Jump to content
Not connected, Your IP: 44.197.114.92
Staff

IPv6 support - Experimental phase

Recommended Posts

First round of tests:

http://www.speedtest.net/result/7090222137

http://www.speedtest.net/result/7090224793

http://www.speedtest.net/result/7090250326 <- 253 Mbps holy s*** !!

 

What is most impressing is the ping time. Basically, it's somewhat smaller than when NOT using VPN ! (Apparently Chara's routing is slightly faster than Ziggo's CGN - DS Lite)

Ran a few more tests to different servers in NL, getting results of 12-15ms consistently)

 

Will come back with more info/observations later, but so far it appears to be working fine in connecting both IPv6 "only", and also IPv6/IPv4

 

---

p.s. - I love you guys !

+3 months added to my subscription \o/

 

 

EDIT:

Getting some DNS problems with this server, and unable to access certain websites which are IPv4 only (they work with the other servers still on IPv4)

Good show .

 

Wait until Airs birthday in May/June and you can catch a discount


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

EDIT:

Getting some DNS problems with this server, and unable to access certain websites which are IPv4 only (they work with the other servers still on IPv4)

 

Hello!

 

The previous DNS problem you warned us about was linked to ipleak.net server problems, unrelated to Chara. It has been fixed, please try again.

 

Can you also tell us which websites you can't access from Chara?

 

Thank you!

 

Kind regards

Share this post


Link to post

Can you also tell us which websites you can't access from Chara?

 

Some little instability noticed, but not that bad. Probably because many people are trying out Chara.

 

However this particular one which interests me doesn't seem to load no matter what on Chara, while it works on (most) others:

https://airvpn.org/routes/?q=https%3A%2F%2Fsdbits.org

 

Seems to work just fine on Castor, but not on Chara.

No clue. The tubes in that direction are clogged :-)

 

I 2018.02.26 13:54:19 - Checking authorization ...

! 2018.02.26 13:54:19 - Connecting to Castor (Belgium, Brussels)

. 2018.02.26 13:54:19 - OpenVPN > OpenVPN 2.4.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Nov  3 2017

. 2018.02.26 13:54:19 - OpenVPN > Windows version 6.1 (Windows 7) 64bit

. 2018.02.26 13:54:19 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.02.26 13:54:19 - Connection to OpenVPN Management Interface

. 2018.02.26 13:54:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.02.26 13:54:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.26 13:54:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.26 13:54:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443

. 2018.02.26 13:54:19 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]

. 2018.02.26 13:54:19 - OpenVPN > UDPv6 link local: (not bound)

. 2018.02.26 13:54:19 - OpenVPN > UDPv6 link remote: [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443

. 2018.02.26 13:54:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.02.26 13:54:19 - OpenVPN > TLS: Initial packet from [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443, sid=693762e1 3903cf17

. 2018.02.26 13:54:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.02.26 13:54:19 - OpenVPN > VERIFY KU OK

. 2018.02.26 13:54:19 - OpenVPN > Validating certificate extended key usage

. 2018.02.26 13:54:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.02.26 13:54:19 - OpenVPN > VERIFY EKU OK

. 2018.02.26 13:54:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Castor, emailAddress=info@airvpn.org

. 2018.02.26 13:54:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.02.26 13:54:20 - OpenVPN > [Castor] Peer Connection Initiated with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443

. 2018.02.26 13:54:21 - OpenVPN > SENT CONTROL [Castor]: 'PUSH_REQUEST' (status=1)

. 2018.02.26 13:54:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.0.1,dhcp-option DNS6 fde6:7a:7d20:8::1,tun-ipv6,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:8::1038/64 fde6:7a:7d20:8::1,ifconfig 10.8.0.58 255.255.0.0,peer-id 2,cipher AES-256-GCM'

. 2018.02.26 13:54:21 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'

. 2018.02.26 13:54:21 - OpenVPN > Note: option tun-ipv6 is ignored because modern operating systems do not need special IPv6 tun handling anymore.

. 2018.02.26 13:54:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.02.26 13:54:21 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.02.26 13:54:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.02.26 13:54:21 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.02.26 13:54:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.02.26 13:54:21 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.02.26 13:54:21 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.02.26 13:54:21 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.02.26 13:54:21 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.02.26 13:54:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.02.26 13:54:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.02.26 13:54:21 - OpenVPN > interactive service msg_channel=0

. 2018.02.26 13:54:21 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=15 HWADDR=f4:f2:6d:05:5b:66

. 2018.02.26 13:54:21 - OpenVPN > GDG6: remote_host_ipv6=2001:ac8:27:f:9ff8:eafb:3bb8:3c4f

. 2018.02.26 13:54:21 - OpenVPN > GetBestInterfaceEx() returned if=15

. 2018.02.26 13:54:21 - OpenVPN > GDG6: II=15 DP=::/0 NH=fe80::ae22:5ff:fea2:23b8

. 2018.02.26 13:54:21 - OpenVPN > GDG6: Metric=16, Loopback=0, AA=1, I=0

. 2018.02.26 13:54:21 - OpenVPN > ROUTE6_GATEWAY fe80::ae22:5ff:fea2:23b8 I=15

. 2018.02.26 13:54:21 - OpenVPN > ROUTE6: 2000::/4 overlaps IPv6 remote 2001:ac8:27:f:9ff8:eafb:3bb8:3c4f, adding host route to VPN endpoint

. 2018.02.26 13:54:21 - OpenVPN > open_tun

. 2018.02.26 13:54:21 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{E3B8A1A0-A5F8-47F6-ADAA-729CE20CEF88}.tap

. 2018.02.26 13:54:21 - OpenVPN > TAP-Windows Driver Version 9.21

. 2018.02.26 13:54:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.58/255.255.0.0 [sUCCEEDED]

. 2018.02.26 13:54:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.58/255.255.0.0 on interface {E3B8A1A0-A5F8-47F6-ADAA-729CE20CEF88} [DHCP-serv: 10.8.255.254, lease-time: 31536000]

. 2018.02.26 13:54:21 - OpenVPN > Successful ARP Flush on interface [20] {E3B8A1A0-A5F8-47F6-ADAA-729CE20CEF88}

. 2018.02.26 13:54:21 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1

. 2018.02.26 13:54:22 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=20 fde6:7a:7d20:8::1038 store=active

. 2018.02.26 13:54:23 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns Local Area Connection static fde6:7a:7d20:8::1 validate=no

. 2018.02.26 13:54:23 - OpenVPN > add_route_ipv6(fde6:7a:7d20:8::/64 -> fde6:7a:7d20:8::1038 metric 0) dev Local Area Connection

. 2018.02.26 13:54:23 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:8::/64 interface=20 fe80::8 store=active

. 2018.02.26 13:54:23 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2018.02.26 13:54:28 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2018.02.26 13:54:28 - OpenVPN > ROUTE remote_host protocol differs from tunneled

. 2018.02.26 13:54:28 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1

. 2018.02.26 13:54:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2018.02.26 13:54:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.02.26 13:54:28 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1

. 2018.02.26 13:54:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2018.02.26 13:54:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.02.26 13:54:28 - OpenVPN > add_route_ipv6(2001:ac8:27:f:9ff8:eafb:3bb8:3c4f/128 -> fe80::ae22:5ff:fea2:23b8 metric 1) dev Local Area Connection

. 2018.02.26 13:54:28 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 2001:ac8:27:f:9ff8:eafb:3bb8:3c4f/128 interface=15 fe80::ae22:5ff:fea2:23b8 store=active

. 2018.02.26 13:54:28 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2018.02.26 13:54:28 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:8::1 metric -1) dev Local Area Connection

. 2018.02.26 13:54:28 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route ::/3 interface=20 fe80::8 store=active

. 2018.02.26 13:54:28 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2018.02.26 13:54:28 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:8::1 metric -1) dev Local Area Connection

. 2018.02.26 13:54:28 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 2000::/4 interface=20 fe80::8 store=active

. 2018.02.26 13:54:28 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2018.02.26 13:54:28 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:8::1 metric -1) dev Local Area Connection

. 2018.02.26 13:54:28 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 3000::/4 interface=20 fe80::8 store=active

. 2018.02.26 13:54:28 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2018.02.26 13:54:28 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:8::1 metric -1) dev Local Area Connection

. 2018.02.26 13:54:28 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fc00::/7 interface=20 fe80::8 store=active

. 2018.02.26 13:54:28 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2018.02.26 13:54:28 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4

. 2018.02.26 13:54:28 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6

. 2018.02.26 13:54:28 - DNS leak protection with packet filtering enabled.

. 2018.02.26 13:54:28 - DNS IPv4 of a network adapter forced (Local Area Connection, from manual (10.4.0.1) to 10.8.0.1)

. 2018.02.26 13:54:28 - Routes, added a new route, 91.207.57.115 for gateway 10.8.0.1

. 2018.02.26 13:54:28 - Routes, added a new route, 2001:ac8:27:f:c0ca:9f36:68ed:1e70 for gateway fde6:7a:7d20:8::1

. 2018.02.26 13:54:28 - Flushing DNS

I 2018.02.26 13:54:34 - Checking route IPv4

I 2018.02.26 13:54:34 - Checking route IPv6

I 2018.02.26 13:54:38 - Checking DNS

! 2018.02.26 13:54:38 - Connected.

. 2018.02.26 13:54:38 - OpenVPN > Initialization Sequence Completed

. 2018.02.26 13:54:51 - Updating systems & servers data ...

. 2018.02.26 13:54:52 - Systems & servers data update completed

! 2018.02.26 13:55:36 - Disconnecting

. 2018.02.26 13:55:36 - Routes, removed a route previously added, 91.207.57.115 for gateway 10.8.0.1

. 2018.02.26 13:55:36 - Routes, removed a route previously added, 2001:ac8:27:f:c0ca:9f36:68ed:1e70 for gateway fde6:7a:7d20:8::1

. 2018.02.26 13:55:36 - Sending management termination signal

. 2018.02.26 13:55:36 - Management - Send 'signal SIGTERM'

. 2018.02.26 13:55:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.02.26 13:55:36 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.02.26 13:55:41 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.0.1

. 2018.02.26 13:55:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2018.02.26 13:55:41 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.8.0.1

. 2018.02.26 13:55:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2018.02.26 13:55:41 - OpenVPN > delete_route_ipv6(2001:ac8:27:f:9ff8:eafb:3bb8:3c4f/128)

. 2018.02.26 13:55:41 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route 2001:ac8:27:f:9ff8:eafb:3bb8:3c4f/128 interface=15 fe80::ae22:5ff:fea2:23b8 store=active

. 2018.02.26 13:55:41 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2018.02.26 13:55:41 - OpenVPN > delete_route_ipv6(::/3)

. 2018.02.26 13:55:41 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route ::/3 interface=20 fe80::8 store=active

. 2018.02.26 13:55:41 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2018.02.26 13:55:41 - OpenVPN > delete_route_ipv6(2000::/4)

. 2018.02.26 13:55:41 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=20 fe80::8 store=active

. 2018.02.26 13:55:41 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2018.02.26 13:55:41 - OpenVPN > delete_route_ipv6(3000::/4)

. 2018.02.26 13:55:41 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=20 fe80::8 store=active

. 2018.02.26 13:55:41 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2018.02.26 13:55:41 - OpenVPN > delete_route_ipv6(fc00::/7)

. 2018.02.26 13:55:41 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=20 fe80::8 store=active

. 2018.02.26 13:55:41 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2018.02.26 13:55:41 - OpenVPN > Closing TUN/TAP interface

. 2018.02.26 13:55:41 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:8::1038/64)

. 2018.02.26 13:55:41 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:8::1038/64 interface=20 fe80::8 store=active

. 2018.02.26 13:55:41 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address Local Area Connection fde6:7a:7d20:8::1038 store=active

. 2018.02.26 13:55:41 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns Local Area Connection all

. 2018.02.26 13:55:41 - OpenVPN > TAP: DHCP address released

. 2018.02.26 13:55:41 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.02.26 13:55:41 - Connection terminated.

. 2018.02.26 13:55:41 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection, to 10.4.0.1)

. 2018.02.26 13:55:41 - DNS leak protection with packet filtering disabled.

. 2018.02.26 13:55:41 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv4

. 2018.02.26 13:55:41 - Interface Local Area Connection metric restored from 3 to Automatic, layer IPv6

I 2018.02.26 13:55:41 - Checking authorization ...

! 2018.02.26 13:55:41 - Connecting to Chara (Netherlands, Alblasserdam)

. 2018.02.26 13:55:41 - OpenVPN > OpenVPN 2.4.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Nov  3 2017

. 2018.02.26 13:55:41 - OpenVPN > Windows version 6.1 (Windows 7) 64bit

. 2018.02.26 13:55:41 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.02.26 13:55:41 - Connection to OpenVPN Management Interface

. 2018.02.26 13:55:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.02.26 13:55:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.26 13:55:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.26 13:55:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2a00:1678:2470:14:2e05:7341:c357:de7f:443

. 2018.02.26 13:55:41 - OpenVPN > Socket Buffers: R=[8192->262144] S=[8192->262144]

. 2018.02.26 13:55:41 - OpenVPN > UDPv6 link local: (not bound)

. 2018.02.26 13:55:41 - OpenVPN > UDPv6 link remote: [AF_INET6]2a00:1678:2470:14:2e05:7341:c357:de7f:443

. 2018.02.26 13:55:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.02.26 13:55:41 - OpenVPN > TLS: Initial packet from [AF_INET6]2a00:1678:2470:14:2e05:7341:c357:de7f:443, sid=e30c094e f31ab91d

. 2018.02.26 13:55:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.02.26 13:55:42 - OpenVPN > VERIFY KU OK

. 2018.02.26 13:55:42 - OpenVPN > Validating certificate extended key usage

. 2018.02.26 13:55:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.02.26 13:55:42 - OpenVPN > VERIFY EKU OK

. 2018.02.26 13:55:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.02.26 13:55:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.02.26 13:55:42 - OpenVPN > [server] Peer Connection Initiated with [AF_INET6]2a00:1678:2470:14:2e05:7341:c357:de7f:443

. 2018.02.26 13:55:43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.02.26 13:55:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.0.1,dhcp-option DNS6 fde6:7a:7d20:8::1,tun-ipv6,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:8::100a/64 fde6:7a:7d20:8::1,ifconfig 10.8.0.12 255.255.0.0,peer-id 5,cipher AES-256-GCM'

. 2018.02.26 13:55:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'

. 2018.02.26 13:55:43 - OpenVPN > Note: option tun-ipv6 is ignored because modern operating systems do not need special IPv6 tun handling anymore.

. 2018.02.26 13:55:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.02.26 13:55:43 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.02.26 13:55:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.02.26 13:55:43 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.02.26 13:55:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.02.26 13:55:43 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.02.26 13:55:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.02.26 13:55:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.02.26 13:55:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.02.26 13:55:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.02.26 13:55:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.02.26 13:55:43 - OpenVPN > interactive service msg_channel=0

. 2018.02.26 13:55:43 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=15 HWADDR=f4:f2:6d:05:5b:66

. 2018.02.26 13:55:43 - OpenVPN > GDG6: remote_host_ipv6=2a00:1678:2470:14:2e05:7341:c357:de7f

. 2018.02.26 13:55:43 - OpenVPN > GetBestInterfaceEx() returned if=15

. 2018.02.26 13:55:43 - OpenVPN > GDG6: II=15 DP=::/0 NH=fe80::ae22:5ff:fea2:23b8

. 2018.02.26 13:55:43 - OpenVPN > GDG6: Metric=16, Loopback=0, AA=1, I=0

. 2018.02.26 13:55:43 - OpenVPN > ROUTE6_GATEWAY fe80::ae22:5ff:fea2:23b8 I=15

. 2018.02.26 13:55:43 - OpenVPN > ROUTE6: 2000::/4 overlaps IPv6 remote 2a00:1678:2470:14:2e05:7341:c357:de7f, adding host route to VPN endpoint

. 2018.02.26 13:55:43 - OpenVPN > open_tun

. 2018.02.26 13:55:43 - OpenVPN > TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{E3B8A1A0-A5F8-47F6-ADAA-729CE20CEF88}.tap

. 2018.02.26 13:55:43 - OpenVPN > TAP-Windows Driver Version 9.21

. 2018.02.26 13:55:43 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.12/255.255.0.0 [sUCCEEDED]

. 2018.02.26 13:55:43 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.12/255.255.0.0 on interface {E3B8A1A0-A5F8-47F6-ADAA-729CE20CEF88} [DHCP-serv: 10.8.255.254, lease-time: 31536000]

. 2018.02.26 13:55:43 - OpenVPN > Successful ARP Flush on interface [20] {E3B8A1A0-A5F8-47F6-ADAA-729CE20CEF88}

. 2018.02.26 13:55:43 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1

. 2018.02.26 13:55:44 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=20 fde6:7a:7d20:8::100a store=active

. 2018.02.26 13:55:45 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns Local Area Connection static fde6:7a:7d20:8::1 validate=no

. 2018.02.26 13:55:45 - OpenVPN > add_route_ipv6(fde6:7a:7d20:8::/64 -> fde6:7a:7d20:8::100a metric 0) dev Local Area Connection

. 2018.02.26 13:55:45 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:8::/64 interface=20 fe80::8 store=active

. 2018.02.26 13:55:45 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2018.02.26 13:55:50 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2018.02.26 13:55:50 - OpenVPN > ROUTE remote_host protocol differs from tunneled

. 2018.02.26 13:55:50 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1

. 2018.02.26 13:55:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2018.02.26 13:55:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.02.26 13:55:50 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1

. 2018.02.26 13:55:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2018.02.26 13:55:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2018.02.26 13:55:50 - OpenVPN > add_route_ipv6(2a00:1678:2470:14:2e05:7341:c357:de7f/128 -> fe80::ae22:5ff:fea2:23b8 metric 1) dev Local Area Connection

. 2018.02.26 13:55:50 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 2a00:1678:2470:14:2e05:7341:c357:de7f/128 interface=15 fe80::ae22:5ff:fea2:23b8 store=active

. 2018.02.26 13:55:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2018.02.26 13:55:50 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:8::1 metric -1) dev Local Area Connection

. 2018.02.26 13:55:50 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route ::/3 interface=20 fe80::8 store=active

. 2018.02.26 13:55:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2018.02.26 13:55:50 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:8::1 metric -1) dev Local Area Connection

. 2018.02.26 13:55:50 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 2000::/4 interface=20 fe80::8 store=active

. 2018.02.26 13:55:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2018.02.26 13:55:50 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:8::1 metric -1) dev Local Area Connection

. 2018.02.26 13:55:50 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 3000::/4 interface=20 fe80::8 store=active

. 2018.02.26 13:55:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2018.02.26 13:55:50 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:8::1 metric -1) dev Local Area Connection

. 2018.02.26 13:55:50 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fc00::/7 interface=20 fe80::8 store=active

. 2018.02.26 13:55:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem

. 2018.02.26 13:55:50 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv4

. 2018.02.26 13:55:50 - Interface Local Area Connection metric changed from Automatic to 3, layer IPv6

. 2018.02.26 13:55:50 - DNS leak protection with packet filtering enabled.

. 2018.02.26 13:55:50 - DNS IPv4 of a network adapter forced (Local Area Connection, from manual (10.4.0.1) to 10.8.0.1)

. 2018.02.26 13:55:50 - Routes, added a new route, 109.232.227.133 for gateway 10.8.0.1

. 2018.02.26 13:55:50 - Routes, added a new route, 2a00:1678:2470:14:8b1f:21a6:b646:bf3d for gateway fde6:7a:7d20:8::1

. 2018.02.26 13:55:50 - Flushing DNS

I 2018.02.26 13:55:56 - Checking route IPv4

I 2018.02.26 13:55:56 - Checking route IPv6

I 2018.02.26 13:56:00 - Checking DNS

! 2018.02.26 13:56:00 - Connected.

. 2018.02.26 13:56:00 - OpenVPN > Initialization Sequence Completed

. 2018.02.26 13:56:06 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #14880 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

Share this post


Link to post

I hope that the set up documentation on the website is updated before the IPv6 deployment happens

 

 

How much longer is the planned experimental phase?  When should we expect all this to roll out to all servers?

 

Hello,

 

it is not set as a date but as a conditional events sequence, We will start IPv6 widespread deployment after Eddie 2.14.x stable has been released, and after any investigation on various feedback pertaining to IPv6 is over.

 

Kind regards

Share this post


Link to post

For some reason Chara is slow for torrents, even if the server itself is not overloaded.

That doesn't happen with the other servers in NL (which are still on IPv4), they go sometimes up to 300+mbps in a short burst

 

see pictures - Lots of peers (and many of them high-bandwidth)

 

Picture 1 - Chara barely 10mbps

Picture 2 - Chara is not overloaded, actually it's in low 15%

Picture 3 - Andromeda @ 321Mbps

Picture 4 - Andromeda #1

Picture 5 - Andromeda at 78%, still fast !

Share this post


Link to post

I can second 'Shiver me timbers' concerning the site 'https://sdbits.org/'.

 

'Castor' connects, although it may take a while. 'Chara', on the other hand, gives me a timeout in each Browser. Also, 'ping' gets no response and 'mtr' doesn't get through.

 

Tested on Ubuntu 16.04.4 LTS using Eddie 2.14.2.

Share this post


Link to post

Wow Chara is working great over here. Im in Los Angeles, and just hit 66Mbps with Speedtest with the regular old UDP connection heh. Castor Im lucky to get 10! ipleak.net is all good, ipv6-test.com passes with 19/20.

Share this post


Link to post

Hi,

I'm having trouble getting pfSense to establish a udp6 connection to both castor and chara. The only difference i could really see from the config pfsense generated and the one that the airvpn configurator made was no-bind vs local. I'm unsure if this is the problem. I am able to telnet to the remote ipv6 host, and also tested udp with 

 

nc -v -u -z -w 3 2001:ac8:27:f:80eb:9a7b:3c0f:e4cf 443
Connection to 2001:ac8:27:f:80eb:9a7b:3c0f:e4cf 443 port [udp/https] succeeded!
 
Does anyone have any suggestions on what might be wong?

 

I have also set the monitor ip to fde6:7a:7d20:104::1, though i'm not sure if this is the correct address. 

 

Here is the config that the UI generated and is using:

dev ovpnc4

verb 3
dev-type tun
dev-node /dev/tun4
writepid /var/run/openvpn_client4.pid
#user nobody
#group nobody
script-security 3
daemon
keepalive 10 60
ping-timer-rem
persist-tun
persist-key
proto udp6
cipher AES-256-CBC
auth SHA512
up /usr/local/sbin/ovpn-linkup
down /usr/local/sbin/ovpn-linkdown
local 2603:3006:xxxx:xxxx:xxxx:xxxx:xxxx:7068
tls-client
client
lport 0
management /var/etc/openvpn/client4.sock unix
remote 2001:ac8:27:f:80eb:9a7b:3c0f:e4cf 443
ca /var/etc/openvpn/client4.ca 
cert /var/etc/openvpn/client4.cert 
key /var/etc/openvpn/client4.key 
tls-crypt /var/etc/openvpn/client4.tls-crypt 
comp-lzo no
resolv-retry infinite
route-nopull
route-delay 5
remote-cert-tls server
dev tun
 

 

Here are the logs:

Mar 11 13:13:16 router openvpn[7914]: MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client4.sock

Mar 11 13:13:16 router openvpn[7914]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mar 11 13:13:16 router openvpn[7914]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Mar 11 13:13:16 router openvpn[7914]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Mar 11 13:13:16 router openvpn[7914]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Mar 11 13:13:16 router openvpn[7914]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Mar 11 13:13:16 router openvpn[7914]: TCP/UDP: Preserving recently used remote address: [AF_INET6]2001:ac8:27:f:80eb:9a7b:3c0f:e4cf:443
Mar 11 13:13:16 router openvpn[7914]: Socket Buffers: R=[42080->42080] S=[57344->57344]
Mar 11 13:13:16 router openvpn[7914]: setsockopt(IPV6_V6ONLY=0)
Mar 11 13:13:16 router openvpn[7914]: UDPv6 link local (bound): [AF_INET6]2603:3006:xxxx:xxxx:xxxx:xxxx:xxxx:7068:0
Mar 11 13:13:16 router openvpn[7914]: UDPv6 link remote: [AF_INET6]2001:ac8:27:f:80eb:9a7b:3c0f:e4cf:443
Mar 11 13:14:16 router openvpn[7914]: [uNDEF] Inactivity timeout (--ping-restart), restarting
Mar 11 13:14:16 router openvpn[7914]: SIGUSR1[soft,ping-restart] received, process restarting
Mar 11 13:14:16 router openvpn[7914]: Restart pause, 5 second(s)

Share this post


Link to post

 

Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

Which cipher is AES-256-CTR ? Your settings have AES-256-CBC. Not sure if that's the problem or just a typo in the logs. You could set it to AES-256-GCM

Share this post


Link to post

 

Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

Which cipher is AES-256-CTR ? Your settings have AES-256-CBC. Not sure if that's the problem or just a typo in the logs. You could set it to AES-256-GCM

 

aes-256-ctr is the control channel encryption that's part of the new tls-crypt option.

Share this post


Link to post

 

 

Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

Which cipher is AES-256-CTR ? Your settings have AES-256-CBC. Not sure if that's the problem or just a typo in the logs. You could set it to AES-256-GCM

 

aes-256-ctr is the control channel encryption that's part of the new tls-crypt option.

Ok. Never noticed that before in logs

Share this post


Link to post

Hello,

The eperimental servers seems to have a problem with the micro-routing system. I can't access tf1.fr or 6play.fr (which bound to your french routing server): ping fails and I have the « can't access this website » error in Mozilla.

 

Appart from that, set with the UDP80 (TLScrypt) the route check fails to pass, I have to disable it:

I 2018.03.23 00:00:45 - Session starting.
I 2018.03.23 00:00:45 - Checking authorization ...
. 2018.03.23 00:00:45 - IPv6 disabled with packet filtering.
! 2018.03.23 00:00:45 - Connecting to Chara (Netherlands, Alblasserdam)
. 2018.03.23 00:00:45 - OpenVPN > OpenVPN 2.4.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Nov  3 2017
. 2018.03.23 00:00:45 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.03.23 00:00:45 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.03.23 00:00:45 - Connection to OpenVPN Management Interface
. 2018.03.23 00:00:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.03.23 00:00:45 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2018.03.23 00:00:45 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2018.03.23 00:00:45 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2018.03.23 00:00:45 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2018.03.23 00:00:45 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.232.227.135:80
. 2018.03.23 00:00:45 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.03.23 00:00:45 - OpenVPN > UDP link local: (not bound)
. 2018.03.23 00:00:45 - OpenVPN > UDP link remote: [AF_INET]109.232.227.135:80
. 2018.03.23 00:00:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.03.23 00:00:45 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.135:80, sid=85bd8dbe e2a6ddd9
. 2018.03.23 00:00:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.03.23 00:00:46 - OpenVPN > VERIFY KU OK
. 2018.03.23 00:00:46 - OpenVPN > Validating certificate extended key usage
. 2018.03.23 00:00:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.03.23 00:00:46 - OpenVPN > VERIFY EKU OK
. 2018.03.23 00:00:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.03.23 00:00:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.03.23 00:00:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.135:80
. 2018.03.23 00:00:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.03.23 00:00:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.104.0.1,tun-ipv6,route-gateway 10.104.0.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:104::100a/64 fde6:7a:7d20:104::1,ifconfig 10.104.0.12 255.255.0.0,peer-id 1,cipher AES-256-GCM'
. 2018.03.23 00:00:47 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2018.03.23 00:00:47 - OpenVPN > Note: option tun-ipv6 is ignored because modern operating systems do not need special IPv6 tun handling anymore.
. 2018.03.23 00:00:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.03.23 00:00:47 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.03.23 00:00:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.03.23 00:00:47 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.03.23 00:00:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.03.23 00:00:47 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.03.23 00:00:47 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.03.23 00:00:47 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.03.23 00:00:47 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.03.23 00:00:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.23 00:00:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.03.23 00:00:47 - OpenVPN > interactive service msg_channel=0
. 2018.03.23 00:00:47 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=7 HWADDR=9c:b6:d0:f1:c1:53
. 2018.03.23 00:00:47 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2018.03.23 00:00:47 - OpenVPN > GetBestInterfaceEx() returned if=2
. 2018.03.23 00:00:47 - OpenVPN > GDG6: II=2 DP=::/0 NH=::
. 2018.03.23 00:00:47 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0
. 2018.03.23 00:00:47 - OpenVPN > ROUTE6_GATEWAY :: ON_LINK I=2
. 2018.03.23 00:00:47 - OpenVPN > open_tun
. 2018.03.23 00:00:47 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{A5205F28-C1C0-4AA4-85FA-FCA5D83ADBE1}.tap
. 2018.03.23 00:00:47 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.03.23 00:00:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.104.0.0/10.104.0.12/255.255.0.0 [SUCCEEDED]
. 2018.03.23 00:00:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.104.0.12/255.255.0.0 on interface {A5205F28-C1C0-4AA4-85FA-FCA5D83ADBE1} [DHCP-serv: 10.104.255.254, lease-time: 31536000]
. 2018.03.23 00:00:47 - OpenVPN > Successful ARP Flush on interface [18] {A5205F28-C1C0-4AA4-85FA-FCA5D83ADBE1}
. 2018.03.23 00:00:47 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2018.03.23 00:00:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=18 fde6:7a:7d20:104::100a store=active
. 2018.03.23 00:00:48 - OpenVPN > add_route_ipv6(fde6:7a:7d20:104::/64 -> fde6:7a:7d20:104::100a metric 0) dev Ethernet 2
. 2018.03.23 00:00:48 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:104::/64 interface=18 fe80::8 store=active
. 2018.03.23 00:00:48 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.23 00:00:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.03.23 00:00:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 109.232.227.135 MASK 255.255.255.255 192.168.0.1
. 2018.03.23 00:00:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.23 00:00:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.23 00:00:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.104.0.1
. 2018.03.23 00:00:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.23 00:00:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.23 00:00:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.104.0.1
. 2018.03.23 00:00:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.03.23 00:00:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.03.23 00:00:53 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:104::1 metric -1) dev Ethernet 2
. 2018.03.23 00:00:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=18 fe80::8 store=active
. 2018.03.23 00:00:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.23 00:00:53 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:104::1 metric -1) dev Ethernet 2
. 2018.03.23 00:00:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=18 fe80::8 store=active
. 2018.03.23 00:00:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.23 00:00:53 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:104::1 metric -1) dev Ethernet 2
. 2018.03.23 00:00:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=18 fe80::8 store=active
. 2018.03.23 00:00:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.23 00:00:53 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:104::1 metric -1) dev Ethernet 2
. 2018.03.23 00:00:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=18 fe80::8 store=active
. 2018.03.23 00:00:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.23 00:00:53 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.03.23 00:00:53 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.03.23 00:00:53 - DNS leak protection with packet filtering enabled.
. 2018.03.23 00:00:54 - DNS IPv4 of a network adapter forced (Ethernet 2, from manual (10.4.0.1) to 10.104.0.1)
. 2018.03.23 00:00:54 - Routes, added a new route, 109.232.227.133 for gateway 10.104.0.1
. 2018.03.23 00:00:54 - Routes, added a new route, 2a00:1678:2470:14:8b1f:21a6:b646:bf3d for gateway fde6:7a:7d20:104::1
. 2018.03.23 00:00:54 - Flushing DNS
I 2018.03.23 00:00:57 - Checking route IPv4
I 2018.03.23 00:00:57 - Checking route IPv6
. 2018.03.23 00:00:57 - curl: (7) Failed to connect to chara_exit.airservers.org port 89: Bad access
. 2018.03.23 00:00:57 - Checking route (2° try)
. 2018.03.23 00:00:59 - curl: (7) Failed to connect to chara_exit.airservers.org port 89: Bad access
. 2018.03.23 00:00:59 - Checking route (3° try)
. 2018.03.23 00:01:01 - curl: (7) Failed to connect to chara_exit.airservers.org port 89: Bad access
E 2018.03.23 00:01:01 - Checking route IPv6 failed.
. 2018.03.23 00:01:01 - OpenVPN > Initialization Sequence Completed
! 2018.03.23 00:01:01 - Disconnecting
. 2018.03.23 00:01:01 - Routes, removed a route previously added, 109.232.227.133 for gateway 10.104.0.1
. 2018.03.23 00:01:01 - Routes, removed a route previously added, 2a00:1678:2470:14:8b1f:21a6:b646:bf3d for gateway fde6:7a:7d20:104::1
. 2018.03.23 00:01:01 - Sending management termination signal
. 2018.03.23 00:01:01 - Management - Send 'signal SIGTERM'
. 2018.03.23 00:01:01 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.03.23 00:01:01 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.03.23 00:01:06 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 109.232.227.135 MASK 255.255.255.255 192.168.0.1
. 2018.03.23 00:01:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.03.23 00:01:06 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.104.0.1
. 2018.03.23 00:01:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.03.23 00:01:06 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.104.0.1
. 2018.03.23 00:01:06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.03.23 00:01:06 - OpenVPN > delete_route_ipv6(::/3)
. 2018.03.23 00:01:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=18 fe80::8 store=active
. 2018.03.23 00:01:06 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.23 00:01:06 - OpenVPN > delete_route_ipv6(2000::/4)
. 2018.03.23 00:01:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=18 fe80::8 store=active
. 2018.03.23 00:01:06 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.23 00:01:06 - OpenVPN > delete_route_ipv6(3000::/4)
. 2018.03.23 00:01:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=18 fe80::8 store=active
. 2018.03.23 00:01:06 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.23 00:01:06 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2018.03.23 00:01:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=18 fe80::8 store=active
. 2018.03.23 00:01:06 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2018.03.23 00:01:06 - OpenVPN > Closing TUN/TAP interface
. 2018.03.23 00:01:06 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:104::100a/64)
. 2018.03.23 00:01:06 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:104::100a/64 interface=18 fe80::8 store=active
. 2018.03.23 00:01:06 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:104::100a store=active
. 2018.03.23 00:01:06 - OpenVPN > TAP: DHCP address released
. 2018.03.23 00:01:06 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.03.23 00:01:06 - Connection terminated.
. 2018.03.23 00:01:06 - IPv6 restored with packet filtering.
. 2018.03.23 00:01:06 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to 10.4.0.1)
. 2018.03.23 00:01:06 - DNS leak protection with packet filtering disabled.
. 2018.03.23 00:01:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.03.23 00:01:06 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
I 2018.03.23 00:01:08 - Cancel requested.
I 2018.03.23 00:01:08 - Session terminated.

 

Share this post


Link to post

This is what I got from Castor

Thu Mar 29 07:18:12 2018 TLS Error: local/remote TLS keys are out of sync: [AF_INET]91.207.57.117:443 [1]
Thu Mar 29 07:18:25 2018 TLS Error: local/remote TLS keys are out of sync: [AF_INET]91.207.57.117:443 [1]
Thu Mar 29 07:18:25 2018 TLS Error: local/remote TLS keys are out of sync: [AF_INET]91.207.57.117:443 [1]
Thu Mar 29 07:18:31 2018 TLS Error: local/remote TLS keys are out of sync: [AF_INET]91.207.57.117:443 [1]
Thu Mar 29 07:18:31 2018 TLS Error: local/remote TLS keys are out of sync: [AF_INET]91.207.57.117:443 [1]
Thu Mar 29 07:18:46 2018 TLS Error: local/remote TLS keys are out of sync: [AF_INET]91.207.57.117:443 [1]
Thu Mar 29 07:18:47 2018 TLS Error: local/remote TLS keys are out of sync: [AF_INET]91.207.57.117:443 [1]
Thu Mar 29 07:18:51 2018 TLS Error: local/remote TLS keys are out of sync: [AF_INET]91.207.57.117:443 [1]

After connecting to Castor.....OH wow.......

Share this post


Link to post

Castor server connect on UDP 443  the error I got After "netsh interface ipv6 reset"

Fri Mar 30 05:03:01 2018 NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=16 fde6:7a:7d20:100::1006 store=active
Fri Mar 30 05:03:02 2018 ERROR: netsh command failed: returned error code 1
Fri Mar 30 05:03:07 2018 NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=16 fde6:7a:7d20:100::1006 store=active
Fri Mar 30 05:03:07 2018 ERROR: netsh command failed: returned error code 1
Fri Mar 30 05:03:12 2018 NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=16 fde6:7a:7d20:100::1006 store=active
Fri Mar 30 05:03:12 2018 ERROR: netsh command failed: returned error code 1
Fri Mar 30 05:03:17 2018 NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=16 fde6:7a:7d20:100::1006 store=active
Fri Mar 30 05:03:17 2018 ERROR: netsh command failed: returned error code 1
Fri Mar 30 05:03:21 2018 MANAGEMENT: Client disconnected
Fri Mar 30 05:03:21 2018 NETSH: command failed
Fri Mar 30 05:03:21 2018 Exiting due to fatal error

Share this post


Link to post

I noticed that both Charra and Castor give out the same IPV4 subnet

 

10.110.0.x

 

Is it possible for you to have them give out different ones? I'm pretty sure I had see 10.112.0.x given out.

 

IPV6 is fine.

Share this post


Link to post

I noticed that both Charra and Castor give out the same IPV4 subnet

 

10.110.0.x

 

Is it possible for you to have them give out different ones? I'm pretty sure I had see 10.112.0.x given out.

change the port number Chara 443 Castor 80- see if that works for you

Share this post


Link to post

change the port number Chara 443 Castor 80- see if that works for you

I noticed that both Charra and Castor give out the same IPV4 subnet

 

10.110.0.x

 

Is it possible for you to have them give out different ones? I'm pretty sure I had see 10.112.0.x given out.

Still the same. I was originally using 53 and 2018

Share this post


Link to post

Still the same. I was originally using 53 and 2018

If Chara and Castor are connected at the same time, IPv6 on both will work.IPv4 only one of the two will be used.

*Regarding torrent clients thatz the way it goes as observed and tested in utorrent.

When this IPV6 test is over Stuff will give us the heads up.

Share this post


Link to post

change the port number Chara 443 Castor 80- see if that works for you

I noticed that both Charra and Castor give out the same IPV4 subnet

 

10.110.0.x

 

Is it possible for you to have them give out different ones? I'm pretty sure I had see 10.112.0.x given out.

This does not work for me. The NL Server always gives me a 10.6 IP, which is bad, as I already have one connection to a AirVPN server on this range.

Dear Team, can you ensure, the test servers are configured as the rest of the server + IPv6 ? So each port gives a different subnet, I'm really missing this.

 

That would help, thanks

Share this post


Link to post

This does not work for me. The NL Server always gives me a 10.6 IP, which is bad, as I already have one connection to a AirVPN server on this range.

Yes we need a new/different IP range for IPv4. (eg 10.100.x.x-10.110.x.x.....10.120.x.x-10.130-.x.x etc).

 

the test servers are configured as the rest of the server + IPv6 ? So each port gives a different subnet, I'm really missing this

Good point.....its up to the Staff/Team to deliver it.

Share this post


Link to post

I noticed that both Charra and Castor give out the same IPV4 subnet

 

10.110.0.x

 

...

 

I count 220 servers. Giving each its own sub-net may not be practical. That would make the limit 255 servers.

 

Using the usual UDP 443 connections on non-experimental servers, I find that so long as the actual addresses on the client side are not the same, even if the sub-net is the same, I can bind my torrent client to one and SQUID to the other with no problems. I never have either VPN connection be the default gateway. I leave the real gateway as the default gateway by adding more specific routing table entries than the ones that OpenVPN adds (with the 128.0.0.0 netmask for IPv4 or the ::/3, 2000::/4, 3000::/4 and fc00::/7 entries for IPv6) pointing back to my real interface.

 

If there was an address conflict, and just changing one of the servers is not an option, you can use the "client-nat" option for the OpenVPN client to make it appear that one VPN connection is on a different sub-net. To use "client-nat" you also have to suppress the "ifconfig" option pushed from the server using the "pull-filter" option, and specify your own "ifconfig ". Unfortunately "client-nat" only works for IPv4.

Share this post


Link to post

 

I'm connecting fine over UDP6, which is great. However I've already experienced a few problems with the actual IPv6 connectivity provided on the tunnel interface.

 

In troubleshooting I looked at the tunnel interface.

 

utun1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500
inet 10.18.0.8 --> 10.18.0.8 netmask 0xffff0000 
inet6 fe80::426c:8fff:fe48:6c0e%utun1 prefixlen 64 scopeid 0x10 
inet6 fde6:7a:7d20:18::1006 prefixlen 64 
 
It shows "fde6:7a:7d20:18::1006", which is a ULA. So my first thought is that it's network prefix translation (NPTv6). Nope, it's actually overloading NAT, which is causing problems with the app I'm using over the VPN.
 
No developers are implementing STUN for IPv6 so using NAT (overloading) is a really bad practice and will cause problems. Your server/colocation provider should be routing you a IPv6 address block, which you can then use directly in the VPN config, or use NPTv6.

I'm hitting this issue as well. I'm unable to route the IPv6 traffic from my LAN to the OpenVPN interface. I tried using the NPt in pfSense, but still couldn't get it to route.

 

AirVPN Staff, how are we meant to route our LAN traffic over the interface?

Share this post


Link to post

 

At some point, will IPv4 customers be able to connect to IPv6 addresses through these VPNs?

 

??? You've been able to since day 1, unless you have IPv6 like turned off on your machine or something.

 

Im not even connected to any VPN right now and I show up as an IPv6 address at the top of the Air website, just connected normally through Spectrum/Time Warner. Just make sure you haven't disabled it.

Share this post


Link to post
Guest
This topic is now closed to further replies.

×
×
  • Create New...