Jump to content
Not connected, Your IP: 3.93.75.30
Sign in to follow this  
seamonster

curl certificate error in Eddie while trying to connect to AirVPN

Recommended Posts

In the log files I found one line specifically that is causing me disconnects that I've never seen before:

. 2019.08.17 20:38:41 - curl: (60) SSL certificate problem: unable to get local issuer certificate
. 2019.08.17 20:38:41 -     More details here: https://curl.haxx.se/docs/sslcerts.html
. 2019.08.17 20:38:41 -     curl performs SSL certificate verification by default, using a "bundle"
. 2019.08.17 20:38:41 -     of Certificate Authority (CA) public keys (CA certs). If the default
. 2019.08.17 20:38:41 -     bundle file isn't adequate, you can specify an alternate file
. 2019.08.17 20:38:41 -     using the --cacert option.
. 2019.08.17 20:38:41 -     If this HTTPS server uses a certificate signed by a CA represented in
. 2019.08.17 20:38:41 -     the bundle, the certificate verification probably failed due to a
. 2019.08.17 20:38:41 -     problem with the certificate (it might be expired, or the name might
. 2019.08.17 20:38:41 -     not match the domain name in the URL).
. 2019.08.17 20:38:41 -     If you'd like to turn off curl's verification of the certificate, use
. 2019.08.17 20:38:41 -     the -k (or --insecure) option.
. 2019.08.17 20:38:41 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.

I did go to the website and tried downloading a newer .prem bundle and tried replacing the CA Cert in the directory, tried adding them both, but still getting disconnects.

At this point I don't want to make the problem worse by throwing any google solution at it I can find, any help appreciated!

OS is Win 7 64-bit, nothing has changed since I used it in the last 24 hours, it just stopped working when I tried connecting this afternoon.

Share this post


Link to post

Hello, I cannot connect to any VPN. My logs are as shown:

. 2019.08.17 21:56:41 - Eddie version: 2.16.3 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.17763.0, Mono/.Net: v4.0.30319
. 2019.08.17 21:56:41 - Reading options from C:\Users\jtarl\AppData\Local\AirVPN\default.xml
. 2019.08.17 21:56:41 - Command line arguments (1): path="home"
. 2019.08.17 21:56:41 - Profile path: C:\Users\jtarl\AppData\Local\AirVPN\default.xml
. 2019.08.17 21:56:43 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
. 2019.08.17 21:56:43 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2019.08.17 21:56:43 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2019.08.17 21:56:43 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2019.08.17 21:56:43 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
. 2019.08.17 21:56:43 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem
W 2019.08.17 21:56:44 - Recovery. Unexpected crash?
. 2019.08.17 21:56:44 - Routes, removed a route previously added, 184.75.221.59 for gateway 10.31.234.1
. 2019.08.17 21:56:44 - Routes, removed a route previously added, 2606:6080:1001:10:3c5b:63ff:df18:8486 for gateway fde6:7a:7d20:1bea::1
. 2019.08.17 21:56:44 - Updating systems & servers data ...
I 2019.08.17 21:56:44 - Ready
. 2019.08.17 21:56:45 - Systems & servers data update completed

Share this post


Link to post

The issue is with eddie. If you use the config generator and openvpn, it will work normally.

Share this post


Link to post
32 minutes ago, caseyjp1 said:

The issue is with eddie. If you use the config generator and openvpn, it will work normally.


Just to clarify, going forward I will need to use OpenVPN client instead of Eddie? There is literally no fix for AirVPN's client Eddie to fix the issue to continue using it?

Not that I care much which client I use, but it seems odd that it would just suddenly break over night, and not be recoverable again.

I appreciate the help!

Share this post


Link to post

This has been on and off for several days now, it's particularly bad tonight.

Restarting doesn't fix it, switching networks doesn't fix it, trying different servers and different countries doesn't fix it, all the meanwhile I'm connected and using the same servers that fail on my desktop on my phone, and everything's working fine on my phone.

The problem: the Eddie client appears to repeatedly try to connect to servers, but always ends up just randomly disconnecting just when it looks like it's about to connect,. Sometimes it'll connect to one for a few seconds then disconnect again. So far every time it's gone away on its own by just randomly trying different servers/Eddie restarts within 15-20 minutes of it starting, but it's very frustrating. Can anyone tell from the logs if it's something with my computer, something with eddie, or something with my account?

I only have 2 devices set up to connect to this account so it shouldn't be some issue with it kicking me off for trying to connect too many devices, I don't think.

https://pastebin.com/PDvxJwfT

I have no idea at all really but is it maybe something to do with those SSL certificate failures? I know stuff like that can happen on websites if your computer date and time is way off, but mine is dead accurate.

Share this post


Link to post
2 hours ago, seamonster said:

Just to clarify, going forward I will need to use OpenVPN client instead of Eddie? There is literally no fix for AirVPN's client Eddie to fix the issue to continue using it?

Not that I care much which client I use, but it seems odd that it would just suddenly break over night, and not be recoverable again.

I appreciate the help!
The SSL certificate isn't something you can fix. Airvpn needs to update/resolve the issue. Once they do, then the eddie client will start working again.
Until then, you can use the config generator to connect manually...and beyond that is past the scope of my response. heh.

Share this post


Link to post
2 hours ago, caseyjp1 said:

The issue is with eddie. If you use the config generator and openvpn, it will work normally.


If I do so, I get dnsleak, so....

Share this post


Link to post

There are ways to work around the expired certificate.  You can set your system clock back.  Or on a Mac / Linux, you can create the file ~/.curlrc and have a single line in it: --insecure

Apparently there's also a way to do that on Windows, but I'm not much of a Windows guy so I can't comment about it.  Check out the other discussion threads on the topic.  Good luck!

Share this post


Link to post

I'm having the same problem, im switching to Nord, and yes I contacted customer service to and they where no help!!!

Share this post


Link to post

Just to confirm. This has been happening since around 7 hours ago. Only VPN access through Eddie is affected.

Share this post


Link to post

I confirm the issue. Setting the date to yesterday (august 17th) in Windows 7 is working. Waiting for a permanent fix.

Share this post


Link to post
I was connected to my Dutch server, I was logged out and now I can only log in lalande brazil why this? Any other server that I enter is logged out, and I noticed that this server always has about 10 users and got over 50 users is a bug? or was hacked? Why is lalande the only server running now? this server looks good but why can I just log in? :dunno::o

Share this post


Link to post

Hi,

So as many it seems has experienced, I too get stuck trying to connect, having the client check routes, then immediately disconnect. 

I have tried most suggested fixes, turning off DNS, turning off Network lock, restarting the client, computer, and reinstalling the client. 

This seems to be where it goes wrong: 

I 2019.08.18 10:13:41 - Session starting.
I 2019.08.18 10:13:41 - Checking authorization ...
! 2019.08.18 10:13:42 - Connecting to Tarazed (Netherlands, Alblasserdam)
. 2019.08.18 10:13:42 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.6.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jul 29 2018
. 2019.08.18 10:13:42 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2019.08.18 10:13:42 - Connection to OpenVPN Management Interface
. 2019.08.18 10:13:42 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.08.18 10:13:42 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.08.18 10:13:42 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.08.18 10:13:42 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.08.18 10:13:42 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.08.18 10:13:42 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.135:443
. 2019.08.18 10:13:42 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144]
. 2019.08.18 10:13:42 - OpenVPN > UDP link local: (not bound)
. 2019.08.18 10:13:42 - OpenVPN > UDP link remote: [AF_INET]213.152.161.135:443
. 2019.08.18 10:13:42 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.135:443, sid=54826a68 7c286295
. 2019.08.18 10:13:42 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.08.18 10:13:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.08.18 10:13:42 - OpenVPN > VERIFY KU OK
. 2019.08.18 10:13:42 - OpenVPN > Validating certificate extended key usage
. 2019.08.18 10:13:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.08.18 10:13:42 - OpenVPN > VERIFY EKU OK
. 2019.08.18 10:13:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tarazed, emailAddress=info@airvpn.org
. 2019.08.18 10:13:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.08.18 10:13:42 - OpenVPN > [Tarazed] Peer Connection Initiated with [AF_INET]213.152.161.135:443
. 2019.08.18 10:13:43 - OpenVPN > SENT CONTROL [Tarazed]: 'PUSH_REQUEST' (status=1)
. 2019.08.18 10:13:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.31.46.1,dhcp-option DNS6 fde6:7a:7d20:1b2e::1,tun-ipv6,route-gateway 10.31.46.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1b2e::1025/64 fde6:7a:7d20:1b2e::1,ifconfig 10.31.46.39 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2019.08.18 10:13:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2019.08.18 10:13:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.08.18 10:13:43 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.08.18 10:13:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.08.18 10:13:43 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.08.18 10:13:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.08.18 10:13:43 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.08.18 10:13:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2019.08.18 10:13:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.08.18 10:13:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.08.18 10:13:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.08.18 10:13:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.08.18 10:13:43 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=en0 HWADDR=4c:32:75:98:64:17
. 2019.08.18 10:13:43 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2019.08.18 10:13:43 - OpenVPN > GDG6: problem writing to routing socket
. 2019.08.18 10:13:43 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2019.08.18 10:13:43 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
. 2019.08.18 10:13:43 - OpenVPN > Opened utun device utun1
. 2019.08.18 10:13:43 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2019.08.18 10:13:43 - OpenVPN > /sbin/ifconfig utun1 delete
. 2019.08.18 10:13:43 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2019.08.18 10:13:43 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2019.08.18 10:13:43 - OpenVPN > /sbin/ifconfig utun1 10.31.46.39 10.31.46.39 netmask 255.255.255.0 mtu 1500 up
. 2019.08.18 10:13:43 - OpenVPN > /sbin/route add -net 10.31.46.0 10.31.46.39 255.255.255.0
. 2019.08.18 10:13:43 - OpenVPN > add net 10.31.46.0: gateway 10.31.46.39
. 2019.08.18 10:13:43 - OpenVPN > /sbin/ifconfig utun1 inet6 fde6:7a:7d20:1b2e::1025/64
. 2019.08.18 10:13:43 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1b2e::/64 -> fde6:7a:7d20:1b2e::1025 metric 0) dev utun1
. 2019.08.18 10:13:43 - OpenVPN > /sbin/route add -inet6 fde6:7a:7d20:1b2e:: -prefixlen 64 -iface utun1
. 2019.08.18 10:13:43 - OpenVPN > route: writing to routing socket: File exists
. 2019.08.18 10:13:43 - OpenVPN > add net fde6:7a:7d20:1b2e::: gateway utun1: File exists
. 2019.08.18 10:13:43 - OpenVPN > /sbin/route add -net 213.152.161.135 192.168.0.1 255.255.255.255
. 2019.08.18 10:13:43 - OpenVPN > add net 213.152.161.135: gateway 192.168.0.1
. 2019.08.18 10:13:43 - OpenVPN > /sbin/route add -net 0.0.0.0 10.31.46.1 128.0.0.0
. 2019.08.18 10:13:43 - OpenVPN > add net 0.0.0.0: gateway 10.31.46.1
. 2019.08.18 10:13:43 - OpenVPN > /sbin/route add -net 128.0.0.0 10.31.46.1 128.0.0.0
. 2019.08.18 10:13:43 - OpenVPN > add net 128.0.0.0: gateway 10.31.46.1
. 2019.08.18 10:13:43 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1b2e::1 metric -1) dev utun1
. 2019.08.18 10:13:43 - OpenVPN > /sbin/route add -inet6 :: -prefixlen 3 -iface utun1
. 2019.08.18 10:13:43 - OpenVPN > add net ::: gateway utun1
. 2019.08.18 10:13:43 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1b2e::1 metric -1) dev utun1
. 2019.08.18 10:13:43 - OpenVPN > /sbin/route add -inet6 2000:: -prefixlen 4 -iface utun1
. 2019.08.18 10:13:43 - OpenVPN > add net 2000::: gateway utun1
. 2019.08.18 10:13:43 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1b2e::1 metric -1) dev utun1
. 2019.08.18 10:13:43 - OpenVPN > /sbin/route add -inet6 3000:: -prefixlen 4 -iface utun1
. 2019.08.18 10:13:43 - OpenVPN > add net 3000::: gateway utun1
. 2019.08.18 10:13:43 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1b2e::1 metric -1) dev utun1
. 2019.08.18 10:13:43 - OpenVPN > /sbin/route add -inet6 fc00:: -prefixlen 7 -iface utun1
. 2019.08.18 10:13:43 - OpenVPN > add net fc00::: gateway utun1
. 2019.08.18 10:13:44 - DNS of a network adapter forced (ThinkPad USB 3.0 Pro Dock, from Automatic to 10.31.46.1, fde6:7a:7d20:1b2e::1)
. 2019.08.18 10:13:44 - DNS of a network adapter forced (iPad USB, from Automatic to 10.31.46.1, fde6:7a:7d20:1b2e::1)
. 2019.08.18 10:13:44 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.31.46.1, fde6:7a:7d20:1b2e::1)
. 2019.08.18 10:13:44 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.31.46.1, fde6:7a:7d20:1b2e::1)
. 2019.08.18 10:13:44 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.31.46.1, fde6:7a:7d20:1b2e::1)
. 2019.08.18 10:13:44 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.31.46.1, fde6:7a:7d20:1b2e::1)
. 2019.08.18 10:13:44 - Routes, added a new route, 213.152.161.133 for gateway 10.31.46.1
. 2019.08.18 10:13:44 - Routes, added a new route, 2a00:1678:2470:4:6cea:a07e:e6f3:db56 for gateway fde6:7a:7d20:1b2e::1
. 2019.08.18 10:13:44 - Flushing DNS
I 2019.08.18 10:13:45 - Checking route IPv4
. 2019.08.18 10:13:45 - curl: (60) SSL certificate problem: certificate has expired
. 2019.08.18 10:13:45 -     More details here: https://curl.haxx.se/docs/sslcerts.html
. 2019.08.18 10:13:45 -     curl performs SSL certificate verification by default, using a "bundle"
. 2019.08.18 10:13:45 -     of Certificate Authority (CA) public keys (CA certs). If the default
. 2019.08.18 10:13:45 -     bundle file isn't adequate, you can specify an alternate file
. 2019.08.18 10:13:45 -     using the --cacert option.
. 2019.08.18 10:13:45 -     If this HTTPS server uses a certificate signed by a CA represented in
. 2019.08.18 10:13:45 -     the bundle, the certificate verification probably failed due to a
. 2019.08.18 10:13:45 -     problem with the certificate (it might be expired, or the name might
. 2019.08.18 10:13:45 -     not match the domain name in the URL).
. 2019.08.18 10:13:45 -     If you'd like to turn off curl's verification of the certificate, use
. 2019.08.18 10:13:45 -     the -k (or --insecure) option.
. 2019.08.18 10:13:45 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.
. 2019.08.18 10:13:45 - Checking route (2° try)
. 2019.08.18 10:13:46 - curl: (60) SSL certificate problem: certificate has expired
. 2019.08.18 10:13:46 -     More details here: https://curl.haxx.se/docs/sslcerts.html
. 2019.08.18 10:13:46 -     curl performs SSL certificate verification by default, using a "bundle"
. 2019.08.18 10:13:46 -     of Certificate Authority (CA) public keys (CA certs). If the default
. 2019.08.18 10:13:46 -     bundle file isn't adequate, you can specify an alternate file
. 2019.08.18 10:13:46 -     using the --cacert option.
. 2019.08.18 10:13:46 -     If this HTTPS server uses a certificate signed by a CA represented in
. 2019.08.18 10:13:46 -     the bundle, the certificate verification probably failed due to a
. 2019.08.18 10:13:46 -     problem with the certificate (it might be expired, or the name might
. 2019.08.18 10:13:46 -     not match the domain name in the URL).
. 2019.08.18 10:13:46 -     If you'd like to turn off curl's verification of the certificate, use
. 2019.08.18 10:13:46 -     the -k (or --insecure) option.
. 2019.08.18 10:13:46 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.
. 2019.08.18 10:13:46 - Checking route (3° try)
. 2019.08.18 10:13:48 - curl: (60) SSL certificate problem: certificate has expired
. 2019.08.18 10:13:48 -     More details here: https://curl.haxx.se/docs/sslcerts.html
. 2019.08.18 10:13:48 -     curl performs SSL certificate verification by default, using a "bundle"
. 2019.08.18 10:13:48 -     of Certificate Authority (CA) public keys (CA certs). If the default
. 2019.08.18 10:13:48 -     bundle file isn't adequate, you can specify an alternate file
. 2019.08.18 10:13:48 -     using the --cacert option.
. 2019.08.18 10:13:48 -     If this HTTPS server uses a certificate signed by a CA represented in
. 2019.08.18 10:13:48 -     the bundle, the certificate verification probably failed due to a
. 2019.08.18 10:13:48 -     problem with the certificate (it might be expired, or the name might
. 2019.08.18 10:13:48 -     not match the domain name in the URL).
. 2019.08.18 10:13:48 -     If you'd like to turn off curl's verification of the certificate, use
. 2019.08.18 10:13:48 -     the -k (or --insecure) option.
. 2019.08.18 10:13:48 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.
E 2019.08.18 10:13:48 - Checking route IPv4 failed.
. 2019.08.18 10:13:48 - OpenVPN > Initialization Sequence Completed
! 2019.08.18 10:13:48 - Disconnecting
. 2019.08.18 10:13:48 - Routes, removed a route previously added, 213.152.161.133 for gateway 10.31.46.1
. 2019.08.18 10:13:48 - Routes, removed a route previously added, 2a00:1678:2470:4:6cea:a07e:e6f3:db56 for gateway fde6:7a:7d20:1b2e::1
. 2019.08.18 10:13:48 - Sending management termination signal
. 2019.08.18 10:13:48 - Management - Send 'signal SIGTERM'
. 2019.08.18 10:13:48 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2019.08.18 10:13:48 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2019.08.18 10:13:54 - OpenVPN > /sbin/route delete -net 213.152.161.135 192.168.0.1 255.255.255.255
. 2019.08.18 10:13:54 - OpenVPN > delete net 213.152.161.135: gateway 192.168.0.1
. 2019.08.18 10:13:54 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.31.46.1 128.0.0.0
. 2019.08.18 10:13:54 - OpenVPN > delete net 0.0.0.0: gateway 10.31.46.1
. 2019.08.18 10:13:54 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.31.46.1 128.0.0.0
. 2019.08.18 10:13:54 - OpenVPN > delete net 128.0.0.0: gateway 10.31.46.1
. 2019.08.18 10:13:54 - OpenVPN > delete_route_ipv6(::/3)
. 2019.08.18 10:13:54 - OpenVPN > /sbin/route delete -inet6 :: -prefixlen 3 -iface utun1
. 2019.08.18 10:13:54 - OpenVPN > delete net ::: gateway utun1
. 2019.08.18 10:13:54 - OpenVPN > delete_route_ipv6(2000::/4)
. 2019.08.18 10:13:54 - OpenVPN > /sbin/route delete -inet6 2000:: -prefixlen 4 -iface utun1
. 2019.08.18 10:13:54 - OpenVPN > delete net 2000::: gateway utun1
. 2019.08.18 10:13:54 - OpenVPN > delete_route_ipv6(3000::/4)
. 2019.08.18 10:13:54 - OpenVPN > /sbin/route delete -inet6 3000:: -prefixlen 4 -iface utun1
. 2019.08.18 10:13:54 - OpenVPN > delete net 3000::: gateway utun1
. 2019.08.18 10:13:54 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2019.08.18 10:13:54 - OpenVPN > /sbin/route delete -inet6 fc00:: -prefixlen 7 -iface utun1
. 2019.08.18 10:13:54 - OpenVPN > delete net fc00::: gateway utun1
. 2019.08.18 10:13:54 - OpenVPN > Closing TUN/TAP interface
. 2019.08.18 10:13:54 - OpenVPN > /sbin/route delete -inet6 fde6:7a:7d20:1b2e::1025
. 2019.08.18 10:13:54 - OpenVPN > delete host fde6:7a:7d20:1b2e::1025
. 2019.08.18 10:13:54 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2019.08.18 10:13:54 - Connection terminated.
. 2019.08.18 10:13:54 - DNS of a network adapter restored to original settings (ThinkPad USB 3.0 Pro Dock, to Automatic)
. 2019.08.18 10:13:54 - DNS of a network adapter restored to original settings (iPad USB, to Automatic)
. 2019.08.18 10:13:54 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2019.08.18 10:13:54 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2019.08.18 10:13:54 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
. 2019.08.18 10:13:54 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
I 2019.08.18 10:13:56 - Cancel requested.
! 2019.08.18 10:13:56 - Session terminated.


I started looking through the suggested link regarding the expired certificates (https://curl.haxx.se/docs/sslcerts.html) but I am not sure that's the right path to fix the issue. 

Any ideas? 

Share this post


Link to post

Hello everyone,
since years the only way for me to use air properly is connecting norway servers via SSL/443/2, because of ISP traffic shaping.
Today I can't connect to any servers with the settings above at all because of some SSL certificate problems:

"I 2019.08.18 10:52:00 - Checking route IPv4
. 2019.08.18 10:52:00 - curl: (60) SSL certificate problem: certificate has expired
. 2019.08.18 10:52:00 -     More details here: https://curl.haxx.se/docs/sslcerts.html
. 2019.08.18 10:52:00 -     curl performs SSL certificate verification by default, using a "bundle"
. 2019.08.18 10:52:00 -     of Certificate Authority (CA) public keys (CA certs). If the default
. 2019.08.18 10:52:00 -     bundle file isn't adequate, you can specify an alternate file
. 2019.08.18 10:52:00 -     using the --cacert option.
. 2019.08.18 10:52:00 -     If this HTTPS server uses a certificate signed by a CA represented in
. 2019.08.18 10:52:00 -     the bundle, the certificate verification probably failed due to a
. 2019.08.18 10:52:00 -     problem with the certificate (it might be expired, or the name might
. 2019.08.18 10:52:00 -     not match the domain name in the URL).
. 2019.08.18 10:52:00 -     If you'd like to turn off curl's verification of the certificate, use
. 2019.08.18 10:52:00 -     the -k (or --insecure) option.
. 2019.08.18 10:52:00 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure."

How can I solve this issue?
Thank you in advance!

Share this post


Link to post

Hello,
we have experienced a problem with VPN server LetsEncrypt certificates deployment. The system procedure got stuck and failed to deploy updated certificates. In turn, such a failure caused "route check" failures on Eddie desktop editions, and ONLY on them, due to expired certificates verified by cURL during the route check phase.

The problem has been affecting a wide amount of VPN servers for about 8 hours and has been resolved completely now. We deeply apologize for any inconvenience.

Kind regards
 

Share this post


Link to post

As of last night i have the same problem. I use UK servers. Seems it might not be my pc that is the cause but Air VPN own server certificate that expired?

Share this post


Link to post

Hi,
I keep getting disconnected today it started, i have reinstalled Eddie, etc. I am in windows, i have even restored windows to a previous date, not sure what is going on.

I need help.

Share this post


Link to post

Thanks to all the software health-care professionals, there, for bringing Eddie back to health. Ciao from New World.

Share this post


Link to post
Guest
This topic is now closed to further replies.
Sign in to follow this  

×
×
  • Create New...