Jump to content
Not connected, Your IP: 3.144.41.252

Recommended Posts

I cannot get an external VPN ip with Arch Linux, essentially I can get no incoming connections or outgoing whatsoever. I run it from the command line (sudo openvpn blah.ovpn) I tried some of the troubleshooting inhttps://airvpn.org/topic/12031-vpn-problems-under-archlinux/ nothing fixed it. I am at wits end here.

 

sudo openvpn  --config /etc/openvpn/AirVPN_United-States_UDP-443.ovpn  
Fri Jul  1 10:10:50 2016 OpenVPN 2.3.11 x86_64-unknown-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [MH] [iPv6] built on May 12 2016
Fri Jul  1 10:10:50 2016 library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
Fri Jul  1 10:10:50 2016 Control Channel Authentication: tls-auth using INLINE static key file
Fri Jul  1 10:10:50 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Jul  1 10:10:50 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Jul  1 10:10:50 2016 Socket Buffers: R=[212992->212992] S=[212992->212992]
Fri Jul  1 10:10:50 2016 UDPv4 link local: [undef]
Fri Jul  1 10:10:50 2016 UDPv4 link remote: [AF_INET]173.44.55.178:443
Fri Jul  1 10:10:50 2016 TLS: Initial packet from [AF_INET]173.44.55.178:443, sid=e1fb8f8f d63440ec
Fri Jul  1 10:10:50 2016 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Fri Jul  1 10:10:50 2016 Validating certificate key usage
Fri Jul  1 10:10:50 2016 ++ Certificate has key usage  00a0, expects 00a0
Fri Jul  1 10:10:50 2016 VERIFY KU OK
Fri Jul  1 10:10:50 2016 Validating certificate extended key usage
Fri Jul  1 10:10:50 2016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Jul  1 10:10:50 2016 VERIFY EKU OK
Fri Jul  1 10:10:50 2016 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Fri Jul  1 10:10:50 2016 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Jul  1 10:10:50 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Jul  1 10:10:50 2016 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Jul  1 10:10:50 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Jul  1 10:10:50 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Fri Jul  1 10:10:50 2016 [server] Peer Connection Initiated with [AF_INET]173.44.55.178:443
Fri Jul  1 10:10:53 2016 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Fri Jul  1 10:10:53 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.43.216 255.255.0.0'
Fri Jul  1 10:10:53 2016 OPTIONS IMPORT: timers and/or timeouts modified
Fri Jul  1 10:10:53 2016 OPTIONS IMPORT: LZO parms modified
Fri Jul  1 10:10:53 2016 OPTIONS IMPORT: --ifconfig/up options modified
Fri Jul  1 10:10:53 2016 OPTIONS IMPORT: route options modified
Fri Jul  1 10:10:53 2016 OPTIONS IMPORT: route-related options modified
Fri Jul  1 10:10:53 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Jul  1 10:10:53 2016 ROUTE_GATEWAY 192.168.9.99/255.255.255.0 IFACE=wlp3s0 HWADDR=74:f0:6d:0d:68:66
Fri Jul  1 10:10:53 2016 TUN/TAP device tun0 opened
Fri Jul  1 10:10:53 2016 TUN/TAP TX queue length set to 100
Fri Jul  1 10:10:53 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Fri Jul  1 10:10:53 2016 /usr/bin/ip link set dev tun0 up mtu 1500
Fri Jul  1 10:10:53 2016 /usr/bin/ip addr add dev tun0 10.4.43.216/16 broadcast 10.4.255.255
Fri Jul  1 10:10:58 2016 /usr/bin/ip route add 173.44.55.178/32 via 192.168.9.99
Fri Jul  1 10:10:58 2016 /usr/bin/ip route add 0.0.0.0/1 via 10.4.0.1
Fri Jul  1 10:10:58 2016 /usr/bin/ip route add 128.0.0.0/1 via 10.4.0.1
Fri Jul  1 10:10:58 2016 Initialization Sequence Completed
^C^CFri Jul  1 10:12:07 2016 event_wait : Interrupted system call (code=4)
Fri Jul  1 10:12:07 2016 SIGTERM received, sending exit notification to peer
^CFri Jul  1 10:12:08 2016 event_wait : Interrupted system call (code=4)
Fri Jul  1 10:12:08 2016 /usr/bin/ip route del 173.44.55.178/32
Fri Jul  1 10:12:08 2016 /usr/bin/ip route del 0.0.0.0/1
Fri Jul  1 10:12:08 2016 /usr/bin/ip route del 128.0.0.0/1
Fri Jul  1 10:12:08 2016 Closing TUN/TAP interface
Fri Jul  1 10:12:08 2016 /usr/bin/ip addr del dev tun0 10.4.43.216/16
Fri Jul  1 10:12:08 2016 SIGINT[hard,] received, process exiting

Share this post


Link to post

Fri Jul  1 10:10:58 2016 Initialization Sequence Completed

^C^CFri Jul  1 10:12:07 2016 event_wait : Interrupted system call (code=4)

Fri Jul  1 10:12:07 2016 SIGTERM received, sending exit notification to peer

^CFri Jul  1 10:12:08 2016 event_wait : Interrupted system call (code=4)

 

Why did you interrupt the openvpn process with ^C?

Looks like everything was connected properly before that.


Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees.

Share this post


Link to post

shut off all dhcp dnsmasq junk etc

 

set your local to static

 

doesn't matter if arch or ubuntu or what not

 

don't use network mangler

 

yer good then to go

Share this post


Link to post

I should've specified, I'm also using dnsmasq and dnscrypt, the above troubleshooting didn't work, and this is over wifi

cat /etc/resolv.conf
# Generated by resolvconf
nameserver 127.0.0.1
nameserver 10.4.0.1

 

hally@skynet openvpn % sudo openvpn AirVPN_Canada_UDP-443.ovpn 
[sudo] password for hally: 
Fri Jul  1 17:52:51 2016 OpenVPN 2.3.11 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on May 12 2016
Fri Jul  1 17:52:51 2016 library versions: OpenSSL 1.0.2h  3 May 2016, LZO 2.09
Fri Jul  1 17:52:51 2016 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Fri Jul  1 17:52:51 2016 Control Channel Authentication: tls-auth using INLINE static key file
Fri Jul  1 17:52:51 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Jul  1 17:52:51 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Jul  1 17:52:51 2016 Socket Buffers: R=[212992->212992] S=[212992->212992]
Fri Jul  1 17:52:51 2016 UDPv4 link local: [undef]
Fri Jul  1 17:52:51 2016 UDPv4 link remote: [AF_INET]199.19.94.132:443
Fri Jul  1 17:52:51 2016 TLS: Initial packet from [AF_INET]199.19.94.132:443, sid=75bf79f3 78a54fb0
Fri Jul  1 17:52:51 2016 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Fri Jul  1 17:52:51 2016 Validating certificate key usage
Fri Jul  1 17:52:51 2016 ++ Certificate has key usage  00a0, expects 00a0
Fri Jul  1 17:52:51 2016 VERIFY KU OK
Fri Jul  1 17:52:51 2016 Validating certificate extended key usage
Fri Jul  1 17:52:51 2016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Jul  1 17:52:51 2016 VERIFY EKU OK
Fri Jul  1 17:52:51 2016 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Fri Jul  1 17:52:52 2016 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Jul  1 17:52:52 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Jul  1 17:52:52 2016 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Jul  1 17:52:52 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Jul  1 17:52:52 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Fri Jul  1 17:52:52 2016 [server] Peer Connection Initiated with [AF_INET]199.19.94.132:443
Fri Jul  1 17:52:54 2016 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Fri Jul  1 17:52:54 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.66.17 255.255.0.0'
Fri Jul  1 17:52:54 2016 OPTIONS IMPORT: timers and/or timeouts modified
Fri Jul  1 17:52:54 2016 OPTIONS IMPORT: LZO parms modified
Fri Jul  1 17:52:54 2016 OPTIONS IMPORT: --ifconfig/up options modified
Fri Jul  1 17:52:54 2016 OPTIONS IMPORT: route options modified
Fri Jul  1 17:52:54 2016 OPTIONS IMPORT: route-related options modified
Fri Jul  1 17:52:54 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Jul  1 17:52:54 2016 ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp3s0 HWADDR=74:f0:6d:0d:68:66
Fri Jul  1 17:52:54 2016 TUN/TAP device tun0 opened
Fri Jul  1 17:52:54 2016 TUN/TAP TX queue length set to 100
Fri Jul  1 17:52:54 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Fri Jul  1 17:52:54 2016 /usr/bin/ip link set dev tun0 up mtu 1500
Fri Jul  1 17:52:54 2016 /usr/bin/ip addr add dev tun0 10.4.66.17/16 broadcast 10.4.255.255
Fri Jul  1 17:52:54 2016 /etc/openvpn/update-resolv-conf tun0 1500 1558 10.4.66.17 255.255.0.0 init
dhcp-option DNS 10.4.0.1
Fri Jul  1 17:52:59 2016 /usr/bin/ip route add 199.19.94.132/32 via 192.168.43.1
Fri Jul  1 17:52:59 2016 /usr/bin/ip route add 0.0.0.0/1 via 10.4.0.1
Fri Jul  1 17:52:59 2016 /usr/bin/ip route add 128.0.0.0/1 via 10.4.0.1
Fri Jul  1 17:52:59 2016 Initialization Sequence Completed

pinging google.com does nothing and nothing can connect and according to my netinfo function I have no external IP

Share this post


Link to post

Interestingly, it does work if I connect immediately after switching wifi networks from my home to mobile hotspot and back again. If I disconnect from the vpn after, it breaks it and I get the same no connection issue (when all looks fine) any ideas?

Share this post


Link to post

Hello !

That's nice. OP in the future, please use spoiler tags. But more importantly right now, click the "Mark As Solution" button in the bottom right of your last post please .

 

That'll help.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...