Jump to content
Not connected, Your IP: 44.195.30.216
blueruin39

ERROR: Linux route add command failed

Recommended Posts

I keep getting disconnected from AirVPN servers by Eddie with the following error. Everything works for a while after I reconnect but then the error happens again. Probably occurs x20 a day.

VPN: ERROR: Linux route add command failed



 

Share this post


Link to post

When it happens, can you post the support file instead? Logs > lifebelt icon > paste/upload the output.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
2 minutes ago, OpenSourcerer said:

When it happens, can you post the support file instead? Logs > lifebelt icon > paste/upload the output.

! 2022.01.10 11:32:00 - Disconnecting
. 2022.01.10 11:32:00 - Routes, removed a route previously added, 184.75.221.3 for gateway 10.20.250.1
. 2022.01.10 11:32:00 - Routes, removed a route previously added, 2606:6080:1001:d:c59c:6e9a:3115:6f2f for gateway fde6:7a:7d20:10fa::1
. 2022.01.10 11:32:00 - Sending soft termination signal
. 2022.01.10 11:32:00 - OpenVPN > net_route_v4_del: 184.75.221.5/32 via 192.168.2.1 dev [NULL] table 0 metric -1
. 2022.01.10 11:32:00 - OpenVPN > sitnl_send: rtnl: generic error (-3): No such process
E 2022.01.10 11:32:00 - OpenVPN > ERROR: Linux route delete command failed

 

Share this post


Link to post

The support file, from top to bottom, please. (Re)Start Eddie, connect, let the error happen, then Logs > lifebelt icon on the right side > paste/upload. Do NOT copy-paste the logs alone. I've never seen this error before, so background info from the system report is needed.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
22 hours ago, OpenSourcerer said:

The support file, from top to bottom, please. (Re)Start Eddie, connect, let the error happen, then Logs > lifebelt icon on the right side > paste/upload. Do NOT copy-paste the logs alone. I've never seen this error before, so background info from the system report is needed.



Eddie System/Environment Report - 2022-01-11 - 7:01 PM UTC

Eddie version: 2.20.0
Eddie OS build: linux_x64
Eddie architecture: x64
OS type: Linux
OS name: Manjaro Linux \r  (\n) (\l)
OS version: Linux lnwlf17 5.14.21-2-MANJARO #1 SMP PREEMPT Sun Nov 21 22:43:47 UTC 2021 x86_64 GNU/Linux
OS architecture: x64
Mono /.Net Framework: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319
TUN driver: /dev/net/tun
OpenVPN: 2.5.5 - OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10 (/usr/bin/openvpn)
Hummingbird:  ()
SSH: OpenSSH_8.8p1, OpenSSL 1.1.1m  14 Dec 2021 (/usr/bin/ssh)
SSL:  ()
curl: 7.80.0 (/usr/bin/curl)
Profile path: /home/lnwlf17/.config/eddie/default.profile
Data path: /home/lnwlf17/.config/eddie
Application path: /usr/lib/eddie-ui
Executable path: /usr/lib/eddie-ui/eddie-ui.exe
Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
Network Lock Active: Yes, Linux iptables
Connected to VPN: Yes, Mintaka
Detected DNS: 10.24.26.1, fde6:7a:7d20:141a::1
Test DNS IPv4: Ok
Test DNS IPv6: Ok
Test Ping IPv4: 137 ms
Test Ping IPv6: 146 ms
Test HTTP IPv4: Ok
Test HTTP IPv6: Ok
Test HTTPS: Ok
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
connect: True
netlock: True
servers.startlast: True
os.single_instance: False
ui.skip.provider.manifest.failed: True
ui.skip.promotional: True
gui.start_minimized: True
gui.tray_minimized: True

----------------------------
Logs:

. 2022.01.10 16:57:02 - Eddie version: 2.20.0 / linux_x64, System: Linux, Name: Manjaro Linux \r  (\n) (\l), Version: Linux lnwlf17 5.14.21-2-MANJARO #1 SMP PREEMPT Sun Nov 21 22:43:47 UTC 2021 x86_64 GNU/Linux, Mono/.Net: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319
. 2022.01.10 16:57:02 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
. 2022.01.10 16:57:02 - Raise system privileges
. 2022.01.10 16:57:07 - Profile path: /home/lnwlf17/.config/eddie/default.profile
. 2022.01.10 16:57:07 - Reading options from /home/lnwlf17/.config/eddie/default.profile
. 2022.01.10 16:57:09 - Tun Driver - /dev/net/tun
. 2022.01.10 16:57:09 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10 (/usr/bin/openvpn)
. 2022.01.10 16:57:09 - SSH - Version: OpenSSH_8.8p1, OpenSSL 1.1.1m  14 Dec 2021 (/usr/bin/ssh)
I 2022.01.10 16:57:09 - SSL - Not available
. 2022.01.10 16:57:09 - curl - Version: 7.80.0 (/usr/bin/curl)
. 2022.01.10 16:57:09 - Recovery. Unexpected crash?
. 2022.01.10 16:57:09 - Routes, removed an existing route, 184.75.221.3 for gateway 10.20.250.1
. 2022.01.10 16:57:09 - Routes, removed an existing route, 2606:6080:1001:d:c59c:6e9a:3115:6f2f for gateway fde6:7a:7d20:10fa::1
! 2022.01.10 16:57:09 - Activation of Network Lock - Linux iptables
I 2022.01.10 16:57:09 - Ready
. 2022.01.10 16:57:11 - Collect information about AirVPN completed
I 2022.01.10 16:57:11 - Session starting.
I 2022.01.10 16:57:11 - Checking authorization ...
! 2022.01.10 16:57:12 - Connecting to Mintaka (Canada, Toronto, Ontario)
. 2022.01.10 16:57:13 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021
. 2022.01.10 16:57:13 - OpenVPN > library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
. 2022.01.10 16:57:13 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.01.10 16:57:13 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.01.10 16:57:13 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.01.10 16:57:13 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.01.10 16:57:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.221:443
. 2022.01.10 16:57:13 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2022.01.10 16:57:13 - OpenVPN > UDP link local: (not bound)
. 2022.01.10 16:57:13 - OpenVPN > UDP link remote: [AF_INET]184.75.223.221:443
. 2022.01.10 16:57:13 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.221:443, sid=2f9682e8 54aa7803
. 2022.01.10 16:57:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.10 16:57:13 - OpenVPN > VERIFY KU OK
. 2022.01.10 16:57:13 - OpenVPN > Validating certificate extended key usage
. 2022.01.10 16:57:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.10 16:57:13 - OpenVPN > VERIFY EKU OK
. 2022.01.10 16:57:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.10 16:57:13 - Collect information about AirVPN completed
. 2022.01.10 16:57:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.10 16:57:13 - OpenVPN > [Mintaka] Peer Connection Initiated with [AF_INET]184.75.223.221:443
. 2022.01.10 16:57:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.26.1,dhcp-option DNS6 fde6:7a:7d20:141a::1,tun-ipv6,route-gateway 10.24.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:141a::109d/64 fde6:7a:7d20:141a::1,ifconfig 10.24.26.159 255.255.255.0,peer-id 2,cipher AES-256-GCM'
. 2022.01.10 16:57:13 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2022.01.10 16:57:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.01.10 16:57:13 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2022.01.10 16:57:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.01.10 16:57:13 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.01.10 16:57:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.01.10 16:57:13 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.01.10 16:57:13 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2022.01.10 16:57:13 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2022.01.10 16:57:13 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2022.01.10 16:57:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.10 16:57:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.10 16:57:13 - OpenVPN > net_route_v4_best_gw query: dst 0.0.0.0
. 2022.01.10 16:57:13 - OpenVPN > net_route_v4_best_gw result: via 192.168.2.1 dev wlp3s0
. 2022.01.10 16:57:13 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 IFACE=wlp3s0 HWADDR=94:e9:79:9c:be:5f
. 2022.01.10 16:57:13 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2022.01.10 16:57:13 - OpenVPN > net_route_v6_best_gw query: dst ::
. 2022.01.10 16:57:13 - OpenVPN > sitnl_send: rtnl: generic error (-101): Network is unreachable
. 2022.01.10 16:57:13 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2022.01.10 16:57:13 - OpenVPN > TUN/TAP device tun0 opened
. 2022.01.10 16:57:13 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2022.01.10 16:57:13 - OpenVPN > net_iface_up: set tun0 up
. 2022.01.10 16:57:13 - OpenVPN > net_addr_v4_add: 10.24.26.159/24 dev tun0
. 2022.01.10 16:57:13 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2022.01.10 16:57:13 - OpenVPN > net_iface_up: set tun0 up
. 2022.01.10 16:57:13 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:141a::109d/64 dev tun0
. 2022.01.10 16:57:18 - OpenVPN > net_route_v4_add: 184.75.223.221/32 via 192.168.2.1 dev [NULL] table 0 metric -1
. 2022.01.10 16:57:18 - OpenVPN > net_route_v4_add: 0.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1
. 2022.01.10 16:57:18 - OpenVPN > net_route_v4_add: 128.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1
. 2022.01.10 16:57:18 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:141a::1 metric -1) dev tun0
. 2022.01.10 16:57:18 - OpenVPN > net_route_v6_add: ::/3 via :: dev tun0 table 0 metric -1
. 2022.01.10 16:57:18 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:141a::1 metric -1) dev tun0
. 2022.01.10 16:57:18 - OpenVPN > net_route_v6_add: 2000::/4 via :: dev tun0 table 0 metric -1
. 2022.01.10 16:57:18 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:141a::1 metric -1) dev tun0
. 2022.01.10 16:57:18 - OpenVPN > net_route_v6_add: 3000::/4 via :: dev tun0 table 0 metric -1
. 2022.01.10 16:57:18 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:141a::1 metric -1) dev tun0
. 2022.01.10 16:57:18 - OpenVPN > net_route_v6_add: fc00::/7 via :: dev tun0 table 0 metric -1
. 2022.01.10 16:57:18 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2022.01.10 16:57:18 - Routes, added a new route, 184.75.223.219 for gateway 10.24.26.1
. 2022.01.10 16:57:18 - Routes, added a new route, 2606:6080:1002:7:def:437f:f6fa:7759 for gateway fde6:7a:7d20:141a::1
. 2022.01.10 16:57:18 - Flushing DNS
. 2022.01.10 16:57:18 - Flush DNS - nscd
I 2022.01.10 16:57:18 - Checking route IPv4
I 2022.01.10 16:57:18 - Checking route IPv6
I 2022.01.10 16:57:19 - Checking DNS
! 2022.01.10 16:57:19 - Connected.
. 2022.01.10 16:57:19 - OpenVPN > Initialization Sequence Completed
. 2022.01.10 17:27:20 - Collect information about AirVPN completed
. 2022.01.10 17:54:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.10 17:54:51 - OpenVPN > VERIFY KU OK
. 2022.01.10 17:54:51 - OpenVPN > Validating certificate extended key usage
. 2022.01.10 17:54:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.10 17:54:51 - OpenVPN > VERIFY EKU OK
. 2022.01.10 17:54:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.10 17:54:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.10 17:54:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.10 17:54:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.10 17:57:27 - Collect information about AirVPN completed
. 2022.01.10 18:52:29 - Above log line repeated 1 times more
. 2022.01.10 18:52:29 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.10 18:52:29 - OpenVPN > VERIFY KU OK
. 2022.01.10 18:52:29 - OpenVPN > Validating certificate extended key usage
. 2022.01.10 18:52:29 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.10 18:52:29 - OpenVPN > VERIFY EKU OK
. 2022.01.10 18:52:29 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.10 18:52:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.10 18:52:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.10 18:52:29 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.10 18:57:42 - Collect information about AirVPN completed
. 2022.01.10 19:50:07 - Above log line repeated 1 times more
. 2022.01.10 19:50:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.10 19:50:07 - OpenVPN > VERIFY KU OK
. 2022.01.10 19:50:07 - OpenVPN > Validating certificate extended key usage
. 2022.01.10 19:50:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.10 19:50:07 - OpenVPN > VERIFY EKU OK
. 2022.01.10 19:50:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.10 19:50:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.10 19:50:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.10 19:50:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.10 19:57:58 - Collect information about AirVPN completed
. 2022.01.10 20:47:45 - Above log line repeated 1 times more
. 2022.01.10 20:47:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.10 20:47:45 - OpenVPN > VERIFY KU OK
. 2022.01.10 20:47:45 - OpenVPN > Validating certificate extended key usage
. 2022.01.10 20:47:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.10 20:47:45 - OpenVPN > VERIFY EKU OK
. 2022.01.10 20:47:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.10 20:47:45 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.10 20:47:45 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.10 20:47:45 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.10 20:58:13 - Collect information about AirVPN completed
. 2022.01.10 21:45:23 - Above log line repeated 1 times more
. 2022.01.10 21:45:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.10 21:45:23 - OpenVPN > VERIFY KU OK
. 2022.01.10 21:45:23 - OpenVPN > Validating certificate extended key usage
. 2022.01.10 21:45:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.10 21:45:23 - OpenVPN > VERIFY EKU OK
. 2022.01.10 21:45:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.10 21:45:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.10 21:45:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.10 21:45:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.10 21:58:29 - Collect information about AirVPN completed
. 2022.01.10 22:43:01 - Above log line repeated 1 times more
. 2022.01.10 22:43:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.10 22:43:01 - OpenVPN > VERIFY KU OK
. 2022.01.10 22:43:01 - OpenVPN > Validating certificate extended key usage
. 2022.01.10 22:43:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.10 22:43:01 - OpenVPN > VERIFY EKU OK
. 2022.01.10 22:43:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.10 22:43:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.10 22:43:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.10 22:43:01 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.10 22:58:44 - Collect information about AirVPN completed
. 2022.01.10 23:40:39 - Above log line repeated 1 times more
. 2022.01.10 23:40:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.10 23:40:39 - OpenVPN > VERIFY KU OK
. 2022.01.10 23:40:39 - OpenVPN > Validating certificate extended key usage
. 2022.01.10 23:40:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.10 23:40:39 - OpenVPN > VERIFY EKU OK
. 2022.01.10 23:40:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.10 23:40:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.10 23:40:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.10 23:40:39 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.10 23:58:58 - Collect information about AirVPN completed
. 2022.01.11 00:38:17 - Above log line repeated 1 times more
. 2022.01.11 00:38:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.11 00:38:17 - OpenVPN > VERIFY KU OK
. 2022.01.11 00:38:17 - OpenVPN > Validating certificate extended key usage
. 2022.01.11 00:38:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.11 00:38:17 - OpenVPN > VERIFY EKU OK
. 2022.01.11 00:38:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.11 00:38:17 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 00:38:17 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 00:38:17 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.11 00:59:13 - Collect information about AirVPN completed
. 2022.01.11 01:35:55 - Above log line repeated 1 times more
. 2022.01.11 01:35:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.11 01:35:55 - OpenVPN > VERIFY KU OK
. 2022.01.11 01:35:55 - OpenVPN > Validating certificate extended key usage
. 2022.01.11 01:35:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.11 01:35:55 - OpenVPN > VERIFY EKU OK
. 2022.01.11 01:35:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.11 01:35:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 01:35:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 01:35:55 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.11 01:59:28 - Collect information about AirVPN completed
. 2022.01.11 02:33:33 - Above log line repeated 1 times more
. 2022.01.11 02:33:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.11 02:33:33 - OpenVPN > VERIFY KU OK
. 2022.01.11 02:33:33 - OpenVPN > Validating certificate extended key usage
. 2022.01.11 02:33:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.11 02:33:33 - OpenVPN > VERIFY EKU OK
. 2022.01.11 02:33:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.11 02:33:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 02:33:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 02:33:33 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.11 02:59:44 - Collect information about AirVPN completed
. 2022.01.11 03:31:11 - Above log line repeated 1 times more
. 2022.01.11 03:31:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.11 03:31:11 - OpenVPN > VERIFY KU OK
. 2022.01.11 03:31:11 - OpenVPN > Validating certificate extended key usage
. 2022.01.11 03:31:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.11 03:31:11 - OpenVPN > VERIFY EKU OK
. 2022.01.11 03:31:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.11 03:31:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 03:31:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 03:31:11 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.11 03:59:59 - Collect information about AirVPN completed
. 2022.01.11 04:28:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.11 04:28:49 - OpenVPN > VERIFY KU OK
. 2022.01.11 04:28:49 - OpenVPN > Validating certificate extended key usage
. 2022.01.11 04:28:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.11 04:28:49 - OpenVPN > VERIFY EKU OK
. 2022.01.11 04:28:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.11 04:28:49 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 04:28:49 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 04:28:49 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.11 04:30:06 - Collect information about AirVPN completed
. 2022.01.11 05:26:27 - Above log line repeated 1 times more
. 2022.01.11 05:26:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.11 05:26:27 - OpenVPN > VERIFY KU OK
. 2022.01.11 05:26:27 - OpenVPN > Validating certificate extended key usage
. 2022.01.11 05:26:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.11 05:26:27 - OpenVPN > VERIFY EKU OK
. 2022.01.11 05:26:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.11 05:26:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 05:26:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 05:26:27 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.11 05:30:22 - Collect information about AirVPN completed
. 2022.01.11 06:24:05 - Above log line repeated 1 times more
. 2022.01.11 06:24:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.11 06:24:05 - OpenVPN > VERIFY KU OK
. 2022.01.11 06:24:05 - OpenVPN > Validating certificate extended key usage
. 2022.01.11 06:24:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.11 06:24:05 - OpenVPN > VERIFY EKU OK
. 2022.01.11 06:24:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.11 06:24:05 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 06:24:05 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 06:24:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.11 06:30:37 - Collect information about AirVPN completed
. 2022.01.11 07:21:43 - Above log line repeated 1 times more
. 2022.01.11 07:21:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.11 07:21:43 - OpenVPN > VERIFY KU OK
. 2022.01.11 07:21:43 - OpenVPN > Validating certificate extended key usage
. 2022.01.11 07:21:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.11 07:21:43 - OpenVPN > VERIFY EKU OK
. 2022.01.11 07:21:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.11 07:21:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 07:21:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 07:21:43 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.11 07:30:53 - Collect information about AirVPN completed
. 2022.01.11 08:19:21 - Above log line repeated 1 times more
. 2022.01.11 08:19:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.11 08:19:21 - OpenVPN > VERIFY KU OK
. 2022.01.11 08:19:21 - OpenVPN > Validating certificate extended key usage
. 2022.01.11 08:19:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.11 08:19:21 - OpenVPN > VERIFY EKU OK
. 2022.01.11 08:19:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.11 08:19:21 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 08:19:21 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 08:19:21 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.11 08:31:09 - Collect information about AirVPN completed
. 2022.01.11 09:16:59 - Above log line repeated 1 times more
. 2022.01.11 09:16:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.11 09:16:59 - OpenVPN > VERIFY KU OK
. 2022.01.11 09:16:59 - OpenVPN > Validating certificate extended key usage
. 2022.01.11 09:16:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.11 09:16:59 - OpenVPN > VERIFY EKU OK
. 2022.01.11 09:16:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.11 09:16:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 09:16:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 09:16:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.11 09:31:24 - Collect information about AirVPN completed
. 2022.01.11 10:14:37 - Above log line repeated 1 times more
. 2022.01.11 10:14:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.11 10:14:37 - OpenVPN > VERIFY KU OK
. 2022.01.11 10:14:37 - OpenVPN > Validating certificate extended key usage
. 2022.01.11 10:14:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.11 10:14:37 - OpenVPN > VERIFY EKU OK
. 2022.01.11 10:14:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.11 10:14:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 10:14:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 10:14:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.11 10:31:38 - Collect information about AirVPN completed
. 2022.01.11 11:12:15 - Above log line repeated 1 times more
. 2022.01.11 11:12:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.11 11:12:15 - OpenVPN > VERIFY KU OK
. 2022.01.11 11:12:15 - OpenVPN > Validating certificate extended key usage
. 2022.01.11 11:12:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.11 11:12:15 - OpenVPN > VERIFY EKU OK
. 2022.01.11 11:12:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.11 11:12:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 11:12:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 11:12:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.11 11:31:53 - Collect information about AirVPN completed
. 2022.01.11 12:09:53 - Above log line repeated 1 times more
. 2022.01.11 12:09:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.11 12:09:53 - OpenVPN > VERIFY KU OK
. 2022.01.11 12:09:53 - OpenVPN > Validating certificate extended key usage
. 2022.01.11 12:09:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.11 12:09:53 - OpenVPN > VERIFY EKU OK
. 2022.01.11 12:09:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.11 12:09:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 12:09:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 12:09:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.11 12:32:06 - Collect information about AirVPN completed
. 2022.01.11 13:07:31 - Above log line repeated 1 times more
. 2022.01.11 13:07:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.11 13:07:31 - OpenVPN > VERIFY KU OK
. 2022.01.11 13:07:31 - OpenVPN > Validating certificate extended key usage
. 2022.01.11 13:07:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.11 13:07:31 - OpenVPN > VERIFY EKU OK
. 2022.01.11 13:07:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.11 13:07:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 13:07:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 13:07:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.11 13:32:20 - Collect information about AirVPN completed
. 2022.01.11 14:05:09 - Above log line repeated 1 times more
. 2022.01.11 14:05:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.11 14:05:09 - OpenVPN > VERIFY KU OK
. 2022.01.11 14:05:09 - OpenVPN > Validating certificate extended key usage
. 2022.01.11 14:05:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.11 14:05:09 - OpenVPN > VERIFY EKU OK
. 2022.01.11 14:05:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.11 14:05:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 14:05:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 14:05:09 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.11 14:32:33 - Collect information about AirVPN completed
. 2022.01.11 14:43:27 - OpenVPN > [Mintaka] Inactivity timeout (--ping-restart), restarting
. 2022.01.11 14:43:27 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2022.01.11 14:43:27 - OpenVPN > Restart pause, 5 second(s)
! 2022.01.11 14:43:27 - Disconnecting
. 2022.01.11 14:43:28 - Routes, removed a route previously added, 184.75.223.219 for gateway 10.24.26.1
. 2022.01.11 14:43:28 - Routes, removed a route previously added, 2606:6080:1002:7:def:437f:f6fa:7759 for gateway fde6:7a:7d20:141a::1
. 2022.01.11 14:43:28 - Sending soft termination signal
. 2022.01.11 14:43:28 - OpenVPN > net_route_v4_del: 184.75.223.221/32 via 192.168.2.1 dev [NULL] table 0 metric -1
. 2022.01.11 14:43:28 - OpenVPN > sitnl_send: rtnl: generic error (-3): No such process
E 2022.01.11 14:43:28 - OpenVPN > ERROR: Linux route delete command failed
. 2022.01.11 14:43:28 - OpenVPN > net_route_v4_del: 0.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1
. 2022.01.11 14:43:28 - OpenVPN > net_route_v4_del: 128.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1
. 2022.01.11 14:43:28 - OpenVPN > delete_route_ipv6(::/3)
. 2022.01.11 14:43:28 - OpenVPN > net_route_v6_del: ::/3 via :: dev tun0 table 0 metric -1
. 2022.01.11 14:43:28 - OpenVPN > delete_route_ipv6(2000::/4)
. 2022.01.11 14:43:28 - OpenVPN > net_route_v6_del: 2000::/4 via :: dev tun0 table 0 metric -1
. 2022.01.11 14:43:28 - OpenVPN > delete_route_ipv6(3000::/4)
. 2022.01.11 14:43:28 - OpenVPN > net_route_v6_del: 3000::/4 via :: dev tun0 table 0 metric -1
. 2022.01.11 14:43:28 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2022.01.11 14:43:28 - OpenVPN > net_route_v6_del: fc00::/7 via :: dev tun0 table 0 metric -1
. 2022.01.11 14:43:28 - OpenVPN > Closing TUN/TAP interface
. 2022.01.11 14:43:28 - OpenVPN > net_addr_v4_del: 10.24.26.159 dev tun0
. 2022.01.11 14:43:28 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:141a::109d/64 dev tun0
. 2022.01.11 14:43:28 - OpenVPN > SIGINT[hard,init_instance] received, process exiting
. 2022.01.11 14:43:28 - Connection terminated.
. 2022.01.11 14:43:28 - DNS of the system restored to original settings (Rename method)
I 2022.01.11 14:43:31 - Checking authorization ...
! 2022.01.11 14:43:31 - Connecting to Mintaka (Canada, Toronto, Ontario)
. 2022.01.11 14:43:32 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021
. 2022.01.11 14:43:32 - OpenVPN > library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
. 2022.01.11 14:43:32 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.01.11 14:43:32 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.01.11 14:43:32 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.01.11 14:43:32 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.01.11 14:43:32 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.221:443
. 2022.01.11 14:43:32 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2022.01.11 14:43:32 - OpenVPN > UDP link local: (not bound)
. 2022.01.11 14:43:32 - OpenVPN > UDP link remote: [AF_INET]184.75.223.221:443
. 2022.01.11 14:43:32 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.221:443, sid=36a447d6 0ce5b54e
. 2022.01.11 14:43:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.11 14:43:32 - OpenVPN > VERIFY KU OK
. 2022.01.11 14:43:32 - OpenVPN > Validating certificate extended key usage
. 2022.01.11 14:43:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.11 14:43:32 - OpenVPN > VERIFY EKU OK
. 2022.01.11 14:43:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.11 14:43:32 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.11 14:43:32 - OpenVPN > [Mintaka] Peer Connection Initiated with [AF_INET]184.75.223.221:443
. 2022.01.11 14:43:32 - OpenVPN > SENT CONTROL [Mintaka]: 'PUSH_REQUEST' (status=1)
. 2022.01.11 14:43:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.26.1,dhcp-option DNS6 fde6:7a:7d20:141a::1,tun-ipv6,route-gateway 10.24.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:141a::109d/64 fde6:7a:7d20:141a::1,ifconfig 10.24.26.159 255.255.255.0,peer-id 8,cipher AES-256-GCM'
. 2022.01.11 14:43:32 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2022.01.11 14:43:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.01.11 14:43:32 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2022.01.11 14:43:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.01.11 14:43:33 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.01.11 14:43:33 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.01.11 14:43:33 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.01.11 14:43:33 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2022.01.11 14:43:33 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2022.01.11 14:43:33 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2022.01.11 14:43:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 14:43:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 14:43:33 - OpenVPN > net_route_v4_best_gw query: dst 0.0.0.0
. 2022.01.11 14:43:33 - OpenVPN > net_route_v4_best_gw result: via 192.168.2.1 dev wlp3s0
. 2022.01.11 14:43:33 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 IFACE=wlp3s0 HWADDR=94:e9:79:9c:be:5f
. 2022.01.11 14:43:33 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2022.01.11 14:43:33 - OpenVPN > net_route_v6_best_gw query: dst ::
. 2022.01.11 14:43:33 - OpenVPN > sitnl_send: rtnl: generic error (-101): Network is unreachable
. 2022.01.11 14:43:33 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2022.01.11 14:43:33 - OpenVPN > TUN/TAP device tun0 opened
. 2022.01.11 14:43:33 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2022.01.11 14:43:33 - OpenVPN > net_iface_up: set tun0 up
. 2022.01.11 14:43:33 - OpenVPN > net_addr_v4_add: 10.24.26.159/24 dev tun0
. 2022.01.11 14:43:33 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2022.01.11 14:43:33 - OpenVPN > net_iface_up: set tun0 up
. 2022.01.11 14:43:33 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:141a::109d/64 dev tun0
. 2022.01.11 14:43:37 - OpenVPN > net_route_v4_add: 184.75.223.221/32 via 192.168.2.1 dev [NULL] table 0 metric -1
. 2022.01.11 14:43:37 - OpenVPN > net_route_v4_add: 0.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1
. 2022.01.11 14:43:37 - OpenVPN > net_route_v4_add: 128.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1
. 2022.01.11 14:43:37 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:141a::1 metric -1) dev tun0
. 2022.01.11 14:43:37 - OpenVPN > net_route_v6_add: ::/3 via :: dev tun0 table 0 metric -1
. 2022.01.11 14:43:37 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:141a::1 metric -1) dev tun0
. 2022.01.11 14:43:37 - OpenVPN > net_route_v6_add: 2000::/4 via :: dev tun0 table 0 metric -1
. 2022.01.11 14:43:37 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:141a::1 metric -1) dev tun0
. 2022.01.11 14:43:37 - OpenVPN > net_route_v6_add: 3000::/4 via :: dev tun0 table 0 metric -1
. 2022.01.11 14:43:37 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:141a::1 metric -1) dev tun0
. 2022.01.11 14:43:37 - OpenVPN > net_route_v6_add: fc00::/7 via :: dev tun0 table 0 metric -1
. 2022.01.11 14:43:37 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2022.01.11 14:43:37 - Routes, added a new route, 184.75.223.219 for gateway 10.24.26.1
. 2022.01.11 14:43:37 - Routes, added a new route, 2606:6080:1002:7:def:437f:f6fa:7759 for gateway fde6:7a:7d20:141a::1
. 2022.01.11 14:43:37 - Flushing DNS
. 2022.01.11 14:43:37 - Flush DNS - nscd
I 2022.01.11 14:43:37 - Checking route IPv4
I 2022.01.11 14:43:37 - Checking route IPv6
I 2022.01.11 14:43:37 - Checking DNS
! 2022.01.11 14:43:38 - Connected.
. 2022.01.11 14:43:38 - OpenVPN > Initialization Sequence Completed
. 2022.01.11 14:58:46 - OpenVPN > [Mintaka] Inactivity timeout (--ping-restart), restarting
. 2022.01.11 14:58:46 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2022.01.11 14:58:46 - OpenVPN > Restart pause, 5 second(s)
! 2022.01.11 14:58:46 - Disconnecting
. 2022.01.11 14:58:46 - Routes, removed a route previously added, 184.75.223.219 for gateway 10.24.26.1
. 2022.01.11 14:58:46 - Routes, removed a route previously added, 2606:6080:1002:7:def:437f:f6fa:7759 for gateway fde6:7a:7d20:141a::1
. 2022.01.11 14:58:46 - Sending soft termination signal
. 2022.01.11 14:58:46 - OpenVPN > net_route_v4_del: 184.75.223.221/32 via 192.168.2.1 dev [NULL] table 0 metric -1
. 2022.01.11 14:58:46 - OpenVPN > sitnl_send: rtnl: generic error (-3): No such process
E 2022.01.11 14:58:46 - OpenVPN > ERROR: Linux route delete command failed
. 2022.01.11 14:58:46 - OpenVPN > net_route_v4_del: 0.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1
. 2022.01.11 14:58:46 - OpenVPN > net_route_v4_del: 128.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1
. 2022.01.11 14:58:46 - OpenVPN > delete_route_ipv6(::/3)
. 2022.01.11 14:58:46 - OpenVPN > net_route_v6_del: ::/3 via :: dev tun0 table 0 metric -1
. 2022.01.11 14:58:46 - OpenVPN > delete_route_ipv6(2000::/4)
. 2022.01.11 14:58:46 - OpenVPN > net_route_v6_del: 2000::/4 via :: dev tun0 table 0 metric -1
. 2022.01.11 14:58:46 - OpenVPN > delete_route_ipv6(3000::/4)
. 2022.01.11 14:58:46 - OpenVPN > net_route_v6_del: 3000::/4 via :: dev tun0 table 0 metric -1
. 2022.01.11 14:58:46 - OpenVPN > delete_route_ipv6(fc00::/7)
. 2022.01.11 14:58:46 - OpenVPN > net_route_v6_del: fc00::/7 via :: dev tun0 table 0 metric -1
. 2022.01.11 14:58:46 - OpenVPN > Closing TUN/TAP interface
. 2022.01.11 14:58:46 - OpenVPN > net_addr_v4_del: 10.24.26.159 dev tun0
. 2022.01.11 14:58:46 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:141a::109d/64 dev tun0
. 2022.01.11 14:58:46 - OpenVPN > SIGINT[hard,init_instance] received, process exiting
. 2022.01.11 14:58:46 - Connection terminated.
. 2022.01.11 14:58:46 - DNS of the system restored to original settings (Rename method)
I 2022.01.11 14:58:49 - Checking authorization ...
! 2022.01.11 14:58:50 - Connecting to Mintaka (Canada, Toronto, Ontario)
. 2022.01.11 14:58:50 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021
. 2022.01.11 14:58:50 - OpenVPN > library versions: OpenSSL 1.1.1m  14 Dec 2021, LZO 2.10
. 2022.01.11 14:58:50 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.01.11 14:58:50 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.01.11 14:58:50 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.01.11 14:58:50 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.01.11 14:58:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.221:443
. 2022.01.11 14:58:50 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2022.01.11 14:58:50 - OpenVPN > UDP link local: (not bound)
. 2022.01.11 14:58:50 - OpenVPN > UDP link remote: [AF_INET]184.75.223.221:443
. 2022.01.11 14:58:50 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.221:443, sid=efdcd155 fd6faf8b
. 2022.01.11 14:58:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.01.11 14:58:50 - OpenVPN > VERIFY KU OK
. 2022.01.11 14:58:50 - OpenVPN > Validating certificate extended key usage
. 2022.01.11 14:58:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.01.11 14:58:50 - OpenVPN > VERIFY EKU OK
. 2022.01.11 14:58:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mintaka, emailAddress=info@airvpn.org
. 2022.01.11 14:58:50 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.01.11 14:58:50 - OpenVPN > [Mintaka] Peer Connection Initiated with [AF_INET]184.75.223.221:443
. 2022.01.11 14:58:51 - OpenVPN > SENT CONTROL [Mintaka]: 'PUSH_REQUEST' (status=1)
. 2022.01.11 14:58:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.24.26.1,dhcp-option DNS6 fde6:7a:7d20:141a::1,tun-ipv6,route-gateway 10.24.26.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:141a::109d/64 fde6:7a:7d20:141a::1,ifconfig 10.24.26.159 255.255.255.0,peer-id 2,cipher AES-256-GCM'
. 2022.01.11 14:58:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2022.01.11 14:58:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.01.11 14:58:51 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2022.01.11 14:58:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.01.11 14:58:51 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.01.11 14:58:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.01.11 14:58:51 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.01.11 14:58:51 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2022.01.11 14:58:51 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2022.01.11 14:58:51 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2022.01.11 14:58:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 14:58:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.01.11 14:58:51 - OpenVPN > net_route_v4_best_gw query: dst 0.0.0.0
. 2022.01.11 14:58:51 - OpenVPN > net_route_v4_best_gw result: via 192.168.2.1 dev wlp3s0
. 2022.01.11 14:58:51 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 IFACE=wlp3s0 HWADDR=94:e9:79:9c:be:5f
. 2022.01.11 14:58:51 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2022.01.11 14:58:51 - OpenVPN > net_route_v6_best_gw query: dst ::
. 2022.01.11 14:58:51 - OpenVPN > sitnl_send: rtnl: generic error (-101): Network is unreachable
. 2022.01.11 14:58:51 - OpenVPN > ROUTE6: default_gateway=UNDEF
. 2022.01.11 14:58:51 - OpenVPN > TUN/TAP device tun0 opened
. 2022.01.11 14:58:51 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2022.01.11 14:58:51 - OpenVPN > net_iface_up: set tun0 up
. 2022.01.11 14:58:51 - OpenVPN > net_addr_v4_add: 10.24.26.159/24 dev tun0
. 2022.01.11 14:58:51 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2022.01.11 14:58:51 - OpenVPN > net_iface_up: set tun0 up
. 2022.01.11 14:58:51 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:141a::109d/64 dev tun0
. 2022.01.11 14:58:56 - OpenVPN > net_route_v4_add: 184.75.223.221/32 via 192.168.2.1 dev [NULL] table 0 metric -1
. 2022.01.11 14:58:56 - OpenVPN > net_route_v4_add: 0.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1
. 2022.01.11 14:58:56 - OpenVPN > net_route_v4_add: 128.0.0.0/1 via 10.24.26.1 dev [NULL] table 0 metric -1
. 2022.01.11 14:58:56 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:141a::1 metric -1) dev tun0
. 2022.01.11 14:58:56 - OpenVPN > net_route_v6_add: ::/3 via :: dev tun0 table 0 metric -1
. 2022.01.11 14:58:56 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:141a::1 metric -1) dev tun0
. 2022.01.11 14:58:56 - OpenVPN > net_route_v6_add: 2000::/4 via :: dev tun0 table 0 metric -1
. 2022.01.11 14:58:56 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:141a::1 metric -1) dev tun0
. 2022.01.11 14:58:56 - OpenVPN > net_route_v6_add: 3000::/4 via :: dev tun0 table 0 metric -1
. 2022.01.11 14:58:56 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:141a::1 metric -1) dev tun0
. 2022.01.11 14:58:56 - OpenVPN > net_route_v6_add: fc00::/7 via :: dev tun0 table 0 metric -1
. 2022.01.11 14:58:56 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2022.01.11 14:58:56 - Routes, added a new route, 184.75.223.219 for gateway 10.24.26.1
. 2022.01.11 14:58:56 - Routes, added a new route, 2606:6080:1002:7:def:437f:f6fa:7759 for gateway fde6:7a:7d20:141a::1
. 2022.01.11 14:58:56 - Flushing DNS
. 2022.01.11 14:58:56 - Flush DNS - nscd
I 2022.01.11 14:58:56 - Checking route IPv4
I 2022.01.11 14:58:56 - Checking route IPv6
I 2022.01.11 14:58:56 - Checking DNS
! 2022.01.11 14:58:57 - Connected.
. 2022.01.11 14:58:57 - OpenVPN > Initialization Sequence Completed

----------------------------
Network Interfaces and Routes:

{
    "support_ipv4": true,
    "support_ipv6": true,
    "routes": [
        {
            "address": "0.0.0.0\/1",
            "gateway": "10.24.26.1",
            "interface": "tun0"
        },
        {
            "address": "0.0.0.0\/0",
            "gateway": "192.168.2.1",
            "interface": "wlp3s0",
            "metric": "600"
        },
        {
            "address": "128.0.0.0\/1",
            "gateway": "10.24.26.1",
            "interface": "tun0"
        },
        {
            "address": "184.75.223.219",
            "gateway": "10.24.26.1",
            "interface": "tun0"
        },
        {
            "address": "184.75.223.221",
            "gateway": "192.168.2.1",
            "interface": "wlp3s0"
        },
        {
            "address": "2606:6080:1002:7:def:437f:f6fa:7759",
            "gateway": "fde6:7a:7d20:141a::1",
            "interface": "tun0",
            "metric": "1024"
        }
    ],
    "interfaces": [
        {
            "friendly": "lo",
            "id": "lo",
            "name": "lo",
            "description": "lo",
            "type": "Loopback",
            "status": "Unknown",
            "bytes_received": "1303407",
            "bytes_sent": "1303407",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "127.0.0.1",
                "::1"
            ],
            "gateways": [],
            "bind": true
        },
        {
            "friendly": "enp4s0f1",
            "id": "enp4s0f1",
            "name": "enp4s0f1",
            "description": "enp4s0f1",
            "type": "Ethernet",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "gateways": [],
            "bind": false
        },
        {
            "friendly": "wlp3s0",
            "id": "wlp3s0",
            "name": "wlp3s0",
            "description": "wlp3s0",
            "type": "Wireless80211",
            "status": "Up",
            "bytes_received": "1565930393",
            "bytes_sent": "2928339700",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "192.168.2.145",
                "fe80::f24a:e07d:a96c:d3d7"
            ],
            "gateways": [
                "192.168.2.1"
            ],
            "bind": true
        },
        {
            "friendly": "tun0",
            "id": "tun0",
            "name": "tun0",
            "description": "tun0",
            "type": "0",
            "status": "Unknown",
            "bytes_received": "2146336",
            "bytes_sent": "532021",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "10.24.26.159",
                "fde6:7a:7d20:141a::109d",
                "fe80::bc7f:3374:67d0:aa68"
            ],
            "gateways": [
                "10.24.26.1",
                "fde6:7a:7d20:141a::1"
            ],
            "bind": true
        }
    ],
    "ipv4-default-gateway": "192.168.2.1",
    "ipv4-default-interface": "wlp3s0"
}
----------------------------
ip addr show:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: enp4s0f1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc fq_codel state DOWN group default qlen 1000
    link/ether 54:ab:3a:f7:65:6b brd ff:ff:ff:ff:ff:ff
4: wlp3s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
    link/ether 94:e9:79:9c:be:5f brd ff:ff:ff:ff:ff:ff
    inet 192.168.2.145/24 brd 192.168.2.255 scope global dynamic noprefixroute wlp3s0
       valid_lft 259004sec preferred_lft 259004sec
    inet6 fe80::f24a:e07d:a96c:d3d7/64 scope link noprefixroute
       valid_lft forever preferred_lft forever
15: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 500
    link/none
    inet 10.24.26.159/24 scope global tun0
       valid_lft forever preferred_lft forever
    inet6 fde6:7a:7d20:141a::109d/64 scope global
       valid_lft forever preferred_lft forever
    inet6 fe80::bc7f:3374:67d0:aa68/64 scope link stable-privacy
       valid_lft forever preferred_lft forever
----------------------------
ip link show:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: enp4s0f1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc fq_codel state DOWN mode DEFAULT group default qlen 1000
    link/ether 54:ab:3a:f7:65:6b brd ff:ff:ff:ff:ff:ff
4: wlp3s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP mode DORMANT group default qlen 1000
    link/ether 94:e9:79:9c:be:5f brd ff:ff:ff:ff:ff:ff
15: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN mode DEFAULT group default qlen 500
    link/none
----------------------------
ip -4 route show:

0.0.0.0/1 via 10.24.26.1 dev tun0
default via 192.168.2.1 dev wlp3s0 proto dhcp metric 600
10.24.26.0/24 dev tun0 proto kernel scope link src 10.24.26.159
128.0.0.0/1 via 10.24.26.1 dev tun0
184.75.223.219 via 10.24.26.1 dev tun0
184.75.223.221 via 192.168.2.1 dev wlp3s0
192.168.2.0/24 dev wlp3s0 proto kernel scope link src 192.168.2.145 metric 600
----------------------------
ip -6 route show:

::1 dev lo proto kernel metric 256 pref medium
::/3 dev tun0 metric 1024 pref medium
2606:6080:1002:7:def:437f:f6fa:7759 via fde6:7a:7d20:141a::1 dev tun0 metric 1024 pref medium
2000::/4 dev tun0 metric 1024 pref medium
3000::/4 dev tun0 metric 1024 pref medium
fde6:7a:7d20:141a::/64 dev tun0 proto kernel metric 256 pref medium
fc00::/7 dev tun0 metric 1024 pref medium
fe80::/64 dev tun0 proto kernel metric 256 pref medium
fe80::/64 dev wlp3s0 proto kernel metric 600 pref medium

Share this post


Link to post
4 minutes ago, OpenSourcerer said:

I see you're on wireless. Can you try using TCP?


I could for diagnostic purposes when I'm done work but I would not be able to permanently make that switch because of the location of the modem.

Share this post


Link to post

I didn't mean a cable/LAN/Ethernet connection, even if it's probably the solution for the issue, but switching the connection protocol to TCP to make it more resistant against interference.

I think what's happening is this: It could be that the signal is either weak and/or experiences too much interference so that you lose connection, which forces the adapter to reconnect to the access point. This causes the routing table to be updated as well by your network manager. OpenVPN doesn't monitor such changes, it alters routes only on connect/disconnect, so the connection is forced to time out.
On reconnect, which means destroying the tunnel and rebuilding it, you get the route deletion error because that particular route was already deleted by the network manager. Therefore, I believe the error not to be the cause but a consequence. The cause could really be an unstable wireless connection.

On which frequency is your wireless network? Sometimes it could help changing it from 2.4 to 5 or vice versa.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...