Jump to content
Not connected, Your IP: 3.83.236.51
nagonatel

Eddie over SSH misbehaving on Linux

Recommended Posts

Hello,
I use Eddie in this very restricted university network where 'airvpn' is blocked everywhere. Many of its known IPs are also blocked.

After attempting several protocols and settings combination I finally got airvpn to work using SSH with port 80 via Castor and Chara only. Couldn't make it to work on iOS yet.

After successfully establishing connections using MacOS, I did also with a Lubuntu VM running in Windows with McAfee firewall on as host.

Recently, the linux VM stopped connecting over SSH ONLY. If I go to any other network and attempt UDP, TCP, etc, it connects without any issues. SSH will fail not only in this university network, but at home as well or anywhere. It still goes fine on Mac.

Linux logs do not show me anything. Only that it keeps trying to check IPv4 tunnel and that's it:
 

Quote
. 2019.05.17 18:06:22 - Eddie version: 2.17.2 / linux_x64, System: Linux, Name: Ubuntu 18.10 \n \l, Version: Linux vmlu 4.18.0-16-generic #17-Ubuntu SMP Fri Feb 8 00:06:57 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319
. 2019.05.17 18:06:23 - Reading options from /home/vmlu/.airvpn/default.xml
. 2019.05.17 18:06:23 - Command line arguments (5): path="/home/vmlu/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus"
. 2019.05.17 18:06:23 - Profile path: /home/vmlu/.airvpn/default.xml
. 2019.05.17 18:06:24 - OpenVPN Driver - Found, /dev/net/tun
. 2019.05.17 18:06:24 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.1  11 Sep 2018, LZO 2.10 (/usr/sbin/openvpn)
. 2019.05.17 18:06:24 - SSH - Version: OpenSSH_7.7p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n  7 Dec 2017 (/usr/bin/ssh)
. 2019.05.17 18:06:24 - SSL - Version: stunnel 5.44 (/usr/bin/stunnel4)
. 2019.05.17 18:06:24 - curl - Version: 7.61.0 (/usr/bin/curl)
. 2019.05.17 18:06:24 - Certification Authorities: /usr/share/eddie-ui/cacert.pem
! 2019.05.17 18:06:24 - Activation of Network Lock - Linux iptables
I 2019.05.17 18:06:40 - Ready
I 2019.05.17 18:06:40 - Session starting.
. 2019.05.17 18:06:41 - Collect information about providers ...
. 2019.05.17 18:06:42 - Collect information about AirVPN completed
. 2019.05.17 18:06:54 - Tor Test: Unable to communicate with Tor (Unable to find your Tor path.). Is Tor up and running?
I 2019.05.17 18:07:01 - Checking authorization ...
! 2019.05.17 18:07:02 - Connecting to Gorgonea (Canada, Toronto, Ontario)
W 2019.05.17 18:07:02 - Unable to compute route for 104.254.90.254: IPv4 Net gateway not available.
. 2019.05.17 18:07:09 - SSL > 2019.05.17 18:07:02 LOG5[ui]: stunnel 5.44 on x86_64-pc-linux-gnu platform
. 2019.05.17 18:07:09 - SSL > 2019.05.17 18:07:02 LOG5[ui]: Compiled/running with OpenSSL 1.1.1  11 Sep 2018
. 2019.05.17 18:07:09 - SSL > 2019.05.17 18:07:02 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6,SYSTEMD TLS:ENGINE,FIPS,OCSP,PSK,SNI Auth:LIBWRAP
. 2019.05.17 18:07:09 - SSL > 2019.05.17 18:07:02 LOG5[ui]: Reading configuration from file /home/vmlu/.airvpn/07e1164408834ada87b81ab0576a33734ff14f020c7584a2faa6a1a6d4792f0f.tmp.ssl
. 2019.05.17 18:07:09 - SSL > 2019.05.17 18:07:02 LOG5[ui]: UTF-8 byte order mark detected
. 2019.05.17 18:07:09 - SSL > 2019.05.17 18:07:02 LOG5[ui]: FIPS mode disabled
. 2019.05.17 18:07:09 - SSL > 2019.05.17 18:07:02 LOG6[ui]: Initializing service [openvpn]
. 2019.05.17 18:07:09 - SSL > 2019.05.17 18:07:02 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks
. 2019.05.17 18:07:09 - SSL > 2019.05.17 18:07:02 LOG5[ui]: Configuration successful
. 2019.05.17 18:07:10 - SSL > 2019.05.17 18:07:09 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:55478
. 2019.05.17 18:07:10 - SSL > 2019.05.17 18:07:09 LOG6[0]: s_connect: connecting 104.254.90.254:443
. 2019.05.17 18:07:10 - SSL > 2019.05.17 18:07:09 LOG5[0]: s_connect: connected 104.254.90.254:443
. 2019.05.17 18:07:10 - SSL > 2019.05.17 18:07:09 LOG5[0]: Service [openvpn] connected remote server from 192.168.145.130:55872
. 2019.05.17 18:07:10 - SSL > 2019.05.17 18:07:09 LOG6[0]: SNI: sending servername: 104.254.90.254
. 2019.05.17 18:07:10 - SSL > 2019.05.17 18:07:09 LOG6[0]: Peer certificate not required
. 2019.05.17 18:07:10 - SSL > 2019.05.17 18:07:09 LOG6[0]: Certificate verification disabled
. 2019.05.17 18:07:10 - SSL > 2019.05.17 18:07:09 LOG6[0]: Client certificate not requested
. 2019.05.17 18:07:10 - SSL > 2019.05.17 18:07:10 LOG6[0]: TLS connected: new session negotiated
. 2019.05.17 18:07:10 - SSL > 2019.05.17 18:07:10 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2019.05.17 18:07:10 - OpenVPN > OpenVPN 2.4.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep  3 2018
. 2019.05.17 18:07:10 - OpenVPN > library versions: OpenSSL 1.1.1  11 Sep 2018, LZO 2.10
. 2019.05.17 18:07:10 - Connection to OpenVPN Management Interface
. 2019.05.17 18:07:10 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.05.17 18:07:10 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.05.17 18:07:10 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.05.17 18:07:10 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.05.17 18:07:10 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.05.17 18:07:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:4347
. 2019.05.17 18:07:10 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2019.05.17 18:07:11 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:4347 [nonblock]
. 2019.05.17 18:07:11 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:4347
. 2019.05.17 18:07:11 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2019.05.17 18:07:11 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:4347
. 2019.05.17 18:07:11 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:4347, sid=bb6063d6 f3d47a40
. 2019.05.17 18:07:11 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.05.17 18:07:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.05.17 18:07:11 - OpenVPN > VERIFY KU OK
. 2019.05.17 18:07:11 - OpenVPN > Validating certificate extended key usage
. 2019.05.17 18:07:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.05.17 18:07:11 - OpenVPN > VERIFY EKU OK
. 2019.05.17 18:07:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2019.05.17 18:07:11 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.05.17 18:07:11 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:4347
. 2019.05.17 18:07:12 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2019.05.17 18:07:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.18.7.1,dhcp-option DNS6 fde6:7a:7d20:e07::1,tun-ipv6,route-gateway 10.18.7.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:e07::101d/64 fde6:7a:7d20:e07::1,ifconfig 10.18.7.31 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2019.05.17 18:07:12 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2019.05.17 18:07:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.05.17 18:07:12 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.05.17 18:07:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.05.17 18:07:12 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.05.17 18:07:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.05.17 18:07:12 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.05.17 18:07:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627
. 2019.05.17 18:07:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.05.17 18:07:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.05.17 18:07:12 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.05.17 18:07:12 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.05.17 18:07:12 - OpenVPN > ROUTE_GATEWAY 192.168.145.2/255.255.255.0 IFACE=ens33 HWADDR=00:0c:29:4c:d1:f9
. 2019.05.17 18:07:12 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2019.05.17 18:07:12 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2019.05.17 18:07:12 - OpenVPN > TUN/TAP device tun0 opened
. 2019.05.17 18:07:12 - OpenVPN > TUN/TAP TX queue length set to 100
. 2019.05.17 18:07:12 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2019.05.17 18:07:12 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2019.05.17 18:07:12 - OpenVPN > /sbin/ip addr add dev tun0 10.18.7.31/24 broadcast 10.18.7.255
. 2019.05.17 18:07:12 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:e07::101d/64 dev tun0
. 2019.05.17 18:07:17 - OpenVPN > /sbin/ip route add 127.0.0.1/32 via 192.168.145.2
. 2019.05.17 18:07:17 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.18.7.1
. 2019.05.17 18:07:17 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.18.7.1
. 2019.05.17 18:07:17 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:e07::1 metric -1) dev tun0
. 2019.05.17 18:07:17 - OpenVPN > /sbin/ip -6 route add ::/3 dev tun0
. 2019.05.17 18:07:17 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:e07::1 metric -1) dev tun0
. 2019.05.17 18:07:17 - OpenVPN > /sbin/ip -6 route add 2000::/4 dev tun0
. 2019.05.17 18:07:17 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:e07::1 metric -1) dev tun0
. 2019.05.17 18:07:17 - OpenVPN > /sbin/ip -6 route add 3000::/4 dev tun0
. 2019.05.17 18:07:17 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:e07::1 metric -1) dev tun0
. 2019.05.17 18:07:17 - OpenVPN > /sbin/ip -6 route add fc00::/7 dev tun0
. 2019.05.17 18:07:17 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2019.05.17 18:07:17 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2019.05.17 18:07:17 - Routes, added a new route, 104.254.90.251 for gateway 10.18.7.1
. 2019.05.17 18:07:17 - Routes, added a new route, 2606:6080:2001:a:9374:410c:ca5:d631 for gateway fde6:7a:7d20:e07::1
. 2019.05.17 18:07:17 - Flushing DNS
I 2019.05.17 18:07:17 - Checking route IPv4
. 2019.05.17 18:07:37 - curl: (28) Connection timed out after 20001 milliseconds
. 2019.05.17 18:07:37 - Checking route (2° try)
. 2019.05.17 18:07:58 - curl: (28) Connection timed out after 20000 milliseconds
. 2019.05.17 18:07:58 - Checking route (3° try)
. 2019.05.17 18:08:20 - curl: (28) Connection timed out after 20001 milliseconds
. 2019.05.17 18:08:20 - OpenVPN > Initialization Sequence Completed
! 2019.05.17 18:08:20 - Disconnecting
. 2019.05.17 18:08:20 - Routes, removed a route previously added, 104.254.90.251 for gateway 10.18.7.1
. 2019.05.17 18:08:20 - Routes, removed a route previously added, 2606:6080:2001:a:9374:410c:ca5:d631 for gateway fde6:7a:7d20:e07::1
. 2019.05.17 18:08:20 - SSL > 2019.05.17 18:08:02 LOG6[cron]: Executing cron jobs
. 2019.05.17 18:08:20 - SSL > 2019.05.17 18:08:02 LOG6[cron]: Cron jobs completed in 0 seconds
. 2019.05.17 18:08:20 - Sending management termination signal
. 2019.05.17 18:08:20 - Management - Send 'signal SIGTERM'

 


I have also tried to use the new experimental Eddie client, disabling the host OS firewall, accessing Eddie as root. All to no avail.

Meanwhile SSH with port 80 keeps working nicely in MacOS.

Any hints? Thank you very much!

Share this post


Link to post

I see SSL in the logs. Are you really using SSH?
Have you tried SSL/443? It should work everywhere because networks blocking this also block all HTTPS traffic to the web and I don't think they want this. :D


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post
On 5/17/2019 at 7:32 PM, giganerd said:

I see SSL in the logs. Are you really using SSH?
Have you tried SSL/443? It should work everywhere because networks blocking this also block all HTTPS traffic to the web and I don't think they want this. :D


Thank you very much for the input. Indeed the log entry was incorrect.

It was a SSL attempt as it fails in the very same step. I just tried what you suggested, SSL on 443. Same results:
 
Quote
I 2019.05.20 11:18:50 - Session starting.
I 2019.05.20 11:18:51 - Checking authorization ...
! 2019.05.20 11:18:51 - Connecting to Agena (Canada, Toronto, Ontario)
W 2019.05.20 11:18:51 - Unable to compute route for 184.75.223.212: IPv4 Net gateway not available.
. 2019.05.20 11:18:54 - SSL > 2019.05.20 11:18:51 LOG5[ui]: stunnel 5.44 on x86_64-pc-linux-gnu platform
. 2019.05.20 11:18:54 - SSL > 2019.05.20 11:18:51 LOG5[ui]: Compiled/running with OpenSSL 1.1.1  11 Sep 2018
. 2019.05.20 11:18:54 - SSL > 2019.05.20 11:18:51 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6,SYSTEMD TLS:ENGINE,FIPS,OCSP,PSK,SNI Auth:LIBWRAP
. 2019.05.20 11:18:54 - SSL > 2019.05.20 11:18:51 LOG5[ui]: Reading configuration from file /home/vmlu/.airvpn/d287d586120d2fd7c91bc9fed70642910fd5997a5119087b2f33016e4d3459fa.tmp.ssl
. 2019.05.20 11:18:54 - SSL > 2019.05.20 11:18:51 LOG5[ui]: UTF-8 byte order mark detected
. 2019.05.20 11:18:54 - SSL > 2019.05.20 11:18:51 LOG5[ui]: FIPS mode disabled
. 2019.05.20 11:18:54 - SSL > 2019.05.20 11:18:51 LOG6[ui]: Initializing service [openvpn]
. 2019.05.20 11:18:54 - SSL > 2019.05.20 11:18:51 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks
. 2019.05.20 11:18:54 - SSL > 2019.05.20 11:18:51 LOG5[ui]: Configuration successful
. 2019.05.20 11:18:54 - OpenVPN > OpenVPN 2.4.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep  3 2018
. 2019.05.20 11:18:54 - OpenVPN > library versions: OpenSSL 1.1.1  11 Sep 2018, LZO 2.10
. 2019.05.20 11:18:54 - Connection to OpenVPN Management Interface
. 2019.05.20 11:18:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.05.20 11:18:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.05.20 11:18:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.05.20 11:18:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:6702
. 2019.05.20 11:18:54 - OpenVPN > Socket Buffers: R=[87380->87380] S=[16384->16384]
. 2019.05.20 11:18:54 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:6702 [nonblock]
. 2019.05.20 11:18:54 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:6702
. 2019.05.20 11:18:54 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2019.05.20 11:18:54 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:6702
. 2019.05.20 11:18:54 - SSL > 2019.05.20 11:18:54 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:54380
. 2019.05.20 11:18:54 - SSL > 2019.05.20 11:18:54 LOG6[0]: s_connect: connecting 184.75.223.212:443
. 2019.05.20 11:18:54 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.05.20 11:18:54 - SSL > 2019.05.20 11:18:54 LOG5[0]: s_connect: connected 184.75.223.212:443
. 2019.05.20 11:18:54 - SSL > 2019.05.20 11:18:54 LOG5[0]: Service [openvpn] connected remote server from 192.168.145.130:53122
. 2019.05.20 11:18:54 - SSL > 2019.05.20 11:18:54 LOG6[0]: SNI: sending servername: 184.75.223.212
. 2019.05.20 11:18:54 - SSL > 2019.05.20 11:18:54 LOG6[0]: Peer certificate not required
. 2019.05.20 11:18:55 - SSL > 2019.05.20 11:18:55 LOG6[0]: Certificate verification disabled
. 2019.05.20 11:18:55 - SSL > 2019.05.20 11:18:55 LOG6[0]: Client certificate not requested
. 2019.05.20 11:18:55 - SSL > 2019.05.20 11:18:55 LOG6[0]: TLS connected: new session negotiated
. 2019.05.20 11:18:55 - SSL > 2019.05.20 11:18:55 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2019.05.20 11:18:55 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:6702, sid=87cb2a0f f76bb354
. 2019.05.20 11:18:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.05.20 11:18:56 - OpenVPN > VERIFY KU OK
. 2019.05.20 11:18:56 - OpenVPN > Validating certificate extended key usage
. 2019.05.20 11:18:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.05.20 11:18:56 - OpenVPN > VERIFY EKU OK
. 2019.05.20 11:18:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2019.05.20 11:18:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.05.20 11:18:56 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:6702
. 2019.05.20 11:18:57 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2019.05.20 11:18:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.4.213.1,dhcp-option DNS6 fde6:7a:7d20:d5::1,tun-ipv6,route-gateway 10.4.213.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:d5::1065/64 fde6:7a:7d20:d5::1,ifconfig 10.4.213.103 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2019.05.20 11:18:57 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2019.05.20 11:18:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.05.20 11:18:57 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.05.20 11:18:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.05.20 11:18:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.05.20 11:18:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.05.20 11:18:57 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.05.20 11:18:57 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627
. 2019.05.20 11:18:57 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.05.20 11:18:57 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.05.20 11:18:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.05.20 11:18:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.05.20 11:18:57 - OpenVPN > ROUTE_GATEWAY 192.168.145.2/255.255.255.0 IFACE=ens33 HWADDR=00:0c:29:4c:d1:f9
. 2019.05.20 11:18:57 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2019.05.20 11:18:57 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2019.05.20 11:18:57 - OpenVPN > TUN/TAP device tun0 opened
. 2019.05.20 11:18:58 - OpenVPN > TUN/TAP TX queue length set to 100
. 2019.05.20 11:18:58 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2019.05.20 11:18:58 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2019.05.20 11:18:58 - OpenVPN > /sbin/ip addr add dev tun0 10.4.213.103/24 broadcast 10.4.213.255
. 2019.05.20 11:18:58 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:d5::1065/64 dev tun0
. 2019.05.20 11:19:02 - OpenVPN > /sbin/ip route add 127.0.0.1/32 via 192.168.145.2
. 2019.05.20 11:19:02 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.213.1
. 2019.05.20 11:19:02 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.213.1
. 2019.05.20 11:19:02 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:d5::1 metric -1) dev tun0
. 2019.05.20 11:19:02 - OpenVPN > /sbin/ip -6 route add ::/3 dev tun0
. 2019.05.20 11:19:02 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:d5::1 metric -1) dev tun0
. 2019.05.20 11:19:02 - OpenVPN > /sbin/ip -6 route add 2000::/4 dev tun0
. 2019.05.20 11:19:02 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:d5::1 metric -1) dev tun0
. 2019.05.20 11:19:02 - OpenVPN > /sbin/ip -6 route add 3000::/4 dev tun0
. 2019.05.20 11:19:02 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:d5::1 metric -1) dev tun0
. 2019.05.20 11:19:02 - OpenVPN > /sbin/ip -6 route add fc00::/7 dev tun0
. 2019.05.20 11:19:02 - /etc/resolv.conf moved to /etc/resolv.conf.eddie as backup
. 2019.05.20 11:19:02 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2019.05.20 11:19:02 - Routes, added a new route, 184.75.223.211 for gateway 10.4.213.1
. 2019.05.20 11:19:02 - Routes, added a new route, 2606:6080:1002:6:f780:efa6:f9d2:3459 for gateway fde6:7a:7d20:d5::1
. 2019.05.20 11:19:02 - Flushing DNS
I 2019.05.20 11:19:02 - Checking route IPv4
. 2019.05.20 11:19:22 - curl: (28) Connection timed out after 20001 milliseconds
. 2019.05.20 11:19:22 - Checking route (2° try)
. 2019.05.20 11:19:43 - curl: (28) Connection timed out after 20001 milliseconds
. 2019.05.20 11:19:43 - Checking route (3° try)
. 2019.05.20 11:20:06 - curl: (28) Connection timed out after 20001 milliseconds
E 2019.05.20 11:20:06 - Checking route IPv4 failed.
. 2019.05.20 11:20:06 - OpenVPN > Initialization Sequence Completed
! 2019.05.20 11:20:06 - Disconnecting
. 2019.05.20 11:20:06 - Routes, removed a route previously added, 184.75.223.211 for gateway 10.4.213.1
. 2019.05.20 11:20:06 - Routes, removed a route previously added, 2606:6080:1002:6:f780:efa6:f9d2:3459 for gateway fde6:7a:7d20:d5::1
. 2019.05.20 11:20:06 - SSL > 2019.05.20 11:19:52 LOG6[cron]: Executing cron jobs
. 2019.05.20 11:20:06 - SSL > 2019.05.20 11:19:52 LOG6[cron]: Cron jobs completed in 0 seconds
. 2019.05.20 11:20:06 - Sending management termination signal
. 2019.05.20 11:20:06 - Management - Send 'signal SIGTERM'
. 2019.05.20 11:20:06 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2019.05.20 11:20:06 - OpenVPN > /sbin/ip route del 127.0.0.1/32
. 2019.05.20 11:20:06 - OpenVpn Management > SUCCESS: signal SIGTERM thrown

 

Any other hints?

Share this post


Link to post

More data:
It works on Win and Mac.

The issue definitely ony happens with Linux for both SSH and SSL not on this particularly tough network but in any network.

I will try now a different Linux box.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...