Jump to content
Not connected, Your IP: 34.238.190.122
Staff

Eddie 2.10.3 Experimental available

Recommended Posts

Hello!

 

Our free and open source client Eddie 2.10.1 Experimental is now available. Feel free to test it, it includes several bugfixes from version 2.9.2 Stable. Remember that it's an experimental version which passed alpha testing but is still in beta testing.

 

If you wish to test it, you can download it in the download page for your system. Click "Other versions" then select "Experimental". Your feedback will be very much appreciated.

 

Changelog:

https://airvpn.org/services/changelog.php?software=client&format=html

 

Kind regards

 

UPDATE 13-Aug-15: Eddie 2.10.3 Experimental is now available https://airvpn.org/topic/14491-eddie-2101-experimental-available/?p=30952

Share this post


Link to post

Seems to be working well on Mac OSX Yosemite 10.10.3. I'll report back if this changes. I like the new OSX icon by the way. 

Share this post


Link to post

I gave the Eddie 2.10.1 Experimental a go and have nothing to report. It works just like 2.10 here without any issues.

 

 

On a completely unrelated note, has anyone tried porting Eddie to a text-based version while we wait for the native non-Mono version some day? (not that there's any rush).   I still enjoy using some ncurses apps (*) and something called MonoCurses caught my eye.

 

 

(*) not excluding times when boss catches me playing some game but doesn't realize I'm actually just playing.

Share this post


Link to post

It's not possible to enter a password that contains German Umlaute (ä, ö, ü). It was possible with the former experimental client though. I can't tell if it's the same with the Windows client since so far I have only used the experimental client for Linux  (portable version).

Share this post


Link to post

One more glitch: I have not yet managed to get the printer working while netlock is active. I excluded the printer's ip from the tunnel in the settings like I did with the former version of the experimental client, I have been able to ping the printer but I cannot print anything unless netlock is disabled. If I go to the printer settings (Linux Mint 17.1 KDE, 64 bit) it says "Printer offline" so apparently there is something wrong with the routing of the communication with the printer (or with the firewall rules).

Share this post


Link to post

Ok, I was able to restore printer functionality by completely disabling netlock, deactivating the "allow lan/ private" check box and removing my "outside the tunnel" rules. Then I reactivated the "allow lan/ private" check box and re-entered the "outside the tunnel" rule. Afterwards I reactivated netlock and now printing works again. But the bug with the German Umlaute persists.

Share this post


Link to post

Seems to be working well on Mac OSX Yosemite 10.10.3. I'll report back if this changes. I like the new OSX icon by the way. 

It does not work on 10.10.4 however. It cannot find OpenVPN or ssltunnel files and it stuck in a loop of authenticating.

Share this post


Link to post

Ok, I was able to restore printer functionality by completely disabling netlock, deactivating the "allow lan/ private" check box and removing my "outside the tunnel" rules. Then I reactivated the "allow lan/ private" check box and re-entered the "outside the tunnel" rule. Afterwards I reactivated netlock and now printing works again. But the bug with the German Umlaute persists.

 

I have to withdraw the statement I made in the quoted post. Printer functionality does not work reliably if network lock is enabled. Sometimes it can make it work as follows: Disable network lock, untick and tick the "allow lan" checkbox again, delete and enter the ip of the printer in the routing table (out of the tunnel) again and then reactivate network lock. But it's not persistent and printer functionality is gone again with the next (re)start of Eddie.

Share this post


Link to post

Is there a schedule when an updated client (stable or experimental) will be available? I'm asking because currently the situation is kind of frustrating for me. With the stable client I've got connection issues if network lock is enabled (see https://airvpn.org/topic/14391-connection-iterrupted-reconnect-fails/) and with the experimental client there is the printer issue.

 

I can only speak about the linux client (64 bit, portable), it don't use the Windows version since I do all my internet browsing on a virtual Linux machine.

Share this post


Link to post

It does not work on 10.10.4 however. It cannot find OpenVPN or ssltunnel files and it stuck in a loop of authenticating.

10.10.4 released today and now the experimental client won't work for me anymore.

Share this post


Link to post

I'm running OSX 10.9.5 and just installed AirVPN 2.10.1.

 

When I start 2.10.1 up, I get 5 OSX notifications before I hit Connect.tjU3kON.png

 

If I hit Connect, it loops notifications (bong, bong, bong!)

2haODz8.png

 

This may have to do with install location.  My previous Experimental install was installed

with the OSX "Keep both versions" option and ended up in "/Applications/AirVPN copy"

next to the stable version.

 

I deleted both and installed 2.10.1 in /Applications/AirVPN.  Maybe something points to "copy"?

 

The above guess was wrong.  I can install 2.9.2 and it works and install 2.10.1 and it fails as described.

It's a change in 2.10.

Share this post


Link to post

Is there a schedule when an updated client (stable or experimental) will be available? I'm asking because currently the situation is kind of frustrating for me. With the stable client I've got connection issues if network lock is enabled (see https://airvpn.org/topic/14391-connection-iterrupted-reconnect-fails/) and with the experimental client there is the printer issue.

 

I can only speak about the linux client (64 bit, portable), it don't use the Windows version since I do all my internet browsing on a virtual Linux machine.

Since it doesn't look like there is going to be a new version either of the stable client or the experimental one any time soon I'd like to ask one more time if someone knows how to fix printer funcionality (Linux) while netlock is active. As soon as netlock is activated, communication with the network printer is not possible anymore. But  if netlock is disabled printing works again. Neither the "Allow Lan" checkbox nor setting up routes outside the tunnel for certain IPs does fix the problem. Strangely enough I can actually ping the printers IP and it responds. But communication with it does not work. Other Lan connections like FTP to the Fritz Box NAS storage work flawlessly, it's only the printer that is causing troubles.

Share this post


Link to post

Come on, not a single staff member that has got any ideas how to fix this? Or who is at least looking into it? Pretty disappointing in my opinion.

Share this post


Link to post

Come on, not a single staff member that has got any ideas how to fix this? Or who is at least looking into it? Pretty disappointing in my opinion.

 

Hi altae & mods,

 

I can report a similar effect using the experimental client in LMDE2 "Betsy" (32-bit, MATE).

 

In my case, I could not configure (add) a new printer unless I first de-activated the network lock completely. However, unlike your situation altae, I am able to print after having added the printer and re-setting the full network lock. So mods, some fine-tuning is obviously needed for future releases.

 

I can report the experimental client also works completely fine across the following Linux distros (full IPv6 lock down, no DNS leaks evident with testing, IP tables seem tight as a drum?):

 

- OpenSUSE 13.2 Harlequin (32-bit)

- Linux Mint 17.2 Raphaela (MATE, 32-bit)

 

Oddly enough, sometimes the new client will crash on the first run after install, and then runs smoothly thereafter. Only errors in connecting e.g. time-outs, can't verify password, native memory errors - only seem to happen if one connects their router too close to starting up the client i.e. no problem from clean reboot/start up with hard-wired internet connection.

 

These later clients seem to connect more quickily and the number of general errors in logging seem to have tailed off in comparison to earlier versions. There does seem to be a fair slow down in VPN speeds in the evenings in recent times, but presumably this just relates to peak load times and spike in the number of users due to the global police state in formation.   

 

Keep up the good work guys!

Share this post


Link to post

Hello!

 

A new experimental version 2.10.2 is available.
It addresses some issues of our customers.

@altae and @bigbrosbitch: German Umlaute and your issue about printer is still under investigation. Sorry.

@lamictal and @tlc: Please retest with this new version. Please report the logs if the problem persist.

 

Kind regards

Share this post


Link to post

On Ubuntu 14.04 with Mono 4.0.2, installing the .deb file results in unmet dependencies that seem impossible to satisfy. Installing the portable version results in connect loops.

Share this post


Link to post

Hello!

 

A new experimental version 2.10.2 is available.

It addresses some issues of our customers.

 

@altae and @bigbrosbitch: German Umlaute and your issue about printer is still under investigation. Sorry.

 

@lamictal and @tlc: Please retest with this new version. Please report the logs if the problem persist.

 

Kind regards

Thank you. I've already installed the new version and currently I'm testing it. so far it looks good. I will report back as soon as I got more to say.

 

P.S. You should change the title of the thread from 2.10.1 to 2.10.2.

Share this post


Link to post

Guys, printing works again. I've no clue what you changed but as soon as I started using the new version (Linux, 64 bit, portable) printing worked again.

Share this post


Link to post

Guys, printing works again. I've no clue what you changed but as soon as I started using the new version (Linux, 64 bit, portable) printing worked again.

 

Absolutely nothing changed under this respect between 2.10.1 and 2.10.2. Printing under Linux (via CUPS or direct TCP/IP access to a network printer in the local network) has always worked just fine for us.

 

Kind regards

Share this post


Link to post

Installed and working great on my MacBook Pro (Yosemite 10.10.4). I just tried to download the x64 .deb for Linux and gdebi reports it's the same version that I have installed. Have the download links updated properly? Maybe it's another issue?

Share this post


Link to post

installed and working great for the first moment but some time later

 

I 2015.08.14 19:06:27 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64
. 2015.08.14 19:06:38 - Reading options from C:\Users\****\AppData\Local\AirVPN\AirVPN.xml
. 2015.08.14 19:06:49 - Data Path: C:\Users\****\AppData\Local\AirVPN
. 2015.08.14 19:06:49 - App Path: C:\Program Files\AirVPN
. 2015.08.14 19:06:49 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2015.08.14 19:06:49 - Command line arguments (1): path="home"
. 2015.08.14 19:06:50 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1
. 2015.08.14 19:06:50 - Updating systems & servers data ...
I 2015.08.14 19:06:56 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1
I 2015.08.14 19:06:56 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2015.08.14 19:06:56 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2015.08.14 19:06:56 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2015.08.14 19:06:56 - Activation of Network Lock - Windows Firewall
. 2015.08.14 19:06:59 - Systems & servers data update completed
I 2015.08.14 19:07:07 - Session starting.
I 2015.08.14 19:07:18 - Network adapter DHCP switched to static (Qualcomm Atheros AR8171/8175 PCI-E Gigabit Ethernet Controller (NDIS 6.20))
I 2015.08.14 19:07:24 - IPv6 disabled.
I 2015.08.14 19:07:30 - Checking authorization ...
! 2015.08.14 19:07:30 - Connecting to Salm (Netherlands, Alblasserdam)
. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:31 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:31 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:31 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:31 LOG5[ui]: Reading configuration from file C:\Users\****\AppData\Local\AirVPN\8f78d6b3fbb2b59e1d25259d911577e602e39bd770477e9b4e9e7e1e647d0ed1.tmp.ssl
. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:31 LOG5[ui]: UTF-8 byte order mark not detected
. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:31 LOG6[ui]: Initializing service [openvpn]
. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:32 LOG5[ui]: Configuration successful
. 2015.08.14 19:07:32 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2015.08.14 19:07:32 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2015.08.14 19:07:32 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2015.08.14 19:07:32 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2015.08.14 19:07:32 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.08.14 19:07:32 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.08.14 19:07:32 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2015.08.14 19:07:32 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:2791 [nonblock]
. 2015.08.14 19:07:32 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:2791
. 2015.08.14 19:07:32 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2015.08.14 19:07:32 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:2791
. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:32 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:49251
. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:32 LOG6[0]: Failover strategy: round-robin
. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:32 LOG6[0]: s_connect: connecting 213.152.161.21:443
. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:32 LOG5[0]: s_connect: connected 213.152.161.21:443
. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:32 LOG5[0]: Service [openvpn] connected remote server from 10.0.0.86:49252
. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:32 LOG6[0]: SNI: sending servername: 213.152.161.21
. 2015.08.14 19:07:33 - SSL > 2015.08.14 19:07:33 LOG6[0]: CERT: Locally installed certificate matched
. 2015.08.14 19:07:33 - SSL > 2015.08.14 19:07:33 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2015.08.14 19:07:34 - SSL > 2015.08.14 19:07:34 LOG6[0]: SSL connected: new session negotiated
. 2015.08.14 19:07:34 - SSL > 2015.08.14 19:07:34 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2015.08.14 19:07:34 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:2791, sid=7ce27979 7ce05656
. 2015.08.14 19:07:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2015.08.14 19:07:35 - OpenVPN > Validating certificate key usage
. 2015.08.14 19:07:35 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2015.08.14 19:07:35 - OpenVPN > VERIFY KU OK
. 2015.08.14 19:07:35 - OpenVPN > Validating certificate extended key usage
. 2015.08.14 19:07:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2015.08.14 19:07:35 - OpenVPN > VERIFY EKU OK
. 2015.08.14 19:07:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2015.08.14 19:07:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2015.08.14 19:07:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.08.14 19:07:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2015.08.14 19:07:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.08.14 19:07:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2015.08.14 19:07:36 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:2791
. 2015.08.14 19:07:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2015.08.14 19:07:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.23 255.255.0.0'
. 2015.08.14 19:07:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2015.08.14 19:07:39 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2015.08.14 19:07:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2015.08.14 19:07:39 - OpenVPN > OPTIONS IMPORT: route options modified
. 2015.08.14 19:07:39 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2015.08.14 19:07:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2015.08.14 19:07:39 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2015.08.14 19:07:39 - OpenVPN > open_tun, tt->ipv6=0
. 2015.08.14 19:07:39 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 3] opened: \\.\Global\{E2316A80-9BFA-4F3E-81ED-A485321E185C}.tap
. 2015.08.14 19:07:39 - OpenVPN > TAP-Windows Driver Version 9.21
. 2015.08.14 19:07:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.23/255.255.0.0 [sUCCEEDED]
. 2015.08.14 19:07:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.23/255.255.0.0 on interface {E2316A80-9BFA-4F3E-81ED-A485321E185C} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2015.08.14 19:07:39 - OpenVPN > Successful ARP Flush on interface [21] {E2316A80-9BFA-4F3E-81ED-A485321E185C}
. 2015.08.14 19:07:44 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2015.08.14 19:07:44 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 10.0.1.254
. 2015.08.14 19:07:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2015.08.14 19:07:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2015.08.14 19:07:44 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2015.08.14 19:07:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2015.08.14 19:07:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2015.08.14 19:07:44 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2015.08.14 19:07:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2015.08.14 19:07:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2015.08.14 19:07:44 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.21 MASK 255.255.255.255 10.0.1.254
. 2015.08.14 19:07:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
. 2015.08.14 19:07:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2015.08.14 19:07:44 - Starting Management Interface
. 2015.08.14 19:07:44 - OpenVPN > Initialization Sequence Completed
I 2015.08.14 19:07:45 - DNS of a network adapter forced (Qualcomm Atheros AR8171/8175 PCI-E Gigabit Ethernet Controller (NDIS 6.20))
I 2015.08.14 19:07:45 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2015.08.14 19:07:49 - Flushing DNS
I 2015.08.14 19:07:49 - Checking route
. 2015.08.14 19:07:50 - SSL > 2015.08.14 19:07:50 LOG3[0]: SSL_read: Connection reset by peer (WSAECONNRESET) (10054)
. 2015.08.14 19:07:50 - SSL > 2015.08.14 19:07:50 LOG5[0]: Connection reset: 18332 byte(s) sent to SSL, 11127 byte(s) sent to socket
. 2015.08.14 19:07:55 - SSL > 2015.08.14 19:07:55 LOG5[1]: Service [openvpn] accepted connection from 127.0.0.1:49286
. 2015.08.14 19:07:55 - SSL > 2015.08.14 19:07:55 LOG6[1]: Failover strategy: round-robin
. 2015.08.14 19:07:55 - SSL > 2015.08.14 19:07:55 LOG6[1]: s_connect: connecting 213.152.161.21:443
. 2015.08.14 19:07:55 - SSL > 2015.08.14 19:07:55 LOG5[1]: s_connect: connected 213.152.161.21:443
. 2015.08.14 19:07:55 - SSL > 2015.08.14 19:07:55 LOG5[1]: Service [openvpn] connected remote server from 10.0.0.86:49287
. 2015.08.14 19:07:55 - SSL > 2015.08.14 19:07:55 LOG6[1]: SNI: sending servername: 213.152.161.21
. 2015.08.14 19:07:55 - SSL > 2015.08.14 19:07:55 LOG6[1]: SSL connected: previous session reused
W 2015.08.14 19:08:02 - Checking route, 1° try failed (Timeout für Vorgang überschritten)
I 2015.08.14 19:08:04 - Checking DNS
! 2015.08.14 19:08:05 - Connected.
. 2015.08.14 19:08:05 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2015.08.14 19:08:05 - OpenVPN > Connection reset, restarting [-1]
. 2015.08.14 19:08:05 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2015.08.14 19:08:05 - OpenVPN > Restart pause, 5 second(s)
. 2015.08.14 19:08:05 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
. 2015.08.14 19:08:05 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:2791 [nonblock]
. 2015.08.14 19:08:05 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:2791
. 2015.08.14 19:08:05 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2015.08.14 19:08:05 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:2791
. 2015.08.14 19:08:05 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:2791, sid=8a432b90 ee0f56a1
. 2015.08.14 19:08:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2015.08.14 19:08:05 - OpenVPN > Validating certificate key usage
. 2015.08.14 19:08:05 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2015.08.14 19:08:05 - OpenVPN > VERIFY KU OK
. 2015.08.14 19:08:05 - OpenVPN > Validating certificate extended key usage
. 2015.08.14 19:08:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2015.08.14 19:08:05 - OpenVPN > VERIFY EKU OK
. 2015.08.14 19:08:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2015.08.14 19:08:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2015.08.14 19:08:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.08.14 19:08:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2015.08.14 19:08:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.08.14 19:08:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2015.08.14 19:08:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:2791
. 2015.08.14 19:08:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2015.08.14 19:08:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.23 255.255.0.0'
. 2015.08.14 19:08:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2015.08.14 19:08:05 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2015.08.14 19:08:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2015.08.14 19:08:05 - OpenVPN > OPTIONS IMPORT: route options modified
. 2015.08.14 19:08:05 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2015.08.14 19:08:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2015.08.14 19:08:05 - OpenVPN > Preserving previous TUN/TAP instance: LAN-Verbindung 3
. 2015.08.14 19:08:05 - Starting Management Interface
. 2015.08.14 19:08:05 - OpenVPN > Initialization Sequence Completed
! 2015.08.14 19:08:05 - Disconnecting
. 2015.08.14 19:08:05 - Management - Send 'signal SIGTERM'
 

and @ this point it runs into a loop for more then 5 minutes

 

Mvh8owM.jpg

 

and the only way to break it was using the taskmanager. After reboot and new start same problem. For the Moment I am back on stable.

 


Was wir an Niedern rühmen als Geduld, ist blasse Feigheit in der Brust - William Shakespeare

Share this post


Link to post

Never mind. Just realised the debs only report they are version 2.10 (not 2.10.x), hence gdebi thinking there was no version change. I just chose to reinstall anyway, and I'm now running 2.10.3. Thanks anyway.

Share this post


Link to post

​​Hi staff,

 

The upgrade seems to work fine on LMDE2 and Mint 17.2 (32 bit) i.e. Eddie connects, but the dependencies that come bundled don't resolve properly. For example, on my systems:

 

LMDE2 logs show a "2.10.3" version of Eddie, but:

- OpenSSL version = 1.0.1k (not 1.0.2d as promised)

- OpenVPN version = 2.3.4 (not 2.3.8 as promised)

- Stunnel version is okay (5.06)

 

Ditto for Mint 17.2, which shows "2.10.3" in the logs, but the dependencies also don't resolve:

 

- OpenSSL = 1.0.1k (as above)

- OpenVPN version = 2.3.2 (not 2.3.8)

​- Stunnel version = 4.53 (not 5.06)

 

Note that the older versions in synaptic package manager are the latest 'stable' for both distros. I hav been forced to upgrade manually at terminal, and other Linux users may need to do the same.
 

To manually update OpenVPN

​For Ubuntu and Debian users, you can manually upgrade OpenVPN to 2.3.8 like so (then restart the Eddie client):

https://community.openvpn.net/openvpn/wiki/OpenvpnSoftwareRepos

 

 

Adding swupdate.openvpn.net apt repository

We maintain several OpenVPN (OSS) software repositories. To setup the repositories you need to change to the root user. Typically this is done using sudo:

$ sudo -s

Then import the public GPG key that is used to sign the packages:

$ wget -O - https://swupdate.openvpn.net/repos/repo-public.gpg|apt-key add -

Next you need to create a sources.list fragment (as root) so that apt can find the new OpenVPN packages:

$ echo "deb http://swupdate.openvpn.net/apt <osrelease> main" > /etc/apt/sources.list.d/swupdate.openvpn.net.list

Where <osrelease> depends your distribution:

  • squeeze (Debian 6.x)
  • wheezy (Debian 7.x)
  • lucid (Ubuntu 10.04)
  • precise (Ubuntu 12.04)
  • trusty (Ubuntu 14.04)

For example:

$ echo "deb http://swupdate.openvpn.net/apt wheezy main" > /etc/apt/sources.list.d/swupdate.openvpn.net.list

Now you're set for installing OpenVPN. Note that packages built for older operating system releases might work just fine on newer release of the same operating system.

Installing OpenVPN

 

On Debian/Ubuntu use

$ apt-get update && apt-get install openvpn

To manually update OpenSSL and Stunnel to the latest versions

​Linux users can download the source packages from Debian, Ubuntu and so on and build it manually, but this is far too painful. It is better and easier to just:

 

1. Download the package from the 'unstable' repository of your Linux O/S, by temporarily adjusting your repositories list

2. Running an 'update' and only selecting the updates we need (Stunnel, OpenSSL)

​3. Editing the repositories list again to remove the 'unstable' branch

 

​Technically we should not mix 'stable' and 'unstable' versions of software in general given dependencies and so on, but OpenSSL doesn't have a lot (just updates one library) & Stunnel seems to be stand alone when I checked. Also, users report online that in this instance, taking this action does not undermine the stability of their systems or servers.

​Debian/LMDE users

​The OpenSSL version we want in Debian is in the 'Stretch' repository, ditto for LMDE users (you can check your current repositories before hand with "inxi -r") . So, Debian/LMDE2 users:

​1. Edit your /etc/apt/sources.list to include

deb http://ftp.de.debian.org/debian stretch main

 

For LMDE users, you must edit the following file with the above line:

/etc/apt/sources.list.d/official-packages-repositories.list

2. Refresh your update manager cache

​3. Only select for upgrade "OpenSSL", "Stunnel"

​4. Install and then remove the extra line you added to your repositories list

​5. Restart the Eddie client. You should now have OpenSSL 1.0.2d (you can alternatively check with "openssl version" in a terminal) and Stunnel 5.18 showing in your logs

Share this post


Link to post

LMDE2 logs show a "2.10.3" version of Eddie, but:

 

- OpenSSL version = 1.0.1k (not 1.0.2d as promised)

- OpenVPN version = 2.3.4 (not 2.3.8 as promised)

- Stunnel version is okay (5.06)

 

Hello!

 

That's fine. The latest Eddie package includes OpenVPN 2.3.8 (warning: recompiled by us to fix a years ancient and irritating bug) and OpenSSL 1.0.2d but Eddie not does interfere with your Linux system installed packages OpenVPN and OpenSSL, if they are already installed. You always have a free choice.

 

Kind regards

Share this post


Link to post
Guest
This topic is now closed to further replies.

×
×
  • Create New...