Jump to content
Not connected, Your IP: 18.232.124.77
betacat

ANSWERED Activation Of Network Lock is Slow

Recommended Posts

I just set up a new install of Linux Mint 19.1 Xfce, 64 bit. Eddie is taking 30 to 40 seconds to run "Activation of Network Lock - Iptables."

Connecting to a server was taking almost as long, but changing the Layer IPv6 in Network settings to "Block" cut my connect time down to about 12 seconds.

Any suggestions on how to speed up Network Lock activation? It only took about 10 seconds to load on my previous 32 bit machine .

Share this post


Link to post

The Eddie log could help.

Maybe also pasting the output of inxi, a system info gathering script, to get a general understanding of your system. This one gathers System, Mainboard, CPU, Network, general Info and a bit of privazy:
 

inxi -SMCNIz


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

Sure. That command didn't work so I just used the standard...

inxi -Fxz

...and altered any potentially private info.

Anyway, here ya go ...thanks:
 
Eddie System/Environment Report - 5/13/2019 12:34 AM UTC

Eddie version: 2.16.3
Eddie OS build: linux_x64
Eddie architecture: x64
OS type: Linux
OS name: Linux Mint 19.1 Tessa \n \l
OS version: Linux sytem-x 4.15.0-48-generic #51-Ubuntu SMP Wed Apr 3 08:28:49 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
OS architecture: x64
Mono /.Net Framework: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319
OpenVPN driver: Found, /dev/net/tun
OpenVPN: 2.4.4 - OpenSSL 1.1.0g  2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn)
SSH: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n  7 Dec 2017 (/usr/bin/ssh)
SSL: stunnel 5.44 (/usr/bin/stunnel4)
curl: 7.58.0 (/usr/bin/curl)
Profile path: /home/betacat/.airvpn/default.xml
Data path: /home/betacat/.airvpn
Application path: /usr/lib/eddie-ui
Executable path: /usr/lib/eddie-ui/Eddie-UI.exe
Command line arguments: (5 args) path="/home/betacat/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus"
Network Lock Active: Yes, Linux iptables
Connected to VPN: Yes, Telescopium
Detected DNS: 10.19.14.1
Test DNS IPv4: Ok
Test DNS IPv6: Ok
Test Ping IPv4: 58 ms
Test Ping IPv6: 22 ms
Test HTTP IPv4: Ok
Test HTTP IPv6: Error:curl: (28) Connection timed out after 20001 milliseconds
Test HTTPS: Ok
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
network.ipv6.mode: block
gui.tray_show: False
gui.tray_minimized: False

----------------------------
Logs:

. 2019.05.12 17:31:38 - Eddie version: 2.16.3 / linux_x64, System: Linux, Name: Linux Mint 19.1 Tessa \n \l, Version: Linux sytem-x 4.15.0-48-generic #51-Ubuntu SMP Wed Apr 3 08:28:49 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319
. 2019.05.12 17:31:39 - Reading options from /home/betacat/.airvpn/default.xml
. 2019.05.12 17:31:42 - Command line arguments (5): path="/home/betacat/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus"
. 2019.05.12 17:31:42 - Profile path: /home/betacat/.airvpn/default.xml
. 2019.05.12 17:31:44 - OpenVPN Driver - Found, /dev/net/tun
. 2019.05.12 17:31:44 - OpenVPN - Version: 2.4.4 - OpenSSL 1.1.0g  2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn)
. 2019.05.12 17:31:44 - SSH - Version: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n  7 Dec 2017 (/usr/bin/ssh)
. 2019.05.12 17:31:44 - SSL - Version: stunnel 5.44 (/usr/bin/stunnel4)
. 2019.05.12 17:31:44 - curl - Version: 7.58.0 (/usr/bin/curl)
. 2019.05.12 17:31:44 - Certification Authorities: /usr/share/eddie-ui/cacert.pem
. 2019.05.12 17:31:45 - Updating systems & servers data ...
I 2019.05.12 17:31:45 - Ready
. 2019.05.12 17:31:46 - Systems & servers data update completed
! 2019.05.12 17:32:04 - Activation of Network Lock - Linux iptables
I 2019.05.12 17:32:43 - Session starting.
I 2019.05.12 17:32:44 - Checking authorization ...
! 2019.05.12 17:32:44 - Connecting to Telescopium (Canada, Vancouver)
. 2019.05.12 17:32:44 - OpenVPN > OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep  5 2018
. 2019.05.12 17:32:44 - OpenVPN > library versions: OpenSSL 1.1.0g  2 Nov 2017, LZO 2.08
. 2019.05.12 17:32:44 - Connection to OpenVPN Management Interface
. 2019.05.12 17:32:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.05.12 17:32:45 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.05.12 17:32:45 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.05.12 17:32:45 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.05.12 17:32:45 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.05.12 17:32:45 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:443
. 2019.05.12 17:32:45 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2019.05.12 17:32:45 - OpenVPN > UDP link local: (not bound)
. 2019.05.12 17:32:45 - OpenVPN > UDP link remote: [AF_INET]192.30.89.53:443
. 2019.05.12 17:32:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.05.12 17:32:45 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.53:443, sid=6c9b55ab e6bd8843
. 2019.05.12 17:32:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.05.12 17:32:45 - OpenVPN > VERIFY KU OK
. 2019.05.12 17:32:45 - OpenVPN > Validating certificate extended key usage
. 2019.05.12 17:32:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.05.12 17:32:45 - OpenVPN > VERIFY EKU OK
. 2019.05.12 17:32:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org
. 2019.05.12 17:32:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.05.12 17:32:45 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.53:443
. 2019.05.12 17:32:46 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1)
. 2019.05.12 17:32:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.14.1,dhcp-option DNS6 fde6:7a:7d20:f0e::1,tun-ipv6,route-gateway 10.19.14.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:f0e::10bc/64 fde6:7a:7d20:f0e::1,ifconfig 10.19.14.190 255.255.255.0,peer-id 3,cipher AES-256-GCM'
. 2019.05.12 17:32:46 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2019.05.12 17:32:46 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:f0e::1'
. 2019.05.12 17:32:46 - OpenVPN > Pushed option removed by filter: 'tun-ipv6'
. 2019.05.12 17:32:46 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:f0e::10bc/64 fde6:7a:7d20:f0e::1'
. 2019.05.12 17:32:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.05.12 17:32:46 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.05.12 17:32:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.05.12 17:32:46 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.05.12 17:32:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.05.12 17:32:46 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.05.12 17:32:46 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2019.05.12 17:32:46 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.05.12 17:32:46 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.05.12 17:32:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.05.12 17:32:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.05.12 17:32:46 - OpenVPN > ROUTE_GATEWAY 000.000.0.254/255.255.255.0 IFACE=enp0s10 HWADDR=00:15:f2:82:7c:d4
. 2019.05.12 17:32:46 - OpenVPN > TUN/TAP device tun0 opened
. 2019.05.12 17:32:46 - OpenVPN > TUN/TAP TX queue length set to 100
. 2019.05.12 17:32:46 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2019.05.12 17:32:46 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2019.05.12 17:32:47 - OpenVPN > /sbin/ip addr add dev tun0 10.19.14.190/24 broadcast 10.19.14.255
. 2019.05.12 17:32:51 - OpenVPN > /sbin/ip route add 192.30.89.53/32 via 000.000.0.254
. 2019.05.12 17:32:51 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.19.14.1
. 2019.05.12 17:32:51 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.19.14.1
. 2019.05.12 17:32:51 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2019.05.12 17:32:51 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2019.05.12 17:32:52 - Routes, added a new route, 192.30.89.51 for gateway 10.19.14.1
. 2019.05.12 17:32:52 - Unable to compute route for 2606:9580:100:c:8757:8ee:ec9c:991c: IPv6 VPN gateway not available.
. 2019.05.12 17:32:52 - Flushing DNS
I 2019.05.12 17:33:40 - Checking route IPv4
I 2019.05.12 17:33:41 - Checking DNS
! 2019.05.12 17:33:41 - Connected.
. 2019.05.12 17:33:41 - OpenVPN > Initialization Sequence Completed

----------------------------
Network Interfaces and Routes:

{
    "support_ipv4": true,
    "support_ipv6": true,
    "routes": [
        {
            "address": "0.0.0.0\/1",
            "gateway": "10.19.14.1",
            "interface": "tun0"
        },
        {
            "address": "0.0.0.0\/0",
            "gateway": "000.000.0.254",
            "interface": "enp0s10",
            "metric": "100"
        },
        {
            "address": "128.0.0.0\/1",
            "gateway": "10.19.14.1",
            "interface": "tun0"
        },
        {
            "address": "192.30.89.51",
            "gateway": "10.19.14.1",
            "interface": "tun0"
        },
        {
            "address": "192.30.89.53",
            "gateway": "000.000.0.254",
            "interface": "enp0s10"
        },
        {
            "address": "2600:1700:cb80:2600::\/60",
            "gateway": "fe80::fa18:97ff:fe4b:47ed",
            "interface": "enp0s10",
            "metric": "100"
        },
        {
            "address": "::\/0",
            "gateway": "fe80::fa18:97ff:fe4b:47ed",
            "interface": "enp0s10",
            "metric": "100"
        }
    ],
    "interfaces": [
        {
            "friendly": "lo",
            "id": "lo",
            "name": "lo",
            "description": "lo",
            "type": "Loopback",
            "status": "Unknown",
            "bytes_received": "237445",
            "bytes_sent": "237445",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "127.0.0.1",
                "::1"
            ],
            "gateways": [],
            "bind": true
        },
        {
            "friendly": "enp0s10",
            "id": "enp0s10",
            "name": "enp0s10",
            "description": "enp0s10",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "4533163",
            "bytes_sent": "476361",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "000.000.0.00",
                "2600:1700:cb80:2600:7da5:57ea:9eac:d08a",
                "2600:1700:cb80:2600:ba96:d3fc:913a:8220",
                "fe80::b697:ad65:b913:32e4"
            ],
            "gateways": [
                "000.000.0.254",
                "fe80::fa18:97ff:fe4b:47ed"
            ],
            "bind": true
        },
        {
            "friendly": "tun0",
            "id": "tun0",
            "name": "tun0",
            "description": "tun0",
            "type": "0",
            "status": "Unknown",
            "bytes_received": "38297",
            "bytes_sent": "19249",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "10.19.14.190",
                "fe80::8d92:f31:2710:2980"
            ],
            "gateways": [
                "10.19.14.1"
            ],
            "bind": true
        }
    ],
    "ipv4-default-gateway": "000.000.0.254",
    "ipv4-default-interface": "enp0s10",
    "ipv6-default-gateway": "fe80::fa18:97ff:fe4b:47ed",
    "ipv6-default-interface": "enp0s10"
}
----------------------------
UID: 0
Run as normal user: True; ID:1000; Name:betacat
----------------------------
ip addr show:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: enp0s10: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:15:f2:82:7c:d4 brd ff:ff:ff:ff:ff:ff
    inet 000.000.0.00/24 brd 000.000.0.255 scope global dynamic noprefixroute enp0s10
       valid_lft 85578sec preferred_lft 85578sec
    inet6 2600:1700:cb80:2600:7da5:57ea:9eac:d08a/64 scope global temporary dynamic
       valid_lft 3579sec preferred_lft 3579sec
    inet6 2600:1700:cb80:2600:ba96:d3fc:913a:8220/64 scope global dynamic mngtmpaddr noprefixroute
       valid_lft 3579sec preferred_lft 3579sec
    inet6 fe80::b697:ad65:b913:32e4/64 scope link noprefixroute
       valid_lft forever preferred_lft forever
3: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 100
    link/none
    inet 10.19.14.190/24 brd 10.19.14.255 scope global tun0
       valid_lft forever preferred_lft forever
    inet6 fe80::8d92:f31:2710:2980/64 scope link stable-privacy
       valid_lft forever preferred_lft forever
----------------------------
ip link show:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: enp0s10: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000
    link/ether 00:15:f2:82:7c:d4 brd ff:ff:ff:ff:ff:ff
3: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN mode DEFAULT group default qlen 100
    link/none
----------------------------
ip -4 route show:

0.0.0.0/1 via 10.19.14.1 dev tun0
default via 000.000.0.254 dev enp0s10 proto dhcp metric 100
10.19.14.0/24 dev tun0 proto kernel scope link src 10.19.14.190
128.0.0.0/1 via 10.19.14.1 dev tun0
169.254.0.0/16 dev enp0s10 scope link metric 1000
192.30.89.51 via 10.19.14.1 dev tun0
192.30.89.53 via 000.000.0.254 dev enp0s10
000.000.0.0/24 dev enp0s10 proto kernel scope link src 000.000.0.00 metric 100
----------------------------
ip -6 route show:

2600:1700:cb80:2600::/64 dev enp0s10 proto ra metric 100 pref medium
2600:1700:cb80:2600::/60 via fe80::fa18:97ff:fe4b:47ed dev enp0s10 proto ra metric 100 pref high
fe80::/64 dev enp0s10 proto kernel metric 100 pref medium
fe80::/64 dev enp0s10 proto kernel metric 256 pref medium
fe80::/64 dev tun0 proto kernel metric 256 pref medium
default via fe80::fa18:97ff:fe4b:47ed dev enp0s10 proto ra metric 100 pref medium



PC System Info from Linux
===========================================================================

betacat@sytem-x:~$ inxi -SMCNIz
 
Error 22: Unsupported option:
Check -h for correct parameters.

--

betacat@sytem-x:~$ inxi -Fxz

System:
  Host: sytem-x Kernel: 4.15.0-48-generic x86_64 bits: 64 compiler: gcc
  v: 7.3.0 Desktop: Xfce 4.12.3 Distro: Linux Mint 19.1 Tessa
  base: Ubuntu 18.04 bionic
Machine:
  Type: Desktop Mobo: ASUSTeK model: A8N5X v: 1.XX serial: <filter>
  BIOS: Phoenix v: ASUS A8N5X Revision 1003 date: 06/01/2006
CPU:
  Topology: Dual Core model: AMD Athlon 64 X2 4200+ bits: 64 type: MCP
  arch: K8 rev.E rev: 2 L2 cache: 1024 KiB
  flags: lm nx pae sse sse2 sse3 bogomips: 4020
  Speed: 1000 MHz min/max: 1000/2200 MHz Core speeds (MHz): 1: 1000 2: 1000
Graphics:
  Device-1: NVIDIA GK208B [GeForce GT 710] vendor: Micro-Star MSI
  driver: nouveau v: kernel bus ID: 01:00.0
  Display: x11 server: X.Org 1.19.6 driver: nouveau
  unloaded: fbdev,modesetting,vesa resolution: 1280x1024~60Hz
  OpenGL: renderer: NV106 v: 4.3 Mesa 18.2.8 direct render: Yes
Audio:
  Device-1: NVIDIA CK804 AC97 Audio
  vendor: ASUSTeK K8N4/A8N Series Mainboard driver: snd_intel8x0 v: kernel
  bus ID: 00:04.0
  Device-2: NVIDIA GK208 HDMI/DP Audio vendor: Micro-Star MSI
  driver: snd_hda_intel v: kernel bus ID: 01:00.1
  Sound Server: ALSA v: k4.15.0-48-generic
Network:
  Device-1: NVIDIA CK804 Ethernet vendor: ASUSTeK K8N4/A8N Series Mainboard
  type: network bridge driver: forcedeth v: kernel port: b000
  bus ID: 00:0a.0
  IF: enp0s10 state: up speed: 100 Mbps duplex: full mac: <filter>
Drives:
  Local Storage: total: 335.32 GiB used: 31.24 GiB (9.3%)
  ID-1: /dev/sda vendor: Seagate model: ST3200826AS size: 186.31 GiB
  ID-2: /dev/sdb vendor: Seagate model: ST3160023AS size: 149.01 GiB
Partition:
  ID-1: / size: 182.38 GiB used: 31.24 GiB (17.1%) fs: ext4 dev: /dev/sda1
Sensors:
  System Temperatures: cpu: 40.0 C mobo: N/A gpu: nouveau temp: 39 C
  Fan Speeds (RPM): N/A
Info:
  Processes: 164 Uptime: 7m Memory: 2.93 GiB used: 804.4 MiB (26.8%)
  Init: systemd runlevel: 5 Compilers: gcc: 7.4.0 Shell: bash v: 4.4.19
  inxi: 3.0.27


 

Share this post


Link to post
15 hours ago, betacat said:

Eddie version: 2.16.3


First of all, you could try the most recent version which is 2.17.2.
 
15 hours ago, betacat said:

I 2019.05.12 17:31:45 - Ready
. 2019.05.12 17:31:46 - Systems & servers data update completed
! 2019.05.12 17:32:04 - Activation of Network Lock - Linux iptables
I 2019.05.12 17:32:43 - Session starting.


So, these gaps are truly puzzling. What if you call iptables -L for example, does it take as long as it does in the logs?

Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

Installing the new "Experimental" version solved the iptables issue - loading time was reduced to only a few seconds via the GUI 🙂.
Unfortunately this introduced a new problem; I could only browse online through the VPN 😕. Even if I disabled Network Lock and closed Eddie, I still couldn't go online (though I WAS actually connected). From advice I found in another post, I eliminated that problem by closing Eddie and running the following command in terminal:  sudo iptables -F 

Thanks,
giganerd.

Share this post


Link to post

The "new problem" has returned. Apparently the iptables -F command was only a temporary solution :( .
Is there a way to make it work permanently, or do I have to re-install the previous slow version of Eddie?

Share this post


Link to post

If you analyze your logs a second time, do you see a line like "Deactivation of Network Lock" after disconnection?


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

Yes. Here's my latest session log:
 

. 2019.05.14 09:52:00 - Eddie version: 2.17.2 / linux_x64, System: Linux, Name: Linux Mint 19.1 Tessa \n \l, Version: Linux system-x-tower 4.15.0-48-generic #51-Ubuntu SMP Wed Apr 3 08:28:49 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319
. 2019.05.14 09:52:01 - Reading options from /home/betacat/.airvpn/default.xml
. 2019.05.14 09:52:02 - Command line arguments (5): path="/home/betacat/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus"
. 2019.05.14 09:52:02 - Profile path: /home/betacat/.airvpn/default.xml
. 2019.05.14 09:52:03 - OpenVPN Driver - Found, /dev/net/tun
. 2019.05.14 09:52:03 - OpenVPN - Version: 2.4.4 - OpenSSL 1.1.0g  2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn)
. 2019.05.14 09:52:03 - SSH - Version: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n  7 Dec 2017 (/usr/bin/ssh)
. 2019.05.14 09:52:03 - SSL - Version: stunnel 5.44 (/usr/bin/stunnel4)
. 2019.05.14 09:52:03 - curl - Version: 7.58.0 (/usr/bin/curl)
. 2019.05.14 09:52:03 - Certification Authorities: /usr/share/eddie-ui/cacert.pem
I 2019.05.14 09:52:04 - Ready
. 2019.05.14 09:52:05 - Collect information about AirVPN completed
! 2019.05.14 09:52:09 - Activation of Network Lock - Linux iptables
I 2019.05.14 09:52:13 - Session starting.
I 2019.05.14 09:52:13 - Checking authorization ...
! 2019.05.14 09:52:14 - Connecting to Titawin (Canada, Vancouver)
. 2019.05.14 09:52:14 - OpenVPN > OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep  5 2018
. 2019.05.14 09:52:14 - OpenVPN > library versions: OpenSSL 1.1.0g  2 Nov 2017, LZO 2.08
. 2019.05.14 09:52:14 - Connection to OpenVPN Management Interface
. 2019.05.14 09:52:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.05.14 09:52:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.05.14 09:52:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.05.14 09:52:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.05.14 09:52:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.05.14 09:52:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.61:443
. 2019.05.14 09:52:14 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2019.05.14 09:52:14 - OpenVPN > UDP link local: (not bound)
. 2019.05.14 09:52:14 - OpenVPN > UDP link remote: [AF_INET]192.30.89.61:443
. 2019.05.14 09:52:14 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.61:443, sid=4c22ff82 48481e54
. 2019.05.14 09:52:14 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.05.14 09:52:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.05.14 09:52:14 - OpenVPN > VERIFY KU OK
. 2019.05.14 09:52:14 - OpenVPN > Validating certificate extended key usage
. 2019.05.14 09:52:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.05.14 09:52:14 - OpenVPN > VERIFY EKU OK
. 2019.05.14 09:52:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Titawin, emailAddress=info@airvpn.org
. 2019.05.14 09:52:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.05.14 09:52:15 - OpenVPN > [Titawin] Peer Connection Initiated with [AF_INET]192.30.89.61:443
. 2019.05.14 09:52:16 - OpenVPN > SENT CONTROL [Titawin]: 'PUSH_REQUEST' (status=1)
. 2019.05.14 09:52:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.78.1,dhcp-option DNS6 fde6:7a:7d20:104e::1,tun-ipv6,route-gateway 10.20.78.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:104e::106b/64 fde6:7a:7d20:104e::1,ifconfig 10.20.78.109 255.255.255.0,peer-id 4,cipher AES-256-GCM'
. 2019.05.14 09:52:16 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2019.05.14 09:52:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:104e::1'
. 2019.05.14 09:52:16 - OpenVPN > Pushed option removed by filter: 'tun-ipv6'
. 2019.05.14 09:52:16 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:104e::106b/64 fde6:7a:7d20:104e::1'
. 2019.05.14 09:52:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.05.14 09:52:16 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.05.14 09:52:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.05.14 09:52:16 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.05.14 09:52:16 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.05.14 09:52:16 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.05.14 09:52:16 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2019.05.14 09:52:16 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.05.14 09:52:16 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.05.14 09:52:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.05.14 09:52:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.05.14 09:52:16 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=enp0s10 HWADDR=00:15:f2:82:7c:d4
. 2019.05.14 09:52:16 - OpenVPN > TUN/TAP device tun0 opened
. 2019.05.14 09:52:16 - OpenVPN > TUN/TAP TX queue length set to 100
. 2019.05.14 09:52:16 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2019.05.14 09:52:16 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2019.05.14 09:52:16 - OpenVPN > /sbin/ip addr add dev tun0 10.20.78.109/24 broadcast 10.20.78.255
. 2019.05.14 09:52:21 - OpenVPN > /sbin/ip route add 192.30.89.61/32 via 192.168.1.254
. 2019.05.14 09:52:21 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.20.78.1
. 2019.05.14 09:52:21 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.20.78.1
. 2019.05.14 09:52:21 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2019.05.14 09:52:21 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2019.05.14 09:52:21 - Routes, added a new route, 192.30.89.59 for gateway 10.20.78.1
. 2019.05.14 09:52:21 - Unable to compute route for 2606:9580:100:d:2bd7:c37b:24c2:c069: IPv6 VPN gateway not available.
. 2019.05.14 09:52:21 - Flushing DNS
I 2019.05.14 09:52:21 - Checking route IPv4
I 2019.05.14 09:52:22 - Checking DNS
! 2019.05.14 09:52:22 - Connected.
. 2019.05.14 09:52:22 - OpenVPN > Initialization Sequence Completed
! 2019.05.14 09:52:33 - Disconnecting
. 2019.05.14 09:52:33 - Routes, removed a route previously added, 192.30.89.59 for gateway 10.20.78.1
. 2019.05.14 09:52:33 - Sending management termination signal
. 2019.05.14 09:52:33 - Management - Send 'signal SIGTERM'
. 2019.05.14 09:52:33 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2019.05.14 09:52:33 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2019.05.14 09:52:38 - OpenVPN > /sbin/ip route del 192.30.89.61/32
. 2019.05.14 09:52:38 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2019.05.14 09:52:38 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2019.05.14 09:52:38 - OpenVPN > Closing TUN/TAP interface
. 2019.05.14 09:52:38 - OpenVPN > /sbin/ip addr del dev tun0 10.20.78.109/24
. 2019.05.14 09:52:38 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2019.05.14 09:52:38 - Connection terminated.
. 2019.05.14 09:52:38 - DNS of the system restored to original settings (Rename method)
. 2019.05.14 09:52:38 - Flushing DNS
! 2019.05.14 09:52:38 - Session terminated.
! 2019.05.14 09:52:43 - Deactivation of Network Lock

Share this post


Link to post

How about adding an event in Eddie to flush the iptables after Eddie closes using some kind of script? I'm guessing it could be added under Settings > Events > App End, but I have not idea how to do that.

Anyone?

Share this post


Link to post

This is default behavior of Eddie but apparently it's bugged on your system. There is the possibility to invoke a command at certain OpenVPN events, for example, after disconnection.

--down cmd
Run command cmd after TUN/TAP device close (post --user UID change and/or --chroot ). cmd consists of a path to script (or executable program), optionally followed by arguments. The path and arguments may be single- or double-quoted and/or escaped using a backslash, and should be separated by one or more spaces.

Called with the same parameters and environmental variables as the --up option above.

Note that if you reduce privileges by using --user and/or --group, your --down script will also run at reduced privilege.

In Eddie > Preferences > OpenVPN directives, try entering this as a custom directive, then see if it fixes things:

down "iptables -F"


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

Can you try a connection with the root account?


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

su -l root
[enter password]
eddie-ui


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

First of all, thank you for hanging in there - I really appreciate your help :).
Getting that command to work was tricky. After entering it, I would only see:

su: Authentication failure


I then tried the following (from a post on the "ask ubuntu" forum):

user@user-ubuntu1:~$ sudo passwd
[sudo] password for user: # enter your sudo password here
Enter new UNIX password: # enter the password you want for your su password here
Retype new UNIX password: # reenter your new su password
passwd: password updated successfully


Entering "su -l root" required a couple of tries after that but it finally worked. Unfortunately, running Eddie from terminal did not affect my issue. If it helps, here's a copy of my terminal session:

betacat@system-x:~$ su -l root
Password:
root@system-x:~# eddie-ui
. 2019.05.17 10:06:32 - Eddie version: 2.17.2 / linux_x64, System: Linux, Name: Linux Mint 19.1 Tessa \n \l, Version: Linux system-x 4.15.0-50-generic #54-Ubuntu SMP Mon May 6 18:46:08 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319
. 2019.05.17 10:06:32 - Reading options from /root/.airvpn/default.xml
. 2019.05.17 10:06:32 - Profile options not found, using defaults.
. 2019.05.17 10:06:35 - Command line arguments (3): path="/root/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
. 2019.05.17 10:06:35 - Profile path: /root/.airvpn/default.xml
. 2019.05.17 10:06:38 - OpenVPN Driver - Found, /dev/net/tun
. 2019.05.17 10:06:38 - OpenVPN - Version: 2.4.4 - OpenSSL 1.1.0g  2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn)
. 2019.05.17 10:06:38 - SSH - Version: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n  7 Dec 2017 (/usr/bin/ssh)
. 2019.05.17 10:06:38 - SSL - Version: stunnel 5.44 (/usr/bin/stunnel4)
. 2019.05.17 10:06:38 - curl - Version: 7.58.0 (/usr/bin/curl)
. 2019.05.17 10:06:38 - Certification Authorities: /usr/share/eddie-ui/cacert.pem
I 2019.05.17 10:06:38 - Ready
. 2019.05.17 10:06:40 - Collect information about AirVPN completed
I 2019.05.17 10:07:42 - Checking login ...
! 2019.05.17 10:07:42 - Logged in.
! 2019.05.17 10:07:57 - Activation of Network Lock - Linux iptables
I 2019.05.17 10:08:17 - Session starting.
I 2019.05.17 10:08:17 - Checking authorization ...
! 2019.05.17 10:08:18 - Connecting to Titawin (Canada, Vancouver)
. 2019.05.17 10:08:18 - OpenVPN > OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep  5 2018
. 2019.05.17 10:08:18 - OpenVPN > library versions: OpenSSL 1.1.0g  2 Nov 2017, LZO 2.08
. 2019.05.17 10:08:18 - Connection to OpenVPN Management Interface
. 2019.05.17 10:08:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.05.17 10:08:18 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.05.17 10:08:18 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.05.17 10:08:18 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.05.17 10:08:18 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.05.17 10:08:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]xxx.xx.xx.xx:xxx
. 2019.05.17 10:08:18 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2019.05.17 10:08:18 - OpenVPN > UDP link local: (not bound)
. 2019.05.17 10:08:18 - OpenVPN > UDP link remote: [AF_INET]xxx.xx.xx.xx:xxx
. 2019.05.17 10:08:18 - OpenVPN > TLS: Initial packet from [AF_INET]xxx.xx.xx.xx:xxx, sid=d42a9ff5 c405ba44
. 2019.05.17 10:08:18 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.05.17 10:08:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.05.17 10:08:18 - OpenVPN > VERIFY KU OK
. 2019.05.17 10:08:18 - OpenVPN > Validating certificate extended key usage
. 2019.05.17 10:08:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.05.17 10:08:18 - OpenVPN > VERIFY EKU OK
. 2019.05.17 10:08:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Titawin, emailAddress=info@airvpn.org
. 2019.05.17 10:08:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.05.17 10:08:18 - OpenVPN > [Titawin] Peer Connection Initiated with [AF_INET]xxx.xx.xx.xx:xxx
. 2019.05.17 10:08:19 - OpenVPN > SENT CONTROL [Titawin]: 'PUSH_REQUEST' (status=1)
. 2019.05.17 10:08:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.78.1,dhcp-option DNS6 fde6:7a:7d20:104e::1,tun-ipv6,route-gateway 10.20.78.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:104e::106b/64 fde6:7a:7d20:104e::1,ifconfig x0.x0.xx.xxx xxx.xxx.xxx.0,peer-id 12,cipher AES-256-GCM'
. 2019.05.17 10:08:20 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2019.05.17 10:08:20 - OpenVPN > Note: option tun-ipv6 is ignored because modern operating systems do not need special IPv6 tun handling anymore.
. 2019.05.17 10:08:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.05.17 10:08:20 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.05.17 10:08:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.05.17 10:08:20 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.05.17 10:08:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.05.17 10:08:20 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.05.17 10:08:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2019.05.17 10:08:20 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.05.17 10:08:20 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.05.17 10:08:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.05.17 10:08:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.05.17 10:08:20 - OpenVPN > ROUTE_GATEWAY xxx.xxx.x.xxx/xxx.xxx.xxx.0 IFACE=enp0s10 HWADDR=00:15:f2:82:7c:d4
. 2019.05.17 10:08:20 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2019.05.17 10:08:20 - OpenVPN > ROUTE6_GATEWAY fe80::fa18:97ff:fe4b:47ed IFACE=enp0s10
. 2019.05.17 10:08:20 - OpenVPN > TUN/TAP device tun0 opened
. 2019.05.17 10:08:20 - OpenVPN > TUN/TAP TX queue length set to 100
. 2019.05.17 10:08:20 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2019.05.17 10:08:20 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2019.05.17 10:08:20 - OpenVPN > /sbin/ip addr add dev tun0 10.20.78.109/24 broadcast 10.20.78.255
. 2019.05.17 10:08:20 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:104e::106b/64 dev tun0
. 2019.05.17 10:08:24 - OpenVPN > /sbin/ip route add xxx.xx.xx.xx/xx via xxx.xxx.x.xxx
. 2019.05.17 10:08:24 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via x0.x0.xx.x
. 2019.05.17 10:08:24 - OpenVPN > /sbin/ip route add xxx.0.0.0/x via xx.x0.xx.x
. 2019.05.17 10:08:24 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:104e::1 metric -1) dev tun0
. 2019.05.17 10:08:24 - OpenVPN > /sbin/ip -6 route add ::/3 dev tun0
. 2019.05.17 10:08:24 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:104e::1 metric -1) dev tun0
. 2019.05.17 10:08:24 - OpenVPN > /sbin/ip -6 route add 2000::/4 dev tun0
. 2019.05.17 10:08:24 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:104e::1 metric -1) dev tun0
. 2019.05.17 10:08:24 - OpenVPN > /sbin/ip -6 route add 3000::/4 dev tun0
. 2019.05.17 10:08:24 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:104e::1 metric -1) dev tun0
. 2019.05.17 10:08:24 - OpenVPN > /sbin/ip -6 route add fc00::/7 dev tun0
. 2019.05.17 10:08:24 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2019.05.17 10:08:24 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2019.05.17 10:08:24 - Routes, added a new route, xxx.xx.xx.xx for gateway x0.x0.xx.x
. 2019.05.17 10:08:33 - Routes, added a new route, 2606:9580:100:d:2bd7:c37b:24c2:c069 for gateway fde6:7a:7d20:104e::1
. 2019.05.17 10:08:42 - Flushing DNS
I 2019.05.17 10:08:47 - Checking route IPv4
I 2019.05.17 10:08:49 - Checking route IPv6
I 2019.05.17 10:08:49 - Checking DNS
! 2019.05.17 10:08:50 - Connected.
. 2019.05.17 10:08:50 - OpenVPN > Initialization Sequence Completed
! 2019.05.17 10:22:02 - Disconnecting
. 2019.05.17 10:22:03 - Routes, removed a route previously added, xxx.x0.xx.xx for gateway x0.x0.xx.x
. 2019.05.17 10:22:03 - Routes, removed a route previously added, 2606:9580:100:d:2bd7:c37b:24c2:c069 for gateway fde6:7a:7d20:104e::1
. 2019.05.17 10:22:03 - Sending management termination signal
. 2019.05.17 10:22:03 - Management - Send 'signal SIGTERM'
. 2019.05.17 10:22:03 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2019.05.17 10:22:03 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2019.05.17 10:22:08 - OpenVPN > /sbin/ip route del xxx.x0.xx.xx/xx
. 2019.05.17 10:22:08 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2019.05.17 10:22:08 - OpenVPN > /sbin/ip route del xxx.0.0.0/x
. 2019.05.17 10:22:08 - OpenVPN > delete_route_ipv6(::/3)
. 2019.05.17 10:22:08 - OpenVPN > /sbin/ip -6 route del ::/3 dev tun0
. 2019.05.17 10:22:08 - OpenVPN > delete_route_ipv6(2000::/4)
. 2019.05.17 10:22:08 - OpenVPN > /sbin/ip -6 route del 2000::/4 dev tun0
. 2019.05.17 10:22:08 - OpenVPN > delete_route_ipv6(3000::/4)
. 2019.05.17 10:22:08 - OpenVPN > /sbin/ip -6 route del 3000::/4 dev tun0
. 2019.05.17 10:22:08 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2019.05.17 10:22:08 - OpenVPN > /sbin/ip -6 route del fc00::/7 dev tun0
. 2019.05.17 10:22:08 - OpenVPN > Closing TUN/TAP interface
. 2019.05.17 10:22:08 - OpenVPN > /sbin/ip addr del dev tun0 10.20.78.109/24
. 2019.05.17 10:22:08 - OpenVPN > /sbin/ip -6 addr del fde6:7a:7d20:104e::106b/64 dev tun0
. 2019.05.17 10:22:08 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2019.05.17 10:22:08 - Connection terminated.
. 2019.05.17 10:22:08 - DNS of the system restored to original settings (Rename method)
. 2019.05.17 10:22:08 - Flushing DNS
! 2019.05.17 10:22:08 - Session terminated.
! 2019.05.17 10:22:11 - Deactivation of Network Lock
. 2019.05.17 10:22:20 - Shutdown in progress
. 2019.05.17 10:22:21 - Shutdown complete
root@system-x:~#
 

Share this post


Link to post

Hm. Do this again like you always use Eddie but after disconnection create a support file instead. You find it in the logs tab, a swimming ring icon on the right. You can choose to only paste the last 20-30 log lines, if you want. I'm only interested in the verbose output around that NetLock deactivation message, I think it shows the command used, its execution status and everything that might get posted as an error.

And generally, I really like how you are not turning away from this either, thinking for yourself working out solutions for smaller issues around your main one. Keep it up, I'm sure we get behind all this, and thank you!


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

Thanks for the kind words! Here's the log:

Eddie System/Environment Report - 5/17/2019 10:43 PM UTC

Eddie version: 2.17.2
Eddie OS build: linux_x64
Eddie architecture: x64
OS type: Linux
OS name: Linux Mint 19.1 Tessa \n \l
OS version: Linux system-x 4.15.0-50-generic #54-Ubuntu SMP Mon May 6 18:46:08 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
OS architecture: x64
Mono /.Net Framework: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319
OpenVPN driver: Found, /dev/net/tun
OpenVPN: 2.4.4 - OpenSSL 1.1.0g  2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn)
SSH: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n  7 Dec 2017 (/usr/bin/ssh)
SSL: stunnel 5.44 (/usr/bin/stunnel4)
curl: 7.58.0 (/usr/bin/curl)
Profile path: /home/betacat/.airvpn/default.xml
Data path: /home/betacat/.airvpn
Application path: /usr/lib/eddie-ui
Executable path: /usr/lib/eddie-ui/Eddie-UI.exe
Command line arguments: (5 args) path="/home/betacat/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus"
Network Lock Active: No
Connected to VPN: No
Detected DNS: 127.0.0.53
Test DNS IPv4: Ok
Test DNS IPv6: Ok
Test Ping IPv4: -1 ms
Test Ping IPv6: 174 ms
Test HTTP IPv4: Error:curl: (28) Connection timed out after 20001 milliseconds
Test HTTP IPv6: Ok
Test HTTPS: Ok
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
gui.tray_show: False
gui.tray_minimized: False

----------------------------
Logs:

. 2019.05.17 15:41:35 - Eddie version: 2.17.2 / linux_x64, System: Linux, Name: Linux Mint 19.1 Tessa \n \l, Version: Linux system-x 4.15.0-50-generic #54-Ubuntu SMP Mon May 6 18:46:08 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319
. 2019.05.17 15:41:35 - Reading options from /home/betacat/.airvpn/default.xml
. 2019.05.17 15:41:36 - Command line arguments (5): path="/home/betacat/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus"
. 2019.05.17 15:41:36 - Profile path: /home/betacat/.airvpn/default.xml
. 2019.05.17 15:41:38 - OpenVPN Driver - Found, /dev/net/tun
. 2019.05.17 15:41:38 - OpenVPN - Version: 2.4.4 - OpenSSL 1.1.0g  2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn)
. 2019.05.17 15:41:38 - SSH - Version: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n  7 Dec 2017 (/usr/bin/ssh)
. 2019.05.17 15:41:38 - SSL - Version: stunnel 5.44 (/usr/bin/stunnel4)
. 2019.05.17 15:41:38 - curl - Version: 7.58.0 (/usr/bin/curl)
. 2019.05.17 15:41:38 - Certification Authorities: /usr/share/eddie-ui/cacert.pem
I 2019.05.17 15:41:39 - Ready
. 2019.05.17 15:41:40 - Collect information about AirVPN completed

----------------------------
Network Interfaces and Routes:

{
    "support_ipv4": true,
    "support_ipv6": true,
    "routes": [
        {
            "address": "0.0.0.0\/0",
            "gateway": "xxx.xxx.x.xxx",
            "interface": "enp0s10",
            "metric": "20100"
        },
        {
            "address": "2600:1700:cb80:2600::\/60",
            "gateway": "fe80::fa18:97ff:fe4b:47ed",
            "interface": "enp0s10",
            "metric": "100"
        },
        {
            "address": "::\/0",
            "gateway": "fe80::fa18:97ff:fe4b:47ed",
            "interface": "enp0s10",
            "metric": "20100"
        }
    ],
    "interfaces": [
        {
            "friendly": "lo",
            "id": "lo",
            "name": "lo",
            "description": "lo",
            "type": "Loopback",
            "status": "Unknown",
            "bytes_received": "8879028",
            "bytes_sent": "8879028",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "xxx.x.x.x",
                "::1"
            ],
            "gateways": [],
            "bind": true
        },
        {
            "friendly": "enp0s10",
            "id": "enp0s10",
            "name": "enp0s10",
            "description": "enp0s10",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "6003777086",
            "bytes_sent": "661455669",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "xxx.xxx.x.66",
                "2600:1700:cb80:2600:2501:60ed:7ae6:faf9",
                "2600:1700:cb80:2600:ba96:d3fc:913a:8220",
                "fe80::b697:ad65:b913:32e4"
            ],
            "gateways": [
                "xxx.xxx.x.xxx",
                "fe80::fa18:97ff:fe4b:47ed"
            ],
            "bind": true
        }
    ],
    "ipv4-default-gateway": "xxx.xxx.x.xxx",
    "ipv4-default-interface": "enp0s10",
    "ipv6-default-gateway": "fe80::fa18:97ff:fe4b:47ed",
    "ipv6-default-interface": "enp0s10"
}
----------------------------
UID: 0
Run as normal user: True; ID:1000; Name:betacat
----------------------------
ip addr show:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet xxx.x.x.x/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: enp0s10: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 00:15:f2:82:7c:d4 brd ff:ff:ff:ff:ff:ff
    inet xxx.xxx.x.66/24 brd xxx.xxx.x.255 scope global dynamic noprefixroute enp0s10
       valid_lft 73849sec preferred_lft 73849sec
    inet6 2600:1700:cb80:2600:2501:60ed:7ae6:faf9/64 scope global temporary dynamic
       valid_lft 3580sec preferred_lft 3580sec
    inet6 2600:1700:cb80:2600:ba96:d3fc:913a:8220/64 scope global dynamic mngtmpaddr noprefixroute
       valid_lft 3580sec preferred_lft 3580sec
    inet6 fe80::b697:ad65:b913:32e4/64 scope link noprefixroute
       valid_lft forever preferred_lft forever
----------------------------
ip link show:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: enp0s10: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000
    link/ether 00:15:f2:82:7c:d4 brd ff:ff:ff:ff:ff:ff
----------------------------
ip -4 route show:

default via xxx.xxx.x.xxx dev enp0s10 proto dhcp metric 20100
xxx.xxx.0.0/16 dev enp0s10 scope link metric 1000
xxx.xxx.x.0/24 dev enp0s10 proto kernel scope link src xxx.xxx.x.66 metric 100
----------------------------
ip -6 route show:

2600:1700:cb80:2600::/64 dev enp0s10 proto ra metric 100 pref medium
2600:1700:cb80:2600::/60 via fe80::fa18:97ff:fe4b:47ed dev enp0s10 proto ra metric 100 pref high
fe80::/64 dev enp0s10 proto kernel metric 100 pref medium
fe80::/64 dev enp0s10 proto kernel metric 256 pref medium
default via fe80::fa18:97ff:fe4b:47ed dev enp0s10 proto ra metric 20100 pref medium

Share this post


Link to post

Hm. Pity. Nothing interesting in there.


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

Thank you! It's rarely a bug, so I kept thinking it was something with the system. :D

I really like how you got to the bottom of this. You deserve a medal for hanging in there. :DSeriously respect your efforts :)


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...