Jump to content
Not connected, Your IP: 3.231.166.56

Recommended Posts

Hi everyone,

 

Since I changed the DNS servers from my internet box, I can only access to websites threw their IP (000.0.00.00) and not from their names (google.com). I think it's related to a DNS resolution problem.

I've tried some known issues on Ubuntu such as adding these lines to my ovpn files :

 

script-security 2
up /etc/openvpn/update-resolv-conf
down /etc/openvpn/update-resolv-conf
 
Here is my connection logs :

Fri Feb 10 21:18:45 2017 OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Feb  2 2016
Fri Feb 10 21:18:45 2017 library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
Fri Feb 10 21:18:45 2017 Control Channel Authentication: tls-auth using INLINE static key file
Fri Feb 10 21:18:45 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Feb 10 21:18:45 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Feb 10 21:18:45 2017 Socket Buffers: R=[212992->212992] S=[212992->212992]
Fri Feb 10 21:18:45 2017 UDPv4 link local: [undef]
Fri Feb 10 21:18:45 2017 UDPv4 link remote: [AF_INET]185.156.174.154:443
Fri Feb 10 21:18:45 2017 TLS: Initial packet from [AF_INET]185.156.174.154:443, sid=652c91ff 7fd6447f
Fri Feb 10 21:18:45 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Fri Feb 10 21:18:45 2017 Validating certificate key usage
Fri Feb 10 21:18:45 2017 ++ Certificate has key usage  00a0, expects 00a0
Fri Feb 10 21:18:45 2017 VERIFY KU OK
Fri Feb 10 21:18:45 2017 Validating certificate extended key usage
Fri Feb 10 21:18:45 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Feb 10 21:18:45 2017 VERIFY EKU OK
Fri Feb 10 21:18:45 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Turais, emailAddress=info@airvpn.org
Fri Feb 10 21:18:46 2017 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Feb 10 21:18:46 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Feb 10 21:18:46 2017 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Feb 10 21:18:46 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Feb 10 21:18:46 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Fri Feb 10 21:18:46 2017 [Turais] Peer Connection Initiated with [AF_INET]185.156.174.154:443
Fri Feb 10 21:18:48 2017 SENT CONTROL [Turais]: 'PUSH_REQUEST' (status=1)
Fri Feb 10 21:18:48 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.70 255.255.0.0'
Fri Feb 10 21:18:48 2017 OPTIONS IMPORT: timers and/or timeouts modified
Fri Feb 10 21:18:48 2017 OPTIONS IMPORT: LZO parms modified
Fri Feb 10 21:18:48 2017 OPTIONS IMPORT: --ifconfig/up options modified
Fri Feb 10 21:18:48 2017 OPTIONS IMPORT: route options modified
Fri Feb 10 21:18:48 2017 OPTIONS IMPORT: route-related options modified
Fri Feb 10 21:18:48 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Feb 10 21:18:48 2017 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=wlp1s0 HWADDR=18:5e:0f:1a:0a:ea
Fri Feb 10 21:18:48 2017 TUN/TAP device tun0 opened
Fri Feb 10 21:18:48 2017 TUN/TAP TX queue length set to 100
Fri Feb 10 21:18:48 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Fri Feb 10 21:18:48 2017 /sbin/ip link set dev tun0 up mtu 1500
Fri Feb 10 21:18:48 2017 /sbin/ip addr add dev tun0 10.4.5.70/16 broadcast 10.4.255.255
Fri Feb 10 21:18:53 2017 /sbin/ip route add 185.156.174.154/32 via 192.168.0.1
Fri Feb 10 21:18:53 2017 /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
Fri Feb 10 21:18:53 2017 /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
Fri Feb 10 21:18:53 2017 Initialization Sequence Completed

 

Thanks !
 
agent41

Share this post


Link to post

Since I changed the DNS servers from my internet box

 

Did you check whether these new servers really work?


» I am not an AirVPN team member. All opinions are my own and are not to be considered official. Only the AirVPN Staff account should be viewed as such.

» The forums is a place where you can ask questions to the community. You are not entitled to guaranteed answer times. Answer quality may vary, too. If you need professional support, please create tickets.

» If you're new, take some time to read LZ1's New User Guide to AirVPN. On questions, use the search function first. On errors, search for the error message instead.

» If you choose to create a new thread, keep in mind that we don't know your setup. Give info about it. Never forget the OpenVPN logs or, for Eddie, the support file (Logs > lifebelt icon).

» The community kindly asks you to not set up Tor exit relays when connected to AirVPN. Their IP addresses are subject to restrictions and these are relayed to all users of the affected servers.

 

» Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, chances are you will be unique amond the mass again.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...