Jump to content
Not connected, Your IP: 3.147.73.85
Staff

Eddie Desktop 2.23 beta released

Recommended Posts

8 hours ago, mythrare said:

Slightly off topic but why has the stable version lagged behind by almost a year? It is still on version 2.21.8 released on May 26, 2022. Is it still worth using the old one or has there been security version bumps that make Experimental 2.23.1 necessary?


No security reason, only functionality.
Of course it's our priority the release of this version (2.23) as stable as soon as possible.

Share this post


Link to post
On 6/27/2023 at 11:44 AM, Quallian said:

Never heard of such an odd development model. It must be flawed, I can't understand how a version we were invited to test is now left apart after so many months without an explanation.

I read Clodo's message, yes, and I decided I don't want to test 2.23, for the reasons above. Me and many other tested 2.22.2 for many months and we would expect some respect, i.e. someone should be working on 2.22.2 until it is stable. I don't want to be re-routed to yet another test on another version which features new problems and regressions (it doesn't even connect fine), before the current testing is finished and a stable release is out. That would be the normal and plain development of any project in the world and history of software development, not this twisted software release cycle.

Hello!

Thank you for your valuable tests which helped us find bugs and glitches. Your work was not in vain, you can see how many bug fixes have been implemented on Eddie 2.23: most of them thanks to you and community testers like you.
https://eddie.website/changelog/?software=client&format=html

We assure you that your work is precious and that under no circumstance will we waste it.

Eddie's Deskop edition versioning scheme and release cycle are unorthodox. For example, check what happened now with Eddie 2.23.0: a bug was found, thanks to testers from the community like you. The fix was implemented on a new version (2.23.1) and 2.23.0 has been thrown away. You don't have different betas for 2.23.0, and 2.23.0 will never be Release Candidate or release, to be clear.

Similarly, Eddie 2.22.2 will never reach a Release status, and not even a Release Candidate status: each bug fix is implemented not in 2.22.2 but in a new version. You can see it as a customized SemVer (semantic versioning), where: every fix is condensed in the "post release cycle", the scheme is more similar to major.minor.patch than to major.minor.maintenance.build and a whole minor could be thrown completely away without reaching a stable phase (exactly the 2.22 you mention).

https://en.wikipedia.org/wiki/Software_versioning

With that said:
Quote

Does it have flaws so dangerous that you will leave it "experimental" forever without working on it? I ask as 2.21.8 and 2.23 at the moment don't work properly in my systems, but 2.22.2 does. So I prefer to use 2.22.2 but I want to know if it has been abandoned for some serious problem.


So far no critical problem has been found by anyone on Eddie 2.22.2 so you can keep using it with the usual caveat: it does not include the bug fixes you can see on the 2.23.1 version.

Furthermore, Linux users must be aware that Eddie 2.23.1 features full support, with proper DNS management, of every systemd-resolved working mode, which previous Eddie versions don't. Now that more and more Linux distributions come pre-packaged with systemd-resolved working in on-link or hybrid modes (examples: Fedora, Ubuntu), Linux users can seriously consider to jump directly to 2.23.x.

Thank you again again for your valuable tests and we frankly hope that you will be among the testing group for Eddie 2.23.x as well. :)

Kind regards

 

Share this post


Link to post
On 6/27/2023 at 8:28 PM, 9zkHR9tCN7bo said:

Manual connection with CLI openvpn and stunnel also works. If anyone going to test this, run openvpn only as root: sudo is not enough. Otherwise you may not be able to finish openvpn process even with help of SIGKILL - but only if it was active for some time, perhaps until authorization timeout. Just in case, prepare your magic request key to reboot peacefully.


Just caught same issue while using Eddie UI! Obviously, it has nothing to do with AirVPN software, but this bug is not exclusive to plain CLI openvpn with DCO.
Connection was active for almost 5 hours, then I tried to disconnect manually - and there is no way anymore to kill openvpn process.

Here is full Eddie log:

. 2023.06.29 13:39:19 - Eddie version: 2.23.1 / linux_x64, System: Linux, Name: Arch Linux, Version: Linux host 6.3.9-273-tkg-bore #1 SMP PREEMPT_DYNAMIC TKG Tue, 27 Jun 2023 14:29:57 +0000 x86_64 GNU/Linux, Mono/.Net: 6.12.0 (makepkg/73df89a73d2 Sat May 27 11:12:33 UTC 2023); Framework: v4.0.30319
. 2023.06.29 13:39:19 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
. 2023.06.29 13:39:19 - Raise system privileges
. 2023.06.29 13:39:24 - Collect network information
. 2023.06.29 13:39:26 - Reading options from /home/user/.config/eddie/default.profile
. 2023.06.29 13:39:27 - OpenVPN - Version: 2.6.5 - OpenSSL 3.1.1 30 May 2023, LZO 2.10 (/usr/bin/openvpn)
. 2023.06.29 13:39:27 - SSH - Version: OpenSSH_9.3p1, OpenSSL 3.1.1 30 May 2023 (/usr/local/bin/ssh)
. 2023.06.29 13:39:27 - SSL - Version: 5.69 (/usr/bin/stunnel)
I 2023.06.29 13:39:28 - Ready
. 2023.06.29 13:39:29 - Collect information about AirVPN completed
! 2023.06.29 13:39:30 - Activation of Network Lock - Linux nftables
I 2023.06.29 13:40:43 - Session starting.
I 2023.06.29 13:40:43 - Checking authorization ...
. 2023.06.29 13:42:52 - Checking authorization ..., 1° try failed (Fetch url error:Timeout was reached)
! 2023.06.29 13:42:52 - Connecting to Marsic (Serbia, Belgrade)
. 2023.06.29 13:42:52 - Routes, add 146.70.111.22/32 for interface "enp37s0".
. 2023.06.29 13:42:52 - Routes, add 146.70.111.22/32 for interface "enp37s0", already exists.
. 2023.06.29 13:42:52 - SSL > LOG6[ui]: Initializing inetd mode configuration
. 2023.06.29 13:42:52 - SSL > LOG5[ui]: stunnel 5.69 on x86_64-pc-linux-gnu platform
. 2023.06.29 13:42:52 - SSL > LOG5[ui]: Compiled with OpenSSL 3.0.8 7 Feb 2023
. 2023.06.29 13:42:52 - SSL > LOG5[ui]: Running  with OpenSSL 3.1.1 30 May 2023
. 2023.06.29 13:42:52 - SSL > LOG5[ui]: Update OpenSSL shared libraries or rebuild stunnel
. 2023.06.29 13:42:52 - SSL > LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6,SYSTEMD TLS:ENGINE,OCSP,PSK,SNI
. 2023.06.29 13:42:52 - SSL > LOG6[ui]: Initializing inetd mode configuration
. 2023.06.29 13:42:52 - SSL > LOG5[ui]: Reading configuration from file /home/user/.config/eddie/cf878902972cd9b954d9e4c71c4ee2c6bcaf212480df304f8bd1bb26134ab059.tmp.ssl
. 2023.06.29 13:42:52 - SSL > LOG5[ui]: UTF-8 byte order mark detected
. 2023.06.29 13:42:52 - SSL > LOG5[ui]: FIPS mode disabled
. 2023.06.29 13:42:52 - SSL > LOG6[ui]: Compression disabled
. 2023.06.29 13:42:52 - SSL > LOG6[ui]: Initializing service [openvpn]
. 2023.06.29 13:42:52 - SSL > LOG6[ui]: stunnel default security level set: 2
. 2023.06.29 13:42:52 - SSL > LOG6[ui]: Session resumption enabled
. 2023.06.29 13:42:52 - SSL > LOG6[ui]: Configured trusted server CA: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2023.06.29 13:42:52 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks
. 2023.06.29 13:42:52 - SSL > LOG6[ui]: DH initialization skipped: client section
. 2023.06.29 13:42:52 - SSL > LOG5[ui]: Configuration successful
. 2023.06.29 13:42:52 - SSL > LOG6[ui]: Service [openvpn] (FD=9) bound to 127.0.0.1:51789
. 2023.06.29 13:42:52 - SSL > LOG6[ui]: Accepting new connections
. 2023.06.29 13:42:52 - SSL > LOG6[per-day]: Executing per-day jobs
. 2023.06.29 13:42:52 - SSL > LOG6[per-day]: Per-day jobs completed in 0 seconds
. 2023.06.29 13:42:52 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:33074
. 2023.06.29 13:42:52 - SSL > LOG6[0]: s_connect: connecting 146.70.111.22:443
. 2023.06.29 13:42:53 - OpenVPN > OpenVPN 2.6.5 [git:makepkg/cbc9e0ce412e7b42+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Jun 13 2023
. 2023.06.29 13:42:53 - OpenVPN > library versions: OpenSSL 3.1.1 30 May 2023, LZO 2.10
. 2023.06.29 13:42:53 - OpenVPN > DCO version: 0.2.20230426
. 2023.06.29 13:42:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:51789
. 2023.06.29 13:42:53 - OpenVPN > Socket Buffers: R=[131072->131072] S=[16384->16384]
. 2023.06.29 13:42:53 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:51789
. 2023.06.29 13:42:53 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:51789
. 2023.06.29 13:42:53 - OpenVPN > TCPv4_CLIENT link local: (not bound)
. 2023.06.29 13:42:53 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:51789
. 2023.06.29 13:42:53 - SSL > LOG5[0]: s_connect: connected 146.70.111.22:443
. 2023.06.29 13:42:53 - SSL > LOG5[0]: Service [openvpn] connected remote server from 10.21.10.1:54742
. 2023.06.29 13:42:53 - SSL > LOG6[0]: SNI: sending servername: 146.70.111.22
. 2023.06.29 13:42:53 - SSL > LOG6[0]: Peer certificate not required
. 2023.06.29 13:42:53 - SSL > LOG6[0]: Certificate verification disabled
. 2023.06.29 13:42:53 - SSL > LOG6[0]: Client certificate not requested
. 2023.06.29 13:42:53 - SSL > LOG6[0]: Session id: C405CB513C2771CBE6DD8DFFEFB0CBE505253AAA352E554BF2872602B8CDAEB8
. 2023.06.29 13:42:53 - SSL > LOG6[0]: TLS connected: new session negotiated
. 2023.06.29 13:42:53 - SSL > LOG6[0]: TLSv1.2 ciphersuite: ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2023.06.29 13:42:53 - SSL > LOG6[0]: Peer temporary key: ECDH, P-256, 256 bits
. 2023.06.29 13:42:53 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:51789, sid=0cb9eebd 018f9d25
. 2023.06.29 13:42:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.06.29 13:42:53 - OpenVPN > VERIFY KU OK
. 2023.06.29 13:42:53 - OpenVPN > Validating certificate extended key usage
. 2023.06.29 13:42:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.06.29 13:42:53 - OpenVPN > VERIFY EKU OK
. 2023.06.29 13:42:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Marsic, emailAddress=info@airvpn.org
. 2023.06.29 13:42:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.06.29 13:42:53 - OpenVPN > [Marsic] Peer Connection Initiated with [AF_INET]127.0.0.1:51789
. 2023.06.29 13:42:53 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
. 2023.06.29 13:42:53 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted
. 2023.06.29 13:42:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.30.27.1,dhcp-option DNS6 fde6:7a:7d20:1a1b::1,tun-ipv6,route-gateway 10.30.27.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1a1b::1001/64 fde6:7a:7d20:1a1b::1,ifconfig 10.30.27.3 255.255.255.0,peer-id 0,cipher CHACHA20-POLY1305,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500'
. 2023.06.29 13:42:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2023.06.29 13:42:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.30.27.1'
. 2023.06.29 13:42:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1a1b::1'
. 2023.06.29 13:42:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2023.06.29 13:42:53 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2023.06.29 13:42:53 - OpenVPN > OPTIONS IMPORT: tun-mtu set to 1500
. 2023.06.29 13:42:53 - OpenVPN > net_iface_new: add tun0 type ovpn-dco
. 2023.06.29 13:42:53 - OpenVPN > DCO device tun0 opened
. 2023.06.29 13:42:54 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2023.06.29 13:42:54 - OpenVPN > net_iface_up: set tun0 up
. 2023.06.29 13:42:54 - OpenVPN > net_addr_v4_add: 10.30.27.3/24 dev tun0
. 2023.06.29 13:42:54 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2023.06.29 13:42:54 - OpenVPN > net_iface_up: set tun0 up
. 2023.06.29 13:42:54 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:1a1b::1001/64 dev tun0
. 2023.06.29 13:42:54 - OpenVPN > Initialization Sequence Completed
. 2023.06.29 13:42:54 - OpenVPN > Data Channel: cipher 'CHACHA20-POLY1305', peer-id: 0
. 2023.06.29 13:42:54 - DNS of the system switched to VPN DNS - via /etc/resolv.conf)
. 2023.06.29 13:42:54 - Routes, add 0.0.0.0/1 for interface "tun0".
. 2023.06.29 13:42:54 - Routes, add 128.0.0.0/1 for interface "tun0".
. 2023.06.29 13:42:54 - Routes, add ::/1 for interface "tun0".
. 2023.06.29 13:42:54 - Routes, add 8000::/1 for interface "tun0".
. 2023.06.29 13:42:54 - Routes, add 146.70.111.19/32 for interface "tun0".
. 2023.06.29 13:42:54 - Routes, add 2001:ac8:7d:41:1573:e655:4653:403a/128 for interface "tun0".
. 2023.06.29 13:42:54 - Flushing DNS
. 2023.06.29 13:42:54 - Flush DNS - nscd
I 2023.06.29 13:42:54 - Checking route IPv4
I 2023.06.29 13:42:55 - Checking route IPv6
I 2023.06.29 13:42:56 - Checking DNS
! 2023.06.29 13:42:57 - Connected.
. 2023.06.29 13:42:57 - OpenVPN > Timers: ping 10, ping-restart 60
. 2023.06.29 13:42:57 - OpenVPN > Protocol options: protocol-flags cc-exit tls-ekm dyn-tls-crypt
. 2023.06.29 14:09:35 - Collect information about AirVPN completed
. 2023.06.29 14:39:39 - Collect information about AirVPN completed
. 2023.06.29 14:40:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.06.29 14:40:20 - OpenVPN > VERIFY KU OK
. 2023.06.29 14:40:20 - OpenVPN > Validating certificate extended key usage
. 2023.06.29 14:40:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.06.29 14:40:20 - OpenVPN > VERIFY EKU OK
. 2023.06.29 14:40:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Marsic, emailAddress=info@airvpn.org
. 2023.06.29 14:40:20 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.06.29 15:09:43 - Collect information about AirVPN completed
. 2023.06.29 15:37:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.06.29 15:37:46 - OpenVPN > VERIFY KU OK
. 2023.06.29 15:37:46 - OpenVPN > Validating certificate extended key usage
. 2023.06.29 15:37:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.06.29 15:37:46 - OpenVPN > VERIFY EKU OK
. 2023.06.29 15:37:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Marsic, emailAddress=info@airvpn.org
. 2023.06.29 15:37:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.06.29 15:39:47 - Collect information about AirVPN completed
. 2023.06.29 16:09:51 - Collect information about AirVPN completed
. 2023.06.29 16:35:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.06.29 16:35:13 - OpenVPN > VERIFY KU OK
. 2023.06.29 16:35:13 - OpenVPN > Validating certificate extended key usage
. 2023.06.29 16:35:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.06.29 16:35:13 - OpenVPN > VERIFY EKU OK
. 2023.06.29 16:35:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Marsic, emailAddress=info@airvpn.org
. 2023.06.29 16:35:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.06.29 16:39:58 - Collect information about AirVPN completed
. 2023.06.29 17:10:01 - Collect information about AirVPN completed
. 2023.06.29 17:32:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.06.29 17:32:54 - OpenVPN > VERIFY KU OK
. 2023.06.29 17:32:54 - OpenVPN > Validating certificate extended key usage
. 2023.06.29 17:32:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.06.29 17:32:54 - OpenVPN > VERIFY EKU OK
. 2023.06.29 17:32:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Marsic, emailAddress=info@airvpn.org
. 2023.06.29 17:32:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.06.29 17:40:05 - Collect information about AirVPN completed
. 2023.06.29 18:10:09 - Collect information about AirVPN completed
! 2023.06.29 18:28:24 - Disconnecting
. 2023.06.29 18:28:24 - Sending soft termination signal
. 2023.06.29 18:28:24 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4)
. 2023.06.29 18:28:24 - OpenVPN > Closing DCO interface
. 2023.06.29 18:28:24 - OpenVPN > net_addr_v4_del: 10.30.27.3 dev tun0
. 2023.06.29 18:28:24 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:1a1b::1001/64 dev tun0
. 2023.06.29 18:28:24 - OpenVPN > net_iface_del: delete tun0
. 2023.06.29 18:28:43 - Sending hard termination signal
. 2023.06.29 18:29:03 - Sending hard termination signal
. 2023.06.29 18:29:23 - Sending hard termination signal
. 2023.06.29 18:31:23 - Above log line repeated 5 times more
. 2023.06.29 18:31:23 - SSL > LOG6[0]: TLS closed (SSL_read)
. 2023.06.29 18:31:23 - SSL > LOG3[0]: transfer: s_poll_wait: TIMEOUTclose exceeded: closing
. 2023.06.29 18:31:23 - SSL > LOG5[0]: Connection closed: 70856413 byte(s) sent to TLS, 4093861747 byte(s) sent to socket
. 2023.06.29 18:31:23 - Sending hard termination signal
. 2023.06.29 18:31:43 - Sending hard termination signal
. 2023.06.29 18:32:03 - Sending hard termination signal


During reboot attempt, I have to use Alt+PrintScreen+REISUB, because system can't kill openvpn process.
I see those lines on the screen:

Reached target System Reboot.
watchdog: watchdog0: watchdog did not stop!
ovpn_tcp_tx_work: cannot send TCP packet to peer 0: -32
unregister_netdevice: waiting for tun0 to become free. Usage count = 2
systemd-shutdown[1]: Waiting for process: 3170 (openvpn)


I found this thread about openvpn-dco, and it looks like it can be somehow related to what I am experiencing. However, my knowledge is now enough to say for sure is it so or not.
# ip link del tun0 mentioned in linked thread didn't help in my case: command's output stated that tun0 doesn't exist (just like # ip link show).

Is it known issue? Can you reproduce?
If I can obtain more logs someway, please let me know.

Update 2: Unfortunately, same happens for me even with root (not just sudo) and CLI openvpn. Maybe something is wrong on my side, since no one else here mentions it.
I think I should retest everything one more time with newer & not-custom kernel version and reinstalled DCO dkms module.

Update: Again =)

. 2023.06.29 18:57:06 - Eddie version: 2.23.1 / linux_x64, System: Linux, Name: Arch Linux, Version: Linux host 6.3.9-273-tkg-bore #1 SMP PREEMPT_DYNAMIC TKG Tue, 27 Jun 2023 14:29:57 +0000 x86_64 GNU/Linux, Mono/.Net: 6.12.0 (makepkg/73df89a73d2 Sat May 27 11:12:33 UTC 2023); Framework: v4.0.30319
. 2023.06.29 18:57:06 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
. 2023.06.29 18:57:06 - Raise system privileges
. 2023.06.29 18:57:12 - Collect network information
. 2023.06.29 18:57:13 - Reading options from /home/user/.config/eddie/default.profile
. 2023.06.29 18:57:14 - OpenVPN - Version: 2.6.5 - OpenSSL 3.1.1 30 May 2023, LZO 2.10 (/usr/bin/openvpn)
. 2023.06.29 18:57:14 - SSH - Version: OpenSSH_9.3p1, OpenSSL 3.1.1 30 May 2023 (/usr/local/bin/ssh)
. 2023.06.29 18:57:14 - SSL - Version: 5.69 (/usr/bin/stunnel)
. 2023.06.29 18:57:14 - DNS of the system restored - via /etc/resolv.conf)
. 2023.06.29 18:57:14 - Recovery. Unexpected crash?
! 2023.06.29 18:57:14 - Deactivation of Network Lock
I 2023.06.29 18:57:15 - Ready
! 2023.06.29 18:57:17 - Activation of Network Lock - Linux nftables
I 2023.06.29 18:57:29 - Session starting.
I 2023.06.29 18:57:29 - Checking authorization ...
! 2023.06.29 18:57:29 - Connecting to Marsic (Serbia, Belgrade)
. 2023.06.29 18:57:29 - Routes, add 146.70.111.22/32 for interface "enp37s0".
. 2023.06.29 18:57:29 - Routes, add 146.70.111.22/32 for interface "enp37s0", already exists.
. 2023.06.29 18:57:29 - SSL > LOG6[ui]: Initializing inetd mode configuration
. 2023.06.29 18:57:29 - SSL > LOG5[ui]: stunnel 5.69 on x86_64-pc-linux-gnu platform
. 2023.06.29 18:57:29 - SSL > LOG5[ui]: Compiled with OpenSSL 3.0.8 7 Feb 2023
. 2023.06.29 18:57:29 - SSL > LOG5[ui]: Running  with OpenSSL 3.1.1 30 May 2023
. 2023.06.29 18:57:29 - SSL > LOG5[ui]: Update OpenSSL shared libraries or rebuild stunnel
. 2023.06.29 18:57:29 - SSL > LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6,SYSTEMD TLS:ENGINE,OCSP,PSK,SNI
. 2023.06.29 18:57:29 - SSL > LOG6[ui]: Initializing inetd mode configuration
. 2023.06.29 18:57:29 - SSL > LOG5[ui]: Reading configuration from file /home/user/.config/eddie/f309139e23b17a07d8591b4c937dbfe4611375bbad3a4a0ab2722f5af3d51815.tmp.ssl
. 2023.06.29 18:57:29 - SSL > LOG5[ui]: UTF-8 byte order mark detected
. 2023.06.29 18:57:29 - SSL > LOG5[ui]: FIPS mode disabled
. 2023.06.29 18:57:29 - SSL > LOG6[ui]: Compression disabled
. 2023.06.29 18:57:29 - SSL > LOG6[ui]: Initializing service [openvpn]
. 2023.06.29 18:57:29 - SSL > LOG6[ui]: stunnel default security level set: 2
. 2023.06.29 18:57:29 - SSL > LOG6[ui]: Session resumption enabled
. 2023.06.29 18:57:29 - SSL > LOG6[ui]: Configured trusted server CA: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2023.06.29 18:57:29 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks
. 2023.06.29 18:57:29 - SSL > LOG6[ui]: DH initialization skipped: client section
. 2023.06.29 18:57:29 - SSL > LOG5[ui]: Configuration successful
. 2023.06.29 18:57:29 - SSL > LOG6[ui]: Service [openvpn] (FD=9) bound to 127.0.0.1:7045
. 2023.06.29 18:57:29 - SSL > LOG6[ui]: Accepting new connections
. 2023.06.29 18:57:29 - SSL > LOG6[per-day]: Executing per-day jobs
. 2023.06.29 18:57:29 - SSL > LOG6[per-day]: Per-day jobs completed in 0 seconds
. 2023.06.29 18:57:29 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:45490
. 2023.06.29 18:57:29 - SSL > LOG6[0]: s_connect: connecting 146.70.111.22:443
. 2023.06.29 18:57:30 - OpenVPN > OpenVPN 2.6.5 [git:makepkg/cbc9e0ce412e7b42+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Jun 13 2023
. 2023.06.29 18:57:30 - OpenVPN > library versions: OpenSSL 3.1.1 30 May 2023, LZO 2.10
. 2023.06.29 18:57:30 - OpenVPN > DCO version: 0.2.20230426
. 2023.06.29 18:57:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:7045
. 2023.06.29 18:57:30 - OpenVPN > Socket Buffers: R=[131072->131072] S=[16384->16384]
. 2023.06.29 18:57:30 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:7045
. 2023.06.29 18:57:30 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:7045
. 2023.06.29 18:57:30 - OpenVPN > TCPv4_CLIENT link local: (not bound)
. 2023.06.29 18:57:30 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:7045
. 2023.06.29 18:57:30 - SSL > LOG5[0]: s_connect: connected 146.70.111.22:443
. 2023.06.29 18:57:30 - SSL > LOG5[0]: Service [openvpn] connected remote server from 10.21.10.1:51740
. 2023.06.29 18:57:30 - SSL > LOG6[0]: SNI: sending servername: 146.70.111.22
. 2023.06.29 18:57:30 - SSL > LOG6[0]: Peer certificate not required
. 2023.06.29 18:57:30 - SSL > LOG6[0]: Certificate verification disabled
. 2023.06.29 18:57:30 - SSL > LOG6[0]: Client certificate not requested
. 2023.06.29 18:57:30 - SSL > LOG6[0]: Session id: C5B8857376951B288E944C4E28DE68AD7F2E66B8D31EB097143A3525968C1FF2
. 2023.06.29 18:57:30 - SSL > LOG6[0]: TLS connected: new session negotiated
. 2023.06.29 18:57:30 - SSL > LOG6[0]: TLSv1.2 ciphersuite: ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2023.06.29 18:57:30 - SSL > LOG6[0]: Peer temporary key: ECDH, P-256, 256 bits
. 2023.06.29 18:57:30 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:7045, sid=3930e0f1 3c7a13c8
. 2023.06.29 18:57:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.06.29 18:57:30 - OpenVPN > VERIFY KU OK
. 2023.06.29 18:57:30 - OpenVPN > Validating certificate extended key usage
. 2023.06.29 18:57:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.06.29 18:57:30 - OpenVPN > VERIFY EKU OK
. 2023.06.29 18:57:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Marsic, emailAddress=info@airvpn.org
. 2023.06.29 18:57:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.06.29 18:57:30 - OpenVPN > [Marsic] Peer Connection Initiated with [AF_INET]127.0.0.1:7045
. 2023.06.29 18:57:30 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
. 2023.06.29 18:57:30 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted
. 2023.06.29 18:57:31 - OpenVPN > SENT CONTROL [Marsic]: 'PUSH_REQUEST' (status=1)
. 2023.06.29 18:57:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.30.27.1,dhcp-option DNS6 fde6:7a:7d20:1a1b::1,tun-ipv6,route-gateway 10.30.27.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1a1b::1001/64 fde6:7a:7d20:1a1b::1,ifconfig 10.30.27.3 255.255.255.0,peer-id 0,cipher CHACHA20-POLY1305,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500'
. 2023.06.29 18:57:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2023.06.29 18:57:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.30.27.1'
. 2023.06.29 18:57:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1a1b::1'
. 2023.06.29 18:57:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2023.06.29 18:57:31 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2023.06.29 18:57:31 - OpenVPN > OPTIONS IMPORT: tun-mtu set to 1500
. 2023.06.29 18:57:31 - OpenVPN > net_iface_new: add tun0 type ovpn-dco
. 2023.06.29 18:57:31 - OpenVPN > DCO device tun0 opened
. 2023.06.29 18:57:31 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2023.06.29 18:57:31 - OpenVPN > net_iface_up: set tun0 up
. 2023.06.29 18:57:31 - OpenVPN > net_addr_v4_add: 10.30.27.3/24 dev tun0
. 2023.06.29 18:57:31 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2023.06.29 18:57:31 - OpenVPN > net_iface_up: set tun0 up
. 2023.06.29 18:57:31 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:1a1b::1001/64 dev tun0
. 2023.06.29 18:57:31 - OpenVPN > Initialization Sequence Completed
. 2023.06.29 18:57:31 - OpenVPN > Data Channel: cipher 'CHACHA20-POLY1305', peer-id: 0
. 2023.06.29 18:57:31 - DNS of the system switched to VPN DNS - via /etc/resolv.conf)
. 2023.06.29 18:57:31 - Routes, add 0.0.0.0/1 for interface "tun0".
. 2023.06.29 18:57:31 - Routes, add 128.0.0.0/1 for interface "tun0".
. 2023.06.29 18:57:31 - Routes, add ::/1 for interface "tun0".
. 2023.06.29 18:57:31 - Routes, add 8000::/1 for interface "tun0".
. 2023.06.29 18:57:31 - Routes, add 146.70.111.19/32 for interface "tun0".
. 2023.06.29 18:57:32 - Routes, add 2001:ac8:7d:41:1573:e655:4653:403a/128 for interface "tun0".
. 2023.06.29 18:57:32 - Flushing DNS
. 2023.06.29 18:57:32 - Flush DNS - nscd
I 2023.06.29 18:57:32 - Checking route IPv4
I 2023.06.29 18:57:32 - Checking route IPv6
I 2023.06.29 18:57:33 - Checking DNS
! 2023.06.29 18:57:34 - Connected.
. 2023.06.29 18:57:34 - OpenVPN > Timers: ping 10, ping-restart 60
. 2023.06.29 18:57:34 - OpenVPN > Protocol options: protocol-flags cc-exit tls-ekm dyn-tls-crypt
. 2023.06.29 18:59:24 - Collect information about AirVPN ..., 1° try failed (Fetch url error:Timeout was reached)
. 2023.06.29 18:59:25 - Collect information about AirVPN completed
. 2023.06.29 19:27:21 - Collect information about AirVPN completed
. 2023.06.29 19:57:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.06.29 19:57:18 - OpenVPN > VERIFY KU OK
. 2023.06.29 19:57:18 - OpenVPN > Validating certificate extended key usage
. 2023.06.29 19:57:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.06.29 19:57:18 - OpenVPN > VERIFY EKU OK
. 2023.06.29 19:57:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Marsic, emailAddress=info@airvpn.org
. 2023.06.29 19:57:18 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.06.29 19:57:30 - Collect information about AirVPN completed
. 2023.06.29 20:27:36 - Collect information about AirVPN completed
. 2023.06.29 20:57:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.06.29 20:57:04 - OpenVPN > VERIFY KU OK
. 2023.06.29 20:57:04 - OpenVPN > Validating certificate extended key usage
. 2023.06.29 20:57:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.06.29 20:57:04 - OpenVPN > VERIFY EKU OK
. 2023.06.29 20:57:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Marsic, emailAddress=info@airvpn.org
. 2023.06.29 20:57:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.06.29 20:57:44 - Collect information about AirVPN completed
. 2023.06.29 21:27:52 - Collect information about AirVPN completed
. 2023.06.29 21:56:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.06.29 21:56:51 - OpenVPN > VERIFY KU OK
. 2023.06.29 21:56:51 - OpenVPN > Validating certificate extended key usage
. 2023.06.29 21:56:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.06.29 21:56:51 - OpenVPN > VERIFY EKU OK
. 2023.06.29 21:56:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Marsic, emailAddress=info@airvpn.org
. 2023.06.29 21:56:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.06.29 21:58:00 - Collect information about AirVPN completed
! 2023.06.29 22:09:56 - Disconnecting
. 2023.06.29 22:09:56 - Sending soft termination signal
. 2023.06.29 22:09:57 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4)
. 2023.06.29 22:09:57 - OpenVPN > Closing DCO interface
. 2023.06.29 22:09:57 - OpenVPN > net_addr_v4_del: 10.30.27.3 dev tun0
. 2023.06.29 22:09:57 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:1a1b::1001/64 dev tun0
. 2023.06.29 22:09:57 - OpenVPN > net_iface_del: delete tun0
. 2023.06.29 22:10:16 - Sending hard termination signal
. 2023.06.29 22:10:36 - Sending hard termination signal
. 2023.06.29 22:10:56 - Sending hard termination signal

Share this post


Link to post

M1 Mac user (latest Monterey) here:
When I use the Eddie app from the .dmg, my Mac tells me: "This version of Eddie is damaged. You must move it to the trash." (I had this problem with 2.22 also)
When I use Eddie from the zip file ("portable"), everything works fine.

Maybe it has something to do with the xattr "com.apple.quarantine"? The Mac help text said something about "The files of the app may have been changed after they were signed".

 

Share this post


Link to post

FYI, 2.33.1 doesn't download Linux Debian/Ubuntu version on a 32 bit machine (clicking download button only opens blank new tab).  64 bit version does download but haven't tried to install on a 32 bit machine as I assume it is not compatible.

2.33.1 working normally on a Win10 64 bit machine.

Share this post


Link to post

This is a really specific issue, but I'm experiencing extremely high network latency while playing Team Fortress 2, but only on Valve's casual matchmaking mode. Community operated servers work fine. Similarly, Counter-Strike: Global Offensive will say "Failed to reach any official servers" upon queuing for any game. I'm using WireGuard with Eddie 2.23.1. Neither of these issues occur under OpenVPN or Eddie 2.22.2. I haven't changed any settings between versions.
What could be causing this? Could someone with a Linux machine also test this? Both games are free on Steam.

Share this post


Link to post
On 6/30/2023 at 4:18 AM, debu said:

FYI, 2.33.1 doesn't download Linux Debian/Ubuntu version on a 32 bit machine (clicking download button only opens blank new tab).  64 bit version does download but haven't tried to install on a 32 bit machine as I assume it is not compatible.

2.33.1 working normally on a Win10 64 bit machine.


Thanks for the report, linux 32bit builds missing for an issue with deploy, now fixed.

Share this post


Link to post
Posted ... (edited)
On 6/27/2023 at 6:51 PM, Clodo said:

Issue identified, please wait, we will release a new version as soon as possible. Thanks.

New version 2.23.1 with the hotfix released. My apologies for the issue. 

Thanks for the fix. Everything is working fine with this version.

I just have an exact same bug as previous versions:
If I activate "Don't ask elevation every run" and after running Eddie, I click on "Exit" or the right top X, Eddie will be stuck at the end of the exit process.
I can kill it with xKill but the remaining process is impossible to kill with a kill -9, it comes back after a few seconds and internet is not working anymore.
Rebooting is the only option to have internet again.

So for now, I don't activate the elevation option. It is not a big deal, but I have the same bug since several Eddie versions on Linux Mint and Debian.
  Edited ... by neoragez

Share this post


Link to post
On 6/29/2023 at 2:18 PM, Staff said:
Similarly, Eddie 2.22.2 will never reach a Release status, and not even a Release Candidate status: each bug fix is implemented not in 2.22.2 but in a new version. You can see it as a customized SemVer (semantic versioning), where: every fix is condensed in the "post release cycle", the scheme is more similar to major.minor.patch than to major.minor.maintenance.build and a whole minor could be thrown completely away without reaching a stable phase (exactly the 2.22 you mention).

https://en.wikipedia.org/wiki/Software_versioning

Thanks. I got it, good to know. Even though I am only part of small development teams for indie games and apps, I see that the canonical software versioning (to understand, the same one you follow for the Suite and for Eddie Android) is vastly superior and proven by decades of practice. Instead, this one adopted for Eddie that you describe, it seems to me, certainly gives rise to ambiguity and uncertainty on every "release" (quotation marks obligatory...). Thank you for the comprehensive explanation.

If I have time I will gladly test more carefully Eddie 2.23.maybe_we_trash_it_maybe_not and report back. At the moment I can say that the bug fix described in the changelog, fixing "nftables exception if UFW is in use when Network Lock is disabled", is effective in Ubuntu systems with ufw running. 👍 However in Linux I just migrated to the Suite, due to the more serious and appropriate development cycle and the robust architectural choices, and I don't think I will go back (hopefully the Suite will manage Wireguard soon). But in Windows I might keep using Eddie and will gladly test and report.

Share this post


Link to post

Ubuntu 22.0 user here:

Like others as with 2.22.2 with 2.23.1 if I use Wireguard than Eddie many times is unable to disconnect or exit at all and only a system reboot works. Other times when running after a few days, Eddie dispatches soo many messages to the notification area that the entire desktop becomes freezed with exception of open applications. ( It is the shell that crashes due too so many messages that Eddie keeps sending when in an error state. )

Today I upgraded to latest of 01-07-23 and just starting Eddie and trying closing it made everything freeze again, Eddie does not want to exit. Had to force reboot again.

( From an ALT-F4 shell, so no hard reboot, but forcing from not the desktop but a cli.)

I observed this happening usually with Wireguard only, so it might be kernel related since Wireguard is inside the Kernel? ( THIS IS A QUESTION. )

If Wireguard is inside the kernel and it causes these errors I should use OpenVPN instead.

Share this post


Link to post
Posted ... (edited)

The ping statistics in Eddie are usually way too pessimistic. Eddie pings all the endpoints almost simultaneously, so the reply packets arrive also around the same time, which can be verified by WireShark. However, if the bandwidth of the internet connection is not great or it suffers from buffer bloat, the ping times are 2x-3x larger than usual (that is when an endpoint IP address is pinged from a terminal).

I wish the developers would change the ping mechanics by delaying the time between the packets, or at least make an option for that. Because of the current implementation, the "best server" from Eddie's viewpoint can be located in another continent because of the corrupted ping statistics.

screenshot.png

Edited ... by rohko
Added the screenshot

Share this post


Link to post

Hi,
I raised a ticket on the support forum about an issue I am having with 2.21.8 regarding Eddie-Ui not starting in a Lubuntu VM running under Hyper-V. Support suggested that I try the 2.23.1 beta and see if that worked and to post the result here if I see the same issue. When I tried the beta I see the same problem and so these are the details:

I am runnie eddie on 2 separate Lubuntu Linux VMs with different hypervisors running under Windows 11 Pro. One works, one doesnt. The environments here are:
  1. Lubuntu 22.04.2 under VMPlayer, eddie-ui is fine and VPN, including port forwarding, just works.
  2. Lubuntu 22.04.2 under Hyper-V, eddie-ui wont start and I get the 'cannot initialize UI. Probaly a DISPLAY issue, ensure you are not running as root. Error:A null reference or invalid value was found [GDI+ status: InvalidParameter]"
Unfortunately, I cannot run VMWare in the office so need to find a way with Hyper-V. My investigation on the Lubuntu under Hyper-V so far:
- The user in both cases is called 'download' ie not the root user.
- Hyper-V Integration services are set
- The DISPLAY variable is set to DISPLAY=':0' and all the other Lubuntu app/tool UIs work just fine.
 

Share this post


Link to post

Asked to post this bug report from AirVPNs forum post at


Running on the latest version of Debian Bookworm, with AirVPNs EddieVPN testing version 2.23.1 installed either by the .deb package or with apt
package manager results with a successful installation of the software though does not connect to any VPN servers with the error lines stating to
to contact Eddies support team in the log file with the lines:


Elevated: Command:route

E 2023.07.11 02:56:15 - Elevated: Exec, path:'/usr/sbin/ip', arg:'-4', arg:'route', arg:'add', arg:'79.142.76.246/32', arg:'via', arg:'XXX.219.18.171', arg:'dev', arg:'enp1s0', arg:'metric', arg:'0', exit:2, err:'Error: Nexthop has invalid gateway.'

E 2023.07.11 02:56:15 - Fatal error occured, please contact Eddie support: Routes, add 79.142.76.246/32 for interface "enp1s0" failed: Exception: exit:2; err:Error: Nexthop has invalid gateway. - at Eddie.Core.Platform.Route (Eddie.Core.Json jRoute, System.String action) [0x001f3] in <fdd0d5aab26241e6ba3f7fd4d6f2e029>:0

Any way around this with a fix? Will be watchin.. 🕶️ 🙂

Share this post


Link to post

Apologies if this has been reported somewhere already. Eddie 2.23.1 (macOS 13.4) got stuck today when connecting and popped the error message as seen in the screenshot: "Object reference not set to an instance of an object". Had to force quit Eddie and it worked with the next attempt. Nothing I can reproduce, but maybe this is useful for improving something in the application.

SCR-20230713-iqbh.jpeg

Share this post


Link to post

For this Beta version I recommend using OpenVPN at Linux only. I still have a question, is Wireguard kernel exclusive? If so, then it could be the kernel i use if i try to use WireGuard. With OpenVPN no disconnects, with WireGuard so many disconnects without explanation.

I thought about replacing a network cable, but without WireGuard it does work, and negotiation does say 1 GigaBit full Duplex.

I remember before this Beta i had a version without these problems. but as you understand the kernel in those times were upgraded, i upgraded to this Beta version too.

With OpenVPN it is stable, and I can try hummingbird, but am feeling like a Windows user. Am at Ubuntu 22.04.

Am tired of those Windows like moments.

😥

So i go for OpenVPN with this Beta since that is what fully works without problems at 1 GigaBit full Duplex. Do Not understand why Wireguard causes problems.

Am so tired. Really tired.

OpenVPN it will be.

Share this post


Link to post
On 7/14/2023 at 6:39 AM, jylh123 said:
I use verson 2.23.1 in windows 11 and can't load as the picture below

屏幕截图 2023-07-14 123352.png


I recommend uninstalling everything, and look in your windows profile folder for old EDDIE config files. It is a directory in 'local' rename it EDDIE.OLD or something.

Then reboot.

Make sure you have the latest version downloaded first. Since you'll start all over. I had to do this on Linux, but principle is same.

With Windows however I recommend you also first uninstall from right clicking start menu button bottom left then devices and remove all tunnel devices only. And after a reboot then reinstall again.

If that doesn't work get the latest OpenVPN Windows device driver from the official OpenVPN website and install it. That is the driver responsible at Windows for creating a tunnel.

That is how it worked with Windows many years ago, Windows does not change much. Though locations can become difficult to find because Microsoft Windows design overhaul.

Good luck.
 

Share this post


Link to post
On 6/26/2023 at 4:23 PM, neoragez said:

Hello,

The new version is unstable for me, many websites don't load anymore or take ages to load (I did try to uninstall/reinstall package and reset config files).
Can you make available the previous 2.22.2 version to download again to allow us to rollback ?

Regards,
 


I ran into this also, due to the experimental apparently being in kali repo? I suggest folks remove and download stable form the downloads page if you got here via troubleshooting like I did.
I was kind of hoping for a linux native gui at some point though - and not the loose change that is the "suite" of cli with poor doc.. 

@airvpn team: looks like something is gonzo in the new netlock setup but I don't have enough data to help out, sorry.

Share this post


Link to post
On 7/8/2023 at 8:20 AM, rohko said:

The ping statistics in Eddie are usually way too pessimistic. Eddie pings all the endpoints almost simultaneously, so the reply packets arrive also around the same time, which can be verified by WireShark. However, if the bandwidth of the internet connection is not great or it suffers from buffer bloat, the ping times are 2x-3x larger than usual (that is when an endpoint IP address is pinged from a terminal).


I, too, see this problem, you can see why it happens from here:
https://github.com/AirVPN/Eddie/blob/master/src/Lib.Core/PingManager.cs

I'm afraid that the whole design is wrong (I hope I am wrong but...). The ping values are biased by buffer bloat, ISP configuration, order of the "parallel" pings, and by how the threads are (not) managed, so it's the whole concept of how "parallel pings" are managed in Eddie that could be flawed. If you make a small list of favorite servers around your location the problem is still there but at least the order of the server is more or less correct. You prevent Eddie to connect to some server at the other end of the world. This option also helps if you set it to 1:
Quote

pinger.jobs - Maximum parallel jobs/thread for pinging purpose. Default: 25

but I can't see it in the GUI. Maybe I miss it, maybe it's another option that's available only in command line mode and not from the GUI (it happens in Eddie :( ). The documentation discloses an awkward confusion between jobs and threads and maybe this part of code has been written by different persons without a proper overview. I think it should be extensively revised but it's not trivial at all how to solve it from the current code for me, I'm sorry I think I can't help here.

Share this post


Link to post

Hello again,
I've noticed on three occasions upon switching servers Eddie hangs
for three or five seconds before connecting to the new server.

Share this post


Link to post

Just want to let everyone who saw my previous posts know that my problem with unkillable openvpn process is magically solved.

If someone will encounter same issue in the future, those steps might help.

Way 1:
Perform full system upgrade, install latest available Arch kernel, reboot into it & see if it works.

Way 2:
0) Remove any cache or source files for related AUR packages, if you have any.
1) Uninstall "openvpn-dco-dkms" AUR package completely, rebuild kernel's initramfs image, reboot.
2) Perform full system upgrade, install latest available Arch kernel, reboot into it.
3) Install "openvpn-dco-dkms" AUR package, rebuild kernel's initramfs image, reboot.
4) Rebuild "eddie-ui-git" AUR package and install as update over existing one, reboot.
5) Retest everything.

Since I followed Way 2, I cannot say for sure what exactly fixed this issue. Perhaps new Arch kernel version just works as expected, while previous ones didn't. So, you better start with Way 1 and see for yourself.
(at least) 6.4.3-zen1-2-zen Arch kernel works.

Looks like rebuilding Eddie again also fixed issue with very long checking authorization step on first connect after reboot, but to say for sure I need to test it more. This thing was in place for me through several different Eddie versions and clean rebuilds. Or maybe it's just my ISP forgot to press big red "block" button this time, who knows.

Another long-time problem, however, is still here: if I try to close Eddie immediately after disconnection from server & disabling network lock, it will hang. Though this will not interrupt shutdowns and can be killed with pkill.
But if I wait about 5-10 seconds after disconnection before closing Eddie, then it exits peacefully. My DE is LXQt, if it matters.

Share this post


Link to post

Hello,
Linux Mint 21 here.
I'm very happy with the new 2.23.1 version! It works perfectly for me (been testing it for 3-4 days now).
Some of the previous problems I had with 2.21 are gone, namely:
1. On start-up tries to connect, but never does. So I always had to Cancel and do it manually by picking a server to connect to.
2. After Sleep it would repeat the above sequence.
3. It often used to create two icons in the task bar - one on the right (active apps) and one in the middle.
4. It would always try to connect to a server in the Netherlands, by default, ignoring the fact that it is not closest to me and not the fastest connection.
All (and possibly more) of the above problems are now gone. Works fast and seamlessly.

Thanks!

Share this post


Link to post

As indicated here:The Enable NetLock button is not shown, but the Disable NetLock button is.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...