Jump to content
Not connected, Your IP: 44.201.99.222
Fralund

Eddie-ui no longer works for me since version 2.20.0

Recommended Posts

Hello everyone,

 

I just updated Eddie-ui from version 2.16.3 to version 2.21.8 (portable format, 64-bit, graphical-ui), but this last version doesn't work anymore on my Linux PC.

 

OS : Mageia 8 (GNU/Linux 64bit)

KDE Plasma : 5.20.4

KDE Frameworks : 5.76.0

Qt : 5.15.2

Kernel : 5.15.74-desktop-1.mga8

 

I have tested several versions of Eddie-ui: version 2.19.7 is the last one that works.

 

From version 2.20.0 onwards, the connection is no longer made (even on beta version 2.22.2). Even if I run eddie as root (from a console).

 

Eddie launches well, then it tries to connect to several servers, but each attempt fails (very quickly).

 

Does anyone have a solution?

 

Thanks a lot !

 

Here is the connection log when it fails:

 

Quote
! 2022.11.13 16:34:08 - Connecting to Alterf (Netherlands, Alblasserdam)
. 2022.11.13 16:34:08 - Elevated: Command:route-list
. 2022.11.13 16:34:08 - Elevated: Exec, path:'/usr/sbin/ip', arg:'-4', arg:'route', arg:'show', exit:0, out:'default via 192.168.0.254 dev enp5s0 proto dhcp metric 100
. 2022.11.13 16:34:08 -     172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown
. 2022.11.13 16:34:08 -     172.18.0.0/16 dev br-21b74d5cb591 proto kernel scope link src 172.18.0.1 linkdown
. 2022.11.13 16:34:08 -     192.168.0.0/24 dev enp5s0 proto kernel scope link src 192.168.0.11 metric 100'
. 2022.11.13 16:34:08 - Elevated: Exec, path:'/usr/sbin/ip', arg:'-6', arg:'route', arg:'show', exit:0, out:'::1 dev lo proto kernel metric 256 pref medium
. 2022.11.13 16:34:08 -     2a00:23c6:3100:3cf6::/64 dev enp5s0 proto kernel metric 256 expires 86022sec pref medium
. 2022.11.13 16:34:08 -     fe80::/64 dev enp5s0 proto kernel metric 256 pref medium
. 2022.11.13 16:34:08 -     default via fe80::e69e:12ff:fe01:5d60 dev enp5s0 proto ra metric 1024 expires 1422sec mtu 1480 hoplimit 64 pref medium'
. 2022.11.13 16:34:08 - Elevated: Command:route
. 2022.11.13 16:34:08 - Elevated: Exec, path:'/usr/sbin/ip', arg:'-4', arg:'route', arg:'add', arg:'213.152.161.172/32', arg:'via', arg:'192.168.0.254', arg:'dev', arg:'enp5s0', arg:'metric', arg:'0', exit:0
. 2022.11.13 16:34:08 - Routes, add 213.152.161.172/32 for interface "enp5s0".
. 2022.11.13 16:34:08 - Elevated: Command:route-list
. 2022.11.13 16:34:08 - Elevated: Exec, path:'/usr/sbin/ip', arg:'-4', arg:'route', arg:'show', exit:0, out:'default via 192.168.0.254 dev enp5s0 proto dhcp metric 100
. 2022.11.13 16:34:08 -     172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown
. 2022.11.13 16:34:08 -     172.18.0.0/16 dev br-21b74d5cb591 proto kernel scope link src 172.18.0.1 linkdown
. 2022.11.13 16:34:08 -     192.168.0.0/24 dev enp5s0 proto kernel scope link src 192.168.0.11 metric 100
. 2022.11.13 16:34:08 -     213.152.161.172 via 192.168.0.254 dev enp5s0'
. 2022.11.13 16:34:08 - Elevated: Exec, path:'/usr/sbin/ip', arg:'-6', arg:'route', arg:'show', exit:0, out:'::1 dev lo proto kernel metric 256 pref medium
. 2022.11.13 16:34:08 -     2a00:23c6:3100:3cf6::/64 dev enp5s0 proto kernel metric 256 expires 86022sec pref medium
. 2022.11.13 16:34:08 -     fe80::/64 dev enp5s0 proto kernel metric 256 pref medium
. 2022.11.13 16:34:08 -     default via fe80::e69e:12ff:fe01:5d60 dev enp5s0 proto ra metric 1024 expires 1422sec mtu 1480 hoplimit 64 pref medium'
. 2022.11.13 16:34:08 - Routes, add 213.152.161.172/32 for interface "enp5s0", already exists.
. 2022.11.13 16:34:08 - Elevated: Command:openvpn
. 2022.11.13 16:34:08 - OpenVPN > OpenVPN 2.5.5 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 15 2022
. 2022.11.13 16:34:08 - OpenVPN > library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
. 2022.11.13 16:34:08 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.11.13 16:34:08 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.11.13 16:34:08 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.11.13 16:34:08 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.11.13 16:34:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.172:443
. 2022.11.13 16:34:08 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2022.11.13 16:34:08 - OpenVPN > UDP link local: (not bound)
. 2022.11.13 16:34:08 - OpenVPN > UDP link remote: [AF_INET]213.152.161.172:443
. 2022.11.13 16:34:08 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.172:443, sid=6f92e83e 95375367
. 2022.11.13 16:34:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.11.13 16:34:08 - OpenVPN > VERIFY KU OK
. 2022.11.13 16:34:08 - OpenVPN > Validating certificate extended key usage
. 2022.11.13 16:34:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.11.13 16:34:08 - OpenVPN > VERIFY EKU OK
. 2022.11.13 16:34:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alterf, emailAddress=info@airvpn.org
. 2022.11.13 16:34:08 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.11.13 16:34:08 - OpenVPN > [Alterf] Peer Connection Initiated with [AF_INET]213.152.161.172:443
. 2022.11.13 16:34:09 - OpenVPN > SENT CONTROL [Alterf]: 'PUSH_REQUEST' (status=1)
. 2022.11.13 16:34:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.8.38.1,dhcp-option DNS6 fde6:7a:7d20:426::1,tun-ipv6,route-gateway 10.8.38.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:426::104e/64 fde6:7a:7d20:426::1,ifconfig 10.8.38.80 255.255.255.0,peer-id 4,cipher AES-256-GCM'
. 2022.11.13 16:34:09 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2022.11.13 16:34:09 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.8.38.1'
. 2022.11.13 16:34:09 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:426::1'
. 2022.11.13 16:34:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.11.13 16:34:09 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2022.11.13 16:34:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.11.13 16:34:09 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.11.13 16:34:09 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.11.13 16:34:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2022.11.13 16:34:09 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2022.11.13 16:34:09 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2022.11.13 16:34:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.11.13 16:34:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.11.13 16:34:09 - OpenVPN > TUN/TAP device tun0 opened
W 2022.11.13 16:34:09 - Unexpected: Network interface unknown - Stack:   at Eddie.Core.ConnectionTypes.IConnectionType.SearchTunNetworkInterfaceByName (System.String id) [0x00066] in <2af199c257ac4ca1aad2d2fb8c81a0e5>:0
W 2022.11.13 16:34:09 -     at Eddie.Core.ConnectionTypes.OpenVPN.OnLogEvent (System.String source, System.String message) [0x00726] in <2af199c257ac4ca1aad2d2fb8c81a0e5>:0
W 2022.11.13 16:34:09 -     at Eddie.Core.Session.ProcessLogEvent (System.String source, System.String message) [0x00014] in <2af199c257ac4ca1aad2d2fb8c81a0e5>:0
. 2022.11.13 16:34:09 - OpenVPN > /bin/ip link set dev tun0 up mtu 1500
. 2022.11.13 16:34:09 - OpenVPN > Linux ip link set failed: could not execute external program
. 2022.11.13 16:34:09 - OpenVPN > Exiting due to fatal error
! 2022.11.13 16:34:09 - Disconnecting
. 2022.11.13 16:34:09 - Sending soft termination signal
. 2022.11.13 16:34:09 - Elevated: Command:openvpn
. 2022.11.13 16:34:09 - Elevated: Command:route-list
. 2022.11.13 16:34:09 - Elevated: Exec, path:'/usr/sbin/ip', arg:'-4', arg:'route', arg:'show', exit:0, out:'default via 192.168.0.254 dev enp5s0 proto dhcp metric 100
. 2022.11.13 16:34:09 -     172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown
. 2022.11.13 16:34:09 -     172.18.0.0/16 dev br-21b74d5cb591 proto kernel scope link src 172.18.0.1 linkdown
. 2022.11.13 16:34:09 -     192.168.0.0/24 dev enp5s0 proto kernel scope link src 192.168.0.11 metric 100
. 2022.11.13 16:34:09 -     213.152.161.172 via 192.168.0.254 dev enp5s0'
. 2022.11.13 16:34:09 - Elevated: Exec, path:'/usr/sbin/ip', arg:'-6', arg:'route', arg:'show', exit:0, out:'::1 dev lo proto kernel metric 256 pref medium
. 2022.11.13 16:34:09 -     2a00:23c6:3100:3cf6::/64 dev enp5s0 proto kernel metric 256 expires 86021sec pref medium
. 2022.11.13 16:34:09 -     fe80::/64 dev enp5s0 proto kernel metric 256 pref medium
. 2022.11.13 16:34:09 -     default via fe80::e69e:12ff:fe01:5d60 dev enp5s0 proto ra metric 1024 expires 1421sec mtu 1480 hoplimit 64 pref medium'
. 2022.11.13 16:34:09 - Elevated: Command:route
. 2022.11.13 16:34:09 - Elevated: Exec, path:'/usr/sbin/ip', arg:'-4', arg:'route', arg:'delete', arg:'213.152.161.172/32', arg:'via', arg:'192.168.0.254', arg:'dev', arg:'enp5s0', arg:'metric', arg:'0', exit:0
. 2022.11.13 16:34:09 - Routes, delete 213.152.161.172/32 for interface "enp5s0".
. 2022.11.13 16:34:09 - Elevated: Command:route-list
. 2022.11.13 16:34:09 - Elevated: Exec, path:'/usr/sbin/ip', arg:'-4', arg:'route', arg:'show', exit:0, out:'default via 192.168.0.254 dev enp5s0 proto dhcp metric 100
. 2022.11.13 16:34:09 -     172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown
. 2022.11.13 16:34:09 -     172.18.0.0/16 dev br-21b74d5cb591 proto kernel scope link src 172.18.0.1 linkdown
. 2022.11.13 16:34:09 -     192.168.0.0/24 dev enp5s0 proto kernel scope link src 192.168.0.11 metric 100'
. 2022.11.13 16:34:09 - Elevated: Exec, path:'/usr/sbin/ip', arg:'-6', arg:'route', arg:'show', exit:0, out:'::1 dev lo proto kernel metric 256 pref medium
. 2022.11.13 16:34:09 -     2a00:23c6:3100:3cf6::/64 dev enp5s0 proto kernel metric 256 expires 86021sec pref medium
. 2022.11.13 16:34:09 -     fe80::/64 dev enp5s0 proto kernel metric 256 pref medium
. 2022.11.13 16:34:09 -     default via fe80::e69e:12ff:fe01:5d60 dev enp5s0 proto ra metric 1024 expires 1421sec mtu 1480 hoplimit 64 pref medium'
. 2022.11.13 16:34:09 - Routes, delete 213.152.161.172/32 for interface "enp5s0", not exists.
. 2022.11.13 16:34:09 - Elevated: Command:dns-switch-rename-restore
. 2022.11.13 16:34:09 - Connection terminated.
I 2022.11.13 16:34:12 - Checking authorization ...

 

 

Share this post


Link to post

Hello!

We see two different problems. The first one is caused by OpenVPN: apparently it has been built with an hard coded wrong path to ip:

. 2022.11.13 16:34:09 - OpenVPN > /bin/ip link set dev tun0 up mtu 1500
. 2022.11.13 16:34:09 - OpenVPN > Linux ip link set failed: could not execute external program
. 2022.11.13 16:34:09 - OpenVPN > Exiting due to fatal error

As we can see from what Eddie log entries, you have ip in /usr/sbin. Eddie locates and runs it successfully, for example:
. 2022.11.13 16:34:09 - Elevated: Exec, path:'/usr/sbin/ip', arg:'-4', arg:'route', arg:'show', exit:0, out:'default via 192.168.0.254 dev enp5s0 proto dhcp metric 100

Please create a symbolic link from /bin/ip to /usr/sbin/ip, or copy the ip file in /bin too, so the first problem will be resolved.

Then, another problem is visible:
W 2022.11.13 16:34:09 - Unexpected: Network interface unknown - Stack:   at Eddie.Core.ConnectionTypes.IConnectionType.SearchTunNetworkInterfaceByName (System.String id) [0x00066] in <2af199c257ac4ca1aad2d2fb8c81a0e5>:0
W 2022.11.13 16:34:09 -     at Eddie.Core.ConnectionTypes.OpenVPN.OnLogEvent (System.String source, System.String message) [0x00726] in <2af199c257ac4ca1aad2d2fb8c81a0e5>:0
W 2022.11.13 16:34:09 -     at Eddie.Core.Session.ProcessLogEvent (System.String source, System.String message) [0x00014] in <2af199c257ac4ca1aad2d2fb8c81a0e5>:0

This might be a critical problem as well (try again anyway when you have solved the 1st problem).

If the problem persists or any other issue comes out, can you send us a system report generated by Eddie, to let us can check various settings, including network interfaces?

Kind regards
 

Share this post


Link to post

The symbolic link solved directly the first problem, and obviously the second one too: thank you very much! 😃

But there is still a last problem: the "Checking route IPv4" failed.

Here is the log:
 

Quote
! 2022.11.13 17:27:33 - Connecting to Andromeda (Netherlands, Alblasserdam)
. 2022.11.13 17:27:33 - Routes, add 213.152.161.231/32 for interface "wlp0s20f3".
. 2022.11.13 17:27:33 - Routes, add 213.152.161.231/32 for interface "wlp0s20f3", already exists.
. 2022.11.13 17:27:33 - OpenVPN > OpenVPN 2.5.5 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 15 2022
. 2022.11.13 17:27:33 - OpenVPN > library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
. 2022.11.13 17:27:33 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.11.13 17:27:33 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.11.13 17:27:33 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2022.11.13 17:27:33 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2022.11.13 17:27:33 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.231:443
. 2022.11.13 17:27:33 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2022.11.13 17:27:33 - OpenVPN > UDP link local: (not bound)
. 2022.11.13 17:27:33 - OpenVPN > UDP link remote: [AF_INET]213.152.161.231:443
. 2022.11.13 17:27:33 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.231:443, sid=6c2af601 b4072398
. 2022.11.13 17:27:33 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2022.11.13 17:27:33 - OpenVPN > VERIFY KU OK
. 2022.11.13 17:27:33 - OpenVPN > Validating certificate extended key usage
. 2022.11.13 17:27:33 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2022.11.13 17:27:33 - OpenVPN > VERIFY EKU OK
. 2022.11.13 17:27:33 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Andromeda, emailAddress=info@airvpn.org
. 2022.11.13 17:27:33 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2022.11.13 17:27:33 - OpenVPN > [Andromeda] Peer Connection Initiated with [AF_INET]213.152.161.231:443
. 2022.11.13 17:27:33 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.9.6.1,dhcp-option DNS6 fde6:7a:7d20:506::1,tun-ipv6,route-gateway 10.9.6.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:506::10a7/64 fde6:7a:7d20:506::1,ifconfig 10.9.6.169 255.255.255.0,peer-id 3,cipher AES-256-GCM'
. 2022.11.13 17:27:33 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2022.11.13 17:27:33 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.9.6.1'
. 2022.11.13 17:27:33 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:506::1'
. 2022.11.13 17:27:33 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2022.11.13 17:27:33 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2022.11.13 17:27:33 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2022.11.13 17:27:33 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2022.11.13 17:27:33 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2022.11.13 17:27:33 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2022.11.13 17:27:33 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2022.11.13 17:27:33 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2022.11.13 17:27:33 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.11.13 17:27:33 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2022.11.13 17:27:33 - OpenVPN > TUN/TAP device tun0 opened
. 2022.11.13 17:27:33 - OpenVPN > /bin/ip link set dev tun0 up mtu 1500
. 2022.11.13 17:27:33 - OpenVPN > /bin/ip link set dev tun0 up
. 2022.11.13 17:27:33 - OpenVPN > /bin/ip addr add dev tun0 10.9.6.169/24
. 2022.11.13 17:27:33 - OpenVPN > /bin/ip link set dev tun0 up mtu 1500
. 2022.11.13 17:27:33 - OpenVPN > /bin/ip link set dev tun0 up
. 2022.11.13 17:27:33 - OpenVPN > /bin/ip -6 addr add fde6:7a:7d20:506::10a7/64 dev tun0
. 2022.11.13 17:27:38 - OpenVPN > Initialization Sequence Completed
. 2022.11.13 17:27:38 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2022.11.13 17:27:38 - Routes, add 0.0.0.0/1 for interface "tun0".
. 2022.11.13 17:27:39 - Routes, add 128.0.0.0/1 for interface "tun0".
. 2022.11.13 17:27:39 - Routes, add ::/1 for interface "tun0".
. 2022.11.13 17:27:39 - Routes, add 8000::/1 for interface "tun0".
. 2022.11.13 17:27:39 - Routes, add 213.152.161.229/32 for interface "tun0".
. 2022.11.13 17:27:39 - Routes, add 2a00:1678:2470:46:87f7:5087:ccb3:f7e2/128 for interface "tun0".
. 2022.11.13 17:27:39 - Flushing DNS
. 2022.11.13 17:27:39 - Flush DNS - nscd
I 2022.11.13 17:27:39 - Checking route IPv4
. 2022.11.13 17:27:45 - Checking route (4° try)
. 2022.11.13 17:27:49 - Checking route (5° try)
E 2022.11.13 17:27:49 - Checking route IPv4 failed, last reason: curl: (7) Failed to connect to andromeda_exit.airservers.org port 89: Connexion refusée
! 2022.11.13 17:27:49 - Disconnecting
. 2022.11.13 17:27:49 - Sending soft termination signal
. 2022.11.13 17:27:49 - OpenVPN > event_wait : Interrupted system call (code=4)
. 2022.11.13 17:27:49 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2022.11.13 17:27:54 - OpenVPN > Closing TUN/TAP interface
. 2022.11.13 17:27:54 - OpenVPN > /bin/ip addr del dev tun0 10.9.6.169/24
. 2022.11.13 17:27:54 - OpenVPN > /bin/ip -6 addr del fde6:7a:7d20:506::10a7/64 dev tun0
. 2022.11.13 17:27:54 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2022.11.13 17:27:54 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists.
. 2022.11.13 17:27:54 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists.
. 2022.11.13 17:27:54 - Routes, delete ::/1 for interface "tun0", not exists.
. 2022.11.13 17:27:54 - Routes, delete 8000::/1 for interface "tun0", not exists.
. 2022.11.13 17:27:54 - Routes, delete 213.152.161.231/32 for interface "wlp0s20f3".
. 2022.11.13 17:27:54 - Routes, delete 213.152.161.229/32 for interface "tun0", not exists.
. 2022.11.13 17:27:54 - Routes, delete 2a00:1678:2470:46:87f7:5087:ccb3:f7e2/128 for interface "tun0", not exists.
. 2022.11.13 17:27:55 - Routes, delete 213.152.161.231/32 for interface "wlp0s20f3", not exists.
. 2022.11.13 17:27:55 - DNS of the system restored to original settings (Rename method)
. 2022.11.13 17:27:55 - Connection terminated.
I 2022.11.13 17:27:58 - Checking authorization ...
! 2022.11.13 17:27:58 - Connecting to Diadema (Belgium, Brussels)

Share this post


Link to post
On 11/13/2022 at 5:40 PM, Fralund said:

But there is still a last problem: the "Checking route IPv4" failed.

I also get this on Windows. Hardly ever connects now. Linux works better for me.

I'll be glad when AirVPN sorts this out.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...