Jump to content
Not connected, Your IP: 18.191.140.36
Staff

Eddie 2.14beta released

Recommended Posts

@InfiniteInt

 

Eddie 2.14beta allows entering custom manifest URL (for example if Fortinet blacklists all auth servers), as you might have seen in the changelog. It looks like you just need this new feature. Please open a ticket.

 

Kind regards

 

I have a ticket open just now for my 'quit/freeze' problem with Eddie 2.14, and I also have been getting this 'custom bootstrap' message popping up. (See attached photo)

 

 

Should I open a seperate ticket for this, too. Is it possible that this may be causing my system to freeze when trying to quit?

Share this post


Link to post
Guest

 

Running 2.14.0 for 80 hours on ubuntu 16.04.

 

resident memory usage is 1.8 gb.

 

the memory leak I've had in earlier versions seem to persist.

 

Hello,

 

please see here in order to avoid common pitfalls when you measure memory (even resident memory) usage of a process:

https://stackoverflow.com/questions/131303/how-to-measure-actual-memory-usage-of-an-application-or-process

 

Can you confirm your quote after you have taken care of the above (make sure to not measure the resident shared memory etc. etc.).?

 

Kind regards

The figure quoted is from top's RES column. It starts low and grows constantly.

I have mono 5.8 on my system but has seen this on 2.13.6 and earlier mono versions as well.

I have killed the process and are now testing the portable version.

 

The thread quoted is very long and discusses many different ways to measure memory, since this is not

my area of expertise it would be helpful if you can tell me which command to use and I'll report back.

 

thanks

Share this post


Link to post

Win10 64bit. Uninstalled 2.13 including the xml file. Installed 2.14 beta. Issue found after choosing to Disconnect via tray icon right-click. After successful disconnect and then right-click to reconnect, the Connect to a recommended server the option is greyed out. Had to reconnect using main window.

 

 

Share this post


Link to post

Thanks, Staff. I tried that but no file was found.

Under macOS, Eddie write in /Users/ . Remove that directory, and there isn't anymore any traces.

Share this post


Link to post

Win10 64bit. Uninstalled 2.13 including the xml file. Installed 2.14 beta. Issue found after choosing to Disconnect via tray icon right-click. After successful disconnect and then right-click to reconnect, the Connect to a recommended server the option is greyed out. Had to reconnect using main window.

Fixed in the next release, it was easy.

 

All other kind of issues are under investigation.

Share this post


Link to post

Running Xubuntu 16.04 LTS.  Upon installing Eddie 2.14 the UI windows appears on the first launch. Minimizing the window then causes it to disappear from both the screen and task bar and it cannot be restored. After rebooting the computer and starting Eddie it still never appears. After uninstalling, rebooting and reinstalling it reappears once and once only. Rebooting will not cause it to reappear without again uninstalling and reinstalling.

 

Downgraded back to 2.13.6 and 2.13.6 still works fine.

Share this post


Link to post

Two systems running Linux Mint 17.3 Cinnamon. With previous Eddie versions one of the systems, the more heavily used, would occasionally have the Eddie GUI either freeze or just vanish requiring "xkill" or more thorough killing of processes. Just the interface was affected and connection remained OK. Linux-native toolkit would be nice, but can't always have everything.

 

With this new version when the Eddie GUI is minimized it's gone until reinvoked from the panel option and this appears to have solved the freezing/vanishing issue I saw earlier.

 

One systems boots with connection off by default and launching Eddie 2.14 beta before connected results with Eddie complaining about missing AirVPN bootstrap. Over the last week I once saw the same bootstrap error pop up during session, possibly due to a connection wobble although I didn't see any signs of full on outage in the logs.

 

I see above that the 2.14 beta panel applet may have issues under Xfce, but under older LTS version of Mint Cinnamon things look solid so far.

Share this post


Link to post
Guest

Running 2.14.0 for 80 hours on ubuntu 16.04.

 

resident memory usage is 1.8 gb.

 

the memory leak I've had in earlier versions seem to persist.

 

Tested with the portable version, it starts low resident memory usage (100+MB) and slowly grows.

After 80h the process consumes 600MB resident memory as reported by TOP.

Like the regular version of eddie the memory used increases by the hour but in a much more slow pace.

 

Does the portable version use the system installed mono or how does it work?

Which mono version is recommended?

 

Running a fully updated ubuntu 16.04 with mono 5.8 installed. Eddie 2.14.0.

Share this post


Link to post

Hello!

 

It's all running smoothly on Mint 18 Cinnamon. Well mostly, until I destroyed it haha.

 

Really wanted to say excellent work done there Clodo and co. It's looking really great. What is the "Experimentals" tab for though? Currently totally blank for me, with nothing clickable at all.

 

  • User experience. Also, have you considered directing people here instead of here, when they click the web shortcut for port-forwarding? Because:

 

1 - The link on top of the port-forwarding link, goes to the client area anyway and from there it's easy to find the ports tab.

 

2 - Those who click the link presumably don't know how port-forwarding works and so therefore your explanation, which includes a security warning, is important and relevant.

 

3 - Many people don't see those Staff FAQs which they need, because there's many of them. So a direct link to them, might be useful.

 

4 - When you open Eddie up for more providers, it will be impossible to direct people to the client area I assume unless they're logged in. While the Staff FAQ is open and useful in all contexts.
(The Staff FAQ could include a link to the client area too)

 

  • User experience. In Preferences>Advanced> the link to the Advanced Features FAQ is missing a description for the two new options "Skip Process checking" and "Multiple provider support" respectively.
     
  • User experience. I feel like the client could really use some more mouse-over description text. Such as in the Server tab for instance, where there's a couple of buttons in the right-hand margin whose functions aren't too clear. I don't know what the button on top of the 3 black dots does for example and as it's greyed out, I can't click it to try either. While the circular arrows at the bottom reset all the location preferences it seems, which means people could then be connecting to places they don't want to connect, as it wipes the white/blacklists. Maybe a dialogue box should at least appear for that button, to confirm that action.
     
  • Functionality. In the "Protocols" section, in the top right corner, it says "30 protocol modes not available due to your OpenVPN version". Is this to do with tls-crypt or such? (As one of the prior posters using Windows, who got duplicate protocol entries. He gets duplicates, while I get none.) So which version should I have? I would expect to get the latest one, upon download of the new client. I'm using: OpenVPN: 2.3.10 - OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08. All the usual protocols seem to be there as well and in working order.
     
  • Functionality. I noticed that when I go to Preferences>General> check "Minimize to tray" and minimize Eddie and then click the Eddie tray icon, there's an option to display the main window. But if I uncheck "Minimize to tray" and repeat the process, then there's no option to "display main window", including if Eddie still gets minimized to the tray anyway. Instead, one has to click "Connected", to bring up the main window. If I then disconnect first, then there's more options in the tray icon while "Minimize to tray" is not checked: "Connect to a recommended server" and "Session terminated" and I need to click "Session terminated" to bring up the main window in that case, which doesn't make sense to me. This seems inconsistent, as I expect the option to show/hide the main window to always be there, regardless of "Minimize to tray" is checked or not . Further, changes to that tray UI menu as well as the Eddie menu in general, don't take effect until Eddie is minimized 1 time, which seems odd. This is despite checking/unchecking both "Show Tray Icon" and "Minimize to tray" and saving. It's not a huge deal, but just something I noticed.
     
  • Functionality. In Stats, double clicking Discovery stats doesn't seem to do anything at all, whether connected or disconnected. I'm not sure if that's intended.
     
  • Typo. In the Preferences>Logging there's a clear typo in the description text: "For multiple logs with different paths, separe it with a semicolon;" it should be "separate them".
     
  • Typo. Small things which need fixing include the About page "Website" and "Manual" links, which when clicked redirect to completely different URLs from the ones displayed.
     
  • Typo. In Preferences>OVPN directives>bottom drop-down box on the right which says "Append Custom directives", there's an incomplete sentence description in the second option: "(...)ignore Base, Provider and..." and what?
     
  • Bug. In Preferences>Logging>Open in filemanager I first got an error pop-up about not being able to find the location or something. Is it intended that we first check the 2 logging boxes before trying to open the file manager? Because after I checked those boxes, browsed to the log file in my file manager outside of Eddie and then went back into Eddie to click the same "Open in filemanager" button again, it worked. But I initially got an error. Which seems odd, because it's not as if it's trying to open a non-existent logfile, which would be understandable. Instead, it's just trying to open the file manager and that should always be possible I thought.
     
  • Bug. I was really mean to Eddie, so in Logs>Command line button in the bottom right corner, I put in a huge amount of text, special characters, numbers and also Chinese. Eddie posted it all to the log pretty well. Except it couldn't display the Chinese characters. On mouse-over this led to a hugely long line of preview text spanning my screen from edge to edge, haha. This wasn't an issue. But then I clicked the Lifebelt icon and rather ironically, that killed Eddie. Total crash. The UI froze completely and then disappeared. I restarted Eddie and he has had issues connecting now and for some reason, it seems to be DNS related and so I had to go to Preferences>DNS> and uncheck "Check Air DNS" to make it work. Interestingly, it appears Eddie did NOT take note of the crash like he normally does. Also, by re-checking "Check Air DNS", trying to connect to a location and then clicking the lifebelt icon, all of Eddie's UI freezes up completely. This also happens if I'm simply disconnected. I suppose it's because the lifebelt icon tries to run some tests and these aren't easy to do if things don't work. In the end the UI does spring back to life, but it's a significant freeze. All of this is with Network Lock ON and with Preferences>Networking>IP Protocol set to IP4; I later changed back to the default IP4, IP6 order. Here's the log from right after reconnecting again:

. 2018.02.12 09:35:42 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2018.02.12 09:35:42 - OpenVPN > RTNETLINK answers: File exists
E 2018.02.12 09:35:42 - OpenVPN > ERROR: Linux route add command failed: external program exited with error status: 2
. 2018.02.12 09:35:42 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2018.02.12 09:35:42 - OpenVPN > RTNETLINK answers: File exists
E 2018.02.12 09:35:42 - OpenVPN > ERROR: Linux route add command failed: external program exited with error status: 2
. 2018.02.12 09:35:42 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 09:35:42 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 09:35:42 - Routes, added a new route, 213.152.161.181 for gateway 10.4.0.1
. 2018.02.12 09:35:42 - Flushing DNS
I 2018.02.12 09:35:43 - Checking route IPv4
. 2018.02.12 09:36:03 - curl: (28) Connection timed out after 20001 milliseconds
. 2018.02.12 09:36:03 - Checking route (2° try)
. 2018.02.12 09:36:24 - curl: (28) Connection timed out after 20001 milliseconds
. 2018.02.12 09:36:24 - Checking route (3° try)
. 2018.02.12 09:36:46 - curl: (28) Connection timed out after 20001 milliseconds
E 2018.02.12 09:36:46 - Checking route IPv4 failed.

. 2018.02.12 09:36:46 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 09:36:46 - Disconnecting
. 2018.02.12 09:36:46 - Routes, removed a route previously added, 213.152.161.181 for gateway 10.4.0.1
. 2018.02.12 09:36:46 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2018.02.12 09:36:46 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2018.02.12 09:36:46 - OpenVPN > Restart pause, 2 second(s)
. 2018.02.12 09:36:46 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 09:36:46 - OpenVPN > UDPv4 link local: [undef]
. 2018.02.12 09:36:46 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.180:443
. 2018.02.12 09:36:46 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.180:443, sid=d53b22bc e6aebd7b
. 2018.02.12 09:36:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 09:36:46 - OpenVPN > Validating certificate key usage
. 2018.02.12 09:36:46 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 09:36:46 - OpenVPN > VERIFY KU OK
. 2018.02.12 09:36:46 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 09:36:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 09:36:46 - OpenVPN > VERIFY EKU OK
. 2018.02.12 09:36:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.12 09:36:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 09:36:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:36:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 09:36:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:36:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 09:36:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.180:443
. 2018.02.12 09:36:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 09:36:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.59.159 255.255.0.0'
. 2018.02.12 09:36:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 09:36:46 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 09:36:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 09:36:46 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 09:36:46 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 09:36:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 09:36:46 - OpenVPN > Preserving previous TUN/TAP instance: tun1
. 2018.02.12 09:36:46 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 09:36:46 - Routes, added a new route, 213.152.161.181 for gateway 10.4.0.1
. 2018.02.12 09:36:46 - Flushing DNS
. 2018.02.12 09:36:47 - OpenVPN > Initialization Sequence Completed
. 2018.02.12 09:36:47 - Sending management termination signal
. 2018.02.12 09:36:47 - Management - Send 'signal SIGTERM'
. 2018.02.12 09:36:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 09:36:47 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.02.12 09:36:53 - OpenVPN > /sbin/ip route del 213.152.161.180/32
. 2018.02.12 09:36:53 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2018.02.12 09:36:53 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2018.02.12 09:36:53 - OpenVPN > Closing TUN/TAP interface
. 2018.02.12 09:36:53 - OpenVPN > /sbin/ip addr del dev tun1 10.4.59.159/16
. 2018.02.12 09:36:53 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.02.12 09:36:53 - Connection terminated.
. 2018.02.12 09:36:53 - DNS of the system restored to original settings (Rename method)
I 2018.02.12 09:36:56 - Checking authorization ...
! 2018.02.12 09:36:57 - Connecting to Alchiba (Netherlands, Alblasserdam)
. 2018.02.12 09:36:57 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 09:36:57 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 09:36:57 - Connection to OpenVPN Management Interface
. 2018.02.12 09:36:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 09:36:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 09:36:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:36:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:36:57 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 09:36:57 - OpenVPN > UDPv4 link local: [undef]
. 2018.02.12 09:36:57 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.180:443
. 2018.02.12 09:36:57 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.180:443, sid=927ae511 cd35ffee
. 2018.02.12 09:36:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 09:36:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 09:36:58 - OpenVPN > Validating certificate key usage
. 2018.02.12 09:36:58 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 09:36:58 - OpenVPN > VERIFY KU OK
. 2018.02.12 09:36:58 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 09:36:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 09:36:58 - OpenVPN > VERIFY EKU OK
. 2018.02.12 09:36:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.12 09:36:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 09:36:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:36:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 09:36:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:36:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 09:36:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.180:443
. 2018.02.12 09:37:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 09:37:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.59.159 255.255.0.0'
. 2018.02.12 09:37:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 09:37:01 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 09:37:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 09:37:01 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 09:37:01 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 09:37:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 09:37:01 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 09:37:01 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 09:37:01 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 09:37:01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 09:37:01 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 09:37:01 - OpenVPN > /sbin/ip addr add dev tun1 10.4.59.159/16 broadcast 10.4.255.255
. 2018.02.12 09:37:07 - OpenVPN > /sbin/ip route add 213.152.161.180/32 via 192.168.43.1
. 2018.02.12 09:37:07 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2018.02.12 09:37:07 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2018.02.12 09:37:07 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 09:37:07 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 09:37:07 - Routes, added a new route, 213.152.161.181 for gateway 10.4.0.1
. 2018.02.12 09:37:07 - Flushing DNS
I 2018.02.12 09:37:07 - Checking route IPv4
I 2018.02.12 09:37:10 - Checking DNS
. 2018.02.12 09:37:11 - Checking DNS failed: riwdibebhwrpjmhnnfzegchubitzkymw
. 2018.02.12 09:37:11 - Checking DNS (2° try)
. 2018.02.12 09:37:13 - Checking DNS failed: riwdibebhwrpjmhnnfzegchubitzkymw
. 2018.02.12 09:37:13 - Checking DNS (3° try)
. 2018.02.12 09:37:18 - Checking DNS failed: riwdibebhwrpjmhnnfzegchubitzkymw

E 2018.02.12 09:37:18 - Checking DNS failed.
. 2018.02.12 09:37:18 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 09:37:18 - Disconnecting

 

  • Bug. Following on from the last issue, I tried letting "Check Air DNS" remain checked. Then I unchecked "Check if Tunnel works" and I got different DNS error text strings. I'm attaching them in case they mean something to you. In the second half, I disabled Network Lock and tried to reconnect and the DNS text string is again different. In the 3rd and final example, I reset all settings back to their default; although Network Lock stayed on, interestingly. Worryingly, this still didn't fix the issue and the text strings were yet again different. Oddly, after the third attempt and the reset, I clicked the grey X in the top right corner of Eddie to quit and I confirmed it in the pop-up. When I restarted Eddie, it then took that as an unexpected crash and at this point, NL was finally disabled. Shouldn't NL & the white/black lists also disable/reset the first time things are reset? If you need a lifebelt report, then just ask and I'll send it to you .

I 2018.02.12 09:56:36 - Checking DNS
. 2018.02.12 09:56:38 - Checking DNS failed: ontewymkunxmmibtmujydomlovjcigwp
. 2018.02.12 09:56:38 - Checking DNS (2° try)
. 2018.02.12 09:56:40 - Checking DNS failed: ontewymkunxmmibtmujydomlovjcigwp
. 2018.02.12 09:56:40 - Checking DNS (3° try)
. 2018.02.12 09:56:43 - Checking DNS failed: ontewymkunxmmibtmujydomlovjcigwp

E 2018.02.12 09:56:43 - Checking DNS failed.
. 2018.02.12 09:56:43 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 09:56:43 - Disconnecting
. 2018.02.12 09:56:43 - Routes, removed a route previously added, 213.152.161.74 for gateway 10.4.0.1
. 2018.02.12 09:56:43 - Sending management termination signal
. 2018.02.12 09:56:43 - Management - Send 'signal SIGTERM'
. 2018.02.12 09:56:43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 09:56:43 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.02.12 09:56:48 - OpenVPN > /sbin/ip route del 213.152.161.73/32
. 2018.02.12 09:56:49 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2018.02.12 09:56:49 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2018.02.12 09:56:49 - OpenVPN > Closing TUN/TAP interface
. 2018.02.12 09:56:49 - OpenVPN > /sbin/ip addr del dev tun1 10.4.59.242/16
. 2018.02.12 09:56:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.02.12 09:56:49 - Connection terminated.
. 2018.02.12 09:56:49 - DNS of the system restored to original settings (Rename method)
I 2018.02.12 09:56:52 - Checking authorization ...
! 2018.02.12 09:56:52 - Connecting to Algorab (Sweden, Uppsala)
. 2018.02.12 09:56:52 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 09:56:52 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 09:56:52 - Connection to OpenVPN Management Interface
. 2018.02.12 09:56:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 09:56:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 09:56:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:56:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:56:52 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 09:56:52 - OpenVPN > UDPv4 link local: [undef]
. 2018.02.12 09:56:52 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.147:443
. 2018.02.12 09:56:52 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.147:443, sid=4acba5b2 181fdc8d
. 2018.02.12 09:56:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 09:56:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 09:56:52 - OpenVPN > Validating certificate key usage
. 2018.02.12 09:56:52 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 09:56:52 - OpenVPN > VERIFY KU OK
. 2018.02.12 09:56:52 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 09:56:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 09:56:52 - OpenVPN > VERIFY EKU OK
. 2018.02.12 09:56:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.12 09:56:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 09:56:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:56:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 09:56:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:56:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 09:56:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.147:443
. 2018.02.12 09:56:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 09:56:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.108 255.255.0.0,peer-id 8'
. 2018.02.12 09:56:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 09:56:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 09:56:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 09:56:55 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 09:56:55 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 09:56:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 09:56:55 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.12 09:56:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.02.12 09:56:55 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 09:56:55 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 09:56:55 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 09:56:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 09:56:55 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 09:56:55 - OpenVPN > /sbin/ip addr add dev tun1 10.4.6.108/16 broadcast 10.4.255.255
. 2018.02.12 09:57:00 - OpenVPN > /sbin/ip route add 62.102.148.147/32 via 192.168.43.1
. 2018.02.12 09:57:00 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2018.02.12 09:57:00 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2018.02.12 09:57:00 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 09:57:00 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 09:57:00 - Routes, added a new route, 62.102.148.166 for gateway 10.4.0.1
. 2018.02.12 09:57:00 - Flushing DNS
I 2018.02.12 09:57:01 - Checking DNS
. 2018.02.12 09:57:03 - Checking DNS failed:
. 2018.02.12 09:57:03 - Checking DNS (2° try)
. 2018.02.12 09:57:05 - Checking DNS failed:
. 2018.02.12 09:57:05 - Checking DNS (3° try)
. 2018.02.12 09:57:10 - Checking DNS failed:
E 2018.02.12 09:57:10 - Checking DNS failed.
. 2018.02.12 09:57:10 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 09:57:10 - Disconnecting
. 2018.02.12 09:57:10 - Routes, removed a route previously added, 62.102.148.166 for gateway 10.4.0.1
. 2018.02.12 09:57:10 - Sending management termination signal
. 2018.02.12 09:57:10 - Management - Send 'signal SIGTERM'
. 2018.02.12 09:57:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 09:57:10 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.02.12 09:57:15 - OpenVPN > /sbin/ip route del 62.102.148.147/32
. 2018.02.12 09:57:15 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2018.02.12 09:57:15 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2018.02.12 09:57:15 - OpenVPN > Closing TUN/TAP interface
. 2018.02.12 09:57:15 - OpenVPN > /sbin/ip addr del dev tun1 10.4.6.108/16
. 2018.02.12 09:57:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.02.12 09:57:15 - Connection terminated.
. 2018.02.12 09:57:15 - DNS of the system restored to original settings (Rename method)
I 2018.02.12 09:57:18 - Checking authorization ...
! 2018.02.12 09:57:20 - Connecting to Tarazed (Netherlands, Alblasserdam)
. 2018.02.12 09:57:20 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 09:57:20 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 09:57:20 - Connection to OpenVPN Management Interface
. 2018.02.12 09:57:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 09:57:20 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 09:57:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:57:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:57:20 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 09:57:20 - OpenVPN > UDPv4 link local: [undef]
. 2018.02.12 09:57:20 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.132:443
. 2018.02.12 09:57:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 09:57:20 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.132:443, sid=572b5ace 62223cd0
. 2018.02.12 09:57:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 09:57:20 - OpenVPN > Validating certificate key usage
. 2018.02.12 09:57:20 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 09:57:20 - OpenVPN > VERIFY KU OK
. 2018.02.12 09:57:20 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 09:57:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 09:57:20 - OpenVPN > VERIFY EKU OK
. 2018.02.12 09:57:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tarazed, emailAddress=info@airvpn.org
. 2018.02.12 09:57:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 09:57:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:57:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 09:57:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:57:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 09:57:21 - OpenVPN > [Tarazed] Peer Connection Initiated with [AF_INET]213.152.161.132:443
. 2018.02.12 09:57:23 - OpenVPN > SENT CONTROL [Tarazed]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 09:57:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.26.186 255.255.0.0,peer-id 19'
. 2018.02.12 09:57:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 09:57:24 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 09:57:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 09:57:24 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 09:57:24 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 09:57:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 09:57:24 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.12 09:57:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.02.12 09:57:24 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 09:57:24 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 09:57:24 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 09:57:24 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 09:57:24 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 09:57:24 - OpenVPN > /sbin/ip addr add dev tun1 10.4.26.186/16 broadcast 10.4.255.255
. 2018.02.12 09:57:29 - OpenVPN > /sbin/ip route add 213.152.161.132/32 via 192.168.43.1
. 2018.02.12 09:57:29 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2018.02.12 09:57:29 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2018.02.12 09:57:29 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 09:57:29 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 09:57:29 - Routes, added a new route, 213.152.161.133 for gateway 10.4.0.1
. 2018.02.12 09:57:29 - Flushing DNS
I 2018.02.12 09:57:30 - Checking DNS
. 2018.02.12 09:57:33 - Checking DNS failed:
. 2018.02.12 09:57:33 - Checking DNS (2° try)
. 2018.02.12 09:57:35 - Checking DNS failed:
. 2018.02.12 09:57:35 - Checking DNS (3° try)
. 2018.02.12 09:57:39 - Checking DNS failed:
E 2018.02.12 09:57:39 - Checking DNS failed.
. 2018.02.12 09:57:39 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 09:57:39 - Disconnecting
. 2018.02.12 09:57:39 - Routes, removed a route previously added, 213.152.161.133 for gateway 10.4.0.1
. 2018.02.12 09:57:39 - Sending management termination signal
. 2018.02.12 09:57:39 - Management - Send 'signal SIGTERM'
. 2018.02.12 09:57:39 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 09:57:39 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.02.12 09:57:44 - OpenVPN > /sbin/ip route del 213.152.161.132/32
. 2018.02.12 09:57:44 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2018.02.12 09:57:44 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2018.02.12 09:57:44 - OpenVPN > Closing TUN/TAP interface
. 2018.02.12 09:57:44 - OpenVPN > /sbin/ip addr del dev tun1 10.4.26.186/16
. 2018.02.12 09:57:44 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.02.12 09:57:44 - Connection terminated.
. 2018.02.12 09:57:44 - DNS of the system restored to original settings (Rename method)
I 2018.02.12 09:57:47 - Checking authorization ...
! 2018.02.12 09:57:48 - Connecting to Benetnasch (Sweden, Uppsala)
. 2018.02.12 09:57:48 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 09:57:48 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 09:57:48 - Connection to OpenVPN Management Interface
. 2018.02.12 09:57:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 09:57:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 09:57:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:57:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:57:48 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 09:57:48 - OpenVPN > UDPv4 link local: [undef]
. 2018.02.12 09:57:48 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.148:443
. 2018.02.12 09:57:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 09:57:48 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.148:443, sid=bed00778 b2f75ec0
. 2018.02.12 09:57:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 09:57:49 - OpenVPN > Validating certificate key usage
. 2018.02.12 09:57:49 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 09:57:49 - OpenVPN > VERIFY KU OK
. 2018.02.12 09:57:49 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 09:57:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 09:57:49 - OpenVPN > VERIFY EKU OK
. 2018.02.12 09:57:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.12 09:57:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 09:57:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:57:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 09:57:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:57:49 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 09:57:49 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.148:443
. 2018.02.12 09:57:51 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 09:57:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.216 255.255.0.0,peer-id 9'
. 2018.02.12 09:57:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 09:57:53 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 09:57:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 09:57:53 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 09:57:53 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 09:57:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 09:57:53 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.12 09:57:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.02.12 09:57:53 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 09:57:53 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 09:57:53 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 09:57:53 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 09:57:53 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 09:57:53 - OpenVPN > /sbin/ip addr add dev tun1 10.4.12.216/16 broadcast 10.4.255.255
. 2018.02.12 09:57:58 - OpenVPN > /sbin/ip route add 62.102.148.148/32 via 192.168.43.1
. 2018.02.12 09:57:58 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2018.02.12 09:57:58 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2018.02.12 09:57:58 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 09:57:58 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 09:57:58 - Routes, added a new route, 62.102.148.187 for gateway 10.4.0.1
. 2018.02.12 09:57:58 - Flushing DNS
I 2018.02.12 09:57:59 - Checking DNS
. 2018.02.12 09:58:01 - Checking DNS failed:
. 2018.02.12 09:58:01 - Checking DNS (2° try)
. 2018.02.12 09:58:04 - Checking DNS failed:
. 2018.02.12 09:58:04 - Checking DNS (3° try)
. 2018.02.12 09:58:08 - Checking DNS failed:
E 2018.02.12 09:58:08 - Checking DNS failed.
. 2018.02.12 09:58:08 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 09:58:08 - Disconnecting
. 2018.02.12 09:58:08 - Routes, removed a route previously added, 62.102.148.187 for gateway 10.4.0.1
. 2018.02.12 09:58:08 - Sending management termination signal
. 2018.02.12 09:58:08 - Management - Send 'signal SIGTERM'
. 2018.02.12 09:58:08 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 09:58:08 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.02.12 09:58:13 - OpenVPN > /sbin/ip route del 62.102.148.148/32
. 2018.02.12 09:58:13 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2018.02.12 09:58:13 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2018.02.12 09:58:13 - OpenVPN > Closing TUN/TAP interface
. 2018.02.12 09:58:13 - OpenVPN > /sbin/ip addr del dev tun1 10.4.12.216/16
. 2018.02.12 09:58:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.02.12 09:58:13 - Connection terminated.
. 2018.02.12 09:58:13 - DNS of the system restored to original settings (Rename method)
I 2018.02.12 09:58:16 - Checking authorization ...
! 2018.02.12 09:58:18 - Connecting to Orion (Netherlands, Alblasserdam)
. 2018.02.12 09:58:18 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 09:58:18 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 09:58:18 - Connection to OpenVPN Management Interface
. 2018.02.12 09:58:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 09:58:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 09:58:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:58:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:58:18 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 09:58:18 - OpenVPN > UDPv4 link local: [undef]
. 2018.02.12 09:58:18 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.238:443
. 2018.02.12 09:58:18 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 09:58:18 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.238:443, sid=1d44526b 2a6f5041
. 2018.02.12 09:58:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 09:58:18 - OpenVPN > Validating certificate key usage
. 2018.02.12 09:58:18 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 09:58:18 - OpenVPN > VERIFY KU OK
. 2018.02.12 09:58:18 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 09:58:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 09:58:18 - OpenVPN > VERIFY EKU OK
. 2018.02.12 09:58:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Orion, emailAddress=info@airvpn.org
. 2018.02.12 09:58:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 09:58:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:58:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 09:58:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:58:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 09:58:19 - OpenVPN > [Orion] Peer Connection Initiated with [AF_INET]213.152.161.238:443
. 2018.02.12 09:58:21 - OpenVPN > SENT CONTROL [Orion]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 09:58:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.31.153 255.255.0.0,peer-id 17'
. 2018.02.12 09:58:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 09:58:22 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 09:58:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 09:58:22 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 09:58:22 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 09:58:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 09:58:22 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.12 09:58:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.02.12 09:58:22 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 09:58:22 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 09:58:22 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 09:58:22 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 09:58:22 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 09:58:22 - OpenVPN > /sbin/ip addr add dev tun1 10.4.31.153/16 broadcast 10.4.255.255
. 2018.02.12 09:58:27 - OpenVPN > /sbin/ip route add 213.152.161.238/32 via 192.168.43.1
. 2018.02.12 09:58:27 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2018.02.12 09:58:27 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2018.02.12 09:58:27 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 09:58:27 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 09:58:27 - Routes, added a new route, 213.152.161.239 for gateway 10.4.0.1
. 2018.02.12 09:58:27 - Flushing DNS
I 2018.02.12 09:58:28 - Checking DNS
. 2018.02.12 09:58:30 - Checking DNS failed:
. 2018.02.12 09:58:30 - Checking DNS (2° try)
. 2018.02.12 09:58:32 - Checking DNS failed:
. 2018.02.12 09:58:32 - Checking DNS (3° try)
. 2018.02.12 09:58:36 - Checking DNS failed:
E 2018.02.12 09:58:36 - Checking DNS failed.
. 2018.02.12 09:58:36 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 09:58:36 - Disconnecting
. 2018.02.12 09:58:36 - Routes, removed a route previously added, 213.152.161.239 for gateway 10.4.0.1
. 2018.02.12 09:58:36 - Sending management termination signal
. 2018.02.12 09:58:36 - Management - Send 'signal SIGTERM'
. 2018.02.12 09:58:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 09:58:36 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.02.12 09:58:42 - OpenVPN > /sbin/ip route del 213.152.161.238/32
. 2018.02.12 09:58:42 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2018.02.12 09:58:42 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2018.02.12 09:58:42 - OpenVPN > Closing TUN/TAP interface
. 2018.02.12 09:58:42 - OpenVPN > /sbin/ip addr del dev tun1 10.4.31.153/16
. 2018.02.12 09:58:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.02.12 09:58:42 - Connection terminated.
. 2018.02.12 09:58:42 - DNS of the system restored to original settings (Rename method)
I 2018.02.12 09:58:45 - Checking authorization ...
! 2018.02.12 09:58:46 - Connecting to Situla (Netherlands, Alblasserdam)
. 2018.02.12 09:58:46 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 09:58:46 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 09:58:46 - Connection to OpenVPN Management Interface
. 2018.02.12 09:58:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 09:58:46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 09:58:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:58:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:58:46 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 09:58:46 - OpenVPN > UDPv4 link local: [undef]
. 2018.02.12 09:58:46 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.14:443
. 2018.02.12 09:58:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 09:58:47 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.14:443, sid=77bcf6f5 7c29877a
. 2018.02.12 09:58:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 09:58:47 - OpenVPN > Validating certificate key usage
. 2018.02.12 09:58:47 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 09:58:47 - OpenVPN > VERIFY KU OK
. 2018.02.12 09:58:47 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 09:58:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 09:58:47 - OpenVPN > VERIFY EKU OK
. 2018.02.12 09:58:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.12 09:58:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 09:58:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:58:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 09:58:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 09:58:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 09:58:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.14:443
. 2018.02.12 09:58:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 09:58:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.64.9 255.255.0.0'
. 2018.02.12 09:58:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 09:58:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 09:58:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 09:58:50 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 09:58:50 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 09:58:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 09:58:50 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 09:58:50 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 09:58:50 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 09:58:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 09:58:50 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 09:58:50 - OpenVPN > /sbin/ip addr add dev tun1 10.4.64.9/16 broadcast 10.4.255.255
. 2018.02.12 09:58:56 - OpenVPN > /sbin/ip route add 213.152.161.14/32 via 192.168.43.1
. 2018.02.12 09:58:56 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2018.02.12 09:58:56 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2018.02.12 09:58:56 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 09:58:56 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 09:58:56 - Routes, added a new route, 213.152.161.15 for gateway 10.4.0.1
. 2018.02.12 09:58:56 - Flushing DNS
I 2018.02.12 09:58:56 - Checking DNS
. 2018.02.12 09:58:58 - Checking DNS failed: xxocpcsmxcigqoesgfduknwzkxwwsqou
. 2018.02.12 09:58:58 - Checking DNS (2° try)
. 2018.02.12 09:59:00 - Checking DNS failed: xxocpcsmxcigqoesgfduknwzkxwwsqou
. 2018.02.12 09:59:00 - Checking DNS (3° try)
. 2018.02.12 09:59:05 - Checking DNS failed: xxocpcsmxcigqoesgfduknwzkxwwsqou

E 2018.02.12 09:59:05 - Checking DNS failed.
. 2018.02.12 09:59:05 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 09:59:05 - Disconnecting
 

 

Second half:

! 2018.02.12 10:13:50 - Deactivation of Network Lock
I 2018.02.12 10:13:55 - Session starting.
W 2018.02.12 10:13:55 - The option 'Remove default gateway' will be deprecated soon.
I 2018.02.12 10:13:55 - Checking authorization ...
! 2018.02.12 10:13:57 - Connecting to Hatysa (Sweden, Uppsala)
. 2018.02.12 10:13:57 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 10:13:57 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 10:13:57 - Connection to OpenVPN Management Interface
. 2018.02.12 10:13:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 10:13:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 10:13:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:13:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:13:57 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 10:13:57 - OpenVPN > UDPv4 link local: [undef]
. 2018.02.12 10:13:57 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.144:443
. 2018.02.12 10:13:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 10:13:57 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.144:443, sid=50ba34e0 92d7e2de
. 2018.02.12 10:13:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 10:13:57 - OpenVPN > Validating certificate key usage
. 2018.02.12 10:13:57 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 10:13:57 - OpenVPN > VERIFY KU OK
. 2018.02.12 10:13:57 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 10:13:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 10:13:57 - OpenVPN > VERIFY EKU OK
. 2018.02.12 10:13:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hatysa, emailAddress=info@airvpn.org
. 2018.02.12 10:13:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:13:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:13:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:13:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 10:13:58 - OpenVPN > [Hatysa] Peer Connection Initiated with [AF_INET]62.102.148.144:443
. 2018.02.12 10:14:00 - OpenVPN > SENT CONTROL [Hatysa]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 10:14:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.30.127 255.255.0.0,peer-id 13'
. 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.02.12 10:14:00 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 10:14:00 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 10:14:00 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 10:14:00 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 10:14:00 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 10:14:00 - OpenVPN > /sbin/ip addr add dev tun1 10.4.30.127/16 broadcast 10.4.255.255
. 2018.02.12 10:14:05 - OpenVPN > /sbin/ip route add 62.102.148.144/32 via 192.168.43.1
. 2018.02.12 10:14:05 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:14:05 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:14:05 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 10:14:05 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 10:14:05 - Routes, removed an existing route, 0.0.0.0/0 for gateway 192.168.43.1
. 2018.02.12 10:14:05 - Routes, added a new route, 62.102.148.160 for gateway 10.4.0.1
. 2018.02.12 10:14:05 - Flushing DNS
I 2018.02.12 10:14:06 - Checking DNS
. 2018.02.12 10:14:07 - Checking DNS failed: ojhmfwqjaleomyfrzxuxlymcbbejojav
. 2018.02.12 10:14:07 - Checking DNS (2° try)
. 2018.02.12 10:14:10 - Checking DNS failed: ojhmfwqjaleomyfrzxuxlymcbbejojav
. 2018.02.12 10:14:10 - Checking DNS (3° try)
. 2018.02.12 10:14:13 - Checking DNS failed: ojhmfwqjaleomyfrzxuxlymcbbejojav
E 2018.02.12 10:14:13 - Checking DNS failed.

. 2018.02.12 10:14:13 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 10:14:13 - Disconnecting
. 2018.02.12 10:14:13 - Routes, removed a route previously added, 62.102.148.160 for gateway 10.4.0.1
. 2018.02.12 10:14:13 - Sending management termination signal
. 2018.02.12 10:14:13 - Management - Send 'signal SIGTERM'
. 2018.02.12 10:14:13 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 10:14:13 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.02.12 10:14:18 - OpenVPN > /sbin/ip route del 62.102.148.144/32
. 2018.02.12 10:14:18 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2018.02.12 10:14:18 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2018.02.12 10:14:18 - OpenVPN > Closing TUN/TAP interface
. 2018.02.12 10:14:18 - OpenVPN > /sbin/ip addr del dev tun1 10.4.30.127/16
. 2018.02.12 10:14:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.02.12 10:14:18 - Connection terminated.
. 2018.02.12 10:14:18 - Routes, restored a previously deleted route, 0.0.0.0/0 for gateway 192.168.43.1
. 2018.02.12 10:14:18 - DNS of the system restored to original settings (Rename method)
I 2018.02.12 10:14:21 - Checking authorization ...
! 2018.02.12 10:14:21 - Connecting to Nodus (Sweden, Uppsala)
. 2018.02.12 10:14:21 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 10:14:21 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 10:14:21 - Connection to OpenVPN Management Interface
. 2018.02.12 10:14:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 10:14:21 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 10:14:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:14:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:14:21 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 10:14:21 - OpenVPN > UDPv4 link local: [undef]
. 2018.02.12 10:14:21 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.133:443
. 2018.02.12 10:14:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 10:14:21 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.133:443, sid=b67c45ce e1060fbb
. 2018.02.12 10:14:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 10:14:22 - OpenVPN > Validating certificate key usage
. 2018.02.12 10:14:22 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 10:14:22 - OpenVPN > VERIFY KU OK
. 2018.02.12 10:14:22 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 10:14:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 10:14:22 - OpenVPN > VERIFY EKU OK
. 2018.02.12 10:14:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nodus, emailAddress=info@airvpn.org
. 2018.02.12 10:14:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:14:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:14:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:14:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:14:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 10:14:22 - OpenVPN > [Nodus] Peer Connection Initiated with [AF_INET]62.102.148.133:443
. 2018.02.12 10:14:24 - OpenVPN > SENT CONTROL [Nodus]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 10:14:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.4.163 255.255.0.0,peer-id 10'
. 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.02.12 10:14:24 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 10:14:24 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 10:14:24 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 10:14:24 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 10:14:24 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 10:14:24 - OpenVPN > /sbin/ip addr add dev tun1 10.4.4.163/16 broadcast 10.4.255.255
. 2018.02.12 10:14:29 - OpenVPN > /sbin/ip route add 62.102.148.133/32 via 192.168.43.1
. 2018.02.12 10:14:29 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:14:29 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:14:29 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 10:14:29 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 10:14:30 - Routes, removed an existing route, 0.0.0.0/0 for gateway 192.168.43.1
. 2018.02.12 10:14:30 - Routes, added a new route, 62.102.148.181 for gateway 10.4.0.1
. 2018.02.12 10:14:30 - Flushing DNS
I 2018.02.12 10:14:30 - Checking DNS
. 2018.02.12 10:14:33 - Checking DNS failed:
. 2018.02.12 10:14:33 - Checking DNS (2° try)
. 2018.02.12 10:14:35 - Checking DNS failed:
. 2018.02.12 10:14:35 - Checking DNS (3° try)
. 2018.02.12 10:14:38 - Checking DNS failed:
E 2018.02.12 10:14:38 - Checking DNS failed.
. 2018.02.12 10:14:38 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 10:14:38 - Disconnecting
. 2018.02.12 10:14:38 - Routes, removed a route previously added, 62.102.148.181 for gateway 10.4.0.1
. 2018.02.12 10:14:38 - Sending management termination signal
. 2018.02.12 10:14:38 - Management - Send 'signal SIGTERM'
. 2018.02.12 10:14:38 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 10:14:38 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.02.12 10:14:43 - OpenVPN > /sbin/ip route del 62.102.148.133/32
. 2018.02.12 10:14:43 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2018.02.12 10:14:43 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2018.02.12 10:14:43 - OpenVPN > Closing TUN/TAP interface
. 2018.02.12 10:14:43 - OpenVPN > /sbin/ip addr del dev tun1 10.4.4.163/16
. 2018.02.12 10:14:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.02.12 10:14:43 - Connection terminated.
. 2018.02.12 10:14:43 - Routes, restored a previously deleted route, 0.0.0.0/0 for gateway 192.168.43.1
. 2018.02.12 10:14:43 - DNS of the system restored to original settings (Rename method)
I 2018.02.12 10:14:46 - Cancel requested.
I 2018.02.12 10:14:46 - Session terminated.

Final:

! 2018.02.12 10:13:50 - Deactivation of Network Lock
I 2018.02.12 10:13:55 - Session starting.
W 2018.02.12 10:13:55 - The option 'Remove default gateway' will be deprecated soon.
I 2018.02.12 10:13:55 - Checking authorization ...
! 2018.02.12 10:13:57 - Connecting to Hatysa (Sweden, Uppsala)
. 2018.02.12 10:13:57 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 10:13:57 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 10:13:57 - Connection to OpenVPN Management Interface
. 2018.02.12 10:13:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 10:13:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 10:13:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:13:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:13:57 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 10:13:57 - OpenVPN > UDPv4 link local: [undef]
. 2018.02.12 10:13:57 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.144:443
. 2018.02.12 10:13:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 10:13:57 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.144:443, sid=50ba34e0 92d7e2de
. 2018.02.12 10:13:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 10:13:57 - OpenVPN > Validating certificate key usage
. 2018.02.12 10:13:57 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 10:13:57 - OpenVPN > VERIFY KU OK
. 2018.02.12 10:13:57 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 10:13:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 10:13:57 - OpenVPN > VERIFY EKU OK
. 2018.02.12 10:13:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hatysa, emailAddress=info@airvpn.org
. 2018.02.12 10:13:58 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:13:58 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:13:58 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:13:58 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:13:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 10:13:58 - OpenVPN > [Hatysa] Peer Connection Initiated with [AF_INET]62.102.148.144:443
. 2018.02.12 10:14:00 - OpenVPN > SENT CONTROL [Hatysa]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 10:14:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.30.127 255.255.0.0,peer-id 13'
. 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.12 10:14:00 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.02.12 10:14:00 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 10:14:00 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 10:14:00 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 10:14:00 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 10:14:00 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 10:14:00 - OpenVPN > /sbin/ip addr add dev tun1 10.4.30.127/16 broadcast 10.4.255.255
. 2018.02.12 10:14:05 - OpenVPN > /sbin/ip route add 62.102.148.144/32 via 192.168.43.1
. 2018.02.12 10:14:05 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:14:05 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:14:05 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 10:14:05 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 10:14:05 - Routes, removed an existing route, 0.0.0.0/0 for gateway 192.168.43.1
. 2018.02.12 10:14:05 - Routes, added a new route, 62.102.148.160 for gateway 10.4.0.1
. 2018.02.12 10:14:05 - Flushing DNS
I 2018.02.12 10:14:06 - Checking DNS
. 2018.02.12 10:14:07 - Checking DNS failed: ojhmfwqjaleomyfrzxuxlymcbbejojav
. 2018.02.12 10:14:07 - Checking DNS (2° try)
. 2018.02.12 10:14:10 - Checking DNS failed: ojhmfwqjaleomyfrzxuxlymcbbejojav
. 2018.02.12 10:14:10 - Checking DNS (3° try)
. 2018.02.12 10:14:13 - Checking DNS failed: ojhmfwqjaleomyfrzxuxlymcbbejojav
E 2018.02.12 10:14:13 - Checking DNS failed.

. 2018.02.12 10:14:13 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 10:14:13 - Disconnecting
. 2018.02.12 10:14:13 - Routes, removed a route previously added, 62.102.148.160 for gateway 10.4.0.1
. 2018.02.12 10:14:13 - Sending management termination signal
. 2018.02.12 10:14:13 - Management - Send 'signal SIGTERM'
. 2018.02.12 10:14:13 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 10:14:13 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.02.12 10:14:18 - OpenVPN > /sbin/ip route del 62.102.148.144/32
. 2018.02.12 10:14:18 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2018.02.12 10:14:18 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2018.02.12 10:14:18 - OpenVPN > Closing TUN/TAP interface
. 2018.02.12 10:14:18 - OpenVPN > /sbin/ip addr del dev tun1 10.4.30.127/16
. 2018.02.12 10:14:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.02.12 10:14:18 - Connection terminated.
. 2018.02.12 10:14:18 - Routes, restored a previously deleted route, 0.0.0.0/0 for gateway 192.168.43.1
. 2018.02.12 10:14:18 - DNS of the system restored to original settings (Rename method)
I 2018.02.12 10:14:21 - Checking authorization ...
! 2018.02.12 10:14:21 - Connecting to Nodus (Sweden, Uppsala)
. 2018.02.12 10:14:21 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 10:14:21 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 10:14:21 - Connection to OpenVPN Management Interface
. 2018.02.12 10:14:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 10:14:21 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 10:14:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:14:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:14:21 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 10:14:21 - OpenVPN > UDPv4 link local: [undef]
. 2018.02.12 10:14:21 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.133:443
. 2018.02.12 10:14:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 10:14:21 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.133:443, sid=b67c45ce e1060fbb
. 2018.02.12 10:14:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 10:14:22 - OpenVPN > Validating certificate key usage
. 2018.02.12 10:14:22 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 10:14:22 - OpenVPN > VERIFY KU OK
. 2018.02.12 10:14:22 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 10:14:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 10:14:22 - OpenVPN > VERIFY EKU OK
. 2018.02.12 10:14:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nodus, emailAddress=info@airvpn.org
. 2018.02.12 10:14:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:14:22 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:14:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:14:22 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:14:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 10:14:22 - OpenVPN > [Nodus] Peer Connection Initiated with [AF_INET]62.102.148.133:443
. 2018.02.12 10:14:24 - OpenVPN > SENT CONTROL [Nodus]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 10:14:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.4.163 255.255.0.0,peer-id 10'
. 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.12 10:14:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.02.12 10:14:24 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 10:14:24 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 10:14:24 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 10:14:24 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 10:14:24 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 10:14:24 - OpenVPN > /sbin/ip addr add dev tun1 10.4.4.163/16 broadcast 10.4.255.255
. 2018.02.12 10:14:29 - OpenVPN > /sbin/ip route add 62.102.148.133/32 via 192.168.43.1
. 2018.02.12 10:14:29 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:14:29 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:14:29 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 10:14:29 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 10:14:30 - Routes, removed an existing route, 0.0.0.0/0 for gateway 192.168.43.1
. 2018.02.12 10:14:30 - Routes, added a new route, 62.102.148.181 for gateway 10.4.0.1
. 2018.02.12 10:14:30 - Flushing DNS
I 2018.02.12 10:14:30 - Checking DNS
. 2018.02.12 10:14:33 - Checking DNS failed:
. 2018.02.12 10:14:33 - Checking DNS (2° try)
. 2018.02.12 10:14:35 - Checking DNS failed:
. 2018.02.12 10:14:35 - Checking DNS (3° try)
. 2018.02.12 10:14:38 - Checking DNS failed:
E 2018.02.12 10:14:38 - Checking DNS failed.
. 2018.02.12 10:14:38 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 10:14:38 - Disconnecting
. 2018.02.12 10:14:38 - Routes, removed a route previously added, 62.102.148.181 for gateway 10.4.0.1
. 2018.02.12 10:14:38 - Sending management termination signal
. 2018.02.12 10:14:38 - Management - Send 'signal SIGTERM'
. 2018.02.12 10:14:38 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 10:14:38 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.02.12 10:14:43 - OpenVPN > /sbin/ip route del 62.102.148.133/32
. 2018.02.12 10:14:43 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2018.02.12 10:14:43 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2018.02.12 10:14:43 - OpenVPN > Closing TUN/TAP interface
. 2018.02.12 10:14:43 - OpenVPN > /sbin/ip addr del dev tun1 10.4.4.163/16
. 2018.02.12 10:14:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.02.12 10:14:43 - Connection terminated.
. 2018.02.12 10:14:43 - Routes, restored a previously deleted route, 0.0.0.0/0 for gateway 192.168.43.1
. 2018.02.12 10:14:43 - DNS of the system restored to original settings (Rename method)
I 2018.02.12 10:14:46 - Cancel requested.
I 2018.02.12 10:14:46 - Session terminated.
! 2018.02.12 10:16:07 - Activation of Network Lock - Linux iptables
I 2018.02.12 10:16:11 - Session starting.
W 2018.02.12 10:16:11 - The option 'Remove default gateway' will be deprecated soon.
I 2018.02.12 10:16:11 - Checking authorization ...
! 2018.02.12 10:16:13 - Connecting to Nodus (Sweden, Uppsala)
. 2018.02.12 10:16:13 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 10:16:13 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 10:16:13 - Connection to OpenVPN Management Interface
. 2018.02.12 10:16:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 10:16:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 10:16:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:16:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:16:13 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 10:16:13 - OpenVPN > UDPv4 link local: [undef]
. 2018.02.12 10:16:13 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.133:443
. 2018.02.12 10:16:13 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 10:16:13 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.133:443, sid=37b0c25c 42137f07
. 2018.02.12 10:16:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 10:16:13 - OpenVPN > Validating certificate key usage
. 2018.02.12 10:16:13 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 10:16:13 - OpenVPN > VERIFY KU OK
. 2018.02.12 10:16:13 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 10:16:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 10:16:13 - OpenVPN > VERIFY EKU OK
. 2018.02.12 10:16:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nodus, emailAddress=info@airvpn.org
. 2018.02.12 10:16:14 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:16:14 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:16:14 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:16:14 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:16:14 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 10:16:14 - OpenVPN > [Nodus] Peer Connection Initiated with [AF_INET]62.102.148.133:443
. 2018.02.12 10:16:16 - OpenVPN > SENT CONTROL [Nodus]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 10:16:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.4.163 255.255.0.0,peer-id 10'
. 2018.02.12 10:16:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 10:16:17 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 10:16:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 10:16:17 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 10:16:17 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 10:16:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 10:16:17 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.12 10:16:17 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.02.12 10:16:17 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 10:16:17 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 10:16:17 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 10:16:17 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 10:16:17 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 10:16:17 - OpenVPN > /sbin/ip addr add dev tun1 10.4.4.163/16 broadcast 10.4.255.255
. 2018.02.12 10:16:22 - OpenVPN > /sbin/ip route add 62.102.148.133/32 via 192.168.43.1
. 2018.02.12 10:16:22 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:16:22 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:16:22 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 10:16:22 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 10:16:22 - Routes, removed an existing route, 0.0.0.0/0 for gateway 192.168.43.1
. 2018.02.12 10:16:22 - Routes, added a new route, 62.102.148.181 for gateway 10.4.0.1
. 2018.02.12 10:16:22 - Flushing DNS
I 2018.02.12 10:16:23 - Checking DNS
. 2018.02.12 10:16:25 - Checking DNS failed:
. 2018.02.12 10:16:25 - Checking DNS (2° try)
. 2018.02.12 10:16:27 - Checking DNS failed:
. 2018.02.12 10:16:27 - Checking DNS (3° try)
. 2018.02.12 10:16:31 - Checking DNS failed:
. 2018.02.12 10:16:31 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 10:16:31 - Disconnecting
. 2018.02.12 10:16:31 - Routes, removed a route previously added, 62.102.148.181 for gateway 10.4.0.1
. 2018.02.12 10:16:31 - Sending management termination signal
. 2018.02.12 10:16:31 - Management - Send 'signal SIGTERM'
. 2018.02.12 10:16:31 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 10:16:31 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.02.12 10:16:36 - OpenVPN > /sbin/ip route del 62.102.148.133/32
. 2018.02.12 10:16:36 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2018.02.12 10:16:36 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2018.02.12 10:16:36 - OpenVPN > Closing TUN/TAP interface
. 2018.02.12 10:16:36 - OpenVPN > /sbin/ip addr del dev tun1 10.4.4.163/16
. 2018.02.12 10:16:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.02.12 10:16:36 - Connection terminated.
. 2018.02.12 10:16:36 - Routes, restored a previously deleted route, 0.0.0.0/0 for gateway 192.168.43.1
. 2018.02.12 10:16:36 - DNS of the system restored to original settings (Rename method)
I 2018.02.12 10:16:36 - Cancel requested.
I 2018.02.12 10:16:36 - Session terminated.
I 2018.02.12 10:16:44 - Session starting.
I 2018.02.12 10:16:47 - Retrieving manifest
. 2018.02.12 10:16:47 - Updating systems & servers data ...
I 2018.02.12 10:16:47 - Checking authorization ...
! 2018.02.12 10:16:49 - Connecting to Atria (Sweden, Uppsala)
. 2018.02.12 10:16:49 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 10:16:49 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 10:16:49 - Auto retry with another port.
. 2018.02.12 10:16:49 - OpenVPN > MANAGEMENT: Socket bind failed on local address [AF_INET]127.0.0.1:3100: Address already in use
. 2018.02.12 10:16:49 - OpenVPN > Exiting due to fatal error
! 2018.02.12 10:16:49 - Disconnecting
. 2018.02.12 10:16:49 - Connection terminated.
I 2018.02.12 10:16:49 - Checking authorization ...
. 2018.02.12 10:16:49 - Systems & servers data update completed
! 2018.02.12 10:16:49 - Connecting to Gomeisa (Sweden, Uppsala)
. 2018.02.12 10:16:49 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 10:16:49 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 10:16:49 - Connection to OpenVPN Management Interface
. 2018.02.12 10:16:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 10:16:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 10:16:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:16:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:16:49 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 10:16:49 - OpenVPN > UDPv4 link local: [undef]
. 2018.02.12 10:16:49 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.132:443
. 2018.02.12 10:16:50 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.132:443, sid=2449a874 5da3c6f4
. 2018.02.12 10:16:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 10:16:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 10:16:50 - OpenVPN > Validating certificate key usage
. 2018.02.12 10:16:50 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 10:16:50 - OpenVPN > VERIFY KU OK
. 2018.02.12 10:16:50 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 10:16:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 10:16:50 - OpenVPN > VERIFY EKU OK
. 2018.02.12 10:16:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Gomeisa, emailAddress=info@airvpn.org
. 2018.02.12 10:16:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:16:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:16:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:16:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:16:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 10:16:50 - OpenVPN > [Gomeisa] Peer Connection Initiated with [AF_INET]62.102.148.132:443
. 2018.02.12 10:16:52 - OpenVPN > SENT CONTROL [Gomeisa]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 10:16:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.41.252 255.255.0.0,peer-id 20'
. 2018.02.12 10:16:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 10:16:53 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 10:16:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 10:16:53 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 10:16:53 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 10:16:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 10:16:53 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.12 10:16:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.02.12 10:16:53 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 10:16:53 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 10:16:53 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 10:16:53 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 10:16:53 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 10:16:53 - OpenVPN > /sbin/ip addr add dev tun1 10.4.41.252/16 broadcast 10.4.255.255
. 2018.02.12 10:16:59 - OpenVPN > /sbin/ip route add 62.102.148.132/32 via 192.168.43.1
. 2018.02.12 10:16:59 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:16:59 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:16:59 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 10:16:59 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 10:16:59 - Routes, added a new route, 62.102.148.183 for gateway 10.4.0.1
. 2018.02.12 10:16:59 - Flushing DNS
I 2018.02.12 10:16:59 - Checking route IPv4
I 2018.02.12 10:17:02 - Checking DNS
. 2018.02.12 10:17:04 - Checking DNS failed: emwgbikfcajhqaaqholfirfinsqvfuik
. 2018.02.12 10:17:04 - Checking DNS (2° try)
. 2018.02.12 10:17:06 - Checking DNS failed: emwgbikfcajhqaaqholfirfinsqvfuik
. 2018.02.12 10:17:06 - Checking DNS (3° try)
. 2018.02.12 10:17:09 - Checking DNS failed: emwgbikfcajhqaaqholfirfinsqvfuik
E 2018.02.12 10:17:09 - Checking DNS failed.

. 2018.02.12 10:17:09 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 10:17:09 - Disconnecting
. 2018.02.12 10:17:10 - Routes, removed a route previously added, 62.102.148.183 for gateway 10.4.0.1
. 2018.02.12 10:17:10 - Sending management termination signal
. 2018.02.12 10:17:10 - Management - Send 'signal SIGTERM'
. 2018.02.12 10:17:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 10:17:10 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.02.12 10:17:15 - OpenVPN > /sbin/ip route del 62.102.148.132/32
. 2018.02.12 10:17:15 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2018.02.12 10:17:15 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2018.02.12 10:17:15 - OpenVPN > Closing TUN/TAP interface
. 2018.02.12 10:17:15 - OpenVPN > /sbin/ip addr del dev tun1 10.4.41.252/16
. 2018.02.12 10:17:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.02.12 10:17:15 - Connection terminated.
. 2018.02.12 10:17:15 - DNS of the system restored to original settings (Rename method)
I 2018.02.12 10:17:18 - Checking authorization ...
! 2018.02.12 10:17:20 - Connecting to Muphrid (Sweden, Uppsala)
. 2018.02.12 10:17:20 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 10:17:20 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 10:17:20 - Connection to OpenVPN Management Interface
. 2018.02.12 10:17:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 10:17:20 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 10:17:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:17:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:17:20 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 10:17:20 - OpenVPN > UDPv4 link local: [undef]
. 2018.02.12 10:17:20 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.146:443
. 2018.02.12 10:17:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 10:17:20 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.146:443, sid=dba0ecca e640fe70
. 2018.02.12 10:17:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 10:17:22 - OpenVPN > Validating certificate key usage
. 2018.02.12 10:17:22 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 10:17:22 - OpenVPN > VERIFY KU OK
. 2018.02.12 10:17:22 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 10:17:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 10:17:22 - OpenVPN > VERIFY EKU OK
. 2018.02.12 10:17:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.12 10:17:23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:17:23 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:17:23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:17:23 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:17:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 10:17:23 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.146:443
. 2018.02.12 10:17:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 10:17:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.11.118 255.255.0.0,peer-id 1'
. 2018.02.12 10:17:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 10:17:26 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 10:17:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 10:17:26 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 10:17:26 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 10:17:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 10:17:26 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.12 10:17:26 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.02.12 10:17:26 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 10:17:26 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 10:17:26 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 10:17:26 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 10:17:26 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 10:17:26 - OpenVPN > /sbin/ip addr add dev tun1 10.4.11.118/16 broadcast 10.4.255.255
. 2018.02.12 10:17:31 - OpenVPN > /sbin/ip route add 62.102.148.146/32 via 192.168.43.1
. 2018.02.12 10:17:31 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:17:31 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:17:31 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 10:17:31 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 10:17:31 - Routes, added a new route, 62.102.148.164 for gateway 10.4.0.1
. 2018.02.12 10:17:31 - Flushing DNS
I 2018.02.12 10:17:32 - Checking route IPv4
I 2018.02.12 10:17:34 - Checking DNS
. 2018.02.12 10:17:35 - Checking DNS failed:
. 2018.02.12 10:17:35 - Checking DNS (2° try)
. 2018.02.12 10:17:37 - Checking DNS failed:
. 2018.02.12 10:17:37 - Checking DNS (3° try)
. 2018.02.12 10:17:44 - Checking DNS failed:
E 2018.02.12 10:17:44 - Checking DNS failed.
. 2018.02.12 10:17:44 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 10:17:44 - Disconnecting
. 2018.02.12 10:17:44 - Routes, removed a route previously added, 62.102.148.164 for gateway 10.4.0.1
. 2018.02.12 10:17:44 - Sending management termination signal
. 2018.02.12 10:17:44 - Management - Send 'signal SIGTERM'
. 2018.02.12 10:17:44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 10:17:44 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.02.12 10:17:49 - OpenVPN > /sbin/ip route del 62.102.148.146/32
. 2018.02.12 10:17:49 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2018.02.12 10:17:49 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2018.02.12 10:17:49 - OpenVPN > Closing TUN/TAP interface
. 2018.02.12 10:17:49 - OpenVPN > /sbin/ip addr del dev tun1 10.4.11.118/16
. 2018.02.12 10:17:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.02.12 10:17:49 - Connection terminated.
. 2018.02.12 10:17:49 - DNS of the system restored to original settings (Rename method)
I 2018.02.12 10:17:52 - Checking authorization ...
! 2018.02.12 10:17:52 - Connecting to Gacrux (Sweden, Uppsala)
. 2018.02.12 10:17:52 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 10:17:52 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 10:17:52 - Connection to OpenVPN Management Interface
. 2018.02.12 10:17:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 10:17:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 10:17:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:17:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:17:52 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 10:17:52 - OpenVPN > UDPv4 link local: [undef]
. 2018.02.12 10:17:52 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.137:443
. 2018.02.12 10:17:53 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 10:17:53 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.137:443, sid=d3f22a56 e002845d
. 2018.02.12 10:17:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 10:17:53 - OpenVPN > Validating certificate key usage
. 2018.02.12 10:17:53 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 10:17:53 - OpenVPN > VERIFY KU OK
. 2018.02.12 10:17:53 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 10:17:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 10:17:53 - OpenVPN > VERIFY EKU OK
. 2018.02.12 10:17:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.12 10:17:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:17:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:17:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:17:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:17:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 10:17:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.137:443
. 2018.02.12 10:17:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 10:17:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.70 255.255.0.0'
. 2018.02.12 10:17:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 10:17:57 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 10:17:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 10:17:57 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 10:17:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 10:17:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 10:17:57 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 10:17:57 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 10:17:57 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 10:17:57 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 10:17:57 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 10:17:57 - OpenVPN > /sbin/ip addr add dev tun1 10.4.6.70/16 broadcast 10.4.255.255
. 2018.02.12 10:18:02 - OpenVPN > /sbin/ip route add 62.102.148.137/32 via 192.168.43.1
. 2018.02.12 10:18:02 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:18:02 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:18:02 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 10:18:02 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 10:18:02 - Routes, added a new route, 62.102.148.173 for gateway 10.4.0.1
. 2018.02.12 10:18:02 - Flushing DNS
I 2018.02.12 10:18:03 - Checking route IPv4
I 2018.02.12 10:18:04 - Checking DNS
. 2018.02.12 10:18:05 - Checking DNS failed:
. 2018.02.12 10:18:05 - Checking DNS (2° try)
. 2018.02.12 10:18:07 - Checking DNS failed:
. 2018.02.12 10:18:07 - Checking DNS (3° try)
. 2018.02.12 10:18:11 - Checking DNS failed:
E 2018.02.12 10:18:11 - Checking DNS failed.
. 2018.02.12 10:18:11 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 10:18:11 - Disconnecting
. 2018.02.12 10:18:11 - Routes, removed a route previously added, 62.102.148.173 for gateway 10.4.0.1
. 2018.02.12 10:18:11 - Sending management termination signal
. 2018.02.12 10:18:11 - Management - Send 'signal SIGTERM'
. 2018.02.12 10:18:11 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 10:18:11 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.02.12 10:18:16 - OpenVPN > /sbin/ip route del 62.102.148.137/32
. 2018.02.12 10:18:16 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2018.02.12 10:18:16 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2018.02.12 10:18:16 - OpenVPN > Closing TUN/TAP interface
. 2018.02.12 10:18:16 - OpenVPN > /sbin/ip addr del dev tun1 10.4.6.70/16
. 2018.02.12 10:18:16 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.02.12 10:18:16 - Connection terminated.
. 2018.02.12 10:18:16 - DNS of the system restored to original settings (Rename method)
I 2018.02.12 10:18:19 - Checking authorization ...
! 2018.02.12 10:18:20 - Connecting to Atria (Sweden, Uppsala)
. 2018.02.12 10:18:21 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 10:18:21 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 10:18:21 - Connection to OpenVPN Management Interface
. 2018.02.12 10:18:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 10:18:21 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 10:18:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:18:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:18:21 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 10:18:21 - OpenVPN > UDPv4 link local: [undef]
. 2018.02.12 10:18:21 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.150:443
. 2018.02.12 10:18:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 10:18:21 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.150:443, sid=e0f82b46 c0f93b76
. 2018.02.12 10:18:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 10:18:21 - OpenVPN > Validating certificate key usage
. 2018.02.12 10:18:21 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 10:18:21 - OpenVPN > VERIFY KU OK
. 2018.02.12 10:18:21 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 10:18:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 10:18:21 - OpenVPN > VERIFY EKU OK
. 2018.02.12 10:18:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Atria, emailAddress=info@airvpn.org
. 2018.02.12 10:18:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:18:21 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:18:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:18:21 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:18:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 10:18:21 - OpenVPN > [Atria] Peer Connection Initiated with [AF_INET]62.102.148.150:443
. 2018.02.12 10:18:23 - OpenVPN > SENT CONTROL [Atria]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 10:18:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.35.81 255.255.0.0,peer-id 134'
. 2018.02.12 10:18:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 10:18:25 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 10:18:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 10:18:25 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 10:18:25 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 10:18:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 10:18:25 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.12 10:18:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.02.12 10:18:25 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 10:18:25 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 10:18:25 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 10:18:25 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 10:18:25 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 10:18:25 - OpenVPN > /sbin/ip addr add dev tun1 10.4.35.81/16 broadcast 10.4.255.255
! 2018.02.12 10:18:30 - Disconnecting
. 2018.02.12 10:18:30 - Sending management termination signal
. 2018.02.12 10:18:30 - Management - Send 'signal SIGTERM'
. 2018.02.12 10:18:30 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 10:18:30 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.02.12 10:18:30 - OpenVPN > /sbin/ip route add 62.102.148.150/32 via 192.168.43.1
. 2018.02.12 10:18:30 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:18:30 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:18:30 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 10:18:30 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 10:18:30 - Routes, added a new route, 62.102.148.189 for gateway 10.4.0.1
. 2018.02.12 10:18:30 - Flushing DNS
. 2018.02.12 10:18:31 - OpenVPN > Initialization Sequence Completed
. 2018.02.12 10:18:35 - OpenVPN > /sbin/ip route del 62.102.148.150/32
. 2018.02.12 10:18:35 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2018.02.12 10:18:35 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2018.02.12 10:18:35 - OpenVPN > Closing TUN/TAP interface
. 2018.02.12 10:18:35 - OpenVPN > /sbin/ip addr del dev tun1 10.4.35.81/16
. 2018.02.12 10:18:35 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.02.12 10:18:35 - Connection terminated.
. 2018.02.12 10:18:35 - DNS of the system restored to original settings (Rename method)
I 2018.02.12 10:18:35 - Cancel requested.
I 2018.02.12 10:18:35 - Session terminated.
 

 

Unexpected Crash:

 

. 2018.02.12 10:20:31 - Eddie version: 2.14.0 / linux_x64, System: Linux, Name: Linux Mint 18 Sarah \n \l, Version: Linux XLY 4.4.0-21-generic #37-Ubuntu SMP Mon Apr 18 18:33:37 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net Framework: v4.0.30319
. 2018.02.12 10:20:31 - Reading options from /home/master/.airvpn/AirVPN.xml
. 2018.02.12 10:20:32 - Command line arguments (3): path="/home/master/.airvpn" path.resources="/usr/share/AirVPN" console.mode="none"
. 2018.02.12 10:20:33 - OpenVPN Driver - Found, /dev/net/tun
. 2018.02.12 10:20:33 - OpenVPN - Version: 2.3.10 - OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08 (/usr/sbin/openvpn)
. 2018.02.12 10:20:33 - SSH - Version: OpenSSH_7.2p2 Ubuntu-4ubuntu2.4, OpenSSL 1.0.2g  1 Mar 2016 (/usr/bin/ssh)
. 2018.02.12 10:20:33 - SSL - Version: stunnel 5.30 (/usr/bin/stunnel4)
. 2018.02.12 10:20:33 - curl - Version: 7.47.0 (/usr/bin/curl)
. 2018.02.12 10:20:33 - Certification Authorities: /usr/share/AirVPN/cacert.pem
W 2018.02.12 10:20:33 - Recovery. Unexpected crash?
. 2018.02.12 10:20:33 - Routes, removed a route previously added, 213.152.161.181 for gateway 10.4.0.1
. 2018.02.12 10:20:33 - Above log line repeated 1 times more
. 2018.02.12 10:20:33 - Routes, removed a route previously added, 62.102.148.160 for gateway 10.4.0.1
. 2018.02.12 10:20:33 - Routes, removed a route previously added, 62.102.148.189 for gateway 10.4.0.1
. 2018.02.12 10:20:33 - Updating systems & servers data ...
I 2018.02.12 10:20:33 - Ready
. 2018.02.12 10:20:34 - Systems & servers data update completed

 

  • Bug. In connection with the prior bugs, I tried checking "Check Air DNS" again. This time I tried connecting to experimental Castor location and the results were a little different, but I still couldn't connect in the end:

I 2018.02.12 10:45:05 - Session terminated.
I 2018.02.12 10:45:15 - Session starting.
I 2018.02.12 10:45:15 - Checking authorization ...
! 2018.02.12 10:45:17 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 10:45:17 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 10:45:17 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 10:45:17 - Connection to OpenVPN Management Interface
. 2018.02.12 10:45:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 10:45:17 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 10:45:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:45:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:45:17 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 10:45:17 - OpenVPN > UDPv4 link local: [undef]
. 2018.02.12 10:45:17 - OpenVPN > UDPv4 link remote: [AF_INET]91.207.57.114:443
. 2018.02.12 10:45:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 10:45:17 - OpenVPN > TLS: Initial packet from [AF_INET]91.207.57.114:443, sid=34216bbf 17d9ac02
. 2018.02.12 10:45:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 10:45:17 - OpenVPN > Validating certificate key usage
. 2018.02.12 10:45:17 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 10:45:17 - OpenVPN > VERIFY KU OK
. 2018.02.12 10:45:17 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 10:45:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 10:45:17 - OpenVPN > VERIFY EKU OK
. 2018.02.12 10:45:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Castor, emailAddress=info@airvpn.org
. 2018.02.12 10:45:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:45:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:45:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:45:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:45:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 10:45:18 - OpenVPN > [Castor] Peer Connection Initiated with [AF_INET]91.207.57.114:443
. 2018.02.12 10:45:20 - OpenVPN > SENT CONTROL [Castor]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 10:45:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.16.0.1,route-gateway 10.16.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.16.0.40 255.255.0.0,peer-id 0'
. 2018.02.12 10:45:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 10:45:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 10:45:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 10:45:21 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 10:45:21 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 10:45:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 10:45:21 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.12 10:45:21 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.02.12 10:45:21 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 10:45:21 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 10:45:21 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 10:45:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 10:45:21 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 10:45:21 - OpenVPN > /sbin/ip addr add dev tun1 10.16.0.40/16 broadcast 10.16.255.255
. 2018.02.12 10:45:26 - OpenVPN > /sbin/ip route add 91.207.57.114/32 via 192.168.43.1
. 2018.02.12 10:45:26 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.16.0.1
. 2018.02.12 10:45:26 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.16.0.1
. 2018.02.12 10:45:26 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 10:45:26 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 10:45:26 - Routes, added a new route, 91.207.57.115 for gateway 10.16.0.1
. 2018.02.12 10:45:26 - Unable to compute route for 2001:ac8:27:f:c0ca:9f36:68ed:1e70: IPv6 VPN gateway not available.
. 2018.02.12 10:45:26 - Flushing DNS

I 2018.02.12 10:45:27 - Checking route IPv4
I 2018.02.12 10:45:28 - Checking route IPv6
. 2018.02.12 10:45:28 - curl: (7) Couldn't connect to server
. 2018.02.12 10:45:28 - Checking route (2° try)
. 2018.02.12 10:45:29 - curl: (7) Couldn't connect to server
. 2018.02.12 10:45:29 - Checking route (3° try)
. 2018.02.12 10:45:31 - curl: (7) Couldn't connect to server
E 2018.02.12 10:45:31 - Checking route IPv6 failed.
. 2018.02.12 10:45:31 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 10:45:31 - Disconnecting

. 2018.02.12 10:45:31 - Routes, removed a route previously added, 91.207.57.115 for gateway 10.16.0.1
. 2018.02.12 10:45:31 - Sending management termination signal
. 2018.02.12 10:45:31 - Management - Send 'signal SIGTERM'
. 2018.02.12 10:45:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 10:45:32 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.02.12 10:45:36 - OpenVPN > /sbin/ip route del 91.207.57.114/32
. 2018.02.12 10:45:36 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2018.02.12 10:45:36 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2018.02.12 10:45:36 - OpenVPN > Closing TUN/TAP interface
. 2018.02.12 10:45:36 - OpenVPN > /sbin/ip addr del dev tun1 10.16.0.40/16
. 2018.02.12 10:45:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.02.12 10:45:36 - Connection terminated.
. 2018.02.12 10:45:36 - DNS of the system restored to original settings (Rename method)
I 2018.02.12 10:45:39 - Checking authorization ...
! 2018.02.12 10:45:39 - Connecting to Chara (Netherlands, Alblasserdam)
. 2018.02.12 10:45:39 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 10:45:39 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 10:45:39 - Connection to OpenVPN Management Interface
. 2018.02.12 10:45:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 10:45:39 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 10:45:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:45:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:45:39 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 10:45:39 - OpenVPN > UDPv4 link local: [undef]
. 2018.02.12 10:45:39 - OpenVPN > UDPv4 link remote: [AF_INET]109.232.227.132:443
. 2018.02.12 10:45:39 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 10:45:39 - OpenVPN > TLS: Initial packet from [AF_INET]109.232.227.132:443, sid=87d1479d c9a4fc3b
. 2018.02.12 10:45:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 10:45:40 - OpenVPN > Validating certificate key usage
. 2018.02.12 10:45:40 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 10:45:40 - OpenVPN > VERIFY KU OK
. 2018.02.12 10:45:40 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 10:45:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 10:45:40 - OpenVPN > VERIFY EKU OK
. 2018.02.12 10:45:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.12 10:45:40 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:45:40 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:45:40 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 10:45:40 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:45:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 10:45:40 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.232.227.132:443
. 2018.02.12 10:45:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 10:45:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.3.52 255.255.0.0,peer-id 50'
. 2018.02.12 10:45:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 10:45:43 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 10:45:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 10:45:43 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 10:45:43 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 10:45:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 10:45:43 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.12 10:45:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2018.02.12 10:45:43 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 10:45:43 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 10:45:43 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 10:45:43 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 10:45:43 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 10:45:43 - OpenVPN > /sbin/ip addr add dev tun1 10.4.3.52/16 broadcast 10.4.255.255
. 2018.02.12 10:45:48 - OpenVPN > /sbin/ip route add 109.232.227.132/32 via 192.168.43.1
. 2018.02.12 10:45:48 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:45:48 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.0.1
. 2018.02.12 10:45:48 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 10:45:48 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 10:45:48 - Routes, added a new route, 109.232.227.133 for gateway 10.4.0.1
. 2018.02.12 10:45:48 - Flushing DNS
I 2018.02.12 10:45:49 - Checking route IPv4
I 2018.02.12 10:45:53 - Checking DNS
. 2018.02.12 10:45:55 - Checking DNS failed:
. 2018.02.12 10:45:55 - Checking DNS (2° try)
. 2018.02.12 10:45:57 - Checking DNS failed:
. 2018.02.12 10:45:57 - Checking DNS (3° try)
. 2018.02.12 10:46:01 - Checking DNS failed:
E 2018.02.12 10:46:01 - Checking DNS failed.
. 2018.02.12 10:46:01 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 10:46:01 - Disconnecting
. 2018.02.12 10:46:01 - Routes, removed a route previously added, 109.232.227.133 for gateway 10.4.0.1
 

 

  • Bug. This time I went to Preferences>Networking>IP protocols>selected IP6 ONLY. The errors were completely different, but I still couldn't connect. Other protocols are set to automatic, NL is enabled, "Check Air DNS" and "Check if tunnel works" are checked. After doing the tests, I then went to Preferences>Network Lock>Unchecked "Allow Detected DNS", which I had checked by a mistake.

I 2018.02.12 10:50:25 - Checking authorization ...
! 2018.02.12 10:50:27 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 10:50:27 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 10:50:27 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 10:50:27 - Connection to OpenVPN Management Interface
. 2018.02.12 10:50:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 10:50:27 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 10:50:27 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:50:27 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:50:27 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 10:50:27 - OpenVPN > UDPv6 link local: [undef]
. 2018.02.12 10:50:27 - OpenVPN > UDPv6 link remote: [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443
. 2018.02.12 10:50:27 - OpenVPN > write UDPv6: Network is unreachable (code=101)
. 2018.02.12 10:50:27 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 10:50:30 - OpenVPN > write UDPv6: Network is unreachable (code=101)
. 2018.02.12 10:50:41 - Above log line repeated 1 times more
. 2018.02.12 10:50:41 - Updating systems & servers data ...
. 2018.02.12 10:50:41 - OpenVPN > write UDPv6: Network is unreachable (code=101)
. 2018.02.12 10:50:44 - Systems & servers data update completed
. 2018.02.12 10:50:57 - OpenVPN > write UDPv6: Network is unreachable (code=101)
. 2018.02.12 10:50:59 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2018.02.12 10:50:59 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.02.12 10:51:04 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2018.02.12 10:51:04 - Disconnecting
. 2018.02.12 10:51:04 - Connection terminated.
I 2018.02.12 10:51:07 - Checking authorization ...
! 2018.02.12 10:51:09 - Connecting to Alchiba (Netherlands, Alblasserdam)
W 2018.02.12 10:51:09 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote
. 2018.02.12 10:51:09 - OpenVPN > Use --help for more information.

! 2018.02.12 10:51:09 - Disconnecting
. 2018.02.12 10:51:09 - Connection terminated.
I 2018.02.12 10:51:12 - Checking authorization ...
! 2018.02.12 10:51:14 - Connecting to Alchiba (Netherlands, Alblasserdam)
W 2018.02.12 10:51:14 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote
. 2018.02.12 10:51:14 - OpenVPN > Use --help for more information.
! 2018.02.12 10:51:14 - Disconnecting
. 2018.02.12 10:51:14 - Connection terminated.
I 2018.02.12 10:51:17 - Checking authorization ...
! 2018.02.12 10:51:19 - Connecting to Alchiba (Netherlands, Alblasserdam)
W 2018.02.12 10:51:19 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote
. 2018.02.12 10:51:19 - OpenVPN > Use --help for more information.
! 2018.02.12 10:51:19 - Disconnecting
. 2018.02.12 10:51:19 - Connection terminated.
I 2018.02.12 10:51:22 - Checking authorization ...
! 2018.02.12 10:51:23 - Connecting to Alchiba (Netherlands, Alblasserdam)
W 2018.02.12 10:51:24 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote
. 2018.02.12 10:51:24 - OpenVPN > Use --help for more information.
! 2018.02.12 10:51:24 - Disconnecting
. 2018.02.12 10:51:24 - Connection terminated.
I 2018.02.12 10:51:27 - Checking authorization ...
! 2018.02.12 10:51:28 - Connecting to Alchiba (Netherlands, Alblasserdam)
W 2018.02.12 10:51:28 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote
. 2018.02.12 10:51:28 - OpenVPN > Use --help for more information.
! 2018.02.12 10:51:28 - Disconnecting
. 2018.02.12 10:51:28 - Connection terminated.
I 2018.02.12 10:51:31 - Checking authorization ...
! 2018.02.12 10:51:33 - Connecting to Alchiba (Netherlands, Alblasserdam)
W 2018.02.12 10:51:33 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote
. 2018.02.12 10:51:33 - OpenVPN > Use --help for more information.
! 2018.02.12 10:51:33 - Disconnecting
. 2018.02.12 10:51:33 - Connection terminated.
I 2018.02.12 10:51:36 - Checking authorization ...
! 2018.02.12 10:51:38 - Connecting to Alchiba (Netherlands, Alblasserdam)
W 2018.02.12 10:51:38 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote
. 2018.02.12 10:51:38 - OpenVPN > Use --help for more information.
! 2018.02.12 10:51:38 - Disconnecting
. 2018.02.12 10:51:38 - Connection terminated.
I 2018.02.12 10:51:41 - Checking authorization ...
! 2018.02.12 10:51:43 - Connecting to Alchiba (Netherlands, Alblasserdam)
W 2018.02.12 10:51:43 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote
. 2018.02.12 10:51:43 - OpenVPN > Use --help for more information.
! 2018.02.12 10:51:43 - Disconnecting
. 2018.02.12 10:51:43 - Connection terminated.
I 2018.02.12 10:51:46 - Checking authorization ...
! 2018.02.12 10:51:49 - Connecting to Alchiba (Netherlands, Alblasserdam)
W 2018.02.12 10:51:49 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote
. 2018.02.12 10:51:49 - OpenVPN > Use --help for more information.
! 2018.02.12 10:51:49 - Disconnecting
. 2018.02.12 10:51:49 - Connection terminated.
I 2018.02.12 10:51:52 - Checking authorization ...
! 2018.02.12 10:51:53 - Connecting to Alchiba (Netherlands, Alblasserdam)
W 2018.02.12 10:51:53 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote
. 2018.02.12 10:51:53 - OpenVPN > Use --help for more information.
! 2018.02.12 10:51:53 - Disconnecting
. 2018.02.12 10:51:53 - Connection terminated.
I 2018.02.12 10:51:56 - Checking authorization ...
! 2018.02.12 10:51:58 - Connecting to Alchiba (Netherlands, Alblasserdam)
W 2018.02.12 10:51:58 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote
. 2018.02.12 10:51:58 - OpenVPN > Use --help for more information.
! 2018.02.12 10:51:58 - Disconnecting
. 2018.02.12 10:51:58 - Connection terminated.
I 2018.02.12 10:52:01 - Checking authorization ...
! 2018.02.12 10:52:02 - Connecting to Alchiba (Netherlands, Alblasserdam)
W 2018.02.12 10:52:03 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote
. 2018.02.12 10:52:03 - OpenVPN > Use --help for more information.
! 2018.02.12 10:52:03 - Disconnecting
. 2018.02.12 10:52:03 - Connection terminated.
I 2018.02.12 10:52:06 - Checking authorization ...
I 2018.02.12 10:52:08 - Cancel requested.
I 2018.02.12 10:52:08 - Session terminated.
I 2018.02.12 10:54:35 - Session starting.
I 2018.02.12 10:54:35 - Checking authorization ...
! 2018.02.12 10:54:36 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 10:54:36 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 10:54:36 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 10:54:36 - Connection to OpenVPN Management Interface
. 2018.02.12 10:54:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 10:54:36 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 10:54:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:54:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 10:54:36 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.02.12 10:54:36 - OpenVPN > UDPv6 link local: [undef]
. 2018.02.12 10:54:36 - OpenVPN > UDPv6 link remote: [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443
. 2018.02.12 10:54:36 - OpenVPN > write UDPv6: Network is unreachable (code=101)
. 2018.02.12 10:54:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 10:54:39 - OpenVPN > write UDPv6: Network is unreachable (code=101)
. 2018.02.12 10:55:08 - Above log line repeated 3 times more

. 2018.02.12 10:55:08 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2018.02.12 10:55:08 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.02.12 10:55:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2018.02.12 10:55:13 - Disconnecting
. 2018.02.12 10:55:13 - Connection terminated.
I 2018.02.12 10:55:16 - Checking authorization ...
! 2018.02.12 10:55:17 - Connecting to Alchiba (Netherlands, Alblasserdam)
W 2018.02.12 10:55:18 - OpenVPN > Options error: --nobind doesn't make sense unless used with --remote
. 2018.02.12 10:55:18 - OpenVPN > Use --help for more information.
! 2018.02.12 10:55:18 - Disconnecting
. 2018.02.12 10:55:18 - Connection terminated.
I 2018.02.12 10:55:21 - Checking authorization ...
I 2018.02.12 10:55:22 - Cancel requested.
I 2018.02.12 10:55:22 - Session terminated.
 

 

  • Critical Bug(Probably just error 40). Then I tried picking TCP 443 in Preferences>Protocols due to the UDP6 errors before, as well as picking Preferences>Networking>IP6 ONLY. Regardless of if I checked one, both or neither of "Check Air DNS" and "Check if tunnel works", I couldn't connect to Castor. NL was on. It just refuses to connect, with no apparent errors. THEN I noticed something: I can browse online(!) Eddie is disconnected, but Network Lock is on, but I can browse; which can't happen for me normally. What's more, I checked ipleak.net immediately and the strange thing is, that my IP address belongs to a non-Castor Air location, but my DNS is showing my real one. For the IP address, ipleak says: IPv6 test not reachable and it was indeed an IP4 address which showed, despite how I had selected "IP6 only" before.

I 2018.02.12 11:07:15 - Session starting.
I 2018.02.12 11:07:15 - Checking authorization ...
! 2018.02.12 11:07:15 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 11:07:15 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 11:07:15 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 11:07:15 - Connection to OpenVPN Management Interface
. 2018.02.12 11:07:15 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 11:07:15 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 11:07:15 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:07:15 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:07:15 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2018.02.12 11:07:15 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock]
. 2018.02.12 11:07:15 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable
. 2018.02.12 11:07:15 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2018.02.12 11:07:15 - OpenVPN > Restart pause, 5 second(s)
! 2018.02.12 11:07:15 - Disconnecting
. 2018.02.12 11:07:15 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 11:07:15 - Sending management termination signal
. 2018.02.12 11:07:15 - Management - Send 'signal SIGTERM'
. 2018.02.12 11:07:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 11:07:15 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.02.12 11:07:15 - Connection terminated.
I 2018.02.12 11:07:18 - Checking authorization ...
! 2018.02.12 11:07:21 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 11:07:21 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 11:07:21 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 11:07:21 - Connection to OpenVPN Management Interface
. 2018.02.12 11:07:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 11:07:21 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 11:07:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:07:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:07:21 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2018.02.12 11:07:21 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock]
. 2018.02.12 11:07:21 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable
. 2018.02.12 11:07:21 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2018.02.12 11:07:21 - OpenVPN > Restart pause, 5 second(s)
! 2018.02.12 11:07:21 - Disconnecting
. 2018.02.12 11:07:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 11:07:21 - Sending management termination signal
. 2018.02.12 11:07:21 - Management - Send 'signal SIGTERM'
. 2018.02.12 11:07:21 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 11:07:21 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.02.12 11:07:21 - Connection terminated.
I 2018.02.12 11:07:24 - Checking authorization ...
! 2018.02.12 11:07:25 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 11:07:25 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 11:07:25 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 11:07:25 - Connection to OpenVPN Management Interface
. 2018.02.12 11:07:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 11:07:25 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 11:07:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:07:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:07:25 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2018.02.12 11:07:25 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock]
. 2018.02.12 11:07:25 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable
. 2018.02.12 11:07:25 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2018.02.12 11:07:25 - OpenVPN > Restart pause, 5 second(s)
! 2018.02.12 11:07:25 - Disconnecting
. 2018.02.12 11:07:25 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 11:07:25 - Sending management termination signal
. 2018.02.12 11:07:25 - Management - Send 'signal SIGTERM'
. 2018.02.12 11:07:25 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 11:07:25 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.02.12 11:07:25 - Connection terminated.
I 2018.02.12 11:07:28 - Checking authorization ...
! 2018.02.12 11:07:30 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 11:07:30 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 11:07:30 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 11:07:30 - Connection to OpenVPN Management Interface
. 2018.02.12 11:07:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 11:07:30 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 11:07:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:07:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:07:30 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2018.02.12 11:07:30 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock]
. 2018.02.12 11:07:30 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable
. 2018.02.12 11:07:30 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2018.02.12 11:07:30 - OpenVPN > Restart pause, 5 second(s)
! 2018.02.12 11:07:30 - Disconnecting
. 2018.02.12 11:07:30 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 11:07:30 - Sending management termination signal
. 2018.02.12 11:07:30 - Management - Send 'signal SIGTERM'
. 2018.02.12 11:07:30 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 11:07:30 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.02.12 11:07:30 - Connection terminated.
I 2018.02.12 11:07:33 - Checking authorization ...
! 2018.02.12 11:07:36 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 11:07:36 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 11:07:36 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 11:07:36 - Connection to OpenVPN Management Interface
. 2018.02.12 11:07:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 11:07:36 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 11:07:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:07:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:07:36 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2018.02.12 11:07:36 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock]
. 2018.02.12 11:07:36 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable
. 2018.02.12 11:07:36 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2018.02.12 11:07:36 - OpenVPN > Restart pause, 5 second(s)
! 2018.02.12 11:07:36 - Disconnecting
. 2018.02.12 11:07:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 11:07:36 - Sending management termination signal
. 2018.02.12 11:07:36 - Management - Send 'signal SIGTERM'
. 2018.02.12 11:07:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 11:07:36 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.02.12 11:07:36 - Connection terminated.
I 2018.02.12 11:07:38 - Cancel requested.
I 2018.02.12 11:07:38 - Session terminated.
I 2018.02.12 11:07:49 - Session starting.
I 2018.02.12 11:07:49 - Checking authorization ...
! 2018.02.12 11:07:51 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 11:07:51 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 11:07:51 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 11:07:51 - Connection to OpenVPN Management Interface
. 2018.02.12 11:07:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 11:07:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 11:07:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:07:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:07:51 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2018.02.12 11:07:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock]
. 2018.02.12 11:07:51 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable
. 2018.02.12 11:07:51 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2018.02.12 11:07:51 - OpenVPN > Restart pause, 5 second(s)
! 2018.02.12 11:07:51 - Disconnecting
. 2018.02.12 11:07:51 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 11:07:51 - Sending management termination signal
. 2018.02.12 11:07:51 - Management - Send 'signal SIGTERM'
. 2018.02.12 11:07:51 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 11:07:51 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.02.12 11:07:51 - Connection terminated.
I 2018.02.12 11:07:54 - Checking authorization ...
! 2018.02.12 11:07:56 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 11:07:57 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 11:07:57 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 11:07:57 - Connection to OpenVPN Management Interface
. 2018.02.12 11:07:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 11:07:57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 11:07:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:07:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:07:57 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2018.02.12 11:07:57 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock]
. 2018.02.12 11:07:57 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable
. 2018.02.12 11:07:57 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2018.02.12 11:07:57 - OpenVPN > Restart pause, 5 second(s)
! 2018.02.12 11:07:57 - Disconnecting
. 2018.02.12 11:07:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 11:07:57 - Sending management termination signal
. 2018.02.12 11:07:57 - Management - Send 'signal SIGTERM'
. 2018.02.12 11:07:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 11:07:57 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.02.12 11:07:57 - Connection terminated.
I 2018.02.12 11:08:00 - Checking authorization ...
! 2018.02.12 11:08:02 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 11:08:02 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 11:08:02 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 11:08:02 - Connection to OpenVPN Management Interface
. 2018.02.12 11:08:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 11:08:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 11:08:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:08:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:08:02 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2018.02.12 11:08:02 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock]
. 2018.02.12 11:08:02 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable
. 2018.02.12 11:08:02 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2018.02.12 11:08:02 - OpenVPN > Restart pause, 5 second(s)
! 2018.02.12 11:08:02 - Disconnecting
. 2018.02.12 11:08:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 11:08:02 - Sending management termination signal
. 2018.02.12 11:08:02 - Management - Send 'signal SIGTERM'
. 2018.02.12 11:08:02 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 11:08:02 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.02.12 11:08:02 - Connection terminated.
I 2018.02.12 11:08:05 - Checking authorization ...
! 2018.02.12 11:08:07 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 11:08:07 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 11:08:07 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 11:08:07 - Connection to OpenVPN Management Interface
. 2018.02.12 11:08:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 11:08:07 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 11:08:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:08:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:08:07 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2018.02.12 11:08:07 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock]
. 2018.02.12 11:08:07 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable
. 2018.02.12 11:08:07 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2018.02.12 11:08:07 - OpenVPN > Restart pause, 5 second(s)
! 2018.02.12 11:08:07 - Disconnecting
. 2018.02.12 11:08:07 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 11:08:07 - Sending management termination signal
. 2018.02.12 11:08:07 - Management - Send 'signal SIGTERM'
. 2018.02.12 11:08:07 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 11:08:07 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.02.12 11:08:07 - Connection terminated.
I 2018.02.12 11:08:10 - Checking authorization ...
! 2018.02.12 11:08:12 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 11:08:12 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 11:08:12 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 11:08:12 - Connection to OpenVPN Management Interface
. 2018.02.12 11:08:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 11:08:12 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 11:08:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:08:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:08:12 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2018.02.12 11:08:12 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock]
. 2018.02.12 11:08:12 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable
. 2018.02.12 11:08:12 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2018.02.12 11:08:12 - OpenVPN > Restart pause, 5 second(s)
! 2018.02.12 11:08:12 - Disconnecting
. 2018.02.12 11:08:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 11:08:12 - Sending management termination signal
. 2018.02.12 11:08:12 - Management - Send 'signal SIGTERM'
. 2018.02.12 11:08:12 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 11:08:12 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.02.12 11:08:12 - Connection terminated.
I 2018.02.12 11:08:15 - Cancel requested.
I 2018.02.12 11:08:15 - Session terminated.
I 2018.02.12 11:08:33 - Session starting.
I 2018.02.12 11:08:33 - Checking authorization ...
! 2018.02.12 11:08:35 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 11:08:35 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 11:08:35 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 11:08:35 - Connection to OpenVPN Management Interface
. 2018.02.12 11:08:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 11:08:35 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 11:08:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:08:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:08:35 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2018.02.12 11:08:35 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock]
. 2018.02.12 11:08:35 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable
. 2018.02.12 11:08:35 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2018.02.12 11:08:35 - OpenVPN > Restart pause, 5 second(s)
! 2018.02.12 11:08:35 - Disconnecting
. 2018.02.12 11:08:35 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 11:08:35 - Sending management termination signal
. 2018.02.12 11:08:35 - Management - Send 'signal SIGTERM'
. 2018.02.12 11:08:35 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 11:08:35 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.02.12 11:08:35 - Connection terminated.
I 2018.02.12 11:08:38 - Checking authorization ...
! 2018.02.12 11:08:40 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 11:08:40 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 11:08:40 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 11:08:40 - Connection to OpenVPN Management Interface
. 2018.02.12 11:08:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 11:08:40 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 11:08:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:08:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:08:40 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2018.02.12 11:08:40 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock]
. 2018.02.12 11:08:40 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable
. 2018.02.12 11:08:40 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2018.02.12 11:08:40 - OpenVPN > Restart pause, 5 second(s)
! 2018.02.12 11:08:40 - Disconnecting
. 2018.02.12 11:08:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 11:08:40 - Sending management termination signal
. 2018.02.12 11:08:40 - Management - Send 'signal SIGTERM'
. 2018.02.12 11:08:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 11:08:40 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.02.12 11:08:40 - Connection terminated.
I 2018.02.12 11:08:43 - Checking authorization ...
! 2018.02.12 11:08:45 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 11:08:45 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 11:08:45 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 11:08:45 - Connection to OpenVPN Management Interface
. 2018.02.12 11:08:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 11:08:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 11:08:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:08:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:08:45 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2018.02.12 11:08:45 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock]
. 2018.02.12 11:08:45 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable
. 2018.02.12 11:08:45 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2018.02.12 11:08:45 - OpenVPN > Restart pause, 5 second(s)
! 2018.02.12 11:08:45 - Disconnecting
. 2018.02.12 11:08:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 11:08:45 - Sending management termination signal
. 2018.02.12 11:08:45 - Management - Send 'signal SIGTERM'
. 2018.02.12 11:08:46 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 11:08:46 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.02.12 11:08:46 - Connection terminated.
I 2018.02.12 11:08:49 - Checking authorization ...
! 2018.02.12 11:08:51 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 11:08:51 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 11:08:51 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 11:08:51 - Connection to OpenVPN Management Interface
. 2018.02.12 11:08:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 11:08:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 11:08:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:08:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:08:51 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2018.02.12 11:08:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock]
. 2018.02.12 11:08:51 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable
. 2018.02.12 11:08:51 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2018.02.12 11:08:51 - OpenVPN > Restart pause, 5 second(s)
! 2018.02.12 11:08:51 - Disconnecting
. 2018.02.12 11:08:51 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 11:08:51 - Sending management termination signal
. 2018.02.12 11:08:51 - Management - Send 'signal SIGTERM'
. 2018.02.12 11:08:51 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 11:08:51 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.02.12 11:08:51 - Connection terminated.
I 2018.02.12 11:08:54 - Checking authorization ...
! 2018.02.12 11:09:00 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 11:09:00 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 11:09:00 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 11:09:00 - Connection to OpenVPN Management Interface
. 2018.02.12 11:09:00 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 11:09:00 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 11:09:00 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:09:00 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:09:00 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2018.02.12 11:09:00 - OpenVPN > Attempting to establish TCP connection with [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 [nonblock]
. 2018.02.12 11:09:00 - OpenVPN > TCP: connect to [AF_INET6]2001:ac8:27:f:9ff8:eafb:3bb8:3c4f:443 failed, will try again in 5 seconds: Network is unreachable
. 2018.02.12 11:09:00 - OpenVPN > SIGUSR1[soft,init_instance] received, process restarting
. 2018.02.12 11:09:00 - OpenVPN > Restart pause, 5 second(s)
! 2018.02.12 11:09:00 - Disconnecting
. 2018.02.12 11:09:00 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 11:09:00 - Sending management termination signal
. 2018.02.12 11:09:00 - Management - Send 'signal SIGTERM'
. 2018.02.12 11:09:00 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 11:09:00 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.02.12 11:09:00 - Connection terminated.
I 2018.02.12 11:09:03 - Cancel requested.
I 2018.02.12 11:09:03 - Session terminated.
 

 

Then I went back into Preferences>Networking>Put IP protocol back to the default and despite how "Check Air DNS" and "Check if tunnel works" are checked, I can now connect to an ordinary non-Castor location... With some errors on the way, which were seen at the beginning. I don't get it. I'm still on the TCP 443 protocol, NL was enabled the whole time I'm not leaking on ipleak anymore:

 

! 2018.02.12 11:18:03 - Connecting to Castor (Belgium, Brussels)
. 2018.02.12 11:18:03 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 11:18:03 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 11:18:03 - Connection to OpenVPN Management Interface
. 2018.02.12 11:18:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 11:18:03 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 11:18:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:18:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:18:03 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2018.02.12 11:18:03 - OpenVPN > Attempting to establish TCP connection with [AF_INET]91.207.57.114:443 [nonblock]
. 2018.02.12 11:18:03 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 11:18:04 - OpenVPN > TCP connection established with [AF_INET]91.207.57.114:443
. 2018.02.12 11:18:04 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2018.02.12 11:18:04 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]91.207.57.114:443
. 2018.02.12 11:18:04 - OpenVPN > TLS: Initial packet from [AF_INET]91.207.57.114:443, sid=d7283fe2 b6a0daa8
. 2018.02.12 11:18:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 11:18:05 - OpenVPN > Validating certificate key usage
. 2018.02.12 11:18:05 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 11:18:05 - OpenVPN > VERIFY KU OK
. 2018.02.12 11:18:05 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 11:18:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 11:18:05 - OpenVPN > VERIFY EKU OK
. 2018.02.12 11:18:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Castor, emailAddress=info@airvpn.org
. 2018.02.12 11:18:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 11:18:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:18:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 11:18:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:18:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 11:18:06 - OpenVPN > [Castor] Peer Connection Initiated with [AF_INET]91.207.57.114:443
. 2018.02.12 11:18:08 - OpenVPN > SENT CONTROL [Castor]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 11:18:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.15.0.1,route-gateway 10.15.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.0.10 255.255.0.0,peer-id 0'
. 2018.02.12 11:18:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 11:18:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 11:18:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 11:18:09 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 11:18:09 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 11:18:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 11:18:09 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.12 11:18:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1563
. 2018.02.12 11:18:09 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 11:18:09 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 11:18:09 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 11:18:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 11:18:09 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 11:18:09 - OpenVPN > /sbin/ip addr add dev tun1 10.15.0.10/16 broadcast 10.15.255.255
. 2018.02.12 11:18:15 - OpenVPN > /sbin/ip route add 91.207.57.114/32 via 192.168.43.1
. 2018.02.12 11:18:15 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.15.0.1
. 2018.02.12 11:18:15 - OpenVPN > RTNETLINK answers: File exists
E 2018.02.12 11:18:15 - OpenVPN > ERROR: Linux route add command failed: external program exited with error status: 2
. 2018.02.12 11:18:15 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.15.0.1
. 2018.02.12 11:18:15 - OpenVPN > RTNETLINK answers: File exists
E 2018.02.12 11:18:15 - OpenVPN > ERROR: Linux route add command failed: external program exited with error status: 2

. 2018.02.12 11:18:15 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2018.02.12 11:18:15 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 11:18:15 - Routes, added a new route, 91.207.57.115 for gateway 10.15.0.1
. 2018.02.12 11:18:15 - Unable to compute route for 2001:ac8:27:f:c0ca:9f36:68ed:1e70: IPv6 VPN gateway not available.
. 2018.02.12 11:18:15 - Flushing DNS
I 2018.02.12 11:18:15 - Checking route IPv4
. 2018.02.12 11:18:35 - curl: (28) Connection timed out after 20001 milliseconds
. 2018.02.12 11:18:35 - Checking route (2° try)
. 2018.02.12 11:18:56 - curl: (28) Connection timed out after 20001 milliseconds
. 2018.02.12 11:18:56 - Checking route (3° try)
. 2018.02.12 11:19:18 - curl: (28) Connection timed out after 20000 milliseconds
E 2018.02.12 11:19:18 - Checking route IPv4 failed.
. 2018.02.12 11:19:18 - OpenVPN > Initialization Sequence Completed
! 2018.02.12 11:19:18 - Disconnecting

. 2018.02.12 11:19:18 - Routes, removed a route previously added, 91.207.57.115 for gateway 10.15.0.1
. 2018.02.12 11:19:18 - OpenVPN > [Castor] Inactivity timeout (--ping-restart), restarting
. 2018.02.12 11:19:18 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2018.02.12 11:19:18 - OpenVPN > Restart pause, 5 second(s)
. 2018.02.12 11:19:18 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2018.02.12 11:19:18 - OpenVPN > Attempting to establish TCP connection with [AF_INET]91.207.57.114:443 [nonblock]
. 2018.02.12 11:19:18 - OpenVPN > TCP connection established with [AF_INET]91.207.57.114:443
. 2018.02.12 11:19:18 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2018.02.12 11:19:18 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]91.207.57.114:443
. 2018.02.12 11:19:18 - OpenVPN > TLS: Initial packet from [AF_INET]91.207.57.114:443, sid=69f71f8e 73aa2e5c
. 2018.02.12 11:19:18 - Sending management termination signal
. 2018.02.12 11:19:18 - Management - Send 'signal SIGTERM'
. 2018.02.12 11:19:19 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.12 11:19:19 - OpenVPN > /sbin/ip route del 91.207.57.114/32
. 2018.02.12 11:19:19 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2018.02.12 11:19:19 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2018.02.12 11:19:19 - OpenVPN > Closing TUN/TAP interface
. 2018.02.12 11:19:19 - OpenVPN > /sbin/ip addr del dev tun1 10.15.0.10/16
. 2018.02.12 11:19:19 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2018.02.12 11:19:19 - Connection terminated.
. 2018.02.12 11:19:19 - DNS of the system restored to original settings (Rename method)
I 2018.02.12 11:19:22 - Checking authorization ...
! 2018.02.12 11:19:22 - Connecting to Alphard (Netherlands, Alblasserdam)
. 2018.02.12 11:19:22 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2018.02.12 11:19:22 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2018.02.12 11:19:22 - Connection to OpenVPN Management Interface
. 2018.02.12 11:19:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.02.12 11:19:22 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2018.02.12 11:19:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:19:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:19:22 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2018.02.12 11:19:22 - OpenVPN > Attempting to establish TCP connection with [AF_INET]109.202.107.9:443 [nonblock]
. 2018.02.12 11:19:22 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.02.12 11:19:23 - OpenVPN > TCP connection established with [AF_INET]109.202.107.9:443
. 2018.02.12 11:19:23 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2018.02.12 11:19:23 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]109.202.107.9:443
. 2018.02.12 11:19:23 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.9:443, sid=f0b8cd56 90f6c23a
. 2018.02.12 11:19:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.12 11:19:23 - OpenVPN > Validating certificate key usage
. 2018.02.12 11:19:23 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2018.02.12 11:19:23 - OpenVPN > VERIFY KU OK
. 2018.02.12 11:19:23 - OpenVPN > Validating certificate extended key usage
. 2018.02.12 11:19:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.12 11:19:23 - OpenVPN > VERIFY EKU OK
. 2018.02.12 11:19:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.12 11:19:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 11:19:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:19:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.12 11:19:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.12 11:19:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.12 11:19:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.9:443
. 2018.02.12 11:19:26 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.02.12 11:19:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.2.152 255.255.0.0,peer-id 0'
. 2018.02.12 11:19:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.12 11:19:27 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2018.02.12 11:19:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.12 11:19:27 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.12 11:19:27 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.12 11:19:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.12 11:19:27 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.12 11:19:27 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1563
. 2018.02.12 11:19:27 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp8s0 HWADDR=a0:88:69:9d:df:af
. 2018.02.12 11:19:27 - OpenVPN > TUN/TAP device tun1 opened
. 2018.02.12 11:19:27 - OpenVPN > TUN/TAP TX queue length set to 100
. 2018.02.12 11:19:27 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2018.02.12 11:19:27 - OpenVPN > /sbin/ip link set dev tun1 up mtu 1500
. 2018.02.12 11:19:28 - OpenVPN > /sbin/ip addr add dev tun1 10.5.2.152/16 broadcast 10.5.255.255
. 2018.02.12 11:19:33 - OpenVPN > /sbin/ip route add 109.202.107.9/32 via 192.168.43.1
. 2018.02.12 11:19:33 - OpenVPN > RTNETLINK answers: File exists
E 2018.02.12 11:19:33 - OpenVPN > ERROR: Linux route add command failed: external program exited with error status: 2
. 2018.02.12 11:19:33 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.5.0.1
. 2018.02.12 11:19:33 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.5.0.1
. 2018.02.12 11:19:33 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup

. 2018.02.12 11:19:33 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2018.02.12 11:19:33 - Routes, added a new route, 109.202.107.10 for gateway 10.5.0.1
. 2018.02.12 11:19:33 - Flushing DNS
I 2018.02.12 11:19:34 - Checking route IPv4
I 2018.02.12 11:19:38 - Checking DNS
! 2018.02.12 11:19:39 - Connected.
 

 

I hope this was a little helpful. Apologies if you got a headache

 

Thank you .


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Version 2.14.1

  • [bugfix] IPv6 activation issues
  • [new] Added IV_GUI_VER to identify Eddie Version at server-level
  • [bugfix] Linux - Tray and "Allow Minimize in Tray" fixed.
  • [bugfix] Linux - iptables --wait flag workaround.
  • [change] Don't show the No-Bootstrap dialog if occurring during connection.

Other issues (memory management under Linux/Mono, tray icon under some distro etc) and feedbacks on this thread are currently under investigation for the next beta release.

Share this post


Link to post

User experience. Also, have you considered directing people here instead of here, when they click the web shortcut for port-forwarding? Because:

Maybe. Thinking about that.

User experience. In Preferences>Advanced> the link to the Advanced Features FAQ is missing a description for the two new options "Skip Process checking" and "Multiple provider support" respectively.

Yes, but doesn't matter for now.

"Skip Process checking" is only a specific workaround about an issue on macOS.

"Multi provider support" will be removed as an option, is here only for the beta-phase of this feature.

User experience. I feel like the client could really use some more mouse-over description text.

Windows and macOS have tooltip. Only Linux don't have tooltip, due to a stupid bug with Mono currently pending.

Functionality. In the "Protocols" section, in the top right corner, it says "30 protocol modes not available due to your OpenVPN version".

All correct. You installed the .deb edition, that don't have any bundled software, are linked as dependencies.

So, in your distro OpenVPN is an older version (2.3.10) that don't support tls-crypt (neither IPv6). So, tls-crypt protocols modes are not available.

Functionality. I noticed that when I go to Preferences>General> check "Minimize to tray" and minimize Eddie and then click the Eddie tray icon, there's an option to display the main window. But if I uncheck "Minimize to tray" and repeat the process, then there's no option to "display main window", including if Eddie still gets minimized to the tray anyway. Instead, one has to click "Connected", to bring up the main window. If I then disconnect first, then there's more options in the tray icon while "Minimize to tray" is not checked: "Connect to a recommended server" and "Session terminated" and I need to click "Session terminated" to bring up the main window in that case, which doesn't make sense to me. This seems inconsistent, as I expect the option to show/hide the main window to always be there, regardless of "Minimize to tray" is checked or not :). Further, changes to that tray UI menu as well as the Eddie menu in general, don't take effect until Eddie is minimized 1 time, which seems odd. This is despite checking/unchecking both "Show Tray Icon" and "Minimize to tray" and saving. It's not a huge deal, but just something I noticed.

I will check it. (anyway another developer in our team write the tray code).

Functionality. In Stats, double clicking Discovery stats doesn't seem to do anything at all, whether connected or disconnected. I'm not sure if that's intended.

If you use Eddie without AirVPN servers, Eddie detect the country and location of .ovpn profiles.

Double click will refresh (re-detect) this kind of info.

Similar to double-click the stats "Latest Manifest Update" to force the re-download of the list of servers.

Typo. In the Preferences>Logging there's a clear typo in the description text: "For multiple logs with different paths, separe it with a semicolon;" it should be "separate them".

Fixed in the next release.

Typo. Small things which need fixing include the About page "Website" and "Manual" links, which when clicked redirect to completely different URLs from the ones displayed.

Ehm.. it's correct. Eddie contain links to "eddie.website", it's dedicated website separated from AirVPN. But currently isn't ready yet, so eddie.website re-redirect to airvpn.org website.

When we release the eddie.website, all will be correct.

Typo. In Preferences>OVPN directives>bottom drop-down box on the right which says "Append Custom directives", there's an incomplete sentence description in the second option: "(...)ignore Base, Provider and..." and what?

Shortened to "Use only Custom directives". For tech details, people can look the faq linked below.

Bug. In Preferences>Logging>Open in filemanager I first got an error pop-up about not being able to find the location or something. Is it intended that we first check the 2 logging boxes before trying to open the file manager? Because after I checked those boxes, browsed to the log file in my file manager outside of Eddie and then went back into Eddie to click the same "Open in filemanager" button again, it worked. But I initially got an error. Which seems odd, because it's not as if it's trying to open a non-existent logfile, which would be understandable. Instead, it's just trying to open the file manager and that should always be possible I thought.

Not sure if there is a bug here.

Probably the path was logs/something.log, your click try to open the file-explorer on the "logs" directory not yet exists.

In the time when you manually open the file-manager, some logs occur and Eddie create the "logs" directory and the log file within.

 

 

@lz1, i not yet read other parts of your post, give me time :D

Share this post


Link to post
Guest

"Multi provider support" will be removed as an option, is here only for the beta-phase of this feature.

 

Does this mean Eddie won't support multiple providers? It was always an interesting feature, not that I had a use for it, but certainly makes Eddie attractive as a generic OpenVPN client and with the recent Android announcement could become the best OpenVPN client there is (especially if network lock works on generic OpenVPN too).

 

Btw that feature is already in 2.3.16 and is not really 'new', been there since late 2016 at least.

Share this post


Link to post

"Multi provider support" will be removed as an option, is here only for the beta-phase of this feature.

 

Does this mean Eddie won't support multiple providers? It was always an interesting feature, not that I had a use for it, but certainly makes Eddie attractive as a generic OpenVPN client and with the recent Android announcement could become the best OpenVPN client there is (especially if network lock works on generic OpenVPN too).

 

Btw that feature is already in 2.3.16 and is not really 'new', been there since late 2016 at least.

I don't think you need to worry. Eddie 3x is the big milestone to wait for and that's the intended time for really "letting Eddie go" I think. I think he's saying they're testing how it would work with multiple support and so that feature is the precursor to the big rollout. But it'll then become redundant as we near Eddie 3x. I also think they're toying with the idea of an Android client, soooooooo don't worry . I think they can see there's lots of support for it and I for one hope they do it if they can, because the other solutions are clumsy in my opinion. With all due respect to the many people who work on those other projects .

 

@Clodo No stress haha, good effort. As I said, I hope you don't get a headache!


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Hi,

 

This is more of a report than a request for help (My apologies, if I've posted to the wrong area. Apologies: can't work spoilers.).

 

On PCLinuxOS (eddie 2.14 beta):

 

1) Using dhcpcd totally defeats ipv6 "DNS leak protection" provided in eddie. If, however, DHCP with dhclient is used instead, then no leaks occur.

2) If certain system services and/or daemons are used (such as those employing mDNS stacks and some network managers -- I'm not sure which of them,

    though.), then:

   a) Network lock causes the UI to state that eddie is taking about 20 minutes "Flushing DNS" before it says Connected,

   A network locked eddie will freeze the UI when the attempt is made to disconnect, This requires a power button shut down about 85% of the time (the other 

       15% of the time, a software reset command will do the trick).

3) Problems 2a and 2b don't occur when network lock is NOT employed or, if the offending system services and daemons are NOT used (even when network

     lock IS engaged.

 

Please, be aware that PCLinuxOS does NOT use systemd.

 

I've included logs, pictures of the eddie options, and pictures of the system services and daemons that actually work.

 

cse

 

 

log with Network lock engaged:

Name: PCLinuxOS release 2018 (PCLinuxOS) for x86_64Kernel 4.9.80-pclos1 on a 4-processor x86_64 / \l, Version: Linux localhost.localdomain 4.9.80-pclos1 #1 SMP Sat Feb 3 23:39:48 CST 2018 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net Framework: v4.0.30319

. 2018.02.12 16:26:52 - Reading options from /home/cse/eddie-ui_2.14.0_linux_x64_portable/AirVPN.xml

. 2018.02.12 16:26:52 - Command line arguments (1): console.mode="none"

. 2018.02.12 16:26:53 - OpenVPN Driver - Found, /dev/net/tun

. 2018.02.12 16:26:53 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/home/cse/eddie-ui_2.14.0_linux_x64_portable/openvpn)

. 2018.02.12 16:26:53 - SSH - Version: OpenSSH_7.6p1, OpenSSL 1.0.2m  2 Nov 2017 (/usr/bin/ssh)

. 2018.02.12 16:26:53 - SSL - Version: stunnel 5.40 (/home/cse/eddie-ui_2.14.0_linux_x64_portable/stunnel)

. 2018.02.12 16:26:53 - curl - Version: 7.58.0 (/usr/bin/curl)

. 2018.02.12 16:26:53 - Certification Authorities: /home/cse/eddie-ui_2.14.0_linux_x64_portable/res//cacert.pem

W 2018.02.12 16:26:53 - Recovery. Unexpected crash?

W 2018.02.12 16:26:53 - Routes, add 0.0.0.0/0 for gateway 73.19.64.1 failed: RTNETLINK answers: File exists

W 2018.02.12 16:26:53 - Routes, add ::/0 for gateway fe80::2a52:61ff:fe29:cc22 failed: RTNETLINK answers: File exists

. 2018.02.12 16:26:54 - Updating systems & servers data ...

I 2018.02.12 16:26:54 - Ready

. 2018.02.12 16:26:55 - Systems & servers data update completed

! 2018.02.12 16:27:10 - Activation of Network Lock - Linux iptables

I 2018.02.12 16:27:23 - Session starting.

I 2018.02.12 16:27:23 - Checking authorization ...

! 2018.02.12 16:27:23 - Connecting to Persei (United States, Fremont, California)

. 2018.02.12 16:27:23 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Nov 24 2017

. 2018.02.12 16:27:23 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.02.12 16:27:23 - Connection to OpenVPN Management Interface

. 2018.02.12 16:27:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.02.12 16:27:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.12 16:27:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.12 16:27:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]94.100.23.162:41185

. 2018.02.12 16:27:23 - OpenVPN > Socket Buffers: R=[65535->524288] S=[65535->524288]

. 2018.02.12 16:27:23 - OpenVPN > UDP link local: (not bound)

. 2018.02.12 16:27:23 - OpenVPN > UDP link remote: [AF_INET]94.100.23.162:41185

. 2018.02.12 16:27:23 - OpenVPN > TLS: Initial packet from [AF_INET]94.100.23.162:41185, sid=aa3371ed c5f57f18

. 2018.02.12 16:27:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.02.12 16:27:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.02.12 16:27:23 - OpenVPN > VERIFY KU OK

. 2018.02.12 16:27:23 - OpenVPN > Validating certificate extended key usage

. 2018.02.12 16:27:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.02.12 16:27:23 - OpenVPN > VERIFY EKU OK

. 2018.02.12 16:27:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.02.12 16:27:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.02.12 16:27:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]94.100.23.162:41185

. 2018.02.12 16:27:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.02.12 16:27:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.30.0.1,comp-lzo no,route-gateway 10.30.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.30.1.64 255.255.0.0'

. 2018.02.12 16:27:25 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.02.12 16:27:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.02.12 16:27:25 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.02.12 16:27:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.02.12 16:27:25 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.02.12 16:27:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.02.12 16:27:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.12 16:27:25 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.12 16:27:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.12 16:27:25 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.12 16:27:25 - OpenVPN > ROUTE_GATEWAY 73.19.64.1/255.255.252.0 IFACE=eth0 HWADDR=34:17:eb:7c:eb:50

. 2018.02.12 16:27:25 - OpenVPN > TUN/TAP device tun0 opened

. 2018.02.12 16:27:25 - OpenVPN > TUN/TAP TX queue length set to 100

. 2018.02.12 16:27:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.02.12 16:27:25 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500

. 2018.02.12 16:27:25 - OpenVPN > /sbin/ip addr add dev tun0 10.30.1.64/16 broadcast 10.30.255.255

. 2018.02.12 16:27:30 - OpenVPN > /sbin/ip route add 94.100.23.162/32 via 73.19.64.1

. 2018.02.12 16:27:30 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.30.0.1

. 2018.02.12 16:27:30 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.30.0.1

. 2018.02.12 16:27:30 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup

. 2018.02.12 16:27:30 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)

. 2018.02.12 16:27:30 - Routes, added a new route, 94.100.23.163 for gateway 10.30.0.1

. 2018.02.12 16:27:30 - Flushing DNS

I 2018.02.12 16:28:53 - Checking route IPv4

I 2018.02.12 16:28:54 - Checking DNS

! 2018.02.12 16:28:54 - Connected.

. 2018.02.12 16:28:54 - OpenVPN > Initialization Sequence Completed

 

log with no network lock:

. 2018.02.12 16:14:14 - Eddie version: 2.14.0 / linux_x64, System: Linux, Name: PCLinuxOS release 2018 (PCLinuxOS) for x86_64Kernel 4.9.80-pclos1 on a 4-processor x86_64 / \l, Version: Linux localhost.localdomain 4.9.80-pclos1 #1 SMP Sat Feb 3 23:39:48 CST 2018 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net Framework: v4.0.30319

. 2018.02.12 16:14:14 - Reading options from /home/cse/eddie-ui_2.14.0_linux_x64_portable/AirVPN.xml

. 2018.02.12 16:14:14 - Command line arguments (1): console.mode="none"

. 2018.02.12 16:14:15 - OpenVPN Driver - Found, /dev/net/tun

. 2018.02.12 16:14:15 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/home/cse/eddie-ui_2.14.0_linux_x64_portable/openvpn)

. 2018.02.12 16:14:15 - SSH - Version: OpenSSH_7.6p1, OpenSSL 1.0.2m  2 Nov 2017 (/usr/bin/ssh)

. 2018.02.12 16:14:15 - SSL - Version: stunnel 5.40 (/home/cse/eddie-ui_2.14.0_linux_x64_portable/stunnel)

. 2018.02.12 16:14:15 - curl - Version: 7.58.0 (/usr/bin/curl)

. 2018.02.12 16:14:15 - Certification Authorities: /home/cse/eddie-ui_2.14.0_linux_x64_portable/res//cacert.pem

W 2018.02.12 16:14:15 - Recovery. Unexpected crash?

W 2018.02.12 16:14:15 - Routes, add 0.0.0.0/0 for gateway 73.19.64.1 failed: RTNETLINK answers: File exists

W 2018.02.12 16:14:16 - Routes, add ::/0 for gateway fe80::2a52:61ff:fe29:cc22 failed: RTNETLINK answers: File exists

. 2018.02.12 16:14:16 - Updating systems & servers data ...

I 2018.02.12 16:14:16 - Ready

. 2018.02.12 16:14:17 - Systems & servers data update completed

I 2018.02.12 16:14:31 - Session starting.

I 2018.02.12 16:14:31 - Checking authorization ...

! 2018.02.12 16:14:31 - Connecting to Persei (United States, Fremont, California)

. 2018.02.12 16:14:31 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Nov 24 2017

. 2018.02.12 16:14:31 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.02.12 16:14:31 - Connection to OpenVPN Management Interface

. 2018.02.12 16:14:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.02.12 16:14:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.12 16:14:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.12 16:14:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]94.100.23.162:41185

. 2018.02.12 16:14:31 - OpenVPN > Socket Buffers: R=[65535->524288] S=[65535->524288]

. 2018.02.12 16:14:31 - OpenVPN > UDP link local: (not bound)

. 2018.02.12 16:14:31 - OpenVPN > UDP link remote: [AF_INET]94.100.23.162:41185

. 2018.02.12 16:14:31 - OpenVPN > TLS: Initial packet from [AF_INET]94.100.23.162:41185, sid=be1367f7 e55ba9fd

. 2018.02.12 16:14:31 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.02.12 16:14:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.02.12 16:14:31 - OpenVPN > VERIFY KU OK

. 2018.02.12 16:14:31 - OpenVPN > Validating certificate extended key usage

. 2018.02.12 16:14:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.02.12 16:14:31 - OpenVPN > VERIFY EKU OK

. 2018.02.12 16:14:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.02.12 16:14:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.02.12 16:14:32 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]94.100.23.162:41185

. 2018.02.12 16:14:33 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.02.12 16:14:33 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.30.0.1,comp-lzo no,route-gateway 10.30.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.30.1.64 255.255.0.0'

. 2018.02.12 16:14:33 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.02.12 16:14:33 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.02.12 16:14:33 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.02.12 16:14:33 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.02.12 16:14:33 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.02.12 16:14:33 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.02.12 16:14:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.12 16:14:33 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.12 16:14:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.12 16:14:33 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.12 16:14:33 - OpenVPN > ROUTE_GATEWAY 73.19.64.1/255.255.252.0 IFACE=eth0 HWADDR=34:17:eb:7c:eb:50

. 2018.02.12 16:14:33 - OpenVPN > TUN/TAP device tun0 opened

. 2018.02.12 16:14:33 - OpenVPN > TUN/TAP TX queue length set to 100

. 2018.02.12 16:14:33 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.02.12 16:14:33 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500

. 2018.02.12 16:14:33 - OpenVPN > /sbin/ip addr add dev tun0 10.30.1.64/16 broadcast 10.30.255.255

. 2018.02.12 16:14:38 - OpenVPN > /sbin/ip route add 94.100.23.162/32 via 73.19.64.1

. 2018.02.12 16:14:38 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.30.0.1

. 2018.02.12 16:14:38 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.30.0.1

. 2018.02.12 16:14:38 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup

. 2018.02.12 16:14:38 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)

. 2018.02.12 16:14:38 - Routes, added a new route, 94.100.23.163 for gateway 10.30.0.1

. 2018.02.12 16:14:38 - Flushing DNS

I 2018.02.12 16:14:39 - Checking route IPv4

I 2018.02.12 16:14:40 - Checking DNS

! 2018.02.12 16:14:40 - Connected.

. 2018.02.12 16:14:40 - OpenVPN > Initialization Sequence Completed

Share this post


Link to post

...

 

To use spoilers type [_spoiler_] without the _ _ then copy and paste your log, then type [_/spoiler_] without the _ _

Share this post


Link to post

Win10 64bit. Uninstalled beta 2.14.0 including xml. Installed 2.14.1, opened and enabled network lock, put in login credentials, chose key. Multiple connection attempts failed. Connect, disconnect. Connect, disconnect... and so on. Main window displays an unknown error message.

 

Update 02/13/18: Was wondering why no response to this message so I did another clean uninstall of 2.13 and install of 2.14.1. Working now. Who knows? Planets were out of alignment.

 

I leave the attachment, but disregard.

Share this post


Link to post

Does this mean Eddie won't support multiple providers?

Absolutely not! I mean it's actually opt-in be because it's a beta feature, but will become a default=true and the option removed.

Share this post


Link to post

 

...

 

To use spoilers type [_spoiler_] without the _ _ then copy and paste your log, then type [_/spoiler_] without the _ _

 

I edited your and @cse post to fix spoiler.

Share this post


Link to post

Got 2.14.1.

 

Linux Mint 18 Cinnamon.

 

Bug. Minimize to tray is creating dead "Hide Main Window" links both within Eddie and on its tray icon. I'll try use bullet points, to hopefully make it less confusing.

 

  • "Show Try Icon" & "Minimize to tray" are on by default. By turning off the 2nd one, you can minimize Eddie, but the tray icon shortcut won't show a "Show Main Window" option anymore, but only a "Hide Main Window", despite the window already being hidden.
  • Clicking this "Hide Main Window" menu item does nothing, as the window is already hidden.
  • Meanwhile, the option for hiding the window IN the client, is gone. So one has to click the little dash in the top right corner to minimize. If you then ALSO turn off "Show Tray Icon", Eddies tray icon won't show the "Hide Window" option anymore.
  • But the Eddie tray icon itself remains unchanged, so I don't see the point. IF I then turn "Show Tray Icon" back on, nothing changes and the "Hide Main Window" option is still hidden.
  • If I then also turn on "Minimize to Tray", then the bug from before persists, where it requires you to minimize Eddie 1 time, before the Hide/Show options come back to default in the client and tray icon.

I also wasn't able to connect to Castor. Including with TCP and IP6 only enabled. But I'm glad the no-bootstrap error & memory leak is apparently fixed, because I got a huge amount of popups each time I turned on my PC.

 

Bug? The entire server list is red, so I can't connect to them by clicking. But if I click connect automatically, Eddie will connect. Including to servers which were otherwise red. They all say "NA: No IP6 exit available". My settings:

  • Preferences>Networking>Both Layer IP4 and IP6 are set to "Inside tunnel(must be supported)".
  • IP protocol used for connection: IP4 only. All others Automatic.
  • I'm not leaking on Ipleak, despite not being able to select locations myself.

Bug. When the location list is all red as describe before, opening preferences and then changing the position of the window, so that you can see the location list, shows the list as white like normal, instead of red. Which could probably be confusing if you're changing settings and trying to see if the color changes or not .

 

Sorry for adding more to your workload Clodo and co, when you likely weren't finished with my prior logs, haha.

 

Good effort guys!


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

When I enable dark mode on 10.13.3 (17D47) and start Eddie 1.14.1 the menu bar icon will only show a red line and some black dots. Here is a photo showing what it looks like. 

Share this post


Link to post

Win10 64bit with 2.14.1. Not sure if it's by design, but notification tray tool tip no longer displays connected server.

Share this post


Link to post

Regarding the following change in 2.14.1:

 

"[bugfix] Linux - iptables --wait flag workaround."

 

May I ask, what this workaround actually does?

 

Is it any less reliable or secure than earlier versions of iptables together with older clients (up to 2.14 and incl. 2.13.6 stable)?

 

Reference: https://airvpn.org/topic/25199-debian-unstable-network-lock-fail-sbiniptables-save-unrecognized-option-wait/

 

 

 

In answer to your first question ; May I ask, what this workaround actually does?

 

answer is it gets network-lock working again.

Share this post


Link to post
Guest
This topic is now closed to further replies.

×
×
  • Create New...