Jump to content
Not connected, Your IP: 3.85.85.246
hugootto

ANSWERED AirVPN Linux client unable to connect, "DNS checking failed"

Recommended Posts

Hi!

 

I'm using Ubuntu Linux, when connecting via Network Manager GUI everything works ok.

 

With airvpn_linux I'm unable to connect, here is the corresponding log, the relevant entry is "DNS checking failed"

 

 

10:40:39-valter@banana:~$ airvpn
I 2015.02.18 10:40:55 - AirVPN client version: 2.8.8, System: Linux, Name: Ubuntu Vivid Vervet (development branch) \n \l, Architecture: x64
. 2015.02.18 10:40:55 - Reading options from /home/valter/.airvpn/AirVPN.xml
. 2015.02.18 10:40:55 - Profile options not found, using defaults.
. 2015.02.18 10:40:55 - Restarting with admin privileges
10:40:55-valter@banana:~$ I 2015.02.18 10:41:00 - AirVPN client version: 2.8.8, System: Linux, Name: Ubuntu Vivid Vervet (development branch) \n \l, Architecture: x64
. 2015.02.18 10:41:00 - Reading options from /home/valter/.airvpn/AirVPN.xml
. 2015.02.18 10:41:00 - Profile options not found, using defaults.
. 2015.02.18 10:41:00 - Data Path: /home/valter/.airvpn
. 2015.02.18 10:41:00 - App Path: /usr/lib/AirVPN
. 2015.02.18 10:41:00 - Executable Path: /usr/lib/AirVPN/AirVPN.exe
. 2015.02.18 10:41:00 - Command line arguments (1): path="/home/valter/.airvpn"
. 2015.02.18 10:41:00 - Updating systems & servers data ...
. 2015.02.18 10:41:00 - Operating System: Unix 3.18.0.13 - Linux banana 3.18.0-13-generic #14-Ubuntu SMP Fri Feb 6 09:55:14 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux
I 2015.02.18 10:41:00 - OpenVPN Driver - Found
I 2015.02.18 10:41:00 - OpenVPN - Version: OpenVPN 2.3.2 (/usr/sbin/openvpn)
I 2015.02.18 10:41:00 - SSH - Version: OpenSSH_6.7p1 Ubuntu-3, OpenSSL 1.0.1f 6 Jan 2014 (/usr/bin/ssh)
I 2015.02.18 10:41:00 - SSL - Version: stunnel 5.06 (/usr/bin/stunnel4)
I 2015.02.18 10:41:00 - IPV6: Available
! 2015.02.18 10:41:00 - Ready
. 2015.02.18 10:41:01 - Systems & servers data update completed
I 2015.02.18 10:41:30 - Checking login ...
! 2015.02.18 10:41:31 - Logged in.
I 2015.02.18 10:41:39 - Session starting.
I 2015.02.18 10:41:39 - Installing tunnel driver
I 2015.02.18 10:41:39 - Checking authorization ...
! 2015.02.18 10:41:40 - Connecting to Taygeta (Netherlands, Amsterdam)
I 2015.02.18 10:41:40 - DNS of the system will be updated to VPN DNS (ResolvConf method)
. 2015.02.18 10:41:40 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec  1 2014
. 2015.02.18 10:41:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2015.02.18 10:41:40 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
. 2015.02.18 10:41:40 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2015.02.18 10:41:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.02.18 10:41:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.02.18 10:41:40 - OpenVPN > Socket Buffers: R=[212992->131072] S=[212992->131072]
. 2015.02.18 10:41:40 - OpenVPN > UDPv4 link local: [undef]
. 2015.02.18 10:41:40 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.6:443
. 2015.02.18 10:41:40 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.6:443, sid=bf8d143c 9b723275
. 2015.02.18 10:41:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2015.02.18 10:41:45 - OpenVPN > Validating certificate key usage
. 2015.02.18 10:41:45 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2015.02.18 10:41:45 - OpenVPN > VERIFY KU OK
. 2015.02.18 10:41:45 - OpenVPN > Validating certificate extended key usage
. 2015.02.18 10:41:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2015.02.18 10:41:45 - OpenVPN > VERIFY EKU OK
. 2015.02.18 10:41:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2015.02.18 10:41:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2015.02.18 10:41:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.02.18 10:41:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2015.02.18 10:41:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.02.18 10:41:48 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2015.02.18 10:41:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.6:443
. 2015.02.18 10:41:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2015.02.18 10:41:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.155.170 10.4.155.169'
. 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: route options modified
. 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2015.02.18 10:41:50 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=d4:3d:7e:31:e3:5d
. 2015.02.18 10:41:50 - OpenVPN > TUN/TAP device tun0 opened
. 2015.02.18 10:41:50 - OpenVPN > TUN/TAP TX queue length set to 100
. 2015.02.18 10:41:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2015.02.18 10:41:50 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2015.02.18 10:41:50 - OpenVPN > /sbin/ip addr add dev tun0 local 10.4.155.170 peer 10.4.155.169
. 2015.02.18 10:41:50 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init
. 2015.02.18 10:41:50 - OpenVPN > dhcp-option DNS 10.4.0.1
. 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 37.48.81.6/32 via 192.168.1.1
. 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.155.169
. 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.155.169
. 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 10.4.0.1/32 via 10.4.155.169
. 2015.02.18 10:41:56 - Starting Management Interface
. 2015.02.18 10:41:56 - OpenVPN > Initialization Sequence Completed
I 2015.02.18 10:41:56 - Flushing DNS
I 2015.02.18 10:41:56 - Checking route
I 2015.02.18 10:41:57 - Checking DNS
E 2015.02.18 10:41:57 - DNS checking failed.
. 2015.02.18 10:41:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2015.02.18 10:41:57 - Disconnecting
. 2015.02.18 10:41:57 - Management - Send 'signal SIGTERM'
. 2015.02.18 10:41:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2015.02.18 10:41:57 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2015.02.18 10:41:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2015.02.18 10:41:57 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 10.4.0.1/32
. 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 37.48.81.6/32
. 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2015.02.18 10:42:02 - OpenVPN > Closing TUN/TAP interface
. 2015.02.18 10:42:02 - OpenVPN > /sbin/ip addr del dev tun0 local 10.4.155.170 peer 10.4.155.169
. 2015.02.18 10:42:02 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init
. 2015.02.18 10:42:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2015.02.18 10:42:02 - Connection terminated.
I 2015.02.18 10:42:05 - Checking authorization ...
! 2015.02.18 10:42:05 - Connecting to Taygeta (Netherlands, Amsterdam)
I 2015.02.18 10:42:05 - DNS of the system will be updated to VPN DNS (ResolvConf method)
. 2015.02.18 10:42:05 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec  1 2014
. 2015.02.18 10:42:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2015.02.18 10:42:05 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
. 2015.02.18 10:42:05 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2015.02.18 10:42:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.02.18 10:42:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.02.18 10:42:05 - OpenVPN > Socket Buffers: R=[212992->131072] S=[212992->131072]
. 2015.02.18 10:42:05 - OpenVPN > UDPv4 link local: [undef]
. 2015.02.18 10:42:05 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.6:443
. 2015.02.18 10:42:05 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.6:443, sid=0f3fe417 8570eca2
. 2015.02.18 10:42:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2015.02.18 10:42:06 - OpenVPN > Validating certificate key usage
. 2015.02.18 10:42:06 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2015.02.18 10:42:06 - OpenVPN > VERIFY KU OK
. 2015.02.18 10:42:06 - OpenVPN > Validating certificate extended key usage
. 2015.02.18 10:42:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2015.02.18 10:42:06 - OpenVPN > VERIFY EKU OK
. 2015.02.18 10:42:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2015.02.18 10:42:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2015.02.18 10:42:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.02.18 10:42:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2015.02.18 10:42:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.02.18 10:42:06 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2015.02.18 10:42:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.6:443
. 2015.02.18 10:42:09 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2015.02.18 10:42:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.155.170 10.4.155.169'
. 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: route options modified
. 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2015.02.18 10:42:09 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=d4:3d:7e:31:e3:5d
. 2015.02.18 10:42:09 - OpenVPN > TUN/TAP device tun0 opened
. 2015.02.18 10:42:09 - OpenVPN > TUN/TAP TX queue length set to 100
. 2015.02.18 10:42:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2015.02.18 10:42:09 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2015.02.18 10:42:09 - OpenVPN > /sbin/ip addr add dev tun0 local 10.4.155.170 peer 10.4.155.169
. 2015.02.18 10:42:09 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init
. 2015.02.18 10:42:09 - OpenVPN > dhcp-option DNS 10.4.0.1
. 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 37.48.81.6/32 via 192.168.1.1
. 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.155.169
. 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.155.169
. 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 10.4.0.1/32 via 10.4.155.169
. 2015.02.18 10:42:15 - Starting Management Interface
. 2015.02.18 10:42:15 - OpenVPN > Initialization Sequence Completed
I 2015.02.18 10:42:15 - Flushing DNS
I 2015.02.18 10:42:15 - Checking route
I 2015.02.18 10:42:15 - Checking DNS
E 2015.02.18 10:42:15 - DNS checking failed.
. 2015.02.18 10:42:15 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2015.02.18 10:42:15 - Disconnecting
. 2015.02.18 10:42:15 - Management - Send 'signal SIGTERM'
. 2015.02.18 10:42:15 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2015.02.18 10:42:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2015.02.18 10:42:15 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 10.4.0.1/32
. 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 37.48.81.6/32
. 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2015.02.18 10:42:20 - OpenVPN > Closing TUN/TAP interface
. 2015.02.18 10:42:20 - OpenVPN > /sbin/ip addr del dev tun0 local 10.4.155.170 peer 10.4.155.169
. 2015.02.18 10:42:20 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init
. 2015.02.18 10:42:20 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2015.02.18 10:42:20 - Connection terminated.
I 2015.02.18 10:42:23 - Checking authorization ...
! 2015.02.18 10:42:23 - Connecting to Taygeta (Netherlands, Amsterdam)
I 2015.02.18 10:42:23 - DNS of the system will be updated to VPN DNS (ResolvConf method)
. 2015.02.18 10:42:23 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec  1 2014
. 2015.02.18 10:42:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2015.02.18 10:42:23 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
. 2015.02.18 10:42:23 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2015.02.18 10:42:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.02.18 10:42:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.02.18 10:42:23 - OpenVPN > Socket Buffers: R=[212992->131072] S=[212992->131072]
. 2015.02.18 10:42:23 - OpenVPN > UDPv4 link local: [undef]
. 2015.02.18 10:42:23 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.6:443
. 2015.02.18 10:42:23 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.6:443, sid=9899d800 5a8b10e6
. 2015.02.18 10:42:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2015.02.18 10:42:24 - OpenVPN > Validating certificate key usage
. 2015.02.18 10:42:24 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2015.02.18 10:42:24 - OpenVPN > VERIFY KU OK
. 2015.02.18 10:42:24 - OpenVPN > Validating certificate extended key usage
. 2015.02.18 10:42:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2015.02.18 10:42:24 - OpenVPN > VERIFY EKU OK
. 2015.02.18 10:42:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2015.02.18 10:42:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2015.02.18 10:42:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.02.18 10:42:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2015.02.18 10:42:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.02.18 10:42:27 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2015.02.18 10:42:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.6:443
. 2015.02.18 10:42:29 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2015.02.18 10:42:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.155.170 10.4.155.169'
. 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: route options modified
. 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2015.02.18 10:42:29 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=d4:3d:7e:31:e3:5d
. 2015.02.18 10:42:29 - OpenVPN > TUN/TAP device tun0 opened
. 2015.02.18 10:42:29 - OpenVPN > TUN/TAP TX queue length set to 100
. 2015.02.18 10:42:29 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2015.02.18 10:42:29 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2015.02.18 10:42:29 - OpenVPN > /sbin/ip addr add dev tun0 local 10.4.155.170 peer 10.4.155.169
. 2015.02.18 10:42:29 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init
. 2015.02.18 10:42:29 - OpenVPN > dhcp-option DNS 10.4.0.1
. 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 37.48.81.6/32 via 192.168.1.1
. 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.155.169
. 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.155.169
. 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 10.4.0.1/32 via 10.4.155.169
. 2015.02.18 10:42:35 - Starting Management Interface
. 2015.02.18 10:42:35 - OpenVPN > Initialization Sequence Completed
I 2015.02.18 10:42:35 - Flushing DNS
I 2015.02.18 10:42:35 - Checking route
I 2015.02.18 10:42:35 - Checking DNS
E 2015.02.18 10:42:35 - DNS checking failed.
. 2015.02.18 10:42:35 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2015.02.18 10:42:35 - Disconnecting
. 2015.02.18 10:42:35 - Management - Send 'signal SIGTERM'
. 2015.02.18 10:42:35 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2015.02.18 10:42:35 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2015.02.18 10:42:35 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 10.4.0.1/32
. 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 37.48.81.6/32
. 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2015.02.18 10:42:40 - OpenVPN > Closing TUN/TAP interface
. 2015.02.18 10:42:40 - OpenVPN > /sbin/ip addr del dev tun0 local 10.4.155.170 peer 10.4.155.169
. 2015.02.18 10:42:40 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init
. 2015.02.18 10:42:40 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2015.02.18 10:42:40 - Connection terminated.
I 2015.02.18 10:42:40 - Cancel requested.
! 2015.02.18 10:42:40 - Session terminated.
^C

 

Please help....

 

TIA
 

Share this post


Link to post

In Settings > Advanced, disable Check if tunnel use AirVPN DNS. Then connect and check your DNS via ipleak.net.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Hi,

 

 

problem partially solved: connecting ok, but my DNS address is leaking! Any ideas?

 

BTW: this error does not occur with Ubuntu 14.10, even Network Manager having the same version.

 

Thanks!

Share this post


Link to post

Hello!

 

There are no DNS leaks on Linux. Even if your system queries different DNS servers, DNS queries are anyway tunneled. A DNS leak is when a DNS query is sent unencrypted outside the tunnel and this is not your case.

 

A possible explanation is that your system does not properly change nameservers because resolvconf package is not installed (but it should be pre-installed in any Ubuntu version). In this case, in "AirVPN" -> "Preferences" -> "Advanced" try to select "Renaming" in the "DNS Switch Mode" combo box.

 

If the problem persists please send us the content of your /etc/resolv.conf file while the system is connected to some VPN server.

 

Kind regards

Share this post


Link to post

Hello!

 

DNS was leaking, as was shown by ipleak.net, because -
 - the dhcp-option DNS 10.4.0.1 wasn't working - this was my problem description, so I couldn't connect at all because  this is checked by the client
 - after unchecking "Advanced -> Check if tunnel use AirVPN DNS" as suggested I could connect, but using my  ISP DNS.

Now, according to your suggestion,
 - I rechecked  "Advanced -> Check if tunnel use AirVPN DNS"
 - I set the DNS Switch mode to "Renaming"

and it works!

 

resolconf is/was installed.

In my last post I wrote about the Network Manager versions.
This was wrong, i wanted to write that OpenVPN has the same version, but not SSH and SSL


Ubuntu 14.10
OpenVPN - Version: OpenVPN 2.3.2 (/usr/sbin/openvpn)
SSH - Version: OpenSSH_6.6.1p1 Ubuntu-8, OpenSSL 1.0.1f 6 Jan 2014 (/usr/bin/ssh)
SSL - Version: stunnel 5.02 (/usr/bin/stunnel4)

Ubuntu 15.04
OpenVPN - Version: OpenVPN 2.3.2 (/usr/sbin/openvpn)
SSH - Version: OpenSSH_6.7p1 Ubuntu-3, OpenSSL 1.0.1f 6 Jan 2014 (/usr/bin/ssh)
SSL - Version: stunnel 5.06 (/usr/bin/stunnel4)

I'm not an expert, but I assume this has something to do with the problem.

 

Problem solved!

 

Thanks! I'm happy...

Share this post


Link to post

Hello!

 

DNS was leaking, as was shown by ipleak.net, because -

Problem solved!

 

Thanks! I'm happy...

 

Hello!

 

We're very glad to know it! Additionally, no reasons to worry even for the previous state, because you had no DNS leaks. Even the queries to your ISP DNS were tunneled.

 

Kind regards

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...