sllth 0 Posted ... Hello, I just ordered a subscription but was unable to connect to any server using the eddie-ui software (that i installed from the deb repo) under linux Mint Tara . I've found some related topic (about some trouble under mint) but since my OpenVPN package is already under 2.4.4 it seem's not relevant. So i'm not able to connect to any server and it's looping in connect, disconnect cycle. Here is the Repport : Eddie System/Environment Report - 25/11/2018 10:49 UTC Eddie version: 2.16.3 Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: Linux Mint 19 Tara \n \l OS version: Linux x220 4.15.0-20-generic #21-Ubuntu SMP Tue Apr 24 06:16:15 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux OS architecture: x64 Mono /.Net Framework: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319 OpenVPN driver: Found, /dev/net/tun OpenVPN: 2.4.4 - OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn) SSH: OpenSSH_7.6p1 Ubuntu-4ubuntu0.1, OpenSSL 1.0.2n 7 Dec 2017 (/usr/bin/ssh) SSL: stunnel 5.44 (/usr/bin/stunnel4) curl: 7.58.0 (/usr/bin/curl) Profile path: /home/usname/.airvpn/default.xml Data path: /home/usname/.airvpn Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/Eddie-UI.exe Command line arguments: (5 args) path="/home/usname/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus" Network Lock Active: No Connected to VPN: No Detected DNS: 127.0.0.53 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: -1 ms Test Ping IPv6: -1 ms Test HTTP IPv4: Ok Test HTTP IPv6: Error:curl: (7) Couldn't connect to server Test HTTPS: Ok . 2018.11.25 11:44:01 - Eddie version: 2.16.3 / linux_x64, System: Linux, Name: Linux Mint 19 Tara \n \l, Version: Linux x220 4.15.0-20-generic #21-Ubuntu SMP Tue Apr 24 06:16:15 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319 . 2018.11.25 11:44:01 - Reading options from /home/usname/.airvpn/default.xml . 2018.11.25 11:44:02 - Command line arguments (5): path="/home/usname/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus" . 2018.11.25 11:44:02 - Profile path: /home/usname/.airvpn/default.xml . 2018.11.25 11:44:03 - OpenVPN Driver - Found, /dev/net/tun . 2018.11.25 11:44:03 - OpenVPN - Version: 2.4.4 - OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn) . 2018.11.25 11:44:03 - SSH - Version: OpenSSH_7.6p1 Ubuntu-4ubuntu0.1, OpenSSL 1.0.2n 7 Dec 2017 (/usr/bin/ssh) . 2018.11.25 11:44:03 - SSL - Version: stunnel 5.44 (/usr/bin/stunnel4) . 2018.11.25 11:44:03 - curl - Version: 7.58.0 (/usr/bin/curl) . 2018.11.25 11:44:03 - Certification Authorities: /usr/share/eddie-ui/cacert.pem . 2018.11.25 11:44:03 - Updating systems & servers data ... I 2018.11.25 11:44:03 - Ready . 2018.11.25 11:44:04 - Systems & servers data update completed I 2018.11.25 11:45:06 - Session starting. I 2018.11.25 11:45:06 - Checking authorization ... ! 2018.11.25 11:45:06 - Connecting to Alderamin (Austria, Vienna) . 2018.11.25 11:45:06 - OpenVPN > OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 5 2018 . 2018.11.25 11:45:06 - OpenVPN > library versions: OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 . 2018.11.25 11:45:06 - Connection to OpenVPN Management Interface . 2018.11.25 11:45:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2018.11.25 11:45:06 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.11.25 11:45:06 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.11.25 11:45:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.9.19.106:443 . 2018.11.25 11:45:06 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.11.25 11:45:06 - OpenVPN > UDP link local: (not bound) . 2018.11.25 11:45:06 - OpenVPN > UDP link remote: [AF_INET]185.9.19.106:443 . 2018.11.25 11:45:06 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2018.11.25 11:45:38 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2018.11.25 11:45:38 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.11.25 11:45:44 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2018.11.25 11:45:44 - Disconnecting . 2018.11.25 11:45:44 - Connection terminated. I 2018.11.25 11:45:47 - Checking authorization ... ! 2018.11.25 11:45:47 - Connecting to Alderamin (Austria, Vienna) . 2018.11.25 11:45:47 - OpenVPN > OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 5 2018 . 2018.11.25 11:45:47 - OpenVPN > library versions: OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 . 2018.11.25 11:45:47 - Connection to OpenVPN Management Interface . 2018.11.25 11:45:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2018.11.25 11:45:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.11.25 11:45:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2018.11.25 11:45:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.9.19.106:443 . 2018.11.25 11:45:47 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2018.11.25 11:45:47 - OpenVPN > UDP link local: (not bound) . 2018.11.25 11:45:47 - OpenVPN > UDP link remote: [AF_INET]185.9.19.106:443 . 2018.11.25 11:45:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2018.11.25 11:46:19 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2018.11.25 11:46:19 - OpenVPN > SIGTERM received, sending exit notification to peer . 2018.11.25 11:46:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2018.11.25 11:46:25 - Disconnecting . 2018.11.25 11:46:25 - Connection terminated. I 2018.11.25 11:46:28 - Checking authorization ... ! 2018.11.25 11:46:28 - Connecting to Alderamin (Austria, Vienna) [... keep looping] Thanks for help. Quote Share this post Link to post
sllth 0 Posted ... Hum, okay some update, it seems the issue is related to my router (which I don't have access) because it's working when i use another one (my phone ). I suppose it's due to closed port but I'm not expert. Is there a way to bypass those ? port forwarding ? Thanks for help. Quote Share this post Link to post
Staff 9972 Posted ... Hello! Please test the following settings: from Eddie main window select "Preferences" > "Protocols"untick "Automatic"select the line with entry-IP address 3, protocol TCP, port 443, and click "Save"test again connections to various servers in various locations Kind regards Quote Share this post Link to post
sllth 0 Posted ... Thanks for quick response. So it works (able to connect) but I still get an error message : E 2018.11.25 12:42:29 - curl: (7) Failed to connect to alderamin.airservers.org port 89: Connexion refusée Any clue on why ? should I worry about ? Quote Share this post Link to post
wbaggette 0 Posted ... I have the same problem. A few notes: (1) Eddie on my MacOS machine connects; no problems. I also run it successfully on a Windows machine.(2) An older version of Eddie connected under Mint Tara, Debian 9.5, and Ubuntu 16.x on this machine.(3) This machine currently directly connects to the internet (no VPN) with no problem.(4) Activation of "Network Lock" takes a LONG time on this machine, maybe 20 to 30 seconds. (Almost instantly on all others.) Machine is currently running Linux Mint 18.3 (Sylvia). The above fix does not work. Endless loop (connect-disconnect) when I try to connect, with and without the Network Lock. Here is a typical log: ! 2019.01.07 00:14:28 - Deactivation of Network Lock! 2019.01.07 00:14:30 - Activation of Network Lock - Linux iptablesI 2019.01.07 00:15:15 - Session starting.I 2019.01.07 00:15:15 - Checking authorization ...! 2019.01.07 00:15:16 - Connecting to Alkurhah (Canada, Toronto, Ontario). 2019.01.07 00:15:16 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017. 2019.01.07 00:15:16 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08. 2019.01.07 00:15:16 - Connection to OpenVPN Management Interface. 2019.01.07 00:15:16 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2019.01.07 00:15:16 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2019.01.07 00:15:16 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.01.07 00:15:16 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.01.07 00:15:16 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]. 2019.01.07 00:15:16 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.202:443 [nonblock]. 2019.01.07 00:15:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2019.01.07 00:15:17 - OpenVPN > TCP connection established with [AF_INET]184.75.221.202:443. 2019.01.07 00:15:17 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2019.01.07 00:15:17 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]184.75.221.202:443. 2019.01.07 00:15:17 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.202:443, sid=34161c96 cded3c29. 2019.01.07 00:15:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2019.01.07 00:15:17 - OpenVPN > Validating certificate key usage. 2019.01.07 00:15:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2019.01.07 00:15:17 - OpenVPN > VERIFY KU OK. 2019.01.07 00:15:17 - OpenVPN > Validating certificate extended key usage. 2019.01.07 00:15:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2019.01.07 00:15:17 - OpenVPN > VERIFY EKU OK. 2019.01.07 00:15:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org. 2019.01.07 00:15:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2019.01.07 00:15:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.01.07 00:15:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2019.01.07 00:15:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.01.07 00:15:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2019.01.07 00:15:18 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.202:443. 2019.01.07 00:15:20 - OpenVPN > SENT CONTROL [Alkurhah]: 'PUSH_REQUEST' (status=1). 2019.01.07 00:15:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.6.213.1,route-gateway 10.6.213.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.6.213.133 255.255.255.0,peer-id 0'. 2019.01.07 00:15:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2019.01.07 00:15:20 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2019.01.07 00:15:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2019.01.07 00:15:20 - OpenVPN > OPTIONS IMPORT: route options modified. 2019.01.07 00:15:20 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2019.01.07 00:15:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2019.01.07 00:15:20 - OpenVPN > OPTIONS IMPORT: peer-id set. 2019.01.07 00:15:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1563. 2019.01.07 00:15:20 - OpenVPN > ROUTE_GATEWAY 192.168.254.254/255.255.255.0 IFACE=enp2s0 HWADDR=d0:50:99:25:c3:fe. 2019.01.07 00:15:20 - OpenVPN > TUN/TAP device tun0 opened. 2019.01.07 00:15:20 - OpenVPN > TUN/TAP TX queue length set to 100. 2019.01.07 00:15:20 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2019.01.07 00:15:20 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500. 2019.01.07 00:15:20 - OpenVPN > /sbin/ip addr add dev tun0 10.6.213.133/24 broadcast 10.6.213.255. 2019.01.07 00:15:25 - OpenVPN > /sbin/ip route add 184.75.221.202/32 via 192.168.254.254. 2019.01.07 00:15:25 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.6.213.1. 2019.01.07 00:15:25 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.6.213.1. 2019.01.07 00:15:25 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup. 2019.01.07 00:15:25 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated). 2019.01.07 00:15:25 - Routes, added a new route, 184.75.221.203 for gateway 10.6.213.1. 2019.01.07 00:15:25 - Unable to compute route for 2606:6080:1001:16:3492:5f11:f1fb:66ae: IPv6 VPN gateway not available.. 2019.01.07 00:15:25 - Flushing DNSI 2019.01.07 00:15:26 - Checking route IPv4I 2019.01.07 00:15:27 - Checking route IPv6. 2019.01.07 00:15:27 - curl: (7) Couldn't connect to server. 2019.01.07 00:15:27 - Checking route (2° try). 2019.01.07 00:15:28 - curl: (7) Couldn't connect to server. 2019.01.07 00:15:28 - Checking route (3° try). 2019.01.07 00:15:30 - curl: (7) Couldn't connect to serverE 2019.01.07 00:15:30 - Checking route IPv6 failed.. 2019.01.07 00:15:30 - OpenVPN > Initialization Sequence Completed! 2019.01.07 00:15:30 - Disconnecting. 2019.01.07 00:15:30 - Routes, removed a route previously added, 184.75.221.203 for gateway 10.6.213.1. 2019.01.07 00:15:30 - Sending management termination signal. 2019.01.07 00:15:30 - Management - Send 'signal SIGTERM'. 2019.01.07 00:15:30 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2019.01.07 00:15:30 - OpenVPN > /sbin/ip route del 184.75.221.202/32. 2019.01.07 00:15:30 - OpenVPN > /sbin/ip route del 0.0.0.0/1. 2019.01.07 00:15:30 - OpenVPN > /sbin/ip route del 128.0.0.0/1. 2019.01.07 00:15:30 - OpenVPN > Closing TUN/TAP interface. 2019.01.07 00:15:30 - OpenVPN > /sbin/ip addr del dev tun0 10.6.213.133/24. 2019.01.07 00:15:30 - OpenVPN > SIGTERM[hard,] received, process exiting. 2019.01.07 00:15:30 - Connection terminated.. 2019.01.07 00:15:30 - DNS of the system restored to original settings (Rename method)I 2019.01.07 00:15:33 - Checking authorization ...! 2019.01.07 00:15:34 - Connecting to Sadalbari (Canada, Toronto, Ontario). 2019.01.07 00:15:34 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017. 2019.01.07 00:15:34 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08. 2019.01.07 00:15:34 - Connection to OpenVPN Management Interface. 2019.01.07 00:15:34 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2019.01.07 00:15:34 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2019.01.07 00:15:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.01.07 00:15:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.01.07 00:15:34 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]. 2019.01.07 00:15:34 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.178:443 [nonblock]. 2019.01.07 00:15:34 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2019.01.07 00:15:35 - OpenVPN > TCP connection established with [AF_INET]184.75.221.178:443. 2019.01.07 00:15:35 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2019.01.07 00:15:35 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]184.75.221.178:443. 2019.01.07 00:15:35 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.178:443, sid=9ae4c2cc da8d8968. 2019.01.07 00:15:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2019.01.07 00:15:35 - OpenVPN > Validating certificate key usage. 2019.01.07 00:15:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2019.01.07 00:15:35 - OpenVPN > VERIFY KU OK. 2019.01.07 00:15:35 - OpenVPN > Validating certificate extended key usage. 2019.01.07 00:15:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2019.01.07 00:15:35 - OpenVPN > VERIFY EKU OK. 2019.01.07 00:15:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2019.01.07 00:15:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2019.01.07 00:15:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.01.07 00:15:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2019.01.07 00:15:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.01.07 00:15:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2019.01.07 00:15:35 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.178:443. 2019.01.07 00:15:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2019.01.07 00:15:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.28.181.1,route-gateway 10.28.181.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.28.181.38 255.255.255.0,peer-id 0'. 2019.01.07 00:15:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2019.01.07 00:15:38 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2019.01.07 00:15:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2019.01.07 00:15:38 - OpenVPN > OPTIONS IMPORT: route options modified. 2019.01.07 00:15:38 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2019.01.07 00:15:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2019.01.07 00:15:38 - OpenVPN > OPTIONS IMPORT: peer-id set. 2019.01.07 00:15:38 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1563. 2019.01.07 00:15:38 - OpenVPN > ROUTE_GATEWAY 192.168.254.254/255.255.255.0 IFACE=enp2s0 HWADDR=d0:50:99:25:c3:fe. 2019.01.07 00:15:38 - OpenVPN > TUN/TAP device tun0 opened. 2019.01.07 00:15:38 - OpenVPN > TUN/TAP TX queue length set to 100. 2019.01.07 00:15:38 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2019.01.07 00:15:38 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500. 2019.01.07 00:15:38 - OpenVPN > /sbin/ip addr add dev tun0 10.28.181.38/24 broadcast 10.28.181.255. 2019.01.07 00:15:44 - OpenVPN > /sbin/ip route add 184.75.221.178/32 via 192.168.254.254. 2019.01.07 00:15:44 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.28.181.1. 2019.01.07 00:15:44 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.28.181.1. 2019.01.07 00:15:44 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup. 2019.01.07 00:15:44 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated). 2019.01.07 00:15:44 - Routes, added a new route, 184.75.221.179 for gateway 10.28.181.1. 2019.01.07 00:15:44 - Unable to compute route for 2606:6080:1001:14:c766:f45a:ac4d:72a0: IPv6 VPN gateway not available.. 2019.01.07 00:15:44 - Flushing DNSI 2019.01.07 00:15:45 - Checking route IPv4I 2019.01.07 00:15:46 - Checking route IPv6. 2019.01.07 00:15:46 - curl: (7) Couldn't connect to server. 2019.01.07 00:15:46 - Checking route (2° try). 2019.01.07 00:15:47 - curl: (7) Couldn't connect to server. 2019.01.07 00:15:47 - Checking route (3° try). 2019.01.07 00:15:49 - curl: (7) Couldn't connect to serverE 2019.01.07 00:15:49 - Checking route IPv6 failed.. 2019.01.07 00:15:49 - OpenVPN > Initialization Sequence Completed! 2019.01.07 00:15:49 - Disconnecting. 2019.01.07 00:15:49 - Routes, removed a route previously added, 184.75.221.179 for gateway 10.28.181.1. 2019.01.07 00:15:49 - Sending management termination signal. 2019.01.07 00:15:49 - Management - Send 'signal SIGTERM'. 2019.01.07 00:15:49 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2019.01.07 00:15:49 - OpenVPN > /sbin/ip route del 184.75.221.178/32. 2019.01.07 00:15:49 - OpenVPN > /sbin/ip route del 0.0.0.0/1. 2019.01.07 00:15:49 - OpenVPN > /sbin/ip route del 128.0.0.0/1. 2019.01.07 00:15:49 - OpenVPN > Closing TUN/TAP interface. 2019.01.07 00:15:49 - OpenVPN > /sbin/ip addr del dev tun0 10.28.181.38/24. 2019.01.07 00:15:49 - OpenVPN > SIGTERM[hard,] received, process exiting. 2019.01.07 00:15:49 - Connection terminated.. 2019.01.07 00:15:49 - DNS of the system restored to original settings (Rename method)I 2019.01.07 00:15:52 - Checking authorization ...! 2019.01.07 00:15:53 - Connecting to Alya (Canada, Toronto, Ontario). 2019.01.07 00:15:53 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017. 2019.01.07 00:15:53 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08. 2019.01.07 00:15:53 - Connection to OpenVPN Management Interface. 2019.01.07 00:15:53 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2019.01.07 00:15:53 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2019.01.07 00:15:53 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.01.07 00:15:53 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.01.07 00:15:53 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]. 2019.01.07 00:15:53 - OpenVPN > Attempting to establish TCP connection with [AF_INET]184.75.221.170:443 [nonblock]. 2019.01.07 00:15:53 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2019.01.07 00:15:54 - OpenVPN > TCP connection established with [AF_INET]184.75.221.170:443. 2019.01.07 00:15:54 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2019.01.07 00:15:54 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]184.75.221.170:443. 2019.01.07 00:15:54 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=a963811e aae1c5b0. 2019.01.07 00:15:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2019.01.07 00:15:54 - OpenVPN > Validating certificate key usage. 2019.01.07 00:15:54 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2019.01.07 00:15:54 - OpenVPN > VERIFY KU OK. 2019.01.07 00:15:54 - OpenVPN > Validating certificate extended key usage. 2019.01.07 00:15:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2019.01.07 00:15:54 - OpenVPN > VERIFY EKU OK. 2019.01.07 00:15:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2019.01.07 00:15:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2019.01.07 00:15:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.01.07 00:15:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2019.01.07 00:15:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2019.01.07 00:15:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2019.01.07 00:15:54 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.170:443. 2019.01.07 00:15:57 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2019.01.07 00:15:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.8.181.1,route-gateway 10.8.181.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.8.181.222 255.255.255.0,peer-id 0'. 2019.01.07 00:15:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2019.01.07 00:15:57 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2019.01.07 00:15:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2019.01.07 00:15:57 - OpenVPN > OPTIONS IMPORT: route options modified. 2019.01.07 00:15:57 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2019.01.07 00:15:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2019.01.07 00:15:57 - OpenVPN > OPTIONS IMPORT: peer-id set. 2019.01.07 00:15:57 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1563. 2019.01.07 00:15:57 - OpenVPN > ROUTE_GATEWAY 192.168.254.254/255.255.255.0 IFACE=enp2s0 HWADDR=d0:50:99:25:c3:fe. 2019.01.07 00:15:57 - OpenVPN > TUN/TAP device tun0 opened. 2019.01.07 00:15:57 - OpenVPN > TUN/TAP TX queue length set to 100. 2019.01.07 00:15:57 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2019.01.07 00:15:57 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500. 2019.01.07 00:15:57 - OpenVPN > /sbin/ip addr add dev tun0 10.8.181.222/24 broadcast 10.8.181.255! 2019.01.07 00:15:57 - Disconnecting. 2019.01.07 00:15:58 - Sending management termination signal. 2019.01.07 00:15:58 - Management - Send 'signal SIGTERM'. 2019.01.07 00:15:58 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2019.01.07 00:15:58 - OpenVPN > Closing TUN/TAP interface. 2019.01.07 00:15:58 - OpenVPN > /sbin/ip addr del dev tun0 10.8.181.222/24. 2019.01.07 00:15:58 - OpenVPN > SIGTERM[hard,] received, process exiting. 2019.01.07 00:15:58 - Connection terminated.I 2019.01.07 00:15:58 - Cancel requested.! 2019.01.07 00:15:58 - Session terminated. Quote Share this post Link to post
Staff 9972 Posted ... Hello!Please try the following settings:- from Eddie main window select "Preferences" > "Networking"- set the "IPv6 layer" combo box to "Blocked"- click "Save"Alternative solution: upgrade to OpenVPN 2.4 or higher version.Explanation: OpenVPN versions older than 2.4 do not handle IPv6 properly. So our servers do not push IPv6 routes and related directives when they detect older versions, in order to not break retro-compatibility. However Eddie (for a bug in 2.16.3, fixed in 2.17.2beta) tries anyway to check the IPv6 route in the tunnel and it obviously fails.Kind regards 1 wbaggette reacted to this Quote Share this post Link to post
wbaggette 0 Posted ... Thank you! "set the 'IPv6 layer' combo box to 'Blocked'" worked. Problem solved (until 2.17 comes out)! Quote Share this post Link to post
Staff 9972 Posted ... how to do this fix in command line? Hello! From the command line interface you can use the following option: --network.ipv6.mode=block Kind regards Quote Share this post Link to post