deliket 0 Posted ... Current problems are happening on a Google Chromebook using crouton(debian), Logs: Quote . 2019.10.15 01:09:42 - Eddie version: 2.18.4beta / linux_x64, System: Linux, Name: Ubuntu 16.04.6 LTS \n \l, Version: Linux localhost 3.18.0-19733-g972ff9adcd38 #1 SMP PREEMPT Wed Sep 25 23:48:53 PDT 2019 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.2.1 (Debian 4.2.1.102+dfsg2-7ubuntu4); Framework: v4.0.30319 . 2019.10.15 01:09:42 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2019.10.15 01:09:42 - Raise system privileges . 2019.10.15 01:09:43 - Profile path: /usr/lib/eddie-ui/default.profile . 2019.10.15 01:09:44 - Reading options from /usr/lib/eddie-ui/default.profile . 2019.10.15 01:09:46 - OpenVPN Driver - Found, /dev/net/tun . 2019.10.15 01:09:46 - OpenVPN - Version: 2.4.7 - OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 (/usr/sbin/openvpn) . 2019.10.15 01:09:46 - SSH - Version: OpenSSH_7.2p2 Ubuntu-4ubuntu2.8, OpenSSL 1.0.2g 1 Mar 2016 (/usr/bin/ssh) . 2019.10.15 01:09:46 - SSL - Version: stunnel 5.30 (/usr/bin/stunnel4) . 2019.10.15 01:09:46 - curl - Version: 7.47.0 (/usr/bin/curl) . 2019.10.15 01:09:46 - Certification Authorities: /usr/share/eddie-ui/cacert.pem . 2019.10.15 01:09:46 - Recovery. Unexpected crash? W 2019.10.15 01:09:46 - Routes, add 162.219.176.3 for gateway 10.6.122.1 failed: Exception: Cannot find device "tun0" W 2019.10.15 01:09:46 - Routes, add 2606:6080:1002:3:1da3:d12a:3e5:ae70 for gateway fde6:7a:7d20:27a::1 failed: Exception: Cannot find device "tun0" I 2019.10.15 01:09:49 - Ready I 2019.10.15 01:09:49 - Session starting. . 2019.10.15 01:09:49 - Collect information about providers ... . 2019.10.15 01:09:50 - Collect information about AirVPN completed I 2019.10.15 01:09:52 - Checking authorization ... ! 2019.10.15 01:09:53 - Connecting to Sualocin (Canada, Toronto, Ontario) . 2019.10.15 01:09:53 - OpenVPN > OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 19 2019 . 2019.10.15 01:09:53 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2019.10.15 01:09:53 - Connection to OpenVPN Management Interface . 2019.10.15 01:09:53 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.10.15 01:09:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.10.15 01:09:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.10.15 01:09:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.10.15 01:09:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.10.15 01:09:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.45:443 . 2019.10.15 01:09:53 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2019.10.15 01:09:53 - OpenVPN > UDP link local: (not bound) . 2019.10.15 01:09:53 - OpenVPN > UDP link remote: [AF_INET]184.75.221.45:443 . 2019.10.15 01:09:53 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.45:443, sid=f23f6dcd c5bd49a8 . 2019.10.15 01:09:53 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.10.15 01:09:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.10.15 01:09:53 - OpenVPN > VERIFY KU OK . 2019.10.15 01:09:53 - OpenVPN > Validating certificate extended key usage . 2019.10.15 01:09:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.10.15 01:09:53 - OpenVPN > VERIFY EKU OK . 2019.10.15 01:09:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sualocin, emailAddress=info@airvpn.org . 2019.10.15 01:09:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.10.15 01:09:54 - OpenVPN > [Sualocin] Peer Connection Initiated with [AF_INET]184.75.221.45:443 . 2019.10.15 01:09:55 - OpenVPN > SENT CONTROL [Sualocin]: 'PUSH_REQUEST' (status=1) . 2019.10.15 01:09:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.30.218.1,dhcp-option DNS6 fde6:7a:7d20:1ada::1,tun-ipv6,route-gateway 10.30.218.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1ada::100f/64 fde6:7a:7d20:1ada::1,ifconfig 10.30.218.17 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2019.10.15 01:09:55 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.10.15 01:09:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.10.15 01:09:55 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.10.15 01:09:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.10.15 01:09:55 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.10.15 01:09:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.10.15 01:09:55 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.10.15 01:09:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.10.15 01:09:55 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.10.15 01:09:55 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.10.15 01:09:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.10.15 01:09:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.10.15 01:09:55 - OpenVPN > ROUTE: default_gateway=UNDEF . 2019.10.15 01:09:55 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2019.10.15 01:09:55 - OpenVPN > ROUTE6: default_gateway=UNDEF . 2019.10.15 01:09:55 - OpenVPN > TUN/TAP device tun0 opened . 2019.10.15 01:09:55 - OpenVPN > TUN/TAP TX queue length set to 100 . 2019.10.15 01:09:55 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2019.10.15 01:09:55 - OpenVPN > /sbin/ip addr add dev tun0 10.30.218.17/24 broadcast 10.30.218.255 . 2019.10.15 01:09:55 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:1ada::100f/64 dev tun0 . 2019.10.15 01:10:00 - OpenVPN > NOTE: unable to redirect default gateway -- Cannot read current default gateway from system . 2019.10.15 01:10:00 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1ada::1 metric -1) dev tun0 . 2019.10.15 01:10:00 - OpenVPN > /sbin/ip -6 route add ::/3 dev tun0 . 2019.10.15 01:10:00 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1ada::1 metric -1) dev tun0 . 2019.10.15 01:10:00 - OpenVPN > /sbin/ip -6 route add 2000::/4 dev tun0 . 2019.10.15 01:10:00 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1ada::1 metric -1) dev tun0 . 2019.10.15 01:10:00 - OpenVPN > /sbin/ip -6 route add 3000::/4 dev tun0 . 2019.10.15 01:10:00 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1ada::1 metric -1) dev tun0 . 2019.10.15 01:10:00 - OpenVPN > /sbin/ip -6 route add fc00::/7 dev tun0 . 2019.10.15 01:10:00 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2019.10.15 01:10:00 - Routes, added a new route, 184.75.221.43 for gateway 10.30.218.1 . 2019.10.15 01:10:00 - Routes, added a new route, 2606:6080:1001:f:ed79:9361:ea0e:3e88 for gateway fde6:7a:7d20:1ada::1 . 2019.10.15 01:10:00 - Flushing DNS I 2019.10.15 01:10:00 - Checking route IPv4 I 2019.10.15 01:10:01 - Checking route IPv6 I 2019.10.15 01:10:03 - Checking DNS ! 2019.10.15 01:10:03 - Connected. . 2019.10.15 01:10:03 - OpenVPN > Initialization Sequence Completed Quote Share this post Link to post
Staff 10014 Posted ... Hello, can you also send us a system report ("Logs" > LIFE BELT icon > "Copy" icon > paste into your message)? From the log we see that VPN server's IPv4 push is strangely missing and that in pure IPv6 a problem arises:. 2019.10.15 01:10:00 - OpenVPN > NOTE: unable to redirect default gateway -- Cannot read current default gateway from system The IPv4 successful route check is enigmatic as well. Do you have IPv4 connectivity with your ISP, or do you have IPv6 only (and IPv4 is wrapped in IPv6)? We are looking forward to hearing from you. Kind regards Quote Share this post Link to post
OpenSourcerer 1441 Posted ... (edited) 14 hours ago, deliket said: . 2019.10.15 01:10:00 - OpenVPN > NOTE: unable to redirect default gateway -- Cannot read current default gateway from system This. Can you please paste your routes after you connect? It's this command: ip r Also, correct me if I'm blind, but I don't see IPv4 being set up to be routed at all. You'd expect something like this which might be caused by the problem the above error message warns you about. Tue Oct 15 18:04:36 2019 /sbin/ip route add 0.0.0.0/1 via 10.20.12.1 Tue Oct 15 18:04:36 2019 /sbin/ip route add 128.0.0.0/1 via 10.20.12.1 Tue Oct 15 18:04:36 2019 /sbin/ip route add 192.168.0.0/16 via 192.168.110.1 Edit: Hah. Staff beat me to it Edited ... by giganerd Staff was faster :D Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
deliket 0 Posted ... Thank you both for your assistance, you'll find the information you've requested below Using ipleak.net, I appear to have an IPv4 connection but IPv6 test is not reachable & when I check my network settings there is no IPv6 address System Report: Quote Eddie System/Environment Report - 10/15/2019 - 8:44 PM UTC Eddie version: 2.18.4beta Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: Ubuntu 16.04.6 LTS \n \l OS version: Linux localhost 3.18.0-19733-g972ff9adcd38 #1 SMP PREEMPT Wed Sep 25 23:48:53 PDT 2019 x86_64 x86_64 x86_64 GNU/Linux OS architecture: x64 Mono /.Net Framework: 4.2.1 (Debian 4.2.1.102+dfsg2-7ubuntu4); Framework: v4.0.30319 OpenVPN driver: Found, /dev/net/tun OpenVPN: 2.4.7 - OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 (/usr/sbin/openvpn) SSH: OpenSSH_7.2p2 Ubuntu-4ubuntu2.8, OpenSSL 1.0.2g 1 Mar 2016 (/usr/bin/ssh) SSL: stunnel 5.30 (/usr/bin/stunnel4) curl: 7.47.0 (/usr/bin/curl) Profile path: /usr/lib/eddie-ui/default.profile Data path: /usr/lib/eddie-ui Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/eddie-ui.exe Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" Network Lock Active: No Connected to VPN: Yes, Lesath Detected DNS: 10.4.0.1 Test DNS IPv4: Failed Test DNS IPv6: Failed Test Ping IPv4: 354 ms Test Ping IPv6: -1 ms Test HTTP IPv4: Ok Test HTTP IPv6: Error:curl: (7) Couldn't connect to server Test HTTPS: Error:curl: (28) Resolving timed out after 20531 milliseconds ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True connect: True areas.whitelist: ca areas.blacklist: at,be,bg,br,ch,cz,de,es,gb,hk,jp,lt,lv,nl,no,ro,rs,se,sg,ua,us mode.protocol: UDP mode.port: 1194 mode.alt: 3 dns.servers: 10.4.0.1 dns.check: False network.ipv6.mode: in-out openvpn.custom: redirect-gateway bypass-dhcp route-delay 10 ---------------------------- Logs: . 2019.10.15 20:42:06 - Eddie version: 2.18.4beta / linux_x64, System: Linux, Name: Ubuntu 16.04.6 LTS \n \l, Version: Linux localhost 3.18.0-19733-g972ff9adcd38 #1 SMP PREEMPT Wed Sep 25 23:48:53 PDT 2019 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.2.1 (Debian 4.2.1.102+dfsg2-7ubuntu4); Framework: v4.0.30319 . 2019.10.15 20:42:06 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2019.10.15 20:42:06 - Raise system privileges . 2019.10.15 20:42:07 - Profile path: /usr/lib/eddie-ui/default.profile . 2019.10.15 20:42:08 - Reading options from /usr/lib/eddie-ui/default.profile . 2019.10.15 20:42:10 - OpenVPN Driver - Found, /dev/net/tun . 2019.10.15 20:42:10 - OpenVPN - Version: 2.4.7 - OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 (/usr/sbin/openvpn) . 2019.10.15 20:42:10 - SSH - Version: OpenSSH_7.2p2 Ubuntu-4ubuntu2.8, OpenSSL 1.0.2g 1 Mar 2016 (/usr/bin/ssh) . 2019.10.15 20:42:10 - SSL - Version: stunnel 5.30 (/usr/bin/stunnel4) . 2019.10.15 20:42:10 - curl - Version: 7.47.0 (/usr/bin/curl) . 2019.10.15 20:42:10 - Certification Authorities: /usr/share/eddie-ui/cacert.pem I 2019.10.15 20:42:12 - Ready I 2019.10.15 20:42:12 - Session starting. . 2019.10.15 20:42:12 - Collect information about providers ... . 2019.10.15 20:42:14 - Collect information about AirVPN completed I 2019.10.15 20:42:15 - Checking authorization ... ! 2019.10.15 20:42:16 - Connecting to Lesath (Canada, Toronto, Ontario) . 2019.10.15 20:42:16 - OpenVPN > OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 19 2019 . 2019.10.15 20:42:16 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2019.10.15 20:42:16 - Connection to OpenVPN Management Interface . 2019.10.15 20:42:16 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.10.15 20:42:16 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.10.15 20:42:16 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.10.15 20:42:16 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.10.15 20:42:16 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.10.15 20:42:16 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.6:1194 . 2019.10.15 20:42:16 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2019.10.15 20:42:16 - OpenVPN > UDP link local: (not bound) . 2019.10.15 20:42:16 - OpenVPN > UDP link remote: [AF_INET]184.75.221.6:1194 . 2019.10.15 20:42:16 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.6:1194, sid=d3c45f37 718107ae . 2019.10.15 20:42:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.10.15 20:42:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.10.15 20:42:17 - OpenVPN > VERIFY KU OK . 2019.10.15 20:42:17 - OpenVPN > Validating certificate extended key usage . 2019.10.15 20:42:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.10.15 20:42:17 - OpenVPN > VERIFY EKU OK . 2019.10.15 20:42:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org . 2019.10.15 20:42:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.10.15 20:42:17 - OpenVPN > [Lesath] Peer Connection Initiated with [AF_INET]184.75.221.6:1194 . 2019.10.15 20:42:18 - OpenVPN > SENT CONTROL [Lesath]: 'PUSH_REQUEST' (status=1) . 2019.10.15 20:42:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.250.1,dhcp-option DNS6 fde6:7a:7d20:10fa::1,tun-ipv6,route-gateway 10.20.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:10fa::107e/64 fde6:7a:7d20:10fa::1,ifconfig 10.20.250.128 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2019.10.15 20:42:18 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.10.15 20:42:18 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.10.15 20:42:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.10.15 20:42:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.10.15 20:42:18 - OpenVPN > ROUTE: default_gateway=UNDEF . 2019.10.15 20:42:18 - OpenVPN > TUN/TAP device tun0 opened . 2019.10.15 20:42:18 - OpenVPN > TUN/TAP TX queue length set to 100 . 2019.10.15 20:42:18 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2019.10.15 20:42:18 - OpenVPN > /sbin/ip addr add dev tun0 10.20.250.128/24 broadcast 10.20.250.255 . 2019.10.15 20:42:18 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:10fa::107e/64 dev tun0 . 2019.10.15 20:42:28 - OpenVPN > NOTE: unable to redirect default gateway -- Cannot read current default gateway from system . 2019.10.15 20:42:28 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2019.10.15 20:42:29 - Routes, added a new route, 184.75.221.3 for gateway 10.20.250.1 . 2019.10.15 20:42:29 - Routes, added a new route, 2606:6080:1001:d:c59c:6e9a:3115:6f2f for gateway fde6:7a:7d20:10fa::1 . 2019.10.15 20:42:29 - Flushing DNS I 2019.10.15 20:42:29 - Checking route IPv4 I 2019.10.15 20:42:29 - Checking route IPv6 ! 2019.10.15 20:42:31 - Connected. . 2019.10.15 20:42:31 - OpenVPN > Initialization Sequence Completed ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "184.75.221.3", "gateway": "10.20.250.1", "interface": "tun0" }, { "address": "192.168.254.0\/24", "gateway": "fde6:7a:7d20:10fa::1", "interface": "tun0", "metric": "1024" } ], "interfaces": [ { "friendly": "lo", "id": "lo", "name": "lo", "description": "lo", "type": "Loopback", "status": "Unknown", "bytes_received": "35549789", "bytes_sent": "35549789", "support_ipv4": true, "support_ipv6": true, "ips": [ "127.0.0.1", "::1" ], "gateways": [], "bind": true }, { "friendly": "wlan0", "id": "wlan0", "name": "wlan0", "description": "wlan0", "type": "Wireless80211", "status": "Up", "bytes_received": "2204175895", "bytes_sent": "80515908", "support_ipv4": true, "support_ipv6": true, "ips": [ "192.168.254.46", "fe80::7eb0:c2ff:fecc:b5aa" ], "gateways": [], "bind": true }, { "friendly": "arcbr0", "id": "arcbr0", "name": "arcbr0", "description": "arcbr0", "type": "Ethernet", "status": "Unknown", "bytes_received": "0", "bytes_sent": "23799", "support_ipv4": true, "support_ipv6": true, "ips": [ "100.115.92.1", "fe80::b4d5:ddff:fed9:7628" ], "gateways": [], "bind": true }, { "friendly": "tun0", "id": "tun0", "name": "tun0", "description": "tun0", "type": "0", "status": "Unknown", "bytes_received": "9862", "bytes_sent": "2718", "support_ipv4": true, "support_ipv6": true, "ips": [ "10.20.250.128", "fde6:7a:7d20:10fa::107e" ], "gateways": [ "10.20.250.1", "fde6:7a:7d20:10fa::1" ], "bind": true } ] } ---------------------------- ip addr show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000 link/ether 7c:b0:c2:cc:b5:aa brd ff:ff:ff:ff:ff:ff inet 192.168.254.46/24 brd 192.168.254.255 scope global wlan0 valid_lft forever preferred_lft forever inet6 fe80::7eb0:c2ff:fecc:b5aa/64 scope link valid_lft forever preferred_lft forever 3: arcbr0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UNKNOWN group default qlen 1000 link/ether b6:d5:dd:d9:76:28 brd ff:ff:ff:ff:ff:ff inet 100.115.92.1/30 brd 100.115.92.3 scope global arcbr0 valid_lft forever preferred_lft forever inet6 fe80::b4d5:ddff:fed9:7628/64 scope link valid_lft forever preferred_lft forever 35: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UNKNOWN group default qlen 100 link/none inet 10.20.250.128/24 brd 10.20.250.255 scope global tun0 valid_lft forever preferred_lft forever inet6 fde6:7a:7d20:10fa::107e/64 scope global valid_lft forever preferred_lft forever ---------------------------- ip link show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP mode DORMANT group default qlen 1000 link/ether 7c:b0:c2:cc:b5:aa brd ff:ff:ff:ff:ff:ff 3: arcbr0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ether b6:d5:dd:d9:76:28 brd ff:ff:ff:ff:ff:ff 35: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UNKNOWN mode DEFAULT group default qlen 100 link/none ---------------------------- ip -4 route show: 10.20.250.0/24 dev tun0 proto kernel scope link src 10.20.250.128 100.115.92.0/30 dev arcbr0 proto kernel scope link src 100.115.92.1 184.75.221.3 via 10.20.250.1 dev tun0 192.168.254.0/24 dev wlan0 proto kernel scope link src 192.168.254.46 ---------------------------- ip -6 route show: 2606:6080:1001:d:c59c:6e9a:3115:6f2f via fde6:7a:7d20:10fa::1 dev tun0 metric 1024 fde6:7a:7d20:10fa::/64 dev tun0 proto kernel metric 256 fe80::/64 dev arcbr0 proto kernel metric 256 fe80::/64 dev wlan0 proto kernel metric 256 Routes: Quote @localhost:~/Desktop$ ip r 10.20.250.0/24 dev tun0 proto kernel scope link src 10.20.250.128 100.115.92.0/30 dev arcbr0 proto kernel scope link src 100.115.92.1 184.75.221.3 via 10.20.250.1 dev tun0 192.168.254.0/24 dev wlan0 proto kernel scope link src 192.168.254.46 Logs from most recent attempt for cross-referencing: Quote . 2019.10.15 20:42:06 - Eddie version: 2.18.4beta / linux_x64, System: Linux, Name: Ubuntu 16.04.6 LTS \n \l, Version: Linux localhost 3.18.0-19733-g972ff9adcd38 #1 SMP PREEMPT Wed Sep 25 23:48:53 PDT 2019 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.2.1 (Debian 4.2.1.102+dfsg2-7ubuntu4); Framework: v4.0.30319 . 2019.10.15 20:42:06 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2019.10.15 20:42:06 - Raise system privileges . 2019.10.15 20:42:07 - Profile path: /usr/lib/eddie-ui/default.profile . 2019.10.15 20:42:08 - Reading options from /usr/lib/eddie-ui/default.profile . 2019.10.15 20:42:10 - OpenVPN Driver - Found, /dev/net/tun . 2019.10.15 20:42:10 - OpenVPN - Version: 2.4.7 - OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 (/usr/sbin/openvpn) . 2019.10.15 20:42:10 - SSH - Version: OpenSSH_7.2p2 Ubuntu-4ubuntu2.8, OpenSSL 1.0.2g 1 Mar 2016 (/usr/bin/ssh) . 2019.10.15 20:42:10 - SSL - Version: stunnel 5.30 (/usr/bin/stunnel4) . 2019.10.15 20:42:10 - curl - Version: 7.47.0 (/usr/bin/curl) . 2019.10.15 20:42:10 - Certification Authorities: /usr/share/eddie-ui/cacert.pem I 2019.10.15 20:42:12 - Ready I 2019.10.15 20:42:12 - Session starting. . 2019.10.15 20:42:12 - Collect information about providers ... . 2019.10.15 20:42:14 - Collect information about AirVPN completed I 2019.10.15 20:42:15 - Checking authorization ... ! 2019.10.15 20:42:16 - Connecting to Lesath (Canada, Toronto, Ontario) . 2019.10.15 20:42:16 - OpenVPN > OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 19 2019 . 2019.10.15 20:42:16 - OpenVPN > library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08 . 2019.10.15 20:42:16 - Connection to OpenVPN Management Interface . 2019.10.15 20:42:16 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.10.15 20:42:16 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.10.15 20:42:16 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.10.15 20:42:16 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.10.15 20:42:16 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.10.15 20:42:16 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.6:1194 . 2019.10.15 20:42:16 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2019.10.15 20:42:16 - OpenVPN > UDP link local: (not bound) . 2019.10.15 20:42:16 - OpenVPN > UDP link remote: [AF_INET]184.75.221.6:1194 . 2019.10.15 20:42:16 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.6:1194, sid=d3c45f37 718107ae . 2019.10.15 20:42:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.10.15 20:42:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.10.15 20:42:17 - OpenVPN > VERIFY KU OK . 2019.10.15 20:42:17 - OpenVPN > Validating certificate extended key usage . 2019.10.15 20:42:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.10.15 20:42:17 - OpenVPN > VERIFY EKU OK . 2019.10.15 20:42:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lesath, emailAddress=info@airvpn.org . 2019.10.15 20:42:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.10.15 20:42:17 - OpenVPN > [Lesath] Peer Connection Initiated with [AF_INET]184.75.221.6:1194 . 2019.10.15 20:42:18 - OpenVPN > SENT CONTROL [Lesath]: 'PUSH_REQUEST' (status=1) . 2019.10.15 20:42:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.20.250.1,dhcp-option DNS6 fde6:7a:7d20:10fa::1,tun-ipv6,route-gateway 10.20.250.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:10fa::107e/64 fde6:7a:7d20:10fa::1,ifconfig 10.20.250.128 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2019.10.15 20:42:18 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.10.15 20:42:18 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.10.15 20:42:18 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.10.15 20:42:18 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.10.15 20:42:18 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.10.15 20:42:18 - OpenVPN > ROUTE: default_gateway=UNDEF . 2019.10.15 20:42:18 - OpenVPN > TUN/TAP device tun0 opened . 2019.10.15 20:42:18 - OpenVPN > TUN/TAP TX queue length set to 100 . 2019.10.15 20:42:18 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2019.10.15 20:42:18 - OpenVPN > /sbin/ip addr add dev tun0 10.20.250.128/24 broadcast 10.20.250.255 . 2019.10.15 20:42:18 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:10fa::107e/64 dev tun0 . 2019.10.15 20:42:28 - OpenVPN > NOTE: unable to redirect default gateway -- Cannot read current default gateway from system . 2019.10.15 20:42:28 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2019.10.15 20:42:29 - Routes, added a new route, 184.75.221.3 for gateway 10.20.250.1 . 2019.10.15 20:42:29 - Routes, added a new route, 2606:6080:1001:d:c59c:6e9a:3115:6f2f for gateway fde6:7a:7d20:10fa::1 . 2019.10.15 20:42:29 - Flushing DNS I 2019.10.15 20:42:29 - Checking route IPv4 I 2019.10.15 20:42:29 - Checking route IPv6 ! 2019.10.15 20:42:31 - Connected. . 2019.10.15 20:42:31 - OpenVPN > Initialization Sequence Completed Quote Share this post Link to post