LZ1 672 Posted ... First round of tests:http://www.speedtest.net/result/7090222137http://www.speedtest.net/result/7090224793http://www.speedtest.net/result/7090250326 <- 253 Mbps holy s*** !! What is most impressing is the ping time. Basically, it's somewhat smaller than when NOT using VPN ! (Apparently Chara's routing is slightly faster than Ziggo's CGN - DS Lite)Ran a few more tests to different servers in NL, getting results of 12-15ms consistently) Will come back with more info/observations later, but so far it appears to be working fine in connecting both IPv6 "only", and also IPv6/IPv4 ---p.s. - I love you guys !+3 months added to my subscription \o/ EDIT:Getting some DNS problems with this server, and unable to access certain websites which are IPv4 only (they work with the other servers still on IPv4)Good show . Wait until Airs birthday in May/June and you can catch a discount Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
Staff 9972 Posted ... EDIT:Getting some DNS problems with this server, and unable to access certain websites which are IPv4 only (they work with the other servers still on IPv4) Hello! The previous DNS problem you warned us about was linked to ipleak.net server problems, unrelated to Chara. It has been fixed, please try again. Can you also tell us which websites you can't access from Chara? Thank you! Kind regards Share this post Link to post
Shiver Me Whiskers 15 Posted ... Can you also tell us which websites you can't access from Chara? Some little instability noticed, but not that bad. Probably because many people are trying out Chara. However this particular one which interests me doesn't seem to load no matter what on Chara, while it works on (most) others:https://airvpn.org/routes/?q=https%3A%2F%2Fsdbits.org Seems to work just fine on Castor, but not on Chara.No clue. The tubes in that direction are clogged :-) I 2018.02.26 13:54:19 - Checking authorization ...! 2018.02.26 13:54:19 - Connecting to Castor (Belgium, Brussels). 2018.02.26 13:54:19 - OpenVPN > OpenVPN 2.4.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Nov 3 2017. 2018.02.26 13:54:19 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2018.02.26 13:54:19 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.02.26 13:54:19 - Connection to OpenVPN Management Interface. 2018.02.26 13:54:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.02.26 13:54:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.02.26 13:54:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.02.26 13:54:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443. 2018.02.26 13:54:19 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2018.02.26 13:54:19 - OpenVPN > UDPv6 link local: (not bound). 2018.02.26 13:54:19 - OpenVPN > UDPv6 link remote: [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443. 2018.02.26 13:54:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.02.26 13:54:19 - OpenVPN > TLS: Initial packet from [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443, sid=693762e1 3903cf17. 2018.02.26 13:54:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.02.26 13:54:19 - OpenVPN > VERIFY KU OK. 2018.02.26 13:54:19 - OpenVPN > Validating certificate extended key usage. 2018.02.26 13:54:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.02.26 13:54:19 - OpenVPN > VERIFY EKU OK. 2018.02.26 13:54:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Castor, emailAddress=info@airvpn.org. 2018.02.26 13:54:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.02.26 13:54:20 - OpenVPN > [Castor] Peer Connection Initiated with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443. 2018.02.26 13:54:21 - OpenVPN > SENT CONTROL [Castor]: 'PUSH_REQUEST' (status=1). 2018.02.26 13:54:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.0.1,dhcp-option DNS6 fde6:7a:7d20:8::1,tun-ipv6,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:8::1038/64 fde6:7a:7d20:8::1,ifconfig 10.8.0.58 255.255.0.0,peer-id 2,cipher AES-256-GCM'. 2018.02.26 13:54:21 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.02.26 13:54:21 - OpenVPN > Note: option tun-ipv6 is ignored because modern operating systems do not need special IPv6 tun handling anymore.. 2018.02.26 13:54:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.02.26 13:54:21 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.02.26 13:54:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.02.26 13:54:21 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.02.26 13:54:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.02.26 13:54:21 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.02.26 13:54:21 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.02.26 13:54:21 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.02.26 13:54:21 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.02.26 13:54:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.02.26 13:54:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.02.26 13:54:21 - OpenVPN > interactive service msg_channel=0. 2018.02.26 13:54:21 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=15 HWADDR=f4:f2:6d:05:5b:66. 2018.02.26 13:54:21 - OpenVPN > GDG6: remote_host_ipv6=2001:ac8:27:f:9ff8:eafb:3bb8:3c4f. 2018.02.26 13:54:21 - OpenVPN > GetBestInterfaceEx() returned if=15. 2018.02.26 13:54:21 - OpenVPN > GDG6: II=15 DP=::/0 NH=fe80::ae22:5ff:fea2:23b8. 2018.02.26 13:54:21 - OpenVPN > GDG6: Metric=16, Loopback=0, AA=1, I=0. 2018.02.26 13:54:21 - OpenVPN > ROUTE6_GATEWAY fe80::ae22:5ff:fea2:23b8 I=15. 2018.02.26 13:54:21 - OpenVPN > ROUTE6: 2000::/4 overlaps IPv6 remote 2001:ac8:27:f:9ff8:eafb:3bb8:3c4f, adding host route to VPN endpoint. 2018.02.26 13:54:21 - OpenVPN > open_tun. 2018.02.26 13:54:21 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{E3B8A1A0-A5F8-47F6-ADAA-729CE20CEF88}.tap. 2018.02.26 13:54:21 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.02.26 13:54:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.58/255.255.0.0 [sUCCEEDED]. 2018.02.26 13:54:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.58/255.255.0.0 on interface {E3B8A1A0-A5F8-47F6-ADAA-729CE20CEF88} [DHCP-serv: 10.8.255.254, lease-time: 31536000]. 2018.02.26 13:54:21 - OpenVPN > Successful ARP Flush on interface [20] {E3B8A1A0-A5F8-47F6-ADAA-729CE20CEF88}. 2018.02.26 13:54:21 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1. 2018.02.26 13:54:22 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=20 fde6:7a:7d20:8::1038 store=active. 2018.02.26 13:54:23 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns Local Area Connection static fde6:7a:7d20:8::1 validate=no. 2018.02.26 13:54:23 - OpenVPN > add_route_ipv6(fde6:7a:7d20:8::/64 -> fde6:7a:7d20:8::1038 metric 0) dev Local Area Connection. 2018.02.26 13:54:23 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:8::/64 interface=20 fe80::8 store=active. 2018.02.26 13:54:23 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2018.02.26 13:54:28 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.02.26 13:54:28 - OpenVPN > ROUTE remote_host protocol differs from tunneled. 2018.02.26 13:54:28 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1. 2018.02.26 13:54:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.02.26 13:54:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.02.26 13:54:28 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1. 2018.02.26 13:54:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.02.26 13:54:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.02.26 13:54:28 - OpenVPN > add_route_ipv6(2001:ac8:27:f:9ff8:eafb:3bb8:3c4f/128 -> fe80::ae22:5ff:fea2:23b8 metric 1) dev Local Area Connection. 2018.02.26 13:54:28 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 2001:ac8:27:f:9ff8:eafb:3bb8:3c4f/128 interface=15 fe80::ae22:5ff:fea2:23b8 store=active. 2018.02.26 13:54:28 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2018.02.26 13:54:28 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:8::1 metric -1) dev Local Area Connection. 2018.02.26 13:54:28 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route ::/3 interface=20 fe80::8 store=active. 2018.02.26 13:54:28 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2018.02.26 13:54:28 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:8::1 metric -1) dev Local Area Connection. 2018.02.26 13:54:28 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 2000::/4 interface=20 fe80::8 store=active. 2018.02.26 13:54:28 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2018.02.26 13:54:28 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:8::1 metric -1) dev Local Area Connection. 2018.02.26 13:54:28 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 3000::/4 interface=20 fe80::8 store=active. 2018.02.26 13:54:28 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2018.02.26 13:54:28 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:8::1 metric -1) dev Local Area Connection. 2018.02.26 13:54:28 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fc00::/7 interface=20 fe80::8 store=active. 2018.02.26 13:54:28 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2018.02.26 13:54:28 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4. 2018.02.26 13:54:28 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6. 2018.02.26 13:54:28 - DNS leak protection with packet filtering enabled.. 2018.02.26 13:54:28 - DNS IPv4 of a network adapter forced (Local Area Connection, from manual (10.4.0.1) to 10.8.0.1). 2018.02.26 13:54:28 - Routes, added a new route, 91.207.57.115 for gateway 10.8.0.1. 2018.02.26 13:54:28 - Routes, added a new route, 2001:ac8:27:f:c0ca:9f36:68ed:1e70 for gateway fde6:7a:7d20:8::1. 2018.02.26 13:54:28 - Flushing DNSI 2018.02.26 13:54:34 - Checking route IPv4I 2018.02.26 13:54:34 - Checking route IPv6I 2018.02.26 13:54:38 - Checking DNS! 2018.02.26 13:54:38 - Connected.. 2018.02.26 13:54:38 - OpenVPN > Initialization Sequence Completed. 2018.02.26 13:54:51 - Updating systems & servers data .... 2018.02.26 13:54:52 - Systems & servers data update completed! 2018.02.26 13:55:36 - Disconnecting. 2018.02.26 13:55:36 - Routes, removed a route previously added, 91.207.57.115 for gateway 10.8.0.1. 2018.02.26 13:55:36 - Routes, removed a route previously added, 2001:ac8:27:f:c0ca:9f36:68ed:1e70 for gateway fde6:7a:7d20:8::1. 2018.02.26 13:55:36 - Sending management termination signal. 2018.02.26 13:55:36 - Management - Send 'signal SIGTERM'. 2018.02.26 13:55:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.02.26 13:55:36 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.02.26 13:55:41 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.0.1. 2018.02.26 13:55:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.02.26 13:55:41 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.8.0.1. 2018.02.26 13:55:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2018.02.26 13:55:41 - OpenVPN > delete_route_ipv6(2001:ac8:27:f:9ff8:eafb:3bb8:3c4f/128). 2018.02.26 13:55:41 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route 2001:ac8:27:f:9ff8:eafb:3bb8:3c4f/128 interface=15 fe80::ae22:5ff:fea2:23b8 store=active. 2018.02.26 13:55:41 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2018.02.26 13:55:41 - OpenVPN > delete_route_ipv6(::/3). 2018.02.26 13:55:41 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route ::/3 interface=20 fe80::8 store=active. 2018.02.26 13:55:41 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2018.02.26 13:55:41 - OpenVPN > delete_route_ipv6(2000::/4). 2018.02.26 13:55:41 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=20 fe80::8 store=active. 2018.02.26 13:55:41 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2018.02.26 13:55:41 - OpenVPN > delete_route_ipv6(3000::/4). 2018.02.26 13:55:41 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=20 fe80::8 store=active. 2018.02.26 13:55:41 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2018.02.26 13:55:41 - OpenVPN > delete_route_ipv6(fc00::/7). 2018.02.26 13:55:41 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=20 fe80::8 store=active. 2018.02.26 13:55:41 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2018.02.26 13:55:41 - OpenVPN > Closing TUN/TAP interface. 2018.02.26 13:55:41 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:8::1038/64). 2018.02.26 13:55:41 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:8::1038/64 interface=20 fe80::8 store=active. 2018.02.26 13:55:41 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address Local Area Connection fde6:7a:7d20:8::1038 store=active. 2018.02.26 13:55:41 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns Local Area Connection all. 2018.02.26 13:55:41 - OpenVPN > TAP: DHCP address released. 2018.02.26 13:55:41 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.02.26 13:55:41 - Connection terminated.. 2018.02.26 13:55:41 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to 10.4.0.1). 2018.02.26 13:55:41 - DNS leak protection with packet filtering disabled.. 2018.02.26 13:55:41 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4. 2018.02.26 13:55:41 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6I 2018.02.26 13:55:41 - Checking authorization ...! 2018.02.26 13:55:41 - Connecting to Chara (Netherlands, Alblasserdam). 2018.02.26 13:55:41 - OpenVPN > OpenVPN 2.4.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Nov 3 2017. 2018.02.26 13:55:41 - OpenVPN > Windows version 6.1 (Windows 7) 64bit. 2018.02.26 13:55:41 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.02.26 13:55:41 - Connection to OpenVPN Management Interface. 2018.02.26 13:55:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.02.26 13:55:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.02.26 13:55:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.02.26 13:55:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2a00:1678:2470:14:2e05:7341:c357:de7f:443. 2018.02.26 13:55:41 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]. 2018.02.26 13:55:41 - OpenVPN > UDPv6 link local: (not bound). 2018.02.26 13:55:41 - OpenVPN > UDPv6 link remote: [AF_INET6]2a00:1678:2470:14:2e05:7341:c357:de7f:443. 2018.02.26 13:55:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.02.26 13:55:41 - OpenVPN > TLS: Initial packet from [AF_INET6]2a00:1678:2470:14:2e05:7341:c357:de7f:443, sid=e30c094e f31ab91d. 2018.02.26 13:55:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.02.26 13:55:42 - OpenVPN > VERIFY KU OK. 2018.02.26 13:55:42 - OpenVPN > Validating certificate extended key usage. 2018.02.26 13:55:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.02.26 13:55:42 - OpenVPN > VERIFY EKU OK. 2018.02.26 13:55:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.02.26 13:55:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.02.26 13:55:42 - OpenVPN > [server] Peer Connection Initiated with [AF_INET6]2a00:1678:2470:14:2e05:7341:c357:de7f:443. 2018.02.26 13:55:43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.02.26 13:55:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.0.1,dhcp-option DNS6 fde6:7a:7d20:8::1,tun-ipv6,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:8::100a/64 fde6:7a:7d20:8::1,ifconfig 10.8.0.12 255.255.0.0,peer-id 5,cipher AES-256-GCM'. 2018.02.26 13:55:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'. 2018.02.26 13:55:43 - OpenVPN > Note: option tun-ipv6 is ignored because modern operating systems do not need special IPv6 tun handling anymore.. 2018.02.26 13:55:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.02.26 13:55:43 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.02.26 13:55:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.02.26 13:55:43 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.02.26 13:55:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.02.26 13:55:43 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.02.26 13:55:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.02.26 13:55:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.02.26 13:55:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.02.26 13:55:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.02.26 13:55:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.02.26 13:55:43 - OpenVPN > interactive service msg_channel=0. 2018.02.26 13:55:43 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=15 HWADDR=f4:f2:6d:05:5b:66. 2018.02.26 13:55:43 - OpenVPN > GDG6: remote_host_ipv6=2a00:1678:2470:14:2e05:7341:c357:de7f. 2018.02.26 13:55:43 - OpenVPN > GetBestInterfaceEx() returned if=15. 2018.02.26 13:55:43 - OpenVPN > GDG6: II=15 DP=::/0 NH=fe80::ae22:5ff:fea2:23b8. 2018.02.26 13:55:43 - OpenVPN > GDG6: Metric=16, Loopback=0, AA=1, I=0. 2018.02.26 13:55:43 - OpenVPN > ROUTE6_GATEWAY fe80::ae22:5ff:fea2:23b8 I=15. 2018.02.26 13:55:43 - OpenVPN > ROUTE6: 2000::/4 overlaps IPv6 remote 2a00:1678:2470:14:2e05:7341:c357:de7f, adding host route to VPN endpoint. 2018.02.26 13:55:43 - OpenVPN > open_tun. 2018.02.26 13:55:43 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{E3B8A1A0-A5F8-47F6-ADAA-729CE20CEF88}.tap. 2018.02.26 13:55:43 - OpenVPN > TAP-Windows Driver Version 9.21. 2018.02.26 13:55:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.12/255.255.0.0 [sUCCEEDED]. 2018.02.26 13:55:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.12/255.255.0.0 on interface {E3B8A1A0-A5F8-47F6-ADAA-729CE20CEF88} [DHCP-serv: 10.8.255.254, lease-time: 31536000]. 2018.02.26 13:55:43 - OpenVPN > Successful ARP Flush on interface [20] {E3B8A1A0-A5F8-47F6-ADAA-729CE20CEF88}. 2018.02.26 13:55:43 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1. 2018.02.26 13:55:44 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=20 fde6:7a:7d20:8::100a store=active. 2018.02.26 13:55:45 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns Local Area Connection static fde6:7a:7d20:8::1 validate=no. 2018.02.26 13:55:45 - OpenVPN > add_route_ipv6(fde6:7a:7d20:8::/64 -> fde6:7a:7d20:8::100a metric 0) dev Local Area Connection. 2018.02.26 13:55:45 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:8::/64 interface=20 fe80::8 store=active. 2018.02.26 13:55:45 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2018.02.26 13:55:50 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2018.02.26 13:55:50 - OpenVPN > ROUTE remote_host protocol differs from tunneled. 2018.02.26 13:55:50 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1. 2018.02.26 13:55:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.02.26 13:55:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.02.26 13:55:50 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1. 2018.02.26 13:55:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2018.02.26 13:55:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2018.02.26 13:55:50 - OpenVPN > add_route_ipv6(2a00:1678:2470:14:2e05:7341:c357:de7f/128 -> fe80::ae22:5ff:fea2:23b8 metric 1) dev Local Area Connection. 2018.02.26 13:55:50 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 2a00:1678:2470:14:2e05:7341:c357:de7f/128 interface=15 fe80::ae22:5ff:fea2:23b8 store=active. 2018.02.26 13:55:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2018.02.26 13:55:50 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:8::1 metric -1) dev Local Area Connection. 2018.02.26 13:55:50 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route ::/3 interface=20 fe80::8 store=active. 2018.02.26 13:55:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2018.02.26 13:55:50 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:8::1 metric -1) dev Local Area Connection. 2018.02.26 13:55:50 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 2000::/4 interface=20 fe80::8 store=active. 2018.02.26 13:55:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2018.02.26 13:55:50 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:8::1 metric -1) dev Local Area Connection. 2018.02.26 13:55:50 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 3000::/4 interface=20 fe80::8 store=active. 2018.02.26 13:55:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2018.02.26 13:55:50 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:8::1 metric -1) dev Local Area Connection. 2018.02.26 13:55:50 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fc00::/7 interface=20 fe80::8 store=active. 2018.02.26 13:55:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2018.02.26 13:55:50 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4. 2018.02.26 13:55:50 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6. 2018.02.26 13:55:50 - DNS leak protection with packet filtering enabled.. 2018.02.26 13:55:50 - DNS IPv4 of a network adapter forced (Local Area Connection, from manual (10.4.0.1) to 10.8.0.1). 2018.02.26 13:55:50 - Routes, added a new route, 109.232.227.133 for gateway 10.8.0.1. 2018.02.26 13:55:50 - Routes, added a new route, 2a00:1678:2470:14:8b1f:21a6:b646:bf3d for gateway fde6:7a:7d20:8::1. 2018.02.26 13:55:50 - Flushing DNSI 2018.02.26 13:55:56 - Checking route IPv4I 2018.02.26 13:55:56 - Checking route IPv6I 2018.02.26 13:56:00 - Checking DNS! 2018.02.26 13:56:00 - Connected.. 2018.02.26 13:56:00 - OpenVPN > Initialization Sequence Completed. 2018.02.26 13:56:06 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #14880 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings Share this post Link to post
trekkie.forever 6 Posted ... I hope that the set up documentation on the website is updated before the IPv6 deployment happens How much longer is the planned experimental phase? When should we expect all this to roll out to all servers? Hello, it is not set as a date but as a conditional events sequence, We will start IPv6 widespread deployment after Eddie 2.14.x stable has been released, and after any investigation on various feedback pertaining to IPv6 is over. Kind regards Share this post Link to post
Shiver Me Whiskers 15 Posted ... For some reason Chara is slow for torrents, even if the server itself is not overloaded.That doesn't happen with the other servers in NL (which are still on IPv4), they go sometimes up to 300+mbps in a short burst see pictures - Lots of peers (and many of them high-bandwidth) Picture 1 - Chara barely 10mbpsPicture 2 - Chara is not overloaded, actually it's in low 15%Picture 3 - Andromeda @ 321MbpsPicture 4 - Andromeda #1 Picture 5 - Andromeda at 78%, still fast ! Share this post Link to post
radolkin 0 Posted ... I can second 'Shiver me timbers' concerning the site 'https://sdbits.org/'. 'Castor' connects, although it may take a while. 'Chara', on the other hand, gives me a timeout in each Browser. Also, 'ping' gets no response and 'mtr' doesn't get through. Tested on Ubuntu 16.04.4 LTS using Eddie 2.14.2. Share this post Link to post
Monotremata 22 Posted ... Wow Chara is working great over here. Im in Los Angeles, and just hit 66Mbps with Speedtest with the regular old UDP connection heh. Castor Im lucky to get 10! ipleak.net is all good, ipv6-test.com passes with 19/20. Share this post Link to post
ghulands 0 Posted ... Hi,I'm having trouble getting pfSense to establish a udp6 connection to both castor and chara. The only difference i could really see from the config pfsense generated and the one that the airvpn configurator made was no-bind vs local. I'm unsure if this is the problem. I am able to telnet to the remote ipv6 host, and also tested udp with nc -v -u -z -w 3 2001:ac8:27:f:80eb:9a7b:3c0f:e4cf 443Connection to 2001:ac8:27:f:80eb:9a7b:3c0f:e4cf 443 port [udp/https] succeeded! Does anyone have any suggestions on what might be wong? I have also set the monitor ip to fde6:7a:7d20:104::1, though i'm not sure if this is the correct address. Here is the config that the UI generated and is using:dev ovpnc4verb 3dev-type tundev-node /dev/tun4writepid /var/run/openvpn_client4.pid#user nobody#group nobodyscript-security 3daemonkeepalive 10 60ping-timer-rempersist-tunpersist-keyproto udp6cipher AES-256-CBCauth SHA512up /usr/local/sbin/ovpn-linkupdown /usr/local/sbin/ovpn-linkdownlocal 2603:3006:xxxx:xxxx:xxxx:xxxx:xxxx:7068tls-clientclientlport 0management /var/etc/openvpn/client4.sock unixremote 2001:ac8:27:f:80eb:9a7b:3c0f:e4cf 443ca /var/etc/openvpn/client4.ca cert /var/etc/openvpn/client4.cert key /var/etc/openvpn/client4.key tls-crypt /var/etc/openvpn/client4.tls-crypt comp-lzo noresolv-retry infiniteroute-nopullroute-delay 5remote-cert-tls serverdev tun Here are the logs:Mar 11 13:13:16 router openvpn[7914]: MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client4.sockMar 11 13:13:16 router openvpn[7914]: NOTE: the current --script-security setting may allow this configuration to call user-defined scriptsMar 11 13:13:16 router openvpn[7914]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit keyMar 11 13:13:16 router openvpn[7914]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authenticationMar 11 13:13:16 router openvpn[7914]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit keyMar 11 13:13:16 router openvpn[7914]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authenticationMar 11 13:13:16 router openvpn[7914]: TCP/UDP: Preserving recently used remote address: [AF_INET6]2001:ac8:27:f:80eb:9a7b:3c0f:e4cf:443Mar 11 13:13:16 router openvpn[7914]: Socket Buffers: R=[42080->42080] S=[57344->57344]Mar 11 13:13:16 router openvpn[7914]: setsockopt(IPV6_V6ONLY=0)Mar 11 13:13:16 router openvpn[7914]: UDPv6 link local (bound): [AF_INET6]2603:3006:xxxx:xxxx:xxxx:xxxx:xxxx:7068:0Mar 11 13:13:16 router openvpn[7914]: UDPv6 link remote: [AF_INET6]2001:ac8:27:f:80eb:9a7b:3c0f:e4cf:443Mar 11 13:14:16 router openvpn[7914]: [uNDEF] Inactivity timeout (--ping-restart), restartingMar 11 13:14:16 router openvpn[7914]: SIGUSR1[soft,ping-restart] received, process restartingMar 11 13:14:16 router openvpn[7914]: Restart pause, 5 second(s) Share this post Link to post
lordlukan 3 Posted ... Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit keyWhich cipher is AES-256-CTR ? Your settings have AES-256-CBC. Not sure if that's the problem or just a typo in the logs. You could set it to AES-256-GCM Share this post Link to post
go558a83nk 362 Posted ... Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit keyWhich cipher is AES-256-CTR ? Your settings have AES-256-CBC. Not sure if that's the problem or just a typo in the logs. You could set it to AES-256-GCM aes-256-ctr is the control channel encryption that's part of the new tls-crypt option. Share this post Link to post
lordlukan 3 Posted ... Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit keyWhich cipher is AES-256-CTR ? Your settings have AES-256-CBC. Not sure if that's the problem or just a typo in the logs. You could set it to AES-256-GCM aes-256-ctr is the control channel encryption that's part of the new tls-crypt option.Ok. Never noticed that before in logs Share this post Link to post
victorab 12 Posted ... Hello,The eperimental servers seems to have a problem with the micro-routing system. I can't access tf1.fr or 6play.fr (which bound to your french routing server): ping fails and I have the « can't access this website » error in Mozilla. Appart from that, set with the UDP80 (TLScrypt) the route check fails to pass, I have to disable it: I 2018.03.23 00:00:45 - Session starting. I 2018.03.23 00:00:45 - Checking authorization ... . 2018.03.23 00:00:45 - IPv6 disabled with packet filtering. ! 2018.03.23 00:00:45 - Connecting to Chara (Netherlands, Alblasserdam) . 2018.03.23 00:00:45 - OpenVPN > OpenVPN 2.4.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Nov 3 2017 . 2018.03.23 00:00:45 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2018.03.23 00:00:45 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2018.03.23 00:00:45 - Connection to OpenVPN Management Interface . 2018.03.23 00:00:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2018.03.23 00:00:45 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2018.03.23 00:00:45 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2018.03.23 00:00:45 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2018.03.23 00:00:45 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2018.03.23 00:00:45 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.232.227.135:80 . 2018.03.23 00:00:45 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2018.03.23 00:00:45 - OpenVPN > UDP link local: (not bound) . 2018.03.23 00:00:45 - OpenVPN > UDP link remote: [AF_INET]109.232.227.135:80 . 2018.03.23 00:00:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2018.03.23 00:00:45 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.135:80, sid=85bd8dbe e2a6ddd9 . 2018.03.23 00:00:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2018.03.23 00:00:46 - OpenVPN > VERIFY KU OK . 2018.03.23 00:00:46 - OpenVPN > Validating certificate extended key usage . 2018.03.23 00:00:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2018.03.23 00:00:46 - OpenVPN > VERIFY EKU OK . 2018.03.23 00:00:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2018.03.23 00:00:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2018.03.23 00:00:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.135:80 . 2018.03.23 00:00:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2018.03.23 00:00:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.104.0.1,tun-ipv6,route-gateway 10.104.0.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:104::100a/64 fde6:7a:7d20:104::1,ifconfig 10.104.0.12 255.255.0.0,peer-id 1,cipher AES-256-GCM' . 2018.03.23 00:00:47 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2018.03.23 00:00:47 - OpenVPN > Note: option tun-ipv6 is ignored because modern operating systems do not need special IPv6 tun handling anymore. . 2018.03.23 00:00:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2018.03.23 00:00:47 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2018.03.23 00:00:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2018.03.23 00:00:47 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2018.03.23 00:00:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2018.03.23 00:00:47 - OpenVPN > OPTIONS IMPORT: peer-id set . 2018.03.23 00:00:47 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2018.03.23 00:00:47 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2018.03.23 00:00:47 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2018.03.23 00:00:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.03.23 00:00:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2018.03.23 00:00:47 - OpenVPN > interactive service msg_channel=0 . 2018.03.23 00:00:47 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=7 HWADDR=9c:b6:d0:f1:c1:53 . 2018.03.23 00:00:47 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2018.03.23 00:00:47 - OpenVPN > GetBestInterfaceEx() returned if=2 . 2018.03.23 00:00:47 - OpenVPN > GDG6: II=2 DP=::/0 NH=:: . 2018.03.23 00:00:47 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2018.03.23 00:00:47 - OpenVPN > ROUTE6_GATEWAY :: ON_LINK I=2 . 2018.03.23 00:00:47 - OpenVPN > open_tun . 2018.03.23 00:00:47 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{A5205F28-C1C0-4AA4-85FA-FCA5D83ADBE1}.tap . 2018.03.23 00:00:47 - OpenVPN > TAP-Windows Driver Version 9.21 . 2018.03.23 00:00:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.104.0.0/10.104.0.12/255.255.0.0 [SUCCEEDED] . 2018.03.23 00:00:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.104.0.12/255.255.0.0 on interface {A5205F28-C1C0-4AA4-85FA-FCA5D83ADBE1} [DHCP-serv: 10.104.255.254, lease-time: 31536000] . 2018.03.23 00:00:47 - OpenVPN > Successful ARP Flush on interface [18] {A5205F28-C1C0-4AA4-85FA-FCA5D83ADBE1} . 2018.03.23 00:00:47 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1 . 2018.03.23 00:00:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=18 fde6:7a:7d20:104::100a store=active . 2018.03.23 00:00:48 - OpenVPN > add_route_ipv6(fde6:7a:7d20:104::/64 -> fde6:7a:7d20:104::100a metric 0) dev Ethernet 2 . 2018.03.23 00:00:48 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:104::/64 interface=18 fe80::8 store=active . 2018.03.23 00:00:48 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2018.03.23 00:00:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2018.03.23 00:00:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.232.227.135 MASK 255.255.255.255 192.168.0.1 . 2018.03.23 00:00:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2018.03.23 00:00:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.03.23 00:00:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.104.0.1 . 2018.03.23 00:00:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2018.03.23 00:00:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.03.23 00:00:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.104.0.1 . 2018.03.23 00:00:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2018.03.23 00:00:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2018.03.23 00:00:53 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:104::1 metric -1) dev Ethernet 2 . 2018.03.23 00:00:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=18 fe80::8 store=active . 2018.03.23 00:00:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2018.03.23 00:00:53 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:104::1 metric -1) dev Ethernet 2 . 2018.03.23 00:00:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=18 fe80::8 store=active . 2018.03.23 00:00:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2018.03.23 00:00:53 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:104::1 metric -1) dev Ethernet 2 . 2018.03.23 00:00:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=18 fe80::8 store=active . 2018.03.23 00:00:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2018.03.23 00:00:53 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:104::1 metric -1) dev Ethernet 2 . 2018.03.23 00:00:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=18 fe80::8 store=active . 2018.03.23 00:00:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2018.03.23 00:00:53 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4 . 2018.03.23 00:00:53 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6 . 2018.03.23 00:00:53 - DNS leak protection with packet filtering enabled. . 2018.03.23 00:00:54 - DNS IPv4 of a network adapter forced (Ethernet 2, from manual (10.4.0.1) to 10.104.0.1) . 2018.03.23 00:00:54 - Routes, added a new route, 109.232.227.133 for gateway 10.104.0.1 . 2018.03.23 00:00:54 - Routes, added a new route, 2a00:1678:2470:14:8b1f:21a6:b646:bf3d for gateway fde6:7a:7d20:104::1 . 2018.03.23 00:00:54 - Flushing DNS I 2018.03.23 00:00:57 - Checking route IPv4 I 2018.03.23 00:00:57 - Checking route IPv6 . 2018.03.23 00:00:57 - curl: (7) Failed to connect to chara_exit.airservers.org port 89: Bad access . 2018.03.23 00:00:57 - Checking route (2° try) . 2018.03.23 00:00:59 - curl: (7) Failed to connect to chara_exit.airservers.org port 89: Bad access . 2018.03.23 00:00:59 - Checking route (3° try) . 2018.03.23 00:01:01 - curl: (7) Failed to connect to chara_exit.airservers.org port 89: Bad access E 2018.03.23 00:01:01 - Checking route IPv6 failed. . 2018.03.23 00:01:01 - OpenVPN > Initialization Sequence Completed ! 2018.03.23 00:01:01 - Disconnecting . 2018.03.23 00:01:01 - Routes, removed a route previously added, 109.232.227.133 for gateway 10.104.0.1 . 2018.03.23 00:01:01 - Routes, removed a route previously added, 2a00:1678:2470:14:8b1f:21a6:b646:bf3d for gateway fde6:7a:7d20:104::1 . 2018.03.23 00:01:01 - Sending management termination signal . 2018.03.23 00:01:01 - Management - Send 'signal SIGTERM' . 2018.03.23 00:01:01 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2018.03.23 00:01:01 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.03.23 00:01:06 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.232.227.135 MASK 255.255.255.255 192.168.0.1 . 2018.03.23 00:01:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2018.03.23 00:01:06 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.104.0.1 . 2018.03.23 00:01:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2018.03.23 00:01:06 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.104.0.1 . 2018.03.23 00:01:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2018.03.23 00:01:06 - OpenVPN > delete_route_ipv6(::/3) . 2018.03.23 00:01:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=18 fe80::8 store=active . 2018.03.23 00:01:06 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2018.03.23 00:01:06 - OpenVPN > delete_route_ipv6(2000::/4) . 2018.03.23 00:01:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=18 fe80::8 store=active . 2018.03.23 00:01:06 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2018.03.23 00:01:06 - OpenVPN > delete_route_ipv6(3000::/4) . 2018.03.23 00:01:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=18 fe80::8 store=active . 2018.03.23 00:01:06 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2018.03.23 00:01:06 - OpenVPN > delete_route_ipv6(fc00::/7) . 2018.03.23 00:01:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=18 fe80::8 store=active . 2018.03.23 00:01:06 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2018.03.23 00:01:06 - OpenVPN > Closing TUN/TAP interface . 2018.03.23 00:01:06 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:104::100a/64) . 2018.03.23 00:01:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:104::100a/64 interface=18 fe80::8 store=active . 2018.03.23 00:01:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:104::100a store=active . 2018.03.23 00:01:06 - OpenVPN > TAP: DHCP address released . 2018.03.23 00:01:06 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2018.03.23 00:01:06 - Connection terminated. . 2018.03.23 00:01:06 - IPv6 restored with packet filtering. . 2018.03.23 00:01:06 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to 10.4.0.1) . 2018.03.23 00:01:06 - DNS leak protection with packet filtering disabled. . 2018.03.23 00:01:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4 . 2018.03.23 00:01:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6 I 2018.03.23 00:01:08 - Cancel requested. I 2018.03.23 00:01:08 - Session terminated. Share this post Link to post
Flx 76 Posted ... This is what I got from CastorThu Mar 29 07:18:12 2018 TLS Error: local/remote TLS keys are out of sync: [AF_INET]91.207.57.117:443 [1]Thu Mar 29 07:18:25 2018 TLS Error: local/remote TLS keys are out of sync: [AF_INET]91.207.57.117:443 [1]Thu Mar 29 07:18:25 2018 TLS Error: local/remote TLS keys are out of sync: [AF_INET]91.207.57.117:443 [1]Thu Mar 29 07:18:31 2018 TLS Error: local/remote TLS keys are out of sync: [AF_INET]91.207.57.117:443 [1]Thu Mar 29 07:18:31 2018 TLS Error: local/remote TLS keys are out of sync: [AF_INET]91.207.57.117:443 [1]Thu Mar 29 07:18:46 2018 TLS Error: local/remote TLS keys are out of sync: [AF_INET]91.207.57.117:443 [1]Thu Mar 29 07:18:47 2018 TLS Error: local/remote TLS keys are out of sync: [AF_INET]91.207.57.117:443 [1]Thu Mar 29 07:18:51 2018 TLS Error: local/remote TLS keys are out of sync: [AF_INET]91.207.57.117:443 [1]After connecting to Castor.....OH wow....... Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
Flx 76 Posted ... Castor server connect on UDP 443 the error I got After "netsh interface ipv6 reset"Fri Mar 30 05:03:01 2018 NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=16 fde6:7a:7d20:100::1006 store=activeFri Mar 30 05:03:02 2018 ERROR: netsh command failed: returned error code 1Fri Mar 30 05:03:07 2018 NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=16 fde6:7a:7d20:100::1006 store=activeFri Mar 30 05:03:07 2018 ERROR: netsh command failed: returned error code 1Fri Mar 30 05:03:12 2018 NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=16 fde6:7a:7d20:100::1006 store=activeFri Mar 30 05:03:12 2018 ERROR: netsh command failed: returned error code 1Fri Mar 30 05:03:17 2018 NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=16 fde6:7a:7d20:100::1006 store=activeFri Mar 30 05:03:17 2018 ERROR: netsh command failed: returned error code 1Fri Mar 30 05:03:21 2018 MANAGEMENT: Client disconnectedFri Mar 30 05:03:21 2018 NETSH: command failedFri Mar 30 05:03:21 2018 Exiting due to fatal error Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
Flx 76 Posted ... Any chance of upgrading one of the servers in NL ( there's tons of them ) to the IPv6 version ?Any chance of a server in Canada IPv6 from Amanah or YesUp? The choice of the provider I leave that to you Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
ghulands 0 Posted ... I noticed that both Charra and Castor give out the same IPV4 subnet 10.110.0.x Is it possible for you to have them give out different ones? I'm pretty sure I had see 10.112.0.x given out. IPV6 is fine. Share this post Link to post
Flx 76 Posted ... I noticed that both Charra and Castor give out the same IPV4 subnet 10.110.0.x Is it possible for you to have them give out different ones? I'm pretty sure I had see 10.112.0.x given out.change the port number Chara 443 Castor 80- see if that works for you Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
ghulands 0 Posted ... change the port number Chara 443 Castor 80- see if that works for youI noticed that both Charra and Castor give out the same IPV4 subnet 10.110.0.x Is it possible for you to have them give out different ones? I'm pretty sure I had see 10.112.0.x given out.Still the same. I was originally using 53 and 2018 Share this post Link to post
Flx 76 Posted ... Still the same. I was originally using 53 and 2018If Chara and Castor are connected at the same time, IPv6 on both will work.IPv4 only one of the two will be used.*Regarding torrent clients thatz the way it goes as observed and tested in utorrent.When this IPV6 test is over Stuff will give us the heads up. Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
Judas4all 3 Posted ... change the port number Chara 443 Castor 80- see if that works for youI noticed that both Charra and Castor give out the same IPV4 subnet 10.110.0.x Is it possible for you to have them give out different ones? I'm pretty sure I had see 10.112.0.x given out.This does not work for me. The NL Server always gives me a 10.6 IP, which is bad, as I already have one connection to a AirVPN server on this range.Dear Team, can you ensure, the test servers are configured as the rest of the server + IPv6 ? So each port gives a different subnet, I'm really missing this. That would help, thanks Share this post Link to post
Flx 76 Posted ... This does not work for me. The NL Server always gives me a 10.6 IP, which is bad, as I already have one connection to a AirVPN server on this range.Yes we need a new/different IP range for IPv4. (eg 10.100.x.x-10.110.x.x.....10.120.x.x-10.130-.x.x etc). the test servers are configured as the rest of the server + IPv6 ? So each port gives a different subnet, I'm really missing thisGood point.....its up to the Staff/Team to deliver it. Hide Flx's signature Hide all signatures Guide - EMBY Block ALL interfaces except tap/vpn Windows OS - Configuring your operating system Windows OS - Multi Session/Tunnel Share this post Link to post
NaDre 157 Posted ... I noticed that both Charra and Castor give out the same IPV4 subnet 10.110.0.x ... I count 220 servers. Giving each its own sub-net may not be practical. That would make the limit 255 servers. Using the usual UDP 443 connections on non-experimental servers, I find that so long as the actual addresses on the client side are not the same, even if the sub-net is the same, I can bind my torrent client to one and SQUID to the other with no problems. I never have either VPN connection be the default gateway. I leave the real gateway as the default gateway by adding more specific routing table entries than the ones that OpenVPN adds (with the 128.0.0.0 netmask for IPv4 or the ::/3, 2000::/4, 3000::/4 and fc00::/7 entries for IPv6) pointing back to my real interface. If there was an address conflict, and just changing one of the servers is not an option, you can use the "client-nat" option for the OpenVPN client to make it appear that one VPN connection is on a different sub-net. To use "client-nat" you also have to suppress the "ifconfig" option pushed from the server using the "pull-filter" option, and specify your own "ifconfig ". Unfortunately "client-nat" only works for IPv4. Share this post Link to post
ghulands 0 Posted ... I'm connecting fine over UDP6, which is great. However I've already experienced a few problems with the actual IPv6 connectivity provided on the tunnel interface. In troubleshooting I looked at the tunnel interface. utun1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500inet 10.18.0.8 --> 10.18.0.8 netmask 0xffff0000 inet6 fe80::426c:8fff:fe48:6c0e%utun1 prefixlen 64 scopeid 0x10 inet6 fde6:7a:7d20:18::1006 prefixlen 64 It shows "fde6:7a:7d20:18::1006", which is a ULA. So my first thought is that it's network prefix translation (NPTv6). Nope, it's actually overloading NAT, which is causing problems with the app I'm using over the VPN. No developers are implementing STUN for IPv6 so using NAT (overloading) is a really bad practice and will cause problems. Your server/colocation provider should be routing you a IPv6 address block, which you can then use directly in the VPN config, or use NPTv6.I'm hitting this issue as well. I'm unable to route the IPv6 traffic from my LAN to the OpenVPN interface. I tried using the NPt in pfSense, but still couldn't get it to route. AirVPN Staff, how are we meant to route our LAN traffic over the interface? Share this post Link to post
subscriptionblocker 6 Posted ... At some point, will IPv4 customers be able to connect to IPv6 addresses through these VPNs? Share this post Link to post
Monotremata 22 Posted ... At some point, will IPv4 customers be able to connect to IPv6 addresses through these VPNs? ??? You've been able to since day 1, unless you have IPv6 like turned off on your machine or something. Im not even connected to any VPN right now and I show up as an IPv6 address at the top of the Air website, just connected normally through Spectrum/Time Warner. Just make sure you haven't disabled it. Share this post Link to post