misam 9 Posted ... Installed F33 on virtualbox. Tested both Eddie and Hummingbird. Connection seems on but actually I am not able to reach any website. I guess it's a DNS problem. Eddie (network lock on) takes ages to check DNS (2 minutes when usually it takes 2 seconds), Humminbird is faster but I end up with the same problem. I have checked Eddie's log and nothing seems strange. I'll glad to troubleshoot further if someone can tell me what to check. With other distros in Virtualbox (F32, Opensuse TW, etc) everything works. Thank you. Share this post Link to post
OpenSourcerer 1441 Posted ... 1 hour ago, misam said: I have checked Eddie's log and nothing seems strange. Cool. Mind letting us read them as well? In Eddie, go to Logs tab, click the lifebelt icon and paste/upload that output instead of just logs. Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
misam 9 Posted ... Here is Eddie's log. Eddie System/Environment Report - 21/10/2020 - 08:39 UTC Eddie version: 2.18.9 Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: \SKernel \r on an \m (\l) OS version: Linux localhost.localdomain 5.8.15-301.fc33.x86_64 #1 SMP Thu Oct 15 16:58:06 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux OS architecture: x64 Mono /.Net Framework: 6.8.0.123 (tarball Sat Sep 5 04:49:14 UTC 2020); Framework: v4.0.30319 TUN driver: /dev/net/tun OpenVPN: 2.4.9 - OpenSSL 1.1.1g FIPS 21 Apr 2020, LZO 2.10 (/usr/sbin/openvpn) Hummingbird: () SSH: OpenSSH_8.4p1, OpenSSL 1.1.1g FIPS 21 Apr 2020 (/usr/bin/ssh) SSL: stunnel 5.56 (/usr/bin/stunnel) curl: 7.71.1 (/usr/bin/curl) Profile path: /home/f1/.config/eddie/default.profile Data path: /home/f1/.config/eddie Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/eddie-ui.exe Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" Network Lock Active: Yes, Linux iptables Connected to VPN: Yes, Dubhe Detected DNS: 10.26.14.1, fde6:7a:7d20:160e::1 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 36 ms Test Ping IPv6: 45 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Error:curl: (28) Resolving timed out after 20027 milliseconds ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True netlock: True servers.scoretype: Latency network.entry.iplayer: ipv4-only ---------------------------- Logs: . 2020.10.21 10:32:22 - Eddie version: 2.18.9 / linux_x64, System: Linux, Name: \SKernel \r on an \m (\l), Version: Linux localhost.localdomain 5.8.15-301.fc33.x86_64 #1 SMP Thu Oct 15 16:58:06 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 6.8.0.123 (tarball Sat Sep 5 04:49:14 UTC 2020); Framework: v4.0.30319 . 2020.10.21 10:32:22 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2020.10.21 10:32:22 - Raise system privileges . 2020.10.21 10:32:29 - Profile path: /home/f1/.config/eddie/default.profile . 2020.10.21 10:32:37 - Reading options from /home/f1/.config/eddie/default.profile . 2020.10.21 10:32:37 - Tun Driver - /dev/net/tun . 2020.10.21 10:32:37 - OpenVPN - Version: 2.4.9 - OpenSSL 1.1.1g FIPS 21 Apr 2020, LZO 2.10 (/usr/sbin/openvpn) . 2020.10.21 10:32:37 - SSH - Version: OpenSSH_8.4p1, OpenSSL 1.1.1g FIPS 21 Apr 2020 (/usr/bin/ssh) . 2020.10.21 10:32:37 - SSL - Version: stunnel 5.56 (/usr/bin/stunnel) . 2020.10.21 10:32:37 - curl - Version: 7.71.1 (/usr/bin/curl) ! 2020.10.21 10:32:37 - Activation of Network Lock - Linux iptables I 2020.10.21 10:32:39 - Ready . 2020.10.21 10:32:39 - Collect information about AirVPN completed I 2020.10.21 10:32:55 - Session starting. I 2020.10.21 10:32:55 - Checking authorization ... ! 2020.10.21 10:32:55 - Connecting to Dubhe (Germany, Frankfurt) . 2020.10.21 10:32:56 - OpenVPN > OpenVPN 2.4.9 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 28 2020 . 2020.10.21 10:32:56 - OpenVPN > library versions: OpenSSL 1.1.1g FIPS 21 Apr 2020, LZO 2.10 . 2020.10.21 10:32:56 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.10.21 10:32:56 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.10.21 10:32:56 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.10.21 10:32:56 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.10.21 10:32:56 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.245:443 . 2020.10.21 10:32:56 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2020.10.21 10:32:56 - OpenVPN > UDP link local: (not bound) . 2020.10.21 10:32:56 - OpenVPN > UDP link remote: [AF_INET]141.98.102.245:443 . 2020.10.21 10:32:56 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.245:443, sid=36c59950 4992ac94 . 2020.10.21 10:32:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.10.21 10:32:56 - OpenVPN > VERIFY KU OK . 2020.10.21 10:32:56 - OpenVPN > Validating certificate extended key usage . 2020.10.21 10:32:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.10.21 10:32:56 - OpenVPN > VERIFY EKU OK . 2020.10.21 10:32:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Dubhe, emailAddress=info@airvpn.org . 2020.10.21 10:32:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.10.21 10:32:56 - OpenVPN > [Dubhe] Peer Connection Initiated with [AF_INET]141.98.102.245:443 . 2020.10.21 10:32:57 - OpenVPN > SENT CONTROL [Dubhe]: 'PUSH_REQUEST' (status=1) . 2020.10.21 10:32:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.26.14.1,dhcp-option DNS6 fde6:7a:7d20:160e::1,tun-ipv6,route-gateway 10.26.14.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:160e::10bd/64 fde6:7a:7d20:160e::1,ifconfig 10.26.14.191 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2020.10.21 10:32:57 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.10.21 10:32:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.10.21 10:32:57 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.10.21 10:32:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.10.21 10:32:57 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.10.21 10:32:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.10.21 10:32:57 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.10.21 10:32:57 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.10.21 10:32:57 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.10.21 10:32:57 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.10.21 10:32:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.10.21 10:32:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.10.21 10:32:57 - OpenVPN > ROUTE_GATEWAY 10.0.2.2/255.255.255.0 IFACE=enp0s3 HWADDR=08:00:27:10:2e:0d . 2020.10.21 10:32:57 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.10.21 10:32:57 - OpenVPN > ROUTE6: default_gateway=UNDEF . 2020.10.21 10:32:57 - OpenVPN > TUN/TAP device tun0 opened . 2020.10.21 10:32:57 - OpenVPN > TUN/TAP TX queue length set to 100 . 2020.10.21 10:32:57 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2020.10.21 10:32:57 - OpenVPN > /sbin/ip addr add dev tun0 10.26.14.191/24 broadcast 10.26.14.255 . 2020.10.21 10:32:57 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:160e::10bd/64 dev tun0 . 2020.10.21 10:33:02 - OpenVPN > /sbin/ip route add 141.98.102.245/32 via 10.0.2.2 . 2020.10.21 10:33:02 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.26.14.1 . 2020.10.21 10:33:02 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.26.14.1 . 2020.10.21 10:33:02 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:160e::1 metric -1) dev tun0 . 2020.10.21 10:33:02 - OpenVPN > /sbin/ip -6 route add ::/3 dev tun0 . 2020.10.21 10:33:02 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:160e::1 metric -1) dev tun0 . 2020.10.21 10:33:02 - OpenVPN > /sbin/ip -6 route add 2000::/4 dev tun0 . 2020.10.21 10:33:02 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:160e::1 metric -1) dev tun0 . 2020.10.21 10:33:02 - OpenVPN > /sbin/ip -6 route add 3000::/4 dev tun0 . 2020.10.21 10:33:02 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:160e::1 metric -1) dev tun0 . 2020.10.21 10:33:02 - OpenVPN > /sbin/ip -6 route add fc00::/7 dev tun0 . 2020.10.21 10:33:02 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2020.10.21 10:33:02 - Routes, added a new route, 141.98.102.243 for gateway 10.26.14.1 . 2020.10.21 10:33:02 - Routes, added a new route, 2001:ac8:20:9a:95b2:21aa:48b5:7069 for gateway fde6:7a:7d20:160e::1 . 2020.10.21 10:33:02 - Flushing DNS I 2020.10.21 10:33:02 - Checking route IPv4 I 2020.10.21 10:33:02 - Checking route IPv6 I 2020.10.21 10:33:03 - Checking DNS ! 2020.10.21 10:35:03 - Connected. . 2020.10.21 10:35:03 - OpenVPN > Initialization Sequence Completed ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/1", "gateway": "10.26.14.1", "interface": "tun0" }, { "address": "0.0.0.0\/0", "gateway": "10.0.2.2", "interface": "enp0s3", "metric": "100" }, { "address": "128.0.0.0\/1", "gateway": "10.26.14.1", "interface": "tun0" }, { "address": "141.98.102.243", "gateway": "10.26.14.1", "interface": "tun0" }, { "address": "141.98.102.245", "gateway": "10.0.2.2", "interface": "lo", "metric": "256" }, { "address": "2001:ac8:20:9a:95b2:21aa:48b5:7069", "gateway": "fde6:7a:7d20:160e::1", "interface": "tun0", "metric": "1024" } ], "interfaces": [ { "friendly": "lo", "id": "lo", "name": "lo", "description": "lo", "type": "Loopback", "status": "Unknown", "bytes_received": "583064", "bytes_sent": "583064", "support_ipv4": true, "support_ipv6": true, "ips": [ "127.0.0.1", "::1" ], "gateways": [ "10.0.2.2" ], "bind": true }, { "friendly": "enp0s3", "id": "enp0s3", "name": "enp0s3", "description": "enp0s3", "type": "Ethernet", "status": "Up", "bytes_received": "198224", "bytes_sent": "103872", "support_ipv4": true, "support_ipv6": true, "ips": [ "10.0.2.15", "fe80::9f44:6eaa:9398:f43d" ], "gateways": [ "10.0.2.2" ], "bind": true }, { "friendly": "tun0", "id": "tun0", "name": "tun0", "description": "tun0", "type": "0", "status": "Unknown", "bytes_received": "25042", "bytes_sent": "31670", "support_ipv4": true, "support_ipv6": true, "ips": [ "10.26.14.191", "fde6:7a:7d20:160e::10bd", "fe80::dc83:cd73:592f:b1a5" ], "gateways": [ "10.26.14.1", "fde6:7a:7d20:160e::1" ], "bind": true } ], "ipv4-default-gateway": "10.0.2.2", "ipv4-default-interface": "enp0s3" } ---------------------------- ip addr show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: enp0s3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000 link/ether 08:00:27:10:2e:0d brd ff:ff:ff:ff:ff:ff inet 10.0.2.15/24 brd 10.0.2.255 scope global dynamic noprefixroute enp0s3 valid_lft 85966sec preferred_lft 85966sec inet6 fe80::9f44:6eaa:9398:f43d/64 scope link noprefixroute valid_lft forever preferred_lft forever 3: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 100 link/none inet 10.26.14.191/24 brd 10.26.14.255 scope global tun0 valid_lft forever preferred_lft forever inet6 fde6:7a:7d20:160e::10bd/64 scope global valid_lft forever preferred_lft forever inet6 fe80::dc83:cd73:592f:b1a5/64 scope link stable-privacy valid_lft forever preferred_lft forever ---------------------------- ip link show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: enp0s3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether 08:00:27:10:2e:0d brd ff:ff:ff:ff:ff:ff 3: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN mode DEFAULT group default qlen 100 link/none ---------------------------- ip -4 route show: 0.0.0.0/1 via 10.26.14.1 dev tun0 default via 10.0.2.2 dev enp0s3 proto dhcp metric 100 10.0.2.0/24 dev enp0s3 proto kernel scope link src 10.0.2.15 metric 100 10.26.14.0/24 dev tun0 proto kernel scope link src 10.26.14.191 128.0.0.0/1 via 10.26.14.1 dev tun0 141.98.102.243 via 10.26.14.1 dev tun0 141.98.102.245 via 10.0.2.2 dev enp0s3 ---------------------------- ip -6 route show: ::1 dev lo proto kernel metric 256 pref medium ::/3 dev tun0 metric 1024 pref medium 2001:ac8:20:9a:95b2:21aa:48b5:7069 via fde6:7a:7d20:160e::1 dev tun0 metric 1024 pref medium 2000::/4 dev tun0 metric 1024 pref medium 3000::/4 dev tun0 metric 1024 pref medium fde6:7a:7d20:160e::/64 dev tun0 proto kernel metric 256 pref medium fc00::/7 dev tun0 metric 1024 pref medium fe80::/64 dev enp0s3 proto kernel metric 100 pref medium fe80::/64 dev tun0 proto kernel metric 256 pref medium Share this post Link to post
OpenSourcerer 1441 Posted ... Hm. Noticed something with the interface config and routes. The enp0s3 and lo interfaces share a common gateway address: 10.0.2.2. There are two routes with this: The default route and a special route with the AirVPN server address: { "address": "0.0.0.0\/0", "gateway": "10.0.2.2", "interface": "enp0s3", "metric": "100" } […] { "address": "141.98.102.245", "gateway": "10.0.2.2", "interface": "lo", "metric": "256" } Looks like a NAT interface configuration. Can you try changing this to bridge mode? It will act as a separate device in your network. I'm guessing there's a firewall or something denying the redirect. Not very familiar with anything Red Hat. Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
misam 9 Posted ... I can confirm it's NAT, that is the default Virtualbox network setting. I can change to bridged, however I still do not get why F32 or other distros with exactly the same Eddie settings do not face this issue. Share this post Link to post
misam 9 Posted ... here logs with brigded adapter. Connection fails as soon as Eddie checks DNS: got a prompt "DNS error." Eddie System/Environment Report - 21/10/2020 - 12:15 UTC Eddie version: 2.18.9 Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: \SKernel \r on an \m (\l) OS version: Linux localhost.localdomain 5.8.15-301.fc33.x86_64 #1 SMP Thu Oct 15 16:58:06 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux OS architecture: x64 Mono /.Net Framework: 6.8.0.123 (tarball Sat Sep 5 04:49:14 UTC 2020); Framework: v4.0.30319 TUN driver: /dev/net/tun OpenVPN: 2.4.9 - OpenSSL 1.1.1g FIPS 21 Apr 2020, LZO 2.10 (/usr/sbin/openvpn) Hummingbird: () SSH: OpenSSH_8.4p1, OpenSSL 1.1.1g FIPS 21 Apr 2020 (/usr/bin/ssh) SSL: stunnel 5.56 (/usr/bin/stunnel) curl: 7.71.1 (/usr/bin/curl) Profile path: /home/f1/.config/eddie/default.profile Data path: /home/f1/.config/eddie Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/eddie-ui.exe Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" Network Lock Active: Yes, Linux iptables Connected to VPN: No Detected DNS: 10.25.110.1, fde6:7a:7d20:156e::1 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 12312 ms Test Ping IPv6: 47 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True netlock: True servers.scoretype: Latency network.entry.iplayer: ipv4-only ---------------------------- Logs: . 2020.10.21 14:14:12 - Eddie version: 2.18.9 / linux_x64, System: Linux, Name: \SKernel \r on an \m (\l), Version: Linux localhost.localdomain 5.8.15-301.fc33.x86_64 #1 SMP Thu Oct 15 16:58:06 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 6.8.0.123 (tarball Sat Sep 5 04:49:14 UTC 2020); Framework: v4.0.30319 . 2020.10.21 14:14:12 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2020.10.21 14:14:13 - Raise system privileges . 2020.10.21 14:14:19 - Profile path: /home/f1/.config/eddie/default.profile . 2020.10.21 14:14:25 - Reading options from /home/f1/.config/eddie/default.profile . 2020.10.21 14:14:25 - Tun Driver - /dev/net/tun . 2020.10.21 14:14:25 - OpenVPN - Version: 2.4.9 - OpenSSL 1.1.1g FIPS 21 Apr 2020, LZO 2.10 (/usr/sbin/openvpn) . 2020.10.21 14:14:25 - SSH - Version: OpenSSH_8.4p1, OpenSSL 1.1.1g FIPS 21 Apr 2020 (/usr/bin/ssh) . 2020.10.21 14:14:25 - SSL - Version: stunnel 5.56 (/usr/bin/stunnel) . 2020.10.21 14:14:25 - curl - Version: 7.71.1 (/usr/bin/curl) ! 2020.10.21 14:14:26 - Activation of Network Lock - Linux iptables I 2020.10.21 14:14:27 - Ready . 2020.10.21 14:14:28 - Collect information about AirVPN completed I 2020.10.21 14:14:40 - Session starting. I 2020.10.21 14:14:40 - Checking authorization ... ! 2020.10.21 14:14:40 - Connecting to Tucana (Germany, Frankfurt) . 2020.10.21 14:14:40 - OpenVPN > OpenVPN 2.4.9 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 28 2020 . 2020.10.21 14:14:40 - OpenVPN > library versions: OpenSSL 1.1.1g FIPS 21 Apr 2020, LZO 2.10 . 2020.10.21 14:14:40 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.10.21 14:14:40 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.10.21 14:14:40 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.10.21 14:14:40 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.10.21 14:14:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]178.162.212.216:443 . 2020.10.21 14:14:40 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2020.10.21 14:14:40 - OpenVPN > UDP link local: (not bound) . 2020.10.21 14:14:40 - OpenVPN > UDP link remote: [AF_INET]178.162.212.216:443 . 2020.10.21 14:14:40 - OpenVPN > TLS: Initial packet from [AF_INET]178.162.212.216:443, sid=a8070873 8f424027 . 2020.10.21 14:14:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.10.21 14:14:40 - OpenVPN > VERIFY KU OK . 2020.10.21 14:14:40 - OpenVPN > Validating certificate extended key usage . 2020.10.21 14:14:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.10.21 14:14:40 - OpenVPN > VERIFY EKU OK . 2020.10.21 14:14:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tucana, emailAddress=info@airvpn.org . 2020.10.21 14:14:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.10.21 14:14:40 - OpenVPN > [Tucana] Peer Connection Initiated with [AF_INET]178.162.212.216:443 . 2020.10.21 14:14:42 - OpenVPN > SENT CONTROL [Tucana]: 'PUSH_REQUEST' (status=1) . 2020.10.21 14:14:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.13.206.1,dhcp-option DNS6 fde6:7a:7d20:9ce::1,tun-ipv6,route-gateway 10.13.206.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:9ce::10c7/64 fde6:7a:7d20:9ce::1,ifconfig 10.13.206.201 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2020.10.21 14:14:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.10.21 14:14:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.10.21 14:14:42 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.10.21 14:14:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.10.21 14:14:42 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.10.21 14:14:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.10.21 14:14:42 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.10.21 14:14:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.10.21 14:14:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.10.21 14:14:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.10.21 14:14:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.10.21 14:14:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.10.21 14:14:42 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=enp0s3 HWADDR=08:00:27:10:2e:0d . 2020.10.21 14:14:42 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.10.21 14:14:42 - OpenVPN > ROUTE6: default_gateway=UNDEF . 2020.10.21 14:14:42 - OpenVPN > TUN/TAP device tun0 opened . 2020.10.21 14:14:42 - OpenVPN > TUN/TAP TX queue length set to 100 . 2020.10.21 14:14:42 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2020.10.21 14:14:42 - OpenVPN > /sbin/ip addr add dev tun0 10.13.206.201/24 broadcast 10.13.206.255 . 2020.10.21 14:14:42 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:9ce::10c7/64 dev tun0 . 2020.10.21 14:14:47 - OpenVPN > /sbin/ip route add 178.162.212.216/32 via 192.168.0.1 . 2020.10.21 14:14:47 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.13.206.1 . 2020.10.21 14:14:47 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.13.206.1 . 2020.10.21 14:14:47 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:9ce::1 metric -1) dev tun0 . 2020.10.21 14:14:47 - OpenVPN > /sbin/ip -6 route add ::/3 dev tun0 . 2020.10.21 14:14:47 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:9ce::1 metric -1) dev tun0 . 2020.10.21 14:14:47 - OpenVPN > /sbin/ip -6 route add 2000::/4 dev tun0 . 2020.10.21 14:14:47 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:9ce::1 metric -1) dev tun0 . 2020.10.21 14:14:47 - OpenVPN > /sbin/ip -6 route add 3000::/4 dev tun0 . 2020.10.21 14:14:47 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:9ce::1 metric -1) dev tun0 . 2020.10.21 14:14:47 - OpenVPN > /sbin/ip -6 route add fc00::/7 dev tun0 . 2020.10.21 14:14:47 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2020.10.21 14:14:47 - Routes, added a new route, 178.162.212.214 for gateway 10.13.206.1 . 2020.10.21 14:14:47 - Routes, added a new route, 2a00:c98:2050:a02f:dc0e:3cc1:46f0:5eae for gateway fde6:7a:7d20:9ce::1 . 2020.10.21 14:14:47 - Flushing DNS I 2020.10.21 14:14:47 - Checking route IPv4 I 2020.10.21 14:14:47 - Checking route IPv6 I 2020.10.21 14:14:47 - Checking DNS . 2020.10.21 14:14:48 - Checking DNS failed: . 2020.10.21 14:14:48 - Checking DNS (2° try) . 2020.10.21 14:14:49 - Checking DNS failed: . 2020.10.21 14:14:49 - Checking DNS (3° try) . 2020.10.21 14:14:51 - Checking DNS failed: E 2020.10.21 14:14:51 - Checking DNS failed. . 2020.10.21 14:14:51 - OpenVPN > Initialization Sequence Completed ! 2020.10.21 14:14:51 - Disconnecting . 2020.10.21 14:14:51 - Routes, removed a route previously added, 178.162.212.214 for gateway 10.13.206.1 . 2020.10.21 14:14:51 - Routes, removed a route previously added, 2a00:c98:2050:a02f:dc0e:3cc1:46f0:5eae for gateway fde6:7a:7d20:9ce::1 . 2020.10.21 14:14:51 - Sending soft termination signal . 2020.10.21 14:14:51 - OpenVPN > event_wait : Interrupted system call (code=4) . 2020.10.21 14:14:51 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.10.21 14:14:56 - OpenVPN > /sbin/ip route del 178.162.212.216/32 . 2020.10.21 14:14:56 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2020.10.21 14:14:56 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2020.10.21 14:14:56 - OpenVPN > delete_route_ipv6(::/3) . 2020.10.21 14:14:56 - OpenVPN > /sbin/ip -6 route del ::/3 dev tun0 . 2020.10.21 14:14:56 - OpenVPN > delete_route_ipv6(2000::/4) . 2020.10.21 14:14:56 - OpenVPN > /sbin/ip -6 route del 2000::/4 dev tun0 . 2020.10.21 14:14:56 - OpenVPN > delete_route_ipv6(3000::/4) . 2020.10.21 14:14:56 - OpenVPN > /sbin/ip -6 route del 3000::/4 dev tun0 . 2020.10.21 14:14:56 - OpenVPN > delete_route_ipv6(fc00::/7) . 2020.10.21 14:14:56 - OpenVPN > /sbin/ip -6 route del fc00::/7 dev tun0 . 2020.10.21 14:14:56 - OpenVPN > Closing TUN/TAP interface . 2020.10.21 14:14:56 - OpenVPN > /sbin/ip addr del dev tun0 10.13.206.201/24 . 2020.10.21 14:14:56 - OpenVPN > /sbin/ip -6 addr del fde6:7a:7d20:9ce::10c7/64 dev tun0 . 2020.10.21 14:14:56 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.10.21 14:14:56 - Connection terminated. . 2020.10.21 14:14:56 - DNS of the system restored to original settings (Rename method) . 2020.10.21 14:14:59 - Waiting for latency tests (39 to go) . 2020.10.21 14:15:00 - Waiting for latency tests (25 to go) . 2020.10.21 14:15:02 - Waiting for latency tests (19 to go) . 2020.10.21 14:15:04 - Waiting for latency tests (18 to go) . 2020.10.21 14:15:05 - Waiting for latency tests (16 to go) I 2020.10.21 14:15:06 - Checking authorization ... ! 2020.10.21 14:15:06 - Connecting to Alsephina (Germany, Frankfurt) . 2020.10.21 14:15:07 - OpenVPN > OpenVPN 2.4.9 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 28 2020 . 2020.10.21 14:15:07 - OpenVPN > library versions: OpenSSL 1.1.1g FIPS 21 Apr 2020, LZO 2.10 . 2020.10.21 14:15:07 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.10.21 14:15:07 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.10.21 14:15:07 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.10.21 14:15:07 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.10.21 14:15:07 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.189:443 . 2020.10.21 14:15:07 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2020.10.21 14:15:07 - OpenVPN > UDP link local: (not bound) . 2020.10.21 14:15:07 - OpenVPN > UDP link remote: [AF_INET]141.98.102.189:443 . 2020.10.21 14:15:07 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.189:443, sid=862838dd 0c6a46bc . 2020.10.21 14:15:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.10.21 14:15:07 - OpenVPN > VERIFY KU OK . 2020.10.21 14:15:07 - OpenVPN > Validating certificate extended key usage . 2020.10.21 14:15:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.10.21 14:15:07 - OpenVPN > VERIFY EKU OK . 2020.10.21 14:15:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alsephina, emailAddress=info@airvpn.org . 2020.10.21 14:15:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.10.21 14:15:07 - OpenVPN > [Alsephina] Peer Connection Initiated with [AF_INET]141.98.102.189:443 . 2020.10.21 14:15:08 - OpenVPN > SENT CONTROL [Alsephina]: 'PUSH_REQUEST' (status=1) . 2020.10.21 14:15:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.110.1,dhcp-option DNS6 fde6:7a:7d20:156e::1,tun-ipv6,route-gateway 10.25.110.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:156e::1021/64 fde6:7a:7d20:156e::1,ifconfig 10.25.110.35 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2020.10.21 14:15:08 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.10.21 14:15:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.10.21 14:15:08 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.10.21 14:15:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.10.21 14:15:08 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.10.21 14:15:08 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.10.21 14:15:08 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.10.21 14:15:08 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.10.21 14:15:08 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.10.21 14:15:08 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.10.21 14:15:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.10.21 14:15:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.10.21 14:15:08 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=enp0s3 HWADDR=08:00:27:10:2e:0d . 2020.10.21 14:15:08 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.10.21 14:15:08 - OpenVPN > ROUTE6: default_gateway=UNDEF . 2020.10.21 14:15:08 - OpenVPN > TUN/TAP device tun0 opened . 2020.10.21 14:15:08 - OpenVPN > TUN/TAP TX queue length set to 100 . 2020.10.21 14:15:08 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2020.10.21 14:15:08 - OpenVPN > /sbin/ip addr add dev tun0 10.25.110.35/24 broadcast 10.25.110.255 . 2020.10.21 14:15:08 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:156e::1021/64 dev tun0 . 2020.10.21 14:15:13 - OpenVPN > /sbin/ip route add 141.98.102.189/32 via 192.168.0.1 . 2020.10.21 14:15:13 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.25.110.1 . 2020.10.21 14:15:13 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.25.110.1 . 2020.10.21 14:15:13 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:156e::1 metric -1) dev tun0 . 2020.10.21 14:15:13 - OpenVPN > /sbin/ip -6 route add ::/3 dev tun0 . 2020.10.21 14:15:13 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:156e::1 metric -1) dev tun0 . 2020.10.21 14:15:13 - OpenVPN > /sbin/ip -6 route add 2000::/4 dev tun0 . 2020.10.21 14:15:13 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:156e::1 metric -1) dev tun0 . 2020.10.21 14:15:13 - OpenVPN > /sbin/ip -6 route add 3000::/4 dev tun0 . 2020.10.21 14:15:13 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:156e::1 metric -1) dev tun0 . 2020.10.21 14:15:13 - OpenVPN > /sbin/ip -6 route add fc00::/7 dev tun0 . 2020.10.21 14:15:13 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2020.10.21 14:15:13 - Routes, added a new route, 141.98.102.187 for gateway 10.25.110.1 . 2020.10.21 14:15:13 - Routes, added a new route, 2001:ac8:20:97:d4c3:f181:d57a:8d19 for gateway fde6:7a:7d20:156e::1 . 2020.10.21 14:15:13 - Flushing DNS I 2020.10.21 14:15:14 - Checking route IPv4 I 2020.10.21 14:15:14 - Checking route IPv6 I 2020.10.21 14:15:14 - Checking DNS . 2020.10.21 14:15:14 - Checking DNS failed: irkxqdvkgjpibcijdvxxzefgmzzkiver . 2020.10.21 14:15:14 - Checking DNS (2° try) . 2020.10.21 14:15:15 - Checking DNS failed: irkxqdvkgjpibcijdvxxzefgmzzkiver . 2020.10.21 14:15:15 - Checking DNS (3° try) . 2020.10.21 14:15:18 - Checking DNS failed: irkxqdvkgjpibcijdvxxzefgmzzkiver E 2020.10.21 14:15:18 - Checking DNS failed. . 2020.10.21 14:15:18 - OpenVPN > Initialization Sequence Completed ! 2020.10.21 14:15:18 - Disconnecting . 2020.10.21 14:15:18 - Routes, removed a route previously added, 141.98.102.187 for gateway 10.25.110.1 . 2020.10.21 14:15:18 - Routes, removed a route previously added, 2001:ac8:20:97:d4c3:f181:d57a:8d19 for gateway fde6:7a:7d20:156e::1 . 2020.10.21 14:15:18 - Sending soft termination signal . 2020.10.21 14:15:18 - OpenVPN > event_wait : Interrupted system call (code=4) . 2020.10.21 14:15:18 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.10.21 14:15:23 - OpenVPN > /sbin/ip route del 141.98.102.189/32 . 2020.10.21 14:15:23 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2020.10.21 14:15:23 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2020.10.21 14:15:23 - OpenVPN > delete_route_ipv6(::/3) . 2020.10.21 14:15:23 - OpenVPN > /sbin/ip -6 route del ::/3 dev tun0 . 2020.10.21 14:15:23 - OpenVPN > delete_route_ipv6(2000::/4) . 2020.10.21 14:15:23 - OpenVPN > /sbin/ip -6 route del 2000::/4 dev tun0 . 2020.10.21 14:15:23 - OpenVPN > delete_route_ipv6(3000::/4) . 2020.10.21 14:15:23 - OpenVPN > /sbin/ip -6 route del 3000::/4 dev tun0 . 2020.10.21 14:15:23 - OpenVPN > delete_route_ipv6(fc00::/7) . 2020.10.21 14:15:23 - OpenVPN > /sbin/ip -6 route del fc00::/7 dev tun0 . 2020.10.21 14:15:23 - OpenVPN > Closing TUN/TAP interface . 2020.10.21 14:15:23 - OpenVPN > /sbin/ip addr del dev tun0 10.25.110.35/24 . 2020.10.21 14:15:23 - OpenVPN > /sbin/ip -6 addr del fde6:7a:7d20:156e::1021/64 dev tun0 . 2020.10.21 14:15:23 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.10.21 14:15:23 - Connection terminated. . 2020.10.21 14:15:23 - DNS of the system restored to original settings (Rename method) I 2020.10.21 14:15:26 - Checking authorization ... ! 2020.10.21 14:15:26 - Connecting to Dubhe (Germany, Frankfurt) . 2020.10.21 14:15:27 - OpenVPN > OpenVPN 2.4.9 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 28 2020 . 2020.10.21 14:15:27 - OpenVPN > library versions: OpenSSL 1.1.1g FIPS 21 Apr 2020, LZO 2.10 . 2020.10.21 14:15:27 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.10.21 14:15:27 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.10.21 14:15:27 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.10.21 14:15:27 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.10.21 14:15:27 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.245:443 . 2020.10.21 14:15:27 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2020.10.21 14:15:27 - OpenVPN > UDP link local: (not bound) . 2020.10.21 14:15:27 - OpenVPN > UDP link remote: [AF_INET]141.98.102.245:443 . 2020.10.21 14:15:27 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.245:443, sid=5989c9d5 67dcbe87 . 2020.10.21 14:15:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.10.21 14:15:27 - OpenVPN > VERIFY KU OK . 2020.10.21 14:15:27 - OpenVPN > Validating certificate extended key usage . 2020.10.21 14:15:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.10.21 14:15:27 - OpenVPN > VERIFY EKU OK . 2020.10.21 14:15:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Dubhe, emailAddress=info@airvpn.org . 2020.10.21 14:15:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.10.21 14:15:27 - OpenVPN > [Dubhe] Peer Connection Initiated with [AF_INET]141.98.102.245:443 . 2020.10.21 14:15:28 - OpenVPN > SENT CONTROL [Dubhe]: 'PUSH_REQUEST' (status=1) . 2020.10.21 14:15:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.26.14.1,dhcp-option DNS6 fde6:7a:7d20:160e::1,tun-ipv6,route-gateway 10.26.14.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:160e::10bd/64 fde6:7a:7d20:160e::1,ifconfig 10.26.14.191 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2020.10.21 14:15:28 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.10.21 14:15:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.10.21 14:15:28 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.10.21 14:15:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.10.21 14:15:28 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.10.21 14:15:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.10.21 14:15:28 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.10.21 14:15:28 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.10.21 14:15:28 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.10.21 14:15:28 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.10.21 14:15:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.10.21 14:15:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.10.21 14:15:28 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=enp0s3 HWADDR=08:00:27:10:2e:0d . 2020.10.21 14:15:28 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.10.21 14:15:28 - OpenVPN > ROUTE6: default_gateway=UNDEF . 2020.10.21 14:15:28 - OpenVPN > TUN/TAP device tun0 opened . 2020.10.21 14:15:28 - OpenVPN > TUN/TAP TX queue length set to 100 . 2020.10.21 14:15:28 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2020.10.21 14:15:28 - OpenVPN > /sbin/ip addr add dev tun0 10.26.14.191/24 broadcast 10.26.14.255 . 2020.10.21 14:15:28 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:160e::10bd/64 dev tun0 . 2020.10.21 14:15:33 - OpenVPN > /sbin/ip route add 141.98.102.245/32 via 192.168.0.1 . 2020.10.21 14:15:33 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.26.14.1 . 2020.10.21 14:15:33 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.26.14.1 . 2020.10.21 14:15:33 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:160e::1 metric -1) dev tun0 . 2020.10.21 14:15:33 - OpenVPN > /sbin/ip -6 route add ::/3 dev tun0 . 2020.10.21 14:15:33 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:160e::1 metric -1) dev tun0 . 2020.10.21 14:15:33 - OpenVPN > /sbin/ip -6 route add 2000::/4 dev tun0 . 2020.10.21 14:15:33 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:160e::1 metric -1) dev tun0 . 2020.10.21 14:15:33 - OpenVPN > /sbin/ip -6 route add 3000::/4 dev tun0 . 2020.10.21 14:15:33 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:160e::1 metric -1) dev tun0 . 2020.10.21 14:15:33 - OpenVPN > /sbin/ip -6 route add fc00::/7 dev tun0 . 2020.10.21 14:15:33 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2020.10.21 14:15:33 - Routes, added a new route, 141.98.102.243 for gateway 10.26.14.1 . 2020.10.21 14:15:33 - Routes, added a new route, 2001:ac8:20:9a:95b2:21aa:48b5:7069 for gateway fde6:7a:7d20:160e::1 . 2020.10.21 14:15:33 - Flushing DNS I 2020.10.21 14:15:33 - Checking route IPv4 I 2020.10.21 14:15:34 - Checking route IPv6 I 2020.10.21 14:15:34 - Checking DNS . 2020.10.21 14:15:34 - Checking DNS failed: adhewclkxlfpwuicvghjzhlumqjlitij . 2020.10.21 14:15:34 - Checking DNS (2° try) ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/1", "gateway": "10.26.14.1", "interface": "tun0" }, { "address": "0.0.0.0\/0", "gateway": "192.168.0.1", "interface": "enp0s3", "metric": "100" }, { "address": "128.0.0.0\/1", "gateway": "10.26.14.1", "interface": "tun0" }, { "address": "141.98.102.243", "gateway": "10.26.14.1", "interface": "tun0" }, { "address": "141.98.102.245", "gateway": "192.168.0.1", "interface": "enp0s3" }, { "address": "2001:ac8:20:9a:95b2:21aa:48b5:7069", "gateway": "fde6:7a:7d20:160e::1", "interface": "tun0", "metric": "1024" } ], "interfaces": [ { "friendly": "lo", "id": "lo", "name": "lo", "description": "lo", "type": "Loopback", "status": "Unknown", "bytes_received": "293689", "bytes_sent": "293689", "support_ipv4": true, "support_ipv6": true, "ips": [ "127.0.0.1", "::1" ], "gateways": [], "bind": true }, { "friendly": "enp0s3", "id": "enp0s3", "name": "enp0s3", "description": "enp0s3", "type": "Ethernet", "status": "Up", "bytes_received": "2897916", "bytes_sent": "336387", "support_ipv4": true, "support_ipv6": true, "ips": [ "192.168.0.123", "fe80::9f44:6eaa:9398:f43d" ], "gateways": [ "192.168.0.1" ], "bind": true }, { "friendly": "tun0", "id": "tun0", "name": "tun0", "description": "tun0", "type": "0", "status": "Unknown", "bytes_received": "26142", "bytes_sent": "11699", "support_ipv4": true, "support_ipv6": true, "ips": [ "10.26.14.191", "fde6:7a:7d20:160e::10bd", "fe80::a106:e5a:a060:386a" ], "gateways": [ "10.26.14.1", "fde6:7a:7d20:160e::1" ], "bind": true } ], "ipv4-default-gateway": "192.168.0.1", "ipv4-default-interface": "enp0s3" } ---------------------------- ip addr show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: enp0s3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000 link/ether 08:00:27:10:2e:0d brd ff:ff:ff:ff:ff:ff inet 192.168.0.123/24 brd 192.168.0.255 scope global dynamic noprefixroute enp0s3 valid_lft 7074sec preferred_lft 7074sec inet6 fe80::9f44:6eaa:9398:f43d/64 scope link noprefixroute valid_lft forever preferred_lft forever 5: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 100 link/none inet 10.26.14.191/24 brd 10.26.14.255 scope global tun0 valid_lft forever preferred_lft forever inet6 fde6:7a:7d20:160e::10bd/64 scope global valid_lft forever preferred_lft forever inet6 fe80::a106:e5a:a060:386a/64 scope link stable-privacy valid_lft forever preferred_lft forever ---------------------------- ip link show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: enp0s3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether 08:00:27:10:2e:0d brd ff:ff:ff:ff:ff:ff 5: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN mode DEFAULT group default qlen 100 link/none ---------------------------- ip -4 route show: 0.0.0.0/1 via 10.26.14.1 dev tun0 default via 192.168.0.1 dev enp0s3 proto dhcp metric 100 10.26.14.0/24 dev tun0 proto kernel scope link src 10.26.14.191 128.0.0.0/1 via 10.26.14.1 dev tun0 141.98.102.243 via 10.26.14.1 dev tun0 141.98.102.245 via 192.168.0.1 dev enp0s3 192.168.0.0/24 dev enp0s3 proto kernel scope link src 192.168.0.123 metric 100 ---------------------------- ip -6 route show: ::1 dev lo proto kernel metric 256 pref medium ::/3 dev tun0 metric 1024 pref medium 2001:ac8:20:9a:95b2:21aa:48b5:7069 via fde6:7a:7d20:160e::1 dev tun0 metric 1024 pref medium 2000::/4 dev tun0 metric 1024 pref medium 3000::/4 dev tun0 metric 1024 pref medium fde6:7a:7d20:160e::/64 dev tun0 proto kernel metric 256 pref medium fc00::/7 dev tun0 metric 1024 pref medium fe80::/64 dev enp0s3 proto kernel metric 100 pref medium fe80::/64 dev tun0 proto kernel metric 256 pref medium Share this post Link to post
misam 9 Posted ... hummingbird logs with NAT network. Hummingbird - AirVPN OpenVPN 3 Client 1.1.0 - 23 June 2020 Wed Oct 21 15:20:04.644 2020 System and service manager in use is systemd Wed Oct 21 15:20:04.695 2020 Starting thread Wed Oct 21 15:20:04.695 2020 OpenVPN core 3.6.4 AirVPN linux x86_64 64-bit Wed Oct 21 15:20:04.696 2020 Frame=512/2048/512 mssfix-ctrl=1250 Wed Oct 21 15:20:04.696 2020 UNUSED OPTIONS 3 [resolv-retry] [infinite] 4 [nobind] 5 [persist-key] 6 [persist-tun] 7 [auth-nocache] 8 [route-delay] [5] 9 [verb] [3] 10 [explicit-exit-notify] [5] Wed Oct 21 15:20:04.697 2020 EVENT: RESOLVE Wed Oct 21 15:20:04.697 2020 WARNING: NetworkManager is running on this system and may interfere with DNS management and cause DNS leaks Wed Oct 21 15:20:04.697 2020 WARNING: systemd-resolved is running on this system and may interfere with DNS management and cause DNS leaks Wed Oct 21 15:20:04.697 2020 Network filter and lock is using iptables-legacy Wed Oct 21 15:20:04.705 2020 Successfully loaded kernel module iptable_filter Wed Oct 21 15:20:04.721 2020 Successfully loaded kernel module iptable_nat Wed Oct 21 15:20:04.724 2020 Successfully loaded kernel module iptable_mangle Wed Oct 21 15:20:04.729 2020 Successfully loaded kernel module iptable_security Wed Oct 21 15:20:04.736 2020 Successfully loaded kernel module iptable_raw Wed Oct 21 15:20:04.744 2020 Successfully loaded kernel module ip6table_filter Wed Oct 21 15:20:04.757 2020 Successfully loaded kernel module ip6table_nat Wed Oct 21 15:20:04.760 2020 Successfully loaded kernel module ip6table_mangle Wed Oct 21 15:20:04.763 2020 Successfully loaded kernel module ip6table_security Wed Oct 21 15:20:04.767 2020 Successfully loaded kernel module ip6table_raw Wed Oct 21 15:20:04.767 2020 WARNING: firewalld is running on this system and may interfere with network filter and lock Wed Oct 21 15:20:04.778 2020 Network filter successfully initialized Wed Oct 21 15:20:04.778 2020 Local IPv4 address 10.0.2.15 Wed Oct 21 15:20:04.778 2020 Local IPv6 address fe80::9f44:6eaa:9398:f43d Wed Oct 21 15:20:04.778 2020 Local interface enp0s3 Wed Oct 21 15:20:04.778 2020 Setting up network filter and lock Wed Oct 21 15:20:04.778 2020 Allowing system DNS 192.168.0.161 to pass through the network filter Wed Oct 21 15:20:04.778 2020 Adding IPv4 server 185.189.112.10 to network filter Wed Oct 21 15:20:04.886 2020 Network filter and lock successfully activated Wed Oct 21 15:20:04.886 2020 Contacting 185.189.112.10:443 via UDP Wed Oct 21 15:20:04.886 2020 EVENT: WAIT Wed Oct 21 15:20:04.886 2020 net_route_best_gw query IPv4: 185.189.112.10/32 Wed Oct 21 15:20:04.886 2020 sitnl_route_best_gw result: via 10.0.2.2 dev enp0s3 Wed Oct 21 15:20:04.886 2020 net_route_add: 185.189.112.10/32 via 10.0.2.2 dev enp0s3 table 0 metric 0 Wed Oct 21 15:20:04.886 2020 Wed Oct 21 15:20:04.886 2020 Connecting to [185.189.112.10]:443 (185.189.112.10) via UDPv4 Wed Oct 21 15:20:04.909 2020 EVENT: CONNECTING Wed Oct 21 15:20:04.909 2020 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client Wed Oct 21 15:20:04.909 2020 Peer Info: IV_VER=3.6.4 AirVPN IV_PLAT=linux IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Hummingbird - AirVPN OpenVPN 3 Client 1.1.0 IV_SSL=mbed TLS 2.16.6 Wed Oct 21 15:20:04.970 2020 VERIFY OK : depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true Wed Oct 21 15:20:04.970 2020 VERIFY OK : depth=0 cert. version : 3 serial number : 24 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Errai, emailAddress=info@airvpn.org issued on : 2016-12-02 16:47:22 expires on : 2026-11-30 16:47:22 signed using : RSA with SHA-512 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication Wed Oct 21 15:20:05.195 2020 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 Wed Oct 21 15:20:05.196 2020 Session is ACTIVE Wed Oct 21 15:20:05.196 2020 EVENT: GET_CONFIG Wed Oct 21 15:20:05.196 2020 Sending PUSH_REQUEST to server... Wed Oct 21 15:20:05.297 2020 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.16.172.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:cac::1] 4 [tun-ipv6] 5 [route-gateway] [10.16.172.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:cac::104b/64] [fde6:7a:7d20:cac::1] 10 [ifconfig] [10.16.172.77] [255.255.255.0] 11 [peer-id] [6] 12 [cipher] [AES-256-GCM] Wed Oct 21 15:20:05.297 2020 PROTOCOL OPTIONS: cipher: AES-256-GCM digest: NONE ncp enabled: yes compress: LZO_STUB peer ID: 6 Wed Oct 21 15:20:05.297 2020 EVENT: ASSIGN_IP Wed Oct 21 15:20:05.298 2020 VPN Server has pushed IPv4 DNS server 10.16.172.1 Wed Oct 21 15:20:05.306 2020 Setting pushed IPv4 DNS server 10.16.172.1 in resolv.conf Wed Oct 21 15:20:05.306 2020 VPN Server has pushed IPv6 DNS server fde6:7a:7d20:cac::1 Wed Oct 21 15:20:05.311 2020 Setting pushed IPv6 DNS server fde6:7a:7d20:cac::1 in resolv.conf Wed Oct 21 15:20:05.329 2020 net_iface_mtu_set: mtu 1500 for tun0 Wed Oct 21 15:20:05.329 2020 net_iface_up: set tun0 up Wed Oct 21 15:20:05.329 2020 net_addr_add: 10.16.172.77/24 brd 10.16.172.255 dev tun0 Wed Oct 21 15:20:05.329 2020 net_addr_add: fde6:7a:7d20:cac::104b/64 dev tun0 Wed Oct 21 15:20:05.329 2020 net_route_add: 0.0.0.0/1 via 10.16.172.1 dev tun0 table 0 metric 0 Wed Oct 21 15:20:05.329 2020 net_route_add: 128.0.0.0/1 via 10.16.172.1 dev tun0 table 0 metric 0 Wed Oct 21 15:20:05.329 2020 net_route_add: ::/1 via fde6:7a:7d20:cac::1 dev tun0 table 0 metric 0 Wed Oct 21 15:20:05.329 2020 net_route_add: 8000::/1 via fde6:7a:7d20:cac::1 dev tun0 table 0 metric 0 Wed Oct 21 15:20:05.329 2020 Connected via tun Wed Oct 21 15:20:05.329 2020 LZO-ASYM init swap=0 asym=1 Wed Oct 21 15:20:05.329 2020 Comp-stub init swap=0 Wed Oct 21 15:20:05.329 2020 EVENT: CONNECTED 185.189.112.10:443 (185.189.112.10) via /UDPv4 on tun/10.16.172.77/fde6:7a:7d20:cac::104b gw=[10.16.172.1/fde6:7a:7d20:cac::1] Wed Oct 21 15:20:05.329 2020 Server has pushed its own DNS. Removing system DNS from network filter. Wed Oct 21 15:20:05.334 2020 System DNS 192.168.0.161 is now rejected by the network filter ^Creceived stop signal 2 Wed Oct 21 15:20:16.803 2020 net_route_del: 8000::/1 via fde6:7a:7d20:cac::1 dev tun0 table 0 metric 0 Wed Oct 21 15:20:16.804 2020 net_route_del: ::/1 via fde6:7a:7d20:cac::1 dev tun0 table 0 metric 0 Wed Oct 21 15:20:16.804 2020 net_route_del: 128.0.0.0/1 via 10.16.172.1 dev tun0 table 0 metric 0 Wed Oct 21 15:20:16.804 2020 net_route_del: 0.0.0.0/1 via 10.16.172.1 dev tun0 table 0 metric 0 Wed Oct 21 15:20:16.804 2020 net_addr_del: fde6:7a:7d20:cac::104b/64 dev tun0 Wed Oct 21 15:20:16.804 2020 net_addr_del: 10.16.172.77/24 dev tun0 Wed Oct 21 15:20:16.805 2020 net_iface_mtu_set: mtu 1500 for tun0 Wed Oct 21 15:20:16.805 2020 net_iface_up: set tun0 down Wed Oct 21 15:20:16.806 2020 net_route_del: 185.189.112.10/32 via 10.0.2.2 dev enp0s3 table 0 metric 0 Wed Oct 21 15:20:16.806 2020 Wed Oct 21 15:20:16.819 2020 EVENT: DISCONNECTED Wed Oct 21 15:20:16.820 2020 Successfully restored DNS settings Wed Oct 21 15:20:16.901 2020 Network filter successfully restored Wed Oct 21 15:20:16.901 2020 Thread finished STATS: BYTES_IN : 4797 BYTES_OUT : 7528 PACKETS_IN : 13 PACKETS_OUT : 29 TUN_BYTES_IN : 2895 TUN_PACKETS_IN : 16 Share this post Link to post
misam 9 Posted ... Solved!! Thanks to @Staff for the solution provided. Disabling: systemd-resolved fixed it. Fedora33 ships with systemd-resolved enabled by default, that was the reason why with other distros I had not this problem. Share this post Link to post