blueruin39 0 Posted ... I keep getting disconnected from AirVPN servers by Eddie with the following error. Everything works for a while after I reconnect but then the error happens again. Probably occurs x20 a day. VPN: ERROR: Linux route add command failed Quote Share this post Link to post
OpenSourcerer 1442 Posted ... When it happens, can you post the support file instead? Logs > lifebelt icon > paste/upload the output. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
blueruin39 0 Posted ... 2 minutes ago, OpenSourcerer said: When it happens, can you post the support file instead? Logs > lifebelt icon > paste/upload the output. ! 2022.01.10 11:32:00 - Disconnecting . 2022.01.10 11:32:00 - Routes, removed a route previously added, 184.75.221.3 for gateway 10.20.250.1 . 2022.01.10 11:32:00 - Routes, removed a route previously added, 2606:6080:1001:d:c59c:6e9a:3115:6f2f for gateway fde6:7a:7d20:10fa::1 . 2022.01.10 11:32:00 - Sending soft termination signal . 2022.01.10 11:32:00 - OpenVPN > net_route_v4_del: 184.75.221.5/32 via 192.168.2.1 dev [NULL] table 0 metric -1 . 2022.01.10 11:32:00 - OpenVPN > sitnl_send: rtnl: generic error (-3): No such process E 2022.01.10 11:32:00 - OpenVPN > ERROR: Linux route delete command failed Quote Share this post Link to post
OpenSourcerer 1442 Posted ... The support file, from top to bottom, please. (Re)Start Eddie, connect, let the error happen, then Logs > lifebelt icon on the right side > paste/upload. Do NOT copy-paste the logs alone. I've never seen this error before, so background info from the system report is needed. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
blueruin39 0 Posted ... 22 hours ago, OpenSourcerer said: The support file, from top to bottom, please. (Re)Start Eddie, connect, let the error happen, then Logs > lifebelt icon on the right side > paste/upload. Do NOT copy-paste the logs alone. I've never seen this error before, so background info from the system report is needed. Eddie System/Environment Report - 2022-01-11 - 7:01 PM UTC Eddie version: 2.20.0 Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: Manjaro Linux \r (\n) (\l) OS version: Linux lnwlf17 5.14.21-2-MANJARO #1 SMP PREEMPT Sun Nov 21 22:43:47 UTC 2021 x86_64 GNU/Linux OS architecture: x64 Mono /.Net Framework: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319 TUN driver: /dev/net/tun OpenVPN: 2.5.5 - OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 (/usr/bin/openvpn) Hummingbird: () SSH: OpenSSH_8.8p1, OpenSSL 1.1.1m 14 Dec 2021 (/usr/bin/ssh) SSL: () curl: 7.80.0 (/usr/bin/curl) Profile path: /home/lnwlf17/.config/eddie/default.profile Data path: /home/lnwlf17/.config/eddie Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/eddie-ui.exe Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" Network Lock Active: Yes, Linux iptables Connected to VPN: Yes, Mintaka Detected DNS: 10.24.26.1, fde6:7a:7d20:141a::1 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 137 ms Test Ping IPv6: 146 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True connect: True netlock: True servers.startlast: True os.single_instance: False ui.skip.provider.manifest.failed: True ui.skip.promotional: True gui.start_minimized: True gui.tray_minimized: True ---------------------------- Logs: . 2022.01.10 16:57:02 - Eddie version: 2.20.0 / linux_x64, System: Linux, Name: Manjaro Linux \r (\n) (\l), Version: Linux lnwlf17 5.14.21-2-MANJARO #1 SMP PREEMPT Sun Nov 21 22:43:47 UTC 2021 x86_64 GNU/Linux, Mono/.Net: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319 . 2022.01.10 16:57:02 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2022.01.10 16:57:02 - Raise system privileges . 2022.01.10 16:57:07 - Profile path: /home/lnwlf17/.config/eddie/default.profile . 2022.01.10 16:57:07 - Reading options from /home/lnwlf17/.config/eddie/default.profile . 2022.01.10 16:57:09 - Tun Driver - /dev/net/tun . 2022.01.10 16:57:09 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 (/usr/bin/openvpn) . 2022.01.10 16:57:09 - SSH - Version: OpenSSH_8.8p1, OpenSSL 1.1.1m 14 Dec 2021 (/usr/bin/ssh) I 2022.01.10 16:57:09 - SSL - Not available . 2022.01.10 16:57:09 - curl - Version: 7.80.0 (/usr/bin/curl) . 2022.01.10 16:57:09 - Recovery. Unexpected crash? . 2022.01.10 16:57:09 - Routes, removed an existing route, 184.75.221.3 for gateway 10.20.250.1 . 2022.01.10 16:57:09 - Routes, removed an existing route, 2606:6080:1001:d:c59c:6e9a:3115:6f2f for gateway fde6:7a:7d20:10fa::1 ! 2022.01.10 16:57:09 - Activation of Network Lock - Linux iptables I 2022.01.10 16:57:09 - Ready . 2022.01.10 16:57:11 - Collect information about AirVPN completed I 2022.01.10 16:57:11 - Session starting. I 2022.01.10 16:57:11 - Checking authorization ... ! 2022.01.10 16:57:12 - Connecting to Mintaka (Canada, Toronto, Ontario) . 2022.01.10 16:57:13 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.01.10 16:57:13 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.01.10 16:57:13 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.01.10 16:57:13 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.01.10 16:57:13 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.01.10 16:57:13 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.01.10 16:57:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.221:443 . 2022.01.10 16:57:13 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.01.10 16:57:13 - OpenVPN > UDP link local: (not bound) . 2022.01.10 16:57:13 - OpenVPN > UDP link remote: [AF_INET]184.75.223.221:443 . 2022.01.10 16:57:13 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.221:443, sid=2f9682e8 54aa7803 . 2022.01.10 16:57:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.10 16:57:13 - OpenVPN > VERIFY KU OK . 2022.01.10 16:57:13 - OpenVPN > Validating certificate extended key usage . 2022.01.10 16:57:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.10 16:57:13 - OpenVPN > VERIFY EKU OK . 2022.01.10 16:57:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.10 16:57:13 - Collect information about AirVPN completed . 2022.01.10 16:57:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.10 16:57:13 - OpenVPN > [Mintaka] Peer Connection Initiated with [AF_INET]184.75.223.221:443 . 2022.01.10 16:57:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.26.1,dhcp-option DNS6 fde6:7a:7d20:141a::1,tun-ipv6,route-gateway 10.24.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:141a::109d/64 fde6:7a:7d20:141a::1,ifconfig 10.24.26.159 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2022.01.10 16:57:13 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.01.10 16:57:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.01.10 16:57:13 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.01.10 16:57:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.01.10 16:57:13 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.01.10 16:57:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.01.10 16:57:13 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.01.10 16:57:13 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.01.10 16:57:13 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.01.10 16:57:13 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.01.10 16:57:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.10 16:57:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.10 16:57:13 - OpenVPN > net_route_v4_best_gw query: dst 0.0.0.0 . 2022.01.10 16:57:13 - OpenVPN > net_route_v4_best_gw result: via 192.168.2.1 dev wlp3s0 . 2022.01.10 16:57:13 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 IFACE=wlp3s0 HWADDR=94:e9:79:9c:be:5f . 2022.01.10 16:57:13 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2022.01.10 16:57:13 - OpenVPN > net_route_v6_best_gw query: dst :: . 2022.01.10 16:57:13 - OpenVPN > sitnl_send: rtnl: generic error (-101): Network is unreachable . 2022.01.10 16:57:13 - OpenVPN > ROUTE6: default_gateway=UNDEF . 2022.01.10 16:57:13 - OpenVPN > TUN/TAP device tun0 opened . 2022.01.10 16:57:13 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.01.10 16:57:13 - OpenVPN > net_iface_up: set tun0 up . 2022.01.10 16:57:13 - OpenVPN > net_addr_v4_add: 10.24.26.159/24 dev tun0 . 2022.01.10 16:57:13 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.01.10 16:57:13 - OpenVPN > net_iface_up: set tun0 up . 2022.01.10 16:57:13 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:141a::109d/64 dev tun0 . 2022.01.10 16:57:18 - OpenVPN > net_route_v4_add: 184.75.223.221/32 via 192.168.2.1 dev [NULL] table 0 metric -1 . 2022.01.10 16:57:18 - OpenVPN > net_route_v4_add: 0.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1 . 2022.01.10 16:57:18 - OpenVPN > net_route_v4_add: 128.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1 . 2022.01.10 16:57:18 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:141a::1 metric -1) dev tun0 . 2022.01.10 16:57:18 - OpenVPN > net_route_v6_add: ::/3 via :: dev tun0 table 0 metric -1 . 2022.01.10 16:57:18 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:141a::1 metric -1) dev tun0 . 2022.01.10 16:57:18 - OpenVPN > net_route_v6_add: 2000::/4 via :: dev tun0 table 0 metric -1 . 2022.01.10 16:57:18 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:141a::1 metric -1) dev tun0 . 2022.01.10 16:57:18 - OpenVPN > net_route_v6_add: 3000::/4 via :: dev tun0 table 0 metric -1 . 2022.01.10 16:57:18 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:141a::1 metric -1) dev tun0 . 2022.01.10 16:57:18 - OpenVPN > net_route_v6_add: fc00::/7 via :: dev tun0 table 0 metric -1 . 2022.01.10 16:57:18 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2022.01.10 16:57:18 - Routes, added a new route, 184.75.223.219 for gateway 10.24.26.1 . 2022.01.10 16:57:18 - Routes, added a new route, 2606:6080:1002:7:def:437f:f6fa:7759 for gateway fde6:7a:7d20:141a::1 . 2022.01.10 16:57:18 - Flushing DNS . 2022.01.10 16:57:18 - Flush DNS - nscd I 2022.01.10 16:57:18 - Checking route IPv4 I 2022.01.10 16:57:18 - Checking route IPv6 I 2022.01.10 16:57:19 - Checking DNS ! 2022.01.10 16:57:19 - Connected. . 2022.01.10 16:57:19 - OpenVPN > Initialization Sequence Completed . 2022.01.10 17:27:20 - Collect information about AirVPN completed . 2022.01.10 17:54:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.10 17:54:51 - OpenVPN > VERIFY KU OK . 2022.01.10 17:54:51 - OpenVPN > Validating certificate extended key usage . 2022.01.10 17:54:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.10 17:54:51 - OpenVPN > VERIFY EKU OK . 2022.01.10 17:54:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.10 17:54:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.10 17:54:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.10 17:54:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.10 17:57:27 - Collect information about AirVPN completed . 2022.01.10 18:52:29 - Above log line repeated 1 times more . 2022.01.10 18:52:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.10 18:52:29 - OpenVPN > VERIFY KU OK . 2022.01.10 18:52:29 - OpenVPN > Validating certificate extended key usage . 2022.01.10 18:52:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.10 18:52:29 - OpenVPN > VERIFY EKU OK . 2022.01.10 18:52:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.10 18:52:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.10 18:52:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.10 18:52:29 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.10 18:57:42 - Collect information about AirVPN completed . 2022.01.10 19:50:07 - Above log line repeated 1 times more . 2022.01.10 19:50:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.10 19:50:07 - OpenVPN > VERIFY KU OK . 2022.01.10 19:50:07 - OpenVPN > Validating certificate extended key usage . 2022.01.10 19:50:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.10 19:50:07 - OpenVPN > VERIFY EKU OK . 2022.01.10 19:50:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.10 19:50:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.10 19:50:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.10 19:50:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.10 19:57:58 - Collect information about AirVPN completed . 2022.01.10 20:47:45 - Above log line repeated 1 times more . 2022.01.10 20:47:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.10 20:47:45 - OpenVPN > VERIFY KU OK . 2022.01.10 20:47:45 - OpenVPN > Validating certificate extended key usage . 2022.01.10 20:47:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.10 20:47:45 - OpenVPN > VERIFY EKU OK . 2022.01.10 20:47:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.10 20:47:45 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.10 20:47:45 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.10 20:47:45 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.10 20:58:13 - Collect information about AirVPN completed . 2022.01.10 21:45:23 - Above log line repeated 1 times more . 2022.01.10 21:45:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.10 21:45:23 - OpenVPN > VERIFY KU OK . 2022.01.10 21:45:23 - OpenVPN > Validating certificate extended key usage . 2022.01.10 21:45:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.10 21:45:23 - OpenVPN > VERIFY EKU OK . 2022.01.10 21:45:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.10 21:45:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.10 21:45:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.10 21:45:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.10 21:58:29 - Collect information about AirVPN completed . 2022.01.10 22:43:01 - Above log line repeated 1 times more . 2022.01.10 22:43:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.10 22:43:01 - OpenVPN > VERIFY KU OK . 2022.01.10 22:43:01 - OpenVPN > Validating certificate extended key usage . 2022.01.10 22:43:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.10 22:43:01 - OpenVPN > VERIFY EKU OK . 2022.01.10 22:43:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.10 22:43:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.10 22:43:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.10 22:43:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.10 22:58:44 - Collect information about AirVPN completed . 2022.01.10 23:40:39 - Above log line repeated 1 times more . 2022.01.10 23:40:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.10 23:40:39 - OpenVPN > VERIFY KU OK . 2022.01.10 23:40:39 - OpenVPN > Validating certificate extended key usage . 2022.01.10 23:40:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.10 23:40:39 - OpenVPN > VERIFY EKU OK . 2022.01.10 23:40:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.10 23:40:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.10 23:40:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.10 23:40:39 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.10 23:58:58 - Collect information about AirVPN completed . 2022.01.11 00:38:17 - Above log line repeated 1 times more . 2022.01.11 00:38:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.11 00:38:17 - OpenVPN > VERIFY KU OK . 2022.01.11 00:38:17 - OpenVPN > Validating certificate extended key usage . 2022.01.11 00:38:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.11 00:38:17 - OpenVPN > VERIFY EKU OK . 2022.01.11 00:38:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.11 00:38:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 00:38:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 00:38:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.11 00:59:13 - Collect information about AirVPN completed . 2022.01.11 01:35:55 - Above log line repeated 1 times more . 2022.01.11 01:35:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.11 01:35:55 - OpenVPN > VERIFY KU OK . 2022.01.11 01:35:55 - OpenVPN > Validating certificate extended key usage . 2022.01.11 01:35:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.11 01:35:55 - OpenVPN > VERIFY EKU OK . 2022.01.11 01:35:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.11 01:35:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 01:35:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 01:35:55 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.11 01:59:28 - Collect information about AirVPN completed . 2022.01.11 02:33:33 - Above log line repeated 1 times more . 2022.01.11 02:33:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.11 02:33:33 - OpenVPN > VERIFY KU OK . 2022.01.11 02:33:33 - OpenVPN > Validating certificate extended key usage . 2022.01.11 02:33:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.11 02:33:33 - OpenVPN > VERIFY EKU OK . 2022.01.11 02:33:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.11 02:33:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 02:33:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 02:33:33 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.11 02:59:44 - Collect information about AirVPN completed . 2022.01.11 03:31:11 - Above log line repeated 1 times more . 2022.01.11 03:31:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.11 03:31:11 - OpenVPN > VERIFY KU OK . 2022.01.11 03:31:11 - OpenVPN > Validating certificate extended key usage . 2022.01.11 03:31:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.11 03:31:11 - OpenVPN > VERIFY EKU OK . 2022.01.11 03:31:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.11 03:31:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 03:31:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 03:31:11 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.11 03:59:59 - Collect information about AirVPN completed . 2022.01.11 04:28:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.11 04:28:49 - OpenVPN > VERIFY KU OK . 2022.01.11 04:28:49 - OpenVPN > Validating certificate extended key usage . 2022.01.11 04:28:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.11 04:28:49 - OpenVPN > VERIFY EKU OK . 2022.01.11 04:28:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.11 04:28:49 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 04:28:49 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 04:28:49 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.11 04:30:06 - Collect information about AirVPN completed . 2022.01.11 05:26:27 - Above log line repeated 1 times more . 2022.01.11 05:26:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.11 05:26:27 - OpenVPN > VERIFY KU OK . 2022.01.11 05:26:27 - OpenVPN > Validating certificate extended key usage . 2022.01.11 05:26:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.11 05:26:27 - OpenVPN > VERIFY EKU OK . 2022.01.11 05:26:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.11 05:26:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 05:26:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 05:26:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.11 05:30:22 - Collect information about AirVPN completed . 2022.01.11 06:24:05 - Above log line repeated 1 times more . 2022.01.11 06:24:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.11 06:24:05 - OpenVPN > VERIFY KU OK . 2022.01.11 06:24:05 - OpenVPN > Validating certificate extended key usage . 2022.01.11 06:24:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.11 06:24:05 - OpenVPN > VERIFY EKU OK . 2022.01.11 06:24:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.11 06:24:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 06:24:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 06:24:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.11 06:30:37 - Collect information about AirVPN completed . 2022.01.11 07:21:43 - Above log line repeated 1 times more . 2022.01.11 07:21:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.11 07:21:43 - OpenVPN > VERIFY KU OK . 2022.01.11 07:21:43 - OpenVPN > Validating certificate extended key usage . 2022.01.11 07:21:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.11 07:21:43 - OpenVPN > VERIFY EKU OK . 2022.01.11 07:21:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.11 07:21:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 07:21:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 07:21:43 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.11 07:30:53 - Collect information about AirVPN completed . 2022.01.11 08:19:21 - Above log line repeated 1 times more . 2022.01.11 08:19:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.11 08:19:21 - OpenVPN > VERIFY KU OK . 2022.01.11 08:19:21 - OpenVPN > Validating certificate extended key usage . 2022.01.11 08:19:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.11 08:19:21 - OpenVPN > VERIFY EKU OK . 2022.01.11 08:19:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.11 08:19:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 08:19:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 08:19:21 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.11 08:31:09 - Collect information about AirVPN completed . 2022.01.11 09:16:59 - Above log line repeated 1 times more . 2022.01.11 09:16:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.11 09:16:59 - OpenVPN > VERIFY KU OK . 2022.01.11 09:16:59 - OpenVPN > Validating certificate extended key usage . 2022.01.11 09:16:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.11 09:16:59 - OpenVPN > VERIFY EKU OK . 2022.01.11 09:16:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.11 09:16:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 09:16:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 09:16:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.11 09:31:24 - Collect information about AirVPN completed . 2022.01.11 10:14:37 - Above log line repeated 1 times more . 2022.01.11 10:14:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.11 10:14:37 - OpenVPN > VERIFY KU OK . 2022.01.11 10:14:37 - OpenVPN > Validating certificate extended key usage . 2022.01.11 10:14:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.11 10:14:37 - OpenVPN > VERIFY EKU OK . 2022.01.11 10:14:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.11 10:14:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 10:14:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 10:14:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.11 10:31:38 - Collect information about AirVPN completed . 2022.01.11 11:12:15 - Above log line repeated 1 times more . 2022.01.11 11:12:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.11 11:12:15 - OpenVPN > VERIFY KU OK . 2022.01.11 11:12:15 - OpenVPN > Validating certificate extended key usage . 2022.01.11 11:12:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.11 11:12:15 - OpenVPN > VERIFY EKU OK . 2022.01.11 11:12:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.11 11:12:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 11:12:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 11:12:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.11 11:31:53 - Collect information about AirVPN completed . 2022.01.11 12:09:53 - Above log line repeated 1 times more . 2022.01.11 12:09:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.11 12:09:53 - OpenVPN > VERIFY KU OK . 2022.01.11 12:09:53 - OpenVPN > Validating certificate extended key usage . 2022.01.11 12:09:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.11 12:09:53 - OpenVPN > VERIFY EKU OK . 2022.01.11 12:09:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.11 12:09:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 12:09:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 12:09:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.11 12:32:06 - Collect information about AirVPN completed . 2022.01.11 13:07:31 - Above log line repeated 1 times more . 2022.01.11 13:07:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.11 13:07:31 - OpenVPN > VERIFY KU OK . 2022.01.11 13:07:31 - OpenVPN > Validating certificate extended key usage . 2022.01.11 13:07:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.11 13:07:31 - OpenVPN > VERIFY EKU OK . 2022.01.11 13:07:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.11 13:07:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 13:07:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 13:07:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.11 13:32:20 - Collect information about AirVPN completed . 2022.01.11 14:05:09 - Above log line repeated 1 times more . 2022.01.11 14:05:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.11 14:05:09 - OpenVPN > VERIFY KU OK . 2022.01.11 14:05:09 - OpenVPN > Validating certificate extended key usage . 2022.01.11 14:05:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.11 14:05:09 - OpenVPN > VERIFY EKU OK . 2022.01.11 14:05:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.11 14:05:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 14:05:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 14:05:09 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.11 14:32:33 - Collect information about AirVPN completed . 2022.01.11 14:43:27 - OpenVPN > [Mintaka] Inactivity timeout (--ping-restart), restarting . 2022.01.11 14:43:27 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2022.01.11 14:43:27 - OpenVPN > Restart pause, 5 second(s) ! 2022.01.11 14:43:27 - Disconnecting . 2022.01.11 14:43:28 - Routes, removed a route previously added, 184.75.223.219 for gateway 10.24.26.1 . 2022.01.11 14:43:28 - Routes, removed a route previously added, 2606:6080:1002:7:def:437f:f6fa:7759 for gateway fde6:7a:7d20:141a::1 . 2022.01.11 14:43:28 - Sending soft termination signal . 2022.01.11 14:43:28 - OpenVPN > net_route_v4_del: 184.75.223.221/32 via 192.168.2.1 dev [NULL] table 0 metric -1 . 2022.01.11 14:43:28 - OpenVPN > sitnl_send: rtnl: generic error (-3): No such processE 2022.01.11 14:43:28 - OpenVPN > ERROR: Linux route delete command failed . 2022.01.11 14:43:28 - OpenVPN > net_route_v4_del: 0.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1 . 2022.01.11 14:43:28 - OpenVPN > net_route_v4_del: 128.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1 . 2022.01.11 14:43:28 - OpenVPN > delete_route_ipv6(::/3) . 2022.01.11 14:43:28 - OpenVPN > net_route_v6_del: ::/3 via :: dev tun0 table 0 metric -1 . 2022.01.11 14:43:28 - OpenVPN > delete_route_ipv6(2000::/4) . 2022.01.11 14:43:28 - OpenVPN > net_route_v6_del: 2000::/4 via :: dev tun0 table 0 metric -1 . 2022.01.11 14:43:28 - OpenVPN > delete_route_ipv6(3000::/4) . 2022.01.11 14:43:28 - OpenVPN > net_route_v6_del: 3000::/4 via :: dev tun0 table 0 metric -1 . 2022.01.11 14:43:28 - OpenVPN > delete_route_ipv6(fc00::/7) . 2022.01.11 14:43:28 - OpenVPN > net_route_v6_del: fc00::/7 via :: dev tun0 table 0 metric -1 . 2022.01.11 14:43:28 - OpenVPN > Closing TUN/TAP interface . 2022.01.11 14:43:28 - OpenVPN > net_addr_v4_del: 10.24.26.159 dev tun0 . 2022.01.11 14:43:28 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:141a::109d/64 dev tun0 . 2022.01.11 14:43:28 - OpenVPN > SIGINT[hard,init_instance] received, process exiting . 2022.01.11 14:43:28 - Connection terminated. . 2022.01.11 14:43:28 - DNS of the system restored to original settings (Rename method) I 2022.01.11 14:43:31 - Checking authorization ... ! 2022.01.11 14:43:31 - Connecting to Mintaka (Canada, Toronto, Ontario) . 2022.01.11 14:43:32 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.01.11 14:43:32 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.01.11 14:43:32 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.01.11 14:43:32 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.01.11 14:43:32 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.01.11 14:43:32 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.01.11 14:43:32 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.221:443 . 2022.01.11 14:43:32 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.01.11 14:43:32 - OpenVPN > UDP link local: (not bound) . 2022.01.11 14:43:32 - OpenVPN > UDP link remote: [AF_INET]184.75.223.221:443 . 2022.01.11 14:43:32 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.221:443, sid=36a447d6 0ce5b54e . 2022.01.11 14:43:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.11 14:43:32 - OpenVPN > VERIFY KU OK . 2022.01.11 14:43:32 - OpenVPN > Validating certificate extended key usage . 2022.01.11 14:43:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.11 14:43:32 - OpenVPN > VERIFY EKU OK . 2022.01.11 14:43:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.11 14:43:32 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.11 14:43:32 - OpenVPN > [Mintaka] Peer Connection Initiated with [AF_INET]184.75.223.221:443 . 2022.01.11 14:43:32 - OpenVPN > SENT CONTROL [Mintaka]: 'PUSH_REQUEST' (status=1) . 2022.01.11 14:43:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.26.1,dhcp-option DNS6 fde6:7a:7d20:141a::1,tun-ipv6,route-gateway 10.24.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:141a::109d/64 fde6:7a:7d20:141a::1,ifconfig 10.24.26.159 255.255.255.0,peer-id 8,cipher AES-256-GCM' . 2022.01.11 14:43:32 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.01.11 14:43:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.01.11 14:43:32 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.01.11 14:43:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.01.11 14:43:33 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.01.11 14:43:33 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.01.11 14:43:33 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.01.11 14:43:33 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.01.11 14:43:33 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.01.11 14:43:33 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.01.11 14:43:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 14:43:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 14:43:33 - OpenVPN > net_route_v4_best_gw query: dst 0.0.0.0 . 2022.01.11 14:43:33 - OpenVPN > net_route_v4_best_gw result: via 192.168.2.1 dev wlp3s0 . 2022.01.11 14:43:33 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 IFACE=wlp3s0 HWADDR=94:e9:79:9c:be:5f . 2022.01.11 14:43:33 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2022.01.11 14:43:33 - OpenVPN > net_route_v6_best_gw query: dst :: . 2022.01.11 14:43:33 - OpenVPN > sitnl_send: rtnl: generic error (-101): Network is unreachable . 2022.01.11 14:43:33 - OpenVPN > ROUTE6: default_gateway=UNDEF . 2022.01.11 14:43:33 - OpenVPN > TUN/TAP device tun0 opened . 2022.01.11 14:43:33 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.01.11 14:43:33 - OpenVPN > net_iface_up: set tun0 up . 2022.01.11 14:43:33 - OpenVPN > net_addr_v4_add: 10.24.26.159/24 dev tun0 . 2022.01.11 14:43:33 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.01.11 14:43:33 - OpenVPN > net_iface_up: set tun0 up . 2022.01.11 14:43:33 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:141a::109d/64 dev tun0 . 2022.01.11 14:43:37 - OpenVPN > net_route_v4_add: 184.75.223.221/32 via 192.168.2.1 dev [NULL] table 0 metric -1 . 2022.01.11 14:43:37 - OpenVPN > net_route_v4_add: 0.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1 . 2022.01.11 14:43:37 - OpenVPN > net_route_v4_add: 128.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1 . 2022.01.11 14:43:37 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:141a::1 metric -1) dev tun0 . 2022.01.11 14:43:37 - OpenVPN > net_route_v6_add: ::/3 via :: dev tun0 table 0 metric -1 . 2022.01.11 14:43:37 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:141a::1 metric -1) dev tun0 . 2022.01.11 14:43:37 - OpenVPN > net_route_v6_add: 2000::/4 via :: dev tun0 table 0 metric -1 . 2022.01.11 14:43:37 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:141a::1 metric -1) dev tun0 . 2022.01.11 14:43:37 - OpenVPN > net_route_v6_add: 3000::/4 via :: dev tun0 table 0 metric -1 . 2022.01.11 14:43:37 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:141a::1 metric -1) dev tun0 . 2022.01.11 14:43:37 - OpenVPN > net_route_v6_add: fc00::/7 via :: dev tun0 table 0 metric -1 . 2022.01.11 14:43:37 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2022.01.11 14:43:37 - Routes, added a new route, 184.75.223.219 for gateway 10.24.26.1 . 2022.01.11 14:43:37 - Routes, added a new route, 2606:6080:1002:7:def:437f:f6fa:7759 for gateway fde6:7a:7d20:141a::1 . 2022.01.11 14:43:37 - Flushing DNS . 2022.01.11 14:43:37 - Flush DNS - nscd I 2022.01.11 14:43:37 - Checking route IPv4 I 2022.01.11 14:43:37 - Checking route IPv6 I 2022.01.11 14:43:37 - Checking DNS ! 2022.01.11 14:43:38 - Connected. . 2022.01.11 14:43:38 - OpenVPN > Initialization Sequence Completed . 2022.01.11 14:58:46 - OpenVPN > [Mintaka] Inactivity timeout (--ping-restart), restarting . 2022.01.11 14:58:46 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2022.01.11 14:58:46 - OpenVPN > Restart pause, 5 second(s) ! 2022.01.11 14:58:46 - Disconnecting . 2022.01.11 14:58:46 - Routes, removed a route previously added, 184.75.223.219 for gateway 10.24.26.1 . 2022.01.11 14:58:46 - Routes, removed a route previously added, 2606:6080:1002:7:def:437f:f6fa:7759 for gateway fde6:7a:7d20:141a::1 . 2022.01.11 14:58:46 - Sending soft termination signal . 2022.01.11 14:58:46 - OpenVPN > net_route_v4_del: 184.75.223.221/32 via 192.168.2.1 dev [NULL] table 0 metric -1 . 2022.01.11 14:58:46 - OpenVPN > sitnl_send: rtnl: generic error (-3): No such process E 2022.01.11 14:58:46 - OpenVPN > ERROR: Linux route delete command failed . 2022.01.11 14:58:46 - OpenVPN > net_route_v4_del: 0.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1 . 2022.01.11 14:58:46 - OpenVPN > net_route_v4_del: 128.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1 . 2022.01.11 14:58:46 - OpenVPN > delete_route_ipv6(::/3) . 2022.01.11 14:58:46 - OpenVPN > net_route_v6_del: ::/3 via :: dev tun0 table 0 metric -1 . 2022.01.11 14:58:46 - OpenVPN > delete_route_ipv6(2000::/4) . 2022.01.11 14:58:46 - OpenVPN > net_route_v6_del: 2000::/4 via :: dev tun0 table 0 metric -1 . 2022.01.11 14:58:46 - OpenVPN > delete_route_ipv6(3000::/4) . 2022.01.11 14:58:46 - OpenVPN > net_route_v6_del: 3000::/4 via :: dev tun0 table 0 metric -1 . 2022.01.11 14:58:46 - OpenVPN > delete_route_ipv6(fc00::/7) . 2022.01.11 14:58:46 - OpenVPN > net_route_v6_del: fc00::/7 via :: dev tun0 table 0 metric -1 . 2022.01.11 14:58:46 - OpenVPN > Closing TUN/TAP interface . 2022.01.11 14:58:46 - OpenVPN > net_addr_v4_del: 10.24.26.159 dev tun0 . 2022.01.11 14:58:46 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:141a::109d/64 dev tun0 . 2022.01.11 14:58:46 - OpenVPN > SIGINT[hard,init_instance] received, process exiting . 2022.01.11 14:58:46 - Connection terminated. . 2022.01.11 14:58:46 - DNS of the system restored to original settings (Rename method) I 2022.01.11 14:58:49 - Checking authorization ... ! 2022.01.11 14:58:50 - Connecting to Mintaka (Canada, Toronto, Ontario) . 2022.01.11 14:58:50 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.01.11 14:58:50 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.01.11 14:58:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.01.11 14:58:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.01.11 14:58:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.01.11 14:58:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.01.11 14:58:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.221:443 . 2022.01.11 14:58:50 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.01.11 14:58:50 - OpenVPN > UDP link local: (not bound) . 2022.01.11 14:58:50 - OpenVPN > UDP link remote: [AF_INET]184.75.223.221:443 . 2022.01.11 14:58:50 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.221:443, sid=efdcd155 fd6faf8b . 2022.01.11 14:58:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.01.11 14:58:50 - OpenVPN > VERIFY KU OK . 2022.01.11 14:58:50 - OpenVPN > Validating certificate extended key usage . 2022.01.11 14:58:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.01.11 14:58:50 - OpenVPN > VERIFY EKU OK . 2022.01.11 14:58:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org . 2022.01.11 14:58:50 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.01.11 14:58:50 - OpenVPN > [Mintaka] Peer Connection Initiated with [AF_INET]184.75.223.221:443 . 2022.01.11 14:58:51 - OpenVPN > SENT CONTROL [Mintaka]: 'PUSH_REQUEST' (status=1) . 2022.01.11 14:58:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.26.1,dhcp-option DNS6 fde6:7a:7d20:141a::1,tun-ipv6,route-gateway 10.24.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:141a::109d/64 fde6:7a:7d20:141a::1,ifconfig 10.24.26.159 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2022.01.11 14:58:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.01.11 14:58:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.01.11 14:58:51 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.01.11 14:58:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.01.11 14:58:51 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.01.11 14:58:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.01.11 14:58:51 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.01.11 14:58:51 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.01.11 14:58:51 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.01.11 14:58:51 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.01.11 14:58:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 14:58:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.01.11 14:58:51 - OpenVPN > net_route_v4_best_gw query: dst 0.0.0.0 . 2022.01.11 14:58:51 - OpenVPN > net_route_v4_best_gw result: via 192.168.2.1 dev wlp3s0 . 2022.01.11 14:58:51 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 IFACE=wlp3s0 HWADDR=94:e9:79:9c:be:5f . 2022.01.11 14:58:51 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2022.01.11 14:58:51 - OpenVPN > net_route_v6_best_gw query: dst :: . 2022.01.11 14:58:51 - OpenVPN > sitnl_send: rtnl: generic error (-101): Network is unreachable . 2022.01.11 14:58:51 - OpenVPN > ROUTE6: default_gateway=UNDEF . 2022.01.11 14:58:51 - OpenVPN > TUN/TAP device tun0 opened . 2022.01.11 14:58:51 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.01.11 14:58:51 - OpenVPN > net_iface_up: set tun0 up . 2022.01.11 14:58:51 - OpenVPN > net_addr_v4_add: 10.24.26.159/24 dev tun0 . 2022.01.11 14:58:51 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.01.11 14:58:51 - OpenVPN > net_iface_up: set tun0 up . 2022.01.11 14:58:51 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:141a::109d/64 dev tun0 . 2022.01.11 14:58:56 - OpenVPN > net_route_v4_add: 184.75.223.221/32 via 192.168.2.1 dev [NULL] table 0 metric -1 . 2022.01.11 14:58:56 - OpenVPN > net_route_v4_add: 0.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1 . 2022.01.11 14:58:56 - OpenVPN > net_route_v4_add: 128.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1 . 2022.01.11 14:58:56 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:141a::1 metric -1) dev tun0 . 2022.01.11 14:58:56 - OpenVPN > net_route_v6_add: ::/3 via :: dev tun0 table 0 metric -1 . 2022.01.11 14:58:56 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:141a::1 metric -1) dev tun0 . 2022.01.11 14:58:56 - OpenVPN > net_route_v6_add: 2000::/4 via :: dev tun0 table 0 metric -1 . 2022.01.11 14:58:56 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:141a::1 metric -1) dev tun0 . 2022.01.11 14:58:56 - OpenVPN > net_route_v6_add: 3000::/4 via :: dev tun0 table 0 metric -1 . 2022.01.11 14:58:56 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:141a::1 metric -1) dev tun0 . 2022.01.11 14:58:56 - OpenVPN > net_route_v6_add: fc00::/7 via :: dev tun0 table 0 metric -1 . 2022.01.11 14:58:56 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2022.01.11 14:58:56 - Routes, added a new route, 184.75.223.219 for gateway 10.24.26.1 . 2022.01.11 14:58:56 - Routes, added a new route, 2606:6080:1002:7:def:437f:f6fa:7759 for gateway fde6:7a:7d20:141a::1 . 2022.01.11 14:58:56 - Flushing DNS . 2022.01.11 14:58:56 - Flush DNS - nscd I 2022.01.11 14:58:56 - Checking route IPv4 I 2022.01.11 14:58:56 - Checking route IPv6 I 2022.01.11 14:58:56 - Checking DNS ! 2022.01.11 14:58:57 - Connected. . 2022.01.11 14:58:57 - OpenVPN > Initialization Sequence Completed ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/1", "gateway": "10.24.26.1", "interface": "tun0" }, { "address": "0.0.0.0\/0", "gateway": "192.168.2.1", "interface": "wlp3s0", "metric": "600" }, { "address": "128.0.0.0\/1", "gateway": "10.24.26.1", "interface": "tun0" }, { "address": "184.75.223.219", "gateway": "10.24.26.1", "interface": "tun0" }, { "address": "184.75.223.221", "gateway": "192.168.2.1", "interface": "wlp3s0" }, { "address": "2606:6080:1002:7:def:437f:f6fa:7759", "gateway": "fde6:7a:7d20:141a::1", "interface": "tun0", "metric": "1024" } ], "interfaces": [ { "friendly": "lo", "id": "lo", "name": "lo", "description": "lo", "type": "Loopback", "status": "Unknown", "bytes_received": "1303407", "bytes_sent": "1303407", "support_ipv4": true, "support_ipv6": true, "ips": [ "127.0.0.1", "::1" ], "gateways": [], "bind": true }, { "friendly": "enp4s0f1", "id": "enp4s0f1", "name": "enp4s0f1", "description": "enp4s0f1", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "gateways": [], "bind": false }, { "friendly": "wlp3s0", "id": "wlp3s0", "name": "wlp3s0", "description": "wlp3s0", "type": "Wireless80211", "status": "Up", "bytes_received": "1565930393", "bytes_sent": "2928339700", "support_ipv4": true, "support_ipv6": true, "ips": [ "192.168.2.145", "fe80::f24a:e07d:a96c:d3d7" ], "gateways": [ "192.168.2.1" ], "bind": true }, { "friendly": "tun0", "id": "tun0", "name": "tun0", "description": "tun0", "type": "0", "status": "Unknown", "bytes_received": "2146336", "bytes_sent": "532021", "support_ipv4": true, "support_ipv6": true, "ips": [ "10.24.26.159", "fde6:7a:7d20:141a::109d", "fe80::bc7f:3374:67d0:aa68" ], "gateways": [ "10.24.26.1", "fde6:7a:7d20:141a::1" ], "bind": true } ], "ipv4-default-gateway": "192.168.2.1", "ipv4-default-interface": "wlp3s0" } ---------------------------- ip addr show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: enp4s0f1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc fq_codel state DOWN group default qlen 1000 link/ether 54:ab:3a:f7:65:6b brd ff:ff:ff:ff:ff:ff 4: wlp3s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000 link/ether 94:e9:79:9c:be:5f brd ff:ff:ff:ff:ff:ff inet 192.168.2.145/24 brd 192.168.2.255 scope global dynamic noprefixroute wlp3s0 valid_lft 259004sec preferred_lft 259004sec inet6 fe80::f24a:e07d:a96c:d3d7/64 scope link noprefixroute valid_lft forever preferred_lft forever 15: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 500 link/none inet 10.24.26.159/24 scope global tun0 valid_lft forever preferred_lft forever inet6 fde6:7a:7d20:141a::109d/64 scope global valid_lft forever preferred_lft forever inet6 fe80::bc7f:3374:67d0:aa68/64 scope link stable-privacy valid_lft forever preferred_lft forever ---------------------------- ip link show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: enp4s0f1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc fq_codel state DOWN mode DEFAULT group default qlen 1000 link/ether 54:ab:3a:f7:65:6b brd ff:ff:ff:ff:ff:ff 4: wlp3s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP mode DORMANT group default qlen 1000 link/ether 94:e9:79:9c:be:5f brd ff:ff:ff:ff:ff:ff 15: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN mode DEFAULT group default qlen 500 link/none ---------------------------- ip -4 route show: 0.0.0.0/1 via 10.24.26.1 dev tun0 default via 192.168.2.1 dev wlp3s0 proto dhcp metric 600 10.24.26.0/24 dev tun0 proto kernel scope link src 10.24.26.159 128.0.0.0/1 via 10.24.26.1 dev tun0 184.75.223.219 via 10.24.26.1 dev tun0 184.75.223.221 via 192.168.2.1 dev wlp3s0 192.168.2.0/24 dev wlp3s0 proto kernel scope link src 192.168.2.145 metric 600 ---------------------------- ip -6 route show: ::1 dev lo proto kernel metric 256 pref medium ::/3 dev tun0 metric 1024 pref medium 2606:6080:1002:7:def:437f:f6fa:7759 via fde6:7a:7d20:141a::1 dev tun0 metric 1024 pref medium 2000::/4 dev tun0 metric 1024 pref medium 3000::/4 dev tun0 metric 1024 pref medium fde6:7a:7d20:141a::/64 dev tun0 proto kernel metric 256 pref medium fc00::/7 dev tun0 metric 1024 pref medium fe80::/64 dev tun0 proto kernel metric 256 pref medium fe80::/64 dev wlp3s0 proto kernel metric 600 pref medium Quote Share this post Link to post
OpenSourcerer 1442 Posted ... I see you're on wireless. Can you try using TCP? Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
blueruin39 0 Posted ... 4 minutes ago, OpenSourcerer said: I see you're on wireless. Can you try using TCP? I could for diagnostic purposes when I'm done work but I would not be able to permanently make that switch because of the location of the modem. Quote Share this post Link to post
OpenSourcerer 1442 Posted ... I didn't mean a cable/LAN/Ethernet connection, even if it's probably the solution for the issue, but switching the connection protocol to TCP to make it more resistant against interference. I think what's happening is this: It could be that the signal is either weak and/or experiences too much interference so that you lose connection, which forces the adapter to reconnect to the access point. This causes the routing table to be updated as well by your network manager. OpenVPN doesn't monitor such changes, it alters routes only on connect/disconnect, so the connection is forced to time out. On reconnect, which means destroying the tunnel and rebuilding it, you get the route deletion error because that particular route was already deleted by the network manager. Therefore, I believe the error not to be the cause but a consequence. The cause could really be an unstable wireless connection. On which frequency is your wireless network? Sometimes it could help changing it from 2.4 to 5 or vice versa. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post