Staff 9972 Posted ... Hello! Our free and open source client Eddie 2.10.1 Experimental is now available. Feel free to test it, it includes several bugfixes from version 2.9.2 Stable. Remember that it's an experimental version which passed alpha testing but is still in beta testing. If you wish to test it, you can download it in the download page for your system. Click "Other versions" then select "Experimental". Your feedback will be very much appreciated. Changelog: https://airvpn.org/services/changelog.php?software=client&format=html Kind regards UPDATE 13-Aug-15: Eddie 2.10.3 Experimental is now available https://airvpn.org/topic/14491-eddie-2101-experimental-available/?p=30952 1 skipper reacted to this Share this post Link to post
S.O.A. 83 Posted ... Seems to be working well on Mac OSX Yosemite 10.10.3. I'll report back if this changes. I like the new OSX icon by the way. Share this post Link to post
encrypted 13 Posted ... I gave the Eddie 2.10.1 Experimental a go and have nothing to report. It works just like 2.10 here without any issues. On a completely unrelated note, has anyone tried porting Eddie to a text-based version while we wait for the native non-Mono version some day? (not that there's any rush). I still enjoy using some ncurses apps (*) and something called MonoCurses caught my eye. (*) not excluding times when boss catches me playing some game but doesn't realize I'm actually just playing. Share this post Link to post
altae 22 Posted ... It's not possible to enter a password that contains German Umlaute (ä, ö, ü). It was possible with the former experimental client though. I can't tell if it's the same with the Windows client since so far I have only used the experimental client for Linux (portable version). Share this post Link to post
altae 22 Posted ... One more glitch: I have not yet managed to get the printer working while netlock is active. I excluded the printer's ip from the tunnel in the settings like I did with the former version of the experimental client, I have been able to ping the printer but I cannot print anything unless netlock is disabled. If I go to the printer settings (Linux Mint 17.1 KDE, 64 bit) it says "Printer offline" so apparently there is something wrong with the routing of the communication with the printer (or with the firewall rules). Share this post Link to post
altae 22 Posted ... Ok, I was able to restore printer functionality by completely disabling netlock, deactivating the "allow lan/ private" check box and removing my "outside the tunnel" rules. Then I reactivated the "allow lan/ private" check box and re-entered the "outside the tunnel" rule. Afterwards I reactivated netlock and now printing works again. But the bug with the German Umlaute persists. Share this post Link to post
bigdaddy 1 Posted ... Seems to be working well on Mac OSX Yosemite 10.10.3. I'll report back if this changes. I like the new OSX icon by the way. It does not work on 10.10.4 however. It cannot find OpenVPN or ssltunnel files and it stuck in a loop of authenticating. Share this post Link to post
altae 22 Posted ... Ok, I was able to restore printer functionality by completely disabling netlock, deactivating the "allow lan/ private" check box and removing my "outside the tunnel" rules. Then I reactivated the "allow lan/ private" check box and re-entered the "outside the tunnel" rule. Afterwards I reactivated netlock and now printing works again. But the bug with the German Umlaute persists. I have to withdraw the statement I made in the quoted post. Printer functionality does not work reliably if network lock is enabled. Sometimes it can make it work as follows: Disable network lock, untick and tick the "allow lan" checkbox again, delete and enter the ip of the printer in the routing table (out of the tunnel) again and then reactivate network lock. But it's not persistent and printer functionality is gone again with the next (re)start of Eddie. Share this post Link to post
altae 22 Posted ... Is there a schedule when an updated client (stable or experimental) will be available? I'm asking because currently the situation is kind of frustrating for me. With the stable client I've got connection issues if network lock is enabled (see https://airvpn.org/topic/14391-connection-iterrupted-reconnect-fails/) and with the experimental client there is the printer issue. I can only speak about the linux client (64 bit, portable), it don't use the Windows version since I do all my internet browsing on a virtual Linux machine. Share this post Link to post
lamictal 0 Posted ... It does not work on 10.10.4 however. It cannot find OpenVPN or ssltunnel files and it stuck in a loop of authenticating.10.10.4 released today and now the experimental client won't work for me anymore. Share this post Link to post
tlc 1 Posted ... I'm running OSX 10.9.5 and just installed AirVPN 2.10.1. When I start 2.10.1 up, I get 5 OSX notifications before I hit Connect. If I hit Connect, it loops notifications (bong, bong, bong!) This may have to do with install location. My previous Experimental install was installedwith the OSX "Keep both versions" option and ended up in "/Applications/AirVPN copy"next to the stable version. I deleted both and installed 2.10.1 in /Applications/AirVPN. Maybe something points to "copy"? The above guess was wrong. I can install 2.9.2 and it works and install 2.10.1 and it fails as described.It's a change in 2.10. Share this post Link to post
altae 22 Posted ... Is there a schedule when an updated client (stable or experimental) will be available? I'm asking because currently the situation is kind of frustrating for me. With the stable client I've got connection issues if network lock is enabled (see https://airvpn.org/topic/14391-connection-iterrupted-reconnect-fails/) and with the experimental client there is the printer issue. I can only speak about the linux client (64 bit, portable), it don't use the Windows version since I do all my internet browsing on a virtual Linux machine.Since it doesn't look like there is going to be a new version either of the stable client or the experimental one any time soon I'd like to ask one more time if someone knows how to fix printer funcionality (Linux) while netlock is active. As soon as netlock is activated, communication with the network printer is not possible anymore. But if netlock is disabled printing works again. Neither the "Allow Lan" checkbox nor setting up routes outside the tunnel for certain IPs does fix the problem. Strangely enough I can actually ping the printers IP and it responds. But communication with it does not work. Other Lan connections like FTP to the Fritz Box NAS storage work flawlessly, it's only the printer that is causing troubles. Share this post Link to post
altae 22 Posted ... Come on, not a single staff member that has got any ideas how to fix this? Or who is at least looking into it? Pretty disappointing in my opinion. Share this post Link to post
bigbrosbitch 65 Posted ... Come on, not a single staff member that has got any ideas how to fix this? Or who is at least looking into it? Pretty disappointing in my opinion. Hi altae & mods, I can report a similar effect using the experimental client in LMDE2 "Betsy" (32-bit, MATE). In my case, I could not configure (add) a new printer unless I first de-activated the network lock completely. However, unlike your situation altae, I am able to print after having added the printer and re-setting the full network lock. So mods, some fine-tuning is obviously needed for future releases. I can report the experimental client also works completely fine across the following Linux distros (full IPv6 lock down, no DNS leaks evident with testing, IP tables seem tight as a drum?): - OpenSUSE 13.2 Harlequin (32-bit)- Linux Mint 17.2 Raphaela (MATE, 32-bit) Oddly enough, sometimes the new client will crash on the first run after install, and then runs smoothly thereafter. Only errors in connecting e.g. time-outs, can't verify password, native memory errors - only seem to happen if one connects their router too close to starting up the client i.e. no problem from clean reboot/start up with hard-wired internet connection. These later clients seem to connect more quickily and the number of general errors in logging seem to have tailed off in comparison to earlier versions. There does seem to be a fair slow down in VPN speeds in the evenings in recent times, but presumably this just relates to peak load times and spike in the number of users due to the global police state in formation. Keep up the good work guys! Share this post Link to post
Staff 9972 Posted ... Hello! A new experimental version 2.10.2 is available.It addresses some issues of our customers.@altae and @bigbrosbitch: German Umlaute and your issue about printer is still under investigation. Sorry.@lamictal and @tlc: Please retest with this new version. Please report the logs if the problem persist. Kind regards Share this post Link to post
politas 0 Posted ... On Ubuntu 14.04 with Mono 4.0.2, installing the .deb file results in unmet dependencies that seem impossible to satisfy. Installing the portable version results in connect loops. Share this post Link to post
altae 22 Posted ... Hello! A new experimental version 2.10.2 is available.It addresses some issues of our customers. @altae and @bigbrosbitch: German Umlaute and your issue about printer is still under investigation. Sorry. @lamictal and @tlc: Please retest with this new version. Please report the logs if the problem persist. Kind regardsThank you. I've already installed the new version and currently I'm testing it. so far it looks good. I will report back as soon as I got more to say. P.S. You should change the title of the thread from 2.10.1 to 2.10.2. Share this post Link to post
altae 22 Posted ... Guys, printing works again. I've no clue what you changed but as soon as I started using the new version (Linux, 64 bit, portable) printing worked again. Share this post Link to post
Staff 9972 Posted ... Guys, printing works again. I've no clue what you changed but as soon as I started using the new version (Linux, 64 bit, portable) printing worked again. Absolutely nothing changed under this respect between 2.10.1 and 2.10.2. Printing under Linux (via CUPS or direct TCP/IP access to a network printer in the local network) has always worked just fine for us. Kind regards Share this post Link to post
Staff 9972 Posted ... Hello! A new experimental version 2.10.3 is available. Bundled with OpenVPN 2.3.8 (OpenSSL 1.0.2d), graphics improvement for better Windows 10 compatibility. 3 nestegg101, snaggle and rainmakerraw reacted to this Share this post Link to post
rainmakerraw 94 Posted ... Installed and working great on my MacBook Pro (Yosemite 10.10.4). I just tried to download the x64 .deb for Linux and gdebi reports it's the same version that I have installed. Have the download links updated properly? Maybe it's another issue? Share this post Link to post
just-me 3 Posted ... installed and working great for the first moment but some time later I 2015.08.14 19:06:27 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64. 2015.08.14 19:06:38 - Reading options from C:\Users\****\AppData\Local\AirVPN\AirVPN.xml. 2015.08.14 19:06:49 - Data Path: C:\Users\****\AppData\Local\AirVPN. 2015.08.14 19:06:49 - App Path: C:\Program Files\AirVPN. 2015.08.14 19:06:49 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe. 2015.08.14 19:06:49 - Command line arguments (1): path="home". 2015.08.14 19:06:50 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1. 2015.08.14 19:06:50 - Updating systems & servers data ...I 2015.08.14 19:06:56 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1I 2015.08.14 19:06:56 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)I 2015.08.14 19:06:56 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)I 2015.08.14 19:06:56 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)! 2015.08.14 19:06:56 - Activation of Network Lock - Windows Firewall. 2015.08.14 19:06:59 - Systems & servers data update completedI 2015.08.14 19:07:07 - Session starting.I 2015.08.14 19:07:18 - Network adapter DHCP switched to static (Qualcomm Atheros AR8171/8175 PCI-E Gigabit Ethernet Controller (NDIS 6.20))I 2015.08.14 19:07:24 - IPv6 disabled.I 2015.08.14 19:07:30 - Checking authorization ...! 2015.08.14 19:07:30 - Connecting to Salm (Netherlands, Alblasserdam). 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:31 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:31 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:31 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:31 LOG5[ui]: Reading configuration from file C:\Users\****\AppData\Local\AirVPN\8f78d6b3fbb2b59e1d25259d911577e602e39bd770477e9b4e9e7e1e647d0ed1.tmp.ssl. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:31 LOG5[ui]: UTF-8 byte order mark not detected. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:31 LOG6[ui]: Initializing service [openvpn]. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:32 LOG5[ui]: Configuration successful. 2015.08.14 19:07:32 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2015.08.14 19:07:32 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2015.08.14 19:07:32 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2015.08.14 19:07:32 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2015.08.14 19:07:32 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.08.14 19:07:32 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.08.14 19:07:32 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2015.08.14 19:07:32 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:2791 [nonblock]. 2015.08.14 19:07:32 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:2791. 2015.08.14 19:07:32 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2015.08.14 19:07:32 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:2791. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:32 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:49251. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:32 LOG6[0]: Failover strategy: round-robin. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:32 LOG6[0]: s_connect: connecting 213.152.161.21:443. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:32 LOG5[0]: s_connect: connected 213.152.161.21:443. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:32 LOG5[0]: Service [openvpn] connected remote server from 10.0.0.86:49252. 2015.08.14 19:07:32 - SSL > 2015.08.14 19:07:32 LOG6[0]: SNI: sending servername: 213.152.161.21. 2015.08.14 19:07:33 - SSL > 2015.08.14 19:07:33 LOG6[0]: CERT: Locally installed certificate matched. 2015.08.14 19:07:33 - SSL > 2015.08.14 19:07:33 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org. 2015.08.14 19:07:34 - SSL > 2015.08.14 19:07:34 LOG6[0]: SSL connected: new session negotiated. 2015.08.14 19:07:34 - SSL > 2015.08.14 19:07:34 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2015.08.14 19:07:34 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:2791, sid=7ce27979 7ce05656. 2015.08.14 19:07:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2015.08.14 19:07:35 - OpenVPN > Validating certificate key usage. 2015.08.14 19:07:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2015.08.14 19:07:35 - OpenVPN > VERIFY KU OK. 2015.08.14 19:07:35 - OpenVPN > Validating certificate extended key usage. 2015.08.14 19:07:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2015.08.14 19:07:35 - OpenVPN > VERIFY EKU OK. 2015.08.14 19:07:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2015.08.14 19:07:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2015.08.14 19:07:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.08.14 19:07:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2015.08.14 19:07:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.08.14 19:07:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2015.08.14 19:07:36 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:2791. 2015.08.14 19:07:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2015.08.14 19:07:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.23 255.255.0.0'. 2015.08.14 19:07:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2015.08.14 19:07:39 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2015.08.14 19:07:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2015.08.14 19:07:39 - OpenVPN > OPTIONS IMPORT: route options modified. 2015.08.14 19:07:39 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2015.08.14 19:07:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2015.08.14 19:07:39 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2015.08.14 19:07:39 - OpenVPN > open_tun, tt->ipv6=0. 2015.08.14 19:07:39 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 3] opened: \\.\Global\{E2316A80-9BFA-4F3E-81ED-A485321E185C}.tap. 2015.08.14 19:07:39 - OpenVPN > TAP-Windows Driver Version 9.21. 2015.08.14 19:07:39 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.23/255.255.0.0 [sUCCEEDED]. 2015.08.14 19:07:39 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.23/255.255.0.0 on interface {E2316A80-9BFA-4F3E-81ED-A485321E185C} [DHCP-serv: 10.50.255.254, lease-time: 31536000]. 2015.08.14 19:07:39 - OpenVPN > Successful ARP Flush on interface [21] {E2316A80-9BFA-4F3E-81ED-A485321E185C}. 2015.08.14 19:07:44 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up. 2015.08.14 19:07:44 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 10.0.1.254. 2015.08.14 19:07:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2015.08.14 19:07:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2015.08.14 19:07:44 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2015.08.14 19:07:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2015.08.14 19:07:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2015.08.14 19:07:44 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2015.08.14 19:07:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2015.08.14 19:07:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2015.08.14 19:07:44 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.21 MASK 255.255.255.255 10.0.1.254. 2015.08.14 19:07:44 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2015.08.14 19:07:44 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2015.08.14 19:07:44 - Starting Management Interface. 2015.08.14 19:07:44 - OpenVPN > Initialization Sequence CompletedI 2015.08.14 19:07:45 - DNS of a network adapter forced (Qualcomm Atheros AR8171/8175 PCI-E Gigabit Ethernet Controller (NDIS 6.20))I 2015.08.14 19:07:45 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2015.08.14 19:07:49 - Flushing DNSI 2015.08.14 19:07:49 - Checking route. 2015.08.14 19:07:50 - SSL > 2015.08.14 19:07:50 LOG3[0]: SSL_read: Connection reset by peer (WSAECONNRESET) (10054). 2015.08.14 19:07:50 - SSL > 2015.08.14 19:07:50 LOG5[0]: Connection reset: 18332 byte(s) sent to SSL, 11127 byte(s) sent to socket. 2015.08.14 19:07:55 - SSL > 2015.08.14 19:07:55 LOG5[1]: Service [openvpn] accepted connection from 127.0.0.1:49286. 2015.08.14 19:07:55 - SSL > 2015.08.14 19:07:55 LOG6[1]: Failover strategy: round-robin. 2015.08.14 19:07:55 - SSL > 2015.08.14 19:07:55 LOG6[1]: s_connect: connecting 213.152.161.21:443. 2015.08.14 19:07:55 - SSL > 2015.08.14 19:07:55 LOG5[1]: s_connect: connected 213.152.161.21:443. 2015.08.14 19:07:55 - SSL > 2015.08.14 19:07:55 LOG5[1]: Service [openvpn] connected remote server from 10.0.0.86:49287. 2015.08.14 19:07:55 - SSL > 2015.08.14 19:07:55 LOG6[1]: SNI: sending servername: 213.152.161.21. 2015.08.14 19:07:55 - SSL > 2015.08.14 19:07:55 LOG6[1]: SSL connected: previous session reusedW 2015.08.14 19:08:02 - Checking route, 1° try failed (Timeout für Vorgang überschritten)I 2015.08.14 19:08:04 - Checking DNS! 2015.08.14 19:08:05 - Connected.. 2015.08.14 19:08:05 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2015.08.14 19:08:05 - OpenVPN > Connection reset, restarting [-1]. 2015.08.14 19:08:05 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting. 2015.08.14 19:08:05 - OpenVPN > Restart pause, 5 second(s). 2015.08.14 19:08:05 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]. 2015.08.14 19:08:05 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:2791 [nonblock]. 2015.08.14 19:08:05 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:2791. 2015.08.14 19:08:05 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2015.08.14 19:08:05 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:2791. 2015.08.14 19:08:05 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:2791, sid=8a432b90 ee0f56a1. 2015.08.14 19:08:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2015.08.14 19:08:05 - OpenVPN > Validating certificate key usage. 2015.08.14 19:08:05 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2015.08.14 19:08:05 - OpenVPN > VERIFY KU OK. 2015.08.14 19:08:05 - OpenVPN > Validating certificate extended key usage. 2015.08.14 19:08:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2015.08.14 19:08:05 - OpenVPN > VERIFY EKU OK. 2015.08.14 19:08:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2015.08.14 19:08:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2015.08.14 19:08:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.08.14 19:08:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2015.08.14 19:08:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.08.14 19:08:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2015.08.14 19:08:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:2791. 2015.08.14 19:08:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2015.08.14 19:08:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.23 255.255.0.0'. 2015.08.14 19:08:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2015.08.14 19:08:05 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2015.08.14 19:08:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2015.08.14 19:08:05 - OpenVPN > OPTIONS IMPORT: route options modified. 2015.08.14 19:08:05 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2015.08.14 19:08:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2015.08.14 19:08:05 - OpenVPN > Preserving previous TUN/TAP instance: LAN-Verbindung 3. 2015.08.14 19:08:05 - Starting Management Interface. 2015.08.14 19:08:05 - OpenVPN > Initialization Sequence Completed! 2015.08.14 19:08:05 - Disconnecting. 2015.08.14 19:08:05 - Management - Send 'signal SIGTERM' and @ this point it runs into a loop for more then 5 minutes and the only way to break it was using the taskmanager. After reboot and new start same problem. For the Moment I am back on stable. Hide just-me's signature Hide all signatures Was wir an Niedern rühmen als Geduld, ist blasse Feigheit in der Brust - William Shakespeare Share this post Link to post
rainmakerraw 94 Posted ... Never mind. Just realised the debs only report they are version 2.10 (not 2.10.x), hence gdebi thinking there was no version change. I just chose to reinstall anyway, and I'm now running 2.10.3. Thanks anyway. Share this post Link to post
bigbrosbitch 65 Posted ... Hi staff, The upgrade seems to work fine on LMDE2 and Mint 17.2 (32 bit) i.e. Eddie connects, but the dependencies that come bundled don't resolve properly. For example, on my systems: LMDE2 logs show a "2.10.3" version of Eddie, but:- OpenSSL version = 1.0.1k (not 1.0.2d as promised)- OpenVPN version = 2.3.4 (not 2.3.8 as promised)- Stunnel version is okay (5.06) Ditto for Mint 17.2, which shows "2.10.3" in the logs, but the dependencies also don't resolve: - OpenSSL = 1.0.1k (as above)- OpenVPN version = 2.3.2 (not 2.3.8)- Stunnel version = 4.53 (not 5.06) Note that the older versions in synaptic package manager are the latest 'stable' for both distros. I hav been forced to upgrade manually at terminal, and other Linux users may need to do the same. To manually update OpenVPNFor Ubuntu and Debian users, you can manually upgrade OpenVPN to 2.3.8 like so (then restart the Eddie client):https://community.openvpn.net/openvpn/wiki/OpenvpnSoftwareRepos Adding swupdate.openvpn.net apt repositoryWe maintain several OpenVPN (OSS) software repositories. To setup the repositories you need to change to the root user. Typically this is done using sudo:$ sudo -sThen import the public GPG key that is used to sign the packages:$ wget -O - https://swupdate.openvpn.net/repos/repo-public.gpg|apt-key add -Next you need to create a sources.list fragment (as root) so that apt can find the new OpenVPN packages:$ echo "deb http://swupdate.openvpn.net/apt <osrelease> main" > /etc/apt/sources.list.d/swupdate.openvpn.net.listWhere <osrelease> depends your distribution:squeeze (Debian 6.x)wheezy (Debian 7.x)lucid (Ubuntu 10.04)precise (Ubuntu 12.04)trusty (Ubuntu 14.04)For example:$ echo "deb http://swupdate.openvpn.net/apt wheezy main" > /etc/apt/sources.list.d/swupdate.openvpn.net.listNow you're set for installing OpenVPN. Note that packages built for older operating system releases might work just fine on newer release of the same operating system.Installing OpenVPN On Debian/Ubuntu use$ apt-get update && apt-get install openvpn To manually update OpenSSL and Stunnel to the latest versionsLinux users can download the source packages from Debian, Ubuntu and so on and build it manually, but this is far too painful. It is better and easier to just: 1. Download the package from the 'unstable' repository of your Linux O/S, by temporarily adjusting your repositories list2. Running an 'update' and only selecting the updates we need (Stunnel, OpenSSL)3. Editing the repositories list again to remove the 'unstable' branch Technically we should not mix 'stable' and 'unstable' versions of software in general given dependencies and so on, but OpenSSL doesn't have a lot (just updates one library) & Stunnel seems to be stand alone when I checked. Also, users report online that in this instance, taking this action does not undermine the stability of their systems or servers.Debian/LMDE usersThe OpenSSL version we want in Debian is in the 'Stretch' repository, ditto for LMDE users (you can check your current repositories before hand with "inxi -r") . So, Debian/LMDE2 users:1. Edit your /etc/apt/sources.list to includedeb http://ftp.de.debian.org/debian stretch main For LMDE users, you must edit the following file with the above line:/etc/apt/sources.list.d/official-packages-repositories.list2. Refresh your update manager cache3. Only select for upgrade "OpenSSL", "Stunnel"4. Install and then remove the extra line you added to your repositories list5. Restart the Eddie client. You should now have OpenSSL 1.0.2d (you can alternatively check with "openssl version" in a terminal) and Stunnel 5.18 showing in your logs Share this post Link to post
Staff 9972 Posted ... LMDE2 logs show a "2.10.3" version of Eddie, but: - OpenSSL version = 1.0.1k (not 1.0.2d as promised)- OpenVPN version = 2.3.4 (not 2.3.8 as promised)- Stunnel version is okay (5.06) Hello! That's fine. The latest Eddie package includes OpenVPN 2.3.8 (warning: recompiled by us to fix a years ancient and irritating bug) and OpenSSL 1.0.2d but Eddie not does interfere with your Linux system installed packages OpenVPN and OpenSSL, if they are already installed. You always have a free choice. Kind regards Share this post Link to post