gnrvwp 0 Posted ... Hello, Is there anyone here who uses openvpn over SSH with AirVPN? I'm curious to know which AirVPN server works for you. I've tried a couple of servers but none worked. SSH Client dies with errors: debug2: channel 1: read failed debug2: channel 1: send close debug2: channel 1: rcvd close debug2: channel 1: is dead I'm working with support at the moment but want to know if any AirVPN active users use this feature and are able to connect successfully. Quote Share this post Link to post
OpenSourcerer 1450 Posted ... Can confirm there might be a problem. . 2019.09.26 19:01:07 - Eddie version: 2.18.2beta / linux_x64, System: Linux, Name: Debian GNU/Linux bullseye/sid \n \l, Version: Linux desktop 5.2.0-2-amd64 #1 SMP Debian 5.2.9-2 (2019-08-21) x86_64 GNU/Linux, Mono/.Net: 6.4.0.198 (tarball Tue Sep 24 01:24:35 UTC 2019); Framework: v4.0.30319 . 2019.09.26 19:01:07 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2019.09.26 19:01:07 - Profile path: /home/gigan3rd/.config/eddie/default.profile . 2019.09.26 19:01:08 - Reading options from /home/gigan3rd/.config/eddie/default.profile . 2019.09.26 19:01:08 - OpenVPN Driver - Found, /dev/net/tun . 2019.09.26 19:01:08 - OpenVPN - Version: 2.4.7 - OpenSSL 1.0.2s 28 May 2019, LZO 2.10 (/sbin/openvpn) . 2019.09.26 19:01:08 - SSH - Version: OpenSSH_8.0p1 Debian-6, OpenSSL 1.1.1c 28 May 2019 (/usr/bin/ssh) . 2019.09.26 19:01:08 - SSL - Version: stunnel 5.55 (/usr/bin/stunnel4) . 2019.09.26 19:01:08 - curl - Version: 7.66.0 (/usr/bin/curl) . 2019.09.26 19:01:08 - Certification Authorities: /usr/share/eddie-ui/cacert.pem I 2019.09.26 19:01:10 - Ready . 2019.09.26 19:01:10 - Collect information about AirVPN completed I 2019.09.26 19:03:05 - Session starting. I 2019.09.26 19:03:05 - Checking authorization ... ! 2019.09.26 19:03:06 - Connecting to Kitalpha (Switzerland, Zurich) . 2019.09.26 19:03:06 - Routes, added a new route, 91.214.169.68 for gateway 192.168.110.1 . 2019.09.26 19:03:06 - SSH > OpenSSH_8.0p1 Debian-6, OpenSSL 1.1.1c 28 May 2019 . 2019.09.26 19:03:06 - SSH > debug1: Reading configuration data /etc/ssh/ssh_config . 2019.09.26 19:03:06 - SSH > debug1: /etc/ssh/ssh_config line 19: Applying options for * . 2019.09.26 19:03:06 - SSH > debug1: Connecting to 91.214.169.68 [91.214.169.68] port 22. . 2019.09.26 19:03:06 - SSH > debug1: Connection established. . 2019.09.26 19:03:06 - SSH > debug1: identity file /home/gigan3rd/.config/eddie/f4e89b3c1258f6e342acd5e176015a6cfbce99218692c2cd143c8f4f7ffa9e5d.tmp.key type -1 . 2019.09.26 19:03:06 - SSH > debug1: identity file /home/gigan3rd/.config/eddie/f4e89b3c1258f6e342acd5e176015a6cfbce99218692c2cd143c8f4f7ffa9e5d.tmp.key-cert type -1 . 2019.09.26 19:03:06 - SSH > debug1: Local version string SSH-2.0-OpenSSH_8.0p1 Debian-6 . 2019.09.26 19:03:06 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_7.4p1 Debian-10+deb9u6 . 2019.09.26 19:03:06 - SSH > debug1: match: OpenSSH_7.4p1 Debian-10+deb9u6 pat OpenSSH_7.0*,OpenSSH_7.1*,OpenSSH_7.2*,OpenSSH_7.3*,OpenSSH_7.4*,OpenSSH_7.5*,OpenSSH_7.6*,OpenSSH_7.7* compat 0x04000002 . 2019.09.26 19:03:06 - SSH > debug1: Authenticating to 91.214.169.68:22 as 'sshtunnel' . 2019.09.26 19:03:06 - SSH > debug1: SSH2_MSG_KEXINIT sent . 2019.09.26 19:03:06 - SSH > debug1: SSH2_MSG_KEXINIT received . 2019.09.26 19:03:06 - SSH > debug1: kex: algorithm: curve25519-sha256 . 2019.09.26 19:03:06 - SSH > debug1: kex: host key algorithm: ecdsa-sha2-nistp256 . 2019.09.26 19:03:06 - SSH > debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none . 2019.09.26 19:03:06 - SSH > debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none . 2019.09.26 19:03:06 - SSH > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY . 2019.09.26 19:03:06 - SSH > debug1: Server host key: ecdsa-sha2-nistp256 SHA256:l6EfIx2fGDhyWWrPd/8ShZsggPw2fbLLANOmqYdghPI . 2019.09.26 19:03:06 - SSH > Warning: Permanently added '91.214.169.68' (ECDSA) to the list of known hosts. . 2019.09.26 19:03:06 - SSH > debug1: rekey out after 134217728 blocks . 2019.09.26 19:03:06 - SSH > debug1: SSH2_MSG_NEWKEYS sent . 2019.09.26 19:03:06 - SSH > debug1: expecting SSH2_MSG_NEWKEYS . 2019.09.26 19:03:06 - SSH > debug1: SSH2_MSG_NEWKEYS received . 2019.09.26 19:03:06 - SSH > debug1: rekey in after 134217728 blocks . 2019.09.26 19:03:06 - SSH > debug1: Will attempt key: /home/gigan3rd/.config/eddie/f4e89b3c1258f6e342acd5e176015a6cfbce99218692c2cd143c8f4f7ffa9e5d.tmp.key explicit . 2019.09.26 19:03:06 - SSH > debug1: SSH2_MSG_EXT_INFO received . 2019.09.26 19:03:06 - SSH > debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521> . 2019.09.26 19:05:06 - SSH > Connection closed by 91.214.169.68 port 22 ! 2019.09.26 19:05:06 - Disconnecting . 2019.09.26 19:05:06 - Routes, removed a route previously added, 91.214.169.68 for gateway 192.168.110.1 . 2019.09.26 19:05:06 - Connection terminated. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
gnrvwp 0 Posted ... Thanks for the data point, GigaNerd! Giga vs Huge: which one is bigger? Haha... Quote Share this post Link to post
Clodo 177 Posted ... 20 hours ago, giganerd said: Can confirm there might be a problem. Please retry now with the same server (Kitalpha), always SSH 22. Waiting for feedback. Thanks. Quote Share this post Link to post
OpenSourcerer 1450 Posted ... 3 hours ago, Clodo said: Please retry now with the same server (Kitalpha), always SSH 22. Waiting for feedback. Thanks. Can confirm it working again. . 2019.09.27 19:24:13 - Eddie version: 2.18.2beta / linux_x64, System: Linux, Name: Debian GNU/Linux bullseye/sid \n \l, Version: Linux desktop 5.2.0-2-amd64 #1 SMP Debian 5.2.9-2 (2019-08-21) x86_64 GNU/Linux, Mono/.Net: 6.4.0.198 (tarball Tue Sep 24 01:24:35 UTC 2019); Framework: v4.0.30319 . 2019.09.27 19:24:13 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2019.09.27 19:24:13 - Profile path: /home/gigan3rd/.config/eddie/default.profile . 2019.09.27 19:24:14 - Reading options from /home/gigan3rd/.config/eddie/default.profile . 2019.09.27 19:24:14 - OpenVPN Driver - Found, /dev/net/tun . 2019.09.27 19:24:14 - OpenVPN - Version: 2.4.7 - OpenSSL 1.0.2s 28 May 2019, LZO 2.10 (/sbin/openvpn) . 2019.09.27 19:24:14 - SSH - Version: OpenSSH_8.0p1 Debian-6, OpenSSL 1.1.1c 28 May 2019 (/usr/bin/ssh) . 2019.09.27 19:24:14 - SSL - Version: stunnel 5.55 (/usr/bin/stunnel4) . 2019.09.27 19:24:14 - curl - Version: 7.66.0 (/usr/bin/curl) . 2019.09.27 19:24:14 - Certification Authorities: /usr/share/eddie-ui/cacert.pem I 2019.09.27 19:24:14 - Ready . 2019.09.27 19:24:14 - Collect information about AirVPN completed I 2019.09.27 19:24:24 - Session starting. I 2019.09.27 19:24:24 - Checking authorization ... ! 2019.09.27 19:24:24 - Connecting to Kitalpha (Switzerland, Zurich) . 2019.09.27 19:24:24 - Routes, added a new route, 91.214.169.68 for gateway 192.168.110.1 . 2019.09.27 19:24:24 - SSH > OpenSSH_8.0p1 Debian-6, OpenSSL 1.1.1c 28 May 2019 . 2019.09.27 19:24:24 - SSH > debug1: Reading configuration data /etc/ssh/ssh_config . 2019.09.27 19:24:24 - SSH > debug1: /etc/ssh/ssh_config line 19: Applying options for * . 2019.09.27 19:24:24 - SSH > debug1: Connecting to 91.214.169.68 [91.214.169.68] port 22. . 2019.09.27 19:24:24 - SSH > debug1: Connection established. . 2019.09.27 19:24:24 - SSH > debug1: identity file /home/gigan3rd/.config/eddie/d6a45b75a5599dac7567ca5217ea9fcd1ee125c5ab3debac2adb07816c8d14ec.tmp.key type -1 . 2019.09.27 19:24:24 - SSH > debug1: identity file /home/gigan3rd/.config/eddie/d6a45b75a5599dac7567ca5217ea9fcd1ee125c5ab3debac2adb07816c8d14ec.tmp.key-cert type -1 . 2019.09.27 19:24:24 - SSH > debug1: Local version string SSH-2.0-OpenSSH_8.0p1 Debian-6 . 2019.09.27 19:24:24 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_7.4p1 Debian-10+deb9u6 . 2019.09.27 19:24:24 - SSH > debug1: match: OpenSSH_7.4p1 Debian-10+deb9u6 pat OpenSSH_7.0*,OpenSSH_7.1*,OpenSSH_7.2*,OpenSSH_7.3*,OpenSSH_7.4*,OpenSSH_7.5*,OpenSSH_7.6*,OpenSSH_7.7* compat 0x04000002 . 2019.09.27 19:24:24 - SSH > debug1: Authenticating to 91.214.169.68:22 as 'sshtunnel' . 2019.09.27 19:24:24 - SSH > debug1: SSH2_MSG_KEXINIT sent . 2019.09.27 19:24:24 - SSH > debug1: SSH2_MSG_KEXINIT received . 2019.09.27 19:24:24 - SSH > debug1: kex: algorithm: curve25519-sha256 . 2019.09.27 19:24:24 - SSH > debug1: kex: host key algorithm: ecdsa-sha2-nistp256 . 2019.09.27 19:24:24 - SSH > debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none . 2019.09.27 19:24:24 - SSH > debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none . 2019.09.27 19:24:24 - SSH > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY . 2019.09.27 19:24:24 - SSH > debug1: Server host key: ecdsa-sha2-nistp256 SHA256:l6EfIx2fGDhyWWrPd/8ShZsggPw2fbLLANOmqYdghPI . 2019.09.27 19:24:24 - SSH > Warning: Permanently added '91.214.169.68' (ECDSA) to the list of known hosts. . 2019.09.27 19:24:24 - SSH > debug1: rekey out after 134217728 blocks . 2019.09.27 19:24:24 - SSH > debug1: SSH2_MSG_NEWKEYS sent . 2019.09.27 19:24:24 - SSH > debug1: expecting SSH2_MSG_NEWKEYS . 2019.09.27 19:24:24 - SSH > debug1: SSH2_MSG_NEWKEYS received . 2019.09.27 19:24:24 - SSH > debug1: rekey in after 134217728 blocks . 2019.09.27 19:24:24 - SSH > debug1: Will attempt key: /home/gigan3rd/.config/eddie/d6a45b75a5599dac7567ca5217ea9fcd1ee125c5ab3debac2adb07816c8d14ec.tmp.key explicit . 2019.09.27 19:24:24 - SSH > debug1: SSH2_MSG_EXT_INFO received . 2019.09.27 19:24:24 - SSH > debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521> . 2019.09.27 19:24:24 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received . 2019.09.27 19:24:24 - SSH > debug1: Authentications that can continue: publickey . 2019.09.27 19:24:24 - SSH > debug1: Next authentication method: publickey . 2019.09.27 19:24:24 - SSH > debug1: Trying private key: /home/gigan3rd/.config/eddie/d6a45b75a5599dac7567ca5217ea9fcd1ee125c5ab3debac2adb07816c8d14ec.tmp.key . 2019.09.27 19:24:24 - SSH > debug1: Authentication succeeded (publickey). . 2019.09.27 19:24:24 - SSH > Authenticated to 91.214.169.68 ([91.214.169.68]:22). . 2019.09.27 19:24:24 - SSH > debug1: Local connections to LOCALHOST:58151 forwarded to remote address 127.0.0.1:2018 . 2019.09.27 19:24:24 - SSH > debug1: Local forwarding listening on ::1 port 58151. . 2019.09.27 19:24:24 - SSH > debug1: channel 0: new [port listener] . 2019.09.27 19:24:24 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 58151. . 2019.09.27 19:24:24 - SSH > debug1: channel 1: new [port listener] . 2019.09.27 19:24:24 - SSH > debug1: Requesting no-more-sessions@openssh.com . 2019.09.27 19:24:24 - SSH > debug1: Entering interactive session. . 2019.09.27 19:24:24 - SSH > debug1: pledge: network . 2019.09.27 19:24:24 - SSH > debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0 . 2019.09.27 19:24:24 - SSH > debug1: Remote: PTY allocation disabled. . 2019.09.27 19:24:24 - SSH > debug1: Remote: X11 forwarding disabled. . 2019.09.27 19:24:24 - SSH > debug1: Remote: Forced command. . 2019.09.27 19:24:24 - SSH > debug1: Connection to port 58151 forwarding to 127.0.0.1 port 2018 requested. . 2019.09.27 19:24:24 - SSH > debug1: channel 2: new [direct-tcpip] . 2019.09.27 19:24:24 - OpenVPN > OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 19 2019 . 2019.09.27 19:24:24 - OpenVPN > library versions: OpenSSL 1.0.2s 28 May 2019, LZO 2.10 . 2019.09.27 19:24:24 - Connection to OpenVPN Management Interface . 2019.09.27 19:24:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.09.27 19:24:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2019.09.27 19:24:24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2019.09.27 19:24:24 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:58151 . 2019.09.27 19:24:24 - OpenVPN > Socket Buffers: R=[131072->131072] S=[16384->16384] . 2019.09.27 19:24:24 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:58151 [nonblock] . 2019.09.27 19:24:24 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:58151 . 2019.09.27 19:24:24 - OpenVPN > TCP_CLIENT link local: (not bound) . 2019.09.27 19:24:24 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:58151 . 2019.09.27 19:24:24 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:58151, sid=6f3505ff 0845ca19 . 2019.09.27 19:24:25 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.09.27 19:24:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.09.27 19:24:25 - OpenVPN > VERIFY KU OK . 2019.09.27 19:24:25 - OpenVPN > Validating certificate extended key usage . 2019.09.27 19:24:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.09.27 19:24:25 - OpenVPN > VERIFY EKU OK . 2019.09.27 19:24:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kitalpha, emailAddress=info@airvpn.org . 2019.09.27 19:24:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.09.27 19:24:25 - OpenVPN > [Kitalpha] Peer Connection Initiated with [AF_INET]127.0.0.1:58151 . 2019.09.27 19:24:26 - OpenVPN > SENT CONTROL [Kitalpha]: 'PUSH_REQUEST' (status=1) . 2019.09.27 19:24:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.20.9.1,route-gateway 10.20.9.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.20.9.213 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2019.09.27 19:24:26 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp' . 2019.09.27 19:24:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.09.27 19:24:26 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.09.27 19:24:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.09.27 19:24:26 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.09.27 19:24:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.09.27 19:24:26 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.09.27 19:24:26 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2019.09.27 19:24:26 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.09.27 19:24:26 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.09.27 19:24:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.09.27 19:24:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.09.27 19:24:26 - OpenVPN > ROUTE_GATEWAY 192.168.110.1/255.255.255.0 IFACE=enp25s0 HWADDR=30:9c:23:69:5e:4e . 2019.09.27 19:24:26 - OpenVPN > TUN/TAP device tun0 opened . 2019.09.27 19:24:26 - OpenVPN > TUN/TAP TX queue length set to 100 . 2019.09.27 19:24:26 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2019.09.27 19:24:26 - OpenVPN > /sbin/ip addr add dev tun0 10.20.9.213/24 broadcast 10.20.9.255 . 2019.09.27 19:24:31 - OpenVPN > /sbin/ip route add 127.0.0.1/32 via 192.168.110.1 . 2019.09.27 19:24:31 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.20.9.1 . 2019.09.27 19:24:31 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.20.9.1 . 2019.09.27 19:24:31 - Routes, added a new route, 91.214.169.69 for gateway 10.20.9.1 . 2019.09.27 19:24:31 - Flushing DNS I 2019.09.27 19:24:31 - Checking route IPv4 ! 2019.09.27 19:24:32 - Connected. . 2019.09.27 19:24:32 - OpenVPN > Initialization Sequence Completed 23 hours ago, gnrvwp said: Giga vs Huge: which one is bigger? Haha... From a most technical, nerdy point of view: None, as they're incomparable. Giga is a SI-defined metric prefix. Huge is a synonym of big. So technically Tera is bigger than Giga. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
gnrvwp 0 Posted ... So... Tera thanks from me, GigaNerd, for introducing me a new word today. :D Also kudos to Clodo for addressing this issue so quickly. I guess openvpn over SSH is a rarely used feature so not much attention was paid to it. Quote Share this post Link to post
gnrvwp 0 Posted ... Hello, Just a follow up on this openvpn over SSH issue: Kitalpha entry-IP address 1 works great as expected. Thanks again Clodo. Kitalpha entry-IP address 2 works fine, too. But Kitalpha entry-IP address 3 and Kitalpha entry-IP address 4 do not work with openvpn over SSH. The SSH Client just dies. debug2: channel 1: obuf empty debug2: channel 1: read failed debug2: channel 1: ibuf empty debug2: channel 1: rcvd close debug2: channel 1: is dead I tried a few more IPs in the entry 1, 3, and 4 groups and none worked with openvpn over SSH. So my conclusion is: AirVPN only supports openvpn over SSH for the entry-IP address 2 group. Entry-IP address 1, 3 and 4 groups are not officially supported and may or may not work. Is this statement correct? Please advise. Quote Share this post Link to post