Marek.Br 0 Posted ... Hi, I have used AirVPN until some two months ago and everything was fine. Yesterday I have renewed my subscription and I am a bit screwed up. When I try to establish a connection within the terminal Here is the log, I edited my real IP to 10.100.10.10 here: [linux@user myfolder]$ sudo openvpn AirVPN_Ukraine_UDP-443.ovpn [sudo] password for linux: Sat Nov 24 16:41:25 2018 OpenVPN 2.4.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr 24 2018 Sat Nov 24 16:41:25 2018 library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.10 Sat Nov 24 16:41:25 2018 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Sat Nov 24 16:41:25 2018 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Sat Nov 24 16:41:26 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]10.100.10.10:443 Sat Nov 24 16:41:26 2018 Socket Buffers: R=[212992->425984] S=[212992->425984] Sat Nov 24 16:41:26 2018 UDP link local: (not bound) Sat Nov 24 16:41:26 2018 UDP link remote: [AF_INET]10.100.10.10:443 Sat Nov 24 16:41:26 2018 TLS: Initial packet from [AF_INET]10.100.10.10:443, sid=3efa9eaa 24067bd7 Sat Nov 24 16:41:27 2018 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Sat Nov 24 16:41:27 2018 VERIFY KU OK Sat Nov 24 16:41:27 2018 Validating certificate extended key usage Sat Nov 24 16:41:27 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sat Nov 24 16:41:27 2018 VERIFY EKU OK Sat Nov 24 16:41:27 2018 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alcor, emailAddress=info@airvpn.org Sat Nov 24 16:41:27 2018 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Sat Nov 24 16:41:27 2018 [Alcor] Peer Connection Initiated with [AF_INET]10.100.10.10:443 Sat Nov 24 16:41:28 2018 SENT CONTROL [Alcor]: 'PUSH_REQUEST' (status=1) Sat Nov 24 16:41:28 2018 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.164.1,route-gateway 10.5.164.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.164.89 255.255.255.0,peer-id 1,cipher AES-256-GCM' Sat Nov 24 16:41:28 2018 OPTIONS IMPORT: timers and/or timeouts modified Sat Nov 24 16:41:28 2018 OPTIONS IMPORT: compression parms modified Sat Nov 24 16:41:28 2018 OPTIONS IMPORT: --ifconfig/up options modified Sat Nov 24 16:41:28 2018 OPTIONS IMPORT: route options modified Sat Nov 24 16:41:28 2018 OPTIONS IMPORT: route-related options modified Sat Nov 24 16:41:28 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Sat Nov 24 16:41:28 2018 OPTIONS IMPORT: peer-id set Sat Nov 24 16:41:28 2018 OPTIONS IMPORT: adjusting link_mtu to 1625 Sat Nov 24 16:41:28 2018 OPTIONS IMPORT: data channel crypto options modified Sat Nov 24 16:41:28 2018 Data Channel: using negotiated cipher 'AES-256-GCM' Sat Nov 24 16:41:28 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Sat Nov 24 16:41:28 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Sat Nov 24 16:41:28 2018 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=wlp61s0 HWADDR=xxxxx Sat Nov 24 16:41:28 2018 TUN/TAP device tun0 opened Sat Nov 24 16:41:28 2018 TUN/TAP TX queue length set to 100 Sat Nov 24 16:41:28 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0 Sat Nov 24 16:41:28 2018 /usr/bin/ip link set dev tun0 up mtu 1500 Sat Nov 24 16:41:28 2018 /usr/bin/ip addr add dev tun0 10.5.164.89/24 broadcast 10.5.164.255 Sat Nov 24 16:41:28 2018 /usr/bin/ip route add 10.100.10.10/32 via 192.168.0.1 Sat Nov 24 16:41:28 2018 /usr/bin/ip route add 0.0.0.0/1 via 10.5.164.1 Sat Nov 24 16:41:28 2018 /usr/bin/ip route add 128.0.0.0/1 via 10.5.164.1 Sat Nov 24 16:41:28 2018 Initialization Sequence Completed I am not sure, if the connection is established or not?! According to the airvpn-website it is not. On top of the webpage i see my IP6 adress and if I check my adress with whatsmyip or so, my real IP and location are shown. On the otherhand this log above looks good to me! I am bit confused, any help is very welcome!! Many greetings Quote Share this post Link to post
OpenSourcerer 1442 Posted ... Sat Nov 24 16:41:26 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]10.100.10.10:443 This doesn't look like it's connecting to the AirVPN server. Are you using a proxy? Can you maybe dump your config file here without the keys? It also doesn't touch IPv6 at all. Maybe you need to regenerate your config and explicitly mark IPv6 or IPv6 over IPv4 connection modes? Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
Marek.Br 0 Posted ... Giganerd, you gave me the right hint! Although I have never needed it before, I have rerun the creation of the config files in "Advanced Mode". There I chose "IP4&IP6" and now it works! I think it has something to do with my ISP as they use IP6 IIRC. (Es ist Unitymedia über Kabel.) Many greetings und einen schönen Sonntag dir! Marek Quote Share this post Link to post
OpenSourcerer 1442 Posted ... You are welcome. Genieß AirVPN Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post