Jump to content
Not connected, Your IP: 44.200.249.42

Recommended Posts

Installed F33 on virtualbox. Tested both Eddie and Hummingbird. Connection seems on but actually I am not able to reach any website.
I guess it's a DNS problem.

Eddie (network lock on) takes ages to check DNS (2 minutes when usually it takes 2 seconds), Humminbird is faster but I end up with the same problem.
I have checked Eddie's log and nothing seems strange.

I'll glad to troubleshoot further if someone can tell me what to check.

With other distros in Virtualbox  (F32, Opensuse TW, etc) everything works.

Thank you.

Share this post


Link to post
1 hour ago, misam said:

I have checked Eddie's log and nothing seems strange.


Cool. Mind letting us read them as well? In Eddie, go to Logs tab, click the lifebelt icon and paste/upload that output instead of just logs.

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Here is Eddie's log.

Eddie System/Environment Report - 21/10/2020 - 08:39 UTC

Eddie version: 2.18.9
Eddie OS build: linux_x64
Eddie architecture: x64
OS type: Linux
OS name: \SKernel \r on an \m (\l)
OS version: Linux localhost.localdomain 5.8.15-301.fc33.x86_64 #1 SMP Thu Oct 15 16:58:06 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
OS architecture: x64
Mono /.Net Framework: 6.8.0.123 (tarball Sat Sep  5 04:49:14 UTC 2020); Framework: v4.0.30319
TUN driver: /dev/net/tun
OpenVPN: 2.4.9 - OpenSSL 1.1.1g FIPS  21 Apr 2020, LZO 2.10 (/usr/sbin/openvpn)
Hummingbird:  ()
SSH: OpenSSH_8.4p1, OpenSSL 1.1.1g FIPS  21 Apr 2020 (/usr/bin/ssh)
SSL: stunnel 5.56 (/usr/bin/stunnel)
curl: 7.71.1 (/usr/bin/curl)
Profile path: /home/f1/.config/eddie/default.profile
Data path: /home/f1/.config/eddie
Application path: /usr/lib/eddie-ui
Executable path: /usr/lib/eddie-ui/eddie-ui.exe
Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
Network Lock Active: Yes, Linux iptables
Connected to VPN: Yes, Dubhe
Detected DNS: 10.26.14.1, fde6:7a:7d20:160e::1
Test DNS IPv4: Ok
Test DNS IPv6: Ok
Test Ping IPv4: 36 ms
Test Ping IPv6: 45 ms
Test HTTP IPv4: Ok
Test HTTP IPv6: Ok
Test HTTPS: Error:curl: (28) Resolving timed out after 20027 milliseconds
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
netlock: True
servers.scoretype: Latency
network.entry.iplayer: ipv4-only

----------------------------
Logs:

. 2020.10.21 10:32:22 - Eddie version: 2.18.9 / linux_x64, System: Linux, Name: \SKernel \r on an \m (\l), Version: Linux localhost.localdomain 5.8.15-301.fc33.x86_64 #1 SMP Thu Oct 15 16:58:06 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 6.8.0.123 (tarball Sat Sep  5 04:49:14 UTC 2020); Framework: v4.0.30319
. 2020.10.21 10:32:22 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
. 2020.10.21 10:32:22 - Raise system privileges
. 2020.10.21 10:32:29 - Profile path: /home/f1/.config/eddie/default.profile
. 2020.10.21 10:32:37 - Reading options from /home/f1/.config/eddie/default.profile
. 2020.10.21 10:32:37 - Tun Driver - /dev/net/tun
. 2020.10.21 10:32:37 - OpenVPN - Version: 2.4.9 - OpenSSL 1.1.1g FIPS  21 Apr 2020, LZO 2.10 (/usr/sbin/openvpn)
. 2020.10.21 10:32:37 - SSH - Version: OpenSSH_8.4p1, OpenSSL 1.1.1g FIPS  21 Apr 2020 (/usr/bin/ssh)
. 2020.10.21 10:32:37 - SSL - Version: stunnel 5.56 (/usr/bin/stunnel)
. 2020.10.21 10:32:37 - curl - Version: 7.71.1 (/usr/bin/curl)
! 2020.10.21 10:32:37 - Activation of Network Lock - Linux iptables
I 2020.10.21 10:32:39 - Ready
. 2020.10.21 10:32:39 - Collect information about AirVPN completed
I 2020.10.21 10:32:55 - Session starting.
I 2020.10.21 10:32:55 - Checking authorization ...
! 2020.10.21 10:32:55 - Connecting to Dubhe (Germany, Frankfurt)
. 2020.10.21 10:32:56 - OpenVPN > OpenVPN 2.4.9 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 28 2020
. 2020.10.21 10:32:56 - OpenVPN > library versions: OpenSSL 1.1.1g FIPS  21 Apr 2020, LZO 2.10
. 2020.10.21 10:32:56 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.10.21 10:32:56 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.10.21 10:32:56 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.10.21 10:32:56 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.10.21 10:32:56 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.245:443
. 2020.10.21 10:32:56 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2020.10.21 10:32:56 - OpenVPN > UDP link local: (not bound)
. 2020.10.21 10:32:56 - OpenVPN > UDP link remote: [AF_INET]141.98.102.245:443
. 2020.10.21 10:32:56 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.245:443, sid=36c59950 4992ac94
. 2020.10.21 10:32:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.10.21 10:32:56 - OpenVPN > VERIFY KU OK
. 2020.10.21 10:32:56 - OpenVPN > Validating certificate extended key usage
. 2020.10.21 10:32:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.10.21 10:32:56 - OpenVPN > VERIFY EKU OK
. 2020.10.21 10:32:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Dubhe, emailAddress=info@airvpn.org
. 2020.10.21 10:32:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.10.21 10:32:56 - OpenVPN > [Dubhe] Peer Connection Initiated with [AF_INET]141.98.102.245:443
. 2020.10.21 10:32:57 - OpenVPN > SENT CONTROL [Dubhe]: 'PUSH_REQUEST' (status=1)
. 2020.10.21 10:32:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.26.14.1,dhcp-option DNS6 fde6:7a:7d20:160e::1,tun-ipv6,route-gateway 10.26.14.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:160e::10bd/64 fde6:7a:7d20:160e::1,ifconfig 10.26.14.191 255.255.255.0,peer-id 1,cipher AES-256-GCM'
. 2020.10.21 10:32:57 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.10.21 10:32:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.10.21 10:32:57 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.10.21 10:32:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.10.21 10:32:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.10.21 10:32:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.10.21 10:32:57 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.10.21 10:32:57 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.10.21 10:32:57 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.10.21 10:32:57 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.10.21 10:32:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.10.21 10:32:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.10.21 10:32:57 - OpenVPN > ROUTE_GATEWAY 10.0.2.2/255.255.255.0 IFACE=enp0s3 HWADDR=08:00:27:10:2e:0d
. 2020.10.21 10:32:57 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.10.21 10:32:57 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.10.21 10:32:57 - OpenVPN > TUN/TAP device tun0 opened
. 2020.10.21 10:32:57 - OpenVPN > TUN/TAP TX queue length set to 100
. 2020.10.21 10:32:57 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2020.10.21 10:32:57 - OpenVPN > /sbin/ip addr add dev tun0 10.26.14.191/24 broadcast 10.26.14.255
. 2020.10.21 10:32:57 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:160e::10bd/64 dev tun0
. 2020.10.21 10:33:02 - OpenVPN > /sbin/ip route add 141.98.102.245/32 via 10.0.2.2
. 2020.10.21 10:33:02 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.26.14.1
. 2020.10.21 10:33:02 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.26.14.1
. 2020.10.21 10:33:02 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:160e::1 metric -1) dev tun0
. 2020.10.21 10:33:02 - OpenVPN > /sbin/ip -6 route add ::/3 dev tun0
. 2020.10.21 10:33:02 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:160e::1 metric -1) dev tun0
. 2020.10.21 10:33:02 - OpenVPN > /sbin/ip -6 route add 2000::/4 dev tun0
. 2020.10.21 10:33:02 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:160e::1 metric -1) dev tun0
. 2020.10.21 10:33:02 - OpenVPN > /sbin/ip -6 route add 3000::/4 dev tun0
. 2020.10.21 10:33:02 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:160e::1 metric -1) dev tun0
. 2020.10.21 10:33:02 - OpenVPN > /sbin/ip -6 route add fc00::/7 dev tun0
. 2020.10.21 10:33:02 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2020.10.21 10:33:02 - Routes, added a new route, 141.98.102.243 for gateway 10.26.14.1
. 2020.10.21 10:33:02 - Routes, added a new route, 2001:ac8:20:9a:95b2:21aa:48b5:7069 for gateway fde6:7a:7d20:160e::1
. 2020.10.21 10:33:02 - Flushing DNS
I 2020.10.21 10:33:02 - Checking route IPv4
I 2020.10.21 10:33:02 - Checking route IPv6
I 2020.10.21 10:33:03 - Checking DNS
! 2020.10.21 10:35:03 - Connected.
. 2020.10.21 10:35:03 - OpenVPN > Initialization Sequence Completed

----------------------------
Network Interfaces and Routes:

{
    "support_ipv4": true,
    "support_ipv6": true,
    "routes": [
        {
            "address": "0.0.0.0\/1",
            "gateway": "10.26.14.1",
            "interface": "tun0"
        },
        {
            "address": "0.0.0.0\/0",
            "gateway": "10.0.2.2",
            "interface": "enp0s3",
            "metric": "100"
        },
        {
            "address": "128.0.0.0\/1",
            "gateway": "10.26.14.1",
            "interface": "tun0"
        },
        {
            "address": "141.98.102.243",
            "gateway": "10.26.14.1",
            "interface": "tun0"
        },
        {
            "address": "141.98.102.245",
            "gateway": "10.0.2.2",
            "interface": "lo",
            "metric": "256"
        },
        {
            "address": "2001:ac8:20:9a:95b2:21aa:48b5:7069",
            "gateway": "fde6:7a:7d20:160e::1",
            "interface": "tun0",
            "metric": "1024"
        }
    ],
    "interfaces": [
        {
            "friendly": "lo",
            "id": "lo",
            "name": "lo",
            "description": "lo",
            "type": "Loopback",
            "status": "Unknown",
            "bytes_received": "583064",
            "bytes_sent": "583064",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "127.0.0.1",
                "::1"
            ],
            "gateways": [
                "10.0.2.2"
            ],
            "bind": true
        },
        {
            "friendly": "enp0s3",
            "id": "enp0s3",
            "name": "enp0s3",
            "description": "enp0s3",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "198224",
            "bytes_sent": "103872",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "10.0.2.15",
                "fe80::9f44:6eaa:9398:f43d"
            ],
            "gateways": [
                "10.0.2.2"
            ],
            "bind": true
        },
        {
            "friendly": "tun0",
            "id": "tun0",
            "name": "tun0",
            "description": "tun0",
            "type": "0",
            "status": "Unknown",
            "bytes_received": "25042",
            "bytes_sent": "31670",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "10.26.14.191",
                "fde6:7a:7d20:160e::10bd",
                "fe80::dc83:cd73:592f:b1a5"
            ],
            "gateways": [
                "10.26.14.1",
                "fde6:7a:7d20:160e::1"
            ],
            "bind": true
        }
    ],
    "ipv4-default-gateway": "10.0.2.2",
    "ipv4-default-interface": "enp0s3"
}
----------------------------
ip addr show:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: enp0s3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 08:00:27:10:2e:0d brd ff:ff:ff:ff:ff:ff
    inet 10.0.2.15/24 brd 10.0.2.255 scope global dynamic noprefixroute enp0s3
       valid_lft 85966sec preferred_lft 85966sec
    inet6 fe80::9f44:6eaa:9398:f43d/64 scope link noprefixroute 
       valid_lft forever preferred_lft forever
3: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 100
    link/none 
    inet 10.26.14.191/24 brd 10.26.14.255 scope global tun0
       valid_lft forever preferred_lft forever
    inet6 fde6:7a:7d20:160e::10bd/64 scope global 
       valid_lft forever preferred_lft forever
    inet6 fe80::dc83:cd73:592f:b1a5/64 scope link stable-privacy 
       valid_lft forever preferred_lft forever
----------------------------
ip link show:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: enp0s3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000
    link/ether 08:00:27:10:2e:0d brd ff:ff:ff:ff:ff:ff
3: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN mode DEFAULT group default qlen 100
    link/none
----------------------------
ip -4 route show:

0.0.0.0/1 via 10.26.14.1 dev tun0 
default via 10.0.2.2 dev enp0s3 proto dhcp metric 100 
10.0.2.0/24 dev enp0s3 proto kernel scope link src 10.0.2.15 metric 100 
10.26.14.0/24 dev tun0 proto kernel scope link src 10.26.14.191 
128.0.0.0/1 via 10.26.14.1 dev tun0 
141.98.102.243 via 10.26.14.1 dev tun0 
141.98.102.245 via 10.0.2.2 dev enp0s3
----------------------------
ip -6 route show:

::1 dev lo proto kernel metric 256 pref medium
::/3 dev tun0 metric 1024 pref medium
2001:ac8:20:9a:95b2:21aa:48b5:7069 via fde6:7a:7d20:160e::1 dev tun0 metric 1024 pref medium
2000::/4 dev tun0 metric 1024 pref medium
3000::/4 dev tun0 metric 1024 pref medium
fde6:7a:7d20:160e::/64 dev tun0 proto kernel metric 256 pref medium
fc00::/7 dev tun0 metric 1024 pref medium
fe80::/64 dev enp0s3 proto kernel metric 100 pref medium
fe80::/64 dev tun0 proto kernel metric 256 pref medium



 

Share this post


Link to post

Hm. Noticed something with the interface config and routes. The enp0s3 and lo interfaces share a common gateway address: 10.0.2.2. There are two routes with this: The default route and a special route with the AirVPN server address:

        {
            "address": "0.0.0.0\/0",
            "gateway": "10.0.2.2",
            "interface": "enp0s3",
            "metric": "100"
        }
[…]
        {
            "address": "141.98.102.245",
            "gateway": "10.0.2.2",
            "interface": "lo",
            "metric": "256"
        }

Looks like a NAT interface configuration. Can you try changing this to bridge mode? It will act as a separate device in your network.
I'm guessing there's a firewall or something denying the redirect. Not very familiar with anything Red Hat.

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

I can confirm it's NAT, that is the default Virtualbox network setting.
I can change to bridged, however I still do not get why F32 or other distros with exactly the same Eddie settings do not face this issue.

Share this post


Link to post

here logs with brigded adapter. Connection fails as soon as Eddie checks DNS: got a prompt "DNS error."
 

Eddie System/Environment Report - 21/10/2020 - 12:15 UTC

Eddie version: 2.18.9
Eddie OS build: linux_x64
Eddie architecture: x64
OS type: Linux
OS name: \SKernel \r on an \m (\l)
OS version: Linux localhost.localdomain 5.8.15-301.fc33.x86_64 #1 SMP Thu Oct 15 16:58:06 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
OS architecture: x64
Mono /.Net Framework: 6.8.0.123 (tarball Sat Sep  5 04:49:14 UTC 2020); Framework: v4.0.30319
TUN driver: /dev/net/tun
OpenVPN: 2.4.9 - OpenSSL 1.1.1g FIPS  21 Apr 2020, LZO 2.10 (/usr/sbin/openvpn)
Hummingbird:  ()
SSH: OpenSSH_8.4p1, OpenSSL 1.1.1g FIPS  21 Apr 2020 (/usr/bin/ssh)
SSL: stunnel 5.56 (/usr/bin/stunnel)
curl: 7.71.1 (/usr/bin/curl)
Profile path: /home/f1/.config/eddie/default.profile
Data path: /home/f1/.config/eddie
Application path: /usr/lib/eddie-ui
Executable path: /usr/lib/eddie-ui/eddie-ui.exe
Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
Network Lock Active: Yes, Linux iptables
Connected to VPN: No
Detected DNS: 10.25.110.1, fde6:7a:7d20:156e::1
Test DNS IPv4: Ok
Test DNS IPv6: Ok
Test Ping IPv4: 12312 ms
Test Ping IPv6: 47 ms
Test HTTP IPv4: Ok
Test HTTP IPv6: Ok
Test HTTPS: Ok
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
netlock: True
servers.scoretype: Latency
network.entry.iplayer: ipv4-only

----------------------------
Logs:

. 2020.10.21 14:14:12 - Eddie version: 2.18.9 / linux_x64, System: Linux, Name: \SKernel \r on an \m (\l), Version: Linux localhost.localdomain 5.8.15-301.fc33.x86_64 #1 SMP Thu Oct 15 16:58:06 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 6.8.0.123 (tarball Sat Sep  5 04:49:14 UTC 2020); Framework: v4.0.30319
. 2020.10.21 14:14:12 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
. 2020.10.21 14:14:13 - Raise system privileges
. 2020.10.21 14:14:19 - Profile path: /home/f1/.config/eddie/default.profile
. 2020.10.21 14:14:25 - Reading options from /home/f1/.config/eddie/default.profile
. 2020.10.21 14:14:25 - Tun Driver - /dev/net/tun
. 2020.10.21 14:14:25 - OpenVPN - Version: 2.4.9 - OpenSSL 1.1.1g FIPS  21 Apr 2020, LZO 2.10 (/usr/sbin/openvpn)
. 2020.10.21 14:14:25 - SSH - Version: OpenSSH_8.4p1, OpenSSL 1.1.1g FIPS  21 Apr 2020 (/usr/bin/ssh)
. 2020.10.21 14:14:25 - SSL - Version: stunnel 5.56 (/usr/bin/stunnel)
. 2020.10.21 14:14:25 - curl - Version: 7.71.1 (/usr/bin/curl)
! 2020.10.21 14:14:26 - Activation of Network Lock - Linux iptables
I 2020.10.21 14:14:27 - Ready
. 2020.10.21 14:14:28 - Collect information about AirVPN completed
I 2020.10.21 14:14:40 - Session starting.
I 2020.10.21 14:14:40 - Checking authorization ...
! 2020.10.21 14:14:40 - Connecting to Tucana (Germany, Frankfurt)
. 2020.10.21 14:14:40 - OpenVPN > OpenVPN 2.4.9 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 28 2020
. 2020.10.21 14:14:40 - OpenVPN > library versions: OpenSSL 1.1.1g FIPS  21 Apr 2020, LZO 2.10
. 2020.10.21 14:14:40 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.10.21 14:14:40 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.10.21 14:14:40 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.10.21 14:14:40 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.10.21 14:14:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]178.162.212.216:443
. 2020.10.21 14:14:40 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2020.10.21 14:14:40 - OpenVPN > UDP link local: (not bound)
. 2020.10.21 14:14:40 - OpenVPN > UDP link remote: [AF_INET]178.162.212.216:443
. 2020.10.21 14:14:40 - OpenVPN > TLS: Initial packet from [AF_INET]178.162.212.216:443, sid=a8070873 8f424027
. 2020.10.21 14:14:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.10.21 14:14:40 - OpenVPN > VERIFY KU OK
. 2020.10.21 14:14:40 - OpenVPN > Validating certificate extended key usage
. 2020.10.21 14:14:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.10.21 14:14:40 - OpenVPN > VERIFY EKU OK
. 2020.10.21 14:14:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tucana, emailAddress=info@airvpn.org
. 2020.10.21 14:14:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.10.21 14:14:40 - OpenVPN > [Tucana] Peer Connection Initiated with [AF_INET]178.162.212.216:443
. 2020.10.21 14:14:42 - OpenVPN > SENT CONTROL [Tucana]: 'PUSH_REQUEST' (status=1)
. 2020.10.21 14:14:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.13.206.1,dhcp-option DNS6 fde6:7a:7d20:9ce::1,tun-ipv6,route-gateway 10.13.206.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:9ce::10c7/64 fde6:7a:7d20:9ce::1,ifconfig 10.13.206.201 255.255.255.0,peer-id 1,cipher AES-256-GCM'
. 2020.10.21 14:14:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.10.21 14:14:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.10.21 14:14:42 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.10.21 14:14:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.10.21 14:14:42 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.10.21 14:14:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.10.21 14:14:42 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.10.21 14:14:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.10.21 14:14:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.10.21 14:14:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.10.21 14:14:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.10.21 14:14:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.10.21 14:14:42 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=enp0s3 HWADDR=08:00:27:10:2e:0d
. 2020.10.21 14:14:42 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.10.21 14:14:42 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.10.21 14:14:42 - OpenVPN > TUN/TAP device tun0 opened
. 2020.10.21 14:14:42 - OpenVPN > TUN/TAP TX queue length set to 100
. 2020.10.21 14:14:42 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2020.10.21 14:14:42 - OpenVPN > /sbin/ip addr add dev tun0 10.13.206.201/24 broadcast 10.13.206.255
. 2020.10.21 14:14:42 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:9ce::10c7/64 dev tun0
. 2020.10.21 14:14:47 - OpenVPN > /sbin/ip route add 178.162.212.216/32 via 192.168.0.1
. 2020.10.21 14:14:47 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.13.206.1
. 2020.10.21 14:14:47 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.13.206.1
. 2020.10.21 14:14:47 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:9ce::1 metric -1) dev tun0
. 2020.10.21 14:14:47 - OpenVPN > /sbin/ip -6 route add ::/3 dev tun0
. 2020.10.21 14:14:47 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:9ce::1 metric -1) dev tun0
. 2020.10.21 14:14:47 - OpenVPN > /sbin/ip -6 route add 2000::/4 dev tun0
. 2020.10.21 14:14:47 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:9ce::1 metric -1) dev tun0
. 2020.10.21 14:14:47 - OpenVPN > /sbin/ip -6 route add 3000::/4 dev tun0
. 2020.10.21 14:14:47 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:9ce::1 metric -1) dev tun0
. 2020.10.21 14:14:47 - OpenVPN > /sbin/ip -6 route add fc00::/7 dev tun0
. 2020.10.21 14:14:47 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2020.10.21 14:14:47 - Routes, added a new route, 178.162.212.214 for gateway 10.13.206.1
. 2020.10.21 14:14:47 - Routes, added a new route, 2a00:c98:2050:a02f:dc0e:3cc1:46f0:5eae for gateway fde6:7a:7d20:9ce::1
. 2020.10.21 14:14:47 - Flushing DNS
I 2020.10.21 14:14:47 - Checking route IPv4
I 2020.10.21 14:14:47 - Checking route IPv6
I 2020.10.21 14:14:47 - Checking DNS
. 2020.10.21 14:14:48 - Checking DNS failed:
. 2020.10.21 14:14:48 - Checking DNS (2° try)
. 2020.10.21 14:14:49 - Checking DNS failed:
. 2020.10.21 14:14:49 - Checking DNS (3° try)
. 2020.10.21 14:14:51 - Checking DNS failed:
E 2020.10.21 14:14:51 - Checking DNS failed.
. 2020.10.21 14:14:51 - OpenVPN > Initialization Sequence Completed
! 2020.10.21 14:14:51 - Disconnecting
. 2020.10.21 14:14:51 - Routes, removed a route previously added, 178.162.212.214 for gateway 10.13.206.1
. 2020.10.21 14:14:51 - Routes, removed a route previously added, 2a00:c98:2050:a02f:dc0e:3cc1:46f0:5eae for gateway fde6:7a:7d20:9ce::1
. 2020.10.21 14:14:51 - Sending soft termination signal
. 2020.10.21 14:14:51 - OpenVPN > event_wait : Interrupted system call (code=4)
. 2020.10.21 14:14:51 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.10.21 14:14:56 - OpenVPN > /sbin/ip route del 178.162.212.216/32
. 2020.10.21 14:14:56 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2020.10.21 14:14:56 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2020.10.21 14:14:56 - OpenVPN > delete_route_ipv6(::/3)
. 2020.10.21 14:14:56 - OpenVPN > /sbin/ip -6 route del ::/3 dev tun0
. 2020.10.21 14:14:56 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.10.21 14:14:56 - OpenVPN > /sbin/ip -6 route del 2000::/4 dev tun0
. 2020.10.21 14:14:56 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.10.21 14:14:56 - OpenVPN > /sbin/ip -6 route del 3000::/4 dev tun0
. 2020.10.21 14:14:56 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.10.21 14:14:56 - OpenVPN > /sbin/ip -6 route del fc00::/7 dev tun0
. 2020.10.21 14:14:56 - OpenVPN > Closing TUN/TAP interface
. 2020.10.21 14:14:56 - OpenVPN > /sbin/ip addr del dev tun0 10.13.206.201/24
. 2020.10.21 14:14:56 - OpenVPN > /sbin/ip -6 addr del fde6:7a:7d20:9ce::10c7/64 dev tun0
. 2020.10.21 14:14:56 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.10.21 14:14:56 - Connection terminated.
. 2020.10.21 14:14:56 - DNS of the system restored to original settings (Rename method)
. 2020.10.21 14:14:59 - Waiting for latency tests (39 to go)
. 2020.10.21 14:15:00 - Waiting for latency tests (25 to go)
. 2020.10.21 14:15:02 - Waiting for latency tests (19 to go)
. 2020.10.21 14:15:04 - Waiting for latency tests (18 to go)
. 2020.10.21 14:15:05 - Waiting for latency tests (16 to go)
I 2020.10.21 14:15:06 - Checking authorization ...
! 2020.10.21 14:15:06 - Connecting to Alsephina (Germany, Frankfurt)
. 2020.10.21 14:15:07 - OpenVPN > OpenVPN 2.4.9 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 28 2020
. 2020.10.21 14:15:07 - OpenVPN > library versions: OpenSSL 1.1.1g FIPS  21 Apr 2020, LZO 2.10
. 2020.10.21 14:15:07 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.10.21 14:15:07 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.10.21 14:15:07 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.10.21 14:15:07 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.10.21 14:15:07 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.189:443
. 2020.10.21 14:15:07 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2020.10.21 14:15:07 - OpenVPN > UDP link local: (not bound)
. 2020.10.21 14:15:07 - OpenVPN > UDP link remote: [AF_INET]141.98.102.189:443
. 2020.10.21 14:15:07 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.189:443, sid=862838dd 0c6a46bc
. 2020.10.21 14:15:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.10.21 14:15:07 - OpenVPN > VERIFY KU OK
. 2020.10.21 14:15:07 - OpenVPN > Validating certificate extended key usage
. 2020.10.21 14:15:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.10.21 14:15:07 - OpenVPN > VERIFY EKU OK
. 2020.10.21 14:15:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alsephina, emailAddress=info@airvpn.org
. 2020.10.21 14:15:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.10.21 14:15:07 - OpenVPN > [Alsephina] Peer Connection Initiated with [AF_INET]141.98.102.189:443
. 2020.10.21 14:15:08 - OpenVPN > SENT CONTROL [Alsephina]: 'PUSH_REQUEST' (status=1)
. 2020.10.21 14:15:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.110.1,dhcp-option DNS6 fde6:7a:7d20:156e::1,tun-ipv6,route-gateway 10.25.110.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:156e::1021/64 fde6:7a:7d20:156e::1,ifconfig 10.25.110.35 255.255.255.0,peer-id 2,cipher AES-256-GCM'
. 2020.10.21 14:15:08 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.10.21 14:15:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.10.21 14:15:08 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.10.21 14:15:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.10.21 14:15:08 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.10.21 14:15:08 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.10.21 14:15:08 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.10.21 14:15:08 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.10.21 14:15:08 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.10.21 14:15:08 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.10.21 14:15:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.10.21 14:15:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.10.21 14:15:08 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=enp0s3 HWADDR=08:00:27:10:2e:0d
. 2020.10.21 14:15:08 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.10.21 14:15:08 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.10.21 14:15:08 - OpenVPN > TUN/TAP device tun0 opened
. 2020.10.21 14:15:08 - OpenVPN > TUN/TAP TX queue length set to 100
. 2020.10.21 14:15:08 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2020.10.21 14:15:08 - OpenVPN > /sbin/ip addr add dev tun0 10.25.110.35/24 broadcast 10.25.110.255
. 2020.10.21 14:15:08 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:156e::1021/64 dev tun0
. 2020.10.21 14:15:13 - OpenVPN > /sbin/ip route add 141.98.102.189/32 via 192.168.0.1
. 2020.10.21 14:15:13 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.25.110.1
. 2020.10.21 14:15:13 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.25.110.1
. 2020.10.21 14:15:13 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:156e::1 metric -1) dev tun0
. 2020.10.21 14:15:13 - OpenVPN > /sbin/ip -6 route add ::/3 dev tun0
. 2020.10.21 14:15:13 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:156e::1 metric -1) dev tun0
. 2020.10.21 14:15:13 - OpenVPN > /sbin/ip -6 route add 2000::/4 dev tun0
. 2020.10.21 14:15:13 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:156e::1 metric -1) dev tun0
. 2020.10.21 14:15:13 - OpenVPN > /sbin/ip -6 route add 3000::/4 dev tun0
. 2020.10.21 14:15:13 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:156e::1 metric -1) dev tun0
. 2020.10.21 14:15:13 - OpenVPN > /sbin/ip -6 route add fc00::/7 dev tun0
. 2020.10.21 14:15:13 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2020.10.21 14:15:13 - Routes, added a new route, 141.98.102.187 for gateway 10.25.110.1
. 2020.10.21 14:15:13 - Routes, added a new route, 2001:ac8:20:97:d4c3:f181:d57a:8d19 for gateway fde6:7a:7d20:156e::1
. 2020.10.21 14:15:13 - Flushing DNS
I 2020.10.21 14:15:14 - Checking route IPv4
I 2020.10.21 14:15:14 - Checking route IPv6
I 2020.10.21 14:15:14 - Checking DNS
. 2020.10.21 14:15:14 - Checking DNS failed: irkxqdvkgjpibcijdvxxzefgmzzkiver
. 2020.10.21 14:15:14 - Checking DNS (2° try)
. 2020.10.21 14:15:15 - Checking DNS failed: irkxqdvkgjpibcijdvxxzefgmzzkiver
. 2020.10.21 14:15:15 - Checking DNS (3° try)
. 2020.10.21 14:15:18 - Checking DNS failed: irkxqdvkgjpibcijdvxxzefgmzzkiver
E 2020.10.21 14:15:18 - Checking DNS failed.
. 2020.10.21 14:15:18 - OpenVPN > Initialization Sequence Completed
! 2020.10.21 14:15:18 - Disconnecting
. 2020.10.21 14:15:18 - Routes, removed a route previously added, 141.98.102.187 for gateway 10.25.110.1
. 2020.10.21 14:15:18 - Routes, removed a route previously added, 2001:ac8:20:97:d4c3:f181:d57a:8d19 for gateway fde6:7a:7d20:156e::1
. 2020.10.21 14:15:18 - Sending soft termination signal
. 2020.10.21 14:15:18 - OpenVPN > event_wait : Interrupted system call (code=4)
. 2020.10.21 14:15:18 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2020.10.21 14:15:23 - OpenVPN > /sbin/ip route del 141.98.102.189/32
. 2020.10.21 14:15:23 - OpenVPN > /sbin/ip route del 0.0.0.0/1
. 2020.10.21 14:15:23 - OpenVPN > /sbin/ip route del 128.0.0.0/1
. 2020.10.21 14:15:23 - OpenVPN > delete_route_ipv6(::/3)
. 2020.10.21 14:15:23 - OpenVPN > /sbin/ip -6 route del ::/3 dev tun0
. 2020.10.21 14:15:23 - OpenVPN > delete_route_ipv6(2000::/4)
. 2020.10.21 14:15:23 - OpenVPN > /sbin/ip -6 route del 2000::/4 dev tun0
. 2020.10.21 14:15:23 - OpenVPN > delete_route_ipv6(3000::/4)
. 2020.10.21 14:15:23 - OpenVPN > /sbin/ip -6 route del 3000::/4 dev tun0
. 2020.10.21 14:15:23 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2020.10.21 14:15:23 - OpenVPN > /sbin/ip -6 route del fc00::/7 dev tun0
. 2020.10.21 14:15:23 - OpenVPN > Closing TUN/TAP interface
. 2020.10.21 14:15:23 - OpenVPN > /sbin/ip addr del dev tun0 10.25.110.35/24
. 2020.10.21 14:15:23 - OpenVPN > /sbin/ip -6 addr del fde6:7a:7d20:156e::1021/64 dev tun0
. 2020.10.21 14:15:23 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2020.10.21 14:15:23 - Connection terminated.
. 2020.10.21 14:15:23 - DNS of the system restored to original settings (Rename method)
I 2020.10.21 14:15:26 - Checking authorization ...
! 2020.10.21 14:15:26 - Connecting to Dubhe (Germany, Frankfurt)
. 2020.10.21 14:15:27 - OpenVPN > OpenVPN 2.4.9 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 28 2020
. 2020.10.21 14:15:27 - OpenVPN > library versions: OpenSSL 1.1.1g FIPS  21 Apr 2020, LZO 2.10
. 2020.10.21 14:15:27 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.10.21 14:15:27 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.10.21 14:15:27 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.10.21 14:15:27 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.10.21 14:15:27 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]141.98.102.245:443
. 2020.10.21 14:15:27 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2020.10.21 14:15:27 - OpenVPN > UDP link local: (not bound)
. 2020.10.21 14:15:27 - OpenVPN > UDP link remote: [AF_INET]141.98.102.245:443
. 2020.10.21 14:15:27 - OpenVPN > TLS: Initial packet from [AF_INET]141.98.102.245:443, sid=5989c9d5 67dcbe87
. 2020.10.21 14:15:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2020.10.21 14:15:27 - OpenVPN > VERIFY KU OK
. 2020.10.21 14:15:27 - OpenVPN > Validating certificate extended key usage
. 2020.10.21 14:15:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.10.21 14:15:27 - OpenVPN > VERIFY EKU OK
. 2020.10.21 14:15:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Dubhe, emailAddress=info@airvpn.org
. 2020.10.21 14:15:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2020.10.21 14:15:27 - OpenVPN > [Dubhe] Peer Connection Initiated with [AF_INET]141.98.102.245:443
. 2020.10.21 14:15:28 - OpenVPN > SENT CONTROL [Dubhe]: 'PUSH_REQUEST' (status=1)
. 2020.10.21 14:15:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.26.14.1,dhcp-option DNS6 fde6:7a:7d20:160e::1,tun-ipv6,route-gateway 10.26.14.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:160e::10bd/64 fde6:7a:7d20:160e::1,ifconfig 10.26.14.191 255.255.255.0,peer-id 2,cipher AES-256-GCM'
. 2020.10.21 14:15:28 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2020.10.21 14:15:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.10.21 14:15:28 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.10.21 14:15:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2020.10.21 14:15:28 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.10.21 14:15:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2020.10.21 14:15:28 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.10.21 14:15:28 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.10.21 14:15:28 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.10.21 14:15:28 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.10.21 14:15:28 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.10.21 14:15:28 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.10.21 14:15:28 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=enp0s3 HWADDR=08:00:27:10:2e:0d
. 2020.10.21 14:15:28 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2020.10.21 14:15:28 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2020.10.21 14:15:28 - OpenVPN > TUN/TAP device tun0 opened
. 2020.10.21 14:15:28 - OpenVPN > TUN/TAP TX queue length set to 100
. 2020.10.21 14:15:28 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2020.10.21 14:15:28 - OpenVPN > /sbin/ip addr add dev tun0 10.26.14.191/24 broadcast 10.26.14.255
. 2020.10.21 14:15:28 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:160e::10bd/64 dev tun0
. 2020.10.21 14:15:33 - OpenVPN > /sbin/ip route add 141.98.102.245/32 via 192.168.0.1
. 2020.10.21 14:15:33 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.26.14.1
. 2020.10.21 14:15:33 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.26.14.1
. 2020.10.21 14:15:33 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:160e::1 metric -1) dev tun0
. 2020.10.21 14:15:33 - OpenVPN > /sbin/ip -6 route add ::/3 dev tun0
. 2020.10.21 14:15:33 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:160e::1 metric -1) dev tun0
. 2020.10.21 14:15:33 - OpenVPN > /sbin/ip -6 route add 2000::/4 dev tun0
. 2020.10.21 14:15:33 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:160e::1 metric -1) dev tun0
. 2020.10.21 14:15:33 - OpenVPN > /sbin/ip -6 route add 3000::/4 dev tun0
. 2020.10.21 14:15:33 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:160e::1 metric -1) dev tun0
. 2020.10.21 14:15:33 - OpenVPN > /sbin/ip -6 route add fc00::/7 dev tun0
. 2020.10.21 14:15:33 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2020.10.21 14:15:33 - Routes, added a new route, 141.98.102.243 for gateway 10.26.14.1
. 2020.10.21 14:15:33 - Routes, added a new route, 2001:ac8:20:9a:95b2:21aa:48b5:7069 for gateway fde6:7a:7d20:160e::1
. 2020.10.21 14:15:33 - Flushing DNS
I 2020.10.21 14:15:33 - Checking route IPv4
I 2020.10.21 14:15:34 - Checking route IPv6
I 2020.10.21 14:15:34 - Checking DNS
. 2020.10.21 14:15:34 - Checking DNS failed: adhewclkxlfpwuicvghjzhlumqjlitij
. 2020.10.21 14:15:34 - Checking DNS (2° try)

----------------------------
Network Interfaces and Routes:

{
	"support_ipv4": true,
	"support_ipv6": true,
	"routes": [
		{
			"address": "0.0.0.0\/1",
			"gateway": "10.26.14.1",
			"interface": "tun0"
		},
		{
			"address": "0.0.0.0\/0",
			"gateway": "192.168.0.1",
			"interface": "enp0s3",
			"metric": "100"
		},
		{
			"address": "128.0.0.0\/1",
			"gateway": "10.26.14.1",
			"interface": "tun0"
		},
		{
			"address": "141.98.102.243",
			"gateway": "10.26.14.1",
			"interface": "tun0"
		},
		{
			"address": "141.98.102.245",
			"gateway": "192.168.0.1",
			"interface": "enp0s3"
		},
		{
			"address": "2001:ac8:20:9a:95b2:21aa:48b5:7069",
			"gateway": "fde6:7a:7d20:160e::1",
			"interface": "tun0",
			"metric": "1024"
		}
	],
	"interfaces": [
		{
			"friendly": "lo",
			"id": "lo",
			"name": "lo",
			"description": "lo",
			"type": "Loopback",
			"status": "Unknown",
			"bytes_received": "293689",
			"bytes_sent": "293689",
			"support_ipv4": true,
			"support_ipv6": true,
			"ips": [
				"127.0.0.1",
				"::1"
			],
			"gateways": [],
			"bind": true
		},
		{
			"friendly": "enp0s3",
			"id": "enp0s3",
			"name": "enp0s3",
			"description": "enp0s3",
			"type": "Ethernet",
			"status": "Up",
			"bytes_received": "2897916",
			"bytes_sent": "336387",
			"support_ipv4": true,
			"support_ipv6": true,
			"ips": [
				"192.168.0.123",
				"fe80::9f44:6eaa:9398:f43d"
			],
			"gateways": [
				"192.168.0.1"
			],
			"bind": true
		},
		{
			"friendly": "tun0",
			"id": "tun0",
			"name": "tun0",
			"description": "tun0",
			"type": "0",
			"status": "Unknown",
			"bytes_received": "26142",
			"bytes_sent": "11699",
			"support_ipv4": true,
			"support_ipv6": true,
			"ips": [
				"10.26.14.191",
				"fde6:7a:7d20:160e::10bd",
				"fe80::a106:e5a:a060:386a"
			],
			"gateways": [
				"10.26.14.1",
				"fde6:7a:7d20:160e::1"
			],
			"bind": true
		}
	],
	"ipv4-default-gateway": "192.168.0.1",
	"ipv4-default-interface": "enp0s3"
}
----------------------------
ip addr show:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: enp0s3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 08:00:27:10:2e:0d brd ff:ff:ff:ff:ff:ff
    inet 192.168.0.123/24 brd 192.168.0.255 scope global dynamic noprefixroute enp0s3
       valid_lft 7074sec preferred_lft 7074sec
    inet6 fe80::9f44:6eaa:9398:f43d/64 scope link noprefixroute 
       valid_lft forever preferred_lft forever
5: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 100
    link/none 
    inet 10.26.14.191/24 brd 10.26.14.255 scope global tun0
       valid_lft forever preferred_lft forever
    inet6 fde6:7a:7d20:160e::10bd/64 scope global 
       valid_lft forever preferred_lft forever
    inet6 fe80::a106:e5a:a060:386a/64 scope link stable-privacy 
       valid_lft forever preferred_lft forever
----------------------------
ip link show:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: enp0s3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000
    link/ether 08:00:27:10:2e:0d brd ff:ff:ff:ff:ff:ff
5: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN mode DEFAULT group default qlen 100
    link/none
----------------------------
ip -4 route show:

0.0.0.0/1 via 10.26.14.1 dev tun0 
default via 192.168.0.1 dev enp0s3 proto dhcp metric 100 
10.26.14.0/24 dev tun0 proto kernel scope link src 10.26.14.191 
128.0.0.0/1 via 10.26.14.1 dev tun0 
141.98.102.243 via 10.26.14.1 dev tun0 
141.98.102.245 via 192.168.0.1 dev enp0s3 
192.168.0.0/24 dev enp0s3 proto kernel scope link src 192.168.0.123 metric 100
----------------------------
ip -6 route show:

::1 dev lo proto kernel metric 256 pref medium
::/3 dev tun0 metric 1024 pref medium
2001:ac8:20:9a:95b2:21aa:48b5:7069 via fde6:7a:7d20:160e::1 dev tun0 metric 1024 pref medium
2000::/4 dev tun0 metric 1024 pref medium
3000::/4 dev tun0 metric 1024 pref medium
fde6:7a:7d20:160e::/64 dev tun0 proto kernel metric 256 pref medium
fc00::/7 dev tun0 metric 1024 pref medium
fe80::/64 dev enp0s3 proto kernel metric 100 pref medium
fe80::/64 dev tun0 proto kernel metric 256 pref medium

Share this post


Link to post

hummingbird logs with NAT network.
 

Hummingbird - AirVPN OpenVPN 3 Client 1.1.0 - 23 June 2020

Wed Oct 21 15:20:04.644 2020 System and service manager in use is systemd
Wed Oct 21 15:20:04.695 2020 Starting thread
Wed Oct 21 15:20:04.695 2020 OpenVPN core 3.6.4 AirVPN linux x86_64 64-bit
Wed Oct 21 15:20:04.696 2020 Frame=512/2048/512 mssfix-ctrl=1250
Wed Oct 21 15:20:04.696 2020 UNUSED OPTIONS
3 [resolv-retry] [infinite] 
4 [nobind] 
5 [persist-key] 
6 [persist-tun] 
7 [auth-nocache] 
8 [route-delay] [5] 
9 [verb] [3] 
10 [explicit-exit-notify] [5] 
Wed Oct 21 15:20:04.697 2020 EVENT: RESOLVE
Wed Oct 21 15:20:04.697 2020 WARNING: NetworkManager is running on this system and may interfere with DNS management and cause DNS leaks
Wed Oct 21 15:20:04.697 2020 WARNING: systemd-resolved is running on this system and may interfere with DNS management and cause DNS leaks
Wed Oct 21 15:20:04.697 2020 Network filter and lock is using iptables-legacy
Wed Oct 21 15:20:04.705 2020 Successfully loaded kernel module iptable_filter
Wed Oct 21 15:20:04.721 2020 Successfully loaded kernel module iptable_nat
Wed Oct 21 15:20:04.724 2020 Successfully loaded kernel module iptable_mangle
Wed Oct 21 15:20:04.729 2020 Successfully loaded kernel module iptable_security
Wed Oct 21 15:20:04.736 2020 Successfully loaded kernel module iptable_raw
Wed Oct 21 15:20:04.744 2020 Successfully loaded kernel module ip6table_filter
Wed Oct 21 15:20:04.757 2020 Successfully loaded kernel module ip6table_nat
Wed Oct 21 15:20:04.760 2020 Successfully loaded kernel module ip6table_mangle
Wed Oct 21 15:20:04.763 2020 Successfully loaded kernel module ip6table_security
Wed Oct 21 15:20:04.767 2020 Successfully loaded kernel module ip6table_raw
Wed Oct 21 15:20:04.767 2020 WARNING: firewalld is running on this system and may interfere with network filter and lock
Wed Oct 21 15:20:04.778 2020 Network filter successfully initialized
Wed Oct 21 15:20:04.778 2020 Local IPv4 address 10.0.2.15
Wed Oct 21 15:20:04.778 2020 Local IPv6 address fe80::9f44:6eaa:9398:f43d
Wed Oct 21 15:20:04.778 2020 Local interface enp0s3
Wed Oct 21 15:20:04.778 2020 Setting up network filter and lock
Wed Oct 21 15:20:04.778 2020 Allowing system DNS 192.168.0.161 to pass through the network filter
Wed Oct 21 15:20:04.778 2020 Adding IPv4 server 185.189.112.10 to network filter
Wed Oct 21 15:20:04.886 2020 Network filter and lock successfully activated
Wed Oct 21 15:20:04.886 2020 Contacting 185.189.112.10:443 via UDP
Wed Oct 21 15:20:04.886 2020 EVENT: WAIT
Wed Oct 21 15:20:04.886 2020 net_route_best_gw query IPv4: 185.189.112.10/32
Wed Oct 21 15:20:04.886 2020 sitnl_route_best_gw result: via 10.0.2.2 dev enp0s3
Wed Oct 21 15:20:04.886 2020 net_route_add: 185.189.112.10/32 via 10.0.2.2 dev enp0s3 table 0 metric 0
Wed Oct 21 15:20:04.886 2020 Wed Oct 21 15:20:04.886 2020 Connecting to [185.189.112.10]:443 (185.189.112.10) via UDPv4
Wed Oct 21 15:20:04.909 2020 EVENT: CONNECTING
Wed Oct 21 15:20:04.909 2020 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
Wed Oct 21 15:20:04.909 2020 Peer Info:
IV_VER=3.6.4 AirVPN
IV_PLAT=linux
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
IV_LZO_STUB=1
IV_COMP_STUB=1
IV_COMP_STUBv2=1
UV_IPV6=yes
IV_GUI_VER=Hummingbird - AirVPN OpenVPN 3 Client 1.1.0
IV_SSL=mbed TLS 2.16.6

Wed Oct 21 15:20:04.970 2020 VERIFY OK : depth=1
cert. version     : 3
serial number     : 8C:D8:43:EF:E4:5F:20:03
issuer name       : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

Wed Oct 21 15:20:04.970 2020 VERIFY OK : depth=0
cert. version     : 3
serial number     : 24
issuer name       : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Errai, emailAddress=info@airvpn.org
issued  on        : 2016-12-02 16:47:22
expires on        : 2026-11-30 16:47:22
signed using      : RSA with SHA-512
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage         : Digital Signature, Key Encipherment
ext key usage     : TLS Web Server Authentication

Wed Oct 21 15:20:05.195 2020 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
Wed Oct 21 15:20:05.196 2020 Session is ACTIVE
Wed Oct 21 15:20:05.196 2020 EVENT: GET_CONFIG
Wed Oct 21 15:20:05.196 2020 Sending PUSH_REQUEST to server...
Wed Oct 21 15:20:05.297 2020 OPTIONS:
0 [comp-lzo] [no] 
1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 
2 [dhcp-option] [DNS] [10.16.172.1] 
3 [dhcp-option] [DNS6] [fde6:7a:7d20:cac::1] 
4 [tun-ipv6] 
5 [route-gateway] [10.16.172.1] 
6 [topology] [subnet] 
7 [ping] [10] 
8 [ping-restart] [60] 
9 [ifconfig-ipv6] [fde6:7a:7d20:cac::104b/64] [fde6:7a:7d20:cac::1] 
10 [ifconfig] [10.16.172.77] [255.255.255.0] 
11 [peer-id] [6] 
12 [cipher] [AES-256-GCM] 

Wed Oct 21 15:20:05.297 2020 PROTOCOL OPTIONS:
  cipher: AES-256-GCM
  digest: NONE
  ncp enabled: yes
  compress: LZO_STUB
  peer ID: 6
Wed Oct 21 15:20:05.297 2020 EVENT: ASSIGN_IP
Wed Oct 21 15:20:05.298 2020 VPN Server has pushed IPv4 DNS server 10.16.172.1
Wed Oct 21 15:20:05.306 2020 Setting pushed IPv4 DNS server 10.16.172.1 in resolv.conf
Wed Oct 21 15:20:05.306 2020 VPN Server has pushed IPv6 DNS server fde6:7a:7d20:cac::1
Wed Oct 21 15:20:05.311 2020 Setting pushed IPv6 DNS server fde6:7a:7d20:cac::1 in resolv.conf
Wed Oct 21 15:20:05.329 2020 net_iface_mtu_set: mtu 1500 for tun0
Wed Oct 21 15:20:05.329 2020 net_iface_up: set tun0 up
Wed Oct 21 15:20:05.329 2020 net_addr_add: 10.16.172.77/24 brd 10.16.172.255 dev tun0
Wed Oct 21 15:20:05.329 2020 net_addr_add: fde6:7a:7d20:cac::104b/64 dev tun0
Wed Oct 21 15:20:05.329 2020 net_route_add: 0.0.0.0/1 via 10.16.172.1 dev tun0 table 0 metric 0
Wed Oct 21 15:20:05.329 2020 net_route_add: 128.0.0.0/1 via 10.16.172.1 dev tun0 table 0 metric 0
Wed Oct 21 15:20:05.329 2020 net_route_add: ::/1 via fde6:7a:7d20:cac::1 dev tun0 table 0 metric 0
Wed Oct 21 15:20:05.329 2020 net_route_add: 8000::/1 via fde6:7a:7d20:cac::1 dev tun0 table 0 metric 0
Wed Oct 21 15:20:05.329 2020 Connected via tun
Wed Oct 21 15:20:05.329 2020 LZO-ASYM init swap=0 asym=1
Wed Oct 21 15:20:05.329 2020 Comp-stub init swap=0
Wed Oct 21 15:20:05.329 2020 EVENT: CONNECTED 185.189.112.10:443 (185.189.112.10) via /UDPv4 on tun/10.16.172.77/fde6:7a:7d20:cac::104b gw=[10.16.172.1/fde6:7a:7d20:cac::1]
Wed Oct 21 15:20:05.329 2020 Server has pushed its own DNS. Removing system DNS from network filter.
Wed Oct 21 15:20:05.334 2020 System DNS 192.168.0.161 is now rejected by the network filter
^Creceived stop signal 2
Wed Oct 21 15:20:16.803 2020 net_route_del: 8000::/1 via fde6:7a:7d20:cac::1 dev tun0 table 0 metric 0
Wed Oct 21 15:20:16.804 2020 net_route_del: ::/1 via fde6:7a:7d20:cac::1 dev tun0 table 0 metric 0
Wed Oct 21 15:20:16.804 2020 net_route_del: 128.0.0.0/1 via 10.16.172.1 dev tun0 table 0 metric 0
Wed Oct 21 15:20:16.804 2020 net_route_del: 0.0.0.0/1 via 10.16.172.1 dev tun0 table 0 metric 0
Wed Oct 21 15:20:16.804 2020 net_addr_del: fde6:7a:7d20:cac::104b/64 dev tun0
Wed Oct 21 15:20:16.804 2020 net_addr_del: 10.16.172.77/24 dev tun0
Wed Oct 21 15:20:16.805 2020 net_iface_mtu_set: mtu 1500 for tun0
Wed Oct 21 15:20:16.805 2020 net_iface_up: set tun0 down
Wed Oct 21 15:20:16.806 2020 net_route_del: 185.189.112.10/32 via 10.0.2.2 dev enp0s3 table 0 metric 0
Wed Oct 21 15:20:16.806 2020 Wed Oct 21 15:20:16.819 2020 EVENT: DISCONNECTED
Wed Oct 21 15:20:16.820 2020 Successfully restored DNS settings
Wed Oct 21 15:20:16.901 2020 Network filter successfully restored
Wed Oct 21 15:20:16.901 2020 Thread finished
STATS:
  BYTES_IN : 4797
  BYTES_OUT : 7528
  PACKETS_IN : 13
  PACKETS_OUT : 29
  TUN_BYTES_IN : 2895
  TUN_PACKETS_IN : 16
 

Share this post


Link to post

Solved!!

Thanks to @Staff for the solution provided.

Disabling: 
systemd-resolved 

fixed it. Fedora33 ships with systemd-resolved enabled by default, that was the reason why with other distros I had not this problem.

Share this post


Link to post
Guest
This topic is now closed to further replies.

×
×
  • Create New...