Jump to content
Not connected, Your IP: 3.226.254.115

Recommended Posts

Hello,

 

While Airvnp works fine on MacOs, Kali Linux i386 and even Windows10, I just can't seem to get it working on Kali Linux 64. Eddie will not install either with the .dep or tar.gz packages (don't get me started with mono!), and using sudo ovpn will not get me connected. 

 

Does somebody else have this issue and maybe a workaround?

 

Thx in advance and happy holidays!

Share this post


Link to post

Hello!

 

Are you using the Beta client? If not, then check my sig.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.


Tired of Windows? Why Linux Is Better.

Share this post


Link to post

I have the problem with version 2.10, which is the latest stable version, and with the "Experimental" (Beta?) client.

Share this post


Link to post

Experimental/Beta, same thing .

 

Have you tried the portable Beta version?


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.


Tired of Windows? Why Linux Is Better.

Share this post


Link to post

Yes. Now I get:

 

I 2016.12.24 02:09:08 - Eddie client version: 2.11.9 / linux_x64, System: Linux, Name: Kali GNU/Linux Rolling \n \l, Mono/.Net Framework: v4.0.30319
. 2016.12.24 02:09:08 - Reading options from /root/.airvpn/AirVPN.xml
I 2016.12.24 02:09:08 - Press 'X' to Cancel, 'N' to connect/reconnect to the best available server.
. 2016.12.24 02:09:08 - Data path: /root/.airvpn
. 2016.12.24 02:09:08 - Application path: /usr/lib/AirVPN
. 2016.12.24 02:09:08 - Executable path: /usr/lib/AirVPN/AirVPN.exe
. 2016.12.24 02:09:08 - Command line arguments (2): path="/root/.airvpn" cli="True"
. 2016.12.24 02:09:08 - Operating System: Unix 4.8.0.2 - Linux Kali-Arbeitszimmer 4.8.0-kali2-amd64 #1 SMP Debian 4.8.11-1kali1 (2016-12-08) x86_64 GNU/Linux
I 2016.12.24 02:09:08 - OpenVPN Driver - Found, /dev/net/tun
I 2016.12.24 02:09:08 - OpenVPN - Version: 2.4_rc1 - OpenSSL 1.0.2j  26 Sep 2016, LZO 2.08 (/usr/sbin/openvpn)
I 2016.12.24 02:09:08 - SSH - Version: OpenSSH_7.3p1 Debian-5, OpenSSL 1.0.2j  26 Sep 2016 (/usr/bin/ssh)
I 2016.12.24 02:09:08 - SSL - Version: stunnel 5.38 (/usr/bin/stunnel4)
I 2016.12.24 02:09:08 - Checking login ...
. 2016.12.24 02:09:08 - Updating systems & servers data ...
! 2016.12.24 02:09:09 - Logged in.
I 2016.12.24 02:09:09 - Session starting.
. 2016.12.24 02:09:09 - Unable to understand if IPv6 is active.
F 2016.12.24 02:09:09 - No server available.
 

... but no client.

 

Great sig BTW.

Share this post


Link to post

I seem to be a bit further with the portable version now, as Eddie will run if i use "sudo airvpn --help".
However, the problem now is that Eddie says I am using all three of my allowed connections (which is BS), so it's a cycle of retries and getting kicked out of a server.

Now what?

Share this post


Link to post

Go to your client area and disconnect devices. Then see if you can turn IPv6 off in your system

 

And thank you.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.


Tired of Windows? Why Linux Is Better.

Share this post


Link to post

Done that. Same difference:

 

root@Kali-Arbeitszimmer:~# airvpn
I 2016.12.24 13:15:11 - Eddie client version: 2.11.9 / linux_x64, System: Linux, Name: Kali GNU/Linux Rolling \n \l, Mono/.Net Framework: v4.0.30319
. 2016.12.24 13:15:11 - Reading options from /root/.airvpn/AirVPN.xml
. 2016.12.24 13:15:13 - Data path: /root/.airvpn
. 2016.12.24 13:15:13 - Application path: /usr/lib/AirVPN
. 2016.12.24 13:15:13 - Executable path: /usr/lib/AirVPN/AirVPN.exe
. 2016.12.24 13:15:13 - Command line arguments (1): path="/root/.airvpn"
. 2016.12.24 13:15:13 - Operating System: Unix 4.8.0.2 - Linux Kali-Arbeitszimmer 4.8.0-kali2-amd64 #1 SMP Debian 4.8.11-1kali1 (2016-12-08) x86_64 GNU/Linux
I 2016.12.24 13:15:13 - OpenVPN Driver - Found, /dev/net/tun
I 2016.12.24 13:15:13 - OpenVPN - Version: 2.4_rc1 - OpenSSL 1.0.2j  26 Sep 2016, LZO 2.08 (/usr/sbin/openvpn)
I 2016.12.24 13:15:13 - SSH - Version: OpenSSH_7.3p1 Debian-5, OpenSSL 1.0.2j  26 Sep 2016 (/usr/bin/ssh)
I 2016.12.24 13:15:13 - SSL - Version: stunnel 5.38 (/usr/bin/stunnel4)
. 2016.12.24 13:15:13 - Updating systems & servers data ...
I 2016.12.24 13:15:13 - Session starting.
. 2016.12.24 13:15:13 - Unable to understand if IPv6 is active.
. 2016.12.24 13:15:14 - Systems & servers data update completed
I 2016.12.24 13:15:23 - Checking authorization ...
! 2016.12.24 13:15:23 - Connecting to Alwaid (Canada, Toronto, Ontario)
. 2016.12.24 13:15:23 - OpenVPN > OpenVPN 2.4_rc1 [git:master/f2137fedb30cb874+] x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 12 2016
. 2016.12.24 13:15:23 - OpenVPN > library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.08
. 2016.12.24 13:15:23 - OpenVPN > setsockopt(IPV6_V6ONLY=0)
. 2016.12.24 13:15:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET6]::1:3100
. 2016.12.24 13:15:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.24 13:15:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.24 13:15:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.114:443
. 2016.12.24 13:15:23 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2016.12.24 13:15:23 - OpenVPN > UDP link local: (not bound)
. 2016.12.24 13:15:23 - OpenVPN > UDP link remote: [AF_INET]184.75.221.114:443
. 2016.12.24 13:15:23 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.114:443, sid=e42fb9bb bb4a9ab1
. 2016.12.24 13:15:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.12.24 13:15:24 - OpenVPN > Validating certificate key usage
. 2016.12.24 13:15:24 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.12.24 13:15:24 - OpenVPN > VERIFY KU OK
. 2016.12.24 13:15:24 - OpenVPN > Validating certificate extended key usage
. 2016.12.24 13:15:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.12.24 13:15:24 - OpenVPN > VERIFY EKU OK
. 2016.12.24 13:15:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.12.24 13:15:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.12.24 13:15:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.114:443
. 2016.12.24 13:15:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.12.24 13:15:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.51.8 255.255.0.0'
. 2016.12.24 13:15:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.12.24 13:15:26 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2016.12.24 13:15:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.12.24 13:15:26 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.12.24 13:15:26 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.12.24 13:15:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.12.24 13:15:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.24 13:15:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.24 13:15:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.12.24 13:15:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.12.24 13:15:26 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=eth0 HWADDR=bc:5f:f4:1f:c7:bf
. 2016.12.24 13:15:26 - OpenVPN > TUN/TAP device tun0 opened
. 2016.12.24 13:15:26 - OpenVPN > TUN/TAP TX queue length set to 100
. 2016.12.24 13:15:26 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2016.12.24 13:15:26 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2016.12.24 13:15:26 - OpenVPN > /sbin/ip addr add dev tun0 10.4.51.8/16 broadcast 10.4.255.255
. 2016.12.24 13:15:31 - OpenVPN > /sbin/ip route add 184.75.221.114/32 via 192.168.0.1
. 2016.12.24 13:15:31 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2016.12.24 13:15:31 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2016.12.24 13:15:31 - Starting Management Interface
W 2016.12.24 13:15:31 - Connection refused
! 2016.12.24 13:15:31 - Disconnecting
. 2016.12.24 13:15:31 - Connection terminated.

 

Anyway, why should IPv6 be a problem? It works fine with Eddie in any other OS.

Share this post


Link to post
 I 2016.12.24 13:15:13 - OpenVPN - Version: 2.4_rc1 - OpenSSL 1.0.2j  26 Sep 2016, LZO 2.08 (/usr/sbin/openvpn)
[...]
W 2016.12.24 13:15:31 - Connection refused

This one is a known problem using Eddie and OpenVPN 2.4.x on Linux. As you are using Kali, try downgrading to a 2.3.x build or use the terminal.


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

Bummer. The only thing that works is the Debian Network Manager setup. Using the terminal doesn't work either. I suppose I'll just have to wait for a bugfix for Openvpn 2.4. :~(

Share this post


Link to post

Could you please post the logfiles of a Terminal connection and a NetworkManager connection? Copy-Paste the first, the latter should be in /var/log.


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

This is the terminal connection log (which doesn't work):

 

root@Kali-Arbeitszimmer:~/Downloads# openvpn AirVPN_Europe_UDP-443.ovpn
Mon Dec 26 08:38:29 2016 OpenVPN 2.4_rc1 [git:master/f2137fedb30cb874+] x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 12 2016
Mon Dec 26 08:38:29 2016 library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.08
Mon Dec 26 08:38:29 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Dec 26 08:38:29 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Dec 26 08:38:30 2016 TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.140:443
Mon Dec 26 08:38:30 2016 Socket Buffers: R=[212992->212992] S=[212992->212992]
Mon Dec 26 08:38:30 2016 UDP link local: (not bound)
Mon Dec 26 08:38:30 2016 UDP link remote: [AF_INET]62.102.148.140:443
Mon Dec 26 08:38:30 2016 TLS: Initial packet from [AF_INET]62.102.148.140:443, sid=9a5ca89e fcb06ee2
Mon Dec 26 08:38:31 2016 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mon Dec 26 08:38:31 2016 Validating certificate key usage
Mon Dec 26 08:38:31 2016 ++ Certificate has key usage  00a0, expects 00a0
Mon Dec 26 08:38:31 2016 VERIFY KU OK
Mon Dec 26 08:38:31 2016 Validating certificate extended key usage
Mon Dec 26 08:38:31 2016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Dec 26 08:38:31 2016 VERIFY EKU OK
Mon Dec 26 08:38:31 2016 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Mon Dec 26 08:38:31 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mon Dec 26 08:38:31 2016 [server] Peer Connection Initiated with [AF_INET]62.102.148.140:443
Mon Dec 26 08:38:33 2016 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Mon Dec 26 08:38:33 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.42.30 255.255.0.0'
Mon Dec 26 08:38:33 2016 OPTIONS IMPORT: timers and/or timeouts modified
Mon Dec 26 08:38:33 2016 OPTIONS IMPORT: compression parms modified
Mon Dec 26 08:38:33 2016 OPTIONS IMPORT: --ifconfig/up options modified
Mon Dec 26 08:38:33 2016 OPTIONS IMPORT: route options modified
Mon Dec 26 08:38:33 2016 OPTIONS IMPORT: route-related options modified
Mon Dec 26 08:38:33 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Dec 26 08:38:33 2016 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Dec 26 08:38:33 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Dec 26 08:38:33 2016 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Dec 26 08:38:33 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Dec 26 08:38:33 2016 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=eth0 HWADDR=bc:5f:f4:1f:c7:bf
Mon Dec 26 08:38:33 2016 TUN/TAP device tun0 opened
Mon Dec 26 08:38:33 2016 TUN/TAP TX queue length set to 100
Mon Dec 26 08:38:33 2016 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Mon Dec 26 08:38:33 2016 /sbin/ip link set dev tun0 up mtu 1500
Mon Dec 26 08:38:33 2016 /sbin/ip addr add dev tun0 10.4.42.30/16 broadcast 10.4.255.255
Mon Dec 26 08:38:38 2016 /sbin/ip route add 62.102.148.140/32 via 192.168.0.1
Mon Dec 26 08:38:38 2016 /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
Mon Dec 26 08:38:38 2016 /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
Mon Dec 26 08:38:38 2016 Initialization Sequence Completed

 

As for the Network Manager, I have about 70 log files on the system. Which one has the information you want?

Share this post


Link to post

Bummer. The only thing that works is the Debian Network Manager setup. Using the terminal doesn't work either. I suppose I'll just have to wait for a bugfix for Openvpn 2.4. :~(

 

Just downgrade to OpenVPN 2.3.13, it's the most straightforward solution.

 

Please see here: https://airvpn.org/topic/20939-eddie-openvpn-24-issue-no-connection-could-be-made-because-the-target-machine-actively-refused-it/

 

Kind regards

Share this post


Link to post
Mon Dec 26 08:38:38 2016 Initialization Sequence Completed

I don't see the same symptoms with your terminal connection, what exactly is not working?


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

Although it says the initialization sequence completed, I cannot connect to anything until I terminate AirVPN.

Share this post


Link to post

Try editing /etc/resolv.conf file and add the following line at the top:

nameserver 10.4.0.1

Share this post


Link to post

Although it says the initialization sequence completed, I cannot connect to anything until I terminate AirVPN.

 

As Mr. pr1v pointed out, your connection is solid but there might be a DNS or routing issue.

 

To everyone, there's an official workaround now.


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post
Guest
This topic is now closed to further replies.

×
×
  • Create New...