busolof 0 Posted ... Hello, Not sure if rigth place. Have done these guideand get ip adress see in systemlogg but when use ipleak.net not showing ip adress from airvpn is that an bug in my router. have tryed another vpn provider same thing for them too. Quote Share this post Link to post
OpenSourcerer 1441 Posted ... Can you upload or post the OpenVPN log here, please? Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
busolof 0 Posted ... Hey, her is logg from my asus rt-ax56u: Mar 10 09:50:31 rc_service: httpd 17307:notify_rc restart_vpncall Mar 10 09:50:31 vpnclient5[14665]: OpenVPN 2.4.7 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jan 14 2020 Mar 10 09:50:31 vpnclient5[14665]: library versions: OpenSSL 1.0.2t 10 Sep 2019, LZO 2.03 Mar 10 09:50:31 vpnclient5[14666]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 10 09:50:31 vpnclient5[14666]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Mar 10 09:50:31 vpnclient5[14666]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Mar 10 09:50:31 vpnclient5[14666]: TCP/UDP: Preserving recently used remote address: [AF_INET]31.3.152.99:443 Mar 10 09:50:31 vpnclient5[14666]: Socket Buffers: R=[524288->524288] S=[524288->524288] Mar 10 09:50:31 vpnclient5[14666]: UDP link local: (not bound) Mar 10 09:50:31 vpnclient5[14666]: UDP link remote: [AF_INET]31.3.152.99:443 Mar 10 09:50:31 vpnclient5[14666]: TLS: Initial packet from [AF_INET]31.3.152.99:443, sid=e49190d0 4d86dff0 Mar 10 09:50:31 vpnclient5[14666]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mar 10 09:50:31 vpnclient5[14666]: VERIFY KU OK Mar 10 09:50:31 vpnclient5[14666]: Validating certificate extended key usage Mar 10 09:50:31 vpnclient5[14666]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 10 09:50:31 vpnclient5[14666]: VERIFY EKU OK Mar 10 09:50:31 vpnclient5[14666]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Norma, emailAddress=info@airvpn.org Mar 10 09:50:33 vpnclient5[14666]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 10 09:50:33 vpnclient5[14666]: [Norma] Peer Connection Initiated with [AF_INET]31.3.152.99:443 Mar 10 09:50:34 vpnclient5[14666]: SENT CONTROL [Norma]: 'PUSH_REQUEST' (status=1) Mar 10 09:50:34 vpnclient5[14666]: PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.72.1,dhcp-option DNS6 fde6:7a:7d20:1548::1,tun-ipv6,route-gateway 10.25.72.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1548::10ce/64 fde6:7a:7d20:1548::1,ifconfig 10.25.72.208 255.255.255.0,peer-id 13,cipher AES-256-GCM' Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: timers and/or timeouts modified Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: compression parms modified Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: --ifconfig/up options modified Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: route options modified Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: route-related options modified Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: peer-id set Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: adjusting link_mtu to 1625 Mar 10 09:50:34 vpnclient5[14666]: OPTIONS IMPORT: data channel crypto options modified Mar 10 09:50:34 vpnclient5[14666]: Data Channel: using negotiated cipher 'AES-256-GCM' Mar 10 09:50:34 vpnclient5[14666]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 09:50:34 vpnclient5[14666]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 10 09:50:34 vpnclient5[14666]: GDG6: remote_host_ipv6=n/a Mar 10 09:50:34 vpnclient5[14666]: TUN/TAP device tun15 opened Mar 10 09:50:34 vpnclient5[14666]: TUN/TAP TX queue length set to 100 Mar 10 09:50:34 vpnclient5[14666]: /sbin/ifconfig tun15 10.25.72.208 netmask 255.255.255.0 mtu 1500 broadcast 10.25.72.255 Mar 10 09:50:34 vpnclient5[14666]: /sbin/ifconfig tun15 add fde6:7a:7d20:1548::10ce/64 Mar 10 09:50:34 vpnclient5[14666]: /etc/openvpn/ovpn-up tun15 1500 1553 10.25.72.208 255.255.255.0 init Mar 10 09:50:34 vpnclient5[14666]: Initialization Sequence Completed but will runing client to they fix an new patch or buy another asus router there i know openvpn is working with no problem Quote Share this post Link to post