Jump to content
Not connected, Your IP: 3.236.214.224
Staff

IPv6 support and new smart features

Recommended Posts

Is there any way to create a config that will connect a router to an upgraded server in a certain country based on best speed/latency, or will that only be possible when all of the servers in said country are updated to the new "smart" standard?

 

Thanks for all the info provided in the thread so far.

Share this post


Link to post

First time trying to connect to a IPv6 server (Rana). Tried connecting once, failed and then connected to a IPv4 server. On a Mac 10.11.6 running Eddie 2.15.2. Tried a second time and noticed one unusual thing happening. Under system preferences/network/advanced/TCP/IP - configure IPv6 was set to automatically prior to trying to connect. After failing to connect, it defaulted back to "off". Any ideas? Log is attached:

. 2018.06.25 16:24:51 - macOS - PF rules updated, reloading

! 2018.06.25 16:24:52 - Disconnecting

. 2018.06.25 16:24:52 - Routes, removed a route previously added, 71.19.252.32 for gateway 10.4.0.1

. 2018.06.25 16:24:52 - Sending management termination signal

. 2018.06.25 16:24:52 - Management - Send 'signal SIGTERM'

. 2018.06.25 16:24:52 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.06.25 16:24:52 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.06.25 16:24:58 - OpenVPN > /sbin/route delete -net 71.19.252.31 192.168.1.254 255.255.255.255

. 2018.06.25 16:24:58 - OpenVPN > delete net 71.19.252.31: gateway 192.168.1.254

. 2018.06.25 16:24:58 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.06.25 16:24:58 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.06.25 16:24:58 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.06.25 16:24:58 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.06.25 16:24:58 - OpenVPN > Closing TUN/TAP interface

. 2018.06.25 16:24:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.06.25 16:24:58 - Connection terminated.

. 2018.06.25 16:24:58 - IPv6 restored on network adapter (SAMSUNG Modem)

. 2018.06.25 16:24:58 - IPv6 restored on network adapter (Ethernet)

. 2018.06.25 16:24:58 - IPv6 restored on network adapter (FireWire)

. 2018.06.25 16:24:58 - IPv6 restored on network adapter (Wi-Fi)

. 2018.06.25 16:24:58 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)

. 2018.06.25 16:24:58 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

I 2018.06.25 16:24:58 - Checking authorization ...

! 2018.06.25 16:24:59 - Connecting to Rana (Canada, Toronto, Ontario)

. 2018.06.25 16:24:59 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018

. 2018.06.25 16:24:59 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10

. 2018.06.25 16:24:59 - Connection to OpenVPN Management Interface

. 2018.06.25 16:24:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101

. 2018.06.25 16:24:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.06.25 16:24:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.06.25 16:24:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443

. 2018.06.25 16:24:59 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.06.25 16:24:59 - OpenVPN > UDPv6 link local: (not bound)

. 2018.06.25 16:24:59 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443

. 2018.06.25 16:24:59 - OpenVPN > write UDPv6: No route to host (code=65)

. 2018.06.25 16:24:59 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101

. 2018.06.25 16:25:01 - OpenVPN > write UDPv6: No route to host (code=65)

. 2018.06.25 16:25:31 - Above log line repeated 3 times more

. 2018.06.25 16:25:31 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting

. 2018.06.25 16:25:31 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.06.25 16:25:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

! 2018.06.25 16:25:36 - Disconnecting

. 2018.06.25 16:25:36 - Connection terminated.

I 2018.06.25 16:25:40 - Checking authorization ...

. 2018.06.25 16:25:41 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.06.25 16:25:41 - IPv6 disabled on network adapter (Ethernet)

. 2018.06.25 16:25:41 - IPv6 disabled on network adapter (FireWire)

. 2018.06.25 16:25:41 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.06.25 16:25:41 - Connecting to Kleeia (Canada, Vancouver)

. 2018.06.25 16:25:41 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018

. 2018.06.25 16:25:41 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10

. 2018.06.25 16:25:41 - Connection to OpenVPN Management Interface

. 2018.06.25 16:25:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101

. 2018.06.25 16:25:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.06.25 16:25:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.06.25 16:25:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.31:443

. 2018.06.25 16:25:41 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.06.25 16:25:41 - OpenVPN > UDP link local: (not bound)

. 2018.06.25 16:25:41 - OpenVPN > UDP link remote: [AF_INET]71.19.252.31:443

. 2018.06.25 16:25:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101

. 2018.06.25 16:25:41 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.31:443, sid=df676e5d ad3da923

. 2018.06.25 16:25:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.06.25 16:25:41 - OpenVPN > VERIFY KU OK

. 2018.06.25 16:25:41 - OpenVPN > Validating certificate extended key usage

. 2018.06.25 16:25:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.06.25 16:25:41 - OpenVPN > VERIFY EKU OK

. 2018.06.25 16:25:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org

. 2018.06.25 16:25:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.06.25 16:25:42 - OpenVPN > [Kleeia] Peer Connection Initiated with [AF_INET]71.19.252.31:443

. 2018.06.25 16:25:43 - OpenVPN > SENT CONTROL [Kleeia]: 'PUSH_REQUEST' (status=1)

. 2018.06.25 16:25:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.47 255.255.0.0,peer-id 78,cipher AES-256-GCM'

. 2018.06.25 16:25:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.06.25 16:25:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.06.25 16:25:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.06.25 16:25:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.06.25 16:25:43 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.06.25 16:25:43 - OpenVPN > Opened utun device utun0

. 2018.06.25 16:25:43 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.06.25 16:25:43 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.06.25 16:25:43 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.06.25 16:25:43 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.06.25 16:25:43 - OpenVPN > /sbin/ifconfig utun0 10.4.1.47 10.4.1.47 netmask 255.255.0.0 mtu 1500 up

. 2018.06.25 16:25:43 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.47 255.255.0.0

. 2018.06.25 16:25:43 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.47

. 2018.06.25 16:25:43 - OpenVPN > /sbin/route add -net 71.19.252.31 192.168.1.254 255.255.255.255

. 2018.06.25 16:25:43 - OpenVPN > add net 71.19.252.31: gateway 192.168.1.254

. 2018.06.25 16:25:43 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.06.25 16:25:43 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.06.25 16:25:43 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.06.25 16:25:43 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.06.25 16:25:43 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.06.25 16:25:44 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.06.25 16:25:44 - Routes, added a new route, 71.19.252.32 for gateway 10.4.0.1

. 2018.06.25 16:25:44 - Flushing DNS

. 2018.06.25 16:25:44 - macOS - PF rules updated, reloading

I 2018.06.25 16:25:45 - Checking route IPv4

I 2018.06.25 16:25:45 - Checking DNS

! 2018.06.25 16:25:46 - Connected.

. 2018.06.25 16:25:46 - OpenVPN > Initialization Sequence Completed

. 2018.06.25 16:27:55 - Updating systems & servers data ...

. 2018.06.25 16:27:57 - Systems & servers data update completed

. 2018.06.25 16:33:32 - macOS - PF rules updated, reloading

! 2018.06.25 16:33:33 - Disconnecting

. 2018.06.25 16:33:33 - Routes, removed a route previously added, 71.19.252.32 for gateway 10.4.0.1

. 2018.06.25 16:33:33 - Sending management termination signal

. 2018.06.25 16:33:33 - Management - Send 'signal SIGTERM'

. 2018.06.25 16:33:33 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.06.25 16:33:33 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.06.25 16:33:38 - OpenVPN > /sbin/route delete -net 71.19.252.31 192.168.1.254 255.255.255.255

. 2018.06.25 16:33:38 - OpenVPN > delete net 71.19.252.31: gateway 192.168.1.254

. 2018.06.25 16:33:38 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.06.25 16:33:38 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.06.25 16:33:38 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.06.25 16:33:38 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.06.25 16:33:38 - OpenVPN > Closing TUN/TAP interface

. 2018.06.25 16:33:38 - Connection terminated.

. 2018.06.25 16:33:38 - IPv6 restored on network adapter (SAMSUNG Modem)

. 2018.06.25 16:33:38 - IPv6 restored on network adapter (Ethernet)

. 2018.06.25 16:33:38 - IPv6 restored on network adapter (FireWire)

. 2018.06.25 16:33:38 - IPv6 restored on network adapter (Wi-Fi)

. 2018.06.25 16:33:38 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)

. 2018.06.25 16:33:38 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.06.25 16:33:38 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

I 2018.06.25 16:33:38 - Checking authorization ...

! 2018.06.25 16:33:39 - Connecting to Rana (Canada, Toronto, Ontario)

. 2018.06.25 16:33:40 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018

. 2018.06.25 16:33:40 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10

. 2018.06.25 16:33:40 - Connection to OpenVPN Management Interface

. 2018.06.25 16:33:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101

. 2018.06.25 16:33:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.06.25 16:33:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.06.25 16:33:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443

. 2018.06.25 16:33:40 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.06.25 16:33:40 - OpenVPN > UDPv6 link local: (not bound)

. 2018.06.25 16:33:40 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443

. 2018.06.25 16:33:40 - OpenVPN > write UDPv6: No route to host (code=65)

. 2018.06.25 16:33:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101

. 2018.06.25 16:33:41 - OpenVPN > write UDPv6: No route to host (code=65)

. 2018.06.25 16:34:11 - Above log line repeated 3 times more

. 2018.06.25 16:34:11 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting

. 2018.06.25 16:34:11 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.06.25 16:34:16 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

! 2018.06.25 16:34:16 - Disconnecting

. 2018.06.25 16:34:16 - Connection terminated.

I 2018.06.25 16:34:19 - Checking authorization ...

. 2018.06.25 16:34:20 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.06.25 16:34:20 - IPv6 disabled on network adapter (Ethernet)

. 2018.06.25 16:34:20 - IPv6 disabled on network adapter (FireWire)

. 2018.06.25 16:34:20 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.06.25 16:34:20 - Connecting to Kleeia (Canada, Vancouver)

. 2018.06.25 16:34:21 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018

. 2018.06.25 16:34:21 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10

. 2018.06.25 16:34:21 - Connection to OpenVPN Management Interface

. 2018.06.25 16:34:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101

. 2018.06.25 16:34:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.06.25 16:34:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.06.25 16:34:21 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.31:443

. 2018.06.25 16:34:21 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.06.25 16:34:21 - OpenVPN > UDP link local: (not bound)

. 2018.06.25 16:34:21 - OpenVPN > UDP link remote: [AF_INET]71.19.252.31:443

. 2018.06.25 16:34:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101

. 2018.06.25 16:34:21 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.31:443, sid=7e320946 71933355

. 2018.06.25 16:34:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.06.25 16:34:21 - OpenVPN > VERIFY KU OK

. 2018.06.25 16:34:21 - OpenVPN > Validating certificate extended key usage

. 2018.06.25 16:34:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.06.25 16:34:21 - OpenVPN > VERIFY EKU OK

. 2018.06.25 16:34:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org

. 2018.06.25 16:34:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.06.25 16:34:21 - OpenVPN > [Kleeia] Peer Connection Initiated with [AF_INET]71.19.252.31:443

. 2018.06.25 16:34:22 - OpenVPN > SENT CONTROL [Kleeia]: 'PUSH_REQUEST' (status=1)

. 2018.06.25 16:34:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.47 255.255.0.0,peer-id 53,cipher AES-256-GCM'

. 2018.06.25 16:34:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.06.25 16:34:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.06.25 16:34:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.06.25 16:34:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.06.25 16:34:22 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.06.25 16:34:22 - OpenVPN > Opened utun device utun0

. 2018.06.25 16:34:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.06.25 16:34:22 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.06.25 16:34:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.06.25 16:34:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.06.25 16:34:22 - OpenVPN > /sbin/ifconfig utun0 10.4.1.47 10.4.1.47 netmask 255.255.0.0 mtu 1500 up

. 2018.06.25 16:34:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.47 255.255.0.0

. 2018.06.25 16:34:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.47

. 2018.06.25 16:34:22 - OpenVPN > /sbin/route add -net 71.19.252.31 192.168.1.254 255.255.255.255

. 2018.06.25 16:34:22 - OpenVPN > add net 71.19.252.31: gateway 192.168.1.254

. 2018.06.25 16:34:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.06.25 16:34:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.06.25 16:34:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.06.25 16:34:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.06.25 16:34:22 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.06.25 16:34:22 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.06.25 16:34:23 - Routes, added a new route, 71.19.252.32 for gateway 10.4.0.1

. 2018.06.25 16:34:23 - Flushing DNS

. 2018.06.25 16:34:23 - macOS - PF rules updated, reloading

I 2018.06.25 16:34:23 - Checking route IPv4

I 2018.06.25 16:34:24 - Checking DNS

! 2018.06.25 16:34:25 - Connected.

. 2018.06.25 16:34:25 - OpenVPN > Initialization Sequence Completed

. 2018.06.25 16:38:03 - Updating systems & servers data ...

. 2018.06.25 16:38:05 - Systems & servers data update completed

 

 Get used to it, this seems to be a "feature" of MacOS in general. Over here on 10.13.5, mine keeps dropping the IPv6 address altogether WHILE Im connected to one of the new IPv6 servers. I thought it had just started, because I never had any problems with them before this, but Ive found many people complaining about it searching for it on Google. Ill be right in the middle of doing something and it will just drop the address, which makes the server stop responding, and the only way to get it to reconnect is to either pick an IPv4 only server (sometimes that doesnt work) or to turn off the Airport card and turn it back on and reconnect. If I just try to reconnect to one of the "gen 2" servers, it just resets, tries to connect, restarts, and loops over and over. In the last 4-5 hours today alone its done it about 4 times already. Usually its a once, maybe twice a day thing. I thought maybe it was the new version of Eddie, but it does it in Tunnelblick too, so its the Mac for sure, and it all started around the time I updated to 10.13.5. It just hates having an IPv6 address, even though my router (and my ISP even) gladly hands them out and does in fact use them. Its starting to get really annoying and I can't find a way to fix it.

Share this post


Link to post

 

First time trying to connect to a IPv6 server (Rana). Tried connecting once, failed and then connected to a IPv4 server. On a Mac 10.11.6 running Eddie 2.15.2. Tried a second time and noticed one unusual thing happening. Under system preferences/network/advanced/TCP/IP - configure IPv6 was set to automatically prior to trying to connect. After failing to connect, it defaulted back to "off". Any ideas? Log is attached:

. 2018.06.25 16:24:51 - macOS - PF rules updated, reloading

! 2018.06.25 16:24:52 - Disconnecting

. 2018.06.25 16:24:52 - Routes, removed a route previously added, 71.19.252.32 for gateway 10.4.0.1

. 2018.06.25 16:24:52 - Sending management termination signal

. 2018.06.25 16:24:52 - Management - Send 'signal SIGTERM'

. 2018.06.25 16:24:52 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.06.25 16:24:52 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.06.25 16:24:58 - OpenVPN > /sbin/route delete -net 71.19.252.31 192.168.1.254 255.255.255.255

. 2018.06.25 16:24:58 - OpenVPN > delete net 71.19.252.31: gateway 192.168.1.254

. 2018.06.25 16:24:58 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.06.25 16:24:58 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.06.25 16:24:58 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.06.25 16:24:58 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.06.25 16:24:58 - OpenVPN > Closing TUN/TAP interface

. 2018.06.25 16:24:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2018.06.25 16:24:58 - Connection terminated.

. 2018.06.25 16:24:58 - IPv6 restored on network adapter (SAMSUNG Modem)

. 2018.06.25 16:24:58 - IPv6 restored on network adapter (Ethernet)

. 2018.06.25 16:24:58 - IPv6 restored on network adapter (FireWire)

. 2018.06.25 16:24:58 - IPv6 restored on network adapter (Wi-Fi)

. 2018.06.25 16:24:58 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)

. 2018.06.25 16:24:58 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

I 2018.06.25 16:24:58 - Checking authorization ...

! 2018.06.25 16:24:59 - Connecting to Rana (Canada, Toronto, Ontario)

. 2018.06.25 16:24:59 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018

. 2018.06.25 16:24:59 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10

. 2018.06.25 16:24:59 - Connection to OpenVPN Management Interface

. 2018.06.25 16:24:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101

. 2018.06.25 16:24:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.06.25 16:24:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.06.25 16:24:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443

. 2018.06.25 16:24:59 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.06.25 16:24:59 - OpenVPN > UDPv6 link local: (not bound)

. 2018.06.25 16:24:59 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443

. 2018.06.25 16:24:59 - OpenVPN > write UDPv6: No route to host (code=65)

. 2018.06.25 16:24:59 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101

. 2018.06.25 16:25:01 - OpenVPN > write UDPv6: No route to host (code=65)

. 2018.06.25 16:25:31 - Above log line repeated 3 times more

. 2018.06.25 16:25:31 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting

. 2018.06.25 16:25:31 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.06.25 16:25:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

! 2018.06.25 16:25:36 - Disconnecting

. 2018.06.25 16:25:36 - Connection terminated.

I 2018.06.25 16:25:40 - Checking authorization ...

. 2018.06.25 16:25:41 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.06.25 16:25:41 - IPv6 disabled on network adapter (Ethernet)

. 2018.06.25 16:25:41 - IPv6 disabled on network adapter (FireWire)

. 2018.06.25 16:25:41 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.06.25 16:25:41 - Connecting to Kleeia (Canada, Vancouver)

. 2018.06.25 16:25:41 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018

. 2018.06.25 16:25:41 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10

. 2018.06.25 16:25:41 - Connection to OpenVPN Management Interface

. 2018.06.25 16:25:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101

. 2018.06.25 16:25:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.06.25 16:25:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.06.25 16:25:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.31:443

. 2018.06.25 16:25:41 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.06.25 16:25:41 - OpenVPN > UDP link local: (not bound)

. 2018.06.25 16:25:41 - OpenVPN > UDP link remote: [AF_INET]71.19.252.31:443

. 2018.06.25 16:25:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101

. 2018.06.25 16:25:41 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.31:443, sid=df676e5d ad3da923

. 2018.06.25 16:25:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.06.25 16:25:41 - OpenVPN > VERIFY KU OK

. 2018.06.25 16:25:41 - OpenVPN > Validating certificate extended key usage

. 2018.06.25 16:25:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.06.25 16:25:41 - OpenVPN > VERIFY EKU OK

. 2018.06.25 16:25:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org

. 2018.06.25 16:25:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.06.25 16:25:42 - OpenVPN > [Kleeia] Peer Connection Initiated with [AF_INET]71.19.252.31:443

. 2018.06.25 16:25:43 - OpenVPN > SENT CONTROL [Kleeia]: 'PUSH_REQUEST' (status=1)

. 2018.06.25 16:25:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.47 255.255.0.0,peer-id 78,cipher AES-256-GCM'

. 2018.06.25 16:25:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.06.25 16:25:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.06.25 16:25:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.06.25 16:25:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.06.25 16:25:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.06.25 16:25:43 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.06.25 16:25:43 - OpenVPN > Opened utun device utun0

. 2018.06.25 16:25:43 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.06.25 16:25:43 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.06.25 16:25:43 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.06.25 16:25:43 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.06.25 16:25:43 - OpenVPN > /sbin/ifconfig utun0 10.4.1.47 10.4.1.47 netmask 255.255.0.0 mtu 1500 up

. 2018.06.25 16:25:43 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.47 255.255.0.0

. 2018.06.25 16:25:43 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.47

. 2018.06.25 16:25:43 - OpenVPN > /sbin/route add -net 71.19.252.31 192.168.1.254 255.255.255.255

. 2018.06.25 16:25:43 - OpenVPN > add net 71.19.252.31: gateway 192.168.1.254

. 2018.06.25 16:25:43 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.06.25 16:25:43 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.06.25 16:25:43 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.06.25 16:25:43 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.06.25 16:25:43 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.06.25 16:25:44 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.06.25 16:25:44 - Routes, added a new route, 71.19.252.32 for gateway 10.4.0.1

. 2018.06.25 16:25:44 - Flushing DNS

. 2018.06.25 16:25:44 - macOS - PF rules updated, reloading

I 2018.06.25 16:25:45 - Checking route IPv4

I 2018.06.25 16:25:45 - Checking DNS

! 2018.06.25 16:25:46 - Connected.

. 2018.06.25 16:25:46 - OpenVPN > Initialization Sequence Completed

. 2018.06.25 16:27:55 - Updating systems & servers data ...

. 2018.06.25 16:27:57 - Systems & servers data update completed

. 2018.06.25 16:33:32 - macOS - PF rules updated, reloading

! 2018.06.25 16:33:33 - Disconnecting

. 2018.06.25 16:33:33 - Routes, removed a route previously added, 71.19.252.32 for gateway 10.4.0.1

. 2018.06.25 16:33:33 - Sending management termination signal

. 2018.06.25 16:33:33 - Management - Send 'signal SIGTERM'

. 2018.06.25 16:33:33 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.06.25 16:33:33 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.06.25 16:33:38 - OpenVPN > /sbin/route delete -net 71.19.252.31 192.168.1.254 255.255.255.255

. 2018.06.25 16:33:38 - OpenVPN > delete net 71.19.252.31: gateway 192.168.1.254

. 2018.06.25 16:33:38 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.06.25 16:33:38 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.06.25 16:33:38 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.06.25 16:33:38 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.06.25 16:33:38 - OpenVPN > Closing TUN/TAP interface

. 2018.06.25 16:33:38 - Connection terminated.

. 2018.06.25 16:33:38 - IPv6 restored on network adapter (SAMSUNG Modem)

. 2018.06.25 16:33:38 - IPv6 restored on network adapter (Ethernet)

. 2018.06.25 16:33:38 - IPv6 restored on network adapter (FireWire)

. 2018.06.25 16:33:38 - IPv6 restored on network adapter (Wi-Fi)

. 2018.06.25 16:33:38 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)

. 2018.06.25 16:33:38 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

. 2018.06.25 16:33:38 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

I 2018.06.25 16:33:38 - Checking authorization ...

! 2018.06.25 16:33:39 - Connecting to Rana (Canada, Toronto, Ontario)

. 2018.06.25 16:33:40 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018

. 2018.06.25 16:33:40 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10

. 2018.06.25 16:33:40 - Connection to OpenVPN Management Interface

. 2018.06.25 16:33:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101

. 2018.06.25 16:33:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.06.25 16:33:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.06.25 16:33:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443

. 2018.06.25 16:33:40 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.06.25 16:33:40 - OpenVPN > UDPv6 link local: (not bound)

. 2018.06.25 16:33:40 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443

. 2018.06.25 16:33:40 - OpenVPN > write UDPv6: No route to host (code=65)

. 2018.06.25 16:33:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101

. 2018.06.25 16:33:41 - OpenVPN > write UDPv6: No route to host (code=65)

. 2018.06.25 16:34:11 - Above log line repeated 3 times more

. 2018.06.25 16:34:11 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting

. 2018.06.25 16:34:11 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2018.06.25 16:34:16 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

! 2018.06.25 16:34:16 - Disconnecting

. 2018.06.25 16:34:16 - Connection terminated.

I 2018.06.25 16:34:19 - Checking authorization ...

. 2018.06.25 16:34:20 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.06.25 16:34:20 - IPv6 disabled on network adapter (Ethernet)

. 2018.06.25 16:34:20 - IPv6 disabled on network adapter (FireWire)

. 2018.06.25 16:34:20 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.06.25 16:34:20 - Connecting to Kleeia (Canada, Vancouver)

. 2018.06.25 16:34:21 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018

. 2018.06.25 16:34:21 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10

. 2018.06.25 16:34:21 - Connection to OpenVPN Management Interface

. 2018.06.25 16:34:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101

. 2018.06.25 16:34:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.06.25 16:34:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.06.25 16:34:21 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.31:443

. 2018.06.25 16:34:21 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.06.25 16:34:21 - OpenVPN > UDP link local: (not bound)

. 2018.06.25 16:34:21 - OpenVPN > UDP link remote: [AF_INET]71.19.252.31:443

. 2018.06.25 16:34:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101

. 2018.06.25 16:34:21 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.31:443, sid=7e320946 71933355

. 2018.06.25 16:34:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.06.25 16:34:21 - OpenVPN > VERIFY KU OK

. 2018.06.25 16:34:21 - OpenVPN > Validating certificate extended key usage

. 2018.06.25 16:34:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.06.25 16:34:21 - OpenVPN > VERIFY EKU OK

. 2018.06.25 16:34:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org

. 2018.06.25 16:34:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.06.25 16:34:21 - OpenVPN > [Kleeia] Peer Connection Initiated with [AF_INET]71.19.252.31:443

. 2018.06.25 16:34:22 - OpenVPN > SENT CONTROL [Kleeia]: 'PUSH_REQUEST' (status=1)

. 2018.06.25 16:34:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.47 255.255.0.0,peer-id 53,cipher AES-256-GCM'

. 2018.06.25 16:34:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2018.06.25 16:34:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2018.06.25 16:34:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2018.06.25 16:34:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.06.25 16:34:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2018.06.25 16:34:22 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.06.25 16:34:22 - OpenVPN > Opened utun device utun0

. 2018.06.25 16:34:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.06.25 16:34:22 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.06.25 16:34:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.06.25 16:34:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.06.25 16:34:22 - OpenVPN > /sbin/ifconfig utun0 10.4.1.47 10.4.1.47 netmask 255.255.0.0 mtu 1500 up

. 2018.06.25 16:34:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.47 255.255.0.0

. 2018.06.25 16:34:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.47

. 2018.06.25 16:34:22 - OpenVPN > /sbin/route add -net 71.19.252.31 192.168.1.254 255.255.255.255

. 2018.06.25 16:34:22 - OpenVPN > add net 71.19.252.31: gateway 192.168.1.254

. 2018.06.25 16:34:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.06.25 16:34:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.06.25 16:34:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.06.25 16:34:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.06.25 16:34:22 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.06.25 16:34:22 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.06.25 16:34:23 - Routes, added a new route, 71.19.252.32 for gateway 10.4.0.1

. 2018.06.25 16:34:23 - Flushing DNS

. 2018.06.25 16:34:23 - macOS - PF rules updated, reloading

I 2018.06.25 16:34:23 - Checking route IPv4

I 2018.06.25 16:34:24 - Checking DNS

! 2018.06.25 16:34:25 - Connected.

. 2018.06.25 16:34:25 - OpenVPN > Initialization Sequence Completed

. 2018.06.25 16:38:03 - Updating systems & servers data ...

. 2018.06.25 16:38:05 - Systems & servers data update completed

 Get used to it, this seems to be a "feature" of MacOS in general. Over here on 10.13.5, mine keeps dropping the IPv6 address altogether WHILE Im connected to one of the new IPv6 servers. I thought it had just started, because I never had any problems with them before this, but Ive found many people complaining about it searching for it on Google. Ill be right in the middle of doing something and it will just drop the address, which makes the server stop responding, and the only way to get it to reconnect is to either pick an IPv4 only server (sometimes that doesnt work) or to turn off the Airport card and turn it back on and reconnect. If I just try to reconnect to one of the "gen 2" servers, it just resets, tries to connect, restarts, and loops over and over. In the last 4-5 hours today alone its done it about 4 times already. Usually its a once, maybe twice a day thing. I thought maybe it was the new version of Eddie, but it does it in Tunnelblick too, so its the Mac for sure, and it all started around the time I updated to 10.13.5. It just hates having an IPv6 address, even though my router (and my ISP even) gladly hands them out and does in fact use them. Its starting to get really annoying and I can't find a way to fix it.

Thanks for the reply and the info. Will stick to IPv4 for now, until someone figures out how to resolve this.

Share this post


Link to post

Hi! I'm looking into trying IPv6 on AirVPN, but I'm concerned regarding the following option in generated client config:

 

push-peer-info

 

 

While I do understand that it is required for passing environment variable with IPv6 enable flag, I'm worried regarding what OpenVPN documentation says about it:

 

 

 

When --push-peer-info is enabled the additional information consists of the following data:

IV_HWADDR=<mac address> -- the MAC address of clients default gateway

IV_SSL=<version string> -- the ssl version used by the client, e.g. "OpenSSL 1.0.2f 28 Jan 2016".

IV_PLAT_VER=x.y - the version of the operating system, e.g. 6.1 for Windows 7.

 

UV_<name>=<value> -- client environment variables whose names start with "UV_"

 

Reading source code reveals, that it actually sends MAC address of current default route, but both documentation and source code are a little bit unclear at best on when it is being called and what type of MAC address is being sent. I'm pretty sure it has something to do with TAP interface only which is not used in AirVPN and this option does not affect privacy in any way, but still, it would be nice to get professional explanation.

 

Thanks in advance!

Share this post


Link to post

Thanks for the reply and the info. Will stick to IPv4 for now, until someone figures out how to resolve this.

 

 

I mean it does work, its just annoying when you leave and come home and find out its been disconnected and stuck in a restarting loop for a couple hours, especially when you're trying to do things like folding@home 24/7 haha. I came home from work last night around 10pm and it had disconnected some time after I left at 8. I had the IP Protocol set to IPv6,IPv4 in hopes that it would force more consistent results with the test websites, but I switched it back to IPv4, IPv6 now and its been up since about 10:25 last night, hasn't dropped yet, but then again sometimes it will actually stay up for a day or two before it drops it. Didn't have this trouble when I still had a Mint partition on my Mac about a month ago hah. When Castor first went IPv6 I used to use that all the time and the IPv6 was still kinda eh. Even though my Airport was set to automatic, it didn't always grab one, but it always seemed to stick after it did back then. I have not tried this at all with an actual ethernet connection though because the router is out in the kitchen nowadays and this thing is in my bedroom in the back. For all I know that may solve all my problems.

Share this post


Link to post

Reading source code reveals, that it actually sends MAC address of current default route, but both documentation and source code are a little bit unclear at best on when it is being called and what type of MAC address is being sent. I'm pretty sure it has something to do with TAP interface only which is not used in AirVPN and this option does not affect privacy in any way, but still, it would be nice to get professional explanation.

 

Thanks in advance!

 

Hello!

 

It involves MAC address of the tun interface too, not only TAP. We don't see it as a privacy hazard and we think that you don't even need to spoof it, it's just a MAC of a virtual interface which is lost when packets get out of our servers. Our servers already know your IPv6 address during the connection, which is a much more sensitive information.

 

And we really need push-peer-info to discern whether a VPN server should push IPv6 routes and gateway or not when a user connects with an arbitrary software different than the AirVPN specific software. It is essential for us because, as you know, it's paramount for us that any user has the freedom to connect with any OpenVPN based software.

 

Kind regards

Share this post


Link to post

You support IPV6?

OK. Since today nothing works, what IPV6 is concerned! Only connection problems, nothing works!

Share this post


Link to post

You support IPV6?

 

Exactly, since 31 Jan 2018.

 

OK. Since today nothing works, what IPV6 is concerned! Only connection problems, nothing works!

 

Everything works just fine according to our customers reports, see by yourself. Problems which arose during the experimental phase have been resolved.. Feel free to open a ticket to get support and detect the problem.

 

Kind regards

Share this post


Link to post

Awesome news, now that Alkes is Gen 2 all my Los Angeles servers are! Question though... In Eddie, in the server list, Alkes says (NA: No IPv6 exit available), same with Pegasus I keep around for a backup connection.. Neither one ever gets a latency value either.

Share this post


Link to post

Hi,

 

I see some countries now have 100% Gen 2 servers however the Choose servers by country option is still unavailable in the Config Generator. (e.g. Belgium and Germany).

 

When are these likely to be available for IPv6 and tls-crypt usage please?

Share this post


Link to post

As of this morning, I don't see Alkes migrated to Gen 2 yet on the status page. Did that somehow get skipped over?

Share this post


Link to post

As of this morning, I don't see Alkes migrated to Gen 2 yet on the status page. Did that somehow get skipped over?

 

Hello!

 

You're right, Alkes is still Gen 1. It was wrongly included in a wrong Gen 2 list in this thread.

 

Kind regards

Share this post


Link to post

List of Generation 2 servers as of 28th of July, 2018.

 

Total servers: 133

 

Acamar
Achernar
Achird
Adhara
Ain
Alamak
Alathfar
Alchiba
Alcyone
Alderamin
Algieba
Alhena
Alkaid
Alkurhah
Almach
Alphecca
Alshat
Aludra
Alwaid
Alzirr
Angetenar
Aquila
Ara
Arkab
Asterion
Asterope
Atria
Auriga
Baiten
Betelgeuse
Bootes
Caelum
Camelopardalis
Capricornus
Carinae
Castor
Cebalrai
Centaurus
Cephei
Cervantes
Chalawan
Chamaeleon
Chara
Chow
Circinus
Columba
Copernicus
Corvus
Cursa
Cynosura
Dabih
Delphinus
Diadema
Diphda
Edasich
Enif
Equuleus
Eridanus
Errai
Fafnir
Fornax
Gacrux
Gianfar
Gienah
Gomeisa
Grumium
Hamal
Hatysa
Helvetios
Hercules
Heze
Horologium
Hydra
Hydrus
Indus
Intercrus
Jabbah
Kajam
Kitel
Kocab
Lepus
Libra
Lupus
Markab
Mebsuta
Mekbuda
Menkab
Merope
Mesarthim
Metallah
Minkar
Mirach
Monoceros
Musca
Musica
Naos
Nash
Nashira
Nunki
Ogma
Orion
Persei
Phact
Phoenix
Pictor
Pleione
Pollux
Porrima
Pyxis
Rana
Regulus
Rotanev
Sabik
Sadalbari
Salm
Sculptor
Serpens
Sharatan
Sheliak
Situla
Skat
Spica
Subra
Taurus
Triangulum
Tucana
Turais
Ursa
Veritate
Virgo
Volans
Zaniah
Zuben
 

Kind regards

Share this post


Link to post

I cant get ipv6 connection.....

 

ipv6 activated in router - yes

ipv6 activated in ethernet connections - yes (ipconfig /all showing ipv6 adress too)

eddie setting ipv6 inside tunnel & ipv6,ipv4

eddie log saying: ."DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d2XXXXXXX)

 

But ipleak.net only showing ipv4 and ipv6-test.com only 4/10. 

DNS6 + IP4 Reachable

 

is the only thing i get passed.

 

 

Whats wrong?

Share this post


Link to post

It seems that for micro-routing to work (for example latimes.com, nydailynews.com), IPv6 has to be disabled in Eddie, otherwise you get a "can't find this site" message. Is this to be expected?

Share this post


Link to post

It seems that for micro-routing to work (for example latimes.com, nydailynews.com), IPv6 has to be disabled in Eddie, otherwise you get a "can't find this site" message. Is this to be expected?

 

Hello!

We can't reproduce this issue (tested on a few random Gen 2 servers), can you please specify the servers you experience this problem on?

 

Kind regards

Share this post


Link to post

Hello!

We can't reproduce this issue (tested on a few random Gen 2 servers), can you please specify the servers you experience this problem on?

 

Kind regards

 

Hello

 

Three servers it happens to me with are Betelgeuse, Minkar and Musica.

 

Thanks

Share this post


Link to post

 

Hello!

We can't reproduce this issue (tested on a few random Gen 2 servers), can you please specify the servers you experience this problem on?

 

Kind regards

 

Hello

 

Three servers it happens to me with are Betelgeuse, Minkar and Musica.

 

Thanks

 

Hello!

 

We do not reproduce the issue on any of the mentioned servers.

 

Kind regards

Share this post


Link to post

We do not reproduce the issue on any of the mentioned servers.

 

Kind regards

 

Thanks for looking into this. I appreciate it's not possible for you to do anything about it if you can't replicate the problem.

 

However, it is still happening for me, and it's also happening with www.svt.se as detailed in another person's post here, so there must be something going on. But as it's easy to work round it by disabling IPv6, I'm not really too concerned about it at the moment.

Share this post


Link to post

 

 

Thanks for looking into this. I appreciate it's not possible for you to do anything about it if you can't replicate the problem.

 

However, it is still happening for me, and it's also happening with www.svt.se as detailed in another person's post here, so there must be something going on. But as it's easy to work round it by disabling IPv6, I'm not really too concerned about it at the moment.

 

Hello! We kindly ask you to avoid to bring on and on a specific problem that's not reproducible on this thread (or any other "News" forum thread) and open a ticket at your convenience and/or a thread in "Troubleshooting & Problems" forum instead.

 

Kind regards

Share this post


Link to post

any chance of another monthly update to the progression of this?

 

 

Hello!

 

Updated 29-Aug-18, total servers 145:

 

Acamar

Achernar

Achird

Adhara

Agena

Ain

Alamak

Alathfar

Alchiba

Alcyone

Alderamin

Algieba

Alhena

Alkaid

Alkurhah

Almach

Alphecca

Alshain

Alshat

Aludra

Alwaid

Alzirr

Angetenar

Antares

Aquila

Ara

Arkab

Asterion

Asterope

Atria

Auriga

Avior

Baiten

Betelgeuse

Bootes

Caelum

Camelopardalis

Capricornus

Carinae

Castor

Cebalrai

Centaurus

Cephei

Cepheus

Cervantes

Chalawan

Chara

Chow

Circinus

Columba

Copernicus

Corvus

Crater

Cursa

Cynosura

Dabih

Delphinus

Dheneb

Diadema

Diphda

Edasich

Enif

Eridanus

Errai

Fafnir

Fornax

Gacrux

Gianfar

Gienah

Gomeisa

Gorgonea

Grumium

Hadar

Hamal

Hatysa

Hercules

Heze

Horologium

Hydra

Hydrus

Indus

Intercrus

Iskandar

Jabbah

Kajam

Kitel

Kocab

Kraz

Libra

Lupus

Markab

Matar

Mebsuta

Mekbuda

Menkab

Merope

Mesarthim

Metallah

Minkar

Mirach

Monoceros

Musca

Muscida

Musica

Naos

Nash

Nashira

Nunki

Ogma

Orion

Persei

Phact

Phaet

Phoenix

Pictor

Pleione

Pollux

Porrima

Pyxis

Rana

Regulus

Rotanev

Sabik

Sadalbari

Salm

Scheat

Sculptor

Serpens

Sharatan

Sheliak

Situla

Skat

Spica

Subra

Taurus

Triangulum

Tucana

Turais

Ursa

Veritate

Virgo

Zaniah

Zibal

Zuben

 

Kind regards

Share this post


Link to post

Hello!

 

List of generation 2 servers, updated Sep 13 2018 (total Generation 2 servers: 201)

 

Acamar
Achernar
Achird
Adhara
Agena
Ain
Alamak
Alathfar
Albali
Alchiba
Alcor
Alcyone
Alderamin
Algieba
Algorab
Alhena
Alkaid
Alkes
Alkurhah
Almach
Alnilam
Alphard
Alphecca
Alphirk
Alrai
Alrami
Alshain
Alshat
Altarf
Alterf
Aludra
Alula
Alwaid
Alya
Alzirr
Ancha
Andromeda
Angetenar
Anser
Antares
Aquila
Arcturus
Arkab
Asellus
Asterion
Asterope
Atik
Atria
Auriga
Avior
Azmidiske
Baiten
Benetnasch
Betelgeuse
Bootes
Caelum
Camelopardalis
Canes
Canis
Caph
Capricornus
Carinae
Castor
Cebalrai
Celaeno
Centaurus
Cephei
Cepheus
Cervantes
Chalawan
Chara
Chort
Chow
Circinus
Columba
Copernicus
Crater
Cursa
Cygnus
Cynosura
Dabih
Delphinus
Denebola
Dheneb
Diadema
Diphda
Edasich
Elnath
Enif
Eridanus
Errai
Fafnir
Fomalhaut
Fornax
Gacrux
Garnet
Gemini
Gianfar
Gienah
Gomeisa
Gorgonea
Grumium
Hadar
Hamal
Hassaleh
Hatysa
Hercules
Heze
Horologium
Hyadum
Hydra
Hydrus
Indus
Intercrus
Iskandar
Jabbah
Kajam
Kitel
Kocab
Kraz
Lesath
Libra
Lupus
Maasym
Markab
Matar
Mebsuta
Mekbuda
Menkab
Merga
Merope
Mesarthim
Metallah
Minkar
Mintaka
Mirach
Miram
Muphrid
Musca
Muscida
Musica
Naos
Nash
Nashira
Norma
Nunki
Ogma
Ophiuchus
Orion
Pavonis
Persei
Phact
Phaet
Phecda
Phoenix
Pictor
Pleione
Pollux
Porrima
Pyxis
Rana
Regulus
Reticulum
Rotanev
Rukbat
Sabik
Sadalbari
Saiph
Salm
Sargas
Scheat
Sculptor
Serpens
Sharatan
Sheliak
Sirrah
Situla
Skat
Spica
Sualocin
Subra
Talitha
Tarazed
Taurus
Tegmen
Tejat
Triangulum
Tucana
Turais
Tyl
Ukdah
Ursa
Veritate
Virginis
Virgo
Yed
Yildun
Zaniah
Zibal
Zuben

 

Kind regards

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...