BettyIsBoop 3 Posted ... Since i update to Eddie 2.22.2 on my Debian (because of latency checking broken) : i see then server choose are always the 1st in the order list. I think : why not, it can be OK. But this morning it goes to Japan (i'm in Europe) , OK. But to a server loaded at 98%. I deny this server, connect to prefered server again : and again : it was in alphabetical order. I think there are 2 issues here : 1. Must not connect to a server loaded at 98% 2. Must add some randomization to find the best server. Something to report ? Know issue ? Thank you 1 mahshar666 reacted to this Quote Share this post Link to post
OpenSourcerer 1435 Posted ... On 2/2/2023 at 8:41 AM, BettyIsBoop said: 1. Must not connect to a server loaded at 98% As server load is not the only thing taken into consideration when deciding the "best" server to connect to, this is a rather simple suggestion. I wrote about the scoring in this thread: On 2/2/2023 at 8:41 AM, BettyIsBoop said: 2. Must add some randomization to find the best server. There's supposed to be something like this. If it's really just alphabetical, I think it could be analyzed a bit further. But it needs a bit more material to work with. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
BettyIsBoop 3 Posted ... On 2/6/2023 at 8:28 PM, OpenSourcerer said: There's supposed to be something like this. If it's really just alphabetical, I think it could be analyzed a bit further. But it needs a bit more material to work with. How can i send you a log for analysis ? maybe process : 1. Connect 2. Unconnect 3. Set last connected server as disable 4. Connect again 5. loop 1 or 2 times Quote Share this post Link to post
OpenSourcerer 1435 Posted ... 9 hours ago, BettyIsBoop said: How can i send you a log for analysis ? You don't see in the log on which basis a server choice is taken. For now, do you see a change when you switch the scoring rule between latency and speed? Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
BettyIsBoop 3 Posted ... On 4/25/2023 at 3:44 PM, OpenSourcerer said: For now, do you see a change when you switch the scoring rule between latency and speed? There are no latency on my version (experimental (2.22.2)): it's empty. With stable version : latency checking broken. If ordering by latency : order is alphabetical … . 2023.05.02 09:42:17 - Eddie version: 2.22.2 / linux_x64, System: Linux, Name: Debian GNU/Linux 11 (bullseye), Version: 11 (bullseye), Mono/.Net: 6.8.0.105 (Debian 6.8.0.105+dfsg-3.2 Tue Jun 29 21:01:01 UTC 2021); Framework: v4.0.30319 . 2023.05.02 09:42:17 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2023.05.02 09:42:17 - Collect network information . 2023.05.02 09:42:18 - Reading options from /home/user/.config/eddie/default.profile . 2023.05.02 09:42:19 - OpenVPN - Version: 2.5.1 - OpenSSL 1.1.1n 15 Mar 2022, LZO 2.10 (/sbin/openvpn) . 2023.05.02 09:42:19 - SSH - Version: OpenSSH_8.4p1 Debian-5+deb11u1, OpenSSL 1.1.1n 15 Mar 2022 (/usr/bin/ssh) . 2023.05.02 09:42:19 - SSL - Version: stunnel 5.56 (/usr/bin/stunnel4) . 2023.05.02 09:42:19 - DNS of the system restored to original settings (Rename method) . 2023.05.02 09:42:19 - Recovery. Unexpected crash? ! 2023.05.02 09:42:20 - Deactivation of Network Lock ! 2023.05.02 09:42:20 - Activation of Network Lock - Linux iptables-legacy I 2023.05.02 09:42:21 - Ready . 2023.05.02 09:42:22 - Collect information about AirVPN completed I 2023.05.02 09:42:23 - Session starting. I 2023.05.02 09:42:23 - Checking authorization ... ! 2023.05.02 09:42:24 - Connecting to Albali (Sweden, Uppsala) . 2023.05.02 09:42:24 - Routes, add 62.102.148.170/32 for interface "enp4s0". . 2023.05.02 09:42:24 - Routes, add 62.102.148.170/32 for interface "enp4s0", already exists. . 2023.05.02 09:42:24 - Collect information about AirVPN completed . 2023.05.02 09:42:31 - OpenVPN > OpenVPN 2.5.1 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021 . 2023.05.02 09:42:31 - OpenVPN > library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.10 . 2023.05.02 09:42:31 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.02 09:42:31 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.02 09:42:31 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.02 09:42:31 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.02 09:42:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.170:443 . 2023.05.02 09:42:31 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2023.05.02 09:42:31 - OpenVPN > UDP link local: (not bound) . 2023.05.02 09:42:31 - OpenVPN > UDP link remote: [AF_INET]62.102.148.170:443 . 2023.05.02 09:42:31 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.170:443, sid=3aae8439 ff2d7889 . 2023.05.02 09:42:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.05.02 09:42:31 - OpenVPN > VERIFY KU OK . 2023.05.02 09:42:31 - OpenVPN > Validating certificate extended key usage . 2023.05.02 09:42:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.05.02 09:42:31 - OpenVPN > VERIFY EKU OK . 2023.05.02 09:42:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Albali, emailAddress=info@airvpn.org . 2023.05.02 09:42:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2023.05.02 09:42:31 - OpenVPN > [Albali] Peer Connection Initiated with [AF_INET]62.102.148.170:443 . 2023.05.02 09:42:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.5.66.1,dhcp-option DNS6 fde6:7a:7d20:142::1,tun-ipv6,route-gateway 10.5.66.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:142::1009/64 fde6:7a:7d20:142::1,ifconfig 10.5.66.11 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.05.02 09:42:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.05.02 09:42:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.5.66.1' . 2023.05.02 09:42:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:142::1' . 2023.05.02 09:42:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.05.02 09:42:31 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.05.02 09:42:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.05.02 09:42:31 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.05.02 09:42:31 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.05.02 09:42:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.05.02 09:42:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.05.02 09:42:31 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.05.02 09:42:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.02 09:42:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.02 09:42:31 - OpenVPN > TUN/TAP device tun0 opened . 2023.05.02 09:42:31 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.05.02 09:42:31 - OpenVPN > net_iface_up: set tun0 up . 2023.05.02 09:42:31 - OpenVPN > net_addr_v4_add: 10.5.66.11/24 dev tun0 . 2023.05.02 09:42:31 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.05.02 09:42:31 - OpenVPN > net_iface_up: set tun0 up . 2023.05.02 09:42:31 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:142::1009/64 dev tun0 . 2023.05.02 09:42:31 - OpenVPN > Initialization Sequence Completed . 2023.05.02 09:42:32 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.05.02 09:42:32 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.05.02 09:42:32 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.05.02 09:42:32 - Routes, add ::/1 for interface "tun0". . 2023.05.02 09:42:32 - Routes, add 8000::/1 for interface "tun0". . 2023.05.02 09:42:32 - Routes, add 62.102.148.130/32 for interface "tun0". . 2023.05.02 09:42:32 - Routes, add 2a00:1520:27:1:7ab2:8f9f:28ba:c808/128 for interface "tun0". . 2023.05.02 09:42:32 - Flushing DNS I 2023.05.02 09:42:32 - Checking route IPv4 I 2023.05.02 09:42:33 - Checking route IPv6 I 2023.05.02 09:42:33 - Checking DNS ! 2023.05.02 09:42:33 - Connected. . 2023.05.02 09:56:45 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.05.02 09:56:55 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.05.02 09:57:06 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.05.02 10:12:33 - Above log line repeated 72 times more . 2023.05.02 10:12:33 - Collect information about AirVPN completed . 2023.05.02 10:12:40 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.05.02 10:12:50 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.05.02 10:13:00 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.05.02 10:39:13 - Above log line repeated 51 times more . 2023.05.02 10:39:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.05.02 10:39:13 - OpenVPN > VERIFY KU OK . 2023.05.02 10:39:13 - OpenVPN > Validating certificate extended key usage . 2023.05.02 10:39:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.05.02 10:39:13 - OpenVPN > VERIFY EKU OK . 2023.05.02 10:39:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Albali, emailAddress=info@airvpn.org . 2023.05.02 10:39:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.02 10:39:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.02 10:39:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2023.05.02 10:42:40 - Collect information about AirVPN completed . 2023.05.02 11:12:48 - Collect information about AirVPN completed ! 2023.05.02 11:18:38 - Disconnecting . 2023.05.02 11:18:38 - Sending soft termination signal . 2023.05.02 11:18:38 - OpenVPN > event_wait : Interrupted system call (code=4) . 2023.05.02 11:18:38 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.05.02 11:18:43 - OpenVPN > Closing TUN/TAP interface . 2023.05.02 11:18:43 - OpenVPN > net_addr_v4_del: 10.5.66.11 dev tun0 . 2023.05.02 11:18:43 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:142::1009/64 dev tun0 . 2023.05.02 11:18:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.05.02 11:18:43 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2023.05.02 11:18:43 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2023.05.02 11:18:43 - Routes, delete ::/1 for interface "tun0", not exists. . 2023.05.02 11:18:43 - Routes, delete 8000::/1 for interface "tun0", not exists. . 2023.05.02 11:18:44 - Routes, delete 62.102.148.170/32 for interface "enp4s0". . 2023.05.02 11:18:44 - Routes, delete 62.102.148.130/32 for interface "tun0", not exists. . 2023.05.02 11:18:44 - Routes, delete 2a00:1520:27:1:7ab2:8f9f:28ba:c808/128 for interface "tun0", not exists. . 2023.05.02 11:18:44 - Routes, delete 62.102.148.170/32 for interface "enp4s0", not exists. . 2023.05.02 11:18:53 - DNS of the system restored to original settings (Rename method) . 2023.05.02 11:18:53 - Connection terminated. . 2023.05.02 11:18:53 - Flushing DNS ! 2023.05.02 11:18:53 - Session terminated. I 2023.05.02 11:19:29 - Session starting. I 2023.05.02 11:19:29 - Checking authorization ... ! 2023.05.02 11:19:30 - Connecting to Albali (Sweden, Uppsala) . 2023.05.02 11:19:30 - Routes, add 62.102.148.170/32 for interface "enp4s0". . 2023.05.02 11:19:30 - Routes, add 62.102.148.170/32 for interface "enp4s0", already exists. . 2023.05.02 11:19:39 - OpenVPN > OpenVPN 2.5.1 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021 . 2023.05.02 11:19:39 - OpenVPN > library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.10 . 2023.05.02 11:19:39 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.02 11:19:39 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.02 11:19:39 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.02 11:19:39 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.02 11:19:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.170:443 . 2023.05.02 11:19:39 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2023.05.02 11:19:39 - OpenVPN > UDP link local: (not bound) . 2023.05.02 11:19:39 - OpenVPN > UDP link remote: [AF_INET]62.102.148.170:443 . 2023.05.02 11:19:39 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.170:443, sid=905029e9 b7159625 . 2023.05.02 11:19:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.05.02 11:19:40 - OpenVPN > VERIFY KU OK . 2023.05.02 11:19:40 - OpenVPN > Validating certificate extended key usage . 2023.05.02 11:19:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.05.02 11:19:40 - OpenVPN > VERIFY EKU OK . 2023.05.02 11:19:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Albali, emailAddress=info@airvpn.org . 2023.05.02 11:19:40 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2023.05.02 11:19:40 - OpenVPN > [Albali] Peer Connection Initiated with [AF_INET]62.102.148.170:443 . 2023.05.02 11:19:40 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.5.66.1,dhcp-option DNS6 fde6:7a:7d20:142::1,tun-ipv6,route-gateway 10.5.66.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:142::1009/64 fde6:7a:7d20:142::1,ifconfig 10.5.66.11 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.05.02 11:19:40 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.05.02 11:19:40 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.5.66.1' . 2023.05.02 11:19:40 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:142::1' . 2023.05.02 11:19:40 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.05.02 11:19:40 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.05.02 11:19:40 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.05.02 11:19:40 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.05.02 11:19:40 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.05.02 11:19:40 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.05.02 11:19:40 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.05.02 11:19:40 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.05.02 11:19:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.02 11:19:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.02 11:19:40 - OpenVPN > TUN/TAP device tun0 opened . 2023.05.02 11:19:40 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.05.02 11:19:40 - OpenVPN > net_iface_up: set tun0 up . 2023.05.02 11:19:40 - OpenVPN > net_addr_v4_add: 10.5.66.11/24 dev tun0 . 2023.05.02 11:19:40 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.05.02 11:19:40 - OpenVPN > net_iface_up: set tun0 up . 2023.05.02 11:19:40 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:142::1009/64 dev tun0 . 2023.05.02 11:19:40 - OpenVPN > Initialization Sequence Completed . 2023.05.02 11:19:40 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.05.02 11:19:40 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.05.02 11:19:40 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.05.02 11:19:40 - Routes, add ::/1 for interface "tun0". . 2023.05.02 11:19:41 - Routes, add 8000::/1 for interface "tun0". . 2023.05.02 11:19:41 - Routes, add 62.102.148.130/32 for interface "tun0". . 2023.05.02 11:19:41 - Routes, add 2a00:1520:27:1:7ab2:8f9f:28ba:c808/128 for interface "tun0". . 2023.05.02 11:19:41 - Flushing DNS I 2023.05.02 11:19:41 - Checking route IPv4 I 2023.05.02 11:19:41 - Checking route IPv6 I 2023.05.02 11:19:42 - Checking DNS ! 2023.05.02 11:19:43 - Connected. ! 2023.05.02 11:21:25 - Disconnecting . 2023.05.02 11:21:25 - Sending soft termination signal . 2023.05.02 11:21:25 - OpenVPN > event_wait : Interrupted system call (code=4) . 2023.05.02 11:21:25 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.05.02 11:21:30 - OpenVPN > Closing TUN/TAP interface . 2023.05.02 11:21:30 - OpenVPN > net_addr_v4_del: 10.5.66.11 dev tun0 . 2023.05.02 11:21:30 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:142::1009/64 dev tun0 . 2023.05.02 11:21:30 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.05.02 11:21:30 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2023.05.02 11:21:30 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2023.05.02 11:21:30 - Routes, delete ::/1 for interface "tun0", not exists. . 2023.05.02 11:21:30 - Routes, delete 8000::/1 for interface "tun0", not exists. . 2023.05.02 11:21:31 - Routes, delete 62.102.148.170/32 for interface "enp4s0". . 2023.05.02 11:21:31 - Routes, delete 62.102.148.130/32 for interface "tun0", not exists. . 2023.05.02 11:21:31 - Routes, delete 2a00:1520:27:1:7ab2:8f9f:28ba:c808/128 for interface "tun0", not exists. . 2023.05.02 11:21:31 - Routes, delete 62.102.148.170/32 for interface "enp4s0", not exists. . 2023.05.02 11:21:40 - DNS of the system restored to original settings (Rename method) . 2023.05.02 11:21:40 - Connection terminated. . 2023.05.02 11:21:40 - Flushing DNS ! 2023.05.02 11:21:40 - Session terminated. I 2023.05.02 11:21:42 - Session starting. I 2023.05.02 11:21:42 - Checking authorization ... ! 2023.05.02 11:21:43 - Connecting to Alchiba (Netherlands, Alblasserdam) . 2023.05.02 11:21:43 - Routes, add 213.152.161.183/32 for interface "enp4s0". . 2023.05.02 11:21:43 - Routes, add 213.152.161.183/32 for interface "enp4s0", already exists. . 2023.05.02 11:21:53 - OpenVPN > OpenVPN 2.5.1 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021 . 2023.05.02 11:21:53 - OpenVPN > library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.10 . 2023.05.02 11:21:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.02 11:21:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.02 11:21:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.05.02 11:21:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.05.02 11:21:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.183:443 . 2023.05.02 11:21:53 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2023.05.02 11:21:53 - OpenVPN > UDP link local: (not bound) . 2023.05.02 11:21:53 - OpenVPN > UDP link remote: [AF_INET]213.152.161.183:443 . 2023.05.02 11:21:53 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.183:443, sid=a22aa5a9 7b5ea34f . 2023.05.02 11:21:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.05.02 11:21:53 - OpenVPN > VERIFY KU OK . 2023.05.02 11:21:53 - OpenVPN > Validating certificate extended key usage . 2023.05.02 11:21:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.05.02 11:21:53 - OpenVPN > VERIFY EKU OK . 2023.05.02 11:21:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alchiba, emailAddress=info@airvpn.org . 2023.05.02 11:21:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2023.05.02 11:21:53 - OpenVPN > [Alchiba] Peer Connection Initiated with [AF_INET]213.152.161.183:443 . 2023.05.02 11:21:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.5.146.1,dhcp-option DNS6 fde6:7a:7d20:192::1,tun-ipv6,route-gateway 10.5.146.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:192::1072/64 fde6:7a:7d20:192::1,ifconfig 10.5.146.116 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2023.05.02 11:21:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.05.02 11:21:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.5.146.1' . 2023.05.02 11:21:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:192::1' . 2023.05.02 11:21:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.05.02 11:21:53 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.05.02 11:21:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.05.02 11:21:53 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.05.02 11:21:53 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.05.02 11:21:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.05.02 11:21:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.05.02 11:21:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.05.02 11:21:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.02 11:21:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.05.02 11:21:53 - OpenVPN > TUN/TAP device tun0 opened . 2023.05.02 11:21:53 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.05.02 11:21:53 - OpenVPN > net_iface_up: set tun0 up . 2023.05.02 11:21:53 - OpenVPN > net_addr_v4_add: 10.5.146.116/24 dev tun0 . 2023.05.02 11:21:53 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.05.02 11:21:53 - OpenVPN > net_iface_up: set tun0 up . 2023.05.02 11:21:53 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:192::1072/64 dev tun0 . 2023.05.02 11:21:53 - OpenVPN > Initialization Sequence Completed . 2023.05.02 11:21:53 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2023.05.02 11:21:53 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.05.02 11:21:54 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.05.02 11:21:54 - Routes, add ::/1 for interface "tun0". . 2023.05.02 11:21:54 - Routes, add 8000::/1 for interface "tun0". . 2023.05.02 11:21:54 - Routes, add 213.152.161.181/32 for interface "tun0". . 2023.05.02 11:21:54 - Routes, add 2a00:1678:2470:19:9016:df76:43b5:703e/128 for interface "tun0". . 2023.05.02 11:21:54 - Flushing DNS I 2023.05.02 11:21:54 - Checking route IPv4 I 2023.05.02 11:21:54 - Checking route IPv6 I 2023.05.02 11:21:55 - Checking DNS ! 2023.05.02 11:21:55 - Connected. Quote Share this post Link to post
OpenSourcerer 1435 Posted ... No no, I mean: 1 BettyIsBoop reacted to this Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
BettyIsBoop 3 Posted ... On 5/2/2023 at 4:49 PM, OpenSourcerer said: No no, I mean: But i don't have anything in latency column : then take alphabetical order. I use experimental (2.22.2) version, the stable version didn't start search for latency during hours on debian 11. (i order by latecy on screenshot) Quote Share this post Link to post
OpenSourcerer 1435 Posted ... Ah, now I get it. Not sure why it's not shown at all, though. Looks a bit like a bug if it's there in stable. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
BettyIsBoop 3 Posted ... On 5/15/2023 at 3:40 PM, OpenSourcerer said: Ah, now I get it. Not sure why it's not shown at all, though. Looks a bit like a bug if it's there in stable. Where can i alert developer about such issue ? Quote Share this post Link to post