hugootto 0 Posted ... Hi! I'm using Ubuntu Linux, when connecting via Network Manager GUI everything works ok. With airvpn_linux I'm unable to connect, here is the corresponding log, the relevant entry is "DNS checking failed" 10:40:39-valter@banana:~$ airvpnI 2015.02.18 10:40:55 - AirVPN client version: 2.8.8, System: Linux, Name: Ubuntu Vivid Vervet (development branch) \n \l, Architecture: x64. 2015.02.18 10:40:55 - Reading options from /home/valter/.airvpn/AirVPN.xml. 2015.02.18 10:40:55 - Profile options not found, using defaults.. 2015.02.18 10:40:55 - Restarting with admin privileges10:40:55-valter@banana:~$ I 2015.02.18 10:41:00 - AirVPN client version: 2.8.8, System: Linux, Name: Ubuntu Vivid Vervet (development branch) \n \l, Architecture: x64. 2015.02.18 10:41:00 - Reading options from /home/valter/.airvpn/AirVPN.xml. 2015.02.18 10:41:00 - Profile options not found, using defaults.. 2015.02.18 10:41:00 - Data Path: /home/valter/.airvpn. 2015.02.18 10:41:00 - App Path: /usr/lib/AirVPN. 2015.02.18 10:41:00 - Executable Path: /usr/lib/AirVPN/AirVPN.exe. 2015.02.18 10:41:00 - Command line arguments (1): path="/home/valter/.airvpn". 2015.02.18 10:41:00 - Updating systems & servers data .... 2015.02.18 10:41:00 - Operating System: Unix 3.18.0.13 - Linux banana 3.18.0-13-generic #14-Ubuntu SMP Fri Feb 6 09:55:14 UTC 2015 x86_64 x86_64 x86_64 GNU/LinuxI 2015.02.18 10:41:00 - OpenVPN Driver - FoundI 2015.02.18 10:41:00 - OpenVPN - Version: OpenVPN 2.3.2 (/usr/sbin/openvpn)I 2015.02.18 10:41:00 - SSH - Version: OpenSSH_6.7p1 Ubuntu-3, OpenSSL 1.0.1f 6 Jan 2014 (/usr/bin/ssh)I 2015.02.18 10:41:00 - SSL - Version: stunnel 5.06 (/usr/bin/stunnel4)I 2015.02.18 10:41:00 - IPV6: Available! 2015.02.18 10:41:00 - Ready. 2015.02.18 10:41:01 - Systems & servers data update completedI 2015.02.18 10:41:30 - Checking login ...! 2015.02.18 10:41:31 - Logged in.I 2015.02.18 10:41:39 - Session starting.I 2015.02.18 10:41:39 - Installing tunnel driverI 2015.02.18 10:41:39 - Checking authorization ...! 2015.02.18 10:41:40 - Connecting to Taygeta (Netherlands, Amsterdam)I 2015.02.18 10:41:40 - DNS of the system will be updated to VPN DNS (ResolvConf method). 2015.02.18 10:41:40 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014. 2015.02.18 10:41:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2015.02.18 10:41:40 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts. 2015.02.18 10:41:40 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2015.02.18 10:41:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.18 10:41:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.18 10:41:40 - OpenVPN > Socket Buffers: R=[212992->131072] S=[212992->131072]. 2015.02.18 10:41:40 - OpenVPN > UDPv4 link local: [undef]. 2015.02.18 10:41:40 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.6:443. 2015.02.18 10:41:40 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.6:443, sid=bf8d143c 9b723275. 2015.02.18 10:41:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2015.02.18 10:41:45 - OpenVPN > Validating certificate key usage. 2015.02.18 10:41:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2015.02.18 10:41:45 - OpenVPN > VERIFY KU OK. 2015.02.18 10:41:45 - OpenVPN > Validating certificate extended key usage. 2015.02.18 10:41:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2015.02.18 10:41:45 - OpenVPN > VERIFY EKU OK. 2015.02.18 10:41:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2015.02.18 10:41:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2015.02.18 10:41:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.18 10:41:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2015.02.18 10:41:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.18 10:41:48 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA. 2015.02.18 10:41:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.6:443. 2015.02.18 10:41:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2015.02.18 10:41:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.155.170 10.4.155.169'. 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: route options modified. 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2015.02.18 10:41:50 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=d4:3d:7e:31:e3:5d. 2015.02.18 10:41:50 - OpenVPN > TUN/TAP device tun0 opened. 2015.02.18 10:41:50 - OpenVPN > TUN/TAP TX queue length set to 100. 2015.02.18 10:41:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2015.02.18 10:41:50 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500. 2015.02.18 10:41:50 - OpenVPN > /sbin/ip addr add dev tun0 local 10.4.155.170 peer 10.4.155.169. 2015.02.18 10:41:50 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init. 2015.02.18 10:41:50 - OpenVPN > dhcp-option DNS 10.4.0.1. 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 37.48.81.6/32 via 192.168.1.1. 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.155.169. 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.155.169. 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 10.4.0.1/32 via 10.4.155.169. 2015.02.18 10:41:56 - Starting Management Interface. 2015.02.18 10:41:56 - OpenVPN > Initialization Sequence CompletedI 2015.02.18 10:41:56 - Flushing DNSI 2015.02.18 10:41:56 - Checking routeI 2015.02.18 10:41:57 - Checking DNSE 2015.02.18 10:41:57 - DNS checking failed.. 2015.02.18 10:41:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100! 2015.02.18 10:41:57 - Disconnecting. 2015.02.18 10:41:57 - Management - Send 'signal SIGTERM'. 2015.02.18 10:41:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2015.02.18 10:41:57 - OpenVPN > SIGTERM received, sending exit notification to peer. 2015.02.18 10:41:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2015.02.18 10:41:57 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 10.4.0.1/32. 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 37.48.81.6/32. 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 0.0.0.0/1. 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 128.0.0.0/1. 2015.02.18 10:42:02 - OpenVPN > Closing TUN/TAP interface. 2015.02.18 10:42:02 - OpenVPN > /sbin/ip addr del dev tun0 local 10.4.155.170 peer 10.4.155.169. 2015.02.18 10:42:02 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init. 2015.02.18 10:42:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2015.02.18 10:42:02 - Connection terminated.I 2015.02.18 10:42:05 - Checking authorization ...! 2015.02.18 10:42:05 - Connecting to Taygeta (Netherlands, Amsterdam)I 2015.02.18 10:42:05 - DNS of the system will be updated to VPN DNS (ResolvConf method). 2015.02.18 10:42:05 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014. 2015.02.18 10:42:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2015.02.18 10:42:05 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts. 2015.02.18 10:42:05 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2015.02.18 10:42:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.18 10:42:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.18 10:42:05 - OpenVPN > Socket Buffers: R=[212992->131072] S=[212992->131072]. 2015.02.18 10:42:05 - OpenVPN > UDPv4 link local: [undef]. 2015.02.18 10:42:05 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.6:443. 2015.02.18 10:42:05 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.6:443, sid=0f3fe417 8570eca2. 2015.02.18 10:42:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2015.02.18 10:42:06 - OpenVPN > Validating certificate key usage. 2015.02.18 10:42:06 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2015.02.18 10:42:06 - OpenVPN > VERIFY KU OK. 2015.02.18 10:42:06 - OpenVPN > Validating certificate extended key usage. 2015.02.18 10:42:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2015.02.18 10:42:06 - OpenVPN > VERIFY EKU OK. 2015.02.18 10:42:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2015.02.18 10:42:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2015.02.18 10:42:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.18 10:42:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2015.02.18 10:42:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.18 10:42:06 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA. 2015.02.18 10:42:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.6:443. 2015.02.18 10:42:09 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2015.02.18 10:42:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.155.170 10.4.155.169'. 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: route options modified. 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2015.02.18 10:42:09 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=d4:3d:7e:31:e3:5d. 2015.02.18 10:42:09 - OpenVPN > TUN/TAP device tun0 opened. 2015.02.18 10:42:09 - OpenVPN > TUN/TAP TX queue length set to 100. 2015.02.18 10:42:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2015.02.18 10:42:09 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500. 2015.02.18 10:42:09 - OpenVPN > /sbin/ip addr add dev tun0 local 10.4.155.170 peer 10.4.155.169. 2015.02.18 10:42:09 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init. 2015.02.18 10:42:09 - OpenVPN > dhcp-option DNS 10.4.0.1. 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 37.48.81.6/32 via 192.168.1.1. 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.155.169. 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.155.169. 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 10.4.0.1/32 via 10.4.155.169. 2015.02.18 10:42:15 - Starting Management Interface. 2015.02.18 10:42:15 - OpenVPN > Initialization Sequence CompletedI 2015.02.18 10:42:15 - Flushing DNSI 2015.02.18 10:42:15 - Checking routeI 2015.02.18 10:42:15 - Checking DNSE 2015.02.18 10:42:15 - DNS checking failed.. 2015.02.18 10:42:15 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100! 2015.02.18 10:42:15 - Disconnecting. 2015.02.18 10:42:15 - Management - Send 'signal SIGTERM'. 2015.02.18 10:42:15 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2015.02.18 10:42:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2015.02.18 10:42:15 - OpenVPN > SIGTERM received, sending exit notification to peer. 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 10.4.0.1/32. 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 37.48.81.6/32. 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 0.0.0.0/1. 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 128.0.0.0/1. 2015.02.18 10:42:20 - OpenVPN > Closing TUN/TAP interface. 2015.02.18 10:42:20 - OpenVPN > /sbin/ip addr del dev tun0 local 10.4.155.170 peer 10.4.155.169. 2015.02.18 10:42:20 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init. 2015.02.18 10:42:20 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2015.02.18 10:42:20 - Connection terminated.I 2015.02.18 10:42:23 - Checking authorization ...! 2015.02.18 10:42:23 - Connecting to Taygeta (Netherlands, Amsterdam)I 2015.02.18 10:42:23 - DNS of the system will be updated to VPN DNS (ResolvConf method). 2015.02.18 10:42:23 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014. 2015.02.18 10:42:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2015.02.18 10:42:23 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts. 2015.02.18 10:42:23 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2015.02.18 10:42:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.18 10:42:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.18 10:42:23 - OpenVPN > Socket Buffers: R=[212992->131072] S=[212992->131072]. 2015.02.18 10:42:23 - OpenVPN > UDPv4 link local: [undef]. 2015.02.18 10:42:23 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.6:443. 2015.02.18 10:42:23 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.6:443, sid=9899d800 5a8b10e6. 2015.02.18 10:42:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2015.02.18 10:42:24 - OpenVPN > Validating certificate key usage. 2015.02.18 10:42:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2015.02.18 10:42:24 - OpenVPN > VERIFY KU OK. 2015.02.18 10:42:24 - OpenVPN > Validating certificate extended key usage. 2015.02.18 10:42:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2015.02.18 10:42:24 - OpenVPN > VERIFY EKU OK. 2015.02.18 10:42:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2015.02.18 10:42:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2015.02.18 10:42:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.18 10:42:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2015.02.18 10:42:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.18 10:42:27 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA. 2015.02.18 10:42:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.6:443. 2015.02.18 10:42:29 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2015.02.18 10:42:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.155.170 10.4.155.169'. 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: route options modified. 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2015.02.18 10:42:29 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=d4:3d:7e:31:e3:5d. 2015.02.18 10:42:29 - OpenVPN > TUN/TAP device tun0 opened. 2015.02.18 10:42:29 - OpenVPN > TUN/TAP TX queue length set to 100. 2015.02.18 10:42:29 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2015.02.18 10:42:29 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500. 2015.02.18 10:42:29 - OpenVPN > /sbin/ip addr add dev tun0 local 10.4.155.170 peer 10.4.155.169. 2015.02.18 10:42:29 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init. 2015.02.18 10:42:29 - OpenVPN > dhcp-option DNS 10.4.0.1. 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 37.48.81.6/32 via 192.168.1.1. 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.155.169. 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.155.169. 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 10.4.0.1/32 via 10.4.155.169. 2015.02.18 10:42:35 - Starting Management Interface. 2015.02.18 10:42:35 - OpenVPN > Initialization Sequence CompletedI 2015.02.18 10:42:35 - Flushing DNSI 2015.02.18 10:42:35 - Checking routeI 2015.02.18 10:42:35 - Checking DNSE 2015.02.18 10:42:35 - DNS checking failed.. 2015.02.18 10:42:35 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100! 2015.02.18 10:42:35 - Disconnecting. 2015.02.18 10:42:35 - Management - Send 'signal SIGTERM'. 2015.02.18 10:42:35 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2015.02.18 10:42:35 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2015.02.18 10:42:35 - OpenVPN > SIGTERM received, sending exit notification to peer. 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 10.4.0.1/32. 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 37.48.81.6/32. 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 0.0.0.0/1. 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 128.0.0.0/1. 2015.02.18 10:42:40 - OpenVPN > Closing TUN/TAP interface. 2015.02.18 10:42:40 - OpenVPN > /sbin/ip addr del dev tun0 local 10.4.155.170 peer 10.4.155.169. 2015.02.18 10:42:40 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init. 2015.02.18 10:42:40 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2015.02.18 10:42:40 - Connection terminated.I 2015.02.18 10:42:40 - Cancel requested.! 2015.02.18 10:42:40 - Session terminated.^C Please help.... TIA Quote Share this post Link to post
OpenSourcerer 1441 Posted ... In Settings > Advanced, disable Check if tunnel use AirVPN DNS. Then connect and check your DNS via ipleak.net. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
hugootto 0 Posted ... Hi, problem partially solved: connecting ok, but my DNS address is leaking! Any ideas? BTW: this error does not occur with Ubuntu 14.10, even Network Manager having the same version. Thanks! Quote Share this post Link to post
Staff 10014 Posted ... Hello! There are no DNS leaks on Linux. Even if your system queries different DNS servers, DNS queries are anyway tunneled. A DNS leak is when a DNS query is sent unencrypted outside the tunnel and this is not your case. A possible explanation is that your system does not properly change nameservers because resolvconf package is not installed (but it should be pre-installed in any Ubuntu version). In this case, in "AirVPN" -> "Preferences" -> "Advanced" try to select "Renaming" in the "DNS Switch Mode" combo box. If the problem persists please send us the content of your /etc/resolv.conf file while the system is connected to some VPN server. Kind regards Quote Share this post Link to post
hugootto 0 Posted ... Hello! DNS was leaking, as was shown by ipleak.net, because - - the dhcp-option DNS 10.4.0.1 wasn't working - this was my problem description, so I couldn't connect at all because this is checked by the client - after unchecking "Advanced -> Check if tunnel use AirVPN DNS" as suggested I could connect, but using my ISP DNS.Now, according to your suggestion, - I rechecked "Advanced -> Check if tunnel use AirVPN DNS" - I set the DNS Switch mode to "Renaming"and it works! resolconf is/was installed.In my last post I wrote about the Network Manager versions.This was wrong, i wanted to write that OpenVPN has the same version, but not SSH and SSLUbuntu 14.10OpenVPN - Version: OpenVPN 2.3.2 (/usr/sbin/openvpn)SSH - Version: OpenSSH_6.6.1p1 Ubuntu-8, OpenSSL 1.0.1f 6 Jan 2014 (/usr/bin/ssh)SSL - Version: stunnel 5.02 (/usr/bin/stunnel4)Ubuntu 15.04OpenVPN - Version: OpenVPN 2.3.2 (/usr/sbin/openvpn)SSH - Version: OpenSSH_6.7p1 Ubuntu-3, OpenSSL 1.0.1f 6 Jan 2014 (/usr/bin/ssh)SSL - Version: stunnel 5.06 (/usr/bin/stunnel4)I'm not an expert, but I assume this has something to do with the problem. Problem solved! Thanks! I'm happy... Quote Share this post Link to post
Staff 10014 Posted ... Hello! DNS was leaking, as was shown by ipleak.net, because -Problem solved! Thanks! I'm happy... Hello! We're very glad to know it! Additionally, no reasons to worry even for the previous state, because you had no DNS leaks. Even the queries to your ISP DNS were tunneled. Kind regards Quote Share this post Link to post