Jump to content
Not connected, Your IP: 18.119.28.213
loinchaloin

I want to be able to use kdeconnect when Eddie is running

Recommended Posts

Posted ... (edited)

I have a couple of apps on my android phone that need to communicate with my computer (when on the same wifi network), such as an mpd client and kdeconnect, but they are blocked when using Eddie.

Is remote port forwarding what I should be looking at to do this?

Edited ... by loinchaloin

Share this post


Link to post

Check if in Settings > System the option Exclude local networks from the VPN is checked.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
21 hours ago, loinchaloin said:

In eddie? I don't see System and can't find Exclude local networks from the VPN anywhere else.


I see, you mean Eddie on Windows. Wasn't entirely clear what was communicating where, and you mentioned Android, so I figured it's Eddie for Android connecting.

Then please connect as you usually do and in Logs tab click the lifebelt icon on the right. Paste/upload the output here.

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Oh sorry, no I'm using Eddie on linux and the phone is just android with no vpn. Here is the log (some addresses redacted with ...):
 

I 2022.04.01 19:29:05 - Session starting.
I 2022.04.01 19:29:05 - Checking authorization ...
. 2022.04.01 19:29:06 - IPv6 disabled on network adapter (default)
. 2022.04.01 19:29:06 - IPv6 disabled on network adapter (enp34s0)
. 2022.04.01 19:29:06 - IPv6 disabled on network adapter (wlo1)
! 2022.04.01 19:29:06 - Connecting to Ancha (Netherlands, Alblasserdam)
. 2022.04.01 19:29:06 - OpenVPN > OpenVPN 2.5.6 [git:makepkg/e8df2e64d6f817e6+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Mar 16 2022
. 2022.04.01 19:29:06 - OpenVPN > library versions: OpenSSL 1.1.1n  15 Mar 2022, LZO 2.10
. 2022.04.01 19:29:06 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.04.01 19:29:06 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.04.01 19:29:06 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.04.01 19:29:06 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.04.01 19:29:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]...:443
. 2022.04.01 19:29:06 - OpenVPN > Socket Buffers: R=[131072->131072] S=[16384->16384]
. 2022.04.01 19:29:06 - OpenVPN > Attempting to establish TCP connection with [AF_INET]...:443 [nonblock]
. 2022.04.01 19:29:06 - OpenVPN > TCP connection established with [AF_INET]...:443
. 2022.04.01 19:29:06 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2022.04.01 19:29:06 - OpenVPN > TCP_CLIENT link remote: [AF_INET]...:443
. 2022.04.01 19:29:06 - OpenVPN > TLS: Initial packet from [AF_INET]...:443, sid=52c3e325 422dd97a
. 2022.04.01 19:29:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.04.01 19:29:06 - OpenVPN > VERIFY KU OK
. 2022.04.01 19:29:06 - OpenVPN > Validating certificate extended key usage
. 2022.04.01 19:29:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.04.01 19:29:06 - OpenVPN > VERIFY EKU OK
. 2022.04.01 19:29:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ancha, emailAddress=info@airvpn.org
. 2022.04.01 19:29:06 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.04.01 19:29:06 - OpenVPN > [Ancha] Peer Connection Initiated with [AF_INET]...:443
. 2022.04.01 19:29:07 - OpenVPN > SENT CONTROL [Ancha]: 'PUSH_REQUEST' (status=1)
. 2022.04.01 19:29:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS ...,dhcp-option DNS6 ...::1,tun-ipv6,route-gateway ...,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 ...::1013/64 fde6:...,ifconfig ... 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2022.04.01 19:29:07 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2022.04.01 19:29:07 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 ...::1'
. 2022.04.01 19:29:07 - OpenVPN > Pushed option removed by filter: 'tun-ipv6'
. 2022.04.01 19:29:07 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:...::1013/64 ...::1'
. 2022.04.01 19:29:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.04.01 19:29:07 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2022.04.01 19:29:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.04.01 19:29:07 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.04.01 19:29:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.04.01 19:29:07 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.04.01 19:29:07 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627
. 2022.04.01 19:29:07 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2022.04.01 19:29:07 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2022.04.01 19:29:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.04.01 19:29:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.04.01 19:29:07 - OpenVPN > net_route_v4_best_gw query: dst 0.0.0.0
. 2022.04.01 19:29:07 - OpenVPN > net_route_v4_best_gw result: via 192.168.0.1 dev wlo1
. 2022.04.01 19:29:07 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=wlo1 HWADDR=....
. 2022.04.01 19:29:07 - OpenVPN > TUN/TAP device tun0 opened
. 2022.04.01 19:29:07 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2022.04.01 19:29:07 - OpenVPN > net_iface_up: set tun0 up
. 2022.04.01 19:29:07 - OpenVPN > net_addr_v4_add: 10.8.231.21/24 dev tun0
. 2022.04.01 19:29:12 - OpenVPN > net_route_v4_add: .../32 via 192.168.0.1 dev [NULL] table 0 metric -1
. 2022.04.01 19:29:12 - OpenVPN > net_route_v4_add: 0.0.0.0/1 via ... dev [NULL] table 0 metric -1
. 2022.04.01 19:29:12 - OpenVPN > net_route_v4_add: 128.0.0.0/1 via 10.8.231.1 dev [NULL] table 0 metric -1
. 2022.04.01 19:29:12 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2022.04.01 19:29:12 - Routes, added a new route, ... for gateway 10.8.231.1
. 2022.04.01 19:29:12 - Unable to compute route for ...: IPv6 VPN gateway not available.
. 2022.04.01 19:29:12 - Flushing DNS
. 2022.04.01 19:29:12 - Flush DNS - nscd
I 2022.04.01 19:29:12 - Checking route IPv4
I 2022.04.01 19:29:13 - Checking DNS
! 2022.04.01 19:29:14 - Connected.
. 2022.04.01 19:29:14 - OpenVPN > Initialization Sequence Completed


 

Share this post


Link to post
33 minutes ago, loinchaloin said:

Here is the log (some addresses redacted with ...):


I did not ask for the logs. I asked for the support file (Logs > lifebelt icon right of the logs).
Do not redact addresses unless they are v6 and start with 2 or 3, all others are not incriminating.

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Ok, sorry. I would have preferred not showing where I am connecting to but it doesn't matter really:

 

Eddie System/Environment Report - 01/04/2022 - 19:34 UTC

Eddie version: 2.20.0
Eddie OS build: linux_x64
Eddie architecture: x64
OS type: Linux
OS name: Arch Linux \r (\l)
OS version: Linux hyperion 5.16.16-zen1-1-zen #1 ZEN SMP PREEMPT Mon, 21 Mar 2022 22:59:42 +0000 x86_64 GNU/Linux
OS architecture: x64
Mono /.Net Framework: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319
TUN driver: /dev/net/tun
OpenVPN: 2.5.6 - OpenSSL 1.1.1n  15 Mar 2022, LZO 2.10 (/usr/bin/openvpn)
Hummingbird:  ()
SSH: OpenSSH_8.9p1, OpenSSL 1.1.1n  15 Mar 2022 (/usr/bin/ssh)
SSL: Initializing (/usr/bin/stunnel)
curl: 7.82.0 (/usr/bin/curl)
Profile path: /home/user/.config/eddie/default.profile
Data path: /home/user/.config/eddie
Application path: /usr/lib/eddie-ui
Executable path: /usr/lib/eddie-ui/eddie-ui.exe
Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
Network Lock Active: No
Connected to VPN: Yes, Pleione
Detected DNS: 10.27.39.1
Test DNS IPv4: Ok
Test DNS IPv6: Failed
Test Ping IPv4: 202 ms
Test Ping IPv6: Failed
Test HTTP IPv4: Ok
Test HTTP IPv6: Error: curl: (7) Couldn't connect to server
Test HTTPS: Ok
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
key: (omissis)
mode.protocol: TCP
mode.alt: 2
netlock.mode: linux_nftables
network.entry.iplayer: ipv4-only
network.ipv6.mode: block
advanced.expert: True

----------------------------
Logs:

. 2022.04.01 20:33:08 - Eddie version: 2.20.0 / linux_x64, System: Linux, Name: Arch Linux \r (\l), Version: Linux hyperion 5.16.16-zen1-1-zen #1 ZEN SMP PREEMPT Mon, 21 Mar 2022 22:59:42 +0000 x86_64 GNU/Linux, Mono/.Net: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319
. 2022.04.01 20:33:08 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
. 2022.04.01 20:33:08 - Raise system privileges
. 2022.04.01 20:33:14 - Profile path: /home/user/.config/eddie/default.profile
. 2022.04.01 20:33:14 - Reading options from /home/user/.config/eddie/default.profile
. 2022.04.01 20:33:15 - Tun Driver - /dev/net/tun
. 2022.04.01 20:33:15 - OpenVPN - Version: 2.5.6 - OpenSSL 1.1.1n  15 Mar 2022, LZO 2.10 (/usr/bin/openvpn)
. 2022.04.01 20:33:15 - SSH - Version: OpenSSH_8.9p1, OpenSSL 1.1.1n  15 Mar 2022 (/usr/bin/ssh)
. 2022.04.01 20:33:15 - SSL - Version: Initializing (/usr/bin/stunnel)
. 2022.04.01 20:33:15 - curl - Version: 7.82.0 (/usr/bin/curl)
I 2022.04.01 20:33:16 - Ready
. 2022.04.01 20:33:16 - Collect information about AirVPN completed
I 2022.04.01 20:33:19 - Session starting.
. 2022.04.01 20:33:19 - Waiting for latency tests (175 to go)
. 2022.04.01 20:33:21 - Waiting for latency tests (154 to go)
. 2022.04.01 20:33:22 - Waiting for latency tests (150 to go)
. 2022.04.01 20:33:25 - Waiting for latency tests (131 to go)
. 2022.04.01 20:33:26 - Waiting for latency tests (126 to go)
. 2022.04.01 20:33:27 - Waiting for latency tests (124 to go)
. 2022.04.01 20:33:29 - Waiting for latency tests (107 to go)
. 2022.04.01 20:33:30 - Waiting for latency tests (106 to go)
. 2022.04.01 20:33:32 - Waiting for latency tests (101 to go)
. 2022.04.01 20:33:34 - Waiting for latency tests (97 to go)
. 2022.04.01 20:33:35 - Waiting for latency tests (82 to go)
. 2022.04.01 20:33:36 - Waiting for latency tests (78 to go)
. 2022.04.01 20:33:38 - Waiting for latency tests (77 to go)
. 2022.04.01 20:33:39 - Waiting for latency tests (62 to go)
. 2022.04.01 20:33:40 - Waiting for latency tests (58 to go)
. 2022.04.01 20:33:43 - Waiting for latency tests (41 to go)
. 2022.04.01 20:33:44 - Waiting for latency tests (39 to go)
. 2022.04.01 20:33:47 - Waiting for latency tests (20 to go)
. 2022.04.01 20:33:48 - Waiting for latency tests (15 to go)
. 2022.04.01 20:33:51 - Waiting for latency tests (1 to go)
I 2022.04.01 20:33:53 - Checking authorization ...
. 2022.04.01 20:33:54 - IPv6 disabled on network adapter (default)
. 2022.04.01 20:33:54 - IPv6 disabled on network adapter (enp34s0)
. 2022.04.01 20:33:54 - IPv6 disabled on network adapter (wlo1)
! 2022.04.01 20:33:54 - Connecting to Pleione (Netherlands, Alblasserdam)
. 2022.04.01 20:33:54 - OpenVPN > OpenVPN 2.5.6 [git:makepkg/e8df2e64d6f817e6+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Mar 16 2022
. 2022.04.01 20:33:54 - OpenVPN > library versions: OpenSSL 1.1.1n  15 Mar 2022, LZO 2.10
. 2022.04.01 20:33:54 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.04.01 20:33:54 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.04.01 20:33:54 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.04.01 20:33:54 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.04.01 20:33:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.151:443
. 2022.04.01 20:33:54 - OpenVPN > Socket Buffers: R=[131072->131072] S=[16384->16384]
. 2022.04.01 20:33:54 - OpenVPN > Attempting to establish TCP connection with [AF_INET]213.152.162.151:443 [nonblock]
. 2022.04.01 20:33:54 - OpenVPN > TCP connection established with [AF_INET]213.152.162.151:443
. 2022.04.01 20:33:54 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2022.04.01 20:33:54 - OpenVPN > TCP_CLIENT link remote: [AF_INET]213.152.162.151:443
. 2022.04.01 20:33:54 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.151:443, sid=2f08cef3 bea4871f
. 2022.04.01 20:33:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.04.01 20:33:54 - OpenVPN > VERIFY KU OK
. 2022.04.01 20:33:54 - OpenVPN > Validating certificate extended key usage
. 2022.04.01 20:33:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.04.01 20:33:54 - OpenVPN > VERIFY EKU OK
. 2022.04.01 20:33:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pleione, emailAddress=info@airvpn.org
. 2022.04.01 20:33:55 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.04.01 20:33:55 - OpenVPN > [Pleione] Peer Connection Initiated with [AF_INET]213.152.162.151:443
. 2022.04.01 20:33:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.39.1,dhcp-option DNS6 fde6:7a:7d20:1727::1,tun-ipv6,route-gateway 10.27.39.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1727::10be/64 fde6:7a:7d20:1727::1,ifconfig 10.27.39.192 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2022.04.01 20:33:55 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2022.04.01 20:33:55 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1727::1'
. 2022.04.01 20:33:55 - OpenVPN > Pushed option removed by filter: 'tun-ipv6'
. 2022.04.01 20:33:55 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1727::10be/64 fde6:7a:7d20:1727::1'
. 2022.04.01 20:33:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.04.01 20:33:55 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2022.04.01 20:33:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.04.01 20:33:55 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.04.01 20:33:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2022.04.01 20:33:55 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.04.01 20:33:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627
. 2022.04.01 20:33:55 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2022.04.01 20:33:55 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2022.04.01 20:33:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.04.01 20:33:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.04.01 20:33:55 - OpenVPN > net_route_v4_best_gw query: dst 0.0.0.0
. 2022.04.01 20:33:55 - OpenVPN > net_route_v4_best_gw result: via 192.168.0.1 dev wlo1
. 2022.04.01 20:33:55 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=wlo1 HWADDR=50:2b:73:d8:07:13
. 2022.04.01 20:33:55 - OpenVPN > TUN/TAP device tun0 opened
. 2022.04.01 20:33:55 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2022.04.01 20:33:55 - OpenVPN > net_iface_up: set tun0 up
. 2022.04.01 20:33:55 - OpenVPN > net_addr_v4_add: 10.27.39.192/24 dev tun0
. 2022.04.01 20:34:00 - OpenVPN > net_route_v4_add: 213.152.162.151/32 via 192.168.0.1 dev [NULL] table 0 metric -1
. 2022.04.01 20:34:00 - OpenVPN > net_route_v4_add: 0.0.0.0/1 via 10.27.39.1 dev [NULL] table 0 metric -1
. 2022.04.01 20:34:00 - OpenVPN > net_route_v4_add: 128.0.0.0/1 via 10.27.39.1 dev [NULL] table 0 metric -1
. 2022.04.01 20:34:00 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2022.04.01 20:34:00 - Routes, added a new route, 213.152.162.149 for gateway 10.27.39.1
. 2022.04.01 20:34:00 - Unable to compute route for 2a00:1678:2470:8:c4b8:80bc:94d9:951b: IPv6 VPN gateway not available.
. 2022.04.01 20:34:00 - Flushing DNS
. 2022.04.01 20:34:00 - Flush DNS - nscd
I 2022.04.01 20:34:00 - Checking route IPv4
I 2022.04.01 20:34:01 - Checking DNS
! 2022.04.01 20:34:02 - Connected.
. 2022.04.01 20:34:02 - OpenVPN > Initialization Sequence Completed

----------------------------
Network Interfaces and Routes:

{
    "support_ipv4": true,
    "support_ipv6": false,
    "routes": [
        {
            "address": "0.0.0.0\/1",
            "gateway": "10.27.39.1",
            "interface": "tun0"
        },
        {
            "address": "0.0.0.0\/0",
            "gateway": "192.168.0.1",
            "interface": "wlo1",
            "metric": "600"
        },
        {
            "address": "0.0.0.0\/0",
            "gateway": "192.168.0.1",
            "interface": "wlo1",
            "metric": "1024"
        },
        {
            "address": "128.0.0.0\/1",
            "gateway": "10.27.39.1",
            "interface": "tun0"
        },
        {
            "address": "194.168.4.100",
            "gateway": "192.168.0.1",
            "interface": "wlo1",
            "metric": "1024"
        },
        {
            "address": "194.168.8.100",
            "gateway": "192.168.0.1",
            "interface": "wlo1",
            "metric": "1024"
        },
        {
            "address": "213.152.162.149",
            "gateway": "10.27.39.1",
            "interface": "tun0"
        },
        {
            "address": "213.152.162.151",
            "gateway": "192.168.0.1",
            "interface": "lo",
            "metric": "256"
        }
    ],
    "interfaces": [
        {
            "friendly": "lo",
            "id": "lo",
            "name": "lo",
            "description": "lo",
            "type": "Loopback",
            "status": "Unknown",
            "bytes_received": "1569447132",
            "bytes_sent": "1569447132",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [
                "127.0.0.1",
                "::1"
            ],
            "gateways": [
                "192.168.0.1"
            ],
            "bind": true
        },
        {
            "friendly": "enp34s0",
            "id": "enp34s0",
            "name": "enp34s0",
            "description": "enp34s0",
            "type": "Ethernet",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [],
            "gateways": [],
            "bind": false
        },
        {
            "friendly": "wlo1",
            "id": "wlo1",
            "name": "wlo1",
            "description": "wlo1",
            "type": "Wireless80211",
            "status": "Up",
            "bytes_received": "73275118595",
            "bytes_sent": "4443432262",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [
                "192.168.0.16"
            ],
            "gateways": [
                "192.168.0.1"
            ],
            "bind": true
        },
        {
            "friendly": "tun0",
            "id": "tun0",
            "name": "tun0",
            "description": "tun0",
            "type": "0",
            "status": "Unknown",
            "bytes_received": "33758",
            "bytes_sent": "40193",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [
                "10.27.39.192"
            ],
            "gateways": [
                "10.27.39.1"
            ],
            "bind": true
        }
    ],
    "ipv4-default-gateway": "192.168.0.1",
    "ipv4-default-interface": "wlo1"
}
----------------------------
ip addr show:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: enp34s0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc fq_codel state DOWN group default qlen 1000
    link/ether 2c:f0:5d:89:40:65 brd ff:ff:ff:ff:ff:ff
3: wlo1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
    link/ether 50:2b:73:d8:07:13 brd ff:ff:ff:ff:ff:ff
    altname wlp33s0
    inet 192.168.0.16/24 brd 192.168.0.255 scope global dynamic wlo1
       valid_lft 84679sec preferred_lft 84679sec
11: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 500
    link/none
    inet 10.27.39.192/24 scope global tun0
       valid_lft forever preferred_lft forever
----------------------------
ip link show:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: enp34s0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc fq_codel state DOWN mode DEFAULT group default qlen 1000
    link/ether 2c:f0:5d:89:40:65 brd ff:ff:ff:ff:ff:ff
3: wlo1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DORMANT group default qlen 1000
    link/ether 50:2b:73:d8:07:13 brd ff:ff:ff:ff:ff:ff
    altname wlp33s0
11: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN mode DEFAULT group default qlen 500
    link/none
----------------------------
ip -4 route show:

0.0.0.0/1 via 10.27.39.1 dev tun0
default via 192.168.0.1 dev wlo1 proto dhcp metric 600
default via 192.168.0.1 dev wlo1 proto dhcp src 192.168.0.16 metric 1024
10.27.39.0/24 dev tun0 proto kernel scope link src 10.27.39.192
128.0.0.0/1 via 10.27.39.1 dev tun0
192.168.0.0/24 dev wlo1 proto kernel scope link src 192.168.0.16
192.168.0.0/24 dev wlo1 proto kernel scope link src 192.168.0.16 metric 600
192.168.0.1 dev wlo1 proto dhcp scope link src 192.168.0.16 metric 1024
194.168.4.100 via 192.168.0.1 dev wlo1 proto dhcp src 192.168.0.16 metric 1024
194.168.8.100 via 192.168.0.1 dev wlo1 proto dhcp src 192.168.0.16 metric 1024
213.152.162.149 via 10.27.39.1 dev tun0
213.152.162.151 via 192.168.0.1 dev wlo1
----------------------------
ip -6 route show: ::1 dev lo proto kernel metric 256 pref medium


 

Share this post


Link to post

Can you first try to set Preferences > DNS > DNS switch mode to None, reconnect and try again?
 

12 hours ago, loinchaloin said:

netlock.mode: linux_nftables


Let's try a different NetLock mode if the DNS thing didn't work. Reset this to Automatic or set it to iptables-legacy and retry. Try it without NetLock, too.

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Sorry for the late reply, been a bit busy.

Setting Preferences > DNS > DNS switch mode to None causes me to not be able to connect.
I can't use iptables as there is an issue on the linux client - https://airvpn.org/forums/topic/49520-linux-airvpn-suite-110-released/page/2/?tab=comments#comment-170887

I think I have narrowed the problem down a little. My mpd client is able to connect from phone to pc but it is kdeconnect which is problematic. It connects and works fine at first (eg have no eddie running, run kdeconnect on my phone and it connects, start eddie with network lock and it continues to work) but I've noticed that if I put the pc to sleep and resume, eddie reconnects automatically and then kdeconnect is not able to make a connection. And it does seem to be caused by the network lock because without it kdeconnect works after sleep/resume/reconnect.

I tried adding my phone's local IP to the allowed for incoming under Network Lock preferences and that solved the problem I think but I'm not sure if that is the best way - can ports be specified in there?

Share this post


Link to post
27 minutes ago, loinchaloin said:

Setting Preferences > DNS > DNS switch mode to None causes me to not be able to connect.


This makes no sense at all. Logs of this?
 
28 minutes ago, loinchaloin said:

Try the beta, it's got a lot of fixes for 2.20 things.
 
29 minutes ago, loinchaloin said:

I tried adding my phone's local IP to the allowed for incoming under Network Lock preferences and that solved the problem I think but I'm not sure if that is the best way - can ports be specified in there?


You can leave it like this. The connection is local, anyway.

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

For the DNS Switch this is the log:
 

Eddie System/Environment Report - 18/04/2022 - 14:52 UTC

Eddie version: 2.21.5beta
Eddie OS build: linux_x64
Eddie architecture: x64
OS type: Linux
OS name: Arch Linux
OS version: Linux hyperion 5.17.1-zen1-1-zen #1 ZEN SMP PREEMPT Mon, 28 Mar 2022 21:56:46 +0000 x86_64 GNU/Linux
OS architecture: x64
Mono /.Net Framework: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319
OpenVPN: 2.5.6 - OpenSSL 1.1.1n  15 Mar 2022, LZO 2.10 (/usr/bin/openvpn)
Hummingbird: Not available
WireGuard: 1.0.0
SSH: OpenSSH_8.9p1, OpenSSL 1.1.1n  15 Mar 2022 (/usr/bin/ssh)
SSL: Initializing (/usr/bin/stunnel)
curl: 7.82.0 (/usr/bin/curl)
Profile path: /home/alex/.config/eddie/default.profile
Data path: /home/alex/.config/eddie
Application path: /usr/lib/eddie-ui
Executable path: /usr/lib/eddie-ui/eddie-ui.exe
Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
Network Lock Active: No
Connected to VPN: No
OS support IPv4: Yes
OS support IPv6: Yes
Detected DNS: 194.168.4.100, 194.168.8.100
Test DNS IPv4: Ok
Test DNS IPv6: Ok
Test Ping IPv4: 83 ms
Test Ping IPv6: Failed
Test HTTP IPv4: Ok
Test HTTP IPv6: Error: curl: (7) Couldn't connect to server
Test HTTPS: Ok
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
key: (omissis)
connect: True
netlock: True
servers.allowlist: 17388082e9599070763fffe8f5096959cd23e3f311ea0aa8448c01fdbe26799d,4443a8f48e0a450aaef8b37ab086f3531bf3daf888a3770dbba083612cd60122,6fca8775d08f47fc2b63ba975f48247ed937a39183ba4199d238fcc5a2e3c20e,30bf61cb9977915afbe44dd93309dec19fa92c49976f5ab39296d5e7bda9aba6,e625505a7b8f3987dd5c7ee536b98c498f36fa4ed4bed3cc7d4b3041a7beaf83
mode.type: openvpn
mode.protocol: UDP
mode.alt: 2
proxy.mode: none
dns.mode: none
network.ipv6.mode: in
network.ipv4.autoswitch: True
advanced.expert: True
ui.skip.provider.manifest.failed: True

----------------------------
Logs:


! 2022.04.18 15:10:12 - Activation of Network Lock - Linux nftables
I 2022.04.18 15:10:13 - Session starting.
I 2022.04.18 15:10:13 - Checking authorization ...
! 2022.04.18 15:10:14 - Connecting to Asellus (Netherlands, Alblasserdam)
. 2022.04.18 15:10:14 - Routes, add 213.152.187.212/32 for interface "wlo1".
. 2022.04.18 15:10:14 - Routes, add 213.152.187.212/32 for interface "wlo1", already exists.
. 2022.04.18 15:10:14 - OpenVPN > OpenVPN 2.5.6 [git:makepkg/e8df2e64d6f817e6+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Mar 16 2022
. 2022.04.18 15:10:14 - OpenVPN > library versions: OpenSSL 1.1.1n  15 Mar 2022, LZO 2.10
. 2022.04.18 15:10:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.04.18 15:10:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.04.18 15:10:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.04.18 15:10:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.04.18 15:10:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.187.212:443
. 2022.04.18 15:10:14 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2022.04.18 15:10:14 - OpenVPN > UDP link local: (not bound)
. 2022.04.18 15:10:14 - OpenVPN > UDP link remote: [AF_INET]213.152.187.212:443
. 2022.04.18 15:10:14 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.187.212:443, sid=c63352cd 61b8ea12
. 2022.04.18 15:10:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.04.18 15:10:14 - OpenVPN > VERIFY KU OK
. 2022.04.18 15:10:14 - OpenVPN > Validating certificate extended key usage
. 2022.04.18 15:10:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.04.18 15:10:14 - OpenVPN > VERIFY EKU OK
. 2022.04.18 15:10:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Asellus, emailAddress=info@airvpn.org
. 2022.04.18 15:10:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.04.18 15:10:14 - OpenVPN > [Asellus] Peer Connection Initiated with [AF_INET]213.152.187.212:443
. 2022.04.18 15:10:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.6.1,dhcp-option DNS6 fde6:7a:7d20:606::1,tun-ipv6,route-gateway 10.10.6.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:606::1071/64 fde6:7a:7d20:606::1,ifconfig 10.10.6.115 255.255.255.0,peer-id 5,cipher AES-256-GCM'
. 2022.04.18 15:10:14 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2022.04.18 15:10:14 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.10.6.1'
. 2022.04.18 15:10:14 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:606::1'
. 2022.04.18 15:10:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.04.18 15:10:14 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2022.04.18 15:10:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.04.18 15:10:14 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.04.18 15:10:14 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.04.18 15:10:14 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2022.04.18 15:10:14 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2022.04.18 15:10:14 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2022.04.18 15:10:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.04.18 15:10:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.04.18 15:10:14 - OpenVPN > TUN/TAP device tun0 opened
. 2022.04.18 15:10:15 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2022.04.18 15:10:15 - OpenVPN > net_iface_up: set tun0 up
. 2022.04.18 15:10:15 - OpenVPN > net_addr_v4_add: 10.10.6.115/24 dev tun0
. 2022.04.18 15:10:15 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2022.04.18 15:10:15 - OpenVPN > net_iface_up: set tun0 up
. 2022.04.18 15:10:15 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:606::1071/64 dev tun0
. 2022.04.18 15:10:19 - OpenVPN > Initialization Sequence Completed
. 2022.04.18 15:10:19 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2022.04.18 15:10:19 - Routes, add 0.0.0.0/1 for interface "tun0".
. 2022.04.18 15:10:19 - Routes, add 128.0.0.0/1 for interface "tun0".
. 2022.04.18 15:10:19 - Routes, add ::/1 for interface "tun0".
. 2022.04.18 15:10:19 - Routes, add 8000::/1 for interface "tun0".
. 2022.04.18 15:10:19 - Routes, add 213.152.187.210/32 for interface "tun0".
. 2022.04.18 15:10:19 - Routes, add 2a00:1678:1337:7a21:1467:3dd8:95d9:eced/128 for interface "tun0".
. 2022.04.18 15:10:19 - Flushing DNS
. 2022.04.18 15:10:19 - Flush DNS - nscd
I 2022.04.18 15:10:19 - Checking route IPv4
I 2022.04.18 15:10:19 - Checking route IPv6
I 2022.04.18 15:10:20 - Checking DNS
! 2022.04.18 15:10:20 - Connected.
. 2022.04.18 15:23:32 - Collect information about AirVPN completed
! 2022.04.18 15:49:20 - Disconnecting
. 2022.04.18 15:49:20 - Sending soft termination signal
. 2022.04.18 15:49:20 - OpenVPN > event_wait : Interrupted system call (code=4)
. 2022.04.18 15:49:20 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2022.04.18 15:49:25 - OpenVPN > Closing TUN/TAP interface
. 2022.04.18 15:49:25 - OpenVPN > net_addr_v4_del: 10.10.6.115 dev tun0
. 2022.04.18 15:49:25 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:606::1071/64 dev tun0
. 2022.04.18 15:49:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2022.04.18 15:49:25 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists.
. 2022.04.18 15:49:25 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists.
. 2022.04.18 15:49:25 - Routes, delete ::/1 for interface "tun0", not exists.
. 2022.04.18 15:49:25 - Routes, delete 8000::/1 for interface "tun0", not exists.
. 2022.04.18 15:49:25 - Routes, delete 213.152.187.212/32 for interface "wlo1".
. 2022.04.18 15:49:25 - Routes, delete 213.152.187.210/32 for interface "tun0", not exists.
. 2022.04.18 15:49:25 - Routes, delete 2a00:1678:1337:7a21:1467:3dd8:95d9:eced/128 for interface "tun0", not exists.
. 2022.04.18 15:49:25 - Routes, delete 213.152.187.212/32 for interface "wlo1", not exists.
. 2022.04.18 15:49:25 - DNS of the system restored to original settings (Rename method)
. 2022.04.18 15:49:25 - Connection terminated.
. 2022.04.18 15:49:25 - Flushing DNS
. 2022.04.18 15:49:25 - Flush DNS - nscd
! 2022.04.18 15:49:25 - Session terminated.
! 2022.04.18 15:49:26 - Deactivation of Network Lock
I 2022.04.18 15:51:25 - Session starting.
I 2022.04.18 15:51:25 - Checking authorization ...
! 2022.04.18 15:51:25 - Connecting to Asellus (Netherlands, Alblasserdam)
. 2022.04.18 15:51:25 - Routes, add 213.152.187.212/32 for interface "wlo1".
. 2022.04.18 15:51:25 - Routes, add 213.152.187.212/32 for interface "wlo1", already exists.
. 2022.04.18 15:51:26 - OpenVPN > OpenVPN 2.5.6 [git:makepkg/e8df2e64d6f817e6+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Mar 16 2022
. 2022.04.18 15:51:26 - OpenVPN > library versions: OpenSSL 1.1.1n  15 Mar 2022, LZO 2.10
. 2022.04.18 15:51:26 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.04.18 15:51:26 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.04.18 15:51:26 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.04.18 15:51:26 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.04.18 15:51:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.187.212:443
. 2022.04.18 15:51:26 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2022.04.18 15:51:26 - OpenVPN > UDP link local: (not bound)
. 2022.04.18 15:51:26 - OpenVPN > UDP link remote: [AF_INET]213.152.187.212:443
. 2022.04.18 15:51:26 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.187.212:443, sid=f0b1753a 0c9ce316
. 2022.04.18 15:51:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.04.18 15:51:26 - OpenVPN > VERIFY KU OK
. 2022.04.18 15:51:26 - OpenVPN > Validating certificate extended key usage
. 2022.04.18 15:51:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.04.18 15:51:26 - OpenVPN > VERIFY EKU OK
. 2022.04.18 15:51:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Asellus, emailAddress=info@airvpn.org
. 2022.04.18 15:51:26 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.04.18 15:51:26 - OpenVPN > [Asellus] Peer Connection Initiated with [AF_INET]213.152.187.212:443
. 2022.04.18 15:51:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.6.1,dhcp-option DNS6 fde6:7a:7d20:606::1,tun-ipv6,route-gateway 10.10.6.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:606::1071/64 fde6:7a:7d20:606::1,ifconfig 10.10.6.115 255.255.255.0,peer-id 3,cipher AES-256-GCM'
. 2022.04.18 15:51:26 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2022.04.18 15:51:26 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.10.6.1'
. 2022.04.18 15:51:26 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:606::1'
. 2022.04.18 15:51:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.04.18 15:51:26 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2022.04.18 15:51:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.04.18 15:51:26 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.04.18 15:51:26 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.04.18 15:51:26 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2022.04.18 15:51:26 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2022.04.18 15:51:26 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2022.04.18 15:51:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.04.18 15:51:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.04.18 15:51:26 - OpenVPN > TUN/TAP device tun0 opened
. 2022.04.18 15:51:26 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2022.04.18 15:51:26 - OpenVPN > net_iface_up: set tun0 up
. 2022.04.18 15:51:26 - OpenVPN > net_addr_v4_add: 10.10.6.115/24 dev tun0
. 2022.04.18 15:51:26 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2022.04.18 15:51:26 - OpenVPN > net_iface_up: set tun0 up
. 2022.04.18 15:51:26 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:606::1071/64 dev tun0
. 2022.04.18 15:51:32 - OpenVPN > Initialization Sequence Completed
. 2022.04.18 15:51:32 - Routes, add 0.0.0.0/1 for interface "tun0".
. 2022.04.18 15:51:32 - Routes, add 128.0.0.0/1 for interface "tun0".
. 2022.04.18 15:51:32 - Routes, add ::/1 for interface "tun0".
. 2022.04.18 15:51:32 - Routes, add 8000::/1 for interface "tun0".
. 2022.04.18 15:51:32 - Routes, add 213.152.187.210/32 for interface "tun0".
. 2022.04.18 15:51:32 - Routes, add 2a00:1678:1337:7a21:1467:3dd8:95d9:eced/128 for interface "tun0".
. 2022.04.18 15:51:32 - Flushing DNS
. 2022.04.18 15:51:32 - Flush DNS - nscd
I 2022.04.18 15:51:32 - Checking route IPv4
I 2022.04.18 15:51:32 - Checking route IPv6
I 2022.04.18 15:51:33 - Checking DNS
. 2022.04.18 15:51:41 - Checking DNS (4° try)
. 2022.04.18 15:51:45 - Checking DNS (5° try)
E 2022.04.18 15:51:45 - Checking DNS failed, last reason: Checking DNS failed: znkxicpfvkimlqxfnytarbybexajqeuj
! 2022.04.18 15:51:45 - Disconnecting
. 2022.04.18 15:51:45 - Sending soft termination signal
. 2022.04.18 15:51:45 - OpenVPN > event_wait : Interrupted system call (code=4)
. 2022.04.18 15:51:45 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2022.04.18 15:51:50 - OpenVPN > Closing TUN/TAP interface
. 2022.04.18 15:51:50 - OpenVPN > net_addr_v4_del: 10.10.6.115 dev tun0
. 2022.04.18 15:51:50 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:606::1071/64 dev tun0
. 2022.04.18 15:51:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2022.04.18 15:51:50 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists.
. 2022.04.18 15:51:50 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists.
. 2022.04.18 15:51:50 - Routes, delete ::/1 for interface "tun0", not exists.
. 2022.04.18 15:51:50 - Routes, delete 8000::/1 for interface "tun0", not exists.
. 2022.04.18 15:51:50 - Routes, delete 213.152.187.212/32 for interface "wlo1".
. 2022.04.18 15:51:50 - Routes, delete 213.152.187.210/32 for interface "tun0", not exists.
. 2022.04.18 15:51:50 - Routes, delete 2a00:1678:1337:7a21:1467:3dd8:95d9:eced/128 for interface "tun0", not exists.
. 2022.04.18 15:51:50 - Routes, delete 213.152.187.212/32 for interface "wlo1", not exists.
. 2022.04.18 15:51:50 - Connection terminated.
I 2022.04.18 15:51:52 - Cancel requested.
! 2022.04.18 15:51:52 - Session terminated.

----------------------------
Network Interfaces and Routes:

{
    "routes": [
        {
            "destination": "0.0.0.0\/0",
            "gateway": "192.168.0.1",
            "interface": "wlo1",
            "metric": "1024",
            "proto": "dhcp",
            "src": "192.168.0.16"
        },
        {
            "destination": "0.0.0.0\/0",
            "gateway": "192.168.0.1",
            "interface": "wlo1",
            "metric": "20600",
            "proto": "dhcp"
        },
        {
            "destination": "192.168.0.0\/24",
            "interface": "wlo1",
            "proto": "kernel",
            "scope": "link",
            "src": "192.168.0.16"
        },
        {
            "destination": "192.168.0.0\/24",
            "interface": "wlo1",
            "metric": "600",
            "proto": "kernel",
            "scope": "link",
            "src": "192.168.0.16"
        },
        {
            "destination": "192.168.0.1\/32",
            "interface": "wlo1",
            "metric": "1024",
            "proto": "dhcp",
            "scope": "link",
            "src": "192.168.0.16"
        },
        {
            "destination": "194.168.4.100\/32",
            "gateway": "192.168.0.1",
            "interface": "wlo1",
            "metric": "1024",
            "proto": "dhcp",
            "src": "192.168.0.16"
        },
        {
            "destination": "194.168.8.100\/32",
            "gateway": "192.168.0.1",
            "interface": "wlo1",
            "metric": "1024",
            "proto": "dhcp",
            "src": "192.168.0.16"
        },
        {
            "destination": "::1\/128",
            "interface": "lo",
            "metric": "256",
            "pref": "medium",
            "proto": "kernel"
        },
        {
            "destination": "fe80::\/64",
            "interface": "wlo1",
            "metric": "1024",
            "pref": "medium",
            "proto": "kernel"
        }
    ],
    "ipv4-default-gateway": "192.168.0.1",
    "ipv4-default-interface": "wlo1",
    "interfaces": [
        {
            "friendly": "lo",
            "id": "lo",
            "name": "lo",
            "description": "lo",
            "type": "Loopback",
            "status": "Unknown",
            "bytes_received": "367502480",
            "bytes_sent": "367502480",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "127.0.0.1",
                "::1"
            ],
            "bind": true
        },
        {
            "friendly": "enp34s0",
            "id": "enp34s0",
            "name": "enp34s0",
            "description": "enp34s0",
            "type": "Ethernet",
            "status": "Down",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "bind": false
        },
        {
            "friendly": "wlo1",
            "id": "wlo1",
            "name": "wlo1",
            "description": "wlo1",
            "type": "Wireless80211",
            "status": "Up",
            "bytes_received": "124549251767",
            "bytes_sent": "9422455516",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "192.168.0.16",
                "fe80::c1e2:fa00:9589:7b45"
            ],
            "bind": true
        }
    ]
}
----------------------------
ip addr show:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: enp34s0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc fq_codel state DOWN group default qlen 1000
    link/ether 2c:f0:5d:89:40:65 brd ff:ff:ff:ff:ff:ff
3: wlo1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
    link/ether 50:2b:73:d8:07:13 brd ff:ff:ff:ff:ff:ff
    altname wlp33s0
    inet 192.168.0.16/24 brd 192.168.0.255 scope global dynamic wlo1
       valid_lft 861057sec preferred_lft 861057sec
    inet6 fe80::c1e2:fa00:9589:7b45/64 scope link noprefixroute
       valid_lft forever preferred_lft forever
----------------------------
ip link show:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: enp34s0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc fq_codel state DOWN mode DEFAULT group default qlen 1000
    link/ether 2c:f0:5d:89:40:65 brd ff:ff:ff:ff:ff:ff
3: wlo1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP mode DORMANT group default qlen 1000
    link/ether 50:2b:73:d8:07:13 brd ff:ff:ff:ff:ff:ff
    altname wlp33s0

I am actually using the beta but I hadn't tried iptables with and indeed it does network lock now, thank you.
In that case I will probably just keep the ip in the network lock preferences, seems like the easiest solution. Thanks for all your help.

Share this post


Link to post

Oh, right, I forgot. You must untick Check AirVPN DNS, too, if you switch DNS mode to None. It makes sense, after all.
 

3 hours ago, loinchaloin said:

In that case I will probably just keep the ip in the network lock preferences, seems like the easiest solution. Thanks for all your help.


Yep, best resolution in your case. Though I am wondering why the general setting to allow the complete local network doesn't work… and with that I am wondering if this is also the solution for similar cases of unreachable devices in the local network after NetLock activation in the past…

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...