Staff 8634 Posted ... Hello! We're very glad to introduce a new software suite for Linux. The suite includes the well known Hummingbird software, updated to the latest OpenVPN AirVPN library, and introduces for the first time a D-Bus controlled, real daemon, Bluetit, as well as a command line client, Goldcrest, to interact with Bluetit. New architecture The client-daemon architecture we introduce for the first time in our software offers a more robust security model and provides system administrators with a fine-grained, very flexible access control. Bluetit is fully integrated with AirVPN. The daemon is accessed through a D-Bus interface by providing specific methods and interface in order to give full support to OpenVPN connection and AirVPN functionality, including - but not limited to - quick automatic connection to the best AirVPN server for any specific location as well as any AirVPN server or country. Connection during system bootstrap is fully supported as well. New OpenVPN 3 library features Hummingbird and Bluetit are linked against a new version of our OpenVPN 3 library which supports directive data-ciphers: it can be used consistently with OpenVPN 2.5 syntax in OpenVPN profiles. The directive allows OpenVPN 3 based software to negotiate a common Data Channel cipher with the OpenVPN server,, updating therefore our library to ncp-like negotiation with OpenVPN 2 branch. Hummingbird and Bluetit are already linked against the new library version, while Eddie Android edition will be updated in the near future. The new library also includes a different handling of IV_CIPHERS variable, fixing OpenVPN main branch issues which caused a plethora of problems with OpenVPN 2.5. The implementation, at the same time, takes care of full backward compatibility with OpenVPN versions older than 2.5.ncp-disable directive, which to date has never been implemented in the main branch, is still supported, in order to further enhance backward compatibility with both OpenVPN profiles and servers, as well as connection flexibility with servers running older than 2.5 OpenVPN versions. Please note that if you enforce a specific Data Channel cipher by means of Bluetit configuration file, Hummingbird line option, or Goldcrest configuration file and/or line option, the enforced Data Channel cipher will override data-ciphers profile directive. Changelog 3.6.6 AirVPN by ProMIND - [ProMIND] [2020/11/02] openvpn/ssl/proto.hpp: IV_CIPHERS is set to the overridden cipher only (both from client and/or OpenVPN profile) in order to properly work with OpenVPN 2.5 IV_CIPHERS specifications. The old method of cipher overriding by means of negotiable crypto parameters is still supported in order to maintain compatibility with OpenVPN < 2.5.0 - [ProMIND] [2020/11/24] added "data-ciphers" directive to profile config .ovpn files in order to comply to OpenVPN 2.5 negotiable data cipher specifications. In case "data-ciphers" is found in the .ovpn files IV_CIPHERS is assigned to the algorithms found in "data-ciphers". In this specific case, "cipher" directive is used as a fallback cipher and, if not already specified in "data-ciphers", is appended to IV_CIPHERS Notes on systemd-resolved In Fedora 33 systemd-resolved comes pre-configured to work in "on-link" mode and network-manager works together with it. This very peculiar, Windows-like setup kills Linux global DNS handling, causing those DNS leaks which previously occurred only on Windows. Hummingbird and Bluetit take care of preventing the brand new DNS leaks caused by such a setup. Also note that systemd-resolved comes pre-configured with fallback DNS (Google DNS is a systemd-resolved default fallback DNS, smart choices pile up!) which will be queried if each interface DNS server fails some resolution. In such a case, if and only if you have Network Lock enabled will DNS leaks be prevented. Supported systems The suite is currently available for Linux x86-64, i686 (32 bit distributions), arm7l (for example Raspbian and other ARM 32 bit based systems) and aarch64 (ARM 64 bit). AirVPN Suite is free and open source software licensed under GPLv3. Overview and main features AirVPN’s free and open source OpenVPN 3 suite based on AirVPN’s OpenVPN 3 library fork Version 1.0.0 - Relase date 7 January 2021 Bluetit: lightweight D-Bus controlled system daemon providing full connectivity to AirVPN servers and generic OpenVPN servers. Ability to connect the system to AirVPN during the bootstrap. Goldcrest: Bluetit client, allowing full integration with AirVPN servers, users, keys, profiles as well as generic OpenVPN servers Hummingbird: lightweight and standalone client for generic OpenVPN server connection Linux i686, x86-64, arm7l and arm64 (Raspberry) support Full integration with systemd, SysVStyle-init and chkconfig No heavy framework required, no GUI Tiny RAM footprint Lightning fast Based on OpenVPN 3 library fork by AirVPN version 3.6.6 with tons of critical bug fixes from the main branch, new cipher support and never seen before features ChaCha20-Poly1305 cipher support on both Control and Data Channel providing great performance boost on ARM, Raspberry PI and any Linux based platform not supporting AES-NI. Note: ChaCha20 support for Android had been already implemented in our free and open source Eddie Android edition Robust leaks prevention through Network Lock based either on iptables, nftables or pf through automatic detection Proper handling of DNS push by VPN servers, working with resolv.conf as well as any operational mode of systemd-resolved additional features User documentation (*) and source code: https://gitlab.com/AirVPN/AirVPN-Suite (*) Developer documentation to create custom software clients for Bluetit will be published in the near future. Download links: Linux x86-64: https://eddie.website/repository/AirVPN-Suite/1.0/AirVPN-Suite-x86_64-1.0.0.tar.gz Linux x-86-64 sha512 check file: https://eddie.website/repository/AirVPN-Suite/1.0/AirVPN-Suite-aarch64-1.0.0.tar.gz.sha512 Linux i686: https://eddie.website/repository/AirVPN-Suite/1.0/AirVPN-Suite-i686-1.0.0.tar.gz Linux i686 sha512 check file: https://eddie.website/repository/AirVPN-Suite/1.0/AirVPN-Suite-i686-1.0.0.tar.gz.sha512 Linux arm7l: https://eddie.website/repository/AirVPN-Suite/1.0/AirVPN-Suite-armv7l-1.0.0.tar.gz Linux arm7l sha512 check file: https://eddie.website/repository/AirVPN-Suite/1.0/AirVPN-Suite-armv7l-1.0.0.tar.gz.sha512 Linux aarch64: https://eddie.website/repository/AirVPN-Suite/1.0/AirVPN-Suite-aarch64-1.0.0.tar.gz Linux aarch64 sha512 check file: https://eddie.website/repository/AirVPN-Suite/1.0/AirVPN-Suite-aarch64-1.0.0.tar.gz.sha512 Kind regards AirVPN Staff 2 colorman and codeglitch reacted to this Quote Share this post Link to post
6gh54F4 0 Posted ... When trying to install using: $ sudo sh ./install.sh ERROR: D-Bus is not properly configured or not available Installation aborted OS: Arch Linux x86_64 Kernel: 5.10.6-arch1-1 I'm also using NetworkManager. Quote Share this post Link to post
Staff 8634 Posted ... @6gh54F4 Hello and thank you for your choice! In order to have the suite properly run, you need to install and configure the whole D-Bus infrastructure The error message "ERROR: D-Bus is not properly configured or not available " is caused by the fact that D-Bus is not properly configured or installed. If it's not installed, please install it. If it's installed, please make sure that it's active and running: sudo systemctl enable dbus.service sudo systemctl start dbus.service https://wiki.archlinux.org/index.php/D-Bus If D-Bus is already running but the problem persists, please re-contact us. Kind regards Quote Share this post Link to post
6gh54F4 0 Posted ... (edited) Ok so it says D-Bus is ACTIVE (running) ...but it has error msgs: Jan 15 08:03:14 desktop dbus-daemon[485]: [system] Activation via systemd failed for unit 'dbus-org.freedesktop.home1.service': Unit dbus-org.freedesktop.home1.service n> If I run $ sudo systemctl enable dbus.service: "The unit files have no installation config (WantedBy=, RequiredBy=, Also=, Alias= settings in the [Install] section, and DefaultInstance= for template units). This means they are not meant to be enabled using systemctl." Edited ... by 6gh54F4 Quote Share this post Link to post
airvpnclient 12 Posted ... Cool! Works perfectly on OSMC media box for Rpi. I see there is now a declaration in the bluetit run control file to bring up the vpn, firewall, dns on boot. Yay! With hummingbird, I had recently encountered a problem that --recover-network options would not solve. Apparently it did something NOT GOOD that persisted, so I thought I'd check on the status of the AirVPN Suite just in time to test 1.0 (beta). Installing the Suite was a breeze following the excellent documentation on GitLab (not GitHub, thank you very much). It brought the server to a secure state on boot as required. Great work. In the interest of the project, here is some data: Readily fills a 15/10 pipe: https://www.speedtest.net/result/c/7b37a1b6-f19e-45ad-b49d-3acee84bb148 While not over-stressing the server: Below find the journalctl |grep bluetit output on first boot after installing AirVPN Suite 1.0 on this rpi media box: System: Host: osmc Kernel: 4.19.122-2-osmc armv7l bits: 32 Console: N/A Distro: OSMC 2020.11-1 November 2020 Machine: Type: ARM Device System: Raspberry Pi 2 Model B Rev 1.1 details: BCM2835 rev: a21041 serial: ****************** CPU: Topology: Quad Core model: ARMv7 v7l variant: cortex-a7 bits: 32 type: MCP Speed: 900 MHz min/max: 600/900 MHz Core speeds (MHz): 1: 900 2: 900 3: 900 4: 900 Here is the log dump: Jan 14 20:49:57 osmc bluetit[310]: Starting Bluetit - AirVPN OpenVPN 3 Service 1.0.0 - 7 January 2021 Jan 14 20:49:57 osmc bluetit[310]: OpenVPN core 3.6.6 AirVPN linux arm 32-bit Jan 14 20:49:57 osmc bluetit[310]: Copyright (C) 2012-2020 OpenVPN Inc. All rights reserved. Jan 14 20:49:57 osmc bluetit[374]: Bluetit daemon started with PID 374 Jan 14 20:49:57 osmc bluetit[374]: Successfully connected to D-Bus Jan 14 20:49:57 osmc bluetit[374]: Reading run control directives from file /etc/airvpn/bluetit.rc Jan 14 20:49:57 osmc bluetit[374]: IPv6 is not available in this system Jan 14 20:49:57 osmc bluetit[374]: System country set to ca by Bluetit policy. Jan 14 20:49:57 osmc bluetit[374]: Bluetit successfully initialized and ready Jan 14 20:49:58 osmc bluetit[374]: Starting AirVPN boot connection Jan 14 20:49:58 osmc bluetit[374]: AirVPN Manifest updater thread started Jan 14 20:49:58 osmc bluetit[374]: Waiting for a valid AirVPN Manifest to be available Jan 14 20:49:58 osmc bluetit[374]: AirVPN Manifest update interval is 15 minutes Jan 14 20:49:58 osmc bluetit[374]: Updating AirVPN Manifest Jan 14 20:49:59 osmc bluetit[374]: AirVPN Manifest successfully retrieved from server Jan 14 20:49:59 osmc bluetit[374]: Logging in AirVPN user airvpnclient Jan 14 20:49:59 osmc bluetit[374]: AirVPN login error: Login error Jan 14 20:49:59 osmc bluetit[374]: ERROR: AirVPN login failed for user airvpnclient Jan 14 21:05:11 osmc bluetit[374]: Updating AirVPN Manifest Jan 14 21:05:12 osmc bluetit[374]: AirVPN Manifest successfully retrieved from server Jan 14 21:12:12 osmc sudo[901]: osmc : TTY=pts/0 ; PWD=/home/osmc ; USER=root ; COMMAND=/usr/bin/nano /etc/airvpn/bluetit.rc Jan 14 21:13:48 osmc bluetit[374]: Received SIGTERM signal. Terminating Bluetit. Jan 14 21:13:48 osmc bluetit[374]: Received SIGTERM signal. Terminating Bluetit. Jan 14 21:13:48 osmc bluetit[374]: ERROR: Manifest Updater Thread (future:2): std::future_error: Promise already satisfied Jan 14 21:13:48 osmc systemd[1]: bluetit.service: Main process exited, code=killed, status=6/ABRT Jan 14 21:13:48 osmc systemd[1]: bluetit.service: Failed with result 'signal'. Jan 14 21:13:48 osmc bluetit[937]: Starting Bluetit - AirVPN OpenVPN 3 Service 1.0.0 - 7 January 2021 Jan 14 21:13:48 osmc bluetit[937]: OpenVPN core 3.6.6 AirVPN linux arm 32-bit Jan 14 21:13:48 osmc bluetit[937]: Copyright (C) 2012-2020 OpenVPN Inc. All rights reserved. Jan 14 21:13:48 osmc bluetit[940]: Bluetit daemon started with PID 940 Jan 14 21:13:48 osmc bluetit[940]: Successfully connected to D-Bus Jan 14 21:13:48 osmc bluetit[940]: Reading run control directives from file /etc/airvpn/bluetit.rc Jan 14 21:13:48 osmc bluetit[940]: IPv6 is not available in this system Jan 14 21:13:48 osmc bluetit[940]: System country set to ca by Bluetit policy. Jan 14 21:13:48 osmc bluetit[940]: Bluetit successfully initialized and ready Jan 14 21:13:48 osmc bluetit[940]: Starting AirVPN boot connection Jan 14 21:13:48 osmc bluetit[940]: AirVPN Manifest updater thread started Jan 14 21:13:48 osmc bluetit[940]: AirVPN Manifest update interval is 15 minutes Jan 14 21:13:48 osmc bluetit[940]: Updating AirVPN Manifest Jan 14 21:13:48 osmc bluetit[940]: Waiting for a valid AirVPN Manifest to be available Jan 14 21:13:50 osmc bluetit[940]: AirVPN Manifest successfully retrieved from server Jan 14 21:13:50 osmc bluetit[940]: Logging in AirVPN user airvpnclient Jan 14 21:13:51 osmc bluetit[940]: User country set to ca by Bluetit policy. Jan 14 21:13:51 osmc bluetit[940]: AirVPN user airvpnclient successfully logged in Jan 14 21:13:51 osmc bluetit[940]: Selected user key: Default Jan 14 21:13:51 osmc bluetit[940]: Starting connection to currently best AirVPN server in Canada Jan 14 21:13:51 osmc bluetit[940]: OpenVPN3 client successfully created and initialized. Jan 14 21:13:51 osmc bluetit[940]: TUN persistence is enabled. Jan 14 21:13:51 osmc bluetit[940]: Successfully set OpenVPN3 client configuration Jan 14 21:13:51 osmc bluetit[940]: Starting OpenVPN3 connection thread Jan 14 21:13:51 osmc bluetit[940]: OpenVPN core 3.6.6 AirVPN linux arm 32-bit Jan 14 21:13:51 osmc bluetit[940]: Connection statistics updater thread started Jan 14 21:13:51 osmc bluetit[940]: Frame=512/2048/512 mssfix-ctrl=1250 Jan 14 21:13:51 osmc bluetit[940]: UNUSED OPTIONS Jan 14 21:13:51 osmc bluetit[940]: EVENT: RESOLVE Jan 14 21:13:51 osmc bluetit[940]: Network filter and lock is using iptables-legacy Jan 14 21:13:51 osmc bluetit[940]: Successfully loaded kernel module iptable_filter Jan 14 21:13:51 osmc bluetit[940]: Successfully loaded kernel module iptable_nat Jan 14 21:13:51 osmc bluetit[940]: Successfully loaded kernel module iptable_mangle Jan 14 21:13:51 osmc bluetit[940]: WARNING: Kernel module iptable_security not found. (-2) Jan 14 21:13:51 osmc bluetit[940]: Successfully loaded kernel module iptable_raw Jan 14 21:13:51 osmc bluetit[940]: Successfully loaded kernel module ip6table_filter Jan 14 21:13:51 osmc bluetit[940]: WARNING: Kernel module ip6table_nat not found. (-2) Jan 14 21:13:52 osmc bluetit[940]: Successfully loaded kernel module ip6table_mangle Jan 14 21:13:52 osmc bluetit[940]: WARNING: Kernel module ip6table_security not found. (-2) Jan 14 21:13:52 osmc bluetit[940]: Successfully loaded kernel module ip6table_raw Jan 14 21:13:52 osmc bluetit[940]: Network filter successfully initialized Jan 14 21:13:52 osmc bluetit[940]: Local IPv4 address 192.168.1.30 Jan 14 21:13:52 osmc bluetit[940]: Local interface eth0 Jan 14 21:13:52 osmc bluetit[940]: Setting up network filter and lock Jan 14 21:13:52 osmc bluetit[940]: Allowing system DNS 192.168.1.1 to pass through the network filter Jan 14 21:13:57 osmc bluetit[940]: Resolved server ca3.vpn.airdns.org into IPv4 184.75.214.165 Jan 14 21:13:57 osmc bluetit[940]: Adding IPv4 server 184.75.214.165 to network filter Jan 14 21:13:57 osmc bluetit[940]: ERROR: Cannot activate network filter and lock Jan 14 21:13:57 osmc bluetit[940]: Contacting 184.75.214.165:443 via TCPv4 Jan 14 21:13:57 osmc bluetit[940]: EVENT: WAIT Jan 14 21:13:57 osmc bluetit[940]: net_route_best_gw query IPv4: 184.75.214.165/32 Jan 14 21:13:57 osmc bluetit[940]: sitnl_route_best_gw result: via 192.168.1.1 dev eth0 Jan 14 21:13:57 osmc bluetit[940]: net_route_add: 184.75.214.165/32 via 192.168.1.1 dev eth0 table 0 metric 0 Jan 14 21:13:57 osmc bluetit[940]: Connecting to [ca3.vpn.airdns.org]:443 (184.75.214.165) via TCPv4 Jan 14 21:13:57 osmc bluetit[940]: EVENT: CONNECTING Jan 14 21:13:57 osmc bluetit[940]: Tunnel Options:V4,dev-type tun,link-mtu 1524,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client Jan 14 21:13:57 osmc bluetit[940]: Peer Info: Jan 14 21:13:57 osmc bluetit[940]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Jan 14 21:13:57 osmc bluetit[940]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Cephei/emailAddress=info@airvpn.org, signature: RSA-SHA512 Jan 14 21:13:58 osmc bluetit[940]: SSL Handshake: peer certificate: CN=Cephei, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Jan 14 21:13:58 osmc bluetit[940]: Session is ACTIVE Jan 14 21:13:58 osmc bluetit[940]: EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Jan 14 21:13:58 osmc bluetit[940]: EVENT: GET_CONFIG Jan 14 21:13:58 osmc bluetit[940]: Sending PUSH_REQUEST to server... Jan 14 21:13:58 osmc bluetit[940]: OPTIONS: Jan 14 21:13:58 osmc bluetit[940]: PROTOCOL OPTIONS: Jan 14 21:13:58 osmc bluetit[940]: EVENT: ASSIGN_IP Jan 14 21:13:58 osmc bluetit[940]: VPN Server has pushed IPv4 DNS server 10.13.115.1 Jan 14 21:13:58 osmc bluetit[940]: Setting pushed IPv4 DNS server 10.13.115.1 in resolv.conf Jan 14 21:13:58 osmc bluetit[940]: net_iface_mtu_set: mtu 1500 for tun0 Jan 14 21:13:58 osmc bluetit[940]: net_iface_up: set tun0 up Jan 14 21:13:58 osmc bluetit[940]: net_addr_add: 10.13.115.14/24 brd 10.13.115.255 dev tun0 Jan 14 21:13:58 osmc bluetit[940]: net_route_add: 0.0.0.0/1 via 10.13.115.1 dev tun0 table 0 metric 0 Jan 14 21:13:58 osmc bluetit[940]: net_route_add: 128.0.0.0/1 via 10.13.115.1 dev tun0 table 0 metric 0 Jan 14 21:13:58 osmc bluetit[940]: TunPersist: saving tun context: Jan 14 21:13:58 osmc bluetit[940]: Connected via tun Jan 14 21:13:58 osmc bluetit[940]: LZO-ASYM init swap=0 asym=1 Jan 14 21:13:58 osmc bluetit[940]: Comp-stub init swap=0 Jan 14 21:13:58 osmc bluetit[940]: EVENT: CONNECTED ca3.vpn.airdns.org:443 (184.75.214.165) via /TCPv4 on tun/10.13.115.14/ gw=[10.13.115.1/] Jan 14 21:13:58 osmc bluetit[940]: Connected to currently best AirVPN server in Canada Jan 14 21:13:58 osmc bluetit[940]: Server has pushed its own DNS. Removing system DNS from network filter. Jan 14 21:13:58 osmc bluetit[940]: System DNS 192.168.1.1 is now rejected by the network filter Jan 14 21:28:50 osmc bluetit[940]: Updating AirVPN Manifest Jan 14 21:28:52 osmc bluetit[940]: AirVPN Manifest successfully retrieved from server Jan 14 21:43:52 osmc bluetit[940]: Updating AirVPN Manifest Jan 14 21:44:06 osmc bluetit[940]: AirVPN Manifest successfully retrieved from server Quote Share this post Link to post
Staff 8634 Posted ... @airvpnclient Hello! Thank you for your feedback, we're very pleased to read it. However, we have found a problem in you log, unfortunately: Jan 14 21:13:57 osmc bluetit[940]: ERROR: Cannot activate network filter and lock We would like to investigate. Can you please give us your system iptables version? Kind regards Quote Share this post Link to post
airvpnclient 12 Posted ... You are welcome. root@osmc:/home/osmc# sudo iptables -h iptables v1.8.2 ... Quote Share this post Link to post
airvpnclient 12 Posted ... (edited) Rebooted running system and it came back up in a vulnerable state. - NOT GOOD since my torrent client did come up and start under the Eye of Sauron. osmc@osmc:~$ sudo goldcrest --bluetit-status 2021-01-15 09:08:29 Reading run control directives from file /root/.config/goldcrest.rc Goldcrest 1.0.0 - 7 January 2021 2021-01-15 09:08:29 Bluetit - AirVPN OpenVPN 3 Service 1.0.0 - 7 January 2021 2021-01-15 09:08:29 OpenVPN core 3.6.6 AirVPN linux arm 32-bit 2021-01-15 09:08:29 It seems Bluetit did not exit gracefully or has been killed. Your system may not be working properly and your network connection may not work as expected. To recover your network settings, run this program again and use the "--recover-network" option. # here is the associated journalctl|grep bluetit output from the reboot: osmc@osmc:~$ journalctl |grep bluetit Jan 15 09:01:48 osmc bluetit[298]: Starting Bluetit - AirVPN OpenVPN 3 Service 1.0.0 - 7 January 2021 Jan 15 09:01:48 osmc bluetit[298]: OpenVPN core 3.6.6 AirVPN linux arm 32-bit Jan 15 09:01:48 osmc bluetit[298]: Copyright (C) 2012-2020 OpenVPN Inc. All rights reserved. Jan 15 09:01:48 osmc bluetit[372]: Bluetit daemon started with PID 372 Jan 15 09:01:48 osmc bluetit[372]: Successfully connected to D-Bus Jan 15 09:01:48 osmc bluetit[372]: Reading run control directives from file /etc/airvpn/bluetit.rc Jan 15 09:01:48 osmc bluetit[372]: IPv6 is not available in this system Jan 15 09:01:48 osmc bluetit[372]: System country set to ca by Bluetit policy. Jan 15 09:01:48 osmc bluetit[372]: Bluetit successfully initialized and ready Jan 15 09:01:49 osmc bluetit[372]: Bluetit did not exit gracefully on its last run or has been killed. Jan 15 09:01:49 osmc bluetit[372]: Run recover network procedure or restore system settings saved in /etc/airvpn Jan 15 09:01:49 osmc bluetit[372]: Starting AirVPN boot connection Jan 15 09:01:49 osmc bluetit[372]: AirVPN Manifest updater thread started Jan 15 09:01:49 osmc bluetit[372]: AirVPN Manifest update interval is 15 minutes Jan 15 09:01:49 osmc bluetit[372]: Updating AirVPN Manifest Jan 15 09:01:49 osmc bluetit[372]: Waiting for a valid AirVPN Manifest to be available Jan 15 09:01:50 osmc bluetit[372]: AirVPN Manifest successfully retrieved from server Jan 15 09:01:50 osmc bluetit[372]: Logging in AirVPN user airvpnclient Jan 15 09:01:50 osmc bluetit[372]: AirVPN login error: Login error Jan 15 09:01:50 osmc bluetit[372]: ERROR: AirVPN login failed for user airvpnclient # doing > goldcrest --recover-network as normal user gets me: osmc@osmc:~$ sudo goldcrest --recover-network 2021-01-15 09:10:59 Reading run control directives from file /root/.config/goldcrest.rc Goldcrest 1.0.0 - 7 January 2021 2021-01-15 09:10:59 Bluetit - AirVPN OpenVPN 3 Service 1.0.0 - 7 January 2021 2021-01-15 09:10:59 OpenVPN core 3.6.6 AirVPN linux arm 32-bit 2021-01-15 09:11:00 Successfully restored DNS and Network filter settings 2021-01-15 09:11:00 Successfully restored DNS settings 2021-01-15 09:11:00 Network filter successfully restored 2021-01-15 09:11:00 Bluetit session terminated osmc@osmc:~$ sudo goldcrest --bluetit-status 2021-01-15 09:11:29 Reading run control directives from file /root/.config/goldcrest.rc Goldcrest 1.0.0 - 7 January 2021 2021-01-15 09:11:29 Bluetit - AirVPN OpenVPN 3 Service 1.0.0 - 7 January 2021 2021-01-15 09:11:29 OpenVPN core 3.6.6 AirVPN linux arm 32-bit 2021-01-15 09:11:29 Bluetit is ready Edited ... by airvpnclient added why it is NOT GOOD Quote Share this post Link to post
Staff 8634 Posted ... @airvpnclient Hello! Let us try under OSMC latest release and reproduce the issue. In the meantime please open a ticket and, if you don't mind, send us your account password (in the ticket - you can then change it even immediately after you have sent it to us) as well as your bluetit.rc file. About communications with Bluetit, default policy allows any user in group airvpn so you should not run Golcdrest with root privileges, just run it from any user in airvpn group. Normally login failure at boot would not be a problem because Network Lock would be enforced anyway, but in this case we saw issues with Network Lock too. Did you disable Network Lock in bluetit.rc ? We will keep you posted both here and in the ticket system. Kind regards Quote Share this post Link to post
airvpnclient 12 Posted ... K. Happy to help smooth out these bumps. This is the latest OSMC with apt full-upgrade run. Watch for the ticket. Quote Quote Share this post Link to post