lpav 2 Posted ... (edited) Hi, I am taking the test here https://www.dnsleaktest.com Both 'standard test' and 'extended test' list my AirVPN server along with 1-4 DNS servers of my ISP provider (I can provide screenshot if needed). 'Reset to Default Settings' and reboot was performed before the final test and post here. There is no other VPN installed/used right now.Some info: * Eddie UI Logs: . 2022.03.09 21:15:39 - Eddie version: 2.21.5beta / linux_x64, System: Linux, Name: Arch Linux, Version: Linux myhostname 5.16.13-arch1-1 #1 SMP PREEMPT Tue, 08 Mar 2022 20:07:36 +0000 x86_64 GNU/Linux, Mono/.Net: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319 . 2022.03.09 21:15:39 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2022.03.09 21:15:39 - Raise system privileges . 2022.03.09 21:15:46 - Reading options from /home/myuser/.config/eddie/default.profile . 2022.03.09 21:15:47 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 (/usr/bin/openvpn) . 2022.03.09 21:15:47 - SSH - Version: OpenSSH_8.9p1, OpenSSL 1.1.1m 14 Dec 2021 (/usr/bin/ssh) I 2022.03.09 21:15:47 - SSL - Not available . 2022.03.09 21:15:47 - curl - Version: 7.82.0 (/usr/bin/curl) . 2022.03.09 21:15:47 - Recovery. Unexpected crash? . 2022.03.09 21:15:47 - IPv6 restored on network adapter (eno2) . 2022.03.09 21:15:47 - IPv6 restored on network adapter (ipv6leakintrf0) . 2022.03.09 21:15:47 - IPv6 restored on network adapter (wlo1) ! 2022.03.09 21:15:47 - Deactivation of Network Lock I 2022.03.09 21:15:50 - Ready . 2022.03.09 21:15:51 - Collect information about AirVPN completed I 2022.03.09 21:15:58 - Session starting. I 2022.03.09 21:15:58 - Checking authorization ... W 2022.03.09 21:15:59 - The server supports IPv6, but IPv6 is disabled at OS level. You need to re-enable it manually (reboot is required) or disable this warning by setting Preferences > Networking > Layer IPv6: Block. W 2022.03.09 21:15:59 - 'Preferences > Networking > Layer IPv6' automatically switched to 'Block'. . 2022.03.09 21:15:59 - IPv6 disabled on network adapter (eno2) . 2022.03.09 21:15:59 - IPv6 disabled on network adapter (wlo1) ! 2022.03.09 21:15:59 - Connecting to Lacaille (Singapore, Singapore) . 2022.03.09 21:15:59 - Routes, add 209.58.173.159/32 for interface "eno2". . 2022.03.09 21:15:59 - Routes, add 209.58.173.159/32 for interface "eno2", already exists. . 2022.03.09 21:15:59 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.03.09 21:15:59 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.03.09 21:15:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 21:15:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 21:15:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 21:15:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 21:15:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]209.58.173.159:443 . 2022.03.09 21:15:59 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.03.09 21:15:59 - OpenVPN > UDP link local: (not bound) . 2022.03.09 21:15:59 - OpenVPN > UDP link remote: [AF_INET]209.58.173.159:443 . 2022.03.09 21:15:59 - OpenVPN > TLS: Initial packet from [AF_INET]209.58.173.159:443, sid=0ef8b0c3 c6186b17 . 2022.03.09 21:15:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.09 21:15:59 - OpenVPN > VERIFY KU OK . 2022.03.09 21:15:59 - OpenVPN > Validating certificate extended key usage . 2022.03.09 21:15:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.09 21:15:59 - OpenVPN > VERIFY EKU OK . 2022.03.09 21:15:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lacaille, emailAddress=info@airvpn.org . 2022.03.09 21:16:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.03.09 21:16:00 - OpenVPN > [Lacaille] Peer Connection Initiated with [AF_INET]209.58.173.159:443 . 2022.03.09 21:16:00 - OpenVPN > SENT CONTROL [Lacaille]: 'PUSH_REQUEST' (status=1) . 2022.03.09 21:16:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.34.1,dhcp-option DNS6 fde6:7a:7d20:1822::1,tun-ipv6,route-gateway 10.28.34.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1822::1034/64 fde6:7a:7d20:1822::1,ifconfig 10.28.34.54 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2022.03.09 21:16:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.09 21:16:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.34.1' . 2022.03.09 21:16:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1822::1' . 2022.03.09 21:16:00 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.09 21:16:00 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1822::1034/64 fde6:7a:7d20:1822::1' . 2022.03.09 21:16:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.09 21:16:00 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.09 21:16:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.09 21:16:00 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.09 21:16:00 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.09 21:16:00 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.03.09 21:16:00 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.09 21:16:00 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.09 21:16:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 21:16:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 21:16:00 - OpenVPN > TUN/TAP device tun0 opened . 2022.03.09 21:16:00 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.03.09 21:16:00 - OpenVPN > net_iface_up: set tun0 up . 2022.03.09 21:16:00 - OpenVPN > net_addr_v4_add: 10.28.34.54/24 dev tun0 . 2022.03.09 21:16:05 - OpenVPN > Initialization Sequence Completed . 2022.03.09 21:16:06 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2022.03.09 21:16:06 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.03.09 21:16:06 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.03.09 21:16:06 - Routes, add 209.58.173.138/32 for interface "tun0". . 2022.03.09 21:16:06 - Routes, skipped for 2001:df1:800:a00e:4::a44e : IPv6 blocked. . 2022.03.09 21:16:06 - Flushing DNS . 2022.03.09 21:16:06 - Flush DNS - nscd I 2022.03.09 21:16:06 - Checking route IPv4 I 2022.03.09 21:16:07 - Checking DNS ! 2022.03.09 21:16:09 - Connected Eddie's System Report: Eddie System/Environment Report - 3/9/2022 - 7:31 PM UTC Eddie version: 2.21.5beta Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: Arch Linux OS version: Linux myhostname 5.16.13-arch1-1 #1 SMP PREEMPT Tue, 08 Mar 2022 20:07:36 +0000 x86_64 GNU/Linux OS architecture: x64 Mono /.Net Framework: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 (/usr/bin/openvpn) Hummingbird: 3.3.2 - Hummingbird - AirVPN OpenVPN 3 Client 1.1.2 - 4 June 2021 (/usr/local/bin/hummingbird) WireGuard: 1.0.0 SSH: OpenSSH_8.9p1, OpenSSL 1.1.1m 14 Dec 2021 (/usr/bin/ssh) SSL: Not available curl: 7.82.0 (/usr/bin/curl) Profile path: /home/myuser/.config/eddie/default.profile Data path: /home/myuser/.config/eddie Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/eddie-ui.exe Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" Network Lock Active: No Connected to VPN: Yes, Lacaille OS support IPv4: Yes OS support IPv6: No Detected DNS: 10.28.34.1 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 365 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: curl: (7) Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True servers.allowlist: a61744e4ad91aec37c94aeffc2d7344e79400c541b06df8f1d7773b130529191 areas.allowlist: ca,jp,nl,sg,es,br,ie proxy.mode: none network.ipv6.mode: block ---------------------------- Logs: . 2022.03.09 21:30:11 - Eddie version: 2.21.5beta / linux_x64, System: Linux, Name: Arch Linux, Version: Linux myhostname 5.16.13-arch1-1 #1 SMP PREEMPT Tue, 08 Mar 2022 20:07:36 +0000 x86_64 GNU/Linux, Mono/.Net: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319 . 2022.03.09 21:30:11 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2022.03.09 21:30:11 - Raise system privileges . 2022.03.09 21:30:14 - Reading options from /home/myuser/.config/eddie/default.profile . 2022.03.09 21:30:15 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 (/usr/bin/openvpn) . 2022.03.09 21:30:15 - SSH - Version: OpenSSH_8.9p1, OpenSSL 1.1.1m 14 Dec 2021 (/usr/bin/ssh) I 2022.03.09 21:30:15 - SSL - Not available . 2022.03.09 21:30:15 - curl - Version: 7.82.0 (/usr/bin/curl) . 2022.03.09 21:30:15 - DNS of the system restored to original settings (Rename method) . 2022.03.09 21:30:15 - Recovery. Unexpected crash? . 2022.03.09 21:30:15 - IPv6 restored on network adapter (eno2) . 2022.03.09 21:30:15 - IPv6 restored on network adapter (wlo1) I 2022.03.09 21:30:18 - Ready . 2022.03.09 21:30:22 - Collect information about AirVPN completed ! 2022.03.09 21:30:35 - Activation of Network Lock - Linux nftables . 2022.03.09 21:30:35 - Network lock not enabled on IPv6 layer. IPv6 seems disabled at system level. I 2022.03.09 21:30:37 - Session starting. F 2022.03.09 21:30:37 - OpenVPN is already running (/usr/bin/openvpn Resolv.conf: $ cat /etc/resolv.conf # Generated by Eddie v2.21.5beta - https://eddie.website - Wednesday, March 9, 2022 7:31:11 PM UTC nameserver 10.28.34.1 $ cat /etc/resolv.conf.eddie # Generated by NetworkManager search home nameserver 192.168.1.1 NetworkManager: $ tree /etc/NetworkManager/ /etc/NetworkManager/ ├── conf.d ├── dispatcher.d │ ├── no-wait.d │ ├── pre-down.d │ └── pre-up.d ├── dnsmasq.d ├── dnsmasq-shared.d ├── NetworkManager.conf └── system-connections [error opening dir] $ cat /etc/NetworkManager/NetworkManager.conf # Configuration file for NetworkManager. # See "man 5 NetworkManager.conf" for details. Openvpn: $ sudo tree /etc/openvpn/ /etc/openvpn/ ├── client └── server 2 directories, 0 files Networking: $ ip a 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever 2: eno2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000 link/ether 00:00:00:00:00:01 brd ff:ff:ff:ff:ff:ff altname enp0s31f6 inet 192.168.1.2/24 brd 192.168.1.255 scope global dynamic eno2 valid_lft 84892sec preferred_lft 84892sec 3: wlo1: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group default qlen 1000 link/ether 00:00:00:00:00:02 brd ff:ff:ff:ff:ff:ff permaddr 24:41:8c:ab:a6:ad altname wlp0s20f3 4: virbr0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default qlen 1000 link/ether 00:00:00:00:00:03 brd ff:ff:ff:ff:ff:ff inet 192.168.122.1/24 brd 192.168.122.255 scope global virbr0 valid_lft forever preferred_lft forever 5: virbr2: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default qlen 1000 link/ether 00:00:00:00:00:04 brd ff:ff:ff:ff:ff:ff 6: virbr1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default qlen 1000 link/ether 00:00:00:00:00:05 brd ff:ff:ff:ff:ff:ff inet 10.0.2.2/24 brd 10.0.2.255 scope global virbr1 valid_lft forever preferred_lft forever 8: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 500 link/none inet 10.28.34.54/24 scope global tun0 valid_lft forever preferred_lft forever $ route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 0.0.0.0 128.0.0.0 U 0 0 0 tun0 0.0.0.0 192.168.1.1 0.0.0.0 UG 100 0 0 eno2 0.0.0.0 192.168.1.1 0.0.0.0 UG 100 0 0 eno2 10.0.2.0 0.0.0.0 255.255.255.0 U 0 0 0 virbr1 10.28.34.0 0.0.0.0 255.255.255.0 U 0 0 0 tun0 128.0.0.0 0.0.0.0 128.0.0.0 U 0 0 0 tun0 192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 eno2 192.168.1.0 0.0.0.0 255.255.255.0 U 100 0 0 eno2 192.168.1.1 0.0.0.0 255.255.255.255 UH 100 0 0 eno2 192.168.122.0 0.0.0.0 255.255.255.0 U 0 0 0 virbr0 209.58.173.138 0.0.0.0 255.255.255.255 UH 0 0 0 tun0 209.58.173.159 192.168.1.1 255.255.255.255 UGH 0 0 0 eno2 $ route -6 Kernel IPv6 routing table Destination Next Hop Flag Met Ref Use If [::]/0 [::] !n -1 1 0 lo [::]/0 [::] !n -1 1 0 lo What else I have tried: Deleted /etc/resolv.conf.eddie Enabling network-lock (doesn't matter I assume, just mentioning) Settings->DNS->DNS Switch Mode: Disabled -> Disconnect -> Connect -> leads to infinite Looping between server pool, can't connect, I assume it fails at "checking DNS" stdout log after setting DNS Switch Mode to Disabled: [...] I 2022.03.09 21:50:25 - Checking authorization ... . 2022.03.09 21:50:26 - IPv6 disabled on network adapter (eno2) . 2022.03.09 21:50:26 - IPv6 disabled on network adapter (wlo1) ! 2022.03.09 21:50:26 - Connecting to Azmidiske (Sweden, Uppsala) . 2022.03.09 21:50:26 - Routes, add 62.102.148.208/32 for interface "eno2". . 2022.03.09 21:50:26 - Routes, add 62.102.148.208/32 for interface "eno2", already exists. . 2022.03.09 21:50:26 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.03.09 21:50:26 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.03.09 21:50:26 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 21:50:26 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 21:50:26 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 21:50:26 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 21:50:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.208:443 . 2022.03.09 21:50:26 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.03.09 21:50:26 - OpenVPN > UDP link local: (not bound) . 2022.03.09 21:50:26 - OpenVPN > UDP link remote: [AF_INET]62.102.148.208:443 . 2022.03.09 21:50:26 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.208:443, sid=dab05c11 6caf74dc . 2022.03.09 21:50:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.09 21:50:26 - OpenVPN > VERIFY KU OK . 2022.03.09 21:50:26 - OpenVPN > Validating certificate extended key usage . 2022.03.09 21:50:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.09 21:50:26 - OpenVPN > VERIFY EKU OK . 2022.03.09 21:50:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Azmidiske, emailAddress=info@airvpn.org . 2022.03.09 21:50:26 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.03.09 21:50:26 - OpenVPN > [Azmidiske] Peer Connection Initiated with [AF_INET]62.102.148.208:443 . 2022.03.09 21:50:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.11.34.1,dhcp-option DNS6 fde6:7a:7d20:722::1,tun-ipv6,route-gateway 10.11.34.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:722::1024/64 fde6:7a:7d20:722::1,ifconfig 10.11.34.38 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2022.03.09 21:50:27 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.09 21:50:27 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.11.34.1' . 2022.03.09 21:50:27 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:722::1' . 2022.03.09 21:50:27 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.09 21:50:27 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:722::1024/64 fde6:7a:7d20:722::1' . 2022.03.09 21:50:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.09 21:50:27 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.09 21:50:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.09 21:50:27 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.09 21:50:27 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.09 21:50:27 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.03.09 21:50:27 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.09 21:50:27 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.09 21:50:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 21:50:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 21:50:27 - OpenVPN > TUN/TAP device tun0 opened . 2022.03.09 21:50:27 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.03.09 21:50:27 - OpenVPN > net_iface_up: set tun0 up . 2022.03.09 21:50:27 - OpenVPN > net_addr_v4_add: 10.11.34.38/24 dev tun0 . 2022.03.09 21:50:31 - OpenVPN > Initialization Sequence Completed . 2022.03.09 21:50:31 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.03.09 21:50:31 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.03.09 21:50:31 - Routes, add 62.102.148.154/32 for interface "tun0". . 2022.03.09 21:50:31 - Routes, skipped for 2a00:1520:27:1:dc5a:b7fa:4950:47c4 : IPv6 blocked. . 2022.03.09 21:50:31 - Flushing DNS . 2022.03.09 21:50:31 - Flush DNS - nscd I 2022.03.09 21:50:31 - Checking route IPv4 I 2022.03.09 21:50:32 - Checking DNS . 2022.03.09 21:50:39 - Checking DNS (4° try) . 2022.03.09 21:50:44 - Checking DNS (5° try) E 2022.03.09 21:50:44 - Checking DNS failed, last reason: Checking DNS failed: ! 2022.03.09 21:50:44 - Disconnecting . 2022.03.09 21:50:44 - Sending soft termination signal . 2022.03.09 21:50:44 - OpenVPN > event_wait : Interrupted system call (code=4) . 2022.03.09 21:50:44 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.03.09 21:50:49 - OpenVPN > Closing TUN/TAP interface . 2022.03.09 21:50:49 - OpenVPN > net_addr_v4_del: 10.11.34.38 dev tun0 . 2022.03.09 21:50:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.03.09 21:50:49 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 21:50:49 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 21:50:49 - Routes, delete 62.102.148.208/32 for interface "eno2". . 2022.03.09 21:50:49 - Routes, delete 62.102.148.154/32 for interface "tun0", not exists. . 2022.03.09 21:50:49 - Routes, skipped for 2a00:1520:27:1:dc5a:b7fa:4950:47c4 : IPv6 blocked. . 2022.03.09 21:50:49 - Routes, delete 62.102.148.208/32 for interface "eno2", not exists. . 2022.03.09 21:50:49 - IPv6 restored on network adapter (eno2) . 2022.03.09 21:50:49 - IPv6 restored on network adapter (wlo1) . 2022.03.09 21:50:49 - Connection terminated. [...] Any thoughts on how to troubleshoot further? Thanks Edited ... by lpav forgot one step Share this post Link to post
OpenSourcerer 1435 Posted ... 11 minutes ago, lpav said: Settings->DNS->DNS Switch Mode: Disabled -> Disconnect -> Connect -> leads to infinite Looping between server pool, can't connect, I assume it fails at "checking DNS" Did you also uncheck Check AirVPN DNS below that, because otherwise the constant reconnects are logical. The system report of Eddie is cut, so there are no data on the interface configuration which is kinda interesting if you suspect the DNS is not applied exclusively. It also shows unrelated data. Your logs detailing a connection is 21:15, but the report is 15 minutes later and doesn't contain the original connection logs. Please don't copy the logs if you're going to copy the system report output, the logs are included there. Since you're running the beta, you could take advantage of the Upload system report button and paste the link you're presented with. The paste is deleted after some time. 1 lpav reacted to this Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
lpav 2 Posted ... Thanks for the prompt reply! You are right, I didn't uncheck Check AirVPN DNS, after unchecking it connects normally. However now I get a worse result, only my ISP servers are shown in the dnsleak test results. Apologies for any inconsistencies in the previous post. New Eddie System Report is below.Note: I would prefer to avoid the automatic submission system, becuase I want to redact hostname and OS's username. Eddie System/Environment Report - 3/9/2022 - 8:45 PM UTC Eddie version: 2.21.5beta Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: Arch Linux OS version: Linux myhost 5.16.13-arch1-1 #1 SMP PREEMPT Tue, 08 Mar 2022 20:07:36 +0000 x86_64 GNU/Linux OS architecture: x64 Mono /.Net Framework: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 (/usr/bin/openvpn) Hummingbird: 3.3.2 - Hummingbird - AirVPN OpenVPN 3 Client 1.1.2 - 4 June 2021 (/usr/local/bin/hummingbird) WireGuard: 1.0.0 SSH: OpenSSH_8.9p1, OpenSSL 1.1.1m 14 Dec 2021 (/usr/bin/ssh) SSL: Not available curl: 7.82.0 (/usr/bin/curl) Profile path: /home/myuser/.config/eddie/default.profile Data path: /home/myuser/.config/eddie Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/eddie-ui.exe Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" Network Lock Active: Yes, Linux nftables Connected to VPN: Yes, Adhara OS support IPv4: Yes OS support IPv6: No Detected DNS: 192.168.1.1, fe80::1 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 68 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: curl: (7) Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True servers.allowlist: 19b5c7333f2cce1a07c093e556c7fa68af4cea13237d528fd9100c6190250112,eb1b1573931f127e991a7cd60ed29c14133dfc19ef4efd304130d936fc58024a,2f8e793e1585c62c2d65cd8ecc5ff074e157a290f922f8355523800de9ce049c,a61744e4ad91aec37c94aeffc2d7344e79400c541b06df8f1d7773b130529191,d6ea0472c38c953aeb0f16363090aaacc0943b364b0c7593c4c3d1d9e2225c76 areas.allowlist: de,ca,jp,nl,sg,es,br,ie proxy.mode: none dns.mode: none dns.check: False network.ipv6.mode: block ---------------------------- Logs: . 2022.03.09 21:55:16 - Eddie version: 2.21.5beta / linux_x64, System: Linux, Name: Arch Linux, Version: Linux myhost 5.16.13-arch1-1 #1 SMP PREEMPT Tue, 08 Mar 2022 20:07:36 +0000 x86_64 GNU/Linux, Mono/.Net: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319 . 2022.03.09 21:55:16 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2022.03.09 21:55:16 - Raise system privileges . 2022.03.09 21:55:20 - Reading options from /home/myuser/.config/eddie/default.profile . 2022.03.09 21:55:20 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 (/usr/bin/openvpn) . 2022.03.09 21:55:20 - SSH - Version: OpenSSH_8.9p1, OpenSSL 1.1.1m 14 Dec 2021 (/usr/bin/ssh) I 2022.03.09 21:55:20 - SSL - Not available . 2022.03.09 21:55:20 - curl - Version: 7.82.0 (/usr/bin/curl) I 2022.03.09 21:55:24 - Ready . 2022.03.09 21:55:25 - Collect information about AirVPN completed ! 2022.03.09 22:05:58 - Activation of Network Lock - Linux nftables . 2022.03.09 22:05:58 - Network lock not enabled on IPv6 layer. IPv6 seems disabled at system level. I 2022.03.09 22:06:06 - Session starting. I 2022.03.09 22:06:06 - Checking authorization ... . 2022.03.09 22:06:06 - IPv6 disabled on network adapter (eno2) . 2022.03.09 22:06:06 - IPv6 disabled on network adapter (wlo1) ! 2022.03.09 22:06:06 - Connecting to Ain (Sweden, Stockholm) . 2022.03.09 22:06:06 - Routes, add 128.127.104.82/32 for interface "eno2". . 2022.03.09 22:06:06 - Routes, add 128.127.104.82/32 for interface "eno2", already exists. . 2022.03.09 22:06:06 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.03.09 22:06:06 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.03.09 22:06:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:06:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:06:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:06:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:06:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]128.127.104.82:443 . 2022.03.09 22:06:06 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.03.09 22:06:06 - OpenVPN > UDP link local: (not bound) . 2022.03.09 22:06:06 - OpenVPN > UDP link remote: [AF_INET]128.127.104.82:443 . 2022.03.09 22:06:06 - OpenVPN > TLS: Initial packet from [AF_INET]128.127.104.82:443, sid=e9a68159 ef1bb1ff . 2022.03.09 22:06:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.09 22:06:06 - OpenVPN > VERIFY KU OK . 2022.03.09 22:06:06 - OpenVPN > Validating certificate extended key usage . 2022.03.09 22:06:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.09 22:06:06 - OpenVPN > VERIFY EKU OK . 2022.03.09 22:06:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ain, emailAddress=info@airvpn.org . 2022.03.09 22:06:07 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.03.09 22:06:07 - OpenVPN > [Ain] Peer Connection Initiated with [AF_INET]128.127.104.82:443 . 2022.03.09 22:06:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.64.2.1,dhcp-option DNS6 fde6:7a:7d20:3c02::1,tun-ipv6,route-gateway 10.64.2.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:3c02::10f4/64 fde6:7a:7d20:3c02::1,ifconfig 10.64.2.246 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.03.09 22:06:07 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.09 22:06:07 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.64.2.1' . 2022.03.09 22:06:07 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:3c02::1' . 2022.03.09 22:06:07 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.09 22:06:07 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:3c02::10f4/64 fde6:7a:7d20:3c02::1' . 2022.03.09 22:06:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.09 22:06:07 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.09 22:06:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.09 22:06:07 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.09 22:06:07 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.09 22:06:07 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.03.09 22:06:07 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.09 22:06:07 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.09 22:06:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:06:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:06:07 - OpenVPN > TUN/TAP device tun0 opened . 2022.03.09 22:06:07 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.03.09 22:06:07 - OpenVPN > net_iface_up: set tun0 up . 2022.03.09 22:06:07 - OpenVPN > net_addr_v4_add: 10.64.2.246/24 dev tun0 . 2022.03.09 22:06:13 - OpenVPN > Initialization Sequence Completed . 2022.03.09 22:06:13 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2022.03.09 22:06:13 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.03.09 22:06:13 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.03.09 22:06:13 - Routes, add 128.127.104.80/32 for interface "tun0". . 2022.03.09 22:06:13 - Routes, skipped for 2a00:7142:20:c913:23fd:24da:7ace:fdf8 : IPv6 blocked. . 2022.03.09 22:06:13 - Flushing DNS . 2022.03.09 22:06:13 - Flush DNS - nscd I 2022.03.09 22:06:13 - Checking route IPv4 I 2022.03.09 22:06:14 - Checking DNS ! 2022.03.09 22:06:14 - Connected. ! 2022.03.09 22:07:33 - Disconnecting . 2022.03.09 22:07:33 - Sending soft termination signal . 2022.03.09 22:07:33 - OpenVPN > event_wait : Interrupted system call (code=4) . 2022.03.09 22:07:33 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.03.09 22:07:38 - OpenVPN > Closing TUN/TAP interface . 2022.03.09 22:07:38 - OpenVPN > net_addr_v4_del: 10.64.2.246 dev tun0 . 2022.03.09 22:07:38 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.03.09 22:07:38 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:07:38 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:07:38 - Routes, delete 128.127.104.82/32 for interface "eno2". . 2022.03.09 22:07:38 - Routes, delete 128.127.104.80/32 for interface "tun0", not exists. . 2022.03.09 22:07:38 - Routes, skipped for 2a00:7142:20:c913:23fd:24da:7ace:fdf8 : IPv6 blocked. . 2022.03.09 22:07:38 - Routes, delete 128.127.104.82/32 for interface "eno2", not exists. . 2022.03.09 22:07:38 - IPv6 restored on network adapter (eno2) . 2022.03.09 22:07:38 - IPv6 restored on network adapter (wlo1) . 2022.03.09 22:07:38 - DNS of the system restored to original settings (Rename method) . 2022.03.09 22:07:38 - Connection terminated. . 2022.03.09 22:07:38 - Flushing DNS . 2022.03.09 22:07:38 - Flush DNS - nscd ! 2022.03.09 22:07:38 - Session terminated. I 2022.03.09 22:08:22 - Session starting. I 2022.03.09 22:08:22 - Checking authorization ... . 2022.03.09 22:08:22 - IPv6 disabled on network adapter (eno2) . 2022.03.09 22:08:22 - IPv6 disabled on network adapter (wlo1) ! 2022.03.09 22:08:22 - Connecting to Ain (Sweden, Stockholm) . 2022.03.09 22:08:22 - Routes, add 128.127.104.82/32 for interface "eno2". . 2022.03.09 22:08:22 - Routes, add 128.127.104.82/32 for interface "eno2", already exists. . 2022.03.09 22:08:22 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.03.09 22:08:22 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.03.09 22:08:22 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:08:22 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:08:22 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:08:22 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:08:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]128.127.104.82:443 . 2022.03.09 22:08:22 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.03.09 22:08:22 - OpenVPN > UDP link local: (not bound) . 2022.03.09 22:08:22 - OpenVPN > UDP link remote: [AF_INET]128.127.104.82:443 . 2022.03.09 22:08:22 - OpenVPN > TLS: Initial packet from [AF_INET]128.127.104.82:443, sid=28c25a31 2ecc356b . 2022.03.09 22:08:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.09 22:08:22 - OpenVPN > VERIFY KU OK . 2022.03.09 22:08:22 - OpenVPN > Validating certificate extended key usage . 2022.03.09 22:08:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.09 22:08:22 - OpenVPN > VERIFY EKU OK . 2022.03.09 22:08:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ain, emailAddress=info@airvpn.org . 2022.03.09 22:08:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.03.09 22:08:23 - OpenVPN > [Ain] Peer Connection Initiated with [AF_INET]128.127.104.82:443 . 2022.03.09 22:08:23 - OpenVPN > SENT CONTROL [Ain]: 'PUSH_REQUEST' (status=1) . 2022.03.09 22:08:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.64.2.1,dhcp-option DNS6 fde6:7a:7d20:3c02::1,tun-ipv6,route-gateway 10.64.2.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:3c02::10f4/64 fde6:7a:7d20:3c02::1,ifconfig 10.64.2.246 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.03.09 22:08:23 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.09 22:08:23 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.64.2.1' . 2022.03.09 22:08:23 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:3c02::1' . 2022.03.09 22:08:23 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.09 22:08:23 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:3c02::10f4/64 fde6:7a:7d20:3c02::1' . 2022.03.09 22:08:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.09 22:08:23 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.09 22:08:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.09 22:08:23 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.09 22:08:23 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.09 22:08:23 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.03.09 22:08:23 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.09 22:08:23 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.09 22:08:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:08:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:08:23 - OpenVPN > TUN/TAP device tun0 opened . 2022.03.09 22:08:23 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.03.09 22:08:23 - OpenVPN > net_iface_up: set tun0 up . 2022.03.09 22:08:23 - OpenVPN > net_addr_v4_add: 10.64.2.246/24 dev tun0 . 2022.03.09 22:08:28 - OpenVPN > Initialization Sequence Completed . 2022.03.09 22:08:28 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.03.09 22:08:28 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.03.09 22:08:28 - Routes, add 128.127.104.80/32 for interface "tun0". . 2022.03.09 22:08:28 - Routes, skipped for 2a00:7142:20:c913:23fd:24da:7ace:fdf8 : IPv6 blocked. . 2022.03.09 22:08:28 - Flushing DNS . 2022.03.09 22:08:28 - Flush DNS - nscd I 2022.03.09 22:08:28 - Checking route IPv4 I 2022.03.09 22:08:29 - Checking DNS . 2022.03.09 22:08:36 - Checking DNS (4° try) . 2022.03.09 22:08:40 - Checking DNS (5° try) E 2022.03.09 22:08:41 - Checking DNS failed, last reason: Checking DNS failed: tqqccvakykhrfpdpnhciluvcrkqifuag ! 2022.03.09 22:08:41 - Disconnecting . 2022.03.09 22:08:41 - Sending soft termination signal . 2022.03.09 22:08:41 - OpenVPN > event_wait : Interrupted system call (code=4) . 2022.03.09 22:08:41 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.03.09 22:08:46 - OpenVPN > Closing TUN/TAP interface . 2022.03.09 22:08:46 - OpenVPN > net_addr_v4_del: 10.64.2.246 dev tun0 . 2022.03.09 22:08:46 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.03.09 22:08:47 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:08:47 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:08:47 - Routes, delete 128.127.104.82/32 for interface "eno2". . 2022.03.09 22:08:47 - Routes, delete 128.127.104.80/32 for interface "tun0", not exists. . 2022.03.09 22:08:47 - Routes, skipped for 2a00:7142:20:c913:23fd:24da:7ace:fdf8 : IPv6 blocked. . 2022.03.09 22:08:47 - Routes, delete 128.127.104.82/32 for interface "eno2", not exists. . 2022.03.09 22:08:47 - IPv6 restored on network adapter (eno2) . 2022.03.09 22:08:47 - IPv6 restored on network adapter (wlo1) . 2022.03.09 22:08:47 - Connection terminated. I 2022.03.09 22:08:50 - Checking authorization ... . 2022.03.09 22:08:50 - IPv6 disabled on network adapter (eno2) . 2022.03.09 22:08:50 - IPv6 disabled on network adapter (wlo1) ! 2022.03.09 22:08:50 - Connecting to Azmidiske (Sweden, Uppsala) . 2022.03.09 22:08:50 - Routes, add 62.102.148.208/32 for interface "eno2". . 2022.03.09 22:08:50 - Routes, add 62.102.148.208/32 for interface "eno2", already exists. . 2022.03.09 22:08:51 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.03.09 22:08:51 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.03.09 22:08:51 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:08:51 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:08:51 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:08:51 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:08:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.208:443 . 2022.03.09 22:08:51 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.03.09 22:08:51 - OpenVPN > UDP link local: (not bound) . 2022.03.09 22:08:51 - OpenVPN > UDP link remote: [AF_INET]62.102.148.208:443 . 2022.03.09 22:08:51 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.208:443, sid=65ebba91 2b192371 . 2022.03.09 22:08:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.09 22:08:51 - OpenVPN > VERIFY KU OK . 2022.03.09 22:08:51 - OpenVPN > Validating certificate extended key usage . 2022.03.09 22:08:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.09 22:08:51 - OpenVPN > VERIFY EKU OK . 2022.03.09 22:08:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Azmidiske, emailAddress=info@airvpn.org . 2022.03.09 22:08:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.03.09 22:08:51 - OpenVPN > [Azmidiske] Peer Connection Initiated with [AF_INET]62.102.148.208:443 . 2022.03.09 22:08:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.11.34.1,dhcp-option DNS6 fde6:7a:7d20:722::1,tun-ipv6,route-gateway 10.11.34.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:722::1024/64 fde6:7a:7d20:722::1,ifconfig 10.11.34.38 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2022.03.09 22:08:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.09 22:08:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.11.34.1' . 2022.03.09 22:08:51 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:722::1' . 2022.03.09 22:08:51 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.09 22:08:51 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:722::1024/64 fde6:7a:7d20:722::1' . 2022.03.09 22:08:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.09 22:08:51 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.09 22:08:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.09 22:08:51 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.09 22:08:51 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.09 22:08:51 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.03.09 22:08:51 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.09 22:08:51 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.09 22:08:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:08:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:08:51 - OpenVPN > TUN/TAP device tun0 opened . 2022.03.09 22:08:51 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.03.09 22:08:51 - OpenVPN > net_iface_up: set tun0 up . 2022.03.09 22:08:51 - OpenVPN > net_addr_v4_add: 10.11.34.38/24 dev tun0 . 2022.03.09 22:08:57 - OpenVPN > Initialization Sequence Completed . 2022.03.09 22:08:57 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.03.09 22:08:57 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.03.09 22:08:57 - Routes, add 62.102.148.154/32 for interface "tun0". . 2022.03.09 22:08:57 - Routes, skipped for 2a00:1520:27:1:dc5a:b7fa:4950:47c4 : IPv6 blocked. . 2022.03.09 22:08:57 - Flushing DNS . 2022.03.09 22:08:57 - Flush DNS - nscd I 2022.03.09 22:08:57 - Checking route IPv4 I 2022.03.09 22:08:57 - Checking DNS . 2022.03.09 22:09:05 - Checking DNS (4° try) . 2022.03.09 22:09:09 - Checking DNS (5° try) E 2022.03.09 22:09:09 - Checking DNS failed, last reason: Checking DNS failed: ! 2022.03.09 22:09:09 - Disconnecting . 2022.03.09 22:09:09 - Sending soft termination signal . 2022.03.09 22:09:10 - OpenVPN > event_wait : Interrupted system call (code=4) . 2022.03.09 22:09:10 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.03.09 22:09:15 - OpenVPN > Closing TUN/TAP interface . 2022.03.09 22:09:15 - OpenVPN > net_addr_v4_del: 10.11.34.38 dev tun0 . 2022.03.09 22:09:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.03.09 22:09:15 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:09:15 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:09:15 - Routes, delete 62.102.148.208/32 for interface "eno2". . 2022.03.09 22:09:15 - Routes, delete 62.102.148.154/32 for interface "tun0", not exists. . 2022.03.09 22:09:15 - Routes, skipped for 2a00:1520:27:1:dc5a:b7fa:4950:47c4 : IPv6 blocked. . 2022.03.09 22:09:15 - Routes, delete 62.102.148.208/32 for interface "eno2", not exists. . 2022.03.09 22:09:15 - IPv6 restored on network adapter (eno2) . 2022.03.09 22:09:15 - IPv6 restored on network adapter (wlo1) . 2022.03.09 22:09:15 - Connection terminated. I 2022.03.09 22:09:18 - Checking authorization ... . 2022.03.09 22:09:19 - IPv6 disabled on network adapter (eno2) . 2022.03.09 22:09:19 - IPv6 disabled on network adapter (wlo1) ! 2022.03.09 22:09:19 - Connecting to Mekbuda (Spain, Madrid) . 2022.03.09 22:09:19 - Routes, add 185.93.182.173/32 for interface "eno2". . 2022.03.09 22:09:19 - Routes, add 185.93.182.173/32 for interface "eno2", already exists. . 2022.03.09 22:09:19 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.03.09 22:09:19 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.03.09 22:09:19 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:09:19 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:09:19 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:09:19 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:09:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.93.182.173:443 . 2022.03.09 22:09:19 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.03.09 22:09:19 - OpenVPN > UDP link local: (not bound) . 2022.03.09 22:09:19 - OpenVPN > UDP link remote: [AF_INET]185.93.182.173:443 . 2022.03.09 22:09:19 - OpenVPN > TLS: Initial packet from [AF_INET]185.93.182.173:443, sid=a911ebd1 66d48933 . 2022.03.09 22:09:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.09 22:09:19 - OpenVPN > VERIFY KU OK . 2022.03.09 22:09:19 - OpenVPN > Validating certificate extended key usage . 2022.03.09 22:09:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.09 22:09:19 - OpenVPN > VERIFY EKU OK . 2022.03.09 22:09:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mekbuda, emailAddress=info@airvpn.org . 2022.03.09 22:09:19 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.03.09 22:09:19 - OpenVPN > [Mekbuda] Peer Connection Initiated with [AF_INET]185.93.182.173:443 . 2022.03.09 22:09:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.21.194.1,dhcp-option DNS6 fde6:7a:7d20:11c2::1,tun-ipv6,route-gateway 10.21.194.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:11c2::10de/64 fde6:7a:7d20:11c2::1,ifconfig 10.21.194.224 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2022.03.09 22:09:19 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.09 22:09:19 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.21.194.1' . 2022.03.09 22:09:19 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:11c2::1' . 2022.03.09 22:09:19 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.09 22:09:19 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:11c2::10de/64 fde6:7a:7d20:11c2::1' . 2022.03.09 22:09:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.09 22:09:19 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.09 22:09:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.09 22:09:19 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.09 22:09:19 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.09 22:09:19 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.03.09 22:09:19 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.09 22:09:19 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.09 22:09:19 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:09:19 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:09:19 - OpenVPN > TUN/TAP device tun0 opened . 2022.03.09 22:09:19 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.03.09 22:09:19 - OpenVPN > net_iface_up: set tun0 up . 2022.03.09 22:09:19 - OpenVPN > net_addr_v4_add: 10.21.194.224/24 dev tun0 . 2022.03.09 22:09:24 - OpenVPN > Initialization Sequence Completed . 2022.03.09 22:09:24 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.03.09 22:09:24 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.03.09 22:09:24 - Routes, add 185.93.182.171/32 for interface "tun0". . 2022.03.09 22:09:24 - Routes, skipped for 2001:ac8:23:13:31aa:42ae:c1f7:cccb : IPv6 blocked. . 2022.03.09 22:09:24 - Flushing DNS . 2022.03.09 22:09:24 - Flush DNS - nscd I 2022.03.09 22:09:24 - Checking route IPv4 I 2022.03.09 22:09:25 - Checking DNS . 2022.03.09 22:09:32 - Checking DNS (4° try) . 2022.03.09 22:09:36 - Checking DNS (5° try) E 2022.03.09 22:09:37 - Checking DNS failed, last reason: Checking DNS failed: ! 2022.03.09 22:09:37 - Disconnecting . 2022.03.09 22:09:37 - Sending soft termination signal . 2022.03.09 22:09:37 - OpenVPN > event_wait : Interrupted system call (code=4) . 2022.03.09 22:09:37 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.03.09 22:09:43 - OpenVPN > Closing TUN/TAP interface . 2022.03.09 22:09:43 - OpenVPN > net_addr_v4_del: 10.21.194.224 dev tun0 . 2022.03.09 22:09:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.03.09 22:09:43 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:09:43 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:09:43 - Routes, delete 185.93.182.173/32 for interface "eno2". . 2022.03.09 22:09:43 - Routes, delete 185.93.182.171/32 for interface "tun0", not exists. . 2022.03.09 22:09:43 - Routes, skipped for 2001:ac8:23:13:31aa:42ae:c1f7:cccb : IPv6 blocked. . 2022.03.09 22:09:43 - Routes, delete 185.93.182.173/32 for interface "eno2", not exists. . 2022.03.09 22:09:43 - IPv6 restored on network adapter (eno2) . 2022.03.09 22:09:43 - IPv6 restored on network adapter (wlo1) . 2022.03.09 22:09:43 - Connection terminated. I 2022.03.09 22:09:46 - Checking authorization ... . 2022.03.09 22:09:46 - IPv6 disabled on network adapter (eno2) . 2022.03.09 22:09:46 - IPv6 disabled on network adapter (wlo1) ! 2022.03.09 22:09:46 - Connecting to Adhara (Germany, Frankfurt) . 2022.03.09 22:09:46 - Routes, add 185.104.184.45/32 for interface "eno2". . 2022.03.09 22:09:47 - Routes, add 185.104.184.45/32 for interface "eno2", already exists. . 2022.03.09 22:09:47 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.03.09 22:09:47 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.03.09 22:09:47 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:09:47 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:09:47 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:09:47 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:09:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.104.184.45:443 . 2022.03.09 22:09:47 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.03.09 22:09:47 - OpenVPN > UDP link local: (not bound) . 2022.03.09 22:09:47 - OpenVPN > UDP link remote: [AF_INET]185.104.184.45:443 . 2022.03.09 22:09:47 - OpenVPN > TLS: Initial packet from [AF_INET]185.104.184.45:443, sid=3a8a452c c5dfad3e . 2022.03.09 22:09:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.09 22:09:47 - OpenVPN > VERIFY KU OK . 2022.03.09 22:09:47 - OpenVPN > Validating certificate extended key usage . 2022.03.09 22:09:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.09 22:09:47 - OpenVPN > VERIFY EKU OK . 2022.03.09 22:09:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Adhara, emailAddress=info@airvpn.org . 2022.03.09 22:09:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.03.09 22:09:47 - OpenVPN > [Adhara] Peer Connection Initiated with [AF_INET]185.104.184.45:443 . 2022.03.09 22:09:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.4.162.1,dhcp-option DNS6 fde6:7a:7d20:a2::1,tun-ipv6,route-gateway 10.4.162.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:a2::100d/64 fde6:7a:7d20:a2::1,ifconfig 10.4.162.15 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2022.03.09 22:09:47 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.09 22:09:47 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.4.162.1' . 2022.03.09 22:09:47 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:a2::1' . 2022.03.09 22:09:47 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.09 22:09:47 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:a2::100d/64 fde6:7a:7d20:a2::1' . 2022.03.09 22:09:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.09 22:09:47 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.09 22:09:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.09 22:09:47 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.09 22:09:47 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.09 22:09:47 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.03.09 22:09:47 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.09 22:09:47 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.09 22:09:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:09:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:09:47 - OpenVPN > TUN/TAP device tun0 opened . 2022.03.09 22:09:47 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.03.09 22:09:47 - OpenVPN > net_iface_up: set tun0 up . 2022.03.09 22:09:47 - OpenVPN > net_addr_v4_add: 10.4.162.15/24 dev tun0 . 2022.03.09 22:09:52 - OpenVPN > Initialization Sequence Completed . 2022.03.09 22:09:52 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.03.09 22:09:52 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.03.09 22:09:52 - Routes, add 185.104.184.43/32 for interface "tun0". . 2022.03.09 22:09:52 - Routes, skipped for 2001:ac8:20:5:e56b:4c39:f245:7761 : IPv6 blocked. . 2022.03.09 22:09:52 - Flushing DNS . 2022.03.09 22:09:52 - Flush DNS - nscd I 2022.03.09 22:09:52 - Checking route IPv4 I 2022.03.09 22:09:53 - Checking DNS . 2022.03.09 22:10:00 - Checking DNS (4° try) . 2022.03.09 22:10:04 - Checking DNS (5° try) E 2022.03.09 22:10:04 - Checking DNS failed, last reason: Checking DNS failed: ! 2022.03.09 22:10:04 - Disconnecting . 2022.03.09 22:10:04 - Sending soft termination signal . 2022.03.09 22:10:04 - OpenVPN > event_wait : Interrupted system call (code=4) . 2022.03.09 22:10:04 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.03.09 22:10:09 - OpenVPN > Closing TUN/TAP interface . 2022.03.09 22:10:09 - OpenVPN > net_addr_v4_del: 10.4.162.15 dev tun0 . 2022.03.09 22:10:09 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.03.09 22:10:09 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:10:09 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:10:09 - Routes, delete 185.104.184.45/32 for interface "eno2". . 2022.03.09 22:10:09 - Routes, delete 185.104.184.43/32 for interface "tun0", not exists. . 2022.03.09 22:10:09 - Routes, skipped for 2001:ac8:20:5:e56b:4c39:f245:7761 : IPv6 blocked. . 2022.03.09 22:10:09 - Routes, delete 185.104.184.45/32 for interface "eno2", not exists. . 2022.03.09 22:10:09 - IPv6 restored on network adapter (eno2) . 2022.03.09 22:10:09 - IPv6 restored on network adapter (wlo1) . 2022.03.09 22:10:10 - Connection terminated. I 2022.03.09 22:10:13 - Checking authorization ... . 2022.03.09 22:10:13 - IPv6 disabled on network adapter (eno2) . 2022.03.09 22:10:13 - IPv6 disabled on network adapter (wlo1) ! 2022.03.09 22:10:13 - Connecting to Lacaille (Singapore, Singapore) . 2022.03.09 22:10:13 - Routes, add 209.58.173.159/32 for interface "eno2". . 2022.03.09 22:10:13 - Routes, add 209.58.173.159/32 for interface "eno2", already exists. . 2022.03.09 22:10:13 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.03.09 22:10:13 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.03.09 22:10:13 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:10:13 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:10:13 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:10:13 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:10:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]209.58.173.159:443 . 2022.03.09 22:10:13 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.03.09 22:10:13 - OpenVPN > UDP link local: (not bound) . 2022.03.09 22:10:13 - OpenVPN > UDP link remote: [AF_INET]209.58.173.159:443 . 2022.03.09 22:10:13 - OpenVPN > TLS: Initial packet from [AF_INET]209.58.173.159:443, sid=2d75b685 a8ebaf09 . 2022.03.09 22:10:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.09 22:10:14 - OpenVPN > VERIFY KU OK . 2022.03.09 22:10:14 - OpenVPN > Validating certificate extended key usage . 2022.03.09 22:10:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.09 22:10:14 - OpenVPN > VERIFY EKU OK . 2022.03.09 22:10:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lacaille, emailAddress=info@airvpn.org . 2022.03.09 22:10:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.03.09 22:10:14 - OpenVPN > [Lacaille] Peer Connection Initiated with [AF_INET]209.58.173.159:443 . 2022.03.09 22:10:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.34.1,dhcp-option DNS6 fde6:7a:7d20:1822::1,tun-ipv6,route-gateway 10.28.34.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1822::1034/64 fde6:7a:7d20:1822::1,ifconfig 10.28.34.54 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.03.09 22:10:15 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.09 22:10:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.34.1' . 2022.03.09 22:10:15 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1822::1' . 2022.03.09 22:10:15 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.09 22:10:15 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1822::1034/64 fde6:7a:7d20:1822::1' . 2022.03.09 22:10:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.09 22:10:15 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.09 22:10:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.09 22:10:15 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.09 22:10:15 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.09 22:10:15 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.03.09 22:10:15 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.09 22:10:15 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.09 22:10:15 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:10:15 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:10:15 - OpenVPN > TUN/TAP device tun0 opened . 2022.03.09 22:10:15 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.03.09 22:10:15 - OpenVPN > net_iface_up: set tun0 up . 2022.03.09 22:10:15 - OpenVPN > net_addr_v4_add: 10.28.34.54/24 dev tun0 . 2022.03.09 22:10:19 - OpenVPN > Initialization Sequence Completed . 2022.03.09 22:10:19 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.03.09 22:10:19 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.03.09 22:10:19 - Routes, add 209.58.173.138/32 for interface "tun0". . 2022.03.09 22:10:19 - Routes, skipped for 2001:df1:800:a00e:4::a44e : IPv6 blocked. . 2022.03.09 22:10:19 - Flushing DNS . 2022.03.09 22:10:19 - Flush DNS - nscd I 2022.03.09 22:10:19 - Checking route IPv4 I 2022.03.09 22:10:21 - Checking DNS . 2022.03.09 22:10:30 - Checking DNS (4° try) . 2022.03.09 22:10:35 - Checking DNS (5° try) E 2022.03.09 22:10:36 - Checking DNS failed, last reason: Checking DNS failed: ggyfhiqahvazehvlngjneozqxkfreuoy ! 2022.03.09 22:10:36 - Disconnecting . 2022.03.09 22:10:36 - Sending soft termination signal . 2022.03.09 22:10:36 - OpenVPN > event_wait : Interrupted system call (code=4) . 2022.03.09 22:10:36 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.03.09 22:10:41 - OpenVPN > Closing TUN/TAP interface . 2022.03.09 22:10:41 - OpenVPN > net_addr_v4_del: 10.28.34.54 dev tun0 . 2022.03.09 22:10:41 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.03.09 22:10:41 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:10:41 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:10:41 - Routes, delete 209.58.173.159/32 for interface "eno2". . 2022.03.09 22:10:41 - Routes, delete 209.58.173.138/32 for interface "tun0", not exists. . 2022.03.09 22:10:41 - Routes, skipped for 2001:df1:800:a00e:4::a44e : IPv6 blocked. . 2022.03.09 22:10:41 - Routes, delete 209.58.173.159/32 for interface "eno2", not exists. . 2022.03.09 22:10:41 - IPv6 restored on network adapter (eno2) . 2022.03.09 22:10:41 - IPv6 restored on network adapter (wlo1) . 2022.03.09 22:10:41 - Connection terminated. I 2022.03.09 22:10:44 - Checking authorization ... . 2022.03.09 22:10:45 - IPv6 disabled on network adapter (eno2) . 2022.03.09 22:10:45 - IPv6 disabled on network adapter (wlo1) ! 2022.03.09 22:10:45 - Connecting to Ain (Sweden, Stockholm) . 2022.03.09 22:10:45 - Routes, add 128.127.104.82/32 for interface "eno2". . 2022.03.09 22:10:45 - Routes, add 128.127.104.82/32 for interface "eno2", already exists. . 2022.03.09 22:10:45 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.03.09 22:10:45 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.03.09 22:10:45 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:10:45 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:10:45 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:10:45 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:10:45 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]128.127.104.82:443 . 2022.03.09 22:10:45 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.03.09 22:10:45 - OpenVPN > UDP link local: (not bound) . 2022.03.09 22:10:45 - OpenVPN > UDP link remote: [AF_INET]128.127.104.82:443 . 2022.03.09 22:10:45 - OpenVPN > TLS: Initial packet from [AF_INET]128.127.104.82:443, sid=806ab084 d57ba711 . 2022.03.09 22:10:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.09 22:10:45 - OpenVPN > VERIFY KU OK . 2022.03.09 22:10:45 - OpenVPN > Validating certificate extended key usage . 2022.03.09 22:10:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.09 22:10:45 - OpenVPN > VERIFY EKU OK . 2022.03.09 22:10:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ain, emailAddress=info@airvpn.org . 2022.03.09 22:10:45 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.03.09 22:10:45 - OpenVPN > [Ain] Peer Connection Initiated with [AF_INET]128.127.104.82:443 . 2022.03.09 22:10:46 - OpenVPN > SENT CONTROL [Ain]: 'PUSH_REQUEST' (status=1) . 2022.03.09 22:10:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.64.2.1,dhcp-option DNS6 fde6:7a:7d20:3c02::1,tun-ipv6,route-gateway 10.64.2.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:3c02::10f4/64 fde6:7a:7d20:3c02::1,ifconfig 10.64.2.246 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.03.09 22:10:46 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.09 22:10:46 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.64.2.1' . 2022.03.09 22:10:46 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:3c02::1' . 2022.03.09 22:10:46 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.09 22:10:46 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:3c02::10f4/64 fde6:7a:7d20:3c02::1' . 2022.03.09 22:10:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.09 22:10:46 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.09 22:10:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.09 22:10:46 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.09 22:10:46 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.09 22:10:46 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.03.09 22:10:46 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.09 22:10:46 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.09 22:10:46 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:10:46 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:10:46 - OpenVPN > TUN/TAP device tun0 opened . 2022.03.09 22:10:46 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.03.09 22:10:46 - OpenVPN > net_iface_up: set tun0 up . 2022.03.09 22:10:46 - OpenVPN > net_addr_v4_add: 10.64.2.246/24 dev tun0 . 2022.03.09 22:10:51 - OpenVPN > Initialization Sequence Completed . 2022.03.09 22:10:52 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.03.09 22:10:52 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.03.09 22:10:52 - Routes, add 128.127.104.80/32 for interface "tun0". . 2022.03.09 22:10:52 - Routes, skipped for 2a00:7142:20:c913:23fd:24da:7ace:fdf8 : IPv6 blocked. . 2022.03.09 22:10:52 - Flushing DNS . 2022.03.09 22:10:52 - Flush DNS - nscd I 2022.03.09 22:10:52 - Checking route IPv4 I 2022.03.09 22:10:53 - Checking DNS . 2022.03.09 22:11:00 - Checking DNS (4° try) . 2022.03.09 22:11:05 - Checking DNS (5° try) E 2022.03.09 22:11:06 - Checking DNS failed, last reason: Checking DNS failed: tqqccvakykhrfpdpnhciluvcrkqifuag ! 2022.03.09 22:11:06 - Disconnecting . 2022.03.09 22:11:06 - Sending soft termination signal . 2022.03.09 22:11:06 - OpenVPN > event_wait : Interrupted system call (code=4) . 2022.03.09 22:11:06 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.03.09 22:11:12 - OpenVPN > Closing TUN/TAP interface . 2022.03.09 22:11:12 - OpenVPN > net_addr_v4_del: 10.64.2.246 dev tun0 . 2022.03.09 22:11:12 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.03.09 22:11:12 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:11:12 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:11:12 - Routes, delete 128.127.104.82/32 for interface "eno2". . 2022.03.09 22:11:12 - Routes, delete 128.127.104.80/32 for interface "tun0", not exists. . 2022.03.09 22:11:12 - Routes, skipped for 2a00:7142:20:c913:23fd:24da:7ace:fdf8 : IPv6 blocked. . 2022.03.09 22:11:12 - Routes, delete 128.127.104.82/32 for interface "eno2", not exists. . 2022.03.09 22:11:12 - IPv6 restored on network adapter (eno2) . 2022.03.09 22:11:12 - IPv6 restored on network adapter (wlo1) . 2022.03.09 22:11:12 - Connection terminated. I 2022.03.09 22:11:15 - Checking authorization ... . 2022.03.09 22:11:16 - IPv6 disabled on network adapter (eno2) . 2022.03.09 22:11:16 - IPv6 disabled on network adapter (wlo1) ! 2022.03.09 22:11:16 - Connecting to Azmidiske (Sweden, Uppsala) . 2022.03.09 22:11:16 - Routes, add 62.102.148.208/32 for interface "eno2". . 2022.03.09 22:11:16 - Routes, add 62.102.148.208/32 for interface "eno2", already exists. . 2022.03.09 22:11:16 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.03.09 22:11:16 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.03.09 22:11:16 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:11:16 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:11:16 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:11:16 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:11:16 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.208:443 . 2022.03.09 22:11:16 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.03.09 22:11:16 - OpenVPN > UDP link local: (not bound) . 2022.03.09 22:11:16 - OpenVPN > UDP link remote: [AF_INET]62.102.148.208:443 . 2022.03.09 22:11:16 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.208:443, sid=01d8649e 7a7e02fe . 2022.03.09 22:11:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.09 22:11:16 - OpenVPN > VERIFY KU OK . 2022.03.09 22:11:16 - OpenVPN > Validating certificate extended key usage . 2022.03.09 22:11:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.09 22:11:16 - OpenVPN > VERIFY EKU OK . 2022.03.09 22:11:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Azmidiske, emailAddress=info@airvpn.org . 2022.03.09 22:11:16 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.03.09 22:11:16 - OpenVPN > [Azmidiske] Peer Connection Initiated with [AF_INET]62.102.148.208:443 . 2022.03.09 22:11:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.11.34.1,dhcp-option DNS6 fde6:7a:7d20:722::1,tun-ipv6,route-gateway 10.11.34.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:722::1024/64 fde6:7a:7d20:722::1,ifconfig 10.11.34.38 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2022.03.09 22:11:16 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.09 22:11:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.11.34.1' . 2022.03.09 22:11:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:722::1' . 2022.03.09 22:11:16 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.09 22:11:16 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:722::1024/64 fde6:7a:7d20:722::1' . 2022.03.09 22:11:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.09 22:11:16 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.09 22:11:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.09 22:11:16 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.09 22:11:16 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.09 22:11:16 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.03.09 22:11:16 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.09 22:11:16 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.09 22:11:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:11:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:11:16 - OpenVPN > TUN/TAP device tun0 opened . 2022.03.09 22:11:16 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.03.09 22:11:16 - OpenVPN > net_iface_up: set tun0 up . 2022.03.09 22:11:16 - OpenVPN > net_addr_v4_add: 10.11.34.38/24 dev tun0 . 2022.03.09 22:11:21 - OpenVPN > Initialization Sequence Completed . 2022.03.09 22:11:21 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.03.09 22:11:21 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.03.09 22:11:21 - Routes, add 62.102.148.154/32 for interface "tun0". . 2022.03.09 22:11:21 - Routes, skipped for 2a00:1520:27:1:dc5a:b7fa:4950:47c4 : IPv6 blocked. . 2022.03.09 22:11:21 - Flushing DNS . 2022.03.09 22:11:21 - Flush DNS - nscd I 2022.03.09 22:11:21 - Checking route IPv4 I 2022.03.09 22:11:22 - Checking DNS . 2022.03.09 22:11:29 - Checking DNS (4° try) . 2022.03.09 22:11:34 - Checking DNS (5° try) E 2022.03.09 22:11:34 - Checking DNS failed, last reason: Checking DNS failed: ! 2022.03.09 22:11:34 - Disconnecting . 2022.03.09 22:11:34 - Sending soft termination signal . 2022.03.09 22:11:34 - OpenVPN > event_wait : Interrupted system call (code=4) . 2022.03.09 22:11:34 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.03.09 22:11:39 - OpenVPN > Closing TUN/TAP interface . 2022.03.09 22:11:39 - OpenVPN > net_addr_v4_del: 10.11.34.38 dev tun0 . 2022.03.09 22:11:39 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.03.09 22:11:39 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:11:39 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:11:39 - Routes, delete 62.102.148.208/32 for interface "eno2". . 2022.03.09 22:11:39 - Routes, delete 62.102.148.154/32 for interface "tun0", not exists. . 2022.03.09 22:11:39 - Routes, skipped for 2a00:1520:27:1:dc5a:b7fa:4950:47c4 : IPv6 blocked. . 2022.03.09 22:11:39 - Routes, delete 62.102.148.208/32 for interface "eno2", not exists. . 2022.03.09 22:11:39 - IPv6 restored on network adapter (eno2) . 2022.03.09 22:11:39 - IPv6 restored on network adapter (wlo1) . 2022.03.09 22:11:39 - Connection terminated. I 2022.03.09 22:11:42 - Checking authorization ... . 2022.03.09 22:11:43 - IPv6 disabled on network adapter (eno2) . 2022.03.09 22:11:43 - IPv6 disabled on network adapter (wlo1) ! 2022.03.09 22:11:43 - Connecting to Mekbuda (Spain, Madrid) . 2022.03.09 22:11:43 - Routes, add 185.93.182.173/32 for interface "eno2". . 2022.03.09 22:11:43 - Routes, add 185.93.182.173/32 for interface "eno2", already exists. . 2022.03.09 22:11:43 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.03.09 22:11:43 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.03.09 22:11:43 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:11:43 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:11:43 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:11:43 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:11:43 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.93.182.173:443 . 2022.03.09 22:11:43 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.03.09 22:11:43 - OpenVPN > UDP link local: (not bound) . 2022.03.09 22:11:43 - OpenVPN > UDP link remote: [AF_INET]185.93.182.173:443 . 2022.03.09 22:11:43 - OpenVPN > TLS: Initial packet from [AF_INET]185.93.182.173:443, sid=328fbc51 f8433f24 . 2022.03.09 22:11:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.09 22:11:43 - OpenVPN > VERIFY KU OK . 2022.03.09 22:11:43 - OpenVPN > Validating certificate extended key usage . 2022.03.09 22:11:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.09 22:11:43 - OpenVPN > VERIFY EKU OK . 2022.03.09 22:11:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Mekbuda, emailAddress=info@airvpn.org . 2022.03.09 22:11:43 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.03.09 22:11:43 - OpenVPN > [Mekbuda] Peer Connection Initiated with [AF_INET]185.93.182.173:443 . 2022.03.09 22:11:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.21.194.1,dhcp-option DNS6 fde6:7a:7d20:11c2::1,tun-ipv6,route-gateway 10.21.194.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:11c2::10de/64 fde6:7a:7d20:11c2::1,ifconfig 10.21.194.224 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2022.03.09 22:11:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.09 22:11:43 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.21.194.1' . 2022.03.09 22:11:43 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:11c2::1' . 2022.03.09 22:11:43 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.09 22:11:43 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:11c2::10de/64 fde6:7a:7d20:11c2::1' . 2022.03.09 22:11:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.09 22:11:43 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.09 22:11:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.09 22:11:43 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.09 22:11:43 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.09 22:11:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.03.09 22:11:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.09 22:11:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.09 22:11:43 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:11:43 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:11:43 - OpenVPN > TUN/TAP device tun0 opened . 2022.03.09 22:11:43 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.03.09 22:11:43 - OpenVPN > net_iface_up: set tun0 up . 2022.03.09 22:11:43 - OpenVPN > net_addr_v4_add: 10.21.194.224/24 dev tun0 . 2022.03.09 22:11:48 - OpenVPN > Initialization Sequence Completed . 2022.03.09 22:11:48 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.03.09 22:11:48 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.03.09 22:11:48 - Routes, add 185.93.182.171/32 for interface "tun0". . 2022.03.09 22:11:48 - Routes, skipped for 2001:ac8:23:13:31aa:42ae:c1f7:cccb : IPv6 blocked. . 2022.03.09 22:11:48 - Flushing DNS . 2022.03.09 22:11:48 - Flush DNS - nscd I 2022.03.09 22:11:48 - Checking route IPv4 I 2022.03.09 22:11:49 - Checking DNS . 2022.03.09 22:11:56 - Checking DNS (4° try) . 2022.03.09 22:12:01 - Checking DNS (5° try) E 2022.03.09 22:12:01 - Checking DNS failed, last reason: Checking DNS failed: ! 2022.03.09 22:12:01 - Disconnecting . 2022.03.09 22:12:01 - Sending soft termination signal . 2022.03.09 22:12:01 - OpenVPN > event_wait : Interrupted system call (code=4) . 2022.03.09 22:12:01 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.03.09 22:12:06 - OpenVPN > Closing TUN/TAP interface . 2022.03.09 22:12:06 - OpenVPN > net_addr_v4_del: 10.21.194.224 dev tun0 . 2022.03.09 22:12:06 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.03.09 22:12:06 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:12:06 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:12:07 - Routes, delete 185.93.182.173/32 for interface "eno2". . 2022.03.09 22:12:07 - Routes, delete 185.93.182.171/32 for interface "tun0", not exists. . 2022.03.09 22:12:07 - Routes, skipped for 2001:ac8:23:13:31aa:42ae:c1f7:cccb : IPv6 blocked. . 2022.03.09 22:12:07 - Routes, delete 185.93.182.173/32 for interface "eno2", not exists. . 2022.03.09 22:12:07 - IPv6 restored on network adapter (eno2) . 2022.03.09 22:12:07 - IPv6 restored on network adapter (wlo1) . 2022.03.09 22:12:07 - Connection terminated. I 2022.03.09 22:12:10 - Checking authorization ... . 2022.03.09 22:12:10 - IPv6 disabled on network adapter (eno2) . 2022.03.09 22:12:10 - IPv6 disabled on network adapter (wlo1) ! 2022.03.09 22:12:10 - Connecting to Adhara (Germany, Frankfurt) . 2022.03.09 22:12:10 - Routes, add 185.104.184.45/32 for interface "eno2". . 2022.03.09 22:12:10 - Routes, add 185.104.184.45/32 for interface "eno2", already exists. . 2022.03.09 22:12:10 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.03.09 22:12:10 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.03.09 22:12:10 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:12:10 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:12:10 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:12:10 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:12:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.104.184.45:443 . 2022.03.09 22:12:10 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.03.09 22:12:10 - OpenVPN > UDP link local: (not bound) . 2022.03.09 22:12:10 - OpenVPN > UDP link remote: [AF_INET]185.104.184.45:443 . 2022.03.09 22:12:10 - OpenVPN > TLS: Initial packet from [AF_INET]185.104.184.45:443, sid=169698c9 7c425e2e . 2022.03.09 22:12:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.09 22:12:11 - OpenVPN > VERIFY KU OK . 2022.03.09 22:12:11 - OpenVPN > Validating certificate extended key usage . 2022.03.09 22:12:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.09 22:12:11 - OpenVPN > VERIFY EKU OK . 2022.03.09 22:12:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Adhara, emailAddress=info@airvpn.org . 2022.03.09 22:12:11 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.03.09 22:12:11 - OpenVPN > [Adhara] Peer Connection Initiated with [AF_INET]185.104.184.45:443 . 2022.03.09 22:12:11 - OpenVPN > SENT CONTROL [Adhara]: 'PUSH_REQUEST' (status=1) . 2022.03.09 22:12:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.4.162.1,dhcp-option DNS6 fde6:7a:7d20:a2::1,tun-ipv6,route-gateway 10.4.162.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:a2::100d/64 fde6:7a:7d20:a2::1,ifconfig 10.4.162.15 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2022.03.09 22:12:11 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.09 22:12:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.4.162.1' . 2022.03.09 22:12:11 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:a2::1' . 2022.03.09 22:12:11 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.09 22:12:11 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:a2::100d/64 fde6:7a:7d20:a2::1' . 2022.03.09 22:12:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.09 22:12:11 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.09 22:12:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.09 22:12:11 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.09 22:12:11 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.09 22:12:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.03.09 22:12:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.09 22:12:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.09 22:12:11 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:12:11 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:12:11 - OpenVPN > TUN/TAP device tun0 opened . 2022.03.09 22:12:11 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.03.09 22:12:11 - OpenVPN > net_iface_up: set tun0 up . 2022.03.09 22:12:11 - OpenVPN > net_addr_v4_add: 10.4.162.15/24 dev tun0 . 2022.03.09 22:12:16 - OpenVPN > Initialization Sequence Completed . 2022.03.09 22:12:16 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.03.09 22:12:17 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.03.09 22:12:17 - Routes, add 185.104.184.43/32 for interface "tun0". . 2022.03.09 22:12:17 - Routes, skipped for 2001:ac8:20:5:e56b:4c39:f245:7761 : IPv6 blocked. . 2022.03.09 22:12:17 - Flushing DNS . 2022.03.09 22:12:17 - Flush DNS - nscd I 2022.03.09 22:12:17 - Checking route IPv4 I 2022.03.09 22:12:17 - Checking DNS . 2022.03.09 22:12:24 - Checking DNS (4° try) . 2022.03.09 22:12:28 - Checking DNS (5° try) ! 2022.03.09 22:12:29 - Disconnecting . 2022.03.09 22:12:29 - Sending soft termination signal . 2022.03.09 22:12:29 - OpenVPN > event_wait : Interrupted system call (code=4) . 2022.03.09 22:12:29 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.03.09 22:12:34 - OpenVPN > Closing TUN/TAP interface . 2022.03.09 22:12:34 - OpenVPN > net_addr_v4_del: 10.4.162.15 dev tun0 . 2022.03.09 22:12:34 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.03.09 22:12:34 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:12:34 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:12:34 - Routes, delete 185.104.184.45/32 for interface "eno2". . 2022.03.09 22:12:34 - Routes, delete 185.104.184.43/32 for interface "tun0", not exists. . 2022.03.09 22:12:34 - Routes, skipped for 2001:ac8:20:5:e56b:4c39:f245:7761 : IPv6 blocked. . 2022.03.09 22:12:34 - Routes, delete 185.104.184.45/32 for interface "eno2", not exists. . 2022.03.09 22:12:34 - IPv6 restored on network adapter (eno2) . 2022.03.09 22:12:34 - IPv6 restored on network adapter (wlo1) . 2022.03.09 22:12:35 - Connection terminated. I 2022.03.09 22:12:35 - Cancel requested. ! 2022.03.09 22:12:35 - Session terminated. I 2022.03.09 22:14:02 - Session starting. I 2022.03.09 22:14:02 - Checking authorization ... . 2022.03.09 22:14:02 - IPv6 disabled on network adapter (eno2) . 2022.03.09 22:14:02 - IPv6 disabled on network adapter (wlo1) ! 2022.03.09 22:14:02 - Connecting to Adhara (Germany, Frankfurt) . 2022.03.09 22:14:02 - Routes, add 185.104.184.45/32 for interface "eno2". . 2022.03.09 22:14:02 - Routes, add 185.104.184.45/32 for interface "eno2", already exists. . 2022.03.09 22:14:03 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.03.09 22:14:03 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.03.09 22:14:03 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:14:03 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:14:03 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:14:03 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:14:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.104.184.45:443 . 2022.03.09 22:14:03 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.03.09 22:14:03 - OpenVPN > UDP link local: (not bound) . 2022.03.09 22:14:03 - OpenVPN > UDP link remote: [AF_INET]185.104.184.45:443 . 2022.03.09 22:14:03 - OpenVPN > TLS: Initial packet from [AF_INET]185.104.184.45:443, sid=632b9c21 4eb2f8e3 . 2022.03.09 22:14:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.09 22:14:03 - OpenVPN > VERIFY KU OK . 2022.03.09 22:14:03 - OpenVPN > Validating certificate extended key usage . 2022.03.09 22:14:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.09 22:14:03 - OpenVPN > VERIFY EKU OK . 2022.03.09 22:14:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Adhara, emailAddress=info@airvpn.org . 2022.03.09 22:14:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.03.09 22:14:03 - OpenVPN > [Adhara] Peer Connection Initiated with [AF_INET]185.104.184.45:443 . 2022.03.09 22:14:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.4.162.1,dhcp-option DNS6 fde6:7a:7d20:a2::1,tun-ipv6,route-gateway 10.4.162.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:a2::100d/64 fde6:7a:7d20:a2::1,ifconfig 10.4.162.15 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2022.03.09 22:14:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.09 22:14:03 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.4.162.1' . 2022.03.09 22:14:03 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:a2::1' . 2022.03.09 22:14:03 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.09 22:14:03 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:a2::100d/64 fde6:7a:7d20:a2::1' . 2022.03.09 22:14:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.09 22:14:03 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.09 22:14:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.09 22:14:03 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.09 22:14:03 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.09 22:14:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.03.09 22:14:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.09 22:14:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.09 22:14:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:14:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:14:03 - OpenVPN > TUN/TAP device tun0 opened . 2022.03.09 22:14:03 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.03.09 22:14:03 - OpenVPN > net_iface_up: set tun0 up . 2022.03.09 22:14:03 - OpenVPN > net_addr_v4_add: 10.4.162.15/24 dev tun0 . 2022.03.09 22:14:09 - OpenVPN > Initialization Sequence Completed . 2022.03.09 22:14:09 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2022.03.09 22:14:09 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.03.09 22:14:09 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.03.09 22:14:09 - Routes, add 185.104.184.43/32 for interface "tun0". . 2022.03.09 22:14:09 - Routes, skipped for 2001:ac8:20:5:e56b:4c39:f245:7761 : IPv6 blocked. . 2022.03.09 22:14:09 - Flushing DNS . 2022.03.09 22:14:09 - Flush DNS - nscd I 2022.03.09 22:14:09 - Checking route IPv4 I 2022.03.09 22:14:09 - Checking DNS ! 2022.03.09 22:14:10 - Connected. . 2022.03.09 22:25:28 - Collect information about AirVPN completed ! 2022.03.09 22:40:50 - Disconnecting . 2022.03.09 22:40:50 - Sending soft termination signal . 2022.03.09 22:40:51 - OpenVPN > event_wait : Interrupted system call (code=4) . 2022.03.09 22:40:51 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.03.09 22:40:55 - OpenVPN > Closing TUN/TAP interface . 2022.03.09 22:40:55 - OpenVPN > net_addr_v4_del: 10.4.162.15 dev tun0 . 2022.03.09 22:40:55 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.03.09 22:40:55 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:40:55 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 22:40:55 - Routes, delete 185.104.184.45/32 for interface "eno2". . 2022.03.09 22:40:55 - Routes, delete 185.104.184.43/32 for interface "tun0", not exists. . 2022.03.09 22:40:55 - Routes, skipped for 2001:ac8:20:5:e56b:4c39:f245:7761 : IPv6 blocked. . 2022.03.09 22:40:55 - Routes, delete 185.104.184.45/32 for interface "eno2", not exists. . 2022.03.09 22:40:55 - IPv6 restored on network adapter (eno2) . 2022.03.09 22:40:55 - IPv6 restored on network adapter (wlo1) . 2022.03.09 22:40:55 - DNS of the system restored to original settings (Rename method) . 2022.03.09 22:40:55 - Connection terminated. . 2022.03.09 22:40:55 - Flushing DNS . 2022.03.09 22:40:55 - Flush DNS - nscd ! 2022.03.09 22:40:55 - Session terminated. I 2022.03.09 22:40:58 - Session starting. I 2022.03.09 22:40:58 - Checking authorization ... . 2022.03.09 22:40:58 - IPv6 disabled on network adapter (eno2) . 2022.03.09 22:40:58 - IPv6 disabled on network adapter (wlo1) ! 2022.03.09 22:40:58 - Connecting to Adhara (Germany, Frankfurt) . 2022.03.09 22:40:59 - Routes, add 185.104.184.45/32 for interface "eno2". . 2022.03.09 22:40:59 - Routes, add 185.104.184.45/32 for interface "eno2", already exists. . 2022.03.09 22:40:59 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.03.09 22:40:59 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.03.09 22:40:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:40:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:40:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 22:40:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 22:40:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.104.184.45:443 . 2022.03.09 22:40:59 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.03.09 22:40:59 - OpenVPN > UDP link local: (not bound) . 2022.03.09 22:40:59 - OpenVPN > UDP link remote: [AF_INET]185.104.184.45:443 . 2022.03.09 22:40:59 - OpenVPN > TLS: Initial packet from [AF_INET]185.104.184.45:443, sid=20f73637 00e7eb52 . 2022.03.09 22:40:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.09 22:40:59 - OpenVPN > VERIFY KU OK . 2022.03.09 22:40:59 - OpenVPN > Validating certificate extended key usage . 2022.03.09 22:40:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.09 22:40:59 - OpenVPN > VERIFY EKU OK . 2022.03.09 22:40:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Adhara, emailAddress=info@airvpn.org . 2022.03.09 22:40:59 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.03.09 22:40:59 - OpenVPN > [Adhara] Peer Connection Initiated with [AF_INET]185.104.184.45:443 . 2022.03.09 22:40:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.4.162.1,dhcp-option DNS6 fde6:7a:7d20:a2::1,tun-ipv6,route-gateway 10.4.162.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:a2::100d/64 fde6:7a:7d20:a2::1,ifconfig 10.4.162.15 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2022.03.09 22:40:59 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.09 22:40:59 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.4.162.1' . 2022.03.09 22:40:59 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:a2::1' . 2022.03.09 22:40:59 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.09 22:40:59 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:a2::100d/64 fde6:7a:7d20:a2::1' . 2022.03.09 22:40:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.09 22:40:59 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.09 22:40:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.09 22:40:59 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.09 22:40:59 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.09 22:40:59 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.03.09 22:40:59 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.09 22:40:59 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.09 22:40:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:40:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 22:40:59 - OpenVPN > TUN/TAP device tun0 opened . 2022.03.09 22:40:59 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.03.09 22:40:59 - OpenVPN > net_iface_up: set tun0 up . 2022.03.09 22:40:59 - OpenVPN > net_addr_v4_add: 10.4.162.15/24 dev tun0 . 2022.03.09 22:41:04 - OpenVPN > Initialization Sequence Completed . 2022.03.09 22:41:04 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.03.09 22:41:04 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.03.09 22:41:04 - Routes, add 185.104.184.43/32 for interface "tun0". . 2022.03.09 22:41:04 - Routes, skipped for 2001:ac8:20:5:e56b:4c39:f245:7761 : IPv6 blocked. . 2022.03.09 22:41:04 - Flushing DNS . 2022.03.09 22:41:04 - Flush DNS - nscd I 2022.03.09 22:41:04 - Checking route IPv4 ! 2022.03.09 22:41:05 - Connected. ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/1", "interface": "tun0", "scope": "link" }, { "destination": "0.0.0.0\/0", "gateway": "192.168.1.1", "interface": "eno2", "metric": "100", "proto": "dhcp", "src": "192.168.1.2" }, { "destination": "10.0.2.0\/24", "interface": "virbr1", "proto": "kernel", "scope": "link", "src": "10.0.2.2" }, { "destination": "10.4.162.0\/24", "interface": "tun0", "proto": "kernel", "scope": "link", "src": "10.4.162.15" }, { "destination": "128.0.0.0\/1", "interface": "tun0", "scope": "link" }, { "destination": "185.104.184.43\/32", "interface": "tun0", "scope": "link" }, { "destination": "185.104.184.45\/32", "gateway": "192.168.1.1", "interface": "eno2" }, { "destination": "192.168.1.0\/24", "interface": "eno2", "proto": "kernel", "scope": "link", "src": "192.168.1.2" }, { "destination": "192.168.1.0\/24", "interface": "eno2", "metric": "100", "proto": "kernel", "scope": "link", "src": "192.168.1.2" }, { "destination": "192.168.1.1\/32", "interface": "eno2", "metric": "100", "proto": "dhcp", "scope": "link", "src": "192.168.1.2" }, { "destination": "192.168.122.0\/24", "interface": "virbr0", "proto": "kernel", "scope": "link", "src": "192.168.122.1" } ], "ipv4-default-gateway": "192.168.1.1", "ipv4-default-interface": "eno2", "interfaces": [ { "friendly": "lo", "id": "lo", "name": "lo", "description": "lo", "type": "Loopback", "status": "Unknown", "bytes_received": "13294751", "bytes_sent": "13294751", "support_ipv4": true, "support_ipv6": false, "ips": [ "127.0.0.1" ], "bind": true }, { "friendly": "eno2", "id": "eno2", "name": "eno2", "description": "eno2", "type": "Ethernet", "status": "Up", "bytes_received": "28968900", "bytes_sent": "7166636", "support_ipv4": true, "support_ipv6": false, "ips": [ "192.168.1.2" ], "bind": true }, { "friendly": "wlo1", "id": "wlo1", "name": "wlo1", "description": "wlo1", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [], "bind": false }, { "friendly": "virbr0", "id": "virbr0", "name": "virbr0", "description": "virbr0", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "192.168.122.1" ], "bind": true }, { "friendly": "virbr2", "id": "virbr2", "name": "virbr2", "description": "virbr2", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [], "bind": false }, { "friendly": "virbr1", "id": "virbr1", "name": "virbr1", "description": "virbr1", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "10.0.2.2" ], "bind": true }, { "friendly": "tun0", "id": "tun0", "name": "tun0", "description": "tun0", "type": "0", "status": "Unknown", "bytes_received": "551088", "bytes_sent": "97284", "support_ipv4": true, "support_ipv6": false, "ips": [ "10.4.162.15" ], "bind": true } ] } ---------------------------- ip addr show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever 2: eno2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000 link/ether 98:e7:43:99:94:e8 brd ff:ff:ff:ff:ff:ff altname enp0s31f6 inet 192.168.1.2/24 brd 192.168.1.255 scope global dynamic eno2 valid_lft 80975sec preferred_lft 80975sec 3: wlo1: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group default qlen 1000 link/ether 62:2d:1f:cd:cb:bd brd ff:ff:ff:ff:ff:ff permaddr 24:41:8c:ab:a6:ad altname wlp0s20f3 4: virbr0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default qlen 1000 link/ether 52:54:00:1f:35:20 brd ff:ff:ff:ff:ff:ff inet 192.168.122.1/24 brd 192.168.122.255 scope global virbr0 valid_lft forever preferred_lft forever 5: virbr2: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default qlen 1000 link/ether 52:54:00:82:50:72 brd ff:ff:ff:ff:ff:ff 6: virbr1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default qlen 1000 link/ether 52:54:00:9c:5d:ea brd ff:ff:ff:ff:ff:ff inet 10.0.2.2/24 brd 10.0.2.255 scope global virbr1 valid_lft forever preferred_lft forever 30: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 500 link/none inet 10.4.162.15/24 scope global tun0 valid_lft forever preferred_lft forever ---------------------------- ip link show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eno2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether 98:e7:43:99:94:e8 brd ff:ff:ff:ff:ff:ff altname enp0s31f6 3: wlo1: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 62:2d:1f:cd:cb:bd brd ff:ff:ff:ff:ff:ff permaddr 24:41:8c:ab:a6:ad altname wlp0s20f3 4: virbr0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 52:54:00:1f:35:20 brd ff:ff:ff:ff:ff:ff 5: virbr2: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 52:54:00:82:50:72 brd ff:ff:ff:ff:ff:ff 6: virbr1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 52:54:00:9c:5d:ea brd ff:ff:ff:ff:ff:ff 30: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN mode DEFAULT group default qlen 500 link/none Share this post Link to post
OpenSourcerer 1435 Posted ... 18 minutes ago, lpav said: However now I get a worse result, only my ISP servers are shown in the dnsleak test results. That is expected, as Eddie doesn't do anything to alter DNS (mode is None). You've pasted the system report now, but it's impossible to troubleshoot DNS problems this way because Eddie doesn't touch DNS. Sorry for the hither and thither, but please (first, close and reopen Eddie to clear the logs, then) reset DNS switch mode to Automatic and paste another system report after connection (verify that both ISP DNS and AirDNS servers are shown with IPLeak for example). 19 minutes ago, lpav said: Note: I would prefer to avoid the automatic submission system, becuase I want to redact hostname and OS's username. Yeah, this window area should probably have a privacy switch included which hides possibly identifying information like usernames and v6 UGAs. It is made with professional support in mind, though, so I can understand its absence. 1 lpav reacted to this Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
lpav 2 Posted ... Thanks for the explanation. This is the new report: Eddie System/Environment Report - 3/9/2022 - 10:00 PM UTC Eddie version: 2.21.5beta Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: Arch Linux OS version: Linux myhost 5.16.13-arch1-1 #1 SMP PREEMPT Tue, 08 Mar 2022 20:07:36 +0000 x86_64 GNU/Linux OS architecture: x64 Mono /.Net Framework: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 (/usr/bin/openvpn) Hummingbird: 3.3.2 - Hummingbird - AirVPN OpenVPN 3 Client 1.1.2 - 4 June 2021 (/usr/local/bin/hummingbird) WireGuard: 1.0.0 SSH: OpenSSH_8.9p1, OpenSSL 1.1.1m 14 Dec 2021 (/usr/bin/ssh) SSL: Not available curl: 7.82.0 (/usr/bin/curl) Profile path: /home/myuser/.config/eddie/default.profile Data path: /home/myuser/.config/eddie Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/eddie-ui.exe Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" Network Lock Active: No Connected to VPN: Yes, Ain OS support IPv4: Yes OS support IPv6: No Detected DNS: 10.64.2.1 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 177 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: curl: (7) Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True servers.allowlist: 19b5c7333f2cce1a07c093e556c7fa68af4cea13237d528fd9100c6190250112,eb1b1573931f127e991a7cd60ed29c14133dfc19ef4efd304130d936fc58024a,2f8e793e1585c62c2d65cd8ecc5ff074e157a290f922f8355523800de9ce049c,a61744e4ad91aec37c94aeffc2d7344e79400c541b06df8f1d7773b130529191,d6ea0472c38c953aeb0f16363090aaacc0943b364b0c7593c4c3d1d9e2225c76 areas.allowlist: de,ca,jp,nl,sg,es,br,ie proxy.mode: none network.ipv6.mode: block ---------------------------- Logs: . 2022.03.09 23:59:08 - Eddie version: 2.21.5beta / linux_x64, System: Linux, Name: Arch Linux, Version: Linux myhost 5.16.13-arch1-1 #1 SMP PREEMPT Tue, 08 Mar 2022 20:07:36 +0000 x86_64 GNU/Linux, Mono/.Net: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319 . 2022.03.09 23:59:08 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2022.03.09 23:59:08 - Raise system privileges . 2022.03.09 23:59:13 - Reading options from /home/myuser/.config/eddie/default.profile . 2022.03.09 23:59:13 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 (/usr/bin/openvpn) . 2022.03.09 23:59:13 - SSH - Version: OpenSSH_8.9p1, OpenSSL 1.1.1m 14 Dec 2021 (/usr/bin/ssh) I 2022.03.09 23:59:13 - SSL - Not available . 2022.03.09 23:59:13 - curl - Version: 7.82.0 (/usr/bin/curl) I 2022.03.09 23:59:17 - Ready . 2022.03.09 23:59:17 - Collect information about AirVPN completed I 2022.03.09 23:59:31 - Session starting. I 2022.03.09 23:59:31 - Checking authorization ... . 2022.03.09 23:59:32 - IPv6 disabled on network adapter (eno2) . 2022.03.09 23:59:32 - IPv6 disabled on network adapter (wlo1) ! 2022.03.09 23:59:32 - Connecting to Ain (Sweden, Stockholm) . 2022.03.09 23:59:32 - Routes, add 128.127.104.82/32 for interface "eno2". . 2022.03.09 23:59:32 - Routes, add 128.127.104.82/32 for interface "eno2", already exists. . 2022.03.09 23:59:32 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.03.09 23:59:32 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.03.09 23:59:32 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 23:59:32 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 23:59:32 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 23:59:32 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 23:59:32 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]128.127.104.82:443 . 2022.03.09 23:59:32 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.03.09 23:59:32 - OpenVPN > UDP link local: (not bound) . 2022.03.09 23:59:32 - OpenVPN > UDP link remote: [AF_INET]128.127.104.82:443 . 2022.03.09 23:59:32 - OpenVPN > TLS: Initial packet from [AF_INET]128.127.104.82:443, sid=45f5d1f0 b78a8647 . 2022.03.09 23:59:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.09 23:59:32 - OpenVPN > VERIFY KU OK . 2022.03.09 23:59:32 - OpenVPN > Validating certificate extended key usage . 2022.03.09 23:59:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.09 23:59:32 - OpenVPN > VERIFY EKU OK . 2022.03.09 23:59:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ain, emailAddress=info@airvpn.org . 2022.03.09 23:59:32 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.03.09 23:59:32 - OpenVPN > [Ain] Peer Connection Initiated with [AF_INET]128.127.104.82:443 . 2022.03.09 23:59:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.64.2.1,dhcp-option DNS6 fde6:7a:7d20:3c02::1,tun-ipv6,route-gateway 10.64.2.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:3c02::10f4/64 fde6:7a:7d20:3c02::1,ifconfig 10.64.2.246 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.03.09 23:59:32 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.09 23:59:32 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.64.2.1' . 2022.03.09 23:59:32 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:3c02::1' . 2022.03.09 23:59:32 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.09 23:59:32 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:3c02::10f4/64 fde6:7a:7d20:3c02::1' . 2022.03.09 23:59:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.09 23:59:32 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.09 23:59:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.09 23:59:32 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.09 23:59:32 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.09 23:59:32 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.03.09 23:59:32 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.09 23:59:32 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.09 23:59:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 23:59:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 23:59:32 - OpenVPN > TUN/TAP device tun0 opened . 2022.03.09 23:59:32 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.03.09 23:59:32 - OpenVPN > net_iface_up: set tun0 up . 2022.03.09 23:59:32 - OpenVPN > net_addr_v4_add: 10.64.2.246/24 dev tun0 . 2022.03.09 23:59:38 - OpenVPN > Initialization Sequence Completed . 2022.03.09 23:59:38 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2022.03.09 23:59:38 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.03.09 23:59:38 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.03.09 23:59:38 - Routes, add 128.127.104.80/32 for interface "tun0". . 2022.03.09 23:59:38 - Routes, skipped for 2a00:7142:20:c913:23fd:24da:7ace:fdf8 : IPv6 blocked. . 2022.03.09 23:59:38 - Flushing DNS . 2022.03.09 23:59:38 - Flush DNS - nscd I 2022.03.09 23:59:38 - Checking route IPv4 I 2022.03.09 23:59:39 - Checking DNS ! 2022.03.09 23:59:39 - Connected. ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/1", "interface": "tun0", "scope": "link" }, { "destination": "0.0.0.0\/0", "gateway": "192.168.1.1", "interface": "eno2", "metric": "100", "proto": "dhcp", "src": "192.168.1.2" }, { "destination": "10.0.2.0\/24", "interface": "virbr1", "proto": "kernel", "scope": "link", "src": "10.0.2.2" }, { "destination": "10.64.2.0\/24", "interface": "tun0", "proto": "kernel", "scope": "link", "src": "10.64.2.246" }, { "destination": "128.0.0.0\/1", "interface": "tun0", "scope": "link" }, { "destination": "128.127.104.80\/32", "interface": "tun0", "scope": "link" }, { "destination": "128.127.104.82\/32", "gateway": "192.168.1.1", "interface": "eno2" }, { "destination": "192.168.1.0\/24", "interface": "eno2", "proto": "kernel", "scope": "link", "src": "192.168.1.2" }, { "destination": "192.168.1.0\/24", "interface": "eno2", "metric": "100", "proto": "kernel", "scope": "link", "src": "192.168.1.2" }, { "destination": "192.168.1.1\/32", "interface": "eno2", "metric": "100", "proto": "dhcp", "scope": "link", "src": "192.168.1.2" }, { "destination": "192.168.122.0\/24", "interface": "virbr0", "proto": "kernel", "scope": "link", "src": "192.168.122.1" } ], "ipv4-default-gateway": "192.168.1.1", "ipv4-default-interface": "eno2", "interfaces": [ { "friendly": "lo", "id": "lo", "name": "lo", "description": "lo", "type": "Loopback", "status": "Unknown", "bytes_received": "90237558", "bytes_sent": "90237558", "support_ipv4": true, "support_ipv6": false, "ips": [ "127.0.0.1" ], "bind": true }, { "friendly": "eno2", "id": "eno2", "name": "eno2", "description": "eno2", "type": "Ethernet", "status": "Up", "bytes_received": "2982377491", "bytes_sent": "653185081", "support_ipv4": true, "support_ipv6": false, "ips": [ "192.168.1.2" ], "bind": true }, { "friendly": "wlo1", "id": "wlo1", "name": "wlo1", "description": "wlo1", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [], "bind": false }, { "friendly": "virbr0", "id": "virbr0", "name": "virbr0", "description": "virbr0", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "192.168.122.1" ], "bind": true }, { "friendly": "virbr2", "id": "virbr2", "name": "virbr2", "description": "virbr2", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [], "bind": false }, { "friendly": "virbr1", "id": "virbr1", "name": "virbr1", "description": "virbr1", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "10.0.2.2" ], "bind": true }, { "friendly": "tun0", "id": "tun0", "name": "tun0", "description": "tun0", "type": "0", "status": "Unknown", "bytes_received": "115036", "bytes_sent": "62229", "support_ipv4": true, "support_ipv6": false, "ips": [ "10.64.2.246" ], "bind": true } ] } ---------------------------- ip addr show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever 2: eno2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000 link/ether 98:e7:43:99:94:e8 brd ff:ff:ff:ff:ff:ff altname enp0s31f6 inet 192.168.1.2/24 brd 192.168.1.255 scope global dynamic eno2 valid_lft 76494sec preferred_lft 76494sec 3: wlo1: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group default qlen 1000 link/ether 62:2d:1f:cd:cb:bd brd ff:ff:ff:ff:ff:ff permaddr 24:41:8c:ab:a6:ad altname wlp0s20f3 4: virbr0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default qlen 1000 link/ether 52:54:00:1f:35:20 brd ff:ff:ff:ff:ff:ff inet 192.168.122.1/24 brd 192.168.122.255 scope global virbr0 valid_lft forever preferred_lft forever 5: virbr2: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default qlen 1000 link/ether 52:54:00:82:50:72 brd ff:ff:ff:ff:ff:ff 6: virbr1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default qlen 1000 link/ether 52:54:00:9c:5d:ea brd ff:ff:ff:ff:ff:ff inet 10.0.2.2/24 brd 10.0.2.255 scope global virbr1 valid_lft forever preferred_lft forever 31: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 500 link/none inet 10.64.2.246/24 scope global tun0 valid_lft forever preferred_lft forever ---------------------------- ip link show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eno2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether 98:e7:43:99:94:e8 brd ff:ff:ff:ff:ff:ff altname enp0s31f6 3: wlo1: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 62:2d:1f:cd:cb:bd brd ff:ff:ff:ff:ff:ff permaddr 24:41:8c:ab:a6:ad altname wlp0s20f3 4: virbr0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 52:54:00:1f:35:20 brd ff:ff:ff:ff:ff:ff 5: virbr2: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 52:54:00:82:50:72 brd ff:ff:ff:ff:ff:ff 6: virbr1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default qlen 1000 link/ether 52:54:00:9c:5d:ea brd ff:ff:ff:ff:ff:ff 31: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN mode DEFAULT group default qlen 500 link/none Confirmed that both AirVPN and ISP , DNS are detected. Share this post Link to post
OpenSourcerer 1435 Posted ... 1 hour ago, lpav said: Detected DNS: 10.64.2.1 Well, DNS is correctly configured. 1 hour ago, lpav said: I 2022.03.09 23:59:39 - Checking DNS And it successfully checks for AirDNS. This is… interesting, everything hints at a correct config – so far. Can you please post some more info on NetworkManager? The DNS config of the profile with something like this: $ cid=`nmcli c s --active|grep ethernet|cut -f3 -d ' '`;nmcli c s $cid|grep dns and the current status of all connections by just calling: $ nmcli -t . 1 lpav reacted to this Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
lpav 2 Posted ... Sure, here it is: $ nmcli c s --active NAME UUID TYPE DEVICE Wired connection 1 8851ee88-4049-3b2a-8934-9bb68471fa45 ethernet eno2 tun0 fdeb43cf-8dce-432c-a299-4084c479012d tun tun0 virbr0 74855e87-e5d2-498a-9900-32496d6265ea bridge virbr0 virbr1 cdf97cb5-c291-404a-85d6-3237f8741d72 bridge virbr1 $ nmcli c s 8851ee88-4049-3b2a-8934-9bb68471fa45 | grep dns connection.mdns: -1 (default) connection.dns-over-tls: -1 (default) ipv4.dns: -- ipv4.dns-search: -- ipv4.dns-options: -- ipv4.dns-priority: 0 ipv4.ignore-auto-dns: no ipv6.dns: -- ipv6.dns-search: -- ipv6.dns-options: -- ipv6.dns-priority: 0 ipv6.ignore-auto-dns: no $ nmcli -t eno2: connected to Wired connection 1 "Intel I219-LM" ethernet (e1000e), 98:E7:43:99:94:E8, hw, mtu 1500 ip4 default, ip6 default inet4 192.168.1.2/24 route4 default via 192.168.1.1 metric 100 route4 default via 192.168.1.1 metric 100 route4 192.168.1.0/24 metric 100 route4 192.168.1.1/32 metric 100 route4 185.104.184.45/32 via 192.168.1.1 metric 0 virbr0: connected (externally) to virbr0 "virbr0" bridge, 52:54:00:1F:35:20, sw, mtu 1500 inet4 192.168.122.1/24 route4 192.168.122.0/24 metric 0 virbr1: connected (externally) to virbr1 "virbr1" bridge, 52:54:00:9C:5D:EA, sw, mtu 1500 inet4 10.0.2.2/24 route4 10.0.2.0/24 metric 0 tun0: connected (externally) to tun0 "tun0" tun, sw, mtu 1500 inet4 10.4.162.15/24 route4 10.4.162.0/24 metric 0 route4 0.0.0.0/1 metric 0 route4 128.0.0.0/1 metric 0 route4 185.104.184.43/32 metric 0 8C:3A:E3:FC:2F:A4: disconnected "Nexus 5" 1 connection available bt (bluez), 8C:3A:E3:FC:2F:A4, hw B4:86:55:6B:A6:98: disconnected "essid 1" 1 connection available bt (bluez), <redacted_mac>, hw wlo1: unavailable "Intel Cannon Lake PCH CNVi" wifi (iwlwifi), <redacted_mac>, sw disabled, hw, mtu 1500 virbr2: unmanaged "virbr2" bridge, 52:54:00:82:50:72, sw, mtu 1500 lo: unmanaged "lo" loopback (unknown), 00:00:00:00:00:00, sw, mtu 65536 DNS configuration: servers: 192.168.1.1 domains: home interface: eno2 servers: fe80::1 interface: eno2 Share this post Link to post
OpenSourcerer 1435 Posted ... Well, I've done some tests… and I'm struggling to reproduce your issue. We both run Arch. Eddie replaces resolv.conf as usual for me, then the system doesn't leak DNS. I have no clue why it leaks for you, unless there are multiple DNS resolvers running or something. Also you seem to be running libvirt, or some other virtualization suite creating virtual bridges. I know that it depends on dnsmasq which could in theory lead to DNS leaks. Can you please tell if there is a /etc/dnsmasq.conf file and if yes, can you post its relevant file contents? $ grep -E "^[^#]" /etc/dnsmasq.conf Is the service even running and/or enabled? $ systemctl list-unit-files dnsmasq.service . 1 lpav reacted to this Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
lpav 2 Posted ... All lines in /etc/dnsmasq.conf are commented (empty grep response), and the service seems disabled $ systemctl list-unit-files dnsmasq.service UNIT FILE STATE VENDOR PRESET dnsmasq.service disabled disabled 1 unit files listed. I will investigate the issue further, and if nothing comes up, I will open a support request. Thank you for your help 1 OpenSourcerer reacted to this Share this post Link to post
lpav 2 Posted ... SOLVED, I think... You were right about dnsmasq, seemed to have been used by kvm/qemu $ netstat -ulnp | grep ":53 " (Not all processes could be identified, non-owned process info will not be shown, you would have to be root to see it all.) udp 0 0 192.168.122.1:53 0.0.0.0:* - udp 0 0 10.0.2.2:53 0.0.0.0:* - udp 0 0 127.0.0.54:53 0.0.0.0:* - udp 0 0 127.0.0.53:53 0.0.0.0:* - $ sudo lsof -i:53 [sudo] password for myuser: COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME systemd-r 1332 systemd-resolve 17u IPv4 863 0t0 UDP localhost:domain systemd-r 1332 systemd-resolve 18u IPv4 864 0t0 TCP localhost:domain (LISTEN) systemd-r 1332 systemd-resolve 19u IPv4 865 0t0 UDP localhost:domain systemd-r 1332 systemd-resolve 20u IPv4 866 0t0 TCP localhost:domain (LISTEN) dnsmasq 1512 nobody 4u IPv4 29946 0t0 UDP myhost:domain dnsmasq 1512 nobody 5u IPv4 29947 0t0 TCP myhost:domain (LISTEN) dnsmasq 1539 nobody 5u IPv4 29037 0t0 UDP myhost:domain dnsmasq 1539 nobody 6u IPv4 29038 0t0 TCP myhost:domain (LISTEN) As it seems, the issue was caused by systemd-resolved. I have no more DNS leaks since I stopped and disabled the service $ sudo systemctl disable systemd-resolved Removed /etc/systemd/system/dbus-org.freedesktop.resolve1.service. Removed /etc/systemd/system/multi-user.target.wants/systemd-resolved.service. 1 OpenSourcerer reacted to this Share this post Link to post
OpenSourcerer 1435 Posted ... 41 minutes ago, lpav said: As it seems, the issue was caused by systemd-resolved. I have no more DNS leaks since I stopped and disabled the service I was thinking about something like this but I read you were using NetworkManager, so I didn't investigate in that direction. But yeah, it really was a second resolver running in the background. This definitely fixes the problem. 1 lpav reacted to this Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
Oblivion 2013 8 Posted ... (edited) I have something similar. I use Eddie 2.21.5beta too. With normal firefox from snap or from an apt install firefox there are no DNS leaks. With firefox from flatpak DNS servers from Google show up but AirVpn DNS servers also show up. This fixes it for Firefox Flatpak version: Goto about:config look for: security.enterprise_roots.enabled Set it to true Restart, now no more DNS leaks in Firefox flatpak version. I will look if I too have a second resolver like Topic Starter so I will temporarily undo security.enterprise_roots.enabled fix and report back later. I don´t understand, but perhaps al flatpak software has dns leak if it wants too. Firefox allows it to be customized though. ------- Back with more info ---------- Edit: I tried: sudo systemctl disable systemd-resolved But it doesn´t solve DNS leaks for flatpak software unless in this example flatpak software is instructed to not use DNS over TLS. I put back in about:config in firefox flatpak version security.enterprise_roots.enabled=true That forces Firefox flatpak version to only use the system DNS. Firefox allow this to be configured to I don´t understand where the problem in flatpak sofware would be. Flatpak software obviously can bypass the system DNS. Please notice, Firefox from an apt install or a snap install is not affected. Edited ... by Oblivion 2013 Share this post Link to post
Oblivion 2013 8 Posted ... Please note: Do not do this command: sudo systemctl disable systemd-resolved If you have done this command you must do sudo systemctl enable systemd-resolved sudo systemctl start systemd-resolved This topic is difficult to understand, do not enter commands without precaution. If you make an error it is possible for example that /etc/resolve.conf can no longer be accessed, and it is a symbolic link! Please take care do not enter commands without knowing how to undo! I have it working again, but I still cannot prevent flatpak software to bypass the DNS servers. Please be careful, you can end up with a system without being able to connect to internet at all if you enter wrong command. All other versions like snap Firefox or apt Firefox cannot bypass network lock or anything at all. This command must not be executed: sudo systemctl disable systemd-resolved Do not execute that command! Share this post Link to post
OpenSourcerer 1435 Posted ... 1 hour ago, Oblivion 2013 said: Please note: Do not do this command: sudo systemctl disable systemd-resolved If you have done this command you must do sudo systemctl enable systemd-resolved sudo systemctl start systemd-resolved This topic is difficult to understand, do not enter commands without precaution. If you make an error it is possible for example that /etc/resolve.conf can no longer be accessed, and it is a symbolic link! Don't scare the people, please. It's good advice: Don't blindly execute commands you find on the internet, especially when there's a sudo or pkexec involved (= privilege escalation). You wouldn't blindly execute unknown Windows installers for some software, now, would you? If you don't understand and got the chance, ask the one giving you the command what it does or use things like https://explainshell.com to explain it. 1 hour ago, Oblivion 2013 said: Please be careful, you can end up with a system without being able to connect to internet at all if you enter wrong command. Half right. Be advised that DNS is not a requirement for working network connectivity, it's a service on top of the network stack operating on layer 7. It's the reason why neither net-tools/ifconfig nor iproute2 ever configure DNS servers. It's also the reason why there are two different Systemd modules for networking, systemd-networkd for network config and systemd-resolved for DNS config. Obviously one needs to know which DNS resolvers are installed and configured on the system to make informed decisions about stopping resolvers on the local system. In the case of lpav, we suspected two resolvers running, so Mr. lpav was far away from a nonfunctioning DNS stack. In that case, the command did not do any harm. In most other cases one resolver is active which shouldn't be disabled unless intended to be replaced by another. 14 hours ago, Oblivion 2013 said: But it doesn´t solve DNS leaks for flatpak software unless in this example flatpak software is instructed to not use DNS over TLS. If someone could please do a little research into the topic of Flatpak + DNS (leaks), this'd be a valuable addition to the community. I can't test any of it because I don't use Flatpak and probably never will. Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
MarxBrother 2 Posted ... Oblivion 2013: "Please note: Do not do this command: sudo systemctl disable systemd-resolved" ??? OpenSourcerer: "Don't scare the people, please." Right. What scares me most is a DNSLeak! And I've got one. I used to ride an older Version of Eddie for a long time, checked for DNSLeaks now and then - nothing. Then upgrading to Debian Bullsey forced me to switch to Eddie 2.21.3. And then I missed to recheck for DNSLeaks, what a mistake! I thought it might be an issue of 2.21.3. So I uninstalled that, and tried to install 2.21.8. When I ran apt install it complained about the integrity of some dvdlib and said: "aborted". Anyway, 2.21.8 seems to be installed correctly. I fired it up and - DNSLeak! I use the Firefox that came along with Bullsey, now it is 91.12.0 esr. The funny thing is that I had to use BOTH of the tricks mentioned above to get rid of that nasty leak. "security.enterprise_roots.enabled=true" AND "sudo systemctl disable systemd-resolved" Now, at least at a first glance everything seems to work fine, be it Eddie running (then, without DNSLeak) or not. So, thank you, Oblivion2013, OpenSourcerer and Ipav! Share this post Link to post
MarxBrother 2 Posted ... Oh, wait a moment! I was to quick! Damm it, the leak is still there! I ran the "standard test" of dnsleaktest.com - everything fine! But now, I ran the "extended test" - and hell! It showed the AirVPN Server of my VPN connection - plus the two DNS-Severs of my internet provider! Immediately after that, I ran the extended test again, but now - everything fine! Just the AirVPN Server of my VPN connection. Ran it again, and again, and again - every time the same result: Servers found: 1 I am confused. Is this a random effect? Share this post Link to post
MarxBrother 2 Posted ... After restarting the system - bang! Query round Progress... Servers found 1 ...... 1 2 ...... 2 3 ...... 2 4 ...... 2 5 ...... 1 6 ...... 1 IP Hostname ISP Country 134.19.179.163 163.179.19.134.in-addr.arpa. Global Layer B.V. Amsterdam, Netherlands ww.xx.yy.zz None *provider name country* Is anyone able to help me with this? Share this post Link to post
OpenSourcerer 1435 Posted ... 11 hours ago, MarxBrother said: After restarting the system - bang! Query round Progress... Servers found 1 ...... 1 2 ...... 2 3 ...... 2 4 ...... 2 5 ...... 1 6 ...... 1 IP Hostname ISP Country 134.19.179.163 163.179.19.134.in-addr.arpa. Global Layer B.V. Amsterdam, Netherlands ww.xx.yy.zz None *provider name country* Is anyone able to help me with this? I have no idea whether it's related to the topic or you trying to get everyone to help you with something different, like "while you're at it, please fix also this" – no. Open another thread for your problems, this topic deals with DNS leaks on Arch running QEMU, connecting with obsolete Eddie 2.21.5 beta, solved by disabling the second resolver. Your issue, and the issue of the other hijacker, was something about Firefox. This is not a Firefox topic. Closing. Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post