . 2023.12.05 11:12:37 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.109:443, sid=11a2f4a0 5d4c0177 . 2023.12.05 11:12:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.12.05 11:12:37 - OpenVPN > VERIFY KU OK . 2023.12.05 11:12:37 - OpenVPN > Validating certificate extended key usage . 2023.12.05 11:12:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.12.05 11:12:37 - OpenVPN > VERIFY EKU OK . 2023.12.05 11:12:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org . 2023.12.05 11:12:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 . 2023.12.05 11:12:37 - OpenVPN > [Alwaid] Peer Connection Initiated with [AF_INET]184.75.221.109:443 . 2023.12.05 11:12:37 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.12.05 11:12:37 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.12.05 11:12:37 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.150.1,dhcp-option DNS6 fde6:7a:7d20:496::1,tun-ipv6,route-gateway 10.8.150.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:496::106f/64 fde6:7a:7d20:496::1,ifconfig 10.8.150.113 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2023.12.05 11:12:37 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.12.05 11:12:37 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.8.150.1' . 2023.12.05 11:12:37 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:496::1' . 2023.12.05 11:12:37 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.12.05 11:12:37 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.12.05 11:12:37 - OpenVPN > TUN/TAP device tun0 opened . 2023.12.05 11:12:37 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:12:37 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:12:37 - OpenVPN > net_addr_v4_add: 10.8.150.113/24 dev tun0 . 2023.12.05 11:12:37 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.12.05 11:12:37 - OpenVPN > net_iface_up: set tun0 up . 2023.12.05 11:12:37 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:496::106f/64 dev tun0 . 2023.12.05 11:12:37 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 0, compression: 'stub' . 2023.12.05 11:12:37 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.12.05 11:12:37 - OpenVPN > Protocol options: explicit-exit-notify 5 . 2023.12.05 11:12:42 - OpenVPN > Initialization Sequence Completed . 2023.12.05 11:12:42 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.12.05 11:12:42 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.12.05 11:12:43 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.12.05 11:12:43 - Routes, add ::/1 for interface "tun0". . 2023.12.05 11:12:43 - Routes, add 8000::/1 for interface "tun0". . 2023.12.05 11:12:43 - Routes, add 184.75.221.107/32 for interface "tun0". . 2023.12.05 11:12:43 - Routes, add 2606:6080:1001:30:5f94:f242:c829:1017/128 for interface "tun0". . 2023.12.05 11:12:43 - Flushing DNS I 2023.12.05 11:12:43 - Checking route IPv4 I 2023.12.05 11:12:43 - Checking route IPv6 ! 2023.12.05 11:12:44 - Connected. . 2023.12.05 11:40:05 - Collect information about AirVPN completed . 2023.12.05 12:10:11 - Collect information about AirVPN completed . 2023.12.05 12:12:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.12.05 12:12:10 - OpenVPN > VERIFY KU OK . 2023.12.05 12:12:10 - OpenVPN > Validating certificate extended key usage . 2023.12.05 12:12:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.12.05 12:12:10 - OpenVPN > VERIFY EKU OK . 2023.12.05 12:12:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alwaid, emailAddress=info@airvpn.org . 2023.12.05 12:12:10 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/1", "interface": "tun0", "scope": "link" }, { "destination": "0.0.0.0\/0", "gateway": "10.170.32.254", "interface": "wlan0", "metric": "600", "proto": "dhcp", "src": "10.170.48.128" }, { "destination": "10.8.150.0\/24", "interface": "tun0", "proto": "kernel", "scope": "link", "src": "10.8.150.113" }, { "destination": "10.170.32.254\/32", "interface": "wlan0", "metric": "600", "proto": "dhcp", "scope": "link", "src": "10.170.48.128" }, { "destination": "10.170.48.0\/24", "interface": "wlan0", "metric": "600", "proto": "kernel", "scope": "link", "src": "10.170.48.128" }, { "destination": "128.0.0.0\/1", "interface": "tun0", "scope": "link" }, { "destination": "184.75.221.107\/32", "interface": "tun0", "scope": "link" }, { "destination": "184.75.221.109\/32", "gateway": "10.170.32.254", "interface": "wlan0" }, { "destination": "2606:6080:1001:30:5f94:f242:c829:1017\/128", "interface": "tun0", "metric": "1024", "pref": "medium" }, { "destination": "::\/1", "interface": "tun0", "metric": "1024", "pref": "medium" }, { "destination": "fde6:7a:7d20:496::\/64", "interface": "tun0", "metric": "256", "pref": "medium", "proto": "kernel" }, { "destination": "fe80::\/64", "interface": "tun0", "metric": "256", "pref": "medium", "proto": "kernel" }, { "destination": "fe80::\/64", "interface": "wlan0", "metric": "1024", "pref": "medium", "proto": "kernel" }, { "destination": "8000::\/1", "interface": "tun0", "metric": "1024", "pref": "medium" } ], "ipv4-default-gateway": "10.170.32.254", "ipv4-default-interface": "wlan0", "interfaces": [ { "friendly": "lo", "id": "lo", "name": "lo", "description": "lo", "type": "Loopback", "status": "Unknown", "bytes_received": "2303281", "bytes_sent": "2303281", "support_ipv4": true, "support_ipv6": true, "ips": [ "127.0.0.1", "::1" ], "bind": true }, { "friendly": "wlan0", "id": "wlan0", "name": "wlan0", "description": "wlan0", "type": "Wireless80211", "status": "Up", "bytes_received": "553420993", "bytes_sent": "78818958", "support_ipv4": true, "support_ipv6": true, "ips": [ "10.170.48.128", "fe80::4416:177c:f75e:ea0c" ], "bind": true }, { "friendly": "tun0", "id": "tun0", "name": "tun0", "description": "tun0", "type": "0", "status": "Unknown", "bytes_received": "79859578", "bytes_sent": "14026071", "support_ipv4": true, "support_ipv6": true, "ips": [ "10.8.150.113", "fde6:7a:7d20:496::106f", "fe80::369c:ce05:937f:c0a1" ], "bind": true } ] } ---------------------------- ip addr show: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host noprefixroute valid_lft forever preferred_lft forever 2: wlan0: mtu 1500 qdisc noqueue state UP group default qlen 1000 link/ether 70:9c:d1:63:08:49 brd ff:ff:ff:ff:ff:ff inet 10.170.48.128/24 brd 10.170.48.255 scope global dynamic noprefixroute wlan0 valid_lft 23566sec preferred_lft 23566sec inet6 fe80::4416:177c:f75e:ea0c/64 scope link noprefixroute valid_lft forever preferred_lft forever 10: tun0: mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 500 link/none inet 10.8.150.113/24 scope global tun0 valid_lft forever preferred_lft forever inet6 fde6:7a:7d20:496::106f/64 scope global valid_lft forever preferred_lft forever inet6 fe80::369c:ce05:937f:c0a1/64 scope link stable-privacy proto kernel_ll valid_lft forever preferred_lft forever ---------------------------- ip link show: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: wlan0: mtu 1500 qdisc noqueue state UP mode DORMANT group default qlen 1000 link/ether 70:9c:d1:63:08:49 brd ff:ff:ff:ff:ff:ff 10: tun0: mtu 1500 qdisc fq_codel state UNKNOWN mode DEFAULT group default qlen 500 link/none