Eddie System/Environment Report - 1/16/2024 - 9:59 PM UTC Eddie version: 2.21.8 Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: Linux Lite 6.0 OS version: 22.04.3 LTS (Jammy Jellyfish) OS architecture: x64 Mono /.Net Framework: 6.8.0.105 (Debian 6.8.0.105+dfsg-3.2 Wed Jun 30 05:34:49 UTC 2021); Framework: v4.0.30319 OpenVPN: 2.5.9 - OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 (/usr/sbin/openvpn) Hummingbird: Not available WireGuard: 1.0.0 SSH: OpenSSH_8.9p1 Ubuntu-3ubuntu0.6, OpenSSL 3.0.2 15 Mar 2022 (/usr/bin/ssh) SSL: Initializing (/usr/bin/stunnel4) curl: 7.81.0 (/usr/bin/curl) Profile path: /home/user/.config/eddie/default.profile Data path: /home/user/.config/eddie Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/eddie-ui.exe Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" Network Lock Active: Yes, Linux iptables-legacy Connected to VPN: Yes, Metallah OS support IPv4: Yes OS support IPv6: No Detected DNS: 10.22.150.1 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 137 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: curl: (7) Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True connect: True netlock: True areas.allowlist: us areas.denylist: ch,de,ca,se,ro,gb,jp,nl,ua,at,rs,ee,sg,bg,no,be,cz,es,nz,lv,br,ie proxy.mode: none pinger.enabled: False ui.skip.promotional: True gui.start_minimized: True ---------------------------- Logs: . 2024.01.15 17:38:49 - Eddie version: 2.21.8 / linux_x64, System: Linux, Name: Linux Lite 6.0, Version: 22.04.3 LTS (Jammy Jellyfish), Mono/.Net: 6.8.0.105 (Debian 6.8.0.105+dfsg-3.2 Wed Jun 30 05:34:49 UTC 2021); Framework: v4.0.30319 . 2024.01.15 17:38:49 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2024.01.15 17:38:51 - Reading options from /home/user/.config/eddie/default.profile . 2024.01.15 17:38:52 - OpenVPN - Version: 2.5.9 - OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 (/usr/sbin/openvpn) . 2024.01.15 17:38:52 - SSH - Version: OpenSSH_8.9p1 Ubuntu-3ubuntu0.6, OpenSSL 3.0.2 15 Mar 2022 (/usr/bin/ssh) . 2024.01.15 17:38:52 - SSL - Version: Initializing (/usr/bin/stunnel4) . 2024.01.15 17:38:52 - curl - Version: 7.81.0 (/usr/bin/curl) . 2024.01.15 17:38:52 - DNS of the system restored to original settings (Rename method) . 2024.01.15 17:38:52 - Recovery. Unexpected crash? ! 2024.01.15 17:38:52 - Deactivation of Network Lock ! 2024.01.15 17:38:53 - Activation of Network Lock - Linux iptables-legacy I 2024.01.15 17:38:54 - Ready . 2024.01.15 17:38:56 - Collect information about AirVPN completed I 2024.01.15 17:39:04 - Session starting. I 2024.01.15 17:39:04 - Checking authorization ... . 2024.01.15 17:39:04 - IPv6 disabled on network adapter (default) . 2024.01.15 17:39:04 - IPv6 disabled on network adapter (enp0s3) ! 2024.01.15 17:39:04 - Connecting to Metallah (United States of America, Pennsylvania) . 2024.01.15 17:39:04 - Routes, add 156.96.151.134/32 for interface "enp0s3". . 2024.01.15 17:39:04 - Routes, add 156.96.151.134/32 for interface "enp0s3", already exists. . 2024.01.15 17:39:05 - OpenVPN > OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.01.15 17:39:05 - OpenVPN > library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.01.15 17:39:05 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.15 17:39:05 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.15 17:39:05 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.15 17:39:05 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.15 17:39:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]156.96.151.134:443 . 2024.01.15 17:39:05 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.01.15 17:39:05 - OpenVPN > UDP link local: (not bound) . 2024.01.15 17:39:05 - OpenVPN > UDP link remote: [AF_INET]156.96.151.134:443 . 2024.01.15 17:39:05 - OpenVPN > TLS: Initial packet from [AF_INET]156.96.151.134:443, sid=65ab7dbc 576dcc2b . 2024.01.15 17:39:05 - Collect information about AirVPN completed . 2024.01.15 17:39:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.15 17:39:05 - OpenVPN > VERIFY KU OK . 2024.01.15 17:39:05 - OpenVPN > Validating certificate extended key usage . 2024.01.15 17:39:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.15 17:39:05 - OpenVPN > VERIFY EKU OK . 2024.01.15 17:39:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Metallah, emailAddress=info@airvpn.org . 2024.01.15 17:39:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.15 17:39:05 - OpenVPN > [Metallah] Peer Connection Initiated with [AF_INET]156.96.151.134:443 . 2024.01.15 17:39:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.22.150.1,route-gateway 10.22.150.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.22.150.20 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2024.01.15 17:39:05 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp' . 2024.01.15 17:39:05 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.150.1' . 2024.01.15 17:39:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.15 17:39:05 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.15 17:39:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.15 17:39:05 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.15 17:39:05 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.15 17:39:05 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.15 17:39:05 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.15 17:39:05 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.15 17:39:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.15 17:39:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.15 17:39:05 - OpenVPN > TUN/TAP device tun0 opened . 2024.01.15 17:39:05 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2024.01.15 17:39:05 - OpenVPN > net_iface_up: set tun0 up . 2024.01.15 17:39:05 - OpenVPN > net_addr_v4_add: 10.22.150.20/24 dev tun0 . 2024.01.15 17:39:10 - OpenVPN > Initialization Sequence Completed . 2024.01.15 17:39:10 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2024.01.15 17:39:10 - Routes, add 0.0.0.0/1 for interface "tun0". . 2024.01.15 17:39:11 - Routes, add 128.0.0.0/1 for interface "tun0". . 2024.01.15 17:39:11 - Routes, add 156.96.151.132/32 for interface "tun0". . 2024.01.15 17:39:11 - Flushing DNS I 2024.01.15 17:39:11 - Checking route IPv4 I 2024.01.15 17:39:11 - Checking DNS ! 2024.01.15 17:39:12 - Connected. . 2024.01.15 18:09:05 - Collect information about AirVPN completed . 2024.01.15 18:33:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.15 18:33:13 - OpenVPN > VERIFY KU OK . 2024.01.15 18:33:13 - OpenVPN > Validating certificate extended key usage . 2024.01.15 18:33:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.15 18:33:13 - OpenVPN > VERIFY EKU OK . 2024.01.15 18:33:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Metallah, emailAddress=info@airvpn.org . 2024.01.15 18:33:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.15 18:33:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.15 18:33:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.15 18:39:09 - Collect information about AirVPN completed . 2024.01.15 19:09:12 - Collect information about AirVPN completed . 2024.01.15 19:27:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.15 19:27:21 - OpenVPN > VERIFY KU OK . 2024.01.15 19:27:21 - OpenVPN > Validating certificate extended key usage . 2024.01.15 19:27:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.15 19:27:21 - OpenVPN > VERIFY EKU OK . 2024.01.15 19:27:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Metallah, emailAddress=info@airvpn.org . 2024.01.15 19:27:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.15 19:27:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.15 19:27:21 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.15 19:39:16 - Collect information about AirVPN completed . 2024.01.16 01:19:27 - OpenVPN > [Metallah] Inactivity timeout (--ping-restart), restarting . 2024.01.16 01:19:27 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2024.01.16 01:19:27 - OpenVPN > Restart pause, 5 second(s) ! 2024.01.16 01:19:27 - Disconnecting . 2024.01.16 01:19:27 - Sending soft termination signal . 2024.01.16 01:19:27 - OpenVPN > Closing TUN/TAP interface . 2024.01.16 01:19:27 - OpenVPN > net_addr_v4_del: 10.22.150.20 dev tun0 . 2024.01.16 01:19:27 - OpenVPN > SIGINT[hard,init_instance] received, process exiting . 2024.01.16 01:19:28 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2024.01.16 01:19:28 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2024.01.16 01:19:28 - Routes, delete 156.96.151.134/32 for interface "enp0s3", not exists. . 2024.01.16 01:19:28 - Routes, delete 156.96.151.132/32 for interface "tun0", not exists. . 2024.01.16 01:19:28 - Routes, delete 156.96.151.134/32 for interface "enp0s3", not exists. . 2024.01.16 01:19:28 - IPv6 restored on network adapter (default) . 2024.01.16 01:19:28 - IPv6 restored on network adapter (enp0s3) . 2024.01.16 01:19:28 - DNS of the system restored to original settings (Rename method) . 2024.01.16 01:19:28 - Connection terminated. I 2024.01.16 01:19:31 - Checking authorization ... . 2024.01.16 01:19:32 - IPv6 disabled on network adapter (default) . 2024.01.16 01:19:32 - IPv6 disabled on network adapter (enp0s3) ! 2024.01.16 01:19:32 - Connecting to Metallah (United States of America, Pennsylvania) . 2024.01.16 01:19:32 - Routes, add 156.96.151.134/32 for interface "enp0s3". . 2024.01.16 01:19:32 - Routes, add 156.96.151.134/32 for interface "enp0s3", already exists. . 2024.01.16 01:19:32 - OpenVPN > OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.01.16 01:19:32 - OpenVPN > library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.01.16 01:19:32 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.16 01:19:32 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.16 01:19:32 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.16 01:19:32 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.16 01:19:32 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]156.96.151.134:443 . 2024.01.16 01:19:32 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.01.16 01:19:32 - OpenVPN > UDP link local: (not bound) . 2024.01.16 01:19:32 - OpenVPN > UDP link remote: [AF_INET]156.96.151.134:443 . 2024.01.16 01:19:32 - OpenVPN > TLS: Initial packet from [AF_INET]156.96.151.134:443, sid=dc58233f d03a035f . 2024.01.16 01:19:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.16 01:19:32 - OpenVPN > VERIFY KU OK . 2024.01.16 01:19:32 - OpenVPN > Validating certificate extended key usage . 2024.01.16 01:19:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.16 01:19:32 - OpenVPN > VERIFY EKU OK . 2024.01.16 01:19:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Metallah, emailAddress=info@airvpn.org . 2024.01.16 01:19:32 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.16 01:19:32 - OpenVPN > [Metallah] Peer Connection Initiated with [AF_INET]156.96.151.134:443 . 2024.01.16 01:19:33 - OpenVPN > SENT CONTROL [Metallah]: 'PUSH_REQUEST' (status=1) . 2024.01.16 01:19:33 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.22.150.1,route-gateway 10.22.150.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.22.150.20 255.255.255.0,peer-id 9,cipher AES-256-GCM' . 2024.01.16 01:19:33 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp' . 2024.01.16 01:19:33 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.150.1' . 2024.01.16 01:19:33 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.16 01:19:33 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.16 01:19:33 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.16 01:19:33 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.16 01:19:33 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.16 01:19:33 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.16 01:19:33 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.16 01:19:33 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.16 01:19:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.16 01:19:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.16 01:19:33 - OpenVPN > TUN/TAP device tun0 opened . 2024.01.16 01:19:33 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2024.01.16 01:19:33 - OpenVPN > net_iface_up: set tun0 up . 2024.01.16 01:19:33 - OpenVPN > net_addr_v4_add: 10.22.150.20/24 dev tun0 . 2024.01.16 01:19:38 - OpenVPN > Initialization Sequence Completed . 2024.01.16 01:19:38 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2024.01.16 01:19:38 - Routes, add 0.0.0.0/1 for interface "tun0". . 2024.01.16 01:19:38 - Routes, add 128.0.0.0/1 for interface "tun0". . 2024.01.16 01:19:38 - Routes, add 156.96.151.132/32 for interface "tun0". . 2024.01.16 01:19:38 - Flushing DNS I 2024.01.16 01:19:39 - Checking route IPv4 I 2024.01.16 01:19:39 - Checking DNS ! 2024.01.16 01:19:40 - Connected. . 2024.01.16 01:19:43 - Collect information about AirVPN completed . 2024.01.16 01:49:37 - Collect information about AirVPN completed . 2024.01.16 02:15:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.16 02:15:53 - OpenVPN > VERIFY KU OK . 2024.01.16 02:15:53 - OpenVPN > Validating certificate extended key usage . 2024.01.16 02:15:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.16 02:15:53 - OpenVPN > VERIFY EKU OK . 2024.01.16 02:15:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Metallah, emailAddress=info@airvpn.org . 2024.01.16 02:15:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.16 02:15:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.16 02:15:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.16 02:19:41 - Collect information about AirVPN completed . 2024.01.16 02:49:45 - Collect information about AirVPN completed . 2024.01.16 03:12:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.16 03:12:14 - OpenVPN > VERIFY KU OK . 2024.01.16 03:12:14 - OpenVPN > Validating certificate extended key usage . 2024.01.16 03:12:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.16 03:12:14 - OpenVPN > VERIFY EKU OK . 2024.01.16 03:12:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Metallah, emailAddress=info@airvpn.org . 2024.01.16 03:12:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.16 03:12:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.16 03:12:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.16 03:19:52 - Collect information about AirVPN completed . 2024.01.16 03:49:55 - Collect information about AirVPN completed . 2024.01.16 04:08:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.16 04:08:35 - OpenVPN > VERIFY KU OK . 2024.01.16 04:08:35 - OpenVPN > Validating certificate extended key usage . 2024.01.16 04:08:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.16 04:08:35 - OpenVPN > VERIFY EKU OK . 2024.01.16 04:08:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Metallah, emailAddress=info@airvpn.org . 2024.01.16 04:08:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.16 04:08:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.16 04:08:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.16 04:20:00 - Collect information about AirVPN completed ! 2024.01.16 04:23:31 - Disconnecting . 2024.01.16 04:23:31 - Sending soft termination signal . 2024.01.16 04:23:31 - OpenVPN > event_wait : Interrupted system call (code=4) . 2024.01.16 04:23:31 - OpenVPN > SIGTERM received, sending exit notification to peer . 2024.01.16 04:23:36 - OpenVPN > Closing TUN/TAP interface . 2024.01.16 04:23:36 - OpenVPN > net_addr_v4_del: 10.22.150.20 dev tun0 . 2024.01.16 04:23:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2024.01.16 04:23:36 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2024.01.16 04:23:36 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2024.01.16 04:23:36 - Routes, delete 156.96.151.134/32 for interface "enp0s3". . 2024.01.16 04:23:36 - Routes, delete 156.96.151.132/32 for interface "tun0", not exists. . 2024.01.16 04:23:37 - Routes, delete 156.96.151.134/32 for interface "enp0s3", not exists. . 2024.01.16 04:23:37 - IPv6 restored on network adapter (default) . 2024.01.16 04:23:37 - IPv6 restored on network adapter (enp0s3) . 2024.01.16 04:23:37 - DNS of the system restored to original settings (Rename method) . 2024.01.16 04:23:37 - Connection terminated. I 2024.01.16 04:23:37 - Checking authorization ... ! 2024.01.16 04:23:37 - Connecting to Kruger (United States of America, Chicago, Illinois) . 2024.01.16 04:23:37 - Routes, add 68.235.35.126/32 for interface "enp0s3". . 2024.01.16 04:23:37 - Routes, add 68.235.35.126/32 for interface "enp0s3", already exists. . 2024.01.16 04:23:38 - OpenVPN > OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.01.16 04:23:38 - OpenVPN > library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.01.16 04:23:38 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.16 04:23:38 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.16 04:23:38 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.16 04:23:38 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.16 04:23:38 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]68.235.35.126:443 . 2024.01.16 04:23:38 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.01.16 04:23:38 - OpenVPN > UDP link local: (not bound) . 2024.01.16 04:23:38 - OpenVPN > UDP link remote: [AF_INET]68.235.35.126:443 . 2024.01.16 04:23:38 - OpenVPN > TLS: Initial packet from [AF_INET]68.235.35.126:443, sid=81b2fb5a f0cce9d1 . 2024.01.16 04:23:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.16 04:23:38 - OpenVPN > VERIFY KU OK . 2024.01.16 04:23:38 - OpenVPN > Validating certificate extended key usage . 2024.01.16 04:23:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.16 04:23:38 - OpenVPN > VERIFY EKU OK . 2024.01.16 04:23:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2024.01.16 04:23:38 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.16 04:23:38 - OpenVPN > [Kruger] Peer Connection Initiated with [AF_INET]68.235.35.126:443 . 2024.01.16 04:23:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.150.1,dhcp-option DNS6 fde6:7a:7d20:1096::1,tun-ipv6,route-gateway 10.20.150.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1096::10c1/64 fde6:7a:7d20:1096::1,ifconfig 10.20.150.195 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2024.01.16 04:23:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2024.01.16 04:23:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.20.150.1' . 2024.01.16 04:23:38 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1096::1' . 2024.01.16 04:23:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.16 04:23:38 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.16 04:23:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.16 04:23:38 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.16 04:23:38 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.16 04:23:38 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.16 04:23:38 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.16 04:23:38 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.16 04:23:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.16 04:23:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.16 04:23:38 - OpenVPN > TUN/TAP device tun0 opened . 2024.01.16 04:23:38 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2024.01.16 04:23:38 - OpenVPN > net_iface_up: set tun0 up . 2024.01.16 04:23:38 - OpenVPN > net_addr_v4_add: 10.20.150.195/24 dev tun0 . 2024.01.16 04:23:38 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2024.01.16 04:23:38 - OpenVPN > net_iface_up: set tun0 up . 2024.01.16 04:23:38 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:1096::10c1/64 dev tun0 . 2024.01.16 04:23:43 - OpenVPN > Initialization Sequence Completed . 2024.01.16 04:23:43 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2024.01.16 04:23:43 - Routes, add 0.0.0.0/1 for interface "tun0". . 2024.01.16 04:23:43 - Routes, add 128.0.0.0/1 for interface "tun0". . 2024.01.16 04:23:43 - Routes, add ::/1 for interface "tun0". . 2024.01.16 04:23:44 - Routes, add 8000::/1 for interface "tun0". . 2024.01.16 04:23:44 - Routes, add 68.235.35.124/32 for interface "tun0". . 2024.01.16 04:23:44 - Routes, add 2607:9000:0:16:5e4d:34a7:50ab:f6ce/128 for interface "tun0". . 2024.01.16 04:23:44 - Flushing DNS I 2024.01.16 04:23:44 - Checking route IPv4 I 2024.01.16 04:23:44 - Checking route IPv6 I 2024.01.16 04:23:45 - Checking DNS ! 2024.01.16 04:23:45 - Connected. . 2024.01.16 04:50:04 - Collect information about AirVPN completed . 2024.01.16 05:20:08 - Collect information about AirVPN completed . 2024.01.16 05:21:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.16 05:21:40 - OpenVPN > VERIFY KU OK . 2024.01.16 05:21:40 - OpenVPN > Validating certificate extended key usage . 2024.01.16 05:21:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.16 05:21:40 - OpenVPN > VERIFY EKU OK . 2024.01.16 05:21:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kruger, emailAddress=info@airvpn.org . 2024.01.16 05:21:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.16 05:21:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.16 05:21:40 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.16 05:50:10 - Collect information about AirVPN completed . 2024.01.16 16:24:36 - OpenVPN > [Kruger] Inactivity timeout (--ping-restart), restarting . 2024.01.16 16:24:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2024.01.16 16:24:36 - OpenVPN > Restart pause, 5 second(s) ! 2024.01.16 16:24:36 - Disconnecting . 2024.01.16 16:24:36 - Sending soft termination signal . 2024.01.16 16:24:36 - OpenVPN > Closing TUN/TAP interface . 2024.01.16 16:24:36 - OpenVPN > net_addr_v4_del: 10.20.150.195 dev tun0 . 2024.01.16 16:24:36 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:1096::10c1/64 dev tun0 . 2024.01.16 16:24:36 - OpenVPN > SIGINT[hard,init_instance] received, process exiting . 2024.01.16 16:24:36 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2024.01.16 16:24:37 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2024.01.16 16:24:37 - Routes, delete ::/1 for interface "tun0", not exists. . 2024.01.16 16:24:37 - Routes, delete 8000::/1 for interface "tun0", not exists. . 2024.01.16 16:24:37 - Routes, delete 68.235.35.126/32 for interface "enp0s3", not exists. . 2024.01.16 16:24:37 - Routes, delete 68.235.35.124/32 for interface "tun0", not exists. . 2024.01.16 16:24:37 - Routes, delete 2607:9000:0:16:5e4d:34a7:50ab:f6ce/128 for interface "tun0", not exists. . 2024.01.16 16:24:37 - Routes, delete 68.235.35.126/32 for interface "enp0s3", not exists. . 2024.01.16 16:24:37 - DNS of the system restored to original settings (Rename method) . 2024.01.16 16:24:37 - Connection terminated. I 2024.01.16 16:24:40 - Checking authorization ... . 2024.01.16 16:24:41 - IPv6 disabled on network adapter (default) . 2024.01.16 16:24:41 - IPv6 disabled on network adapter (enp0s3) ! 2024.01.16 16:24:41 - Connecting to Metallah (United States of America, Pennsylvania) . 2024.01.16 16:24:41 - Routes, add 156.96.151.134/32 for interface "enp0s3". . 2024.01.16 16:24:41 - Routes, add 156.96.151.134/32 for interface "enp0s3", already exists. . 2024.01.16 16:24:41 - OpenVPN > OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023 . 2024.01.16 16:24:41 - OpenVPN > library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10 . 2024.01.16 16:24:41 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.16 16:24:41 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.16 16:24:41 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2024.01.16 16:24:41 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2024.01.16 16:24:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]156.96.151.134:443 . 2024.01.16 16:24:41 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2024.01.16 16:24:41 - OpenVPN > UDP link local: (not bound) . 2024.01.16 16:24:41 - OpenVPN > UDP link remote: [AF_INET]156.96.151.134:443 . 2024.01.16 16:24:41 - OpenVPN > TLS: Initial packet from [AF_INET]156.96.151.134:443, sid=7e3e269d 28cbeede . 2024.01.16 16:24:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2024.01.16 16:24:41 - OpenVPN > VERIFY KU OK . 2024.01.16 16:24:41 - OpenVPN > Validating certificate extended key usage . 2024.01.16 16:24:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2024.01.16 16:24:41 - OpenVPN > VERIFY EKU OK . 2024.01.16 16:24:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Metallah, emailAddress=info@airvpn.org . 2024.01.16 16:24:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2024.01.16 16:24:41 - OpenVPN > [Metallah] Peer Connection Initiated with [AF_INET]156.96.151.134:443 . 2024.01.16 16:24:42 - OpenVPN > SENT CONTROL [Metallah]: 'PUSH_REQUEST' (status=1) . 2024.01.16 16:24:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.22.150.1,route-gateway 10.22.150.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.22.150.20 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2024.01.16 16:24:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp' . 2024.01.16 16:24:42 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.22.150.1' . 2024.01.16 16:24:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2024.01.16 16:24:42 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2024.01.16 16:24:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2024.01.16 16:24:42 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2024.01.16 16:24:42 - OpenVPN > OPTIONS IMPORT: peer-id set . 2024.01.16 16:24:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2024.01.16 16:24:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2024.01.16 16:24:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2024.01.16 16:24:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.16 16:24:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2024.01.16 16:24:42 - OpenVPN > TUN/TAP device tun0 opened . 2024.01.16 16:24:42 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2024.01.16 16:24:42 - OpenVPN > net_iface_up: set tun0 up . 2024.01.16 16:24:42 - OpenVPN > net_addr_v4_add: 10.22.150.20/24 dev tun0 . 2024.01.16 16:24:47 - OpenVPN > Initialization Sequence Completed . 2024.01.16 16:24:47 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2024.01.16 16:24:47 - Routes, add 0.0.0.0/1 for interface "tun0". . 2024.01.16 16:24:47 - Routes, add 128.0.0.0/1 for interface "tun0". . 2024.01.16 16:24:47 - Routes, add 156.96.151.132/32 for interface "tun0". . 2024.01.16 16:24:47 - Flushing DNS I 2024.01.16 16:24:47 - Checking route IPv4 I 2024.01.16 16:24:48 - Checking DNS ! 2024.01.16 16:24:48 - Connected. . 2024.01.16 16:24:57 - Collect information about AirVPN completed . 2024.01.16 16:54:40 - Collect information about AirVPN completed ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/1", "interface": "tun0", "scope": "link" }, { "destination": "0.0.0.0\/0", "gateway": "10.0.2.2", "interface": "enp0s3", "metric": "100", "proto": "dhcp", "src": "10.0.2.15" }, { "destination": "10.0.2.0\/24", "interface": "enp0s3", "metric": "100", "proto": "kernel", "scope": "link", "src": "10.0.2.15" }, { "destination": "10.0.2.2\/32", "interface": "enp0s3", "metric": "100", "proto": "dhcp", "scope": "link", "src": "10.0.2.15" }, { "destination": "10.0.2.3\/32", "interface": "enp0s3", "metric": "100", "proto": "dhcp", "scope": "link", "src": "10.0.2.15" }, { "destination": "10.22.150.0\/24", "interface": "tun0", "proto": "kernel", "scope": "link", "src": "10.22.150.20" }, { "destination": "128.0.0.0\/1", "interface": "tun0", "scope": "link" }, { "destination": "156.96.151.132\/32", "interface": "tun0", "scope": "link" }, { "destination": "156.96.151.134\/32", "gateway": "10.0.2.2", "interface": "enp0s3" }, { "destination": "::1\/128", "interface": "lo", "metric": "256", "pref": "medium", "proto": "kernel" } ], "ipv4-default-gateway": "10.0.2.2", "ipv4-default-interface": "enp0s3", "interfaces": [ { "friendly": "lo", "id": "lo", "name": "lo", "description": "lo", "type": "Loopback", "status": "Unknown", "bytes_received": "26139520", "bytes_sent": "26139520", "support_ipv4": true, "support_ipv6": false, "ips": [ "127.0.0.1", "::1" ], "bind": true }, { "friendly": "enp0s3", "id": "enp0s3", "name": "enp0s3", "description": "enp0s3", "type": "Ethernet", "status": "Up", "bytes_received": "3318826599", "bytes_sent": "91964614", "support_ipv4": true, "support_ipv6": false, "ips": [ "10.0.2.15" ], "bind": true }, { "friendly": "tun0", "id": "tun0", "name": "tun0", "description": "tun0", "type": "0", "status": "Unknown", "bytes_received": "139459671", "bytes_sent": "3793119", "support_ipv4": true, "support_ipv6": false, "ips": [ "10.22.150.20" ], "bind": true } ] } ---------------------------- ip addr show: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: enp0s3: mtu 1500 qdisc fq_codel state UP group default qlen 1000 link/ether 08:00:27:08:28:da brd ff:ff:ff:ff:ff:ff inet 10.0.2.15/24 metric 100 brd 10.0.2.255 scope global dynamic enp0s3 valid_lft 84291sec preferred_lft 84291sec 6: tun0: mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 500 link/none inet 10.22.150.20/24 scope global tun0 valid_lft forever preferred_lft forever ---------------------------- ip link show: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: enp0s3: mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether 08:00:27:08:28:da brd ff:ff:ff:ff:ff:ff 6: tun0: mtu 1500 qdisc fq_codel state UNKNOWN mode DEFAULT group default qlen 500 link/none