Jump to content
Not connected, Your IP: 3.143.9.115
BettyIsBoop

2.22.2 Debian : always take the 1st server in alpabetical order

Recommended Posts

Since i update to Eddie 2.22.2 on my Debian (because of  latency checking broken) : i see then server choose are always the 1st in the order list.
I think : why not, it can be OK.

But this morning it goes to Japan (i'm in Europe) , OK. But to a server loaded at 98%.
I deny this server, connect to prefered server again : and again : it was in alphabetical order.

I think there are 2 issues here :
1. Must not connect to a server loaded at 98%
2. Must add some randomization to find the best server.

Something to report ? Know issue ?

Thank you
 

Share this post


Link to post
On 2/2/2023 at 8:41 AM, BettyIsBoop said:

1. Must not connect to a server loaded at 98%


As server load is not the only thing taken into consideration when deciding the "best" server to connect to, this is a rather simple suggestion. I wrote about the scoring in this thread: 
On 2/2/2023 at 8:41 AM, BettyIsBoop said:

2. Must add some randomization to find the best server.


There's supposed to be something like this. If it's really just alphabetical, I think it could be analyzed a bit further. But it needs a bit more material to work with.

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
On 2/6/2023 at 8:28 PM, OpenSourcerer said:
There's supposed to be something like this. If it's really just alphabetical, I think it could be analyzed a bit further. But it needs a bit more material to work with. 
How can i send you a log for analysis ?

maybe process :
1. Connect
2. Unconnect
3. Set last connected server as disable
4. Connect again
5. loop 1 or 2 times

:)

Share this post


Link to post
9 hours ago, BettyIsBoop said:

How can i send you a log for analysis ?


You don't see in the log on which basis a server choice is taken.

For now, do you see a change when you switch the scoring rule between latency and speed?

NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
On 4/25/2023 at 3:44 PM, OpenSourcerer said:
For now, do you see a change when you switch the scoring rule between latency and speed?

There are no latency on my version (experimental (2.22.2)): it's empty. With stable version : latency checking broken.

If ordering by latency : order is alphabetical …
 
. 2023.05.02 09:42:17 - Eddie version: 2.22.2 / linux_x64, System: Linux, Name: Debian GNU/Linux 11 (bullseye), Version: 11 (bullseye), Mono/.Net: 6.8.0.105 (Debian 6.8.0.105+dfsg-3.2 Tue Jun 29 21:01:01 UTC 2021); Framework: v4.0.30319
. 2023.05.02 09:42:17 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
. 2023.05.02 09:42:17 - Collect network information
. 2023.05.02 09:42:18 - Reading options from /home/user/.config/eddie/default.profile
. 2023.05.02 09:42:19 - OpenVPN - Version: 2.5.1 - OpenSSL 1.1.1n  15 Mar 2022, LZO 2.10 (/sbin/openvpn)
. 2023.05.02 09:42:19 - SSH - Version: OpenSSH_8.4p1 Debian-5+deb11u1, OpenSSL 1.1.1n  15 Mar 2022 (/usr/bin/ssh)
. 2023.05.02 09:42:19 - SSL - Version: stunnel 5.56 (/usr/bin/stunnel4)
. 2023.05.02 09:42:19 - DNS of the system restored to original settings (Rename method)
. 2023.05.02 09:42:19 - Recovery. Unexpected crash?
! 2023.05.02 09:42:20 - Deactivation of Network Lock
! 2023.05.02 09:42:20 - Activation of Network Lock - Linux iptables-legacy
I 2023.05.02 09:42:21 - Ready
. 2023.05.02 09:42:22 - Collect information about AirVPN completed
I 2023.05.02 09:42:23 - Session starting.
I 2023.05.02 09:42:23 - Checking authorization ...
! 2023.05.02 09:42:24 - Connecting to Albali (Sweden, Uppsala)
. 2023.05.02 09:42:24 - Routes, add 62.102.148.170/32 for interface "enp4s0".
. 2023.05.02 09:42:24 - Routes, add 62.102.148.170/32 for interface "enp4s0", already exists.
. 2023.05.02 09:42:24 - Collect information about AirVPN completed
. 2023.05.02 09:42:31 - OpenVPN > OpenVPN 2.5.1 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021
. 2023.05.02 09:42:31 - OpenVPN > library versions: OpenSSL 1.1.1n  15 Mar 2022, LZO 2.10
. 2023.05.02 09:42:31 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.05.02 09:42:31 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.05.02 09:42:31 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.05.02 09:42:31 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.05.02 09:42:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.170:443
. 2023.05.02 09:42:31 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2023.05.02 09:42:31 - OpenVPN > UDP link local: (not bound)
. 2023.05.02 09:42:31 - OpenVPN > UDP link remote: [AF_INET]62.102.148.170:443
. 2023.05.02 09:42:31 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.170:443, sid=3aae8439 ff2d7889
. 2023.05.02 09:42:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.05.02 09:42:31 - OpenVPN > VERIFY KU OK
. 2023.05.02 09:42:31 - OpenVPN > Validating certificate extended key usage
. 2023.05.02 09:42:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.05.02 09:42:31 - OpenVPN > VERIFY EKU OK
. 2023.05.02 09:42:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Albali, emailAddress=info@airvpn.org
. 2023.05.02 09:42:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2023.05.02 09:42:31 - OpenVPN > [Albali] Peer Connection Initiated with [AF_INET]62.102.148.170:443
. 2023.05.02 09:42:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.5.66.1,dhcp-option DNS6 fde6:7a:7d20:142::1,tun-ipv6,route-gateway 10.5.66.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:142::1009/64 fde6:7a:7d20:142::1,ifconfig 10.5.66.11 255.255.255.0,peer-id 2,cipher AES-256-GCM'
. 2023.05.02 09:42:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2023.05.02 09:42:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.5.66.1'
. 2023.05.02 09:42:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:142::1'
. 2023.05.02 09:42:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2023.05.02 09:42:31 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2023.05.02 09:42:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2023.05.02 09:42:31 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2023.05.02 09:42:31 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2023.05.02 09:42:31 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2023.05.02 09:42:31 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2023.05.02 09:42:31 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2023.05.02 09:42:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.05.02 09:42:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.05.02 09:42:31 - OpenVPN > TUN/TAP device tun0 opened
. 2023.05.02 09:42:31 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2023.05.02 09:42:31 - OpenVPN > net_iface_up: set tun0 up
. 2023.05.02 09:42:31 - OpenVPN > net_addr_v4_add: 10.5.66.11/24 dev tun0
. 2023.05.02 09:42:31 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2023.05.02 09:42:31 - OpenVPN > net_iface_up: set tun0 up
. 2023.05.02 09:42:31 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:142::1009/64 dev tun0
. 2023.05.02 09:42:31 - OpenVPN > Initialization Sequence Completed
. 2023.05.02 09:42:32 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2023.05.02 09:42:32 - Routes, add 0.0.0.0/1 for interface "tun0".
. 2023.05.02 09:42:32 - Routes, add 128.0.0.0/1 for interface "tun0".
. 2023.05.02 09:42:32 - Routes, add ::/1 for interface "tun0".
. 2023.05.02 09:42:32 - Routes, add 8000::/1 for interface "tun0".
. 2023.05.02 09:42:32 - Routes, add 62.102.148.130/32 for interface "tun0".
. 2023.05.02 09:42:32 - Routes, add 2a00:1520:27:1:7ab2:8f9f:28ba:c808/128 for interface "tun0".
. 2023.05.02 09:42:32 - Flushing DNS
I 2023.05.02 09:42:32 - Checking route IPv4
I 2023.05.02 09:42:33 - Checking route IPv6
I 2023.05.02 09:42:33 - Checking DNS
! 2023.05.02 09:42:33 - Connected.
. 2023.05.02 09:56:45 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2023.05.02 09:56:55 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2023.05.02 09:57:06 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2023.05.02 10:12:33 - Above log line repeated 72 times more
. 2023.05.02 10:12:33 - Collect information about AirVPN completed
. 2023.05.02 10:12:40 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2023.05.02 10:12:50 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2023.05.02 10:13:00 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2023.05.02 10:39:13 - Above log line repeated 51 times more
. 2023.05.02 10:39:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.05.02 10:39:13 - OpenVPN > VERIFY KU OK
. 2023.05.02 10:39:13 - OpenVPN > Validating certificate extended key usage
. 2023.05.02 10:39:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.05.02 10:39:13 - OpenVPN > VERIFY EKU OK
. 2023.05.02 10:39:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Albali, emailAddress=info@airvpn.org
. 2023.05.02 10:39:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.05.02 10:39:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.05.02 10:39:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2023.05.02 10:42:40 - Collect information about AirVPN completed
. 2023.05.02 11:12:48 - Collect information about AirVPN completed
! 2023.05.02 11:18:38 - Disconnecting
. 2023.05.02 11:18:38 - Sending soft termination signal
. 2023.05.02 11:18:38 - OpenVPN > event_wait : Interrupted system call (code=4)
. 2023.05.02 11:18:38 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2023.05.02 11:18:43 - OpenVPN > Closing TUN/TAP interface
. 2023.05.02 11:18:43 - OpenVPN > net_addr_v4_del: 10.5.66.11 dev tun0
. 2023.05.02 11:18:43 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:142::1009/64 dev tun0
. 2023.05.02 11:18:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2023.05.02 11:18:43 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists.
. 2023.05.02 11:18:43 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists.
. 2023.05.02 11:18:43 - Routes, delete ::/1 for interface "tun0", not exists.
. 2023.05.02 11:18:43 - Routes, delete 8000::/1 for interface "tun0", not exists.
. 2023.05.02 11:18:44 - Routes, delete 62.102.148.170/32 for interface "enp4s0".
. 2023.05.02 11:18:44 - Routes, delete 62.102.148.130/32 for interface "tun0", not exists.
. 2023.05.02 11:18:44 - Routes, delete 2a00:1520:27:1:7ab2:8f9f:28ba:c808/128 for interface "tun0", not exists.
. 2023.05.02 11:18:44 - Routes, delete 62.102.148.170/32 for interface "enp4s0", not exists.
. 2023.05.02 11:18:53 - DNS of the system restored to original settings (Rename method)
. 2023.05.02 11:18:53 - Connection terminated.
. 2023.05.02 11:18:53 - Flushing DNS
! 2023.05.02 11:18:53 - Session terminated.
I 2023.05.02 11:19:29 - Session starting.
I 2023.05.02 11:19:29 - Checking authorization ...
! 2023.05.02 11:19:30 - Connecting to Albali (Sweden, Uppsala)
. 2023.05.02 11:19:30 - Routes, add 62.102.148.170/32 for interface "enp4s0".
. 2023.05.02 11:19:30 - Routes, add 62.102.148.170/32 for interface "enp4s0", already exists.
. 2023.05.02 11:19:39 - OpenVPN > OpenVPN 2.5.1 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021
. 2023.05.02 11:19:39 - OpenVPN > library versions: OpenSSL 1.1.1n  15 Mar 2022, LZO 2.10
. 2023.05.02 11:19:39 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.05.02 11:19:39 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.05.02 11:19:39 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.05.02 11:19:39 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.05.02 11:19:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.170:443
. 2023.05.02 11:19:39 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2023.05.02 11:19:39 - OpenVPN > UDP link local: (not bound)
. 2023.05.02 11:19:39 - OpenVPN > UDP link remote: [AF_INET]62.102.148.170:443
. 2023.05.02 11:19:39 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.170:443, sid=905029e9 b7159625
. 2023.05.02 11:19:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.05.02 11:19:40 - OpenVPN > VERIFY KU OK
. 2023.05.02 11:19:40 - OpenVPN > Validating certificate extended key usage
. 2023.05.02 11:19:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.05.02 11:19:40 - OpenVPN > VERIFY EKU OK
. 2023.05.02 11:19:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Albali, emailAddress=info@airvpn.org
. 2023.05.02 11:19:40 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2023.05.02 11:19:40 - OpenVPN > [Albali] Peer Connection Initiated with [AF_INET]62.102.148.170:443
. 2023.05.02 11:19:40 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.5.66.1,dhcp-option DNS6 fde6:7a:7d20:142::1,tun-ipv6,route-gateway 10.5.66.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:142::1009/64 fde6:7a:7d20:142::1,ifconfig 10.5.66.11 255.255.255.0,peer-id 2,cipher AES-256-GCM'
. 2023.05.02 11:19:40 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2023.05.02 11:19:40 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.5.66.1'
. 2023.05.02 11:19:40 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:142::1'
. 2023.05.02 11:19:40 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2023.05.02 11:19:40 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2023.05.02 11:19:40 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2023.05.02 11:19:40 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2023.05.02 11:19:40 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2023.05.02 11:19:40 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2023.05.02 11:19:40 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2023.05.02 11:19:40 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2023.05.02 11:19:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.05.02 11:19:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.05.02 11:19:40 - OpenVPN > TUN/TAP device tun0 opened
. 2023.05.02 11:19:40 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2023.05.02 11:19:40 - OpenVPN > net_iface_up: set tun0 up
. 2023.05.02 11:19:40 - OpenVPN > net_addr_v4_add: 10.5.66.11/24 dev tun0
. 2023.05.02 11:19:40 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2023.05.02 11:19:40 - OpenVPN > net_iface_up: set tun0 up
. 2023.05.02 11:19:40 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:142::1009/64 dev tun0
. 2023.05.02 11:19:40 - OpenVPN > Initialization Sequence Completed
. 2023.05.02 11:19:40 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2023.05.02 11:19:40 - Routes, add 0.0.0.0/1 for interface "tun0".
. 2023.05.02 11:19:40 - Routes, add 128.0.0.0/1 for interface "tun0".
. 2023.05.02 11:19:40 - Routes, add ::/1 for interface "tun0".
. 2023.05.02 11:19:41 - Routes, add 8000::/1 for interface "tun0".
. 2023.05.02 11:19:41 - Routes, add 62.102.148.130/32 for interface "tun0".
. 2023.05.02 11:19:41 - Routes, add 2a00:1520:27:1:7ab2:8f9f:28ba:c808/128 for interface "tun0".
. 2023.05.02 11:19:41 - Flushing DNS
I 2023.05.02 11:19:41 - Checking route IPv4
I 2023.05.02 11:19:41 - Checking route IPv6
I 2023.05.02 11:19:42 - Checking DNS
! 2023.05.02 11:19:43 - Connected.
! 2023.05.02 11:21:25 - Disconnecting
. 2023.05.02 11:21:25 - Sending soft termination signal
. 2023.05.02 11:21:25 - OpenVPN > event_wait : Interrupted system call (code=4)
. 2023.05.02 11:21:25 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2023.05.02 11:21:30 - OpenVPN > Closing TUN/TAP interface
. 2023.05.02 11:21:30 - OpenVPN > net_addr_v4_del: 10.5.66.11 dev tun0
. 2023.05.02 11:21:30 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:142::1009/64 dev tun0
. 2023.05.02 11:21:30 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2023.05.02 11:21:30 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists.
. 2023.05.02 11:21:30 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists.
. 2023.05.02 11:21:30 - Routes, delete ::/1 for interface "tun0", not exists.
. 2023.05.02 11:21:30 - Routes, delete 8000::/1 for interface "tun0", not exists.
. 2023.05.02 11:21:31 - Routes, delete 62.102.148.170/32 for interface "enp4s0".
. 2023.05.02 11:21:31 - Routes, delete 62.102.148.130/32 for interface "tun0", not exists.
. 2023.05.02 11:21:31 - Routes, delete 2a00:1520:27:1:7ab2:8f9f:28ba:c808/128 for interface "tun0", not exists.
. 2023.05.02 11:21:31 - Routes, delete 62.102.148.170/32 for interface "enp4s0", not exists.
. 2023.05.02 11:21:40 - DNS of the system restored to original settings (Rename method)
. 2023.05.02 11:21:40 - Connection terminated.
. 2023.05.02 11:21:40 - Flushing DNS
! 2023.05.02 11:21:40 - Session terminated.
I 2023.05.02 11:21:42 - Session starting.
I 2023.05.02 11:21:42 - Checking authorization ...
! 2023.05.02 11:21:43 - Connecting to Alchiba (Netherlands, Alblasserdam)
. 2023.05.02 11:21:43 - Routes, add 213.152.161.183/32 for interface "enp4s0".
. 2023.05.02 11:21:43 - Routes, add 213.152.161.183/32 for interface "enp4s0", already exists.
. 2023.05.02 11:21:53 - OpenVPN > OpenVPN 2.5.1 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021
. 2023.05.02 11:21:53 - OpenVPN > library versions: OpenSSL 1.1.1n  15 Mar 2022, LZO 2.10
. 2023.05.02 11:21:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.05.02 11:21:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.05.02 11:21:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.05.02 11:21:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.05.02 11:21:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.183:443
. 2023.05.02 11:21:53 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2023.05.02 11:21:53 - OpenVPN > UDP link local: (not bound)
. 2023.05.02 11:21:53 - OpenVPN > UDP link remote: [AF_INET]213.152.161.183:443
. 2023.05.02 11:21:53 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.183:443, sid=a22aa5a9 7b5ea34f
. 2023.05.02 11:21:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.05.02 11:21:53 - OpenVPN > VERIFY KU OK
. 2023.05.02 11:21:53 - OpenVPN > Validating certificate extended key usage
. 2023.05.02 11:21:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.05.02 11:21:53 - OpenVPN > VERIFY EKU OK
. 2023.05.02 11:21:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alchiba, emailAddress=info@airvpn.org
. 2023.05.02 11:21:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2023.05.02 11:21:53 - OpenVPN > [Alchiba] Peer Connection Initiated with [AF_INET]213.152.161.183:443
. 2023.05.02 11:21:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.5.146.1,dhcp-option DNS6 fde6:7a:7d20:192::1,tun-ipv6,route-gateway 10.5.146.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:192::1072/64 fde6:7a:7d20:192::1,ifconfig 10.5.146.116 255.255.255.0,peer-id 5,cipher AES-256-GCM'
. 2023.05.02 11:21:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2023.05.02 11:21:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.5.146.1'
. 2023.05.02 11:21:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:192::1'
. 2023.05.02 11:21:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2023.05.02 11:21:53 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2023.05.02 11:21:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2023.05.02 11:21:53 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2023.05.02 11:21:53 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2023.05.02 11:21:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2023.05.02 11:21:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2023.05.02 11:21:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2023.05.02 11:21:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.05.02 11:21:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.05.02 11:21:53 - OpenVPN > TUN/TAP device tun0 opened
. 2023.05.02 11:21:53 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2023.05.02 11:21:53 - OpenVPN > net_iface_up: set tun0 up
. 2023.05.02 11:21:53 - OpenVPN > net_addr_v4_add: 10.5.146.116/24 dev tun0
. 2023.05.02 11:21:53 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2023.05.02 11:21:53 - OpenVPN > net_iface_up: set tun0 up
. 2023.05.02 11:21:53 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:192::1072/64 dev tun0
. 2023.05.02 11:21:53 - OpenVPN > Initialization Sequence Completed
. 2023.05.02 11:21:53 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2023.05.02 11:21:53 - Routes, add 0.0.0.0/1 for interface "tun0".
. 2023.05.02 11:21:54 - Routes, add 128.0.0.0/1 for interface "tun0".
. 2023.05.02 11:21:54 - Routes, add ::/1 for interface "tun0".
. 2023.05.02 11:21:54 - Routes, add 8000::/1 for interface "tun0".
. 2023.05.02 11:21:54 - Routes, add 213.152.161.181/32 for interface "tun0".
. 2023.05.02 11:21:54 - Routes, add 2a00:1678:2470:19:9016:df76:43b5:703e/128 for interface "tun0".
. 2023.05.02 11:21:54 - Flushing DNS
I 2023.05.02 11:21:54 - Checking route IPv4
I 2023.05.02 11:21:54 - Checking route IPv6
I 2023.05.02 11:21:55 - Checking DNS
! 2023.05.02 11:21:55 - Connected.


 

Share this post


Link to post
On 5/2/2023 at 4:49 PM, OpenSourcerer said:

No no, I mean:
 

But i don't have anything in latency column : then take alphabetical order. I use experimental (2.22.2) version, the stable version didn't start search for latency during hours on debian 11.
(i order by latecy on screenshot)

Capture d’écran du 2023-05-15 09-12-04.png

Share this post


Link to post

Ah, now I get it. Not sure why it's not shown at all, though. Looks a bit like a bug if it's there in stable.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
On 5/15/2023 at 3:40 PM, OpenSourcerer said:

Ah, now I get it. Not sure why it's not shown at all, though. Looks a bit like a bug if it's there in stable.

Where can i alert developer about such issue ?

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...