loinchaloin 0 Posted ... (edited) I have a couple of apps on my android phone that need to communicate with my computer (when on the same wifi network), such as an mpd client and kdeconnect, but they are blocked when using Eddie. Is remote port forwarding what I should be looking at to do this? Edited ... by loinchaloin Quote Share this post Link to post
OpenSourcerer 1435 Posted ... Check if in Settings > System the option Exclude local networks from the VPN is checked. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
loinchaloin 0 Posted ... In eddie? I don't see System and can't find Exclude local networks from the VPN anywhere else. Quote Share this post Link to post
OpenSourcerer 1435 Posted ... 21 hours ago, loinchaloin said: In eddie? I don't see System and can't find Exclude local networks from the VPN anywhere else. I see, you mean Eddie on Windows. Wasn't entirely clear what was communicating where, and you mentioned Android, so I figured it's Eddie for Android connecting. Then please connect as you usually do and in Logs tab click the lifebelt icon on the right. Paste/upload the output here. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
loinchaloin 0 Posted ... Oh sorry, no I'm using Eddie on linux and the phone is just android with no vpn. Here is the log (some addresses redacted with ...): I 2022.04.01 19:29:05 - Session starting. I 2022.04.01 19:29:05 - Checking authorization ... . 2022.04.01 19:29:06 - IPv6 disabled on network adapter (default) . 2022.04.01 19:29:06 - IPv6 disabled on network adapter (enp34s0) . 2022.04.01 19:29:06 - IPv6 disabled on network adapter (wlo1) ! 2022.04.01 19:29:06 - Connecting to Ancha (Netherlands, Alblasserdam) . 2022.04.01 19:29:06 - OpenVPN > OpenVPN 2.5.6 [git:makepkg/e8df2e64d6f817e6+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Mar 16 2022 . 2022.04.01 19:29:06 - OpenVPN > library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.10 . 2022.04.01 19:29:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.04.01 19:29:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.04.01 19:29:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.04.01 19:29:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.04.01 19:29:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]...:443 . 2022.04.01 19:29:06 - OpenVPN > Socket Buffers: R=[131072->131072] S=[16384->16384] . 2022.04.01 19:29:06 - OpenVPN > Attempting to establish TCP connection with [AF_INET]...:443 [nonblock] . 2022.04.01 19:29:06 - OpenVPN > TCP connection established with [AF_INET]...:443 . 2022.04.01 19:29:06 - OpenVPN > TCP_CLIENT link local: (not bound) . 2022.04.01 19:29:06 - OpenVPN > TCP_CLIENT link remote: [AF_INET]...:443 . 2022.04.01 19:29:06 - OpenVPN > TLS: Initial packet from [AF_INET]...:443, sid=52c3e325 422dd97a . 2022.04.01 19:29:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.04.01 19:29:06 - OpenVPN > VERIFY KU OK . 2022.04.01 19:29:06 - OpenVPN > Validating certificate extended key usage . 2022.04.01 19:29:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.04.01 19:29:06 - OpenVPN > VERIFY EKU OK . 2022.04.01 19:29:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ancha, emailAddress=info@airvpn.org . 2022.04.01 19:29:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.04.01 19:29:06 - OpenVPN > [Ancha] Peer Connection Initiated with [AF_INET]...:443 . 2022.04.01 19:29:07 - OpenVPN > SENT CONTROL [Ancha]: 'PUSH_REQUEST' (status=1) . 2022.04.01 19:29:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS ...,dhcp-option DNS6 ...::1,tun-ipv6,route-gateway ...,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 ...::1013/64 fde6:...,ifconfig ... 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.04.01 19:29:07 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.04.01 19:29:07 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 ...::1' . 2022.04.01 19:29:07 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.04.01 19:29:07 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:...::1013/64 ...::1' . 2022.04.01 19:29:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.04.01 19:29:07 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.04.01 19:29:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.04.01 19:29:07 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.04.01 19:29:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.04.01 19:29:07 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.04.01 19:29:07 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2022.04.01 19:29:07 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.04.01 19:29:07 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.04.01 19:29:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.04.01 19:29:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.04.01 19:29:07 - OpenVPN > net_route_v4_best_gw query: dst 0.0.0.0 . 2022.04.01 19:29:07 - OpenVPN > net_route_v4_best_gw result: via 192.168.0.1 dev wlo1 . 2022.04.01 19:29:07 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=wlo1 HWADDR=.... . 2022.04.01 19:29:07 - OpenVPN > TUN/TAP device tun0 opened . 2022.04.01 19:29:07 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.04.01 19:29:07 - OpenVPN > net_iface_up: set tun0 up . 2022.04.01 19:29:07 - OpenVPN > net_addr_v4_add: 10.8.231.21/24 dev tun0 . 2022.04.01 19:29:12 - OpenVPN > net_route_v4_add: .../32 via 192.168.0.1 dev [NULL] table 0 metric -1 . 2022.04.01 19:29:12 - OpenVPN > net_route_v4_add: 0.0.0.0/1 via ... dev [NULL] table 0 metric -1 . 2022.04.01 19:29:12 - OpenVPN > net_route_v4_add: 128.0.0.0/1 via 10.8.231.1 dev [NULL] table 0 metric -1 . 2022.04.01 19:29:12 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2022.04.01 19:29:12 - Routes, added a new route, ... for gateway 10.8.231.1 . 2022.04.01 19:29:12 - Unable to compute route for ...: IPv6 VPN gateway not available. . 2022.04.01 19:29:12 - Flushing DNS . 2022.04.01 19:29:12 - Flush DNS - nscd I 2022.04.01 19:29:12 - Checking route IPv4 I 2022.04.01 19:29:13 - Checking DNS ! 2022.04.01 19:29:14 - Connected. . 2022.04.01 19:29:14 - OpenVPN > Initialization Sequence Completed Quote Share this post Link to post
OpenSourcerer 1435 Posted ... 33 minutes ago, loinchaloin said: Here is the log (some addresses redacted with ...): I did not ask for the logs. I asked for the support file (Logs > lifebelt icon right of the logs). Do not redact addresses unless they are v6 and start with 2 or 3, all others are not incriminating. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
loinchaloin 0 Posted ... Ok, sorry. I would have preferred not showing where I am connecting to but it doesn't matter really: Eddie System/Environment Report - 01/04/2022 - 19:34 UTC Eddie version: 2.20.0 Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: Arch Linux \r (\l) OS version: Linux hyperion 5.16.16-zen1-1-zen #1 ZEN SMP PREEMPT Mon, 21 Mar 2022 22:59:42 +0000 x86_64 GNU/Linux OS architecture: x64 Mono /.Net Framework: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319 TUN driver: /dev/net/tun OpenVPN: 2.5.6 - OpenSSL 1.1.1n 15 Mar 2022, LZO 2.10 (/usr/bin/openvpn) Hummingbird: () SSH: OpenSSH_8.9p1, OpenSSL 1.1.1n 15 Mar 2022 (/usr/bin/ssh) SSL: Initializing (/usr/bin/stunnel) curl: 7.82.0 (/usr/bin/curl) Profile path: /home/user/.config/eddie/default.profile Data path: /home/user/.config/eddie Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/eddie-ui.exe Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" Network Lock Active: No Connected to VPN: Yes, Pleione Detected DNS: 10.27.39.1 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 202 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: curl: (7) Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True key: (omissis) mode.protocol: TCP mode.alt: 2 netlock.mode: linux_nftables network.entry.iplayer: ipv4-only network.ipv6.mode: block advanced.expert: True ---------------------------- Logs: . 2022.04.01 20:33:08 - Eddie version: 2.20.0 / linux_x64, System: Linux, Name: Arch Linux \r (\l), Version: Linux hyperion 5.16.16-zen1-1-zen #1 ZEN SMP PREEMPT Mon, 21 Mar 2022 22:59:42 +0000 x86_64 GNU/Linux, Mono/.Net: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319 . 2022.04.01 20:33:08 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2022.04.01 20:33:08 - Raise system privileges . 2022.04.01 20:33:14 - Profile path: /home/user/.config/eddie/default.profile . 2022.04.01 20:33:14 - Reading options from /home/user/.config/eddie/default.profile . 2022.04.01 20:33:15 - Tun Driver - /dev/net/tun . 2022.04.01 20:33:15 - OpenVPN - Version: 2.5.6 - OpenSSL 1.1.1n 15 Mar 2022, LZO 2.10 (/usr/bin/openvpn) . 2022.04.01 20:33:15 - SSH - Version: OpenSSH_8.9p1, OpenSSL 1.1.1n 15 Mar 2022 (/usr/bin/ssh) . 2022.04.01 20:33:15 - SSL - Version: Initializing (/usr/bin/stunnel) . 2022.04.01 20:33:15 - curl - Version: 7.82.0 (/usr/bin/curl) I 2022.04.01 20:33:16 - Ready . 2022.04.01 20:33:16 - Collect information about AirVPN completed I 2022.04.01 20:33:19 - Session starting. . 2022.04.01 20:33:19 - Waiting for latency tests (175 to go) . 2022.04.01 20:33:21 - Waiting for latency tests (154 to go) . 2022.04.01 20:33:22 - Waiting for latency tests (150 to go) . 2022.04.01 20:33:25 - Waiting for latency tests (131 to go) . 2022.04.01 20:33:26 - Waiting for latency tests (126 to go) . 2022.04.01 20:33:27 - Waiting for latency tests (124 to go) . 2022.04.01 20:33:29 - Waiting for latency tests (107 to go) . 2022.04.01 20:33:30 - Waiting for latency tests (106 to go) . 2022.04.01 20:33:32 - Waiting for latency tests (101 to go) . 2022.04.01 20:33:34 - Waiting for latency tests (97 to go) . 2022.04.01 20:33:35 - Waiting for latency tests (82 to go) . 2022.04.01 20:33:36 - Waiting for latency tests (78 to go) . 2022.04.01 20:33:38 - Waiting for latency tests (77 to go) . 2022.04.01 20:33:39 - Waiting for latency tests (62 to go) . 2022.04.01 20:33:40 - Waiting for latency tests (58 to go) . 2022.04.01 20:33:43 - Waiting for latency tests (41 to go) . 2022.04.01 20:33:44 - Waiting for latency tests (39 to go) . 2022.04.01 20:33:47 - Waiting for latency tests (20 to go) . 2022.04.01 20:33:48 - Waiting for latency tests (15 to go) . 2022.04.01 20:33:51 - Waiting for latency tests (1 to go) I 2022.04.01 20:33:53 - Checking authorization ... . 2022.04.01 20:33:54 - IPv6 disabled on network adapter (default) . 2022.04.01 20:33:54 - IPv6 disabled on network adapter (enp34s0) . 2022.04.01 20:33:54 - IPv6 disabled on network adapter (wlo1) ! 2022.04.01 20:33:54 - Connecting to Pleione (Netherlands, Alblasserdam) . 2022.04.01 20:33:54 - OpenVPN > OpenVPN 2.5.6 [git:makepkg/e8df2e64d6f817e6+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Mar 16 2022 . 2022.04.01 20:33:54 - OpenVPN > library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.10 . 2022.04.01 20:33:54 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.04.01 20:33:54 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.04.01 20:33:54 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.04.01 20:33:54 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.04.01 20:33:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.151:443 . 2022.04.01 20:33:54 - OpenVPN > Socket Buffers: R=[131072->131072] S=[16384->16384] . 2022.04.01 20:33:54 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.162.151:443 [nonblock] . 2022.04.01 20:33:54 - OpenVPN > TCP connection established with [AF_INET]213.152.162.151:443 . 2022.04.01 20:33:54 - OpenVPN > TCP_CLIENT link local: (not bound) . 2022.04.01 20:33:54 - OpenVPN > TCP_CLIENT link remote: [AF_INET]213.152.162.151:443 . 2022.04.01 20:33:54 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.151:443, sid=2f08cef3 bea4871f . 2022.04.01 20:33:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.04.01 20:33:54 - OpenVPN > VERIFY KU OK . 2022.04.01 20:33:54 - OpenVPN > Validating certificate extended key usage . 2022.04.01 20:33:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.04.01 20:33:54 - OpenVPN > VERIFY EKU OK . 2022.04.01 20:33:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pleione, emailAddress=info@airvpn.org . 2022.04.01 20:33:55 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.04.01 20:33:55 - OpenVPN > [Pleione] Peer Connection Initiated with [AF_INET]213.152.162.151:443 . 2022.04.01 20:33:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.39.1,dhcp-option DNS6 fde6:7a:7d20:1727::1,tun-ipv6,route-gateway 10.27.39.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1727::10be/64 fde6:7a:7d20:1727::1,ifconfig 10.27.39.192 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2022.04.01 20:33:55 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.04.01 20:33:55 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1727::1' . 2022.04.01 20:33:55 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.04.01 20:33:55 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1727::10be/64 fde6:7a:7d20:1727::1' . 2022.04.01 20:33:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.04.01 20:33:55 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.04.01 20:33:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.04.01 20:33:55 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.04.01 20:33:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.04.01 20:33:55 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.04.01 20:33:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2022.04.01 20:33:55 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.04.01 20:33:55 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.04.01 20:33:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.04.01 20:33:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.04.01 20:33:55 - OpenVPN > net_route_v4_best_gw query: dst 0.0.0.0 . 2022.04.01 20:33:55 - OpenVPN > net_route_v4_best_gw result: via 192.168.0.1 dev wlo1 . 2022.04.01 20:33:55 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=wlo1 HWADDR=50:2b:73:d8:07:13 . 2022.04.01 20:33:55 - OpenVPN > TUN/TAP device tun0 opened . 2022.04.01 20:33:55 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.04.01 20:33:55 - OpenVPN > net_iface_up: set tun0 up . 2022.04.01 20:33:55 - OpenVPN > net_addr_v4_add: 10.27.39.192/24 dev tun0 . 2022.04.01 20:34:00 - OpenVPN > net_route_v4_add: 213.152.162.151/32 via 192.168.0.1 dev [NULL] table 0 metric -1 . 2022.04.01 20:34:00 - OpenVPN > net_route_v4_add: 0.0.0.0/1 via 10.27.39.1 dev [NULL] table 0 metric -1 . 2022.04.01 20:34:00 - OpenVPN > net_route_v4_add: 128.0.0.0/1 via 10.27.39.1 dev [NULL] table 0 metric -1 . 2022.04.01 20:34:00 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2022.04.01 20:34:00 - Routes, added a new route, 213.152.162.149 for gateway 10.27.39.1 . 2022.04.01 20:34:00 - Unable to compute route for 2a00:1678:2470:8:c4b8:80bc:94d9:951b: IPv6 VPN gateway not available. . 2022.04.01 20:34:00 - Flushing DNS . 2022.04.01 20:34:00 - Flush DNS - nscd I 2022.04.01 20:34:00 - Checking route IPv4 I 2022.04.01 20:34:01 - Checking DNS ! 2022.04.01 20:34:02 - Connected. . 2022.04.01 20:34:02 - OpenVPN > Initialization Sequence Completed ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": false, "routes": [ { "address": "0.0.0.0\/1", "gateway": "10.27.39.1", "interface": "tun0" }, { "address": "0.0.0.0\/0", "gateway": "192.168.0.1", "interface": "wlo1", "metric": "600" }, { "address": "0.0.0.0\/0", "gateway": "192.168.0.1", "interface": "wlo1", "metric": "1024" }, { "address": "128.0.0.0\/1", "gateway": "10.27.39.1", "interface": "tun0" }, { "address": "194.168.4.100", "gateway": "192.168.0.1", "interface": "wlo1", "metric": "1024" }, { "address": "194.168.8.100", "gateway": "192.168.0.1", "interface": "wlo1", "metric": "1024" }, { "address": "213.152.162.149", "gateway": "10.27.39.1", "interface": "tun0" }, { "address": "213.152.162.151", "gateway": "192.168.0.1", "interface": "lo", "metric": "256" } ], "interfaces": [ { "friendly": "lo", "id": "lo", "name": "lo", "description": "lo", "type": "Loopback", "status": "Unknown", "bytes_received": "1569447132", "bytes_sent": "1569447132", "support_ipv4": true, "support_ipv6": false, "ips": [ "127.0.0.1", "::1" ], "gateways": [ "192.168.0.1" ], "bind": true }, { "friendly": "enp34s0", "id": "enp34s0", "name": "enp34s0", "description": "enp34s0", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [], "gateways": [], "bind": false }, { "friendly": "wlo1", "id": "wlo1", "name": "wlo1", "description": "wlo1", "type": "Wireless80211", "status": "Up", "bytes_received": "73275118595", "bytes_sent": "4443432262", "support_ipv4": true, "support_ipv6": false, "ips": [ "192.168.0.16" ], "gateways": [ "192.168.0.1" ], "bind": true }, { "friendly": "tun0", "id": "tun0", "name": "tun0", "description": "tun0", "type": "0", "status": "Unknown", "bytes_received": "33758", "bytes_sent": "40193", "support_ipv4": true, "support_ipv6": false, "ips": [ "10.27.39.192" ], "gateways": [ "10.27.39.1" ], "bind": true } ], "ipv4-default-gateway": "192.168.0.1", "ipv4-default-interface": "wlo1" } ---------------------------- ip addr show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: enp34s0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc fq_codel state DOWN group default qlen 1000 link/ether 2c:f0:5d:89:40:65 brd ff:ff:ff:ff:ff:ff 3: wlo1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000 link/ether 50:2b:73:d8:07:13 brd ff:ff:ff:ff:ff:ff altname wlp33s0 inet 192.168.0.16/24 brd 192.168.0.255 scope global dynamic wlo1 valid_lft 84679sec preferred_lft 84679sec 11: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 500 link/none inet 10.27.39.192/24 scope global tun0 valid_lft forever preferred_lft forever ---------------------------- ip link show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: enp34s0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc fq_codel state DOWN mode DEFAULT group default qlen 1000 link/ether 2c:f0:5d:89:40:65 brd ff:ff:ff:ff:ff:ff 3: wlo1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DORMANT group default qlen 1000 link/ether 50:2b:73:d8:07:13 brd ff:ff:ff:ff:ff:ff altname wlp33s0 11: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN mode DEFAULT group default qlen 500 link/none ---------------------------- ip -4 route show: 0.0.0.0/1 via 10.27.39.1 dev tun0 default via 192.168.0.1 dev wlo1 proto dhcp metric 600 default via 192.168.0.1 dev wlo1 proto dhcp src 192.168.0.16 metric 1024 10.27.39.0/24 dev tun0 proto kernel scope link src 10.27.39.192 128.0.0.0/1 via 10.27.39.1 dev tun0 192.168.0.0/24 dev wlo1 proto kernel scope link src 192.168.0.16 192.168.0.0/24 dev wlo1 proto kernel scope link src 192.168.0.16 metric 600 192.168.0.1 dev wlo1 proto dhcp scope link src 192.168.0.16 metric 1024 194.168.4.100 via 192.168.0.1 dev wlo1 proto dhcp src 192.168.0.16 metric 1024 194.168.8.100 via 192.168.0.1 dev wlo1 proto dhcp src 192.168.0.16 metric 1024 213.152.162.149 via 10.27.39.1 dev tun0 213.152.162.151 via 192.168.0.1 dev wlo1 ---------------------------- ip -6 route show: ::1 dev lo proto kernel metric 256 pref medium Quote Share this post Link to post
OpenSourcerer 1435 Posted ... Can you first try to set Preferences > DNS > DNS switch mode to None, reconnect and try again? 12 hours ago, loinchaloin said: netlock.mode: linux_nftables Let's try a different NetLock mode if the DNS thing didn't work. Reset this to Automatic or set it to iptables-legacy and retry. Try it without NetLock, too. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
loinchaloin 0 Posted ... Sorry for the late reply, been a bit busy. Setting Preferences > DNS > DNS switch mode to None causes me to not be able to connect. I can't use iptables as there is an issue on the linux client - https://airvpn.org/forums/topic/49520-linux-airvpn-suite-110-released/page/2/?tab=comments#comment-170887 I think I have narrowed the problem down a little. My mpd client is able to connect from phone to pc but it is kdeconnect which is problematic. It connects and works fine at first (eg have no eddie running, run kdeconnect on my phone and it connects, start eddie with network lock and it continues to work) but I've noticed that if I put the pc to sleep and resume, eddie reconnects automatically and then kdeconnect is not able to make a connection. And it does seem to be caused by the network lock because without it kdeconnect works after sleep/resume/reconnect. I tried adding my phone's local IP to the allowed for incoming under Network Lock preferences and that solved the problem I think but I'm not sure if that is the best way - can ports be specified in there? Quote Share this post Link to post
OpenSourcerer 1435 Posted ... 27 minutes ago, loinchaloin said: Setting Preferences > DNS > DNS switch mode to None causes me to not be able to connect. This makes no sense at all. Logs of this? 28 minutes ago, loinchaloin said: I can't use iptables as there is an issue on the linux client - https://airvpn.org/forums/topic/49520-linux-airvpn-suite-110-released/page/2/?tab=comments#comment-170887 Try the beta, it's got a lot of fixes for 2.20 things. 29 minutes ago, loinchaloin said: I tried adding my phone's local IP to the allowed for incoming under Network Lock preferences and that solved the problem I think but I'm not sure if that is the best way - can ports be specified in there? You can leave it like this. The connection is local, anyway. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
loinchaloin 0 Posted ... For the DNS Switch this is the log: Eddie System/Environment Report - 18/04/2022 - 14:52 UTC Eddie version: 2.21.5beta Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: Arch Linux OS version: Linux hyperion 5.17.1-zen1-1-zen #1 ZEN SMP PREEMPT Mon, 28 Mar 2022 21:56:46 +0000 x86_64 GNU/Linux OS architecture: x64 Mono /.Net Framework: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319 OpenVPN: 2.5.6 - OpenSSL 1.1.1n 15 Mar 2022, LZO 2.10 (/usr/bin/openvpn) Hummingbird: Not available WireGuard: 1.0.0 SSH: OpenSSH_8.9p1, OpenSSL 1.1.1n 15 Mar 2022 (/usr/bin/ssh) SSL: Initializing (/usr/bin/stunnel) curl: 7.82.0 (/usr/bin/curl) Profile path: /home/alex/.config/eddie/default.profile Data path: /home/alex/.config/eddie Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/eddie-ui.exe Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" Network Lock Active: No Connected to VPN: No OS support IPv4: Yes OS support IPv6: Yes Detected DNS: 194.168.4.100, 194.168.8.100 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 83 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: curl: (7) Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True key: (omissis) connect: True netlock: True servers.allowlist: 17388082e9599070763fffe8f5096959cd23e3f311ea0aa8448c01fdbe26799d,4443a8f48e0a450aaef8b37ab086f3531bf3daf888a3770dbba083612cd60122,6fca8775d08f47fc2b63ba975f48247ed937a39183ba4199d238fcc5a2e3c20e,30bf61cb9977915afbe44dd93309dec19fa92c49976f5ab39296d5e7bda9aba6,e625505a7b8f3987dd5c7ee536b98c498f36fa4ed4bed3cc7d4b3041a7beaf83 mode.type: openvpn mode.protocol: UDP mode.alt: 2 proxy.mode: none dns.mode: none network.ipv6.mode: in network.ipv4.autoswitch: True advanced.expert: True ui.skip.provider.manifest.failed: True ---------------------------- Logs: ! 2022.04.18 15:10:12 - Activation of Network Lock - Linux nftables I 2022.04.18 15:10:13 - Session starting. I 2022.04.18 15:10:13 - Checking authorization ... ! 2022.04.18 15:10:14 - Connecting to Asellus (Netherlands, Alblasserdam) . 2022.04.18 15:10:14 - Routes, add 213.152.187.212/32 for interface "wlo1". . 2022.04.18 15:10:14 - Routes, add 213.152.187.212/32 for interface "wlo1", already exists. . 2022.04.18 15:10:14 - OpenVPN > OpenVPN 2.5.6 [git:makepkg/e8df2e64d6f817e6+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Mar 16 2022 . 2022.04.18 15:10:14 - OpenVPN > library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.10 . 2022.04.18 15:10:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.04.18 15:10:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.04.18 15:10:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.04.18 15:10:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.04.18 15:10:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.187.212:443 . 2022.04.18 15:10:14 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.04.18 15:10:14 - OpenVPN > UDP link local: (not bound) . 2022.04.18 15:10:14 - OpenVPN > UDP link remote: [AF_INET]213.152.187.212:443 . 2022.04.18 15:10:14 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.187.212:443, sid=c63352cd 61b8ea12 . 2022.04.18 15:10:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.04.18 15:10:14 - OpenVPN > VERIFY KU OK . 2022.04.18 15:10:14 - OpenVPN > Validating certificate extended key usage . 2022.04.18 15:10:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.04.18 15:10:14 - OpenVPN > VERIFY EKU OK . 2022.04.18 15:10:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Asellus, emailAddress=info@airvpn.org . 2022.04.18 15:10:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.04.18 15:10:14 - OpenVPN > [Asellus] Peer Connection Initiated with [AF_INET]213.152.187.212:443 . 2022.04.18 15:10:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.6.1,dhcp-option DNS6 fde6:7a:7d20:606::1,tun-ipv6,route-gateway 10.10.6.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:606::1071/64 fde6:7a:7d20:606::1,ifconfig 10.10.6.115 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2022.04.18 15:10:14 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.04.18 15:10:14 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.10.6.1' . 2022.04.18 15:10:14 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:606::1' . 2022.04.18 15:10:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.04.18 15:10:14 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.04.18 15:10:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.04.18 15:10:14 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.04.18 15:10:14 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.04.18 15:10:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.04.18 15:10:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.04.18 15:10:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.04.18 15:10:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.04.18 15:10:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.04.18 15:10:14 - OpenVPN > TUN/TAP device tun0 opened . 2022.04.18 15:10:15 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.04.18 15:10:15 - OpenVPN > net_iface_up: set tun0 up . 2022.04.18 15:10:15 - OpenVPN > net_addr_v4_add: 10.10.6.115/24 dev tun0 . 2022.04.18 15:10:15 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.04.18 15:10:15 - OpenVPN > net_iface_up: set tun0 up . 2022.04.18 15:10:15 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:606::1071/64 dev tun0 . 2022.04.18 15:10:19 - OpenVPN > Initialization Sequence Completed . 2022.04.18 15:10:19 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2022.04.18 15:10:19 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.04.18 15:10:19 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.04.18 15:10:19 - Routes, add ::/1 for interface "tun0". . 2022.04.18 15:10:19 - Routes, add 8000::/1 for interface "tun0". . 2022.04.18 15:10:19 - Routes, add 213.152.187.210/32 for interface "tun0". . 2022.04.18 15:10:19 - Routes, add 2a00:1678:1337:7a21:1467:3dd8:95d9:eced/128 for interface "tun0". . 2022.04.18 15:10:19 - Flushing DNS . 2022.04.18 15:10:19 - Flush DNS - nscd I 2022.04.18 15:10:19 - Checking route IPv4 I 2022.04.18 15:10:19 - Checking route IPv6 I 2022.04.18 15:10:20 - Checking DNS ! 2022.04.18 15:10:20 - Connected. . 2022.04.18 15:23:32 - Collect information about AirVPN completed ! 2022.04.18 15:49:20 - Disconnecting . 2022.04.18 15:49:20 - Sending soft termination signal . 2022.04.18 15:49:20 - OpenVPN > event_wait : Interrupted system call (code=4) . 2022.04.18 15:49:20 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.04.18 15:49:25 - OpenVPN > Closing TUN/TAP interface . 2022.04.18 15:49:25 - OpenVPN > net_addr_v4_del: 10.10.6.115 dev tun0 . 2022.04.18 15:49:25 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:606::1071/64 dev tun0 . 2022.04.18 15:49:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.04.18 15:49:25 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2022.04.18 15:49:25 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2022.04.18 15:49:25 - Routes, delete ::/1 for interface "tun0", not exists. . 2022.04.18 15:49:25 - Routes, delete 8000::/1 for interface "tun0", not exists. . 2022.04.18 15:49:25 - Routes, delete 213.152.187.212/32 for interface "wlo1". . 2022.04.18 15:49:25 - Routes, delete 213.152.187.210/32 for interface "tun0", not exists. . 2022.04.18 15:49:25 - Routes, delete 2a00:1678:1337:7a21:1467:3dd8:95d9:eced/128 for interface "tun0", not exists. . 2022.04.18 15:49:25 - Routes, delete 213.152.187.212/32 for interface "wlo1", not exists. . 2022.04.18 15:49:25 - DNS of the system restored to original settings (Rename method) . 2022.04.18 15:49:25 - Connection terminated. . 2022.04.18 15:49:25 - Flushing DNS . 2022.04.18 15:49:25 - Flush DNS - nscd ! 2022.04.18 15:49:25 - Session terminated. ! 2022.04.18 15:49:26 - Deactivation of Network Lock I 2022.04.18 15:51:25 - Session starting. I 2022.04.18 15:51:25 - Checking authorization ... ! 2022.04.18 15:51:25 - Connecting to Asellus (Netherlands, Alblasserdam) . 2022.04.18 15:51:25 - Routes, add 213.152.187.212/32 for interface "wlo1". . 2022.04.18 15:51:25 - Routes, add 213.152.187.212/32 for interface "wlo1", already exists. . 2022.04.18 15:51:26 - OpenVPN > OpenVPN 2.5.6 [git:makepkg/e8df2e64d6f817e6+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Mar 16 2022 . 2022.04.18 15:51:26 - OpenVPN > library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.10 . 2022.04.18 15:51:26 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.04.18 15:51:26 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.04.18 15:51:26 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.04.18 15:51:26 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.04.18 15:51:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.187.212:443 . 2022.04.18 15:51:26 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.04.18 15:51:26 - OpenVPN > UDP link local: (not bound) . 2022.04.18 15:51:26 - OpenVPN > UDP link remote: [AF_INET]213.152.187.212:443 . 2022.04.18 15:51:26 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.187.212:443, sid=f0b1753a 0c9ce316 . 2022.04.18 15:51:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.04.18 15:51:26 - OpenVPN > VERIFY KU OK . 2022.04.18 15:51:26 - OpenVPN > Validating certificate extended key usage . 2022.04.18 15:51:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.04.18 15:51:26 - OpenVPN > VERIFY EKU OK . 2022.04.18 15:51:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Asellus, emailAddress=info@airvpn.org . 2022.04.18 15:51:26 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.04.18 15:51:26 - OpenVPN > [Asellus] Peer Connection Initiated with [AF_INET]213.152.187.212:443 . 2022.04.18 15:51:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.6.1,dhcp-option DNS6 fde6:7a:7d20:606::1,tun-ipv6,route-gateway 10.10.6.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:606::1071/64 fde6:7a:7d20:606::1,ifconfig 10.10.6.115 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2022.04.18 15:51:26 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.04.18 15:51:26 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.10.6.1' . 2022.04.18 15:51:26 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:606::1' . 2022.04.18 15:51:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.04.18 15:51:26 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.04.18 15:51:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.04.18 15:51:26 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.04.18 15:51:26 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.04.18 15:51:26 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.04.18 15:51:26 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.04.18 15:51:26 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.04.18 15:51:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.04.18 15:51:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.04.18 15:51:26 - OpenVPN > TUN/TAP device tun0 opened . 2022.04.18 15:51:26 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.04.18 15:51:26 - OpenVPN > net_iface_up: set tun0 up . 2022.04.18 15:51:26 - OpenVPN > net_addr_v4_add: 10.10.6.115/24 dev tun0 . 2022.04.18 15:51:26 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.04.18 15:51:26 - OpenVPN > net_iface_up: set tun0 up . 2022.04.18 15:51:26 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:606::1071/64 dev tun0 . 2022.04.18 15:51:32 - OpenVPN > Initialization Sequence Completed . 2022.04.18 15:51:32 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.04.18 15:51:32 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.04.18 15:51:32 - Routes, add ::/1 for interface "tun0". . 2022.04.18 15:51:32 - Routes, add 8000::/1 for interface "tun0". . 2022.04.18 15:51:32 - Routes, add 213.152.187.210/32 for interface "tun0". . 2022.04.18 15:51:32 - Routes, add 2a00:1678:1337:7a21:1467:3dd8:95d9:eced/128 for interface "tun0". . 2022.04.18 15:51:32 - Flushing DNS . 2022.04.18 15:51:32 - Flush DNS - nscd I 2022.04.18 15:51:32 - Checking route IPv4 I 2022.04.18 15:51:32 - Checking route IPv6 I 2022.04.18 15:51:33 - Checking DNS . 2022.04.18 15:51:41 - Checking DNS (4° try) . 2022.04.18 15:51:45 - Checking DNS (5° try) E 2022.04.18 15:51:45 - Checking DNS failed, last reason: Checking DNS failed: znkxicpfvkimlqxfnytarbybexajqeuj ! 2022.04.18 15:51:45 - Disconnecting . 2022.04.18 15:51:45 - Sending soft termination signal . 2022.04.18 15:51:45 - OpenVPN > event_wait : Interrupted system call (code=4) . 2022.04.18 15:51:45 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.04.18 15:51:50 - OpenVPN > Closing TUN/TAP interface . 2022.04.18 15:51:50 - OpenVPN > net_addr_v4_del: 10.10.6.115 dev tun0 . 2022.04.18 15:51:50 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:606::1071/64 dev tun0 . 2022.04.18 15:51:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.04.18 15:51:50 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2022.04.18 15:51:50 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2022.04.18 15:51:50 - Routes, delete ::/1 for interface "tun0", not exists. . 2022.04.18 15:51:50 - Routes, delete 8000::/1 for interface "tun0", not exists. . 2022.04.18 15:51:50 - Routes, delete 213.152.187.212/32 for interface "wlo1". . 2022.04.18 15:51:50 - Routes, delete 213.152.187.210/32 for interface "tun0", not exists. . 2022.04.18 15:51:50 - Routes, delete 2a00:1678:1337:7a21:1467:3dd8:95d9:eced/128 for interface "tun0", not exists. . 2022.04.18 15:51:50 - Routes, delete 213.152.187.212/32 for interface "wlo1", not exists. . 2022.04.18 15:51:50 - Connection terminated. I 2022.04.18 15:51:52 - Cancel requested. ! 2022.04.18 15:51:52 - Session terminated. ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/0", "gateway": "192.168.0.1", "interface": "wlo1", "metric": "1024", "proto": "dhcp", "src": "192.168.0.16" }, { "destination": "0.0.0.0\/0", "gateway": "192.168.0.1", "interface": "wlo1", "metric": "20600", "proto": "dhcp" }, { "destination": "192.168.0.0\/24", "interface": "wlo1", "proto": "kernel", "scope": "link", "src": "192.168.0.16" }, { "destination": "192.168.0.0\/24", "interface": "wlo1", "metric": "600", "proto": "kernel", "scope": "link", "src": "192.168.0.16" }, { "destination": "192.168.0.1\/32", "interface": "wlo1", "metric": "1024", "proto": "dhcp", "scope": "link", "src": "192.168.0.16" }, { "destination": "194.168.4.100\/32", "gateway": "192.168.0.1", "interface": "wlo1", "metric": "1024", "proto": "dhcp", "src": "192.168.0.16" }, { "destination": "194.168.8.100\/32", "gateway": "192.168.0.1", "interface": "wlo1", "metric": "1024", "proto": "dhcp", "src": "192.168.0.16" }, { "destination": "::1\/128", "interface": "lo", "metric": "256", "pref": "medium", "proto": "kernel" }, { "destination": "fe80::\/64", "interface": "wlo1", "metric": "1024", "pref": "medium", "proto": "kernel" } ], "ipv4-default-gateway": "192.168.0.1", "ipv4-default-interface": "wlo1", "interfaces": [ { "friendly": "lo", "id": "lo", "name": "lo", "description": "lo", "type": "Loopback", "status": "Unknown", "bytes_received": "367502480", "bytes_sent": "367502480", "support_ipv4": true, "support_ipv6": true, "ips": [ "127.0.0.1", "::1" ], "bind": true }, { "friendly": "enp34s0", "id": "enp34s0", "name": "enp34s0", "description": "enp34s0", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "wlo1", "id": "wlo1", "name": "wlo1", "description": "wlo1", "type": "Wireless80211", "status": "Up", "bytes_received": "124549251767", "bytes_sent": "9422455516", "support_ipv4": true, "support_ipv6": true, "ips": [ "192.168.0.16", "fe80::c1e2:fa00:9589:7b45" ], "bind": true } ] } ---------------------------- ip addr show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: enp34s0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc fq_codel state DOWN group default qlen 1000 link/ether 2c:f0:5d:89:40:65 brd ff:ff:ff:ff:ff:ff 3: wlo1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000 link/ether 50:2b:73:d8:07:13 brd ff:ff:ff:ff:ff:ff altname wlp33s0 inet 192.168.0.16/24 brd 192.168.0.255 scope global dynamic wlo1 valid_lft 861057sec preferred_lft 861057sec inet6 fe80::c1e2:fa00:9589:7b45/64 scope link noprefixroute valid_lft forever preferred_lft forever ---------------------------- ip link show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: enp34s0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc fq_codel state DOWN mode DEFAULT group default qlen 1000 link/ether 2c:f0:5d:89:40:65 brd ff:ff:ff:ff:ff:ff 3: wlo1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DORMANT group default qlen 1000 link/ether 50:2b:73:d8:07:13 brd ff:ff:ff:ff:ff:ff altname wlp33s0 I am actually using the beta but I hadn't tried iptables with and indeed it does network lock now, thank you. In that case I will probably just keep the ip in the network lock preferences, seems like the easiest solution. Thanks for all your help. Quote Share this post Link to post
OpenSourcerer 1435 Posted ... Oh, right, I forgot. You must untick Check AirVPN DNS, too, if you switch DNS mode to None. It makes sense, after all. 3 hours ago, loinchaloin said: In that case I will probably just keep the ip in the network lock preferences, seems like the easiest solution. Thanks for all your help. Yep, best resolution in your case. Though I am wondering why the general setting to allow the complete local network doesn't work… and with that I am wondering if this is also the solution for similar cases of unreachable devices in the local network after NetLock activation in the past… Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post