Jump to content
Not connected, Your IP: 3.147.57.239
deliket

[Linux] Eddie 2.18.4beta connects to servers, but internet traffic is not being routed through VPN

Recommended Posts

Current problems are happening on a Google Chromebook using crouton(debian),
Logs:

Quote
. 2019.10.15 01:09:42 - Eddie version: 2.18.4beta / linux_x64, System: Linux, Name: Ubuntu 16.04.6 LTS \n \l, Version: Linux localhost 3.18.0-19733-g972ff9adcd38 #1 SMP PREEMPT Wed Sep 25 23:48:53 PDT 2019 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.2.1 (Debian 4.2.1.102+dfsg2-7ubuntu4); Framework: v4.0.30319
. 2019.10.15 01:09:42 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
. 2019.10.15 01:09:42 - Raise system privileges
. 2019.10.15 01:09:43 - Profile path: /usr/lib/eddie-ui/default.profile
. 2019.10.15 01:09:44 - Reading options from /usr/lib/eddie-ui/default.profile
. 2019.10.15 01:09:46 - OpenVPN Driver - Found, /dev/net/tun
. 2019.10.15 01:09:46 - OpenVPN - Version: 2.4.7 - OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08 (/usr/sbin/openvpn)
. 2019.10.15 01:09:46 - SSH - Version: OpenSSH_7.2p2 Ubuntu-4ubuntu2.8, OpenSSL 1.0.2g  1 Mar 2016 (/usr/bin/ssh)
. 2019.10.15 01:09:46 - SSL - Version: stunnel 5.30 (/usr/bin/stunnel4)
. 2019.10.15 01:09:46 - curl - Version: 7.47.0 (/usr/bin/curl)
. 2019.10.15 01:09:46 - Certification Authorities: /usr/share/eddie-ui/cacert.pem
. 2019.10.15 01:09:46 - Recovery. Unexpected crash?
W 2019.10.15 01:09:46 - Routes, add 162.219.176.3 for gateway 10.6.122.1 failed: Exception: Cannot find device "tun0"
W 2019.10.15 01:09:46 - Routes, add 2606:6080:1002:3:1da3:d12a:3e5:ae70 for gateway fde6:7a:7d20:27a::1 failed: Exception: Cannot find device "tun0"
I 2019.10.15 01:09:49 - Ready
I 2019.10.15 01:09:49 - Session starting.
. 2019.10.15 01:09:49 - Collect information about providers ...
. 2019.10.15 01:09:50 - Collect information about AirVPN completed
I 2019.10.15 01:09:52 - Checking authorization ...
! 2019.10.15 01:09:53 - Connecting to Sualocin (Canada, Toronto, Ontario)
. 2019.10.15 01:09:53 - OpenVPN > OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 19 2019
. 2019.10.15 01:09:53 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2019.10.15 01:09:53 - Connection to OpenVPN Management Interface
. 2019.10.15 01:09:53 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.10.15 01:09:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.10.15 01:09:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.10.15 01:09:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.10.15 01:09:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.10.15 01:09:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.45:443
. 2019.10.15 01:09:53 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2019.10.15 01:09:53 - OpenVPN > UDP link local: (not bound)
. 2019.10.15 01:09:53 - OpenVPN > UDP link remote: [AF_INET]184.75.221.45:443
. 2019.10.15 01:09:53 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.45:443, sid=f23f6dcd c5bd49a8
. 2019.10.15 01:09:53 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.10.15 01:09:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.10.15 01:09:53 - OpenVPN > VERIFY KU OK
. 2019.10.15 01:09:53 - OpenVPN > Validating certificate extended key usage
. 2019.10.15 01:09:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.10.15 01:09:53 - OpenVPN > VERIFY EKU OK
. 2019.10.15 01:09:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sualocin, emailAddress=info@airvpn.org
. 2019.10.15 01:09:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.10.15 01:09:54 - OpenVPN > [Sualocin] Peer Connection Initiated with [AF_INET]184.75.221.45:443
. 2019.10.15 01:09:55 - OpenVPN > SENT CONTROL [Sualocin]: 'PUSH_REQUEST' (status=1)
. 2019.10.15 01:09:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.30.218.1,dhcp-option DNS6 fde6:7a:7d20:1ada::1,tun-ipv6,route-gateway 10.30.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1ada::100f/64 fde6:7a:7d20:1ada::1,ifconfig 10.30.218.17 255.255.255.0,peer-id 1,cipher AES-256-GCM'
. 2019.10.15 01:09:55 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2019.10.15 01:09:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.10.15 01:09:55 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.10.15 01:09:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.10.15 01:09:55 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.10.15 01:09:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.10.15 01:09:55 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.10.15 01:09:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2019.10.15 01:09:55 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.10.15 01:09:55 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.10.15 01:09:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.10.15 01:09:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.10.15 01:09:55 - OpenVPN > ROUTE: default_gateway=UNDEF
. 2019.10.15 01:09:55 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2019.10.15 01:09:55 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2019.10.15 01:09:55 - OpenVPN > TUN/TAP device tun0 opened
. 2019.10.15 01:09:55 - OpenVPN > TUN/TAP TX queue length set to 100
. 2019.10.15 01:09:55 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2019.10.15 01:09:55 - OpenVPN > /sbin/ip addr add dev tun0 10.30.218.17/24 broadcast 10.30.218.255
. 2019.10.15 01:09:55 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:1ada::100f/64 dev tun0
. 2019.10.15 01:10:00 - OpenVPN > NOTE: unable to redirect default gateway -- Cannot read current default gateway from system
. 2019.10.15 01:10:00 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1ada::1 metric -1) dev tun0
. 2019.10.15 01:10:00 - OpenVPN > /sbin/ip -6 route add ::/3 dev tun0
. 2019.10.15 01:10:00 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1ada::1 metric -1) dev tun0
. 2019.10.15 01:10:00 - OpenVPN > /sbin/ip -6 route add 2000::/4 dev tun0
. 2019.10.15 01:10:00 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1ada::1 metric -1) dev tun0
. 2019.10.15 01:10:00 - OpenVPN > /sbin/ip -6 route add 3000::/4 dev tun0
. 2019.10.15 01:10:00 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1ada::1 metric -1) dev tun0
. 2019.10.15 01:10:00 - OpenVPN > /sbin/ip -6 route add fc00::/7 dev tun0
. 2019.10.15 01:10:00 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2019.10.15 01:10:00 - Routes, added a new route, 184.75.221.43 for gateway 10.30.218.1
. 2019.10.15 01:10:00 - Routes, added a new route, 2606:6080:1001:f:ed79:9361:ea0e:3e88 for gateway fde6:7a:7d20:1ada::1
. 2019.10.15 01:10:00 - Flushing DNS
I 2019.10.15 01:10:00 - Checking route IPv4
I 2019.10.15 01:10:01 - Checking route IPv6
I 2019.10.15 01:10:03 - Checking DNS
! 2019.10.15 01:10:03 - Connected.
. 2019.10.15 01:10:03 - OpenVPN > Initialization Sequence Completed
 

Share this post


Link to post

Hello,

can you also send us a system report ("Logs" > LIFE BELT icon >  "Copy" icon > paste into your message)?

From the log we see that VPN server's IPv4 push is strangely missing and that in pure IPv6 a problem arises:
. 2019.10.15 01:10:00 - OpenVPN > NOTE: unable to redirect default gateway -- Cannot read current default gateway from system

The IPv4 successful route check is enigmatic as well.

Do you have IPv4 connectivity with your ISP, or do you have IPv6 only (and IPv4 is wrapped in IPv6)?

We are looking forward to hearing from you.

Kind regards

Share this post


Link to post
Posted ... (edited)
14 hours ago, deliket said:

. 2019.10.15 01:10:00 - OpenVPN > NOTE: unable to redirect default gateway -- Cannot read current default gateway from system


This. Can you please paste your routes after you connect? It's this command:
ip r
Also, correct me if I'm blind, but I don't see IPv4 being set up to be routed at all. You'd expect something like this which might be caused by the problem the above error message warns you about.

Tue Oct 15 18:04:36 2019 /sbin/ip route add 0.0.0.0/1 via 10.20.12.1
Tue Oct 15 18:04:36 2019 /sbin/ip route add 128.0.0.0/1 via 10.20.12.1
Tue Oct 15 18:04:36 2019 /sbin/ip route add 192.168.0.0/16 via 192.168.110.1


Edit: Hah. Staff beat me to it :D Edited ... by giganerd
Staff was faster :D

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Thank you both for your assistance, you'll find the information you've requested below

Using ipleak.net, I appear to have an IPv4 connection but IPv6 test is not reachable
& when I check my network settings there is no IPv6 address 

System Report: 

Quote
Eddie System/Environment Report - 10/15/2019 - 8:44 PM UTC

Eddie version: 2.18.4beta
Eddie OS build: linux_x64
Eddie architecture: x64
OS type: Linux
OS name: Ubuntu 16.04.6 LTS \n \l
OS version: Linux localhost 3.18.0-19733-g972ff9adcd38 #1 SMP PREEMPT Wed Sep 25 23:48:53 PDT 2019 x86_64 x86_64 x86_64 GNU/Linux
OS architecture: x64
Mono /.Net Framework: 4.2.1 (Debian 4.2.1.102+dfsg2-7ubuntu4); Framework: v4.0.30319
OpenVPN driver: Found, /dev/net/tun
OpenVPN: 2.4.7 - OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08 (/usr/sbin/openvpn)
SSH: OpenSSH_7.2p2 Ubuntu-4ubuntu2.8, OpenSSL 1.0.2g  1 Mar 2016 (/usr/bin/ssh)
SSL: stunnel 5.30 (/usr/bin/stunnel4)
curl: 7.47.0 (/usr/bin/curl)
Profile path: /usr/lib/eddie-ui/default.profile
Data path: /usr/lib/eddie-ui
Application path: /usr/lib/eddie-ui
Executable path: /usr/lib/eddie-ui/eddie-ui.exe
Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
Network Lock Active: No
Connected to VPN: Yes, Lesath
Detected DNS: 10.4.0.1
Test DNS IPv4: Failed
Test DNS IPv6: Failed
Test Ping IPv4: 354 ms
Test Ping IPv6: -1 ms
Test HTTP IPv4: Ok
Test HTTP IPv6: Error:curl: (7) Couldn't connect to server
Test HTTPS: Error:curl: (28) Resolving timed out after 20531 milliseconds
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
connect: True
areas.whitelist: ca
areas.blacklist: at,be,bg,br,ch,cz,de,es,gb,hk,jp,lt,lv,nl,no,ro,rs,se,sg,ua,us
mode.protocol: UDP
mode.port: 1194
mode.alt: 3
dns.servers: 10.4.0.1
dns.check: False
network.ipv6.mode: in-out
openvpn.custom: redirect-gateway bypass-dhcp
route-delay 10

----------------------------
Logs:

. 2019.10.15 20:42:06 - Eddie version: 2.18.4beta / linux_x64, System: Linux, Name: Ubuntu 16.04.6 LTS \n \l, Version: Linux localhost 3.18.0-19733-g972ff9adcd38 #1 SMP PREEMPT Wed Sep 25 23:48:53 PDT 2019 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.2.1 (Debian 4.2.1.102+dfsg2-7ubuntu4); Framework: v4.0.30319
. 2019.10.15 20:42:06 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
. 2019.10.15 20:42:06 - Raise system privileges
. 2019.10.15 20:42:07 - Profile path: /usr/lib/eddie-ui/default.profile
. 2019.10.15 20:42:08 - Reading options from /usr/lib/eddie-ui/default.profile
. 2019.10.15 20:42:10 - OpenVPN Driver - Found, /dev/net/tun
. 2019.10.15 20:42:10 - OpenVPN - Version: 2.4.7 - OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08 (/usr/sbin/openvpn)
. 2019.10.15 20:42:10 - SSH - Version: OpenSSH_7.2p2 Ubuntu-4ubuntu2.8, OpenSSL 1.0.2g  1 Mar 2016 (/usr/bin/ssh)
. 2019.10.15 20:42:10 - SSL - Version: stunnel 5.30 (/usr/bin/stunnel4)
. 2019.10.15 20:42:10 - curl - Version: 7.47.0 (/usr/bin/curl)
. 2019.10.15 20:42:10 - Certification Authorities: /usr/share/eddie-ui/cacert.pem
I 2019.10.15 20:42:12 - Ready
I 2019.10.15 20:42:12 - Session starting.
. 2019.10.15 20:42:12 - Collect information about providers ...
. 2019.10.15 20:42:14 - Collect information about AirVPN completed
I 2019.10.15 20:42:15 - Checking authorization ...
! 2019.10.15 20:42:16 - Connecting to Lesath (Canada, Toronto, Ontario)
. 2019.10.15 20:42:16 - OpenVPN > OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 19 2019
. 2019.10.15 20:42:16 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2019.10.15 20:42:16 - Connection to OpenVPN Management Interface
. 2019.10.15 20:42:16 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.10.15 20:42:16 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.10.15 20:42:16 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.10.15 20:42:16 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.10.15 20:42:16 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.10.15 20:42:16 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.6:1194
. 2019.10.15 20:42:16 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2019.10.15 20:42:16 - OpenVPN > UDP link local: (not bound)
. 2019.10.15 20:42:16 - OpenVPN > UDP link remote: [AF_INET]184.75.221.6:1194
. 2019.10.15 20:42:16 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.6:1194, sid=d3c45f37 718107ae
. 2019.10.15 20:42:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.10.15 20:42:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.10.15 20:42:17 - OpenVPN > VERIFY KU OK
. 2019.10.15 20:42:17 - OpenVPN > Validating certificate extended key usage
. 2019.10.15 20:42:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.10.15 20:42:17 - OpenVPN > VERIFY EKU OK
. 2019.10.15 20:42:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.10.15 20:42:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.10.15 20:42:17 - OpenVPN > [Lesath] Peer Connection Initiated with [AF_INET]184.75.221.6:1194
. 2019.10.15 20:42:18 - OpenVPN > SENT CONTROL [Lesath]: 'PUSH_REQUEST' (status=1)
. 2019.10.15 20:42:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.250.1,dhcp-option DNS6 fde6:7a:7d20:10fa::1,tun-ipv6,route-gateway 10.20.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:10fa::107e/64 fde6:7a:7d20:10fa::1,ifconfig 10.20.250.128 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2019.10.15 20:42:18 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.10.15 20:42:18 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.10.15 20:42:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.10.15 20:42:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.10.15 20:42:18 - OpenVPN > ROUTE: default_gateway=UNDEF
. 2019.10.15 20:42:18 - OpenVPN > TUN/TAP device tun0 opened
. 2019.10.15 20:42:18 - OpenVPN > TUN/TAP TX queue length set to 100
. 2019.10.15 20:42:18 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2019.10.15 20:42:18 - OpenVPN > /sbin/ip addr add dev tun0 10.20.250.128/24 broadcast 10.20.250.255
. 2019.10.15 20:42:18 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:10fa::107e/64 dev tun0
. 2019.10.15 20:42:28 - OpenVPN > NOTE: unable to redirect default gateway -- Cannot read current default gateway from system
. 2019.10.15 20:42:28 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2019.10.15 20:42:29 - Routes, added a new route, 184.75.221.3 for gateway 10.20.250.1
. 2019.10.15 20:42:29 - Routes, added a new route, 2606:6080:1001:d:c59c:6e9a:3115:6f2f for gateway fde6:7a:7d20:10fa::1
. 2019.10.15 20:42:29 - Flushing DNS
I 2019.10.15 20:42:29 - Checking route IPv4
I 2019.10.15 20:42:29 - Checking route IPv6
! 2019.10.15 20:42:31 - Connected.
. 2019.10.15 20:42:31 - OpenVPN > Initialization Sequence Completed

----------------------------
Network Interfaces and Routes:

{
    "support_ipv4": true,
    "support_ipv6": true,
    "routes": [
        {
            "address": "184.75.221.3",
            "gateway": "10.20.250.1",
            "interface": "tun0"
        },
        {
            "address": "192.168.254.0\/24",
            "gateway": "fde6:7a:7d20:10fa::1",
            "interface": "tun0",
            "metric": "1024"
        }
    ],
    "interfaces": [
        {
            "friendly": "lo",
            "id": "lo",
            "name": "lo",
            "description": "lo",
            "type": "Loopback",
            "status": "Unknown",
            "bytes_received": "35549789",
            "bytes_sent": "35549789",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "127.0.0.1",
                "::1"
            ],
            "gateways": [],
            "bind": true
        },
        {
            "friendly": "wlan0",
            "id": "wlan0",
            "name": "wlan0",
            "description": "wlan0",
            "type": "Wireless80211",
            "status": "Up",
            "bytes_received": "2204175895",
            "bytes_sent": "80515908",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "192.168.254.46",
                "fe80::7eb0:c2ff:fecc:b5aa"
            ],
            "gateways": [],
            "bind": true
        },
        {
            "friendly": "arcbr0",
            "id": "arcbr0",
            "name": "arcbr0",
            "description": "arcbr0",
            "type": "Ethernet",
            "status": "Unknown",
            "bytes_received": "0",
            "bytes_sent": "23799",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "100.115.92.1",
                "fe80::b4d5:ddff:fed9:7628"
            ],
            "gateways": [],
            "bind": true
        },
        {
            "friendly": "tun0",
            "id": "tun0",
            "name": "tun0",
            "description": "tun0",
            "type": "0",
            "status": "Unknown",
            "bytes_received": "9862",
            "bytes_sent": "2718",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "10.20.250.128",
                "fde6:7a:7d20:10fa::107e"
            ],
            "gateways": [
                "10.20.250.1",
                "fde6:7a:7d20:10fa::1"
            ],
            "bind": true
        }
    ]
}
----------------------------
ip addr show:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
    link/ether 7c:b0:c2:cc:b5:aa brd ff:ff:ff:ff:ff:ff
    inet 192.168.254.46/24 brd 192.168.254.255 scope global wlan0
       valid_lft forever preferred_lft forever
    inet6 fe80::7eb0:c2ff:fecc:b5aa/64 scope link 
       valid_lft forever preferred_lft forever
3: arcbr0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UNKNOWN group default qlen 1000
    link/ether b6:d5:dd:d9:76:28 brd ff:ff:ff:ff:ff:ff
    inet 100.115.92.1/30 brd 100.115.92.3 scope global arcbr0
       valid_lft forever preferred_lft forever
    inet6 fe80::b4d5:ddff:fed9:7628/64 scope link 
       valid_lft forever preferred_lft forever
35: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UNKNOWN group default qlen 100
    link/none 
    inet 10.20.250.128/24 brd 10.20.250.255 scope global tun0
       valid_lft forever preferred_lft forever
    inet6 fde6:7a:7d20:10fa::107e/64 scope global 
       valid_lft forever preferred_lft forever
----------------------------
ip link show:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP mode DORMANT group default qlen 1000
    link/ether 7c:b0:c2:cc:b5:aa brd ff:ff:ff:ff:ff:ff
3: arcbr0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
    link/ether b6:d5:dd:d9:76:28 brd ff:ff:ff:ff:ff:ff
35: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UNKNOWN mode DEFAULT group default qlen 100
    link/none
----------------------------
ip -4 route show:

10.20.250.0/24 dev tun0  proto kernel  scope link  src 10.20.250.128 
100.115.92.0/30 dev arcbr0  proto kernel  scope link  src 100.115.92.1 
184.75.221.3 via 10.20.250.1 dev tun0 
192.168.254.0/24 dev wlan0  proto kernel  scope link  src 192.168.254.46
----------------------------
ip -6 route show:

2606:6080:1001:d:c59c:6e9a:3115:6f2f via fde6:7a:7d20:10fa::1 dev tun0  metric 1024 
fde6:7a:7d20:10fa::/64 dev tun0  proto kernel  metric 256 
fe80::/64 dev arcbr0  proto kernel  metric 256 
fe80::/64 dev wlan0  proto kernel  metric 256


Routes: 
Quote
@localhost:~/Desktop$ ip r
10.20.250.0/24 dev tun0  proto kernel  scope link  src 10.20.250.128 
100.115.92.0/30 dev arcbr0  proto kernel  scope link  src 100.115.92.1 
184.75.221.3 via 10.20.250.1 dev tun0 
192.168.254.0/24 dev wlan0  proto kernel  scope link  src 192.168.254.46 



Logs from most recent attempt for cross-referencing:
Quote
. 2019.10.15 20:42:06 - Eddie version: 2.18.4beta / linux_x64, System: Linux, Name: Ubuntu 16.04.6 LTS \n \l, Version: Linux localhost 3.18.0-19733-g972ff9adcd38 #1 SMP PREEMPT Wed Sep 25 23:48:53 PDT 2019 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.2.1 (Debian 4.2.1.102+dfsg2-7ubuntu4); Framework: v4.0.30319
. 2019.10.15 20:42:06 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
. 2019.10.15 20:42:06 - Raise system privileges
. 2019.10.15 20:42:07 - Profile path: /usr/lib/eddie-ui/default.profile
. 2019.10.15 20:42:08 - Reading options from /usr/lib/eddie-ui/default.profile
. 2019.10.15 20:42:10 - OpenVPN Driver - Found, /dev/net/tun
. 2019.10.15 20:42:10 - OpenVPN - Version: 2.4.7 - OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08 (/usr/sbin/openvpn)
. 2019.10.15 20:42:10 - SSH - Version: OpenSSH_7.2p2 Ubuntu-4ubuntu2.8, OpenSSL 1.0.2g  1 Mar 2016 (/usr/bin/ssh)
. 2019.10.15 20:42:10 - SSL - Version: stunnel 5.30 (/usr/bin/stunnel4)
. 2019.10.15 20:42:10 - curl - Version: 7.47.0 (/usr/bin/curl)
. 2019.10.15 20:42:10 - Certification Authorities: /usr/share/eddie-ui/cacert.pem
I 2019.10.15 20:42:12 - Ready
I 2019.10.15 20:42:12 - Session starting.
. 2019.10.15 20:42:12 - Collect information about providers ...
. 2019.10.15 20:42:14 - Collect information about AirVPN completed
I 2019.10.15 20:42:15 - Checking authorization ...
! 2019.10.15 20:42:16 - Connecting to Lesath (Canada, Toronto, Ontario)
. 2019.10.15 20:42:16 - OpenVPN > OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 19 2019
. 2019.10.15 20:42:16 - OpenVPN > library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.08
. 2019.10.15 20:42:16 - Connection to OpenVPN Management Interface
. 2019.10.15 20:42:16 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.10.15 20:42:16 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.10.15 20:42:16 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.10.15 20:42:16 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.10.15 20:42:16 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.10.15 20:42:16 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.6:1194
. 2019.10.15 20:42:16 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2019.10.15 20:42:16 - OpenVPN > UDP link local: (not bound)
. 2019.10.15 20:42:16 - OpenVPN > UDP link remote: [AF_INET]184.75.221.6:1194
. 2019.10.15 20:42:16 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.6:1194, sid=d3c45f37 718107ae
. 2019.10.15 20:42:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.10.15 20:42:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.10.15 20:42:17 - OpenVPN > VERIFY KU OK
. 2019.10.15 20:42:17 - OpenVPN > Validating certificate extended key usage
. 2019.10.15 20:42:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.10.15 20:42:17 - OpenVPN > VERIFY EKU OK
. 2019.10.15 20:42:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org
. 2019.10.15 20:42:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.10.15 20:42:17 - OpenVPN > [Lesath] Peer Connection Initiated with [AF_INET]184.75.221.6:1194
. 2019.10.15 20:42:18 - OpenVPN > SENT CONTROL [Lesath]: 'PUSH_REQUEST' (status=1)
. 2019.10.15 20:42:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.250.1,dhcp-option DNS6 fde6:7a:7d20:10fa::1,tun-ipv6,route-gateway 10.20.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:10fa::107e/64 fde6:7a:7d20:10fa::1,ifconfig 10.20.250.128 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2019.10.15 20:42:18 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.10.15 20:42:18 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.10.15 20:42:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.10.15 20:42:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.10.15 20:42:18 - OpenVPN > ROUTE: default_gateway=UNDEF
. 2019.10.15 20:42:18 - OpenVPN > TUN/TAP device tun0 opened
. 2019.10.15 20:42:18 - OpenVPN > TUN/TAP TX queue length set to 100
. 2019.10.15 20:42:18 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2019.10.15 20:42:18 - OpenVPN > /sbin/ip addr add dev tun0 10.20.250.128/24 broadcast 10.20.250.255
. 2019.10.15 20:42:18 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:10fa::107e/64 dev tun0
. 2019.10.15 20:42:28 - OpenVPN > NOTE: unable to redirect default gateway -- Cannot read current default gateway from system
. 2019.10.15 20:42:28 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2019.10.15 20:42:29 - Routes, added a new route, 184.75.221.3 for gateway 10.20.250.1
. 2019.10.15 20:42:29 - Routes, added a new route, 2606:6080:1001:d:c59c:6e9a:3115:6f2f for gateway fde6:7a:7d20:10fa::1
. 2019.10.15 20:42:29 - Flushing DNS
I 2019.10.15 20:42:29 - Checking route IPv4
I 2019.10.15 20:42:29 - Checking route IPv6
! 2019.10.15 20:42:31 - Connected.
. 2019.10.15 20:42:31 - OpenVPN > Initialization Sequence Completed
 

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...