Jump to content
Not connected, Your IP: 18.220.66.151
Sign in to follow this  
bayoumedic

ubuntu 16 headless using the ubuntu eddie wont connect

Recommended Posts

i installed using sudo apt-get install airvpn

 

using this command to start it sudo /usr/bin/eddie-ui -cli -connect (with the login stuff)

 

it tries to connect but doesnt and keeps trying.  here is an excerpt 

 

I 2019.02.01 21:38:55 - Checking authorization ...
! 2019.02.01 21:38:55 - Connecting to Tyl (Canada, Toronto, Ontario)
. 2019.02.01 21:38:55 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2019.02.01 21:38:55 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2019.02.01 21:38:55 - Connection to OpenVPN Management Interface
. 2019.02.01 21:38:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.02.01 21:38:55 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2019.02.01 21:38:55 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.02.01 21:38:55 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.02.01 21:38:55 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2019.02.01 21:38:55 - OpenVPN > UDPv4 link local: [undef]
. 2019.02.01 21:38:55 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.223.202:443
. 2019.02.01 21:38:55 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.202:443, sid=aa8a66b4 220ae055
. 2019.02.01 21:38:55 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.02.01 21:38:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.01 21:38:55 - OpenVPN > Validating certificate key usage
. 2019.02.01 21:38:55 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2019.02.01 21:38:55 - OpenVPN > VERIFY KU OK
. 2019.02.01 21:38:55 - OpenVPN > Validating certificate extended key usage
. 2019.02.01 21:38:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.01 21:38:55 - OpenVPN > VERIFY EKU OK
. 2019.02.01 21:38:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tyl, emailAddress=info@airvpn.org
. 2019.02.01 21:38:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2019.02.01 21:38:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.02.01 21:38:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2019.02.01 21:38:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.02.01 21:38:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.01 21:38:56 - OpenVPN > [Tyl] Peer Connection Initiated with [AF_INET]184.75.223.202:443
. 2019.02.01 21:38:58 - OpenVPN > SENT CONTROL [Tyl]: 'PUSH_REQUEST' (status=1)
. 2019.02.01 21:38:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.31.196.1,route-gateway 10.31.196.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.31.196.34 255.255.255.0,peer-id 14'
. 2019.02.01 21:38:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.02.01 21:38:58 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2019.02.01 21:38:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.02.01 21:38:58 - OpenVPN > OPTIONS IMPORT: route options modified
. 2019.02.01 21:38:58 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.02.01 21:38:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.02.01 21:38:58 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.02.01 21:38:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2019.02.01 21:38:58 - OpenVPN > ROUTE_GATEWAY 216.117.191.254/255.255.192.0 IFACE=eth0 HWADDR=f6:35:f8:27:46:9f
. 2019.02.01 21:38:58 - OpenVPN > TUN/TAP device tun0 opened
. 2019.02.01 21:38:58 - OpenVPN > TUN/TAP TX queue length set to 100
. 2019.02.01 21:38:58 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2019.02.01 21:38:58 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2019.02.01 21:38:58 - OpenVPN > /sbin/ip addr add dev tun0 10.31.196.34/24 broadcast 10.31.196.255
. 2019.02.01 21:39:03 - OpenVPN > /sbin/ip route add 184.75.223.202/32 via 216.117.191.254
. 2019.02.01 21:39:03 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.31.196.1
. 2019.02.01 21:39:03 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.31.196.1
. 2019.02.01 21:39:03 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2019.02.01 21:39:03 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2019.02.01 21:39:03 - Routes, added a new route, 184.75.223.203 for gateway 10.31.196.1
. 2019.02.01 21:39:03 - Unable to compute route for 2606:6080:1002:5:a1ba:b510:7908:829e: IPv6 VPN gateway not available.
. 2019.02.01 21:39:03 - Flushing DNS
I 2019.02.01 21:39:04 - Checking route IPv4
I 2019.02.01 21:39:05 - Checking route IPv6
. 2019.02.01 21:39:05 - curl: (7) Couldn't connect to server
. 2019.02.01 21:39:05 - Checking route (2° try)
. 2019.02.01 21:39:06 - curl: (7) Couldn't connect to server
. 2019.02.01 21:39:06 - Checking route (3° try)
. 2019.02.01 21:39:08 - curl: (7) Couldn't connect to server
E 2019.02.01 21:39:08 - Checking route IPv6 failed.
. 2019.02.01 21:39:08 - OpenVPN > Initialization Sequence Completed
! 2019.02.01 21:39:08 - Disconnecting
. 2019.02.01 21:39:08 - Routes, removed a route previously added, 184.75.223.203 for gateway 10.31.196.1
. 2019.02.01 21:39:08 - Sending management termination signal
. 2019.02.01 21:39:08 - Management - Send 'signal SIGTERM'
. 2019.02.01 21:39:08 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2019.02.01 21:39:08 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2019.02.01 21:39:13 - OpenVPN > /sbin/ip route del 184.75.223.202/32
. 2019.02.01 21:39:13 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2019.02.01 21:39:13 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2019.02.01 21:39:13 - OpenVPN > Closing TUN/TAP interface
. 2019.02.01 21:39:13 - OpenVPN > /sbin/ip addr del dev tun0 10.31.196.34/24
. 2019.02.01 21:39:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2019.02.01 21:39:13 - Connection terminated.
. 2019.02.01 21:39:13 - DNS of the system restored to original settings (Rename method)
I 2019.02.01 21:39:16 - Checking authorization ...
! 2019.02.01 21:39:16 - Connecting to Ukdah (Canada, Toronto, Ontario)
. 2019.02.01 21:39:16 - OpenVPN > OpenVPN 2.3.10 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Jun 22 2017
. 2019.02.01 21:39:16 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2019.02.01 21:39:16 - Connection to OpenVPN Management Interface
. 2019.02.01 21:39:16 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.02.01 21:39:16 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2019.02.01 21:39:16 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.02.01 21:39:16 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.02.01 21:39:16 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2019.02.01 21:39:16 - OpenVPN > UDPv4 link local: [undef]
. 2019.02.01 21:39:16 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.221.58:443
. 2019.02.01 21:39:16 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.58:443, sid=b1de8552 519e534f
. 2019.02.01 21:39:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.02.01 21:39:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.01 21:39:16 - OpenVPN > Validating certificate key usage
. 2019.02.01 21:39:16 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2019.02.01 21:39:16 - OpenVPN > VERIFY KU OK
. 2019.02.01 21:39:16 - OpenVPN > Validating certificate extended key usage
. 2019.02.01 21:39:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.01 21:39:16 - OpenVPN > VERIFY EKU OK
. 2019.02.01 21:39:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2019.02.01 21:39:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2019.02.01 21:39:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.02.01 21:39:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2019.02.01 21:39:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.02.01 21:39:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.01 21:39:17 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.58:443
. 2019.02.01 21:39:19 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2019.02.01 21:39:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.31.228.1,route-gateway 10.31.228.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.31.228.54 255.255.255.0,peer-id 11'
. 2019.02.01 21:39:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.02.01 21:39:19 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2019.02.01 21:39:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.02.01 21:39:19 - OpenVPN > OPTIONS IMPORT: route options modified
. 2019.02.01 21:39:19 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.02.01 21:39:19 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.02.01 21:39:19 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.02.01 21:39:19 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561
. 2019.02.01 21:39:19 - OpenVPN > ROUTE_GATEWAY 216.117.191.254/255.255.192.0 IFACE=eth0 HWADDR=f6:35:f8:27:46:9f
. 2019.02.01 21:39:19 - OpenVPN > TUN/TAP device tun0 opened
. 2019.02.01 21:39:19 - OpenVPN > TUN/TAP TX queue length set to 100
. 2019.02.01 21:39:19 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2019.02.01 21:39:19 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2019.02.01 21:39:19 - OpenVPN > /sbin/ip addr add dev tun0 10.31.228.54/24 broadcast 10.31.228.255
I 2019.02.01 21:39:23 - Break signal received. Shutdown. Hit again to force break.
. 2019.02.01 21:39:23 - OpenVPN > event_wait : Interrupted system call (code=4)
. 2019.02.01 21:39:23 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2019.02.01 21:39:23 - Shutdown in progress
! 2019.02.01 21:39:23 - Disconnecting
. 2019.02.01 21:39:23 - Sending management termination signal
. 2019.02.01 21:39:23 - Management - Send 'signal SIGTERM'
. 2019.02.01 21:39:23 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2019.02.01 21:39:23 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2019.02.01 21:39:23 - OpenVPN > Closing TUN/TAP interface
. 2019.02.01 21:39:23 - OpenVPN > /sbin/ip addr del dev tun0 10.31.228.54/24
. 2019.02.01 21:39:23 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2019.02.01 21:39:23 - Connection terminated.
I 2019.02.01 21:39:23 - Cancel requested.
! 2019.02.01 21:39:23 - Session terminated.
! 2019.02.01 21:39:24 - Logged out.
. 2019.02.01 21:39:24 - Shutdown complete
 
 
thought to use the mono or portable version but i cant find how to install it.  help with either would be awesome.
 
i get the same thing running sudo mono Eddie-CLI from the mono directory as well as when running sudo eddie-ui from the portable directory.

Share this post


Link to post

Hello!

 

Do you have the option to upgrade to OpenVPN 2.4.x? When our servers see version 2.4 or higher, they push IPv6 routes as well, solving the problem.

 

Alternatively, you can test Eddie 2.17 beta (if you're willing to try a beta version) which fixes the bug.

 

Explanation: OpenVPN versions older than 2.4 do not handle IPv6 properly. So our servers do not push IPv6 routes and related directives when they detect older versions, in order to not break retro-compatibility. However Eddie (for a bug in 2.16.3, fixed in 2.17.2beta) tries anyway to check the IPv6 route in the tunnel and it obviously fails.

Kind regards

Share this post


Link to post

i updated to 2.4 and tried the 2.17 version 

i installed the 2.17 deb then tried to connect using 

sudo /usr/bin/eddie-ui -cli with the login stuff

it started up then my connection to the server was cut and i couldnt reconnect until i rebooted.

tried it again with the same result

Share this post


Link to post
. 2019.02.03 16:24:22 - Eddie version: 2.17.2 / linux_x64, System: Linux, Name: Ubuntu 16.04.5 LTS \n \l, Version: Linux TRZG002 4.4.0-59-generic #80-Ubuntu SMP Fri Jan 6 17:47:47 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.2.1 (Debian 4.2.1.102+dfsg2-7ubuntu4); Framework: v4.0.30319

. 2019.02.03 16:24:22 - Reading options from /home/jason/.airvpn/default.xml

I 2019.02.03 16:24:22 - Press 'X' to Cancel, 'N' to connect/reconnect to the best available server.

I 2019.02.03 16:24:22 - Use -connect to start connection when application starts

. 2019.02.03 16:24:22 - Command line arguments (6): path="/home/jason/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" cli="True" login="xxxx" password="xxxxx

. 2019.02.03 16:24:22 - Profile path: /home/jason/.airvpn/default.xml

. 2019.02.03 16:24:24 - OpenVPN Driver - Found, /dev/net/tun

. 2019.02.03 16:24:24 - OpenVPN - Version: 2.4.6 - OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08 (/usr/sbin/openvpn)

. 2019.02.03 16:24:24 - SSH - Version: OpenSSH_7.2p2 Ubuntu-4ubuntu2.6, OpenSSL 1.0.2g  1 Mar 2016 (/usr/bin/ssh)

. 2019.02.03 16:24:24 - SSL - Version: stunnel 5.30 (/usr/bin/stunnel4)

. 2019.02.03 16:24:24 - curl - Version: 7.47.0 (/usr/bin/curl)

. 2019.02.03 16:24:24 - Certification Authorities: /usr/share/eddie-ui/cacert.pem

. 2019.02.03 16:24:24 - Recovery. Unexpected crash?

. 2019.02.03 16:24:24 - Routes, removed an existing route, 199.19.94.193 for gateway 10.30.166.1

. 2019.02.03 16:24:24 - Routes, removed an existing route, 2604:6880:c713:5e13:a196:b899:41c7:3787 for gateway fde6:7a:7d20:1aa6::1

. 2019.02.03 16:24:24 - DNS of the system restored to original settings (Rename method)

I 2019.02.03 16:24:24 - Checking login ...

! 2019.02.03 16:24:24 - Logged in.

I 2019.02.03 16:24:24 - Ready

. 2019.02.03 16:24:25 - Collect information about AirVPN completed

nI 2019.02.03 16:24:25 - Server switch requested from keyboard.

I 2019.02.03 16:24:25 - Session starting.

nI 2019.02.03 16:24:27 - Server switch requested from keyboard.

I 2019.02.03 16:24:28 - Checking authorization ...

! 2019.02.03 16:24:28 - Connecting to Ukdah (Canada, Toronto, Ontario)

. 2019.02.03 16:24:28 - OpenVPN > OpenVPN 2.4.6 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr 24 2018

. 2019.02.03 16:24:28 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08

. 2019.02.03 16:24:28 - Connection to OpenVPN Management Interface

. 2019.02.03 16:24:28 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2019.02.03 16:24:28 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

. 2019.02.03 16:24:28 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication

. 2019.02.03 16:24:28 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

. 2019.02.03 16:24:28 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication

. 2019.02.03 16:24:28 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.61:443

. 2019.02.03 16:24:28 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]

. 2019.02.03 16:24:28 - OpenVPN > UDP link local: (not bound)

. 2019.02.03 16:24:28 - OpenVPN > UDP link remote: [AF_INET]184.75.221.61:443

. 2019.02.03 16:24:28 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.61:443, sid=2d931192 e7413518

. 2019.02.03 16:24:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.03 16:24:28 - OpenVPN > VERIFY KU OK

. 2019.02.03 16:24:28 - OpenVPN > Validating certificate extended key usage

. 2019.02.03 16:24:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.03 16:24:28 - OpenVPN > VERIFY EKU OK

. 2019.02.03 16:24:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2019.02.03 16:24:28 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2019.02.03 16:24:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.03 16:24:28 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.61:443

. 2019.02.03 16:24:29 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2019.02.03 16:24:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.230.1,dhcp-option DNS6 fde6:7a:7d20:1be6::1,tun-ipv6,route-gateway 10.31.230.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1be6::1035/64 fde6:7a:7d20:1be6::1,ifconfig 10.31.230.55 255.255.255.0,peer-id 3,cipher AES-256-GCM'

. 2019.02.03 16:24:29 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'

. 2019.02.03 16:24:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2019.02.03 16:24:29 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2019.02.03 16:24:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2019.02.03 16:24:29 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2019.02.03 16:24:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2019.02.03 16:24:29 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2019.02.03 16:24:29 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2019.02.03 16:24:29 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2019.02.03 16:24:29 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2019.02.03 16:24:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.03 16:24:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.03 16:24:29 - OpenVPN > ROUTE_GATEWAY 198.7.63.254/255.255.255.128 IFACE=eth0 HWADDR=06:ba:a4:00:01:e7

. 2019.02.03 16:24:29 - OpenVPN > GDG6: remote_host_ipv6=n/a

. 2019.02.03 16:24:29 - OpenVPN > ROUTE6: default_gateway=UNDEF

. 2019.02.03 16:24:29 - OpenVPN > TUN/TAP device tun0 opened

. 2019.02.03 16:24:29 - OpenVPN > TUN/TAP TX queue length set to 100

. 2019.02.03 16:24:29 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1

. 2019.02.03 16:24:29 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500

. 2019.02.03 16:24:29 - OpenVPN > /sbin/ip addr add dev tun0 10.31.230.55/24 broadcast 10.31.230.255

. 2019.02.03 16:24:29 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:1be6::1035/64 dev tun0

. 2019.02.03 16:24:34 - OpenVPN > /sbin/ip route add 184.75.221.61/32 via 198.7.63.254

. 2019.02.03 16:24:34 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.31.230.1

. 2019.02.03 16:24:34 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.31.230.1

. 2019.02.03 16:24:34 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1be6::1 metric -1) dev tun0

. 2019.02.03 16:24:34 - OpenVPN > /sbin/ip -6 route add ::/3 dev tun0

. 2019.02.03 16:24:34 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1be6::1 metric -1) dev tun0

. 2019.02.03 16:24:34 - OpenVPN > /sbin/ip -6 route add 2000::/4 dev tun0

. 2019.02.03 16:24:34 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1be6::1 metric -1) dev tun0

. 2019.02.03 16:24:34 - OpenVPN > /sbin/ip -6 route add 3000::/4 dev tun0

. 2019.02.03 16:24:34 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1be6::1 metric -1) dev tun0

. 2019.02.03 16:24:34 - OpenVPN > /sbin/ip -6 route add fc00::/7 dev tun0

. 2019.02.03 16:24:34 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup

. 2019.02.03 16:24:34 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)

. 2019.02.03 16:24:34 - Routes, added a new route, 184.75.221.59 for gateway 10.31.230.1

. 2019.02.03 16:24:34 - Routes, added a new route, 2606:6080:1001:10:3c5b:63ff:df18:8486 for gateway fde6:7a:7d20:1be6::1

. 2019.02.03 16:24:34 - Flushing DNS

I 2019.02.03 16:24:34 - Checking route IPv4

I 2019.02.03 16:24:35 - Checking route IPv6

I 2019.02.03 16:24:35 - Checking DNS

! 2019.02.03 16:24:35 - Connected.

. 2019.02.03 16:24:35 - OpenVPN > Initialization Sequence Completed

! 2019.02.03 16:24:35 - Disconnecting

. 2019.02.03 16:24:35 - Routes, removed a route previously added, 184.75.221.59 for gateway 10.31.230.1

. 2019.02.03 16:24:35 - Routes, removed a route previously added, 2606:6080:1001:10:3c5b:63ff:df18:8486 for gateway fde6:7a:7d20:1be6::1

. 2019.02.03 16:24:35 - Sending management termination signal

. 2019.02.03 16:24:35 - Management - Send 'signal SIGTERM'

. 2019.02.03 16:24:36 - OpenVpn Management > SUCCESS: signal SIGTERM thrown

. 2019.02.03 16:24:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2019.02.03 16:24:36 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2019.02.03 16:24:40 - OpenVPN > /sbin/ip route del 184.75.221.61/32

. 2019.02.03 16:24:40 - OpenVPN > /sbin/ip route del 0.0.0.0/1

. 2019.02.03 16:24:40 - OpenVPN > /sbin/ip route del 128.0.0.0/1

. 2019.02.03 16:24:40 - OpenVPN > delete_route_ipv6(::/3)

. 2019.02.03 16:24:40 - OpenVPN > /sbin/ip -6 route del ::/3 dev tun0

. 2019.02.03 16:24:40 - OpenVPN > delete_route_ipv6(2000::/4)

. 2019.02.03 16:24:40 - OpenVPN > /sbin/ip -6 route del 2000::/4 dev tun0

. 2019.02.03 16:24:40 - OpenVPN > delete_route_ipv6(3000::/4)

. 2019.02.03 16:24:40 - OpenVPN > /sbin/ip -6 route del 3000::/4 dev tun0

. 2019.02.03 16:24:40 - OpenVPN > delete_route_ipv6(fc00::/7)

. 2019.02.03 16:24:40 - OpenVPN > /sbin/ip -6 route del fc00::/7 dev tun0

. 2019.02.03 16:24:40 - OpenVPN > Closing TUN/TAP interface

. 2019.02.03 16:24:40 - OpenVPN > /sbin/ip addr del dev tun0 10.31.230.55/24

. 2019.02.03 16:24:40 - OpenVPN > /sbin/ip -6 addr del fde6:7a:7d20:1be6::1035/64 dev tun0

. 2019.02.03 16:24:40 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2019.02.03 16:24:40 - Connection terminated.

. 2019.02.03 16:24:40 - DNS of the system restored to original settings (Rename method)

I 2019.02.03 16:24:40 - Checking authorization ...

! 2019.02.03 16:24:41 - Connecting to Ukdah (Canada, Toronto, Ontario)

. 2019.02.03 16:24:41 - OpenVPN > OpenVPN 2.4.6 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr 24 2018

. 2019.02.03 16:24:41 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08

. 2019.02.03 16:24:41 - Connection to OpenVPN Management Interface

. 2019.02.03 16:24:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2019.02.03 16:24:41 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

. 2019.02.03 16:24:41 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication

. 2019.02.03 16:24:41 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

. 2019.02.03 16:24:41 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication

. 2019.02.03 16:24:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.61:443

. 2019.02.03 16:24:41 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]

. 2019.02.03 16:24:41 - OpenVPN > UDP link local: (not bound)

. 2019.02.03 16:24:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.61:443

. 2019.02.03 16:24:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.61:443, sid=488d6777 cda423f1

. 2019.02.03 16:24:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2019.02.03 16:24:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.03 16:24:41 - OpenVPN > VERIFY KU OK

. 2019.02.03 16:24:41 - OpenVPN > Validating certificate extended key usage

. 2019.02.03 16:24:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.03 16:24:41 - OpenVPN > VERIFY EKU OK

. 2019.02.03 16:24:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2019.02.03 16:24:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.03 16:24:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.61:443

. 2019.02.03 16:24:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2019.02.03 16:24:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.230.1,dhcp-option DNS6 fde6:7a:7d20:1be6::1,tun-ipv6,route-gateway 10.31.230.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1be6::1035/64 fde6:7a:7d20:1be6::1,ifconfig 10.31.230.55 255.255.255.0,peer-id 3,cipher AES-256-GCM'

. 2019.02.03 16:24:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'

. 2019.02.03 16:24:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2019.02.03 16:24:42 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2019.02.03 16:24:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2019.02.03 16:24:42 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2019.02.03 16:24:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2019.02.03 16:24:42 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2019.02.03 16:24:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2019.02.03 16:24:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2019.02.03 16:24:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2019.02.03 16:24:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.03 16:24:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.03 16:24:42 - OpenVPN > ROUTE_GATEWAY 198.7.63.254/255.255.255.128 IFACE=eth0 HWADDR=06:ba:a4:00:01:e7

. 2019.02.03 16:24:42 - OpenVPN > GDG6: remote_host_ipv6=n/a

. 2019.02.03 16:24:42 - OpenVPN > ROUTE6: default_gateway=UNDEF

. 2019.02.03 16:24:42 - OpenVPN > TUN/TAP device tun0 opened

. 2019.02.03 16:24:42 - OpenVPN > TUN/TAP TX queue length set to 100

. 2019.02.03 16:24:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1

. 2019.02.03 16:24:42 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500

. 2019.02.03 16:24:42 - OpenVPN > /sbin/ip addr add dev tun0 10.31.230.55/24 broadcast 10.31.230.255

. 2019.02.03 16:24:42 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:1be6::1035/64 dev tun0

Share this post


Link to post

i got both 2.16 and 2.17 versions of the mono portable.  extracted the files.  cd into the new directory and ran

sudo mono Eddie-CLI.exe -cli -login='xxx' -password='xxx' -connect

 

mono version 4.2.1, openvpn 2.4.6, ubuntu 16.04

 

same results as before for both.  ssh connection lost and had to reboot the server.  

 

FYI:

the instructions on the downloads page still say to run mono AirVPN.exe 

"-connect"  doesn't work , still had to press N

Share this post


Link to post

if anyone ever has the same problem as i am having you may notice your server no longer has internet access.  add the line "nameserver 8.8.8.8"  to /etc/resolv.conf

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...