Jump to content
Not connected, Your IP: 3.144.3.183
sllth

New user - Unable to connect to any server on Linux Mint

Recommended Posts

Hello,

 

I just ordered a subscription but was unable to connect to any server using the eddie-ui software (that i installed from the deb repo) under linux Mint Tara .

 

I've found some related topic (about some trouble under mint) but since my OpenVPN package is already under 2.4.4 it seem's not relevant. 

 

So i'm not able to connect to any server and it's looping in connect, disconnect cycle.

 

Here is the Repport :

Eddie System/Environment Report - 25/11/2018 10:49 UTC

Eddie version: 2.16.3
Eddie OS build: linux_x64
Eddie architecture: x64
OS type: Linux
OS name: Linux Mint 19 Tara \n \l
OS version: Linux x220 4.15.0-20-generic #21-Ubuntu SMP Tue Apr 24 06:16:15 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux
OS architecture: x64
Mono /.Net Framework: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319
OpenVPN driver: Found, /dev/net/tun
OpenVPN: 2.4.4 - OpenSSL 1.1.0g  2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn)
SSH: OpenSSH_7.6p1 Ubuntu-4ubuntu0.1, OpenSSL 1.0.2n  7 Dec 2017 (/usr/bin/ssh)
SSL: stunnel 5.44 (/usr/bin/stunnel4)
curl: 7.58.0 (/usr/bin/curl)
Profile path: /home/usname/.airvpn/default.xml
Data path: /home/usname/.airvpn
Application path: /usr/lib/eddie-ui
Executable path: /usr/lib/eddie-ui/Eddie-UI.exe
Command line arguments: (5 args) path="/home/usname/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus"
Network Lock Active: No
Connected to VPN: No
Detected DNS: 127.0.0.53
Test DNS IPv4: Ok
Test DNS IPv6: Ok
Test Ping IPv4: -1 ms
Test Ping IPv6: -1 ms
Test HTTP IPv4: Ok
Test HTTP IPv6: Error:curl: (7) Couldn't connect to server
Test HTTPS: Ok

 

. 2018.11.25 11:44:01 - Eddie version: 2.16.3 / linux_x64, System: Linux, Name: Linux Mint 19 Tara \n \l, Version: Linux x220 4.15.0-20-generic #21-Ubuntu SMP Tue Apr 24 06:16:15 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319
. 2018.11.25 11:44:01 - Reading options from /home/usname/.airvpn/default.xml
. 2018.11.25 11:44:02 - Command line arguments (5): path="/home/usname/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus"
. 2018.11.25 11:44:02 - Profile path: /home/usname/.airvpn/default.xml
. 2018.11.25 11:44:03 - OpenVPN Driver - Found, /dev/net/tun
. 2018.11.25 11:44:03 - OpenVPN - Version: 2.4.4 - OpenSSL 1.1.0g  2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn)
. 2018.11.25 11:44:03 - SSH - Version: OpenSSH_7.6p1 Ubuntu-4ubuntu0.1, OpenSSL 1.0.2n  7 Dec 2017 (/usr/bin/ssh)
. 2018.11.25 11:44:03 - SSL - Version: stunnel 5.44 (/usr/bin/stunnel4)
. 2018.11.25 11:44:03 - curl - Version: 7.58.0 (/usr/bin/curl)
. 2018.11.25 11:44:03 - Certification Authorities: /usr/share/eddie-ui/cacert.pem
. 2018.11.25 11:44:03 - Updating systems & servers data ...
I 2018.11.25 11:44:03 - Ready
. 2018.11.25 11:44:04 - Systems & servers data update completed
I 2018.11.25 11:45:06 - Session starting.
I 2018.11.25 11:45:06 - Checking authorization ...
! 2018.11.25 11:45:06 - Connecting to Alderamin (Austria, Vienna)
. 2018.11.25 11:45:06 - OpenVPN > OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep  5 2018
. 2018.11.25 11:45:06 - OpenVPN > library versions: OpenSSL 1.1.0g  2 Nov 2017, LZO 2.08
. 2018.11.25 11:45:06 - Connection to OpenVPN Management Interface
. 2018.11.25 11:45:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.11.25 11:45:06 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.11.25 11:45:06 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.11.25 11:45:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.9.19.106:443
. 2018.11.25 11:45:06 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.11.25 11:45:06 - OpenVPN > UDP link local: (not bound)
. 2018.11.25 11:45:06 - OpenVPN > UDP link remote: [AF_INET]185.9.19.106:443
. 2018.11.25 11:45:06 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.11.25 11:45:38 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting
. 2018.11.25 11:45:38 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.11.25 11:45:44 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2018.11.25 11:45:44 - Disconnecting
. 2018.11.25 11:45:44 - Connection terminated.
I 2018.11.25 11:45:47 - Checking authorization ...
! 2018.11.25 11:45:47 - Connecting to Alderamin (Austria, Vienna)
. 2018.11.25 11:45:47 - OpenVPN > OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep  5 2018
. 2018.11.25 11:45:47 - OpenVPN > library versions: OpenSSL 1.1.0g  2 Nov 2017, LZO 2.08
. 2018.11.25 11:45:47 - Connection to OpenVPN Management Interface
. 2018.11.25 11:45:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.11.25 11:45:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.11.25 11:45:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.11.25 11:45:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.9.19.106:443
. 2018.11.25 11:45:47 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2018.11.25 11:45:47 - OpenVPN > UDP link local: (not bound)
. 2018.11.25 11:45:47 - OpenVPN > UDP link remote: [AF_INET]185.9.19.106:443
. 2018.11.25 11:45:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.11.25 11:46:19 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting
. 2018.11.25 11:46:19 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.11.25 11:46:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2018.11.25 11:46:25 - Disconnecting
. 2018.11.25 11:46:25 - Connection terminated.
I 2018.11.25 11:46:28 - Checking authorization ...
! 2018.11.25 11:46:28 - Connecting to Alderamin (Austria, Vienna)
[... keep looping]

Thanks for help.

Share this post


Link to post

Hum, okay some update, it seems the issue is related to my router (which I don't have access) because it's working when i use another one (my phone ).

 

I suppose it's due to closed port but I'm not expert.

 

Is there a way to bypass those ? port forwarding ?

 

Thanks for help.

Share this post


Link to post

Hello!

 

Please test the following settings:

 

  • from Eddie main window select "Preferences" > "Protocols"
  • untick "Automatic"
  • select the line with entry-IP address 3, protocol TCP, port 443, and click "Save"
  • test again connections to various servers in various locations

 

Kind regards

Share this post


Link to post
Thanks for quick response.
 
So it works (able to connect) but I still get an error message :
 
E 2018.11.25 12:42:29 - curl: (7) Failed to connect to alderamin.airservers.org port 89: Connexion refusée

Any clue on why  ? should I worry about ?

Share this post


Link to post

I have the same problem.  A few notes:

 

(1) Eddie on my MacOS machine connects; no problems.  I also run it successfully on a Windows machine.

(2) An older version of Eddie connected under Mint Tara, Debian 9.5, and Ubuntu 16.x on this machine.

(3) This machine currently directly connects to the internet (no VPN) with no problem.

(4) Activation of "Network Lock" takes a LONG time on this machine, maybe 20 to 30 seconds.  (Almost instantly on all others.)

 

Machine is currently running Linux Mint 18.3 (Sylvia).

 

The above fix does not work.  Endless loop (connect-disconnect) when I try to connect, with and without the Network Lock.

 

 Here is a typical log:

 

! 2019.01.07 00:14:28 - Deactivation of Network Lock
! 2019.01.07 00:14:30 - Activation of Network Lock - Linux iptables
I 2019.01.07 00:15:15 - Session starting.
I 2019.01.07 00:15:15 - Checking authorization ...
! 2019.01.07 00:15:16 - Connecting to Alkurhah (Canada, Toronto, Ontario)
. 2019.01.07 00:15:16 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2019.01.07 00:15:16 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2019.01.07 00:15:16 - Connection to OpenVPN Management Interface
. 2019.01.07 00:15:16 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.01.07 00:15:16 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2019.01.07 00:15:16 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.01.07 00:15:16 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.01.07 00:15:16 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2019.01.07 00:15:16 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.202:443 [nonblock]
. 2019.01.07 00:15:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.01.07 00:15:17 - OpenVPN > TCP connection established with [AF_INET]184.75.221.202:443
. 2019.01.07 00:15:17 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2019.01.07 00:15:17 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]184.75.221.202:443
. 2019.01.07 00:15:17 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.202:443, sid=34161c96 cded3c29
. 2019.01.07 00:15:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.01.07 00:15:17 - OpenVPN > Validating certificate key usage
. 2019.01.07 00:15:17 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2019.01.07 00:15:17 - OpenVPN > VERIFY KU OK
. 2019.01.07 00:15:17 - OpenVPN > Validating certificate extended key usage
. 2019.01.07 00:15:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.01.07 00:15:17 - OpenVPN > VERIFY EKU OK
. 2019.01.07 00:15:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
. 2019.01.07 00:15:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2019.01.07 00:15:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.01.07 00:15:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2019.01.07 00:15:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.01.07 00:15:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.01.07 00:15:18 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.202:443
. 2019.01.07 00:15:20 - OpenVPN > SENT CONTROL [Alkurhah]: 'PUSH_REQUEST' (status=1)
. 2019.01.07 00:15:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.6.213.1,route-gateway 10.6.213.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.6.213.133 255.255.255.0,peer-id 0'
. 2019.01.07 00:15:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.01.07 00:15:20 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2019.01.07 00:15:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.01.07 00:15:20 - OpenVPN > OPTIONS IMPORT: route options modified
. 2019.01.07 00:15:20 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.01.07 00:15:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.01.07 00:15:20 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.01.07 00:15:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1563
. 2019.01.07 00:15:20 - OpenVPN > ROUTE_GATEWAY 192.168.254.254/255.255.255.0 IFACE=enp2s0 HWADDR=d0:50:99:25:c3:fe
. 2019.01.07 00:15:20 - OpenVPN > TUN/TAP device tun0 opened
. 2019.01.07 00:15:20 - OpenVPN > TUN/TAP TX queue length set to 100
. 2019.01.07 00:15:20 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2019.01.07 00:15:20 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2019.01.07 00:15:20 - OpenVPN > /sbin/ip addr add dev tun0 10.6.213.133/24 broadcast 10.6.213.255
. 2019.01.07 00:15:25 - OpenVPN > /sbin/ip route add 184.75.221.202/32 via 192.168.254.254
. 2019.01.07 00:15:25 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.6.213.1
. 2019.01.07 00:15:25 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.6.213.1
. 2019.01.07 00:15:25 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2019.01.07 00:15:25 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2019.01.07 00:15:25 - Routes, added a new route, 184.75.221.203 for gateway 10.6.213.1
. 2019.01.07 00:15:25 - Unable to compute route for 2606:6080:1001:16:3492:5f11:f1fb:66ae: IPv6 VPN gateway not available.
. 2019.01.07 00:15:25 - Flushing DNS
I 2019.01.07 00:15:26 - Checking route IPv4
I 2019.01.07 00:15:27 - Checking route IPv6
. 2019.01.07 00:15:27 - curl: (7) Couldn't connect to server
. 2019.01.07 00:15:27 - Checking route (2° try)
. 2019.01.07 00:15:28 - curl: (7) Couldn't connect to server
. 2019.01.07 00:15:28 - Checking route (3° try)
. 2019.01.07 00:15:30 - curl: (7) Couldn't connect to server
E 2019.01.07 00:15:30 - Checking route IPv6 failed.
. 2019.01.07 00:15:30 - OpenVPN > Initialization Sequence Completed
! 2019.01.07 00:15:30 - Disconnecting
. 2019.01.07 00:15:30 - Routes, removed a route previously added, 184.75.221.203 for gateway 10.6.213.1
. 2019.01.07 00:15:30 - Sending management termination signal
. 2019.01.07 00:15:30 - Management - Send 'signal SIGTERM'
. 2019.01.07 00:15:30 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2019.01.07 00:15:30 - OpenVPN > /sbin/ip route del 184.75.221.202/32
. 2019.01.07 00:15:30 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2019.01.07 00:15:30 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2019.01.07 00:15:30 - OpenVPN > Closing TUN/TAP interface
. 2019.01.07 00:15:30 - OpenVPN > /sbin/ip addr del dev tun0 10.6.213.133/24
. 2019.01.07 00:15:30 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2019.01.07 00:15:30 - Connection terminated.
. 2019.01.07 00:15:30 - DNS of the system restored to original settings (Rename method)
I 2019.01.07 00:15:33 - Checking authorization ...
! 2019.01.07 00:15:34 - Connecting to Sadalbari (Canada, Toronto, Ontario)
. 2019.01.07 00:15:34 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2019.01.07 00:15:34 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2019.01.07 00:15:34 - Connection to OpenVPN Management Interface
. 2019.01.07 00:15:34 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.01.07 00:15:34 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2019.01.07 00:15:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.01.07 00:15:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.01.07 00:15:34 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2019.01.07 00:15:34 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.178:443 [nonblock]
. 2019.01.07 00:15:34 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.01.07 00:15:35 - OpenVPN > TCP connection established with [AF_INET]184.75.221.178:443
. 2019.01.07 00:15:35 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2019.01.07 00:15:35 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]184.75.221.178:443
. 2019.01.07 00:15:35 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.178:443, sid=9ae4c2cc da8d8968
. 2019.01.07 00:15:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.01.07 00:15:35 - OpenVPN > Validating certificate key usage
. 2019.01.07 00:15:35 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2019.01.07 00:15:35 - OpenVPN > VERIFY KU OK
. 2019.01.07 00:15:35 - OpenVPN > Validating certificate extended key usage
. 2019.01.07 00:15:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.01.07 00:15:35 - OpenVPN > VERIFY EKU OK
. 2019.01.07 00:15:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2019.01.07 00:15:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2019.01.07 00:15:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.01.07 00:15:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2019.01.07 00:15:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.01.07 00:15:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.01.07 00:15:35 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.178:443
. 2019.01.07 00:15:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2019.01.07 00:15:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.28.181.1,route-gateway 10.28.181.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.28.181.38 255.255.255.0,peer-id 0'
. 2019.01.07 00:15:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.01.07 00:15:38 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2019.01.07 00:15:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.01.07 00:15:38 - OpenVPN > OPTIONS IMPORT: route options modified
. 2019.01.07 00:15:38 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.01.07 00:15:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.01.07 00:15:38 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.01.07 00:15:38 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1563
. 2019.01.07 00:15:38 - OpenVPN > ROUTE_GATEWAY 192.168.254.254/255.255.255.0 IFACE=enp2s0 HWADDR=d0:50:99:25:c3:fe
. 2019.01.07 00:15:38 - OpenVPN > TUN/TAP device tun0 opened
. 2019.01.07 00:15:38 - OpenVPN > TUN/TAP TX queue length set to 100
. 2019.01.07 00:15:38 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2019.01.07 00:15:38 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2019.01.07 00:15:38 - OpenVPN > /sbin/ip addr add dev tun0 10.28.181.38/24 broadcast 10.28.181.255
. 2019.01.07 00:15:44 - OpenVPN > /sbin/ip route add 184.75.221.178/32 via 192.168.254.254
. 2019.01.07 00:15:44 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.28.181.1
. 2019.01.07 00:15:44 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.28.181.1
. 2019.01.07 00:15:44 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2019.01.07 00:15:44 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2019.01.07 00:15:44 - Routes, added a new route, 184.75.221.179 for gateway 10.28.181.1
. 2019.01.07 00:15:44 - Unable to compute route for 2606:6080:1001:14:c766:f45a:ac4d:72a0: IPv6 VPN gateway not available.
. 2019.01.07 00:15:44 - Flushing DNS
I 2019.01.07 00:15:45 - Checking route IPv4
I 2019.01.07 00:15:46 - Checking route IPv6
. 2019.01.07 00:15:46 - curl: (7) Couldn't connect to server
. 2019.01.07 00:15:46 - Checking route (2° try)
. 2019.01.07 00:15:47 - curl: (7) Couldn't connect to server
. 2019.01.07 00:15:47 - Checking route (3° try)
. 2019.01.07 00:15:49 - curl: (7) Couldn't connect to server
E 2019.01.07 00:15:49 - Checking route IPv6 failed.
. 2019.01.07 00:15:49 - OpenVPN > Initialization Sequence Completed
! 2019.01.07 00:15:49 - Disconnecting
. 2019.01.07 00:15:49 - Routes, removed a route previously added, 184.75.221.179 for gateway 10.28.181.1
. 2019.01.07 00:15:49 - Sending management termination signal
. 2019.01.07 00:15:49 - Management - Send 'signal SIGTERM'
. 2019.01.07 00:15:49 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2019.01.07 00:15:49 - OpenVPN > /sbin/ip route del 184.75.221.178/32
. 2019.01.07 00:15:49 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2019.01.07 00:15:49 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2019.01.07 00:15:49 - OpenVPN > Closing TUN/TAP interface
. 2019.01.07 00:15:49 - OpenVPN > /sbin/ip addr del dev tun0 10.28.181.38/24
. 2019.01.07 00:15:49 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2019.01.07 00:15:49 - Connection terminated.
. 2019.01.07 00:15:49 - DNS of the system restored to original settings (Rename method)
I 2019.01.07 00:15:52 - Checking authorization ...
! 2019.01.07 00:15:53 - Connecting to Alya (Canada, Toronto, Ontario)
. 2019.01.07 00:15:53 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2019.01.07 00:15:53 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2019.01.07 00:15:53 - Connection to OpenVPN Management Interface
. 2019.01.07 00:15:53 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.01.07 00:15:53 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2019.01.07 00:15:53 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.01.07 00:15:53 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.01.07 00:15:53 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2019.01.07 00:15:53 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.170:443 [nonblock]
. 2019.01.07 00:15:53 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.01.07 00:15:54 - OpenVPN > TCP connection established with [AF_INET]184.75.221.170:443
. 2019.01.07 00:15:54 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2019.01.07 00:15:54 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]184.75.221.170:443
. 2019.01.07 00:15:54 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=a963811e aae1c5b0
. 2019.01.07 00:15:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.01.07 00:15:54 - OpenVPN > Validating certificate key usage
. 2019.01.07 00:15:54 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2019.01.07 00:15:54 - OpenVPN > VERIFY KU OK
. 2019.01.07 00:15:54 - OpenVPN > Validating certificate extended key usage
. 2019.01.07 00:15:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.01.07 00:15:54 - OpenVPN > VERIFY EKU OK
. 2019.01.07 00:15:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2019.01.07 00:15:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2019.01.07 00:15:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.01.07 00:15:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2019.01.07 00:15:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.01.07 00:15:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.01.07 00:15:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.170:443
. 2019.01.07 00:15:57 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2019.01.07 00:15:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.8.181.1,route-gateway 10.8.181.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.8.181.222 255.255.255.0,peer-id 0'
. 2019.01.07 00:15:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.01.07 00:15:57 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2019.01.07 00:15:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.01.07 00:15:57 - OpenVPN > OPTIONS IMPORT: route options modified
. 2019.01.07 00:15:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.01.07 00:15:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.01.07 00:15:57 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.01.07 00:15:57 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1563
. 2019.01.07 00:15:57 - OpenVPN > ROUTE_GATEWAY 192.168.254.254/255.255.255.0 IFACE=enp2s0 HWADDR=d0:50:99:25:c3:fe
. 2019.01.07 00:15:57 - OpenVPN > TUN/TAP device tun0 opened
. 2019.01.07 00:15:57 - OpenVPN > TUN/TAP TX queue length set to 100
. 2019.01.07 00:15:57 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2019.01.07 00:15:57 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2019.01.07 00:15:57 - OpenVPN > /sbin/ip addr add dev tun0 10.8.181.222/24 broadcast 10.8.181.255
! 2019.01.07 00:15:57 - Disconnecting
. 2019.01.07 00:15:58 - Sending management termination signal
. 2019.01.07 00:15:58 - Management - Send 'signal SIGTERM'
. 2019.01.07 00:15:58 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2019.01.07 00:15:58 - OpenVPN > Closing TUN/TAP interface
. 2019.01.07 00:15:58 - OpenVPN > /sbin/ip addr del dev tun0 10.8.181.222/24
. 2019.01.07 00:15:58 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2019.01.07 00:15:58 - Connection terminated.
I 2019.01.07 00:15:58 - Cancel requested.
! 2019.01.07 00:15:58 - Session terminated.

Share this post


Link to post

Hello!

Please try the following settings:

- from Eddie main window select "Preferences" > "Networking"
- set the "IPv6 layer" combo box to "Blocked"
- click "Save"

Alternative solution: upgrade to OpenVPN 2.4 or higher version.

Explanation: OpenVPN versions older than 2.4 do not handle IPv6 properly. So our servers do not push IPv6 routes and related directives when they detect older versions, in order to not break retro-compatibility. However Eddie (for a bug in 2.16.3, fixed in 2.17.2beta) tries anyway to check the IPv6 route in the tunnel and it obviously fails.

Kind regards

Share this post


Link to post

how to do this fix in command line?

 

Hello!

 

From the command line interface you can use the following option:

 

--network.ipv6.mode=block

 

Kind regards

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...