jeuia3e9x74uxu6wk0r2u9kdos 30 Posted ... Hi guys! I have an annoying issue:- Yesterday: Eddie Client Experimental 2.11.3 everything perfect. Latency on NL servers around 35-40ms like always and the speed was wow.- Update to 2.11.7- This morning reboot- And the result is what's shown int he screenshot.- Tested speed and latency on speedtest.net, everything smooth and perfect like yesterday evening and always.Attached there is the screenshotHere my connection logsI 2016.11.25 11:32:48 - Session starting.. 2016.11.25 11:32:48 - Unable to understand if IPv6 is active.I 2016.11.25 11:32:48 - Checking authorization ...! 2016.11.25 11:32:48 - Connecting to Mesarthim (Germany, Munich). 2016.11.25 11:32:48 - OpenVPN > OpenVPN 2.3.13 x86_64-unknown-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Nov 3 2016. 2016.11.25 11:32:48 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2016.11.25 11:32:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.25 11:32:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.25 11:32:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.25 11:32:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.25 11:32:48 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]. 2016.11.25 11:32:48 - OpenVPN > UDPv4 link local: [undef]. 2016.11.25 11:32:48 - OpenVPN > UDPv4 link remote: [AF_INET]79.143.191.166:443. 2016.11.25 11:32:48 - OpenVPN > TLS: Initial packet from [AF_INET]79.143.191.166:443, sid=2fb404bb dde49c31. 2016.11.25 11:32:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.25 11:32:49 - OpenVPN > Validating certificate key usage. 2016.11.25 11:32:49 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.25 11:32:49 - OpenVPN > VERIFY KU OK. 2016.11.25 11:32:49 - OpenVPN > Validating certificate extended key usage. 2016.11.25 11:32:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.25 11:32:49 - OpenVPN > VERIFY EKU OK. 2016.11.25 11:32:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.25 11:32:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.25 11:32:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.25 11:32:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.25 11:32:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.25 11:32:49 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.25 11:32:49 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]79.143.191.166:443. 2016.11.25 11:32:51 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.25 11:32:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.24.253 255.255.0.0'. 2016.11.25 11:32:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.25 11:32:51 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.25 11:32:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.25 11:32:51 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.25 11:32:51 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.25 11:32:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.25 11:32:51 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=enp9s0 HWADDR=30:f9:ed:cd:01:2a. 2016.11.25 11:32:51 - OpenVPN > TUN/TAP device tun0 opened. 2016.11.25 11:32:51 - OpenVPN > TUN/TAP TX queue length set to 100. 2016.11.25 11:32:51 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.25 11:32:51 - OpenVPN > /usr/bin/ip link set dev tun0 up mtu 1500. 2016.11.25 11:32:51 - OpenVPN > /usr/bin/ip addr add dev tun0 10.4.24.253/16 broadcast 10.4.255.255. 2016.11.25 11:32:56 - OpenVPN > /usr/bin/ip route add 79.143.191.166/32 via 192.168.1.1. 2016.11.25 11:32:56 - OpenVPN > /usr/bin/ip route add 0.0.0.0/1 via 10.4.0.1. 2016.11.25 11:32:56 - OpenVPN > /usr/bin/ip route add 128.0.0.0/1 via 10.4.0.1. 2016.11.25 11:32:56 - Starting Management Interface. 2016.11.25 11:32:56 - OpenVPN > Initialization Sequence Completed. 2016.11.25 11:32:56 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup. 2016.11.25 11:32:56 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)I 2016.11.25 11:32:56 - Flushing DNSI 2016.11.25 11:32:56 - Checking route! 2016.11.25 11:32:56 - Connected.. 2016.11.25 11:32:56 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.11.25 11:32:56 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info Here my Sys infosSystem: Host: ****Kernel: 4.8.10-1-ARCH x86_64 (64 bit)Desktop: Gnome 3.22.2Distro: Antergos Linux Any idea how to solve this?I can't understand is and Eddie-Mono issue or a bad-routing issue with my ISP. 1 LZ1 reacted to this Quote Share this post Link to post
LZ1 672 Posted ... Hello! First off, what a stellar first post. Detailed, concise, readable, has images and all in spoilers! Is it Christmas? . Nice name as well, although I first thought you were called Jesus lol. Since it said: 2016.11.25 11:32:48 - Unable to understand if IPv6 is active.Maybe it's worth disabling IPv6 entirely, if possible. Anyhow, are you sure that AirVPN ICMPs aren't being blocked by your system or such? Problems related to server timings are often ping-related. Maybe the new client changed the permissions by mistake or something. Quote Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
jeuia3e9x74uxu6wk0r2u9kdos 30 Posted ... Hello! First off, what a stellar first post. Detailed, concise, readable, has images and all in spoilers! Is it Christmas? . Nice name as well, although I first thought you were called Jesus lol. Since it said: 2016.11.25 11:32:48 - Unable to understand if IPv6 is active.Maybe it's worth disabling IPv6 entirely, if possible. Anyhow, are you sure that AirVPN ICMPs aren't being blocked by your system or such? Problems related to server timings are often ping-related. Maybe the new client changed the permissions by mistake or something. Hi LZ1! Thank you for you kindness In order:- Tried to uninstall-reinstall nothing happened- Tried to remove .xml options file nothing- Checked ipv6, i just had to change in eddie setting ipv6 from disable to none Results of pinging the server with EDDIE ON. --- 46.165.208.108 ping statistics ---40 packets transmitted, 40 received, 0% packet loss, time 39052msrtt min/avg/max/mdev = 45.334/46.897/50.327/1.261 ms ping 46.165.208.108PING 46.165.208.108 (46.165.208.108) 56(84) bytes of data.64 bytes from 46.165.208.108: icmp_seq=1 ttl=64 time=45.4 ms64 bytes from 46.165.208.108: icmp_seq=2 ttl=64 time=47.6 ms64 bytes from 46.165.208.108: icmp_seq=3 ttl=64 time=45.9 ms64 bytes from 46.165.208.108: icmp_seq=4 ttl=64 time=49.9 ms64 bytes from 46.165.208.108: icmp_seq=5 ttl=64 time=46.3 ms64 bytes from 46.165.208.108: icmp_seq=6 ttl=64 time=46.1 ms64 bytes from 46.165.208.108: icmp_seq=7 ttl=64 time=46.3 ms64 bytes from 46.165.208.108: icmp_seq=8 ttl=64 time=46.0 ms64 bytes from 46.165.208.108: icmp_seq=9 ttl=64 time=47.4 ms64 bytes from 46.165.208.108: icmp_seq=10 ttl=64 time=45.9 ms64 bytes from 46.165.208.108: icmp_seq=11 ttl=64 time=48.5 ms64 bytes from 46.165.208.108: icmp_seq=12 ttl=64 time=46.9 ms64 bytes from 46.165.208.108: icmp_seq=13 ttl=64 time=45.8 ms64 bytes from 46.165.208.108: icmp_seq=14 ttl=64 time=46.0 ms64 bytes from 46.165.208.108: icmp_seq=15 ttl=64 time=47.4 ms64 bytes from 46.165.208.108: icmp_seq=16 ttl=64 time=45.9 ms64 bytes from 46.165.208.108: icmp_seq=17 ttl=64 time=46.4 ms64 bytes from 46.165.208.108: icmp_seq=18 ttl=64 time=47.3 ms64 bytes from 46.165.208.108: icmp_seq=19 ttl=64 time=47.1 ms64 bytes from 46.165.208.108: icmp_seq=20 ttl=64 time=45.9 ms64 bytes from 46.165.208.108: icmp_seq=21 ttl=64 time=47.5 ms64 bytes from 46.165.208.108: icmp_seq=22 ttl=64 time=47.2 ms64 bytes from 46.165.208.108: icmp_seq=23 ttl=64 time=45.7 ms64 bytes from 46.165.208.108: icmp_seq=24 ttl=64 time=50.0 ms64 bytes from 46.165.208.108: icmp_seq=25 ttl=64 time=50.3 ms64 bytes from 46.165.208.108: icmp_seq=26 ttl=64 time=48.2 ms64 bytes from 46.165.208.108: icmp_seq=27 ttl=64 time=45.6 ms64 bytes from 46.165.208.108: icmp_seq=28 ttl=64 time=46.4 ms64 bytes from 46.165.208.108: icmp_seq=29 ttl=64 time=45.3 ms64 bytes from 46.165.208.108: icmp_seq=30 ttl=64 time=47.3 ms64 bytes from 46.165.208.108: icmp_seq=31 ttl=64 time=45.9 ms64 bytes from 46.165.208.108: icmp_seq=32 ttl=64 time=46.1 ms64 bytes from 46.165.208.108: icmp_seq=33 ttl=64 time=47.6 ms64 bytes from 46.165.208.108: icmp_seq=34 ttl=64 time=45.8 ms64 bytes from 46.165.208.108: icmp_seq=35 ttl=64 time=46.4 ms64 bytes from 46.165.208.108: icmp_seq=36 ttl=64 time=47.6 ms64 bytes from 46.165.208.108: icmp_seq=37 ttl=64 time=45.8 ms64 bytes from 46.165.208.108: icmp_seq=38 ttl=64 time=46.3 ms64 bytes from 46.165.208.108: icmp_seq=39 ttl=64 time=46.2 ms64 bytes from 46.165.208.108: icmp_seq=40 ttl=64 time=48.8 ms --- 46.165.208.108 ping statistics ---40 packets transmitted, 40 received, 0% packet loss, time 39052msrtt min/avg/max/mdev = 45.334/46.897/50.327/1.261 ms With Eddie OFF: --- 46.165.208.108 ping statistics ---12 packets transmitted, 12 received, 0% packet loss, time 11013msrtt min/avg/max/mdev = 44.879/46.921/57.505/3.258 ms ping 46.165.208.108PING 46.165.208.108 (46.165.208.108) 56(84) bytes of data.64 bytes from 46.165.208.108: icmp_seq=1 ttl=55 time=46.1 ms64 bytes from 46.165.208.108: icmp_seq=2 ttl=55 time=46.9 ms64 bytes from 46.165.208.108: icmp_seq=3 ttl=55 time=46.2 ms64 bytes from 46.165.208.108: icmp_seq=4 ttl=55 time=46.0 ms64 bytes from 46.165.208.108: icmp_seq=5 ttl=55 time=57.5 ms64 bytes from 46.165.208.108: icmp_seq=6 ttl=55 time=46.0 ms64 bytes from 46.165.208.108: icmp_seq=7 ttl=55 time=47.0 ms64 bytes from 46.165.208.108: icmp_seq=8 ttl=55 time=45.1 ms64 bytes from 46.165.208.108: icmp_seq=9 ttl=55 time=45.0 ms64 bytes from 46.165.208.108: icmp_seq=10 ttl=55 time=45.7 ms64 bytes from 46.165.208.108: icmp_seq=11 ttl=55 time=46.1 ms64 bytes from 46.165.208.108: icmp_seq=12 ttl=55 time=44.8 ms^C--- 46.165.208.108 ping statistics ---12 packets transmitted, 12 received, 0% packet loss, time 11013msrtt min/avg/max/mdev = 44.879/46.921/57.505/3.258 ms Quote Share this post Link to post
zhang888 1066 Posted ... Those are normal results and this is what matters.For some reason you have higher latency with TCP, in order to troubleshoot it try measuring the rtt usingTCP and hping3: hping3 -c 3 -S -p 443 wezen.airvpn.org Everything ok except for 40 packets transmitted, 40 received, 0% packet loss, time 39052ms This is totally fine as well, in *nix you will see the total time it took you with all the tests.You did your test for 39 seconds, sending 1 packet each second. Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
jeuia3e9x74uxu6wk0r2u9kdos 30 Posted ... Those are normal results and this is what matters.For some reason you have higher latency with TCP, in order to troubleshoot it try measuring the rtt usingTCP and hping3: hping3 -c 3 -S -p 443 wezen.airvpn.org Hi Zhang,this is the result of hping3 -c 3 -S -p 443 wezen.airvpn.org hping3 -c 3 -S -p 443 wezen.airvpn.orgHPING wezen.airvpn.org (tun0 178.162.198.102): S set, 40 headers + 0 data byteslen=44 ip=178.162.198.102 ttl=57 DF id=0 sport=443 flags=SA seq=0 win=29200 rtt=39.9 mslen=44 ip=178.162.198.102 ttl=57 DF id=0 sport=443 flags=SA seq=1 win=29200 rtt=43.1 mslen=44 ip=178.162.198.102 ttl=57 DF id=0 sport=443 flags=SA seq=2 win=29200 rtt=43.0 ms --- wezen.airvpn.org hping statistic ---3 packets tramitted, 3 packets received, 0% packet lossround-trip min/avg/max = 39.9/42.0/43.1 ms Quote Share this post Link to post
zhang888 1066 Posted ... This is a good result as well. Might be a bug in Eddie with your specific distribution. Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
jeuia3e9x74uxu6wk0r2u9kdos 30 Posted ... Thanks Zhang for your support It's just an annoying bug indeed but I've thought it was important to report it both for other users and for the staff Quote Share this post Link to post