Jump to content
Not connected, Your IP: 3.145.10.80
ailurus fulgens

Eddie not connecting after Curl update.

Recommended Posts

One day ago I updated Linux Mint 21.1 to 21.2 and everything with Eddie was fine. I had an manager Curl uodate and Eddie cannot now connect. This has happened on three laptops and on one, as a test Curl was not updated. Eddie was fine. The message reads Restart in 4 or 5 seconds then switches to Latency tests and reloads the server list. I have had this issue before but cannot remember how to solve it. (Air vpn has been uninstalled and reinstalled) Help!

Share this post


Link to post

Hello and thank you for your choice!

 We will have Eddie's developer investigate the issue. In the meantime please try the following settings to solve the problem:

  • from Eddie's main window select "Preferences" > "Advanced"
  • uncheck "Check if the VPN tunnel works"
  • click "Save"
  • from Eddie's main window select "Preferences" > "DNS"
  • uncheck "Check Air VPN DNS"
  • click "Save"
  • from Eddie's main window enable "Network Lock"
  • try again connections to various servers

We're looking forward to hearing from you.
Kind regards
 

Share this post


Link to post
Posted ... (edited)

I'm having the same issue, but I'm on LM 21.1, there was a CURL update 7.81.0-1ubuntu1.11 that I installed and it stopped connecting.  I followed the instructions above and I'm able to connect again.

edit ... LM Update Manager just pushed a Curl update to 7.81.0-1ubuntu1.13, I reverted the settings from above to their original settings and it's working again.  Seems to have been issue with 1.11 that's been corrected with 1.13 update.

Edited ... by stx

Share this post


Link to post

Keeping in mind I'm on the updated 21.2, Tried the above and had the second Curl 7.81.0-1ubuntu 1.13 update but still the issue with connecting remains. Though I would not know how to reverse the Curl settings from 1.13 to 1.11 and would a new Curl update restore 1.13?

Share this post


Link to post

I now have two of my laptops working perfectly after the 1.13 curl update, without any settings change at all. Perfect. The laptop I initially did the Curl update on, where the problem started, is still not working. It still has the  same symptoms as before the 1.13 update.

Share this post


Link to post

Try doing a system update on the one that's not working ... also perhaps reinstall curl if it's not working after updating.

https://www.linuxcapable.com/how-to-install-curl-on-linux-mint/

Share this post


Link to post

I am having the same problem, using Ubuntu 22.04.2 LTS. I've unchecked "Check if the VPN tunnel works" and "Check Air VPN DNS" and I can connect, but it seems like these checks are preferable to have enabled.

Here is the log:

I 2023.07.21 08:20:55 - Session starting.
I 2023.07.21 08:20:55 - Checking authorization ...
! 2023.07.21 08:20:56 - Connecting to Indus (United States of America, Phoenix, Arizona)
. 2023.07.21 08:20:56 - Routes, add 193.37.254.29/32 for interface "enp0s31f6".
. 2023.07.21 08:20:56 - Routes, add 193.37.254.29/32 for interface "enp0s31f6", already exists.
. 2023.07.21 08:20:56 - OpenVPN > OpenVPN 2.5.5 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022
. 2023.07.21 08:20:56 - OpenVPN > library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
. 2023.07.21 08:20:56 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.07.21 08:20:56 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.07.21 08:20:56 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2023.07.21 08:20:56 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2023.07.21 08:20:56 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]193.37.254.29:443
. 2023.07.21 08:20:56 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2023.07.21 08:20:56 - OpenVPN > UDP link local: (not bound)
. 2023.07.21 08:20:56 - OpenVPN > UDP link remote: [AF_INET]193.37.254.29:443
. 2023.07.21 08:20:56 - OpenVPN > TLS: Initial packet from [AF_INET]193.37.254.29:443, sid=6d7f958d 39644e68
. 2023.07.21 08:20:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2023.07.21 08:20:56 - OpenVPN > VERIFY KU OK
. 2023.07.21 08:20:56 - OpenVPN > Validating certificate extended key usage
. 2023.07.21 08:20:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2023.07.21 08:20:56 - OpenVPN > VERIFY EKU OK
. 2023.07.21 08:20:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Indus, emailAddress=info@airvpn.org
. 2023.07.21 08:20:56 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512
. 2023.07.21 08:20:56 - OpenVPN > [Indus] Peer Connection Initiated with [AF_INET]193.37.254.29:443
. 2023.07.21 08:20:57 - OpenVPN > SENT CONTROL [Indus]: 'PUSH_REQUEST' (status=1)
. 2023.07.21 08:20:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.6.1,dhcp-option DNS6 fde6:7a:7d20:1c06::1,tun-ipv6,route-gateway 10.32.6.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1c06::1047/64 fde6:7a:7d20:1c06::1,ifconfig 10.32.6.73 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2023.07.21 08:20:57 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2023.07.21 08:20:57 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.32.6.1'
. 2023.07.21 08:20:57 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1c06::1'
. 2023.07.21 08:20:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2023.07.21 08:20:57 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2023.07.21 08:20:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2023.07.21 08:20:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2023.07.21 08:20:57 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2023.07.21 08:20:57 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2023.07.21 08:20:57 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2023.07.21 08:20:57 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2023.07.21 08:20:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.07.21 08:20:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2023.07.21 08:20:57 - OpenVPN > TUN/TAP device tun0 opened
. 2023.07.21 08:20:57 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2023.07.21 08:20:57 - OpenVPN > net_iface_up: set tun0 up
. 2023.07.21 08:20:57 - OpenVPN > net_addr_v4_add: 10.32.6.73/24 dev tun0
. 2023.07.21 08:20:57 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0
. 2023.07.21 08:20:57 - OpenVPN > net_iface_up: set tun0 up
. 2023.07.21 08:20:57 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:1c06::1047/64 dev tun0
. 2023.07.21 08:21:02 - OpenVPN > Initialization Sequence Completed
. 2023.07.21 08:21:02 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated)
. 2023.07.21 08:21:02 - Routes, add 0.0.0.0/1 for interface "tun0".
. 2023.07.21 08:21:03 - Routes, add 128.0.0.0/1 for interface "tun0".
. 2023.07.21 08:21:03 - Routes, add ::/1 for interface "tun0".
. 2023.07.21 08:21:03 - Routes, add 8000::/1 for interface "tun0".
. 2023.07.21 08:21:03 - Routes, add 193.37.254.27/32 for interface "tun0".
. 2023.07.21 08:21:03 - Routes, add 2a0d:5600:2:7:889f:45a2:b9fb:ec0c/128 for interface "tun0".
. 2023.07.21 08:21:03 - Flushing DNS
I 2023.07.21 08:21:03 - Checking route IPv4
. 2023.07.21 08:21:10 - Checking route (4° try)
. 2023.07.21 08:21:14 - Checking route (5° try)
E 2023.07.21 08:21:14 - Checking route IPv4 failed, last reason: curl: (60) SSL: no alternative certificate subject name matches target host name 'indus_exit.airservers.org'
E 2023.07.21 08:21:14 -     More details here: https://curl.se/docs/sslcerts.html
E 2023.07.21 08:21:14 -     curl failed to verify the legitimacy of the server and therefore could not
E 2023.07.21 08:21:14 -     establish a secure connection to it. To learn more about this situation and
E 2023.07.21 08:21:14 -     how to fix it, please visit the web page mentioned above.
! 2023.07.21 08:21:14 - Disconnecting
. 2023.07.21 08:21:14 - Sending soft termination signal
. 2023.07.21 08:21:14 - OpenVPN > event_wait : Interrupted system call (code=4)
. 2023.07.21 08:21:14 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2023.07.21 08:21:19 - OpenVPN > Closing TUN/TAP interface
. 2023.07.21 08:21:19 - OpenVPN > net_addr_v4_del: 10.32.6.73 dev tun0
. 2023.07.21 08:21:19 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:1c06::1047/64 dev tun0
. 2023.07.21 08:21:19 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2023.07.21 08:21:19 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists.
. 2023.07.21 08:21:19 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists.
. 2023.07.21 08:21:19 - Routes, delete ::/1 for interface "tun0", not exists.
. 2023.07.21 08:21:19 - Routes, delete 8000::/1 for interface "tun0", not exists.
. 2023.07.21 08:21:19 - Routes, delete 193.37.254.29/32 for interface "enp0s31f6".
. 2023.07.21 08:21:19 - Routes, delete 193.37.254.27/32 for interface "tun0", not exists.
. 2023.07.21 08:21:19 - Routes, delete 2a0d:5600:2:7:889f:45a2:b9fb:ec0c/128 for interface "tun0", not exists.
. 2023.07.21 08:21:20 - Routes, delete 193.37.254.29/32 for interface "enp0s31f6", not exists.
. 2023.07.21 08:21:20 - DNS of the system restored to original settings (Rename method)
. 2023.07.21 08:21:20 - Connection terminated.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...