willowvpn 0 Posted ... openvpn 2.6.14, remote random, router I removed push-peer-info setenv UV_IPV6 yes I added "4" to tcp, which log confirms proto tcp4 airvpn keeps trying to push ipv6, but since router is strict ipv4 only Linux can't add IPv6 to interface tun0 Exiting due to fatal error this keeps going a few hundred times, random servers, until suddenly some server (seems variable) no longer tries to push ipv6 and connection gets established. I tried also, to no avail pull-filter ignore "ifconfig-ipv6" pull-filter ignore "route-ipv6" setenv UV_IPV6=no setenv UV_IPV6 no Which ovpn file or other setting would get rid of airvpn pushing ipv6? Quote Share this post Link to post
Tech Jedi Alex 1515 Posted ... Please add or change the directive verb 4, then post the complete log of such a failed connection attempt. Quote Hide Tech Jedi Alex's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
willowvpn 0 Posted ... 17 hours ago, Tech Jedi Alex said: Please add or change the directive verb 4, then post the complete log of such a failed connection attempt. Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Note: --data-ciphers-fallback with cipher 'AES-256-CBC' disables data channel offload. Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: OpenVPN 2.6.14 aarch64-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] [DCO] Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: library versions: OpenSSL 3.0.18 30 Sep 2025, LZO 2.10 Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: DCO version: N/A Mon Dec 15 10:16:00 2025 daemon.warn openvpn(airvpn)[3559]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.90:443 Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Socket Buffers: R=[131072->131072] S=[16384->16384] Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Attempting to establish TCP connection with [AF_INET]194.187.251.90:443 Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TCP connection established with [AF_INET]194.187.251.90:443 Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TCPv4_CLIENT link local: (not bound) Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TCPv4_CLIENT link remote: [AF_INET]194.187.251.90:443 Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TLS: Initial packet from [AF_INET]194.187.251.90:443, sid=045ec4f4 d2c2a118 Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: VERIFY KU OK Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Validating certificate extended key usage Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: VERIFY EKU OK Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Capricornus, emailAddress=info@airvpn.org Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: [Capricornus] Peer Connection Initiated with [AF_INET]194.187.251.90:443 Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: TLS: tls_multi_process: initial untrusted session promoted to trusted Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: SENT CONTROL [Capricornus]: 'PUSH_REQUEST' (status=1) Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.12.177.1,dhcp-option DNS6 fde6:7a:7d20:8b1::1,tun-ipv6,route-gateway 10.12.177.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:8b1::1000/64 fde6:7a:7d20:8b1::1,ifconfig 10.12.177.2 255.255.255.0,peer-id 0,cipher CHACHA20-POLY1305,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: --ifconfig/up options modified Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: route options modified Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: route-related options modified Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: tun-mtu set to 1500 Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_route_v4_best_gw query: dst 0.0.0.0 Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_route_v4_best_gw result: via 192.168.8.8 dev wan Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: GDG6: remote_host_ipv6=n/a Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_route_v6_best_gw query: dst :: Mon Dec 15 10:16:01 2025 daemon.warn openvpn(airvpn)[3559]: sitnl_send: rtnl: generic error (-101): Network unreachable Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is enabled Mon Dec 15 10:16:01 2025 daemon.notice netifd: Network device 'tun0' link is up Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' has link connectivity Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is setting up now Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: TUN/TAP device tun0 opened Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_iface_mtu_set: mtu 1500 for tun0 Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_iface_up: set tun0 up Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_addr_v4_add: 10.12.177.2/24 dev tun0 Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is now up Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_iface_mtu_set: mtu 1500 for tun0 Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_iface_up: set tun0 up Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_addr_v6_add: fde6:7a:7d20:8b1::1000/64 dev tun0 Mon Dec 15 10:16:01 2025 daemon.warn openvpn(airvpn)[3559]: sitnl_send: rtnl: generic error (-13): Permission denied Mon Dec 15 10:16:01 2025 daemon.err openvpn(airvpn)[3559]: Linux can't add IPv6 to interface tun0 Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: Exiting due to fatal error Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53 Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53 Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53 Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for lan Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is now down Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53 Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53 Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for lan Mon Dec 15 10:16:01 2025 user.notice firewall: Reloading firewall due to ifup of airvpn (tun0) Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is disabled Mon Dec 15 10:16:01 2025 daemon.notice netifd: Network device 'tun0' link is down Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' has link connectivity loss Quote Share this post Link to post
Tech Jedi Alex 1515 Posted ... Somehow --verb 4 was not applied, it's still verbosity level 3. I would've expected a complete listing of all OpenVPN directives first, to see what OpenVPN actually applied. But no matter, I'm seeing that you didn't filter out redirect-gateway ipv6 and tun-ipv6. But what's more alarming, OpenVPN does not print out that it actually ignored those pushed options. Somehow I doubt your manual changes in the config are applied at all, so can you please check on that first? Quote Hide Tech Jedi Alex's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
willowvpn 0 Posted ... 18 hours ago, Tech Jedi Alex said: Somehow --verb 4 was not applied, it's still verbosity level 3. I would've expected a complete listing of all OpenVPN directives first, to see what OpenVPN actually applied. But no matter, I'm seeing that you didn't filter out redirect-gateway ipv6 and tun-ipv6. But what's more alarming, OpenVPN does not print out that it actually ignored those pushed options. Somehow I doubt your manual changes in the config are applied at all, so can you please check on that first? You got me confused Thanks for sticking with me on this. Let's take one step at a time. verb 4 I though meant remove "4" in proto tcp4. Where do I put this verb 4? Quote Share this post Link to post
chrisjones.unixmen 0 Posted ... I have been having issues with AirVPN continually forcing IPv6 when I've done everything to disable and block IPv6 from my network. Quote Share this post Link to post
Staff 10394 Posted ... 5 hours ago, chrisjones.unixmen said: I have been having issues with AirVPN continually forcing IPv6 when I've done everything to disable and block IPv6 from my network. Hello! Please follow this message to quickly resolve the issue: https://airvpn.org/forums/topic/26548-linux-ip-6-addr-add-failed/?do=findComment&comment=72069 The OP problem might be different so your case should not be discussed here. Kind regards 1 willowvpn reacted to this Quote Share this post Link to post
willowvpn 0 Posted ... I included the suggested pull-filter ignore "dhcp-option DNS6" pull-filter ignore "tun-ipv6" pull-filter ignore "ifconfig-ipv6" and getting errors: Wed Dec 17 11:42:04 2025 daemon.notice openvpn(airvpn)[2294]: WARNING: OpenVPN was configured to add an IPv6 route. However, no IPv6 has been configured for tun0, therefore the route installation may fail or may not work as expected. Wed Dec 17 11:42:04 2025 daemon.notice openvpn(airvpn)[2294]: add_route_ipv6(::/3 -> :: metric -1) dev tun0 Wed Dec 17 11:42:04 2025 daemon.notice openvpn(airvpn)[2294]: net_route_v6_add: ::/3 via :: dev tun0 table 0 metric -1 Wed Dec 17 11:42:04 2025 daemon.warn openvpn(airvpn)[2294]: sitnl_send: rtnl: generic error (-13): Permission denied Wed Dec 17 11:42:04 2025 daemon.warn openvpn(airvpn)[2294]: ERROR: Linux route add command failed Wed Dec 17 11:42:04 2025 daemon.notice openvpn(airvpn)[2294]: add_route_ipv6(2000::/4 -> :: metric -1) dev tun0 Wed Dec 17 11:42:04 2025 daemon.notice openvpn(airvpn)[2294]: net_route_v6_add: 2000::/4 via :: dev tun0 table 0 metric -1 Wed Dec 17 11:42:04 2025 daemon.warn openvpn(airvpn)[2294]: sitnl_send: rtnl: generic error (-13): Permission denied Wed Dec 17 11:42:04 2025 daemon.warn openvpn(airvpn)[2294]: ERROR: Linux route add command failed Wed Dec 17 11:42:04 2025 daemon.notice openvpn(airvpn)[2294]: add_route_ipv6(3000::/4 -> :: metric -1) dev tun0 Wed Dec 17 11:42:04 2025 daemon.notice openvpn(airvpn)[2294]: net_route_v6_add: 3000::/4 via :: dev tun0 table 0 metric -1 Wed Dec 17 11:42:04 2025 daemon.warn openvpn(airvpn)[2294]: sitnl_send: rtnl: generic error (-13): Permission denied Wed Dec 17 11:42:04 2025 daemon.warn openvpn(airvpn)[2294]: ERROR: Linux route add command failed Wed Dec 17 11:42:04 2025 daemon.notice openvpn(airvpn)[2294]: add_route_ipv6(fc00::/7 -> :: metric -1) dev tun0 Wed Dec 17 11:42:04 2025 daemon.notice openvpn(airvpn)[2294]: net_route_v6_add: fc00::/7 via :: dev tun0 table 0 metric -1 Wed Dec 17 11:42:04 2025 daemon.warn openvpn(airvpn)[2294]: sitnl_send: rtnl: generic error (-13): Permission denied Wed Dec 17 11:42:04 2025 daemon.warn openvpn(airvpn)[2294]: ERROR: Linux route add command failed Wed Dec 17 11:42:04 2025 daemon.err procd: Got unexpected signal 1 Quote Share this post Link to post
Staff 10394 Posted ... @willowvpn Hello! Please try: pull-filter ignore "ifconfig-ipv6" pull-filter ignore "route-ipv6" pull-filter ignore "redirect-gateway ipv6" pull-filter ignore "dhcp-option DNS6" pull-filter ignore "tun-ipv6" Fixed the linked message as well (it was incomplete). If the problem persists send the whole log, do not cut it. Kind regards Quote Share this post Link to post
willowvpn 0 Posted ... With those settings there are no more errors, tunnel establishes and is up and running, but now nothing is sent through the tunnel (tun). Not incoming, not outgoing. Log with the settings: Wed Dec 17 12:50:55 2025 daemon.notice netifd: Interface 'wan' is now up Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53 Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53 Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: using only locally-known addresses for lan Wed Dec 17 12:50:55 2025 user.notice firewall: Reloading firewall due to ifup of wan (wan) Wed Dec 17 12:50:56 2025 daemon.warn openvpn(airvpn)[2294]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.180:443 Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Socket Buffers: R=[131072->131072] S=[16384->16384] Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Attempting to establish TCP connection with [AF_INET]213.152.161.180:443 Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: TCP connection established with [AF_INET]213.152.161.180:443 Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: TCPv4_CLIENT link local: (not bound) Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: TCPv4_CLIENT link remote: [AF_INET]213.152.161.180:443 Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: TLS: Initial packet from [AF_INET]213.152.161.180:443, sid=898596c8 4f0d98cc Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: VERIFY KU OK Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Validating certificate extended key usage Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: VERIFY EKU OK Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alchiba, emailAddress=info@airvpn.org Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: [Alchiba] Peer Connection Initiated with [AF_INET]213.152.161.180:443 Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: TLS: tls_multi_process: initial untrusted session promoted to trusted Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: exiting on receipt of SIGTERM Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: started, version 2.90 cachesize 1000 Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: DNS service limited to local subnets Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-nftset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus Wed Dec 17 12:50:56 2025 daemon.info dnsmasq-dhcp[1]: DHCP, IP range 192.168.8.100 -- 192.168.8.249, lease time 12h Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for lan Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53 Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53 Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for lan Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: read /etc/hosts - 12 names Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 2 names Wed Dec 17 12:50:56 2025 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.5.145.1,dhcp-option DNS6 fde6:7a:7d20:191::1,tun-ipv6,route-gateway 10.5.145.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:191::1000/64 fde6:7a:7d20:191::1,ifconfig 10.5.145.2 255.255.255.0,peer-id 1,cipher CHACHA20-POLY1305,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:191::1' Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Pushed option removed by filter: 'tun-ipv6' Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:191::1000/64 fde6:7a:7d20:191::1' Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: OPTIONS IMPORT: --ifconfig/up options modified Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: OPTIONS IMPORT: route-related options modified Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: OPTIONS IMPORT: tun-mtu set to 1500 Wed Dec 17 12:50:56 2025 daemon.notice netifd: Interface 'airvpn' is enabled Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: TUN/TAP device tun0 opened Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: net_iface_mtu_set: mtu 1500 for tun0 Wed Dec 17 12:50:56 2025 daemon.notice netifd: Network device 'tun0' link is up Wed Dec 17 12:50:56 2025 daemon.notice netifd: Interface 'airvpn' has link connectivity Wed Dec 17 12:50:56 2025 daemon.notice netifd: Interface 'airvpn' is setting up now Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: net_iface_up: set tun0 up Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: net_addr_v4_add: 10.5.145.2/24 dev tun0 Wed Dec 17 12:50:56 2025 daemon.notice netifd: Interface 'airvpn' is now up Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: /usr/libexec/openvpn-hotplug up airvpn tun0 1500 0 10.5.145.2 255.255.255.0 init Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53 Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53 Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53 Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for lan Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Initialization Sequence Completed Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Data Channel: cipher 'CHACHA20-POLY1305', peer-id: 1, compression: 'stub' Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Timers: ping 10, ping-restart 60 Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Protocol options: protocol-flags cc-exit tls-ekm dyn-tls-crypt Wed Dec 17 12:50:56 2025 user.notice firewall: Reloading firewall due to ifup of airvpn (tun0) Quote Share this post Link to post
shazzbutterisrad 0 Posted ... 15 hours ago, willowvpn said: With those settings there are no more errors, tunnel establishes and is up and running, but now nothing is sent through the tunnel (tun). Not incoming, not outgoing. Log with the settings: Same issue here after adding the five pull-filter ignore lines. Here is the log: Client Log: 20251217 22:48:50 W WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure 20251217 22:48:50 W WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible 20251217 22:48:50 Current Parameter Settings: 20251217 22:48:50 NOTE: --mute triggered... 20251217 22:48:50 246 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:48:50 I OpenVPN 2.6.6 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH/PKTINFO] [AEAD] 20251217 22:48:50 I library versions: OpenSSL 1.1.1v 1 Aug 2023 LZO 2.10 20251217 22:48:50 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16 20251217 22:48:50 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20251217 22:48:50 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key 20251217 22:48:50 NOTE: --mute triggered... 20251217 22:48:50 3 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:48:50 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] 20251217 22:48:50 NOTE: --mute triggered... 20251217 22:48:50 1 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:48:50 I TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.134.6:443 20251217 22:48:50 Socket Buffers: R=[262144->262144] S=[262144->262144] 20251217 22:48:50 I UDPv4 link local: (not bound) 20251217 22:48:50 I UDPv4 link remote: [AF_INET]198.44.134.6:443 20251217 22:48:50 TLS: Initial packet from [AF_INET]198.44.134.6:443 sid=b3e62f16 8d488507 20251217 22:48:50 NOTE: --mute triggered... 20251217 22:48:51 7 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:48:51 I [Imai] Peer Connection Initiated with [AF_INET]198.44.134.6:443 20251217 22:48:51 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 20251217 22:48:51 NOTE: --mute triggered... 20251217 22:48:52 1 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:48:52 SENT CONTROL [Imai]: 'PUSH_REQUEST' (status=1) 20251217 22:48:52 NOTE: --mute triggered... 20251217 22:48:52 9 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:48:52 I TUN/TAP device tun1 opened 20251217 22:48:52 do_ifconfig ipv4=1 ipv6=0 20251217 22:48:52 I net_iface_mtu_set: mtu 1500 for tun1 20251217 22:48:52 I net_iface_up: set tun1 up 20251217 22:48:52 I net_addr_v4_add: 10.27.94.4/24 dev tun1 20251217 22:48:52 Data Channel MTU parms [ mss_fix:1341 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 20251217 22:48:52 Outgoing dynamic tls-crypt: Cipher 'AES-256-CTR' initialized with 256 bit key 20251217 22:48:52 NOTE: --mute triggered... 20251217 22:48:52 5 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:48:52 I Initialization Sequence Completed 20251217 22:48:52 Data Channel: cipher 'CHACHA20-POLY1305' peer-id: 0 compression: 'stub' 20251217 22:48:52 NOTE: --mute triggered... 20251217 22:49:00 2 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:49:00 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:39908 20251217 22:49:00 D MANAGEMENT: CMD 'state' 20251217 22:49:00 MANAGEMENT: Client disconnected 20251217 22:49:00 NOTE: --mute triggered... 20251217 22:49:00 1 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:49:00 D MANAGEMENT: CMD 'state' 20251217 22:49:00 MANAGEMENT: Client disconnected 20251217 22:49:00 NOTE: --mute triggered... 20251217 22:49:00 1 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:49:00 D MANAGEMENT: CMD 'state' 20251217 22:49:00 MANAGEMENT: Client disconnected 20251217 22:49:00 NOTE: --mute triggered... 20251217 22:49:00 1 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:49:00 D MANAGEMENT: CMD 'status 2' 20251217 22:49:00 MANAGEMENT: Client disconnected 20251217 22:49:00 NOTE: --mute triggered... 20251217 22:49:00 1 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:49:00 D MANAGEMENT: CMD 'log 500' 20251217 22:49:00 MANAGEMENT: Client disconnected 20251217 22:49:10 NOTE: --mute triggered... 20251217 22:49:10 1 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:49:10 D MANAGEMENT: CMD 'state' 20251217 22:49:10 MANAGEMENT: Client disconnected 20251217 22:49:10 NOTE: --mute triggered... 20251217 22:49:10 1 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:49:10 D MANAGEMENT: CMD 'state' 20251217 22:49:10 MANAGEMENT: Client disconnected 20251217 22:49:10 NOTE: --mute triggered... 20251217 22:49:10 1 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:49:10 D MANAGEMENT: CMD 'state' 20251217 22:49:10 MANAGEMENT: Client disconnected 20251217 22:49:10 NOTE: --mute triggered... 20251217 22:49:10 1 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:49:10 D MANAGEMENT: CMD 'status 2' 20251217 22:49:10 MANAGEMENT: Client disconnected 20251217 22:49:10 NOTE: --mute triggered... 20251217 22:49:10 1 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:49:10 D MANAGEMENT: CMD 'log 500' 20251217 22:49:10 MANAGEMENT: Client disconnected 20251217 22:49:22 NOTE: --mute triggered... 20251217 22:49:22 1 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:49:22 D MANAGEMENT: CMD 'state' 20251217 22:49:22 MANAGEMENT: Client disconnected 20251217 22:49:22 NOTE: --mute triggered... 20251217 22:49:22 1 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:49:22 D MANAGEMENT: CMD 'state' 20251217 22:49:22 MANAGEMENT: Client disconnected 20251217 22:49:22 NOTE: --mute triggered... 20251217 22:49:22 1 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:49:22 D MANAGEMENT: CMD 'state' 20251217 22:49:22 MANAGEMENT: Client disconnected 20251217 22:49:22 NOTE: --mute triggered... 20251217 22:49:22 1 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:49:22 D MANAGEMENT: CMD 'status 2' 20251217 22:49:22 MANAGEMENT: Client disconnected 20251217 22:49:22 NOTE: --mute triggered... 20251217 22:49:22 1 variation(s) on previous 3 message(s) suppressed by --mute 20251217 22:49:22 D MANAGEMENT: CMD 'log 500' Quote Share this post Link to post