randomhash 0 Posted ... Hello, I'm using Arch Linux. I installed eddie from the AUR repositories and have tried the official release to the same effect. I log in and try to connect to a server. This is the output for both clients. Any idea what's causing the issue? I 2017.10.13 00:03:20 - OpenVPN Driver - Found, /dev/net/tun I 2017.10.13 00:03:20 - OpenVPN - Version: 2.4.4 - OpenSSL 1.1.0f 25 May 2017, LZO 2.10 (/usr/bin/openvpn) I 2017.10.13 00:03:20 - SSH - Version: OpenSSH_7.6p1, OpenSSL 1.1.0f 25 May 2017 (/usr/bin/ssh) I 2017.10.13 00:03:20 - SSL - Version: stunnel 5.42 (/usr/bin/stunnel) I 2017.10.13 00:03:20 - curl - Version: 7.56.0 (/usr/bin/curl) I 2017.10.13 00:03:20 - Certification Authorities: /usr/share/AirVPN/cacert.pem . 2017.10.13 00:03:20 - Updating systems & servers data ... ! 2017.10.13 00:03:20 - Ready . 2017.10.13 00:03:21 - Systems & servers data update completed I 2017.10.13 00:03:31 - Session starting. I 2017.10.13 00:03:31 - Checking authorization ... ! 2017.10.13 00:03:31 - Connecting to Fornax (Bulgaria, Sofia) . 2017.10.13 00:03:31 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017 . 2017.10.13 00:03:31 - OpenVPN > library versions: OpenSSL 1.1.0f 25 May 2017, LZO 2.10 . 2017.10.13 00:03:31 - Connection to OpenVPN Management Interface . 2017.10.13 00:03:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.10.13 00:03:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.10.13 00:03:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.10.13 00:03:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]93.123.73.113:443 . 2017.10.13 00:03:31 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2017.10.13 00:03:31 - OpenVPN > UDP link local: (not bound) . 2017.10.13 00:03:31 - OpenVPN > UDP link remote: [AF_INET]93.123.73.113:443 . 2017.10.13 00:03:31 - OpenVPN > TLS: Initial packet from [AF_INET]93.123.73.113:443, sid=5e2226af 3c6a2d05 . 2017.10.13 00:03:32 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.10.13 00:03:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.10.13 00:03:32 - OpenVPN > VERIFY KU OK . 2017.10.13 00:03:32 - OpenVPN > Validating certificate extended key usage . 2017.10.13 00:03:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.10.13 00:03:32 - OpenVPN > VERIFY EKU OK . 2017.10.13 00:03:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fornax, emailAddress=info@airvpn.org . 2017.10.13 00:03:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.10.13 00:03:32 - OpenVPN > [Fornax] Peer Connection Initiated with [AF_INET]93.123.73.113:443 . 2017.10.13 00:03:33 - OpenVPN > SENT CONTROL [Fornax]: 'PUSH_REQUEST' (status=1) ! 2017.10.13 00:03:33 - Disconnecting . 2017.10.13 00:03:33 - Connection terminated. I 2017.10.13 00:03:36 - Checking authorization ... ! 2017.10.13 00:03:36 - Connecting to Alphecca (Netherlands, Alblasserdam) . 2017.10.13 00:03:36 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017 . 2017.10.13 00:03:36 - OpenVPN > library versions: OpenSSL 1.1.0f 25 May 2017, LZO 2.10 . 2017.10.13 00:03:36 - Connection to OpenVPN Management Interface . 2017.10.13 00:03:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.10.13 00:03:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.10.13 00:03:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.10.13 00:03:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.4:443 . 2017.10.13 00:03:36 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2017.10.13 00:03:36 - OpenVPN > UDP link local: (not bound) . 2017.10.13 00:03:36 - OpenVPN > UDP link remote: [AF_INET]109.202.107.4:443 . 2017.10.13 00:03:36 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.4:443, sid=8ccd6516 2fbe28e9 . 2017.10.13 00:03:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.10.13 00:03:36 - OpenVPN > VERIFY KU OK . 2017.10.13 00:03:36 - OpenVPN > Validating certificate extended key usage . 2017.10.13 00:03:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.10.13 00:03:36 - OpenVPN > VERIFY EKU OK . 2017.10.13 00:03:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2017.10.13 00:03:37 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.10.13 00:03:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.10.13 00:03:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.4:443 . 2017.10.13 00:03:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) ! 2017.10.13 00:03:38 - Disconnecting . 2017.10.13 00:03:38 - Connection terminated. I 2017.10.13 00:03:41 - Checking authorization ... ! 2017.10.13 00:03:41 - Connecting to Crater (Netherlands, Alblasserdam) . 2017.10.13 00:03:41 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017 . 2017.10.13 00:03:41 - OpenVPN > library versions: OpenSSL 1.1.0f 25 May 2017, LZO 2.10 . 2017.10.13 00:03:41 - Connection to OpenVPN Management Interface . 2017.10.13 00:03:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2017.10.13 00:03:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.10.13 00:03:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2017.10.13 00:03:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.14:443 . 2017.10.13 00:03:41 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2017.10.13 00:03:41 - OpenVPN > UDP link local: (not bound) . 2017.10.13 00:03:41 - OpenVPN > UDP link remote: [AF_INET]213.152.162.14:443 . 2017.10.13 00:03:41 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.14:443, sid=01fb8967 6413d3d5 . 2017.10.13 00:03:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2017.10.13 00:03:41 - OpenVPN > VERIFY KU OK . 2017.10.13 00:03:41 - OpenVPN > Validating certificate extended key usage . 2017.10.13 00:03:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2017.10.13 00:03:41 - OpenVPN > VERIFY EKU OK . 2017.10.13 00:03:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Crater, emailAddress=info@airvpn.org . 2017.10.13 00:03:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2017.10.13 00:03:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2017.10.13 00:03:41 - OpenVPN > [Crater] Peer Connection Initiated with [AF_INET]213.152.162.14:443 . 2017.10.13 00:03:42 - OpenVPN > SENT CONTROL [Crater]: 'PUSH_REQUEST' (status=1) ! 2017.10.13 00:03:42 - Disconnecting . 2017.10.13 00:03:42 - Connection terminated. I 2017.10.13 00:03:45 - Checking authorization ... . 2017.10.13 00:04:06 - Above log line repeated 6 times more I 2017.10.13 00:04:06 - Cancel requested. ! 2017.10.13 00:04:06 - Session terminated. Quote Share this post Link to post
!Ma;*T9NTT@n@>Cr 0 Posted ... I think I have the same issue, I'm going to send a ticket to support as well with logs. Is there any way to use Air VPN without Eddie? Quote Share this post Link to post
YamiNoKeshin 0 Posted ... I had the same issue this morning. After trying it manually with OpenVPN I found out the last kernel update "broke" the tun device. After a reboot it worked again Quote Share this post Link to post
OpenSourcerer 1435 Posted ... I think I have the same issue, I'm going to send a ticket to support as well with logs. Is there any way to use Air VPN without Eddie?Of course there is. Use vanilla OpenVPN/OpenVPN GUI on Windows, Viscosity, Securepoint SSL-VPN, Tunnelblick, etc.. How-tos are in the How-To section of the forums. Sent via Tapatalk. Means, I don't have a computer available now. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post