8nDTiLB 1 Posted ... Is there any way to create a config that will connect a router to an upgraded server in a certain country based on best speed/latency, or will that only be possible when all of the servers in said country are updated to the new "smart" standard? Thanks for all the info provided in the thread so far. Quote Share this post Link to post
Monotremata 22 Posted ... First time trying to connect to a IPv6 server (Rana). Tried connecting once, failed and then connected to a IPv4 server. On a Mac 10.11.6 running Eddie 2.15.2. Tried a second time and noticed one unusual thing happening. Under system preferences/network/advanced/TCP/IP - configure IPv6 was set to automatically prior to trying to connect. After failing to connect, it defaulted back to "off". Any ideas? Log is attached:. 2018.06.25 16:24:51 - macOS - PF rules updated, reloading! 2018.06.25 16:24:52 - Disconnecting. 2018.06.25 16:24:52 - Routes, removed a route previously added, 71.19.252.32 for gateway 10.4.0.1. 2018.06.25 16:24:52 - Sending management termination signal. 2018.06.25 16:24:52 - Management - Send 'signal SIGTERM'. 2018.06.25 16:24:52 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.25 16:24:52 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.25 16:24:58 - OpenVPN > /sbin/route delete -net 71.19.252.31 192.168.1.254 255.255.255.255. 2018.06.25 16:24:58 - OpenVPN > delete net 71.19.252.31: gateway 192.168.1.254. 2018.06.25 16:24:58 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2018.06.25 16:24:58 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2018.06.25 16:24:58 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2018.06.25 16:24:58 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1. 2018.06.25 16:24:58 - OpenVPN > Closing TUN/TAP interface. 2018.06.25 16:24:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.06.25 16:24:58 - Connection terminated.. 2018.06.25 16:24:58 - IPv6 restored on network adapter (SAMSUNG Modem). 2018.06.25 16:24:58 - IPv6 restored on network adapter (Ethernet). 2018.06.25 16:24:58 - IPv6 restored on network adapter (FireWire). 2018.06.25 16:24:58 - IPv6 restored on network adapter (Wi-Fi). 2018.06.25 16:24:58 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic). 2018.06.25 16:24:58 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)I 2018.06.25 16:24:58 - Checking authorization ...! 2018.06.25 16:24:59 - Connecting to Rana (Canada, Toronto, Ontario). 2018.06.25 16:24:59 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.06.25 16:24:59 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.25 16:24:59 - Connection to OpenVPN Management Interface. 2018.06.25 16:24:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.06.25 16:24:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.25 16:24:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.25 16:24:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443. 2018.06.25 16:24:59 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.06.25 16:24:59 - OpenVPN > UDPv6 link local: (not bound). 2018.06.25 16:24:59 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443. 2018.06.25 16:24:59 - OpenVPN > write UDPv6: No route to host (code=65). 2018.06.25 16:24:59 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.06.25 16:25:01 - OpenVPN > write UDPv6: No route to host (code=65). 2018.06.25 16:25:31 - Above log line repeated 3 times more. 2018.06.25 16:25:31 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2018.06.25 16:25:31 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.25 16:25:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2018.06.25 16:25:36 - Disconnecting. 2018.06.25 16:25:36 - Connection terminated.I 2018.06.25 16:25:40 - Checking authorization .... 2018.06.25 16:25:41 - IPv6 disabled on network adapter (SAMSUNG Modem). 2018.06.25 16:25:41 - IPv6 disabled on network adapter (Ethernet). 2018.06.25 16:25:41 - IPv6 disabled on network adapter (FireWire). 2018.06.25 16:25:41 - IPv6 disabled on network adapter (Wi-Fi)! 2018.06.25 16:25:41 - Connecting to Kleeia (Canada, Vancouver). 2018.06.25 16:25:41 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.06.25 16:25:41 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.25 16:25:41 - Connection to OpenVPN Management Interface. 2018.06.25 16:25:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.06.25 16:25:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.25 16:25:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.25 16:25:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.31:443. 2018.06.25 16:25:41 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.06.25 16:25:41 - OpenVPN > UDP link local: (not bound). 2018.06.25 16:25:41 - OpenVPN > UDP link remote: [AF_INET]71.19.252.31:443. 2018.06.25 16:25:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.06.25 16:25:41 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.31:443, sid=df676e5d ad3da923. 2018.06.25 16:25:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.25 16:25:41 - OpenVPN > VERIFY KU OK. 2018.06.25 16:25:41 - OpenVPN > Validating certificate extended key usage. 2018.06.25 16:25:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.25 16:25:41 - OpenVPN > VERIFY EKU OK. 2018.06.25 16:25:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org. 2018.06.25 16:25:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.25 16:25:42 - OpenVPN > [Kleeia] Peer Connection Initiated with [AF_INET]71.19.252.31:443. 2018.06.25 16:25:43 - OpenVPN > SENT CONTROL [Kleeia]: 'PUSH_REQUEST' (status=1). 2018.06.25 16:25:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.47 255.255.0.0,peer-id 78,cipher AES-256-GCM'. 2018.06.25 16:25:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.06.25 16:25:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.06.25 16:25:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.25 16:25:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.25 16:25:43 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae. 2018.06.25 16:25:43 - OpenVPN > Opened utun device utun0. 2018.06.25 16:25:43 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.25 16:25:43 - OpenVPN > /sbin/ifconfig utun0 delete. 2018.06.25 16:25:43 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.06.25 16:25:43 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.06.25 16:25:43 - OpenVPN > /sbin/ifconfig utun0 10.4.1.47 10.4.1.47 netmask 255.255.0.0 mtu 1500 up. 2018.06.25 16:25:43 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.47 255.255.0.0. 2018.06.25 16:25:43 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.47. 2018.06.25 16:25:43 - OpenVPN > /sbin/route add -net 71.19.252.31 192.168.1.254 255.255.255.255. 2018.06.25 16:25:43 - OpenVPN > add net 71.19.252.31: gateway 192.168.1.254. 2018.06.25 16:25:43 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2018.06.25 16:25:43 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2018.06.25 16:25:43 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2018.06.25 16:25:43 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2018.06.25 16:25:43 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1). 2018.06.25 16:25:44 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1). 2018.06.25 16:25:44 - Routes, added a new route, 71.19.252.32 for gateway 10.4.0.1. 2018.06.25 16:25:44 - Flushing DNS. 2018.06.25 16:25:44 - macOS - PF rules updated, reloadingI 2018.06.25 16:25:45 - Checking route IPv4I 2018.06.25 16:25:45 - Checking DNS! 2018.06.25 16:25:46 - Connected.. 2018.06.25 16:25:46 - OpenVPN > Initialization Sequence Completed. 2018.06.25 16:27:55 - Updating systems & servers data .... 2018.06.25 16:27:57 - Systems & servers data update completed. 2018.06.25 16:33:32 - macOS - PF rules updated, reloading! 2018.06.25 16:33:33 - Disconnecting. 2018.06.25 16:33:33 - Routes, removed a route previously added, 71.19.252.32 for gateway 10.4.0.1. 2018.06.25 16:33:33 - Sending management termination signal. 2018.06.25 16:33:33 - Management - Send 'signal SIGTERM'. 2018.06.25 16:33:33 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.25 16:33:33 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.25 16:33:38 - OpenVPN > /sbin/route delete -net 71.19.252.31 192.168.1.254 255.255.255.255. 2018.06.25 16:33:38 - OpenVPN > delete net 71.19.252.31: gateway 192.168.1.254. 2018.06.25 16:33:38 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2018.06.25 16:33:38 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2018.06.25 16:33:38 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2018.06.25 16:33:38 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1. 2018.06.25 16:33:38 - OpenVPN > Closing TUN/TAP interface. 2018.06.25 16:33:38 - Connection terminated.. 2018.06.25 16:33:38 - IPv6 restored on network adapter (SAMSUNG Modem). 2018.06.25 16:33:38 - IPv6 restored on network adapter (Ethernet). 2018.06.25 16:33:38 - IPv6 restored on network adapter (FireWire). 2018.06.25 16:33:38 - IPv6 restored on network adapter (Wi-Fi). 2018.06.25 16:33:38 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic). 2018.06.25 16:33:38 - DNS of a network adapter restored to original settings (Ethernet, to Automatic). 2018.06.25 16:33:38 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exitingI 2018.06.25 16:33:38 - Checking authorization ...! 2018.06.25 16:33:39 - Connecting to Rana (Canada, Toronto, Ontario). 2018.06.25 16:33:40 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.06.25 16:33:40 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.25 16:33:40 - Connection to OpenVPN Management Interface. 2018.06.25 16:33:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.06.25 16:33:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.25 16:33:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.25 16:33:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443. 2018.06.25 16:33:40 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.06.25 16:33:40 - OpenVPN > UDPv6 link local: (not bound). 2018.06.25 16:33:40 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443. 2018.06.25 16:33:40 - OpenVPN > write UDPv6: No route to host (code=65). 2018.06.25 16:33:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.06.25 16:33:41 - OpenVPN > write UDPv6: No route to host (code=65). 2018.06.25 16:34:11 - Above log line repeated 3 times more. 2018.06.25 16:34:11 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2018.06.25 16:34:11 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.25 16:34:16 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2018.06.25 16:34:16 - Disconnecting. 2018.06.25 16:34:16 - Connection terminated.I 2018.06.25 16:34:19 - Checking authorization .... 2018.06.25 16:34:20 - IPv6 disabled on network adapter (SAMSUNG Modem). 2018.06.25 16:34:20 - IPv6 disabled on network adapter (Ethernet). 2018.06.25 16:34:20 - IPv6 disabled on network adapter (FireWire). 2018.06.25 16:34:20 - IPv6 disabled on network adapter (Wi-Fi)! 2018.06.25 16:34:20 - Connecting to Kleeia (Canada, Vancouver). 2018.06.25 16:34:21 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.06.25 16:34:21 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.25 16:34:21 - Connection to OpenVPN Management Interface. 2018.06.25 16:34:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.06.25 16:34:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.25 16:34:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.25 16:34:21 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.31:443. 2018.06.25 16:34:21 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.06.25 16:34:21 - OpenVPN > UDP link local: (not bound). 2018.06.25 16:34:21 - OpenVPN > UDP link remote: [AF_INET]71.19.252.31:443. 2018.06.25 16:34:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.06.25 16:34:21 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.31:443, sid=7e320946 71933355. 2018.06.25 16:34:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.25 16:34:21 - OpenVPN > VERIFY KU OK. 2018.06.25 16:34:21 - OpenVPN > Validating certificate extended key usage. 2018.06.25 16:34:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.25 16:34:21 - OpenVPN > VERIFY EKU OK. 2018.06.25 16:34:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org. 2018.06.25 16:34:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.25 16:34:21 - OpenVPN > [Kleeia] Peer Connection Initiated with [AF_INET]71.19.252.31:443. 2018.06.25 16:34:22 - OpenVPN > SENT CONTROL [Kleeia]: 'PUSH_REQUEST' (status=1). 2018.06.25 16:34:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.47 255.255.0.0,peer-id 53,cipher AES-256-GCM'. 2018.06.25 16:34:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.06.25 16:34:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.06.25 16:34:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.25 16:34:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.25 16:34:22 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae. 2018.06.25 16:34:22 - OpenVPN > Opened utun device utun0. 2018.06.25 16:34:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.25 16:34:22 - OpenVPN > /sbin/ifconfig utun0 delete. 2018.06.25 16:34:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.06.25 16:34:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.06.25 16:34:22 - OpenVPN > /sbin/ifconfig utun0 10.4.1.47 10.4.1.47 netmask 255.255.0.0 mtu 1500 up. 2018.06.25 16:34:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.47 255.255.0.0. 2018.06.25 16:34:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.47. 2018.06.25 16:34:22 - OpenVPN > /sbin/route add -net 71.19.252.31 192.168.1.254 255.255.255.255. 2018.06.25 16:34:22 - OpenVPN > add net 71.19.252.31: gateway 192.168.1.254. 2018.06.25 16:34:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2018.06.25 16:34:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2018.06.25 16:34:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2018.06.25 16:34:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2018.06.25 16:34:22 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1). 2018.06.25 16:34:22 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1). 2018.06.25 16:34:23 - Routes, added a new route, 71.19.252.32 for gateway 10.4.0.1. 2018.06.25 16:34:23 - Flushing DNS. 2018.06.25 16:34:23 - macOS - PF rules updated, reloadingI 2018.06.25 16:34:23 - Checking route IPv4I 2018.06.25 16:34:24 - Checking DNS! 2018.06.25 16:34:25 - Connected.. 2018.06.25 16:34:25 - OpenVPN > Initialization Sequence Completed. 2018.06.25 16:38:03 - Updating systems & servers data .... 2018.06.25 16:38:05 - Systems & servers data update completed Get used to it, this seems to be a "feature" of MacOS in general. Over here on 10.13.5, mine keeps dropping the IPv6 address altogether WHILE Im connected to one of the new IPv6 servers. I thought it had just started, because I never had any problems with them before this, but Ive found many people complaining about it searching for it on Google. Ill be right in the middle of doing something and it will just drop the address, which makes the server stop responding, and the only way to get it to reconnect is to either pick an IPv4 only server (sometimes that doesnt work) or to turn off the Airport card and turn it back on and reconnect. If I just try to reconnect to one of the "gen 2" servers, it just resets, tries to connect, restarts, and loops over and over. In the last 4-5 hours today alone its done it about 4 times already. Usually its a once, maybe twice a day thing. I thought maybe it was the new version of Eddie, but it does it in Tunnelblick too, so its the Mac for sure, and it all started around the time I updated to 10.13.5. It just hates having an IPv6 address, even though my router (and my ISP even) gladly hands them out and does in fact use them. Its starting to get really annoying and I can't find a way to fix it. 1 madrat reacted to this Quote Share this post Link to post
madrat 19 Posted ... First time trying to connect to a IPv6 server (Rana). Tried connecting once, failed and then connected to a IPv4 server. On a Mac 10.11.6 running Eddie 2.15.2. Tried a second time and noticed one unusual thing happening. Under system preferences/network/advanced/TCP/IP - configure IPv6 was set to automatically prior to trying to connect. After failing to connect, it defaulted back to "off". Any ideas? Log is attached:. 2018.06.25 16:24:51 - macOS - PF rules updated, reloading! 2018.06.25 16:24:52 - Disconnecting. 2018.06.25 16:24:52 - Routes, removed a route previously added, 71.19.252.32 for gateway 10.4.0.1. 2018.06.25 16:24:52 - Sending management termination signal. 2018.06.25 16:24:52 - Management - Send 'signal SIGTERM'. 2018.06.25 16:24:52 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.25 16:24:52 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.25 16:24:58 - OpenVPN > /sbin/route delete -net 71.19.252.31 192.168.1.254 255.255.255.255. 2018.06.25 16:24:58 - OpenVPN > delete net 71.19.252.31: gateway 192.168.1.254. 2018.06.25 16:24:58 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2018.06.25 16:24:58 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2018.06.25 16:24:58 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2018.06.25 16:24:58 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1. 2018.06.25 16:24:58 - OpenVPN > Closing TUN/TAP interface. 2018.06.25 16:24:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.06.25 16:24:58 - Connection terminated.. 2018.06.25 16:24:58 - IPv6 restored on network adapter (SAMSUNG Modem). 2018.06.25 16:24:58 - IPv6 restored on network adapter (Ethernet). 2018.06.25 16:24:58 - IPv6 restored on network adapter (FireWire). 2018.06.25 16:24:58 - IPv6 restored on network adapter (Wi-Fi). 2018.06.25 16:24:58 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic). 2018.06.25 16:24:58 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)I 2018.06.25 16:24:58 - Checking authorization ...! 2018.06.25 16:24:59 - Connecting to Rana (Canada, Toronto, Ontario). 2018.06.25 16:24:59 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.06.25 16:24:59 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.25 16:24:59 - Connection to OpenVPN Management Interface. 2018.06.25 16:24:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.06.25 16:24:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.25 16:24:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.25 16:24:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443. 2018.06.25 16:24:59 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.06.25 16:24:59 - OpenVPN > UDPv6 link local: (not bound). 2018.06.25 16:24:59 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443. 2018.06.25 16:24:59 - OpenVPN > write UDPv6: No route to host (code=65). 2018.06.25 16:24:59 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.06.25 16:25:01 - OpenVPN > write UDPv6: No route to host (code=65). 2018.06.25 16:25:31 - Above log line repeated 3 times more. 2018.06.25 16:25:31 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2018.06.25 16:25:31 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.25 16:25:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2018.06.25 16:25:36 - Disconnecting. 2018.06.25 16:25:36 - Connection terminated.I 2018.06.25 16:25:40 - Checking authorization .... 2018.06.25 16:25:41 - IPv6 disabled on network adapter (SAMSUNG Modem). 2018.06.25 16:25:41 - IPv6 disabled on network adapter (Ethernet). 2018.06.25 16:25:41 - IPv6 disabled on network adapter (FireWire). 2018.06.25 16:25:41 - IPv6 disabled on network adapter (Wi-Fi)! 2018.06.25 16:25:41 - Connecting to Kleeia (Canada, Vancouver). 2018.06.25 16:25:41 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.06.25 16:25:41 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.25 16:25:41 - Connection to OpenVPN Management Interface. 2018.06.25 16:25:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.06.25 16:25:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.25 16:25:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.25 16:25:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.31:443. 2018.06.25 16:25:41 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.06.25 16:25:41 - OpenVPN > UDP link local: (not bound). 2018.06.25 16:25:41 - OpenVPN > UDP link remote: [AF_INET]71.19.252.31:443. 2018.06.25 16:25:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.06.25 16:25:41 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.31:443, sid=df676e5d ad3da923. 2018.06.25 16:25:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.25 16:25:41 - OpenVPN > VERIFY KU OK. 2018.06.25 16:25:41 - OpenVPN > Validating certificate extended key usage. 2018.06.25 16:25:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.25 16:25:41 - OpenVPN > VERIFY EKU OK. 2018.06.25 16:25:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org. 2018.06.25 16:25:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.25 16:25:42 - OpenVPN > [Kleeia] Peer Connection Initiated with [AF_INET]71.19.252.31:443. 2018.06.25 16:25:43 - OpenVPN > SENT CONTROL [Kleeia]: 'PUSH_REQUEST' (status=1). 2018.06.25 16:25:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.47 255.255.0.0,peer-id 78,cipher AES-256-GCM'. 2018.06.25 16:25:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.06.25 16:25:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.06.25 16:25:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.25 16:25:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.25 16:25:43 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae. 2018.06.25 16:25:43 - OpenVPN > Opened utun device utun0. 2018.06.25 16:25:43 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.25 16:25:43 - OpenVPN > /sbin/ifconfig utun0 delete. 2018.06.25 16:25:43 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.06.25 16:25:43 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.06.25 16:25:43 - OpenVPN > /sbin/ifconfig utun0 10.4.1.47 10.4.1.47 netmask 255.255.0.0 mtu 1500 up. 2018.06.25 16:25:43 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.47 255.255.0.0. 2018.06.25 16:25:43 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.47. 2018.06.25 16:25:43 - OpenVPN > /sbin/route add -net 71.19.252.31 192.168.1.254 255.255.255.255. 2018.06.25 16:25:43 - OpenVPN > add net 71.19.252.31: gateway 192.168.1.254. 2018.06.25 16:25:43 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2018.06.25 16:25:43 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2018.06.25 16:25:43 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2018.06.25 16:25:43 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2018.06.25 16:25:43 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1). 2018.06.25 16:25:44 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1). 2018.06.25 16:25:44 - Routes, added a new route, 71.19.252.32 for gateway 10.4.0.1. 2018.06.25 16:25:44 - Flushing DNS. 2018.06.25 16:25:44 - macOS - PF rules updated, reloadingI 2018.06.25 16:25:45 - Checking route IPv4I 2018.06.25 16:25:45 - Checking DNS! 2018.06.25 16:25:46 - Connected.. 2018.06.25 16:25:46 - OpenVPN > Initialization Sequence Completed. 2018.06.25 16:27:55 - Updating systems & servers data .... 2018.06.25 16:27:57 - Systems & servers data update completed. 2018.06.25 16:33:32 - macOS - PF rules updated, reloading! 2018.06.25 16:33:33 - Disconnecting. 2018.06.25 16:33:33 - Routes, removed a route previously added, 71.19.252.32 for gateway 10.4.0.1. 2018.06.25 16:33:33 - Sending management termination signal. 2018.06.25 16:33:33 - Management - Send 'signal SIGTERM'. 2018.06.25 16:33:33 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.06.25 16:33:33 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.25 16:33:38 - OpenVPN > /sbin/route delete -net 71.19.252.31 192.168.1.254 255.255.255.255. 2018.06.25 16:33:38 - OpenVPN > delete net 71.19.252.31: gateway 192.168.1.254. 2018.06.25 16:33:38 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2018.06.25 16:33:38 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2018.06.25 16:33:38 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2018.06.25 16:33:38 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1. 2018.06.25 16:33:38 - OpenVPN > Closing TUN/TAP interface. 2018.06.25 16:33:38 - Connection terminated.. 2018.06.25 16:33:38 - IPv6 restored on network adapter (SAMSUNG Modem). 2018.06.25 16:33:38 - IPv6 restored on network adapter (Ethernet). 2018.06.25 16:33:38 - IPv6 restored on network adapter (FireWire). 2018.06.25 16:33:38 - IPv6 restored on network adapter (Wi-Fi). 2018.06.25 16:33:38 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic). 2018.06.25 16:33:38 - DNS of a network adapter restored to original settings (Ethernet, to Automatic). 2018.06.25 16:33:38 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exitingI 2018.06.25 16:33:38 - Checking authorization ...! 2018.06.25 16:33:39 - Connecting to Rana (Canada, Toronto, Ontario). 2018.06.25 16:33:40 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.06.25 16:33:40 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.25 16:33:40 - Connection to OpenVPN Management Interface. 2018.06.25 16:33:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.06.25 16:33:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.25 16:33:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.25 16:33:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443. 2018.06.25 16:33:40 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.06.25 16:33:40 - OpenVPN > UDPv6 link local: (not bound). 2018.06.25 16:33:40 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443. 2018.06.25 16:33:40 - OpenVPN > write UDPv6: No route to host (code=65). 2018.06.25 16:33:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.06.25 16:33:41 - OpenVPN > write UDPv6: No route to host (code=65). 2018.06.25 16:34:11 - Above log line repeated 3 times more. 2018.06.25 16:34:11 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2018.06.25 16:34:11 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.06.25 16:34:16 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2018.06.25 16:34:16 - Disconnecting. 2018.06.25 16:34:16 - Connection terminated.I 2018.06.25 16:34:19 - Checking authorization .... 2018.06.25 16:34:20 - IPv6 disabled on network adapter (SAMSUNG Modem). 2018.06.25 16:34:20 - IPv6 disabled on network adapter (Ethernet). 2018.06.25 16:34:20 - IPv6 disabled on network adapter (FireWire). 2018.06.25 16:34:20 - IPv6 disabled on network adapter (Wi-Fi)! 2018.06.25 16:34:20 - Connecting to Kleeia (Canada, Vancouver). 2018.06.25 16:34:21 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.06.25 16:34:21 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.06.25 16:34:21 - Connection to OpenVPN Management Interface. 2018.06.25 16:34:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.06.25 16:34:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.25 16:34:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.06.25 16:34:21 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.31:443. 2018.06.25 16:34:21 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.06.25 16:34:21 - OpenVPN > UDP link local: (not bound). 2018.06.25 16:34:21 - OpenVPN > UDP link remote: [AF_INET]71.19.252.31:443. 2018.06.25 16:34:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.06.25 16:34:21 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.31:443, sid=7e320946 71933355. 2018.06.25 16:34:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.06.25 16:34:21 - OpenVPN > VERIFY KU OK. 2018.06.25 16:34:21 - OpenVPN > Validating certificate extended key usage. 2018.06.25 16:34:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.06.25 16:34:21 - OpenVPN > VERIFY EKU OK. 2018.06.25 16:34:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org. 2018.06.25 16:34:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.06.25 16:34:21 - OpenVPN > [Kleeia] Peer Connection Initiated with [AF_INET]71.19.252.31:443. 2018.06.25 16:34:22 - OpenVPN > SENT CONTROL [Kleeia]: 'PUSH_REQUEST' (status=1). 2018.06.25 16:34:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.47 255.255.0.0,peer-id 53,cipher AES-256-GCM'. 2018.06.25 16:34:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.06.25 16:34:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.06.25 16:34:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.25 16:34:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.06.25 16:34:22 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae. 2018.06.25 16:34:22 - OpenVPN > Opened utun device utun0. 2018.06.25 16:34:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.06.25 16:34:22 - OpenVPN > /sbin/ifconfig utun0 delete. 2018.06.25 16:34:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.06.25 16:34:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.06.25 16:34:22 - OpenVPN > /sbin/ifconfig utun0 10.4.1.47 10.4.1.47 netmask 255.255.0.0 mtu 1500 up. 2018.06.25 16:34:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.47 255.255.0.0. 2018.06.25 16:34:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.47. 2018.06.25 16:34:22 - OpenVPN > /sbin/route add -net 71.19.252.31 192.168.1.254 255.255.255.255. 2018.06.25 16:34:22 - OpenVPN > add net 71.19.252.31: gateway 192.168.1.254. 2018.06.25 16:34:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2018.06.25 16:34:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2018.06.25 16:34:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2018.06.25 16:34:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2018.06.25 16:34:22 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1). 2018.06.25 16:34:22 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1). 2018.06.25 16:34:23 - Routes, added a new route, 71.19.252.32 for gateway 10.4.0.1. 2018.06.25 16:34:23 - Flushing DNS. 2018.06.25 16:34:23 - macOS - PF rules updated, reloadingI 2018.06.25 16:34:23 - Checking route IPv4I 2018.06.25 16:34:24 - Checking DNS! 2018.06.25 16:34:25 - Connected.. 2018.06.25 16:34:25 - OpenVPN > Initialization Sequence Completed. 2018.06.25 16:38:03 - Updating systems & servers data .... 2018.06.25 16:38:05 - Systems & servers data update completed Get used to it, this seems to be a "feature" of MacOS in general. Over here on 10.13.5, mine keeps dropping the IPv6 address altogether WHILE Im connected to one of the new IPv6 servers. I thought it had just started, because I never had any problems with them before this, but Ive found many people complaining about it searching for it on Google. Ill be right in the middle of doing something and it will just drop the address, which makes the server stop responding, and the only way to get it to reconnect is to either pick an IPv4 only server (sometimes that doesnt work) or to turn off the Airport card and turn it back on and reconnect. If I just try to reconnect to one of the "gen 2" servers, it just resets, tries to connect, restarts, and loops over and over. In the last 4-5 hours today alone its done it about 4 times already. Usually its a once, maybe twice a day thing. I thought maybe it was the new version of Eddie, but it does it in Tunnelblick too, so its the Mac for sure, and it all started around the time I updated to 10.13.5. It just hates having an IPv6 address, even though my router (and my ISP even) gladly hands them out and does in fact use them. Its starting to get really annoying and I can't find a way to fix it.Thanks for the reply and the info. Will stick to IPv4 for now, until someone figures out how to resolve this. Quote Share this post Link to post
indon 1 Posted ... Hi! I'm looking into trying IPv6 on AirVPN, but I'm concerned regarding the following option in generated client config: push-peer-info While I do understand that it is required for passing environment variable with IPv6 enable flag, I'm worried regarding what OpenVPN documentation says about it: When --push-peer-info is enabled the additional information consists of the following data:IV_HWADDR=<mac address> -- the MAC address of clients default gatewayIV_SSL=<version string> -- the ssl version used by the client, e.g. "OpenSSL 1.0.2f 28 Jan 2016".IV_PLAT_VER=x.y - the version of the operating system, e.g. 6.1 for Windows 7. UV_<name>=<value> -- client environment variables whose names start with "UV_" Reading source code reveals, that it actually sends MAC address of current default route, but both documentation and source code are a little bit unclear at best on when it is being called and what type of MAC address is being sent. I'm pretty sure it has something to do with TAP interface only which is not used in AirVPN and this option does not affect privacy in any way, but still, it would be nice to get professional explanation. Thanks in advance! 1 go558a83nk reacted to this Quote Share this post Link to post
Monotremata 22 Posted ... Thanks for the reply and the info. Will stick to IPv4 for now, until someone figures out how to resolve this. I mean it does work, its just annoying when you leave and come home and find out its been disconnected and stuck in a restarting loop for a couple hours, especially when you're trying to do things like folding@home 24/7 haha. I came home from work last night around 10pm and it had disconnected some time after I left at 8. I had the IP Protocol set to IPv6,IPv4 in hopes that it would force more consistent results with the test websites, but I switched it back to IPv4, IPv6 now and its been up since about 10:25 last night, hasn't dropped yet, but then again sometimes it will actually stay up for a day or two before it drops it. Didn't have this trouble when I still had a Mint partition on my Mac about a month ago hah. When Castor first went IPv6 I used to use that all the time and the IPv6 was still kinda eh. Even though my Airport was set to automatic, it didn't always grab one, but it always seemed to stick after it did back then. I have not tried this at all with an actual ethernet connection though because the router is out in the kitchen nowadays and this thing is in my bedroom in the back. For all I know that may solve all my problems. Quote Share this post Link to post
Staff 9972 Posted ... Reading source code reveals, that it actually sends MAC address of current default route, but both documentation and source code are a little bit unclear at best on when it is being called and what type of MAC address is being sent. I'm pretty sure it has something to do with TAP interface only which is not used in AirVPN and this option does not affect privacy in any way, but still, it would be nice to get professional explanation. Thanks in advance! Hello! It involves MAC address of the tun interface too, not only TAP. We don't see it as a privacy hazard and we think that you don't even need to spoof it, it's just a MAC of a virtual interface which is lost when packets get out of our servers. Our servers already know your IPv6 address during the connection, which is a much more sensitive information. And we really need push-peer-info to discern whether a VPN server should push IPv6 routes and gateway or not when a user connects with an arbitrary software different than the AirVPN specific software. It is essential for us because, as you know, it's paramount for us that any user has the freedom to connect with any OpenVPN based software. Kind regards 1 LeonPcourn reacted to this Quote Share this post Link to post
strykenKN 0 Posted ... You support IPV6?OK. Since today nothing works, what IPV6 is concerned! Only connection problems, nothing works! Quote Share this post Link to post
Staff 9972 Posted ... You support IPV6? Exactly, since 31 Jan 2018. OK. Since today nothing works, what IPV6 is concerned! Only connection problems, nothing works! Everything works just fine according to our customers reports, see by yourself. Problems which arose during the experimental phase have been resolved.. Feel free to open a ticket to get support and detect the problem. Kind regards 1 LeonPcourn reacted to this Quote Share this post Link to post
8nDTiLB 1 Posted ... Have there been anymore server updates to this since the update from June 21st? Quote Share this post Link to post
Staff 9972 Posted ... Hello! List of Gen2 servers as of 14-July-18. Total: 87 servers.WRONG LIST - DELETED Kind regards Quote Share this post Link to post
Monotremata 22 Posted ... Awesome news, now that Alkes is Gen 2 all my Los Angeles servers are! Question though... In Eddie, in the server list, Alkes says (NA: No IPv6 exit available), same with Pegasus I keep around for a backup connection.. Neither one ever gets a latency value either. Quote Share this post Link to post
JibberJabber 0 Posted ... Hi, I see some countries now have 100% Gen 2 servers however the Choose servers by country option is still unavailable in the Config Generator. (e.g. Belgium and Germany). When are these likely to be available for IPv6 and tls-crypt usage please? Quote Share this post Link to post
DarkWrath 1 Posted ... As of this morning, I don't see Alkes migrated to Gen 2 yet on the status page. Did that somehow get skipped over? Quote Share this post Link to post
Staff 9972 Posted ... As of this morning, I don't see Alkes migrated to Gen 2 yet on the status page. Did that somehow get skipped over? Hello! You're right, Alkes is still Gen 1. It was wrongly included in a wrong Gen 2 list in this thread. Kind regards Quote Share this post Link to post
Staff 9972 Posted ... List of Generation 2 servers as of 28th of July, 2018. Total servers: 133 AcamarAchernarAchirdAdharaAinAlamakAlathfarAlchibaAlcyoneAlderaminAlgiebaAlhenaAlkaidAlkurhahAlmachAlpheccaAlshatAludraAlwaidAlzirrAngetenarAquilaAraArkabAsterionAsteropeAtriaAurigaBaitenBetelgeuseBootesCaelumCamelopardalisCapricornusCarinaeCastorCebalraiCentaurusCepheiCervantesChalawanChamaeleonCharaChowCircinusColumbaCopernicusCorvusCursaCynosuraDabihDelphinusDiademaDiphdaEdasichEnifEquuleusEridanusErraiFafnirFornaxGacruxGianfarGienahGomeisaGrumiumHamalHatysaHelvetiosHerculesHezeHorologiumHydraHydrusIndusIntercrusJabbahKajamKitelKocabLepusLibraLupusMarkabMebsutaMekbudaMenkabMeropeMesarthimMetallahMinkarMirachMonocerosMuscaMusicaNaosNashNashiraNunkiOgmaOrionPerseiPhactPhoenixPictorPleionePolluxPorrimaPyxisRanaRegulusRotanevSabikSadalbariSalmSculptorSerpensSharatanSheliakSitulaSkatSpicaSubraTaurusTriangulumTucanaTuraisUrsaVeritateVirgoVolansZaniahZuben Kind regards Quote Share this post Link to post
H8SOCIETY 7 Posted ... I cant get ipv6 connection..... ipv6 activated in router - yesipv6 activated in ethernet connections - yes (ipconfig /all showing ipv6 adress too)eddie setting ipv6 inside tunnel & ipv6,ipv4eddie log saying: ."DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d2XXXXXXX) But ipleak.net only showing ipv4 and ipv6-test.com only 4/10. DNS6 + IP4 Reachable is the only thing i get passed. Whats wrong? Quote Share this post Link to post
Valerian 20 Posted ... It seems that for micro-routing to work (for example latimes.com, nydailynews.com), IPv6 has to be disabled in Eddie, otherwise you get a "can't find this site" message. Is this to be expected? Quote Share this post Link to post
Staff 9972 Posted ... It seems that for micro-routing to work (for example latimes.com, nydailynews.com), IPv6 has to be disabled in Eddie, otherwise you get a "can't find this site" message. Is this to be expected? Hello!We can't reproduce this issue (tested on a few random Gen 2 servers), can you please specify the servers you experience this problem on? Kind regards Quote Share this post Link to post
Valerian 20 Posted ... Hello!We can't reproduce this issue (tested on a few random Gen 2 servers), can you please specify the servers you experience this problem on? Kind regards Hello Three servers it happens to me with are Betelgeuse, Minkar and Musica. Thanks Quote Share this post Link to post
Staff 9972 Posted ... Hello!We can't reproduce this issue (tested on a few random Gen 2 servers), can you please specify the servers you experience this problem on? Kind regards Hello Three servers it happens to me with are Betelgeuse, Minkar and Musica. Thanks Hello! We do not reproduce the issue on any of the mentioned servers. Kind regards Quote Share this post Link to post
Valerian 20 Posted ... We do not reproduce the issue on any of the mentioned servers. Kind regards Thanks for looking into this. I appreciate it's not possible for you to do anything about it if you can't replicate the problem. However, it is still happening for me, and it's also happening with www.svt.se as detailed in another person's post here, so there must be something going on. But as it's easy to work round it by disabling IPv6, I'm not really too concerned about it at the moment. Quote Share this post Link to post
Staff 9972 Posted ... Thanks for looking into this. I appreciate it's not possible for you to do anything about it if you can't replicate the problem. However, it is still happening for me, and it's also happening with www.svt.se as detailed in another person's post here, so there must be something going on. But as it's easy to work round it by disabling IPv6, I'm not really too concerned about it at the moment. Hello! We kindly ask you to avoid to bring on and on a specific problem that's not reproducible on this thread (or any other "News" forum thread) and open a ticket at your convenience and/or a thread in "Troubleshooting & Problems" forum instead. Kind regards Quote Share this post Link to post
8nDTiLB 1 Posted ... any chance of another monthly update to the progression of this? Quote Share this post Link to post
Staff 9972 Posted ... any chance of another monthly update to the progression of this? Hello! Updated 29-Aug-18, total servers 145: AcamarAchernarAchirdAdharaAgenaAinAlamakAlathfarAlchibaAlcyoneAlderaminAlgiebaAlhenaAlkaidAlkurhahAlmachAlpheccaAlshainAlshatAludraAlwaidAlzirrAngetenarAntaresAquilaAraArkabAsterionAsteropeAtriaAurigaAviorBaitenBetelgeuseBootesCaelumCamelopardalisCapricornusCarinaeCastorCebalraiCentaurusCepheiCepheusCervantesChalawanCharaChowCircinusColumbaCopernicusCorvusCraterCursaCynosuraDabihDelphinusDhenebDiademaDiphdaEdasichEnifEridanusErraiFafnirFornaxGacruxGianfarGienahGomeisaGorgoneaGrumiumHadarHamalHatysaHerculesHezeHorologiumHydraHydrusIndusIntercrusIskandarJabbahKajamKitelKocabKrazLibraLupusMarkabMatarMebsutaMekbudaMenkabMeropeMesarthimMetallahMinkarMirachMonocerosMuscaMuscidaMusicaNaosNashNashiraNunkiOgmaOrionPerseiPhactPhaetPhoenixPictorPleionePolluxPorrimaPyxisRanaRegulusRotanevSabikSadalbariSalmScheatSculptorSerpensSharatanSheliakSitulaSkatSpicaSubraTaurusTriangulumTucanaTuraisUrsaVeritateVirgoZaniahZibalZuben Kind regards 1 eyes878 reacted to this Quote Share this post Link to post
Staff 9972 Posted ... Hello! List of generation 2 servers, updated Sep 13 2018 (total Generation 2 servers: 201) AcamarAchernarAchirdAdharaAgenaAinAlamakAlathfarAlbaliAlchibaAlcorAlcyoneAlderaminAlgiebaAlgorabAlhenaAlkaidAlkesAlkurhahAlmachAlnilamAlphardAlpheccaAlphirkAlraiAlramiAlshainAlshatAltarfAlterfAludraAlulaAlwaidAlyaAlzirrAnchaAndromedaAngetenarAnserAntaresAquilaArcturusArkabAsellusAsterionAsteropeAtikAtriaAurigaAviorAzmidiskeBaitenBenetnaschBetelgeuseBootesCaelumCamelopardalisCanesCanisCaphCapricornusCarinaeCastorCebalraiCelaenoCentaurusCepheiCepheusCervantesChalawanCharaChortChowCircinusColumbaCopernicusCraterCursaCygnusCynosuraDabihDelphinusDenebolaDhenebDiademaDiphdaEdasichElnathEnifEridanusErraiFafnirFomalhautFornaxGacruxGarnetGeminiGianfarGienahGomeisaGorgoneaGrumiumHadarHamalHassalehHatysaHerculesHezeHorologiumHyadumHydraHydrusIndusIntercrusIskandarJabbahKajamKitelKocabKrazLesathLibraLupusMaasymMarkabMatarMebsutaMekbudaMenkabMergaMeropeMesarthimMetallahMinkarMintakaMirachMiramMuphridMuscaMuscidaMusicaNaosNashNashiraNormaNunkiOgmaOphiuchusOrionPavonisPerseiPhactPhaetPhecdaPhoenixPictorPleionePolluxPorrimaPyxisRanaRegulusReticulumRotanevRukbatSabikSadalbariSaiphSalmSargasScheatSculptorSerpensSharatanSheliakSirrahSitulaSkatSpicaSualocinSubraTalithaTarazedTaurusTegmenTejatTriangulumTucanaTuraisTylUkdahUrsaVeritateVirginisVirgoYedYildunZaniahZibalZuben Kind regards Quote Share this post Link to post