betacat 14 Posted ... I just set up a new install of Linux Mint 19.1 Xfce, 64 bit. Eddie is taking 30 to 40 seconds to run "Activation of Network Lock - Iptables." Connecting to a server was taking almost as long, but changing the Layer IPv6 in Network settings to "Block" cut my connect time down to about 12 seconds. Any suggestions on how to speed up Network Lock activation? It only took about 10 seconds to load on my previous 32 bit machine . Share this post Link to post
OpenSourcerer 1435 Posted ... The Eddie log could help. Maybe also pasting the output of inxi, a system info gathering script, to get a general understanding of your system. This one gathers System, Mainboard, CPU, Network, general Info and a bit of privazy: inxi -SMCNIz Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
betacat 14 Posted ... Sure. That command didn't work so I just used the standard... inxi -Fxz ...and altered any potentially private info. Anyway, here ya go ...thanks: Eddie System/Environment Report - 5/13/2019 12:34 AM UTC Eddie version: 2.16.3 Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: Linux Mint 19.1 Tessa \n \l OS version: Linux sytem-x 4.15.0-48-generic #51-Ubuntu SMP Wed Apr 3 08:28:49 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux OS architecture: x64 Mono /.Net Framework: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319 OpenVPN driver: Found, /dev/net/tun OpenVPN: 2.4.4 - OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn) SSH: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n 7 Dec 2017 (/usr/bin/ssh) SSL: stunnel 5.44 (/usr/bin/stunnel4) curl: 7.58.0 (/usr/bin/curl) Profile path: /home/betacat/.airvpn/default.xml Data path: /home/betacat/.airvpn Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/Eddie-UI.exe Command line arguments: (5 args) path="/home/betacat/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus" Network Lock Active: Yes, Linux iptables Connected to VPN: Yes, Telescopium Detected DNS: 10.19.14.1 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 58 ms Test Ping IPv6: 22 ms Test HTTP IPv4: Ok Test HTTP IPv6: Error:curl: (28) Connection timed out after 20001 milliseconds Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True network.ipv6.mode: block gui.tray_show: False gui.tray_minimized: False ---------------------------- Logs: . 2019.05.12 17:31:38 - Eddie version: 2.16.3 / linux_x64, System: Linux, Name: Linux Mint 19.1 Tessa \n \l, Version: Linux sytem-x 4.15.0-48-generic #51-Ubuntu SMP Wed Apr 3 08:28:49 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319 . 2019.05.12 17:31:39 - Reading options from /home/betacat/.airvpn/default.xml . 2019.05.12 17:31:42 - Command line arguments (5): path="/home/betacat/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus" . 2019.05.12 17:31:42 - Profile path: /home/betacat/.airvpn/default.xml . 2019.05.12 17:31:44 - OpenVPN Driver - Found, /dev/net/tun . 2019.05.12 17:31:44 - OpenVPN - Version: 2.4.4 - OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn) . 2019.05.12 17:31:44 - SSH - Version: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n 7 Dec 2017 (/usr/bin/ssh) . 2019.05.12 17:31:44 - SSL - Version: stunnel 5.44 (/usr/bin/stunnel4) . 2019.05.12 17:31:44 - curl - Version: 7.58.0 (/usr/bin/curl) . 2019.05.12 17:31:44 - Certification Authorities: /usr/share/eddie-ui/cacert.pem . 2019.05.12 17:31:45 - Updating systems & servers data ... I 2019.05.12 17:31:45 - Ready . 2019.05.12 17:31:46 - Systems & servers data update completed ! 2019.05.12 17:32:04 - Activation of Network Lock - Linux iptables I 2019.05.12 17:32:43 - Session starting. I 2019.05.12 17:32:44 - Checking authorization ... ! 2019.05.12 17:32:44 - Connecting to Telescopium (Canada, Vancouver) . 2019.05.12 17:32:44 - OpenVPN > OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 5 2018 . 2019.05.12 17:32:44 - OpenVPN > library versions: OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 . 2019.05.12 17:32:44 - Connection to OpenVPN Management Interface . 2019.05.12 17:32:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.05.12 17:32:45 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.12 17:32:45 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.12 17:32:45 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.12 17:32:45 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.12 17:32:45 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:443 . 2019.05.12 17:32:45 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2019.05.12 17:32:45 - OpenVPN > UDP link local: (not bound) . 2019.05.12 17:32:45 - OpenVPN > UDP link remote: [AF_INET]192.30.89.53:443 . 2019.05.12 17:32:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.05.12 17:32:45 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.53:443, sid=6c9b55ab e6bd8843 . 2019.05.12 17:32:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.05.12 17:32:45 - OpenVPN > VERIFY KU OK . 2019.05.12 17:32:45 - OpenVPN > Validating certificate extended key usage . 2019.05.12 17:32:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.05.12 17:32:45 - OpenVPN > VERIFY EKU OK . 2019.05.12 17:32:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org . 2019.05.12 17:32:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.05.12 17:32:45 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.53:443 . 2019.05.12 17:32:46 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1) . 2019.05.12 17:32:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.14.1,dhcp-option DNS6 fde6:7a:7d20:f0e::1,tun-ipv6,route-gateway 10.19.14.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:f0e::10bc/64 fde6:7a:7d20:f0e::1,ifconfig 10.19.14.190 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2019.05.12 17:32:46 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.05.12 17:32:46 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:f0e::1' . 2019.05.12 17:32:46 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2019.05.12 17:32:46 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:f0e::10bc/64 fde6:7a:7d20:f0e::1' . 2019.05.12 17:32:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.05.12 17:32:46 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.05.12 17:32:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.05.12 17:32:46 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.05.12 17:32:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.05.12 17:32:46 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.05.12 17:32:46 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.05.12 17:32:46 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.05.12 17:32:46 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.05.12 17:32:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.12 17:32:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.12 17:32:46 - OpenVPN > ROUTE_GATEWAY 000.000.0.254/255.255.255.0 IFACE=enp0s10 HWADDR=00:15:f2:82:7c:d4 . 2019.05.12 17:32:46 - OpenVPN > TUN/TAP device tun0 opened . 2019.05.12 17:32:46 - OpenVPN > TUN/TAP TX queue length set to 100 . 2019.05.12 17:32:46 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2019.05.12 17:32:46 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2019.05.12 17:32:47 - OpenVPN > /sbin/ip addr add dev tun0 10.19.14.190/24 broadcast 10.19.14.255 . 2019.05.12 17:32:51 - OpenVPN > /sbin/ip route add 192.30.89.53/32 via 000.000.0.254 . 2019.05.12 17:32:51 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.19.14.1 . 2019.05.12 17:32:51 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.19.14.1 . 2019.05.12 17:32:51 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2019.05.12 17:32:51 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2019.05.12 17:32:52 - Routes, added a new route, 192.30.89.51 for gateway 10.19.14.1 . 2019.05.12 17:32:52 - Unable to compute route for 2606:9580:100:c:8757:8ee:ec9c:991c: IPv6 VPN gateway not available. . 2019.05.12 17:32:52 - Flushing DNS I 2019.05.12 17:33:40 - Checking route IPv4 I 2019.05.12 17:33:41 - Checking DNS ! 2019.05.12 17:33:41 - Connected. . 2019.05.12 17:33:41 - OpenVPN > Initialization Sequence Completed ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/1", "gateway": "10.19.14.1", "interface": "tun0" }, { "address": "0.0.0.0\/0", "gateway": "000.000.0.254", "interface": "enp0s10", "metric": "100" }, { "address": "128.0.0.0\/1", "gateway": "10.19.14.1", "interface": "tun0" }, { "address": "192.30.89.51", "gateway": "10.19.14.1", "interface": "tun0" }, { "address": "192.30.89.53", "gateway": "000.000.0.254", "interface": "enp0s10" }, { "address": "2600:1700:cb80:2600::\/60", "gateway": "fe80::fa18:97ff:fe4b:47ed", "interface": "enp0s10", "metric": "100" }, { "address": "::\/0", "gateway": "fe80::fa18:97ff:fe4b:47ed", "interface": "enp0s10", "metric": "100" } ], "interfaces": [ { "friendly": "lo", "id": "lo", "name": "lo", "description": "lo", "type": "Loopback", "status": "Unknown", "bytes_received": "237445", "bytes_sent": "237445", "support_ipv4": true, "support_ipv6": true, "ips": [ "127.0.0.1", "::1" ], "gateways": [], "bind": true }, { "friendly": "enp0s10", "id": "enp0s10", "name": "enp0s10", "description": "enp0s10", "type": "Ethernet", "status": "Up", "bytes_received": "4533163", "bytes_sent": "476361", "support_ipv4": true, "support_ipv6": true, "ips": [ "000.000.0.00", "2600:1700:cb80:2600:7da5:57ea:9eac:d08a", "2600:1700:cb80:2600:ba96:d3fc:913a:8220", "fe80::b697:ad65:b913:32e4" ], "gateways": [ "000.000.0.254", "fe80::fa18:97ff:fe4b:47ed" ], "bind": true }, { "friendly": "tun0", "id": "tun0", "name": "tun0", "description": "tun0", "type": "0", "status": "Unknown", "bytes_received": "38297", "bytes_sent": "19249", "support_ipv4": true, "support_ipv6": true, "ips": [ "10.19.14.190", "fe80::8d92:f31:2710:2980" ], "gateways": [ "10.19.14.1" ], "bind": true } ], "ipv4-default-gateway": "000.000.0.254", "ipv4-default-interface": "enp0s10", "ipv6-default-gateway": "fe80::fa18:97ff:fe4b:47ed", "ipv6-default-interface": "enp0s10" } ---------------------------- UID: 0 Run as normal user: True; ID:1000; Name:betacat ---------------------------- ip addr show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: enp0s10: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000 link/ether 00:15:f2:82:7c:d4 brd ff:ff:ff:ff:ff:ff inet 000.000.0.00/24 brd 000.000.0.255 scope global dynamic noprefixroute enp0s10 valid_lft 85578sec preferred_lft 85578sec inet6 2600:1700:cb80:2600:7da5:57ea:9eac:d08a/64 scope global temporary dynamic valid_lft 3579sec preferred_lft 3579sec inet6 2600:1700:cb80:2600:ba96:d3fc:913a:8220/64 scope global dynamic mngtmpaddr noprefixroute valid_lft 3579sec preferred_lft 3579sec inet6 fe80::b697:ad65:b913:32e4/64 scope link noprefixroute valid_lft forever preferred_lft forever 3: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 100 link/none inet 10.19.14.190/24 brd 10.19.14.255 scope global tun0 valid_lft forever preferred_lft forever inet6 fe80::8d92:f31:2710:2980/64 scope link stable-privacy valid_lft forever preferred_lft forever ---------------------------- ip link show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: enp0s10: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether 00:15:f2:82:7c:d4 brd ff:ff:ff:ff:ff:ff 3: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN mode DEFAULT group default qlen 100 link/none ---------------------------- ip -4 route show: 0.0.0.0/1 via 10.19.14.1 dev tun0 default via 000.000.0.254 dev enp0s10 proto dhcp metric 100 10.19.14.0/24 dev tun0 proto kernel scope link src 10.19.14.190 128.0.0.0/1 via 10.19.14.1 dev tun0 169.254.0.0/16 dev enp0s10 scope link metric 1000 192.30.89.51 via 10.19.14.1 dev tun0 192.30.89.53 via 000.000.0.254 dev enp0s10 000.000.0.0/24 dev enp0s10 proto kernel scope link src 000.000.0.00 metric 100 ---------------------------- ip -6 route show: 2600:1700:cb80:2600::/64 dev enp0s10 proto ra metric 100 pref medium 2600:1700:cb80:2600::/60 via fe80::fa18:97ff:fe4b:47ed dev enp0s10 proto ra metric 100 pref high fe80::/64 dev enp0s10 proto kernel metric 100 pref medium fe80::/64 dev enp0s10 proto kernel metric 256 pref medium fe80::/64 dev tun0 proto kernel metric 256 pref medium default via fe80::fa18:97ff:fe4b:47ed dev enp0s10 proto ra metric 100 pref medium PC System Info from Linux =========================================================================== betacat@sytem-x:~$ inxi -SMCNIz Error 22: Unsupported option: Check -h for correct parameters. -- betacat@sytem-x:~$ inxi -Fxz System: Host: sytem-x Kernel: 4.15.0-48-generic x86_64 bits: 64 compiler: gcc v: 7.3.0 Desktop: Xfce 4.12.3 Distro: Linux Mint 19.1 Tessa base: Ubuntu 18.04 bionic Machine: Type: Desktop Mobo: ASUSTeK model: A8N5X v: 1.XX serial: <filter> BIOS: Phoenix v: ASUS A8N5X Revision 1003 date: 06/01/2006 CPU: Topology: Dual Core model: AMD Athlon 64 X2 4200+ bits: 64 type: MCP arch: K8 rev.E rev: 2 L2 cache: 1024 KiB flags: lm nx pae sse sse2 sse3 bogomips: 4020 Speed: 1000 MHz min/max: 1000/2200 MHz Core speeds (MHz): 1: 1000 2: 1000 Graphics: Device-1: NVIDIA GK208B [GeForce GT 710] vendor: Micro-Star MSI driver: nouveau v: kernel bus ID: 01:00.0 Display: x11 server: X.Org 1.19.6 driver: nouveau unloaded: fbdev,modesetting,vesa resolution: 1280x1024~60Hz OpenGL: renderer: NV106 v: 4.3 Mesa 18.2.8 direct render: Yes Audio: Device-1: NVIDIA CK804 AC97 Audio vendor: ASUSTeK K8N4/A8N Series Mainboard driver: snd_intel8x0 v: kernel bus ID: 00:04.0 Device-2: NVIDIA GK208 HDMI/DP Audio vendor: Micro-Star MSI driver: snd_hda_intel v: kernel bus ID: 01:00.1 Sound Server: ALSA v: k4.15.0-48-generic Network: Device-1: NVIDIA CK804 Ethernet vendor: ASUSTeK K8N4/A8N Series Mainboard type: network bridge driver: forcedeth v: kernel port: b000 bus ID: 00:0a.0 IF: enp0s10 state: up speed: 100 Mbps duplex: full mac: <filter> Drives: Local Storage: total: 335.32 GiB used: 31.24 GiB (9.3%) ID-1: /dev/sda vendor: Seagate model: ST3200826AS size: 186.31 GiB ID-2: /dev/sdb vendor: Seagate model: ST3160023AS size: 149.01 GiB Partition: ID-1: / size: 182.38 GiB used: 31.24 GiB (17.1%) fs: ext4 dev: /dev/sda1 Sensors: System Temperatures: cpu: 40.0 C mobo: N/A gpu: nouveau temp: 39 C Fan Speeds (RPM): N/A Info: Processes: 164 Uptime: 7m Memory: 2.93 GiB used: 804.4 MiB (26.8%) Init: systemd runlevel: 5 Compilers: gcc: 7.4.0 Shell: bash v: 4.4.19 inxi: 3.0.27 1 Michaelalofs reacted to this Share this post Link to post
OpenSourcerer 1435 Posted ... 15 hours ago, betacat said: Eddie version: 2.16.3 First of all, you could try the most recent version which is 2.17.2. 15 hours ago, betacat said: I 2019.05.12 17:31:45 - Ready . 2019.05.12 17:31:46 - Systems & servers data update completed ! 2019.05.12 17:32:04 - Activation of Network Lock - Linux iptables I 2019.05.12 17:32:43 - Session starting. So, these gaps are truly puzzling. What if you call iptables -L for example, does it take as long as it does in the logs? 1 Georgenot reacted to this Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
betacat 14 Posted ... Installing the new "Experimental" version solved the iptables issue - loading time was reduced to only a few seconds via the GUI 🙂. Unfortunately this introduced a new problem; I could only browse online through the VPN 😕. Even if I disabled Network Lock and closed Eddie, I still couldn't go online (though I WAS actually connected). From advice I found in another post, I eliminated that problem by closing Eddie and running the following command in terminal: sudo iptables -F Thanks, giganerd. 1 OpenSourcerer reacted to this Share this post Link to post
betacat 14 Posted ... The "new problem" has returned. Apparently the iptables -F command was only a temporary solution . Is there a way to make it work permanently, or do I have to re-install the previous slow version of Eddie? Share this post Link to post
OpenSourcerer 1435 Posted ... If you analyze your logs a second time, do you see a line like "Deactivation of Network Lock" after disconnection? 1 FrankieChums reacted to this Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
betacat 14 Posted ... Yes. Here's my latest session log: . 2019.05.14 09:52:00 - Eddie version: 2.17.2 / linux_x64, System: Linux, Name: Linux Mint 19.1 Tessa \n \l, Version: Linux system-x-tower 4.15.0-48-generic #51-Ubuntu SMP Wed Apr 3 08:28:49 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319 . 2019.05.14 09:52:01 - Reading options from /home/betacat/.airvpn/default.xml . 2019.05.14 09:52:02 - Command line arguments (5): path="/home/betacat/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus" . 2019.05.14 09:52:02 - Profile path: /home/betacat/.airvpn/default.xml . 2019.05.14 09:52:03 - OpenVPN Driver - Found, /dev/net/tun . 2019.05.14 09:52:03 - OpenVPN - Version: 2.4.4 - OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn) . 2019.05.14 09:52:03 - SSH - Version: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n 7 Dec 2017 (/usr/bin/ssh) . 2019.05.14 09:52:03 - SSL - Version: stunnel 5.44 (/usr/bin/stunnel4) . 2019.05.14 09:52:03 - curl - Version: 7.58.0 (/usr/bin/curl) . 2019.05.14 09:52:03 - Certification Authorities: /usr/share/eddie-ui/cacert.pem I 2019.05.14 09:52:04 - Ready . 2019.05.14 09:52:05 - Collect information about AirVPN completed ! 2019.05.14 09:52:09 - Activation of Network Lock - Linux iptables I 2019.05.14 09:52:13 - Session starting. I 2019.05.14 09:52:13 - Checking authorization ... ! 2019.05.14 09:52:14 - Connecting to Titawin (Canada, Vancouver) . 2019.05.14 09:52:14 - OpenVPN > OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 5 2018 . 2019.05.14 09:52:14 - OpenVPN > library versions: OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 . 2019.05.14 09:52:14 - Connection to OpenVPN Management Interface . 2019.05.14 09:52:14 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.05.14 09:52:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.14 09:52:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.14 09:52:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.14 09:52:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.14 09:52:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.61:443 . 2019.05.14 09:52:14 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2019.05.14 09:52:14 - OpenVPN > UDP link local: (not bound) . 2019.05.14 09:52:14 - OpenVPN > UDP link remote: [AF_INET]192.30.89.61:443 . 2019.05.14 09:52:14 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.61:443, sid=4c22ff82 48481e54 . 2019.05.14 09:52:14 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.05.14 09:52:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.05.14 09:52:14 - OpenVPN > VERIFY KU OK . 2019.05.14 09:52:14 - OpenVPN > Validating certificate extended key usage . 2019.05.14 09:52:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.05.14 09:52:14 - OpenVPN > VERIFY EKU OK . 2019.05.14 09:52:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Titawin, emailAddress=info@airvpn.org . 2019.05.14 09:52:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.05.14 09:52:15 - OpenVPN > [Titawin] Peer Connection Initiated with [AF_INET]192.30.89.61:443 . 2019.05.14 09:52:16 - OpenVPN > SENT CONTROL [Titawin]: 'PUSH_REQUEST' (status=1) . 2019.05.14 09:52:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.78.1,dhcp-option DNS6 fde6:7a:7d20:104e::1,tun-ipv6,route-gateway 10.20.78.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:104e::106b/64 fde6:7a:7d20:104e::1,ifconfig 10.20.78.109 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2019.05.14 09:52:16 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.05.14 09:52:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:104e::1' . 2019.05.14 09:52:16 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2019.05.14 09:52:16 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:104e::106b/64 fde6:7a:7d20:104e::1' . 2019.05.14 09:52:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.05.14 09:52:16 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.05.14 09:52:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.05.14 09:52:16 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.05.14 09:52:16 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.05.14 09:52:16 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.05.14 09:52:16 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.05.14 09:52:16 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.05.14 09:52:16 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.05.14 09:52:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.14 09:52:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.14 09:52:16 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=enp0s10 HWADDR=00:15:f2:82:7c:d4 . 2019.05.14 09:52:16 - OpenVPN > TUN/TAP device tun0 opened . 2019.05.14 09:52:16 - OpenVPN > TUN/TAP TX queue length set to 100 . 2019.05.14 09:52:16 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0 . 2019.05.14 09:52:16 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2019.05.14 09:52:16 - OpenVPN > /sbin/ip addr add dev tun0 10.20.78.109/24 broadcast 10.20.78.255 . 2019.05.14 09:52:21 - OpenVPN > /sbin/ip route add 192.30.89.61/32 via 192.168.1.254 . 2019.05.14 09:52:21 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.20.78.1 . 2019.05.14 09:52:21 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.20.78.1 . 2019.05.14 09:52:21 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2019.05.14 09:52:21 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2019.05.14 09:52:21 - Routes, added a new route, 192.30.89.59 for gateway 10.20.78.1 . 2019.05.14 09:52:21 - Unable to compute route for 2606:9580:100:d:2bd7:c37b:24c2:c069: IPv6 VPN gateway not available. . 2019.05.14 09:52:21 - Flushing DNS I 2019.05.14 09:52:21 - Checking route IPv4 I 2019.05.14 09:52:22 - Checking DNS ! 2019.05.14 09:52:22 - Connected. . 2019.05.14 09:52:22 - OpenVPN > Initialization Sequence Completed ! 2019.05.14 09:52:33 - Disconnecting . 2019.05.14 09:52:33 - Routes, removed a route previously added, 192.30.89.59 for gateway 10.20.78.1 . 2019.05.14 09:52:33 - Sending management termination signal . 2019.05.14 09:52:33 - Management - Send 'signal SIGTERM' . 2019.05.14 09:52:33 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2019.05.14 09:52:33 - OpenVPN > SIGTERM received, sending exit notification to peer . 2019.05.14 09:52:38 - OpenVPN > /sbin/ip route del 192.30.89.61/32 . 2019.05.14 09:52:38 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2019.05.14 09:52:38 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2019.05.14 09:52:38 - OpenVPN > Closing TUN/TAP interface . 2019.05.14 09:52:38 - OpenVPN > /sbin/ip addr del dev tun0 10.20.78.109/24 . 2019.05.14 09:52:38 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2019.05.14 09:52:38 - Connection terminated. . 2019.05.14 09:52:38 - DNS of the system restored to original settings (Rename method) . 2019.05.14 09:52:38 - Flushing DNS ! 2019.05.14 09:52:38 - Session terminated. ! 2019.05.14 09:52:43 - Deactivation of Network Lock Share this post Link to post
betacat 14 Posted ... How about adding an event in Eddie to flush the iptables after Eddie closes using some kind of script? I'm guessing it could be added under Settings > Events > App End, but I have not idea how to do that. Anyone? Share this post Link to post
OpenSourcerer 1435 Posted ... This is default behavior of Eddie but apparently it's bugged on your system. There is the possibility to invoke a command at certain OpenVPN events, for example, after disconnection. --down cmd Run command cmd after TUN/TAP device close (post --user UID change and/or --chroot ). cmd consists of a path to script (or executable program), optionally followed by arguments. The path and arguments may be single- or double-quoted and/or escaped using a backslash, and should be separated by one or more spaces. Called with the same parameters and environmental variables as the --up option above. Note that if you reduce privileges by using --user and/or --group, your --down script will also run at reduced privilege. In Eddie > Preferences > OpenVPN directives, try entering this as a custom directive, then see if it fixes things: down "iptables -F" 1 Michaelalofs reacted to this Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
OpenSourcerer 1435 Posted ... Can you try a connection with the root account? Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
OpenSourcerer 1435 Posted ... su -l root [enter password] eddie-ui 2 Michaelalofs and KelIntava reacted to this Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
betacat 14 Posted ... First of all, thank you for hanging in there - I really appreciate your help . Getting that command to work was tricky. After entering it, I would only see: su: Authentication failure I then tried the following (from a post on the "ask ubuntu" forum): user@user-ubuntu1:~$ sudo passwd [sudo] password for user: # enter your sudo password here Enter new UNIX password: # enter the password you want for your su password here Retype new UNIX password: # reenter your new su password passwd: password updated successfully Entering "su -l root" required a couple of tries after that but it finally worked. Unfortunately, running Eddie from terminal did not affect my issue. If it helps, here's a copy of my terminal session: betacat@system-x:~$ su -l root Password: root@system-x:~# eddie-ui . 2019.05.17 10:06:32 - Eddie version: 2.17.2 / linux_x64, System: Linux, Name: Linux Mint 19.1 Tessa \n \l, Version: Linux system-x 4.15.0-50-generic #54-Ubuntu SMP Mon May 6 18:46:08 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319 . 2019.05.17 10:06:32 - Reading options from /root/.airvpn/default.xml . 2019.05.17 10:06:32 - Profile options not found, using defaults. . 2019.05.17 10:06:35 - Command line arguments (3): path="/root/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2019.05.17 10:06:35 - Profile path: /root/.airvpn/default.xml . 2019.05.17 10:06:38 - OpenVPN Driver - Found, /dev/net/tun . 2019.05.17 10:06:38 - OpenVPN - Version: 2.4.4 - OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn) . 2019.05.17 10:06:38 - SSH - Version: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n 7 Dec 2017 (/usr/bin/ssh) . 2019.05.17 10:06:38 - SSL - Version: stunnel 5.44 (/usr/bin/stunnel4) . 2019.05.17 10:06:38 - curl - Version: 7.58.0 (/usr/bin/curl) . 2019.05.17 10:06:38 - Certification Authorities: /usr/share/eddie-ui/cacert.pem I 2019.05.17 10:06:38 - Ready . 2019.05.17 10:06:40 - Collect information about AirVPN completed I 2019.05.17 10:07:42 - Checking login ... ! 2019.05.17 10:07:42 - Logged in. ! 2019.05.17 10:07:57 - Activation of Network Lock - Linux iptables I 2019.05.17 10:08:17 - Session starting. I 2019.05.17 10:08:17 - Checking authorization ... ! 2019.05.17 10:08:18 - Connecting to Titawin (Canada, Vancouver) . 2019.05.17 10:08:18 - OpenVPN > OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 5 2018 . 2019.05.17 10:08:18 - OpenVPN > library versions: OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 . 2019.05.17 10:08:18 - Connection to OpenVPN Management Interface . 2019.05.17 10:08:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.05.17 10:08:18 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.17 10:08:18 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.17 10:08:18 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.17 10:08:18 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.17 10:08:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]xxx.xx.xx.xx:xxx . 2019.05.17 10:08:18 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2019.05.17 10:08:18 - OpenVPN > UDP link local: (not bound) . 2019.05.17 10:08:18 - OpenVPN > UDP link remote: [AF_INET]xxx.xx.xx.xx:xxx . 2019.05.17 10:08:18 - OpenVPN > TLS: Initial packet from [AF_INET]xxx.xx.xx.xx:xxx, sid=d42a9ff5 c405ba44 . 2019.05.17 10:08:18 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.05.17 10:08:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.05.17 10:08:18 - OpenVPN > VERIFY KU OK . 2019.05.17 10:08:18 - OpenVPN > Validating certificate extended key usage . 2019.05.17 10:08:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.05.17 10:08:18 - OpenVPN > VERIFY EKU OK . 2019.05.17 10:08:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Titawin, emailAddress=info@airvpn.org . 2019.05.17 10:08:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.05.17 10:08:18 - OpenVPN > [Titawin] Peer Connection Initiated with [AF_INET]xxx.xx.xx.xx:xxx . 2019.05.17 10:08:19 - OpenVPN > SENT CONTROL [Titawin]: 'PUSH_REQUEST' (status=1) . 2019.05.17 10:08:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.78.1,dhcp-option DNS6 fde6:7a:7d20:104e::1,tun-ipv6,route-gateway 10.20.78.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:104e::106b/64 fde6:7a:7d20:104e::1,ifconfig x0.x0.xx.xxx xxx.xxx.xxx.0,peer-id 12,cipher AES-256-GCM' . 2019.05.17 10:08:20 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.05.17 10:08:20 - OpenVPN > Note: option tun-ipv6 is ignored because modern operating systems do not need special IPv6 tun handling anymore. . 2019.05.17 10:08:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.05.17 10:08:20 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.05.17 10:08:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.05.17 10:08:20 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.05.17 10:08:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.05.17 10:08:20 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.05.17 10:08:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.05.17 10:08:20 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.05.17 10:08:20 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.05.17 10:08:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.17 10:08:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.17 10:08:20 - OpenVPN > ROUTE_GATEWAY xxx.xxx.x.xxx/xxx.xxx.xxx.0 IFACE=enp0s10 HWADDR=00:15:f2:82:7c:d4 . 2019.05.17 10:08:20 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2019.05.17 10:08:20 - OpenVPN > ROUTE6_GATEWAY fe80::fa18:97ff:fe4b:47ed IFACE=enp0s10 . 2019.05.17 10:08:20 - OpenVPN > TUN/TAP device tun0 opened . 2019.05.17 10:08:20 - OpenVPN > TUN/TAP TX queue length set to 100 . 2019.05.17 10:08:20 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1 . 2019.05.17 10:08:20 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2019.05.17 10:08:20 - OpenVPN > /sbin/ip addr add dev tun0 10.20.78.109/24 broadcast 10.20.78.255 . 2019.05.17 10:08:20 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:104e::106b/64 dev tun0 . 2019.05.17 10:08:24 - OpenVPN > /sbin/ip route add xxx.xx.xx.xx/xx via xxx.xxx.x.xxx . 2019.05.17 10:08:24 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via x0.x0.xx.x . 2019.05.17 10:08:24 - OpenVPN > /sbin/ip route add xxx.0.0.0/x via xx.x0.xx.x . 2019.05.17 10:08:24 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:104e::1 metric -1) dev tun0 . 2019.05.17 10:08:24 - OpenVPN > /sbin/ip -6 route add ::/3 dev tun0 . 2019.05.17 10:08:24 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:104e::1 metric -1) dev tun0 . 2019.05.17 10:08:24 - OpenVPN > /sbin/ip -6 route add 2000::/4 dev tun0 . 2019.05.17 10:08:24 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:104e::1 metric -1) dev tun0 . 2019.05.17 10:08:24 - OpenVPN > /sbin/ip -6 route add 3000::/4 dev tun0 . 2019.05.17 10:08:24 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:104e::1 metric -1) dev tun0 . 2019.05.17 10:08:24 - OpenVPN > /sbin/ip -6 route add fc00::/7 dev tun0 . 2019.05.17 10:08:24 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup . 2019.05.17 10:08:24 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2019.05.17 10:08:24 - Routes, added a new route, xxx.xx.xx.xx for gateway x0.x0.xx.x . 2019.05.17 10:08:33 - Routes, added a new route, 2606:9580:100:d:2bd7:c37b:24c2:c069 for gateway fde6:7a:7d20:104e::1 . 2019.05.17 10:08:42 - Flushing DNS I 2019.05.17 10:08:47 - Checking route IPv4 I 2019.05.17 10:08:49 - Checking route IPv6 I 2019.05.17 10:08:49 - Checking DNS ! 2019.05.17 10:08:50 - Connected. . 2019.05.17 10:08:50 - OpenVPN > Initialization Sequence Completed ! 2019.05.17 10:22:02 - Disconnecting . 2019.05.17 10:22:03 - Routes, removed a route previously added, xxx.x0.xx.xx for gateway x0.x0.xx.x . 2019.05.17 10:22:03 - Routes, removed a route previously added, 2606:9580:100:d:2bd7:c37b:24c2:c069 for gateway fde6:7a:7d20:104e::1 . 2019.05.17 10:22:03 - Sending management termination signal . 2019.05.17 10:22:03 - Management - Send 'signal SIGTERM' . 2019.05.17 10:22:03 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2019.05.17 10:22:03 - OpenVPN > SIGTERM received, sending exit notification to peer . 2019.05.17 10:22:08 - OpenVPN > /sbin/ip route del xxx.x0.xx.xx/xx . 2019.05.17 10:22:08 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2019.05.17 10:22:08 - OpenVPN > /sbin/ip route del xxx.0.0.0/x . 2019.05.17 10:22:08 - OpenVPN > delete_route_ipv6(::/3) . 2019.05.17 10:22:08 - OpenVPN > /sbin/ip -6 route del ::/3 dev tun0 . 2019.05.17 10:22:08 - OpenVPN > delete_route_ipv6(2000::/4) . 2019.05.17 10:22:08 - OpenVPN > /sbin/ip -6 route del 2000::/4 dev tun0 . 2019.05.17 10:22:08 - OpenVPN > delete_route_ipv6(3000::/4) . 2019.05.17 10:22:08 - OpenVPN > /sbin/ip -6 route del 3000::/4 dev tun0 . 2019.05.17 10:22:08 - OpenVPN > delete_route_ipv6(fc00::/7) . 2019.05.17 10:22:08 - OpenVPN > /sbin/ip -6 route del fc00::/7 dev tun0 . 2019.05.17 10:22:08 - OpenVPN > Closing TUN/TAP interface . 2019.05.17 10:22:08 - OpenVPN > /sbin/ip addr del dev tun0 10.20.78.109/24 . 2019.05.17 10:22:08 - OpenVPN > /sbin/ip -6 addr del fde6:7a:7d20:104e::106b/64 dev tun0 . 2019.05.17 10:22:08 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2019.05.17 10:22:08 - Connection terminated. . 2019.05.17 10:22:08 - DNS of the system restored to original settings (Rename method) . 2019.05.17 10:22:08 - Flushing DNS ! 2019.05.17 10:22:08 - Session terminated. ! 2019.05.17 10:22:11 - Deactivation of Network Lock . 2019.05.17 10:22:20 - Shutdown in progress . 2019.05.17 10:22:21 - Shutdown complete root@system-x:~# 1 Michaelalofs reacted to this Share this post Link to post
OpenSourcerer 1435 Posted ... Hm. Do this again like you always use Eddie but after disconnection create a support file instead. You find it in the logs tab, a swimming ring icon on the right. You can choose to only paste the last 20-30 log lines, if you want. I'm only interested in the verbose output around that NetLock deactivation message, I think it shows the command used, its execution status and everything that might get posted as an error. And generally, I really like how you are not turning away from this either, thinking for yourself working out solutions for smaller issues around your main one. Keep it up, I'm sure we get behind all this, and thank you! Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
betacat 14 Posted ... Thanks for the kind words! Here's the log: Eddie System/Environment Report - 5/17/2019 10:43 PM UTC Eddie version: 2.17.2 Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: Linux Mint 19.1 Tessa \n \l OS version: Linux system-x 4.15.0-50-generic #54-Ubuntu SMP Mon May 6 18:46:08 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux OS architecture: x64 Mono /.Net Framework: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319 OpenVPN driver: Found, /dev/net/tun OpenVPN: 2.4.4 - OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn) SSH: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n 7 Dec 2017 (/usr/bin/ssh) SSL: stunnel 5.44 (/usr/bin/stunnel4) curl: 7.58.0 (/usr/bin/curl) Profile path: /home/betacat/.airvpn/default.xml Data path: /home/betacat/.airvpn Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/Eddie-UI.exe Command line arguments: (5 args) path="/home/betacat/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus" Network Lock Active: No Connected to VPN: No Detected DNS: 127.0.0.53 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: -1 ms Test Ping IPv6: 174 ms Test HTTP IPv4: Error:curl: (28) Connection timed out after 20001 milliseconds Test HTTP IPv6: Ok Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True gui.tray_show: False gui.tray_minimized: False ---------------------------- Logs: . 2019.05.17 15:41:35 - Eddie version: 2.17.2 / linux_x64, System: Linux, Name: Linux Mint 19.1 Tessa \n \l, Version: Linux system-x 4.15.0-50-generic #54-Ubuntu SMP Mon May 6 18:46:08 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319 . 2019.05.17 15:41:35 - Reading options from /home/betacat/.airvpn/default.xml . 2019.05.17 15:41:36 - Command line arguments (5): path="/home/betacat/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus" . 2019.05.17 15:41:36 - Profile path: /home/betacat/.airvpn/default.xml . 2019.05.17 15:41:38 - OpenVPN Driver - Found, /dev/net/tun . 2019.05.17 15:41:38 - OpenVPN - Version: 2.4.4 - OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn) . 2019.05.17 15:41:38 - SSH - Version: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n 7 Dec 2017 (/usr/bin/ssh) . 2019.05.17 15:41:38 - SSL - Version: stunnel 5.44 (/usr/bin/stunnel4) . 2019.05.17 15:41:38 - curl - Version: 7.58.0 (/usr/bin/curl) . 2019.05.17 15:41:38 - Certification Authorities: /usr/share/eddie-ui/cacert.pem I 2019.05.17 15:41:39 - Ready . 2019.05.17 15:41:40 - Collect information about AirVPN completed ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "gateway": "xxx.xxx.x.xxx", "interface": "enp0s10", "metric": "20100" }, { "address": "2600:1700:cb80:2600::\/60", "gateway": "fe80::fa18:97ff:fe4b:47ed", "interface": "enp0s10", "metric": "100" }, { "address": "::\/0", "gateway": "fe80::fa18:97ff:fe4b:47ed", "interface": "enp0s10", "metric": "20100" } ], "interfaces": [ { "friendly": "lo", "id": "lo", "name": "lo", "description": "lo", "type": "Loopback", "status": "Unknown", "bytes_received": "8879028", "bytes_sent": "8879028", "support_ipv4": true, "support_ipv6": true, "ips": [ "xxx.x.x.x", "::1" ], "gateways": [], "bind": true }, { "friendly": "enp0s10", "id": "enp0s10", "name": "enp0s10", "description": "enp0s10", "type": "Ethernet", "status": "Up", "bytes_received": "6003777086", "bytes_sent": "661455669", "support_ipv4": true, "support_ipv6": true, "ips": [ "xxx.xxx.x.66", "2600:1700:cb80:2600:2501:60ed:7ae6:faf9", "2600:1700:cb80:2600:ba96:d3fc:913a:8220", "fe80::b697:ad65:b913:32e4" ], "gateways": [ "xxx.xxx.x.xxx", "fe80::fa18:97ff:fe4b:47ed" ], "bind": true } ], "ipv4-default-gateway": "xxx.xxx.x.xxx", "ipv4-default-interface": "enp0s10", "ipv6-default-gateway": "fe80::fa18:97ff:fe4b:47ed", "ipv6-default-interface": "enp0s10" } ---------------------------- UID: 0 Run as normal user: True; ID:1000; Name:betacat ---------------------------- ip addr show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet xxx.x.x.x/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: enp0s10: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000 link/ether 00:15:f2:82:7c:d4 brd ff:ff:ff:ff:ff:ff inet xxx.xxx.x.66/24 brd xxx.xxx.x.255 scope global dynamic noprefixroute enp0s10 valid_lft 73849sec preferred_lft 73849sec inet6 2600:1700:cb80:2600:2501:60ed:7ae6:faf9/64 scope global temporary dynamic valid_lft 3580sec preferred_lft 3580sec inet6 2600:1700:cb80:2600:ba96:d3fc:913a:8220/64 scope global dynamic mngtmpaddr noprefixroute valid_lft 3580sec preferred_lft 3580sec inet6 fe80::b697:ad65:b913:32e4/64 scope link noprefixroute valid_lft forever preferred_lft forever ---------------------------- ip link show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: enp0s10: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether 00:15:f2:82:7c:d4 brd ff:ff:ff:ff:ff:ff ---------------------------- ip -4 route show: default via xxx.xxx.x.xxx dev enp0s10 proto dhcp metric 20100 xxx.xxx.0.0/16 dev enp0s10 scope link metric 1000 xxx.xxx.x.0/24 dev enp0s10 proto kernel scope link src xxx.xxx.x.66 metric 100 ---------------------------- ip -6 route show: 2600:1700:cb80:2600::/64 dev enp0s10 proto ra metric 100 pref medium 2600:1700:cb80:2600::/60 via fe80::fa18:97ff:fe4b:47ed dev enp0s10 proto ra metric 100 pref high fe80::/64 dev enp0s10 proto kernel metric 100 pref medium fe80::/64 dev enp0s10 proto kernel metric 256 pref medium default via fe80::fa18:97ff:fe4b:47ed dev enp0s10 proto ra metric 20100 pref medium Share this post Link to post
OpenSourcerer 1435 Posted ... Hm. Pity. Nothing interesting in there. Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
betacat 14 Posted ... Support informs me that they have reproduced this bug on a Debian 8 system and are working on a fix. Thanks again for your assistance on this, giganerd . 1 1 keikari and OpenSourcerer reacted to this Share this post Link to post
OpenSourcerer 1435 Posted ... Thank you! It's rarely a bug, so I kept thinking it was something with the system. I really like how you got to the bottom of this. You deserve a medal for hanging in there. Seriously respect your efforts Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
betacat 14 Posted ... Thanks! 1 1 OpenSourcerer and Michaelalofs reacted to this Share this post Link to post