Jump to content
Not connected, Your IP: 216.73.216.108
willowvpn

airvpn push ipv6 on ipv4 only connection floods log

Recommended Posts

openvpn 2.6.14, remote random, router

I removed

push-peer-info
setenv UV_IPV6 yes
I added "4" to tcp, which log confirms
proto tcp4
airvpn keeps trying to push ipv6, but since router is strict ipv4 only
Linux can't add IPv6 to interface tun0
Exiting due to fatal error
this keeps going a few hundred times, random servers, until suddenly some server (seems variable) no longer tries to push ipv6 and connection gets established.

I tried also, to no avail
pull-filter ignore "ifconfig-ipv6"
pull-filter ignore "route-ipv6"

setenv UV_IPV6=no

setenv UV_IPV6 no
Which ovpn file or other setting would get rid of airvpn pushing ipv6?

Share this post


Link to post

Please add or change the directive verb 4, then post the complete log of such a failed connection attempt.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
17 hours ago, Tech Jedi Alex said:

Please add or change the directive verb 4, then post the complete log of such a failed connection attempt.

Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Note: --data-ciphers-fallback with cipher 'AES-256-CBC' disables data channel offload.
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: OpenVPN 2.6.14 aarch64-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] [DCO]
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: library versions: OpenSSL 3.0.18 30 Sep 2025, LZO 2.10
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: DCO version: N/A
Mon Dec 15 10:16:00 2025 daemon.warn openvpn(airvpn)[3559]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.90:443
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Attempting to establish TCP connection with [AF_INET]194.187.251.90:443
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TCP connection established with [AF_INET]194.187.251.90:443
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TCPv4_CLIENT link local: (not bound)
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TCPv4_CLIENT link remote: [AF_INET]194.187.251.90:443
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TLS: Initial packet from [AF_INET]194.187.251.90:443, sid=045ec4f4 d2c2a118
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: VERIFY KU OK
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Validating certificate extended key usage
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: VERIFY EKU OK
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Capricornus, emailAddress=info@airvpn.org
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: [Capricornus] Peer Connection Initiated with [AF_INET]194.187.251.90:443
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: TLS: tls_multi_process: initial untrusted session promoted to trusted
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: SENT CONTROL [Capricornus]: 'PUSH_REQUEST' (status=1)
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.12.177.1,dhcp-option DNS6 fde6:7a:7d20:8b1::1,tun-ipv6,route-gateway 10.12.177.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:8b1::1000/64 fde6:7a:7d20:8b1::1,ifconfig 10.12.177.2 255.255.255.0,peer-id 0,cipher CHACHA20-POLY1305,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500'
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: --ifconfig/up options modified
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: route options modified
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: route-related options modified
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: tun-mtu set to 1500
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_route_v4_best_gw query: dst 0.0.0.0
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_route_v4_best_gw result: via 192.168.8.8 dev wan
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: GDG6: remote_host_ipv6=n/a
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_route_v6_best_gw query: dst ::
Mon Dec 15 10:16:01 2025 daemon.warn openvpn(airvpn)[3559]: sitnl_send: rtnl: generic error (-101): Network unreachable
Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is enabled
Mon Dec 15 10:16:01 2025 daemon.notice netifd: Network device 'tun0' link is up
Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' has link connectivity
Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is setting up now
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: TUN/TAP device tun0 opened
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_iface_mtu_set: mtu 1500 for tun0
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_iface_up: set tun0 up
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_addr_v4_add: 10.12.177.2/24 dev tun0
Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is now up
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_iface_mtu_set: mtu 1500 for tun0
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_iface_up: set tun0 up
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_addr_v6_add: fde6:7a:7d20:8b1::1000/64 dev tun0
Mon Dec 15 10:16:01 2025 daemon.warn openvpn(airvpn)[3559]: sitnl_send: rtnl: generic error (-13): Permission denied
Mon Dec 15 10:16:01 2025 daemon.err openvpn(airvpn)[3559]: Linux can't add IPv6 to interface tun0
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: Exiting due to fatal error
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is now down
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Mon Dec 15 10:16:01 2025 user.notice firewall: Reloading firewall due to ifup of airvpn (tun0)
Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is disabled
Mon Dec 15 10:16:01 2025 daemon.notice netifd: Network device 'tun0' link is down
Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' has link connectivity loss

Share this post


Link to post

Somehow --verb 4 was not applied, it's still verbosity level 3. I would've expected a complete listing of all OpenVPN directives first, to see what OpenVPN actually applied. But no matter, I'm seeing that you didn't filter out redirect-gateway ipv6 and tun-ipv6.
But what's more alarming, OpenVPN does not print out that it actually ignored those pushed options. Somehow I doubt your manual changes in the config are applied at all, so can you please check on that first?


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
18 hours ago, Tech Jedi Alex said:

Somehow --verb 4 was not applied, it's still verbosity level 3. I would've expected a complete listing of all OpenVPN directives first, to see what OpenVPN actually applied. But no matter, I'm seeing that you didn't filter out redirect-gateway ipv6 and tun-ipv6.
But what's more alarming, OpenVPN does not print out that it actually ignored those pushed options. Somehow I doubt your manual changes in the config are applied at all, so can you please check on that first?

You got me confused :doh: Thanks for sticking with me on this.
Let's take one step at a time.
verb 4 I though meant remove "4" in proto tcp4. Where do I put this verb 4?

Share this post


Link to post
5 hours ago, chrisjones.unixmen said:

I have been having issues with AirVPN continually forcing IPv6 when I've done everything to disable and block IPv6 from my network. 


Hello!

Please follow this message to quickly resolve the issue:
https://airvpn.org/forums/topic/26548-linux-ip-6-addr-add-failed/?do=findComment&comment=72069

The OP problem might be different so your case should not be discussed here.

Kind regards
 

Share this post


Link to post

I included the suggested

pull-filter ignore "dhcp-option DNS6"
pull-filter ignore "tun-ipv6"
pull-filter ignore "ifconfig-ipv6"
and getting errors:
Wed Dec 17 11:42:04 2025 daemon.notice openvpn(airvpn)[2294]: WARNING: OpenVPN was configured to add an IPv6 route. However, no IPv6 has been configured for tun0, therefore the route installation may fail or may not work as expected.
Wed Dec 17 11:42:04 2025 daemon.notice openvpn(airvpn)[2294]: add_route_ipv6(::/3 -> :: metric -1) dev tun0
Wed Dec 17 11:42:04 2025 daemon.notice openvpn(airvpn)[2294]: net_route_v6_add: ::/3 via :: dev tun0 table 0 metric -1
Wed Dec 17 11:42:04 2025 daemon.warn openvpn(airvpn)[2294]: sitnl_send: rtnl: generic error (-13): Permission denied
Wed Dec 17 11:42:04 2025 daemon.warn openvpn(airvpn)[2294]: ERROR: Linux route add command failed
Wed Dec 17 11:42:04 2025 daemon.notice openvpn(airvpn)[2294]: add_route_ipv6(2000::/4 -> :: metric -1) dev tun0
Wed Dec 17 11:42:04 2025 daemon.notice openvpn(airvpn)[2294]: net_route_v6_add: 2000::/4 via :: dev tun0 table 0 metric -1
Wed Dec 17 11:42:04 2025 daemon.warn openvpn(airvpn)[2294]: sitnl_send: rtnl: generic error (-13): Permission denied
Wed Dec 17 11:42:04 2025 daemon.warn openvpn(airvpn)[2294]: ERROR: Linux route add command failed
Wed Dec 17 11:42:04 2025 daemon.notice openvpn(airvpn)[2294]: add_route_ipv6(3000::/4 -> :: metric -1) dev tun0
Wed Dec 17 11:42:04 2025 daemon.notice openvpn(airvpn)[2294]: net_route_v6_add: 3000::/4 via :: dev tun0 table 0 metric -1
Wed Dec 17 11:42:04 2025 daemon.warn openvpn(airvpn)[2294]: sitnl_send: rtnl: generic error (-13): Permission denied
Wed Dec 17 11:42:04 2025 daemon.warn openvpn(airvpn)[2294]: ERROR: Linux route add command failed
Wed Dec 17 11:42:04 2025 daemon.notice openvpn(airvpn)[2294]: add_route_ipv6(fc00::/7 -> :: metric -1) dev tun0
Wed Dec 17 11:42:04 2025 daemon.notice openvpn(airvpn)[2294]: net_route_v6_add: fc00::/7 via :: dev tun0 table 0 metric -1
Wed Dec 17 11:42:04 2025 daemon.warn openvpn(airvpn)[2294]: sitnl_send: rtnl: generic error (-13): Permission denied
Wed Dec 17 11:42:04 2025 daemon.warn openvpn(airvpn)[2294]: ERROR: Linux route add command failed
Wed Dec 17 11:42:04 2025 daemon.err procd: Got unexpected signal 1
 

Share this post


Link to post
@willowvpn

Hello!

Please try:
pull-filter ignore "ifconfig-ipv6"
pull-filter ignore "route-ipv6"
pull-filter ignore "redirect-gateway ipv6"
pull-filter ignore "dhcp-option DNS6"
pull-filter ignore "tun-ipv6"

Fixed the linked message as well (it was incomplete). If the problem persists send the whole log, do not cut it.

Kind regards

 

Share this post


Link to post

With those settings there are no more errors, tunnel establishes and is up and running, but now nothing is sent through the tunnel (tun). Not incoming, not outgoing. Log with the settings:

Wed Dec 17 12:50:55 2025 daemon.notice netifd: Interface 'wan' is now up
Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53
Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53
Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Wed Dec 17 12:50:55 2025 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Wed Dec 17 12:50:55 2025 user.notice firewall: Reloading firewall due to ifup of wan (wan)
Wed Dec 17 12:50:56 2025 daemon.warn openvpn(airvpn)[2294]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.180:443
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Attempting to establish TCP connection with [AF_INET]213.152.161.180:443
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: TCP connection established with [AF_INET]213.152.161.180:443
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: TCPv4_CLIENT link local: (not bound)
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: TCPv4_CLIENT link remote: [AF_INET]213.152.161.180:443
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: TLS: Initial packet from [AF_INET]213.152.161.180:443, sid=898596c8 4f0d98cc
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: VERIFY KU OK
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Validating certificate extended key usage
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: VERIFY EKU OK
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alchiba, emailAddress=info@airvpn.org
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: [Alchiba] Peer Connection Initiated with [AF_INET]213.152.161.180:443
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: TLS: tls_multi_process: initial untrusted session promoted to trusted
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: exiting on receipt of SIGTERM
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: started, version 2.90 cachesize 1000
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: DNS service limited to local subnets
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-nftset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq-dhcp[1]: DHCP, IP range 192.168.8.100 -- 192.168.8.249, lease time 12h
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 2 names
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.5.145.1,dhcp-option DNS6 fde6:7a:7d20:191::1,tun-ipv6,route-gateway 10.5.145.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:191::1000/64 fde6:7a:7d20:191::1,ifconfig 10.5.145.2 255.255.255.0,peer-id 1,cipher CHACHA20-POLY1305,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500'
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:191::1'
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Pushed option removed by filter: 'tun-ipv6'
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:191::1000/64 fde6:7a:7d20:191::1'
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: OPTIONS IMPORT: --ifconfig/up options modified
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: OPTIONS IMPORT: route-related options modified
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: OPTIONS IMPORT: tun-mtu set to 1500
Wed Dec 17 12:50:56 2025 daemon.notice netifd: Interface 'airvpn' is enabled
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: TUN/TAP device tun0 opened
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: net_iface_mtu_set: mtu 1500 for tun0
Wed Dec 17 12:50:56 2025 daemon.notice netifd: Network device 'tun0' link is up
Wed Dec 17 12:50:56 2025 daemon.notice netifd: Interface 'airvpn' has link connectivity
Wed Dec 17 12:50:56 2025 daemon.notice netifd: Interface 'airvpn' is setting up now
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: net_iface_up: set tun0 up
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: net_addr_v4_add: 10.5.145.2/24 dev tun0
Wed Dec 17 12:50:56 2025 daemon.notice netifd: Interface 'airvpn' is now up
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: /usr/libexec/openvpn-hotplug up airvpn tun0 1500 0 10.5.145.2 255.255.255.0 init
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Wed Dec 17 12:50:56 2025 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Initialization Sequence Completed
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Data Channel: cipher 'CHACHA20-POLY1305', peer-id: 1, compression: 'stub'
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Timers: ping 10, ping-restart 60
Wed Dec 17 12:50:56 2025 daemon.notice openvpn(airvpn)[2294]: Protocol options: protocol-flags cc-exit tls-ekm dyn-tls-crypt
Wed Dec 17 12:50:56 2025 user.notice firewall: Reloading firewall due to ifup of airvpn (tun0)

Share this post


Link to post
15 hours ago, willowvpn said:

With those settings there are no more errors, tunnel establishes and is up and running, but now nothing is sent through the tunnel (tun). Not incoming, not outgoing. Log with the settings:


Same issue here after adding the five pull-filter ignore lines. Here is the log:

Client Log:
20251217 22:48:50 W WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
20251217 22:48:50 W WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
20251217 22:48:50 Current Parameter Settings:
20251217 22:48:50 NOTE: --mute triggered...
20251217 22:48:50 246 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:48:50 I OpenVPN 2.6.6 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH/PKTINFO] [AEAD]
20251217 22:48:50 I library versions: OpenSSL 1.1.1v 1 Aug 2023 LZO 2.10
20251217 22:48:50 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
20251217 22:48:50 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20251217 22:48:50 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
20251217 22:48:50 NOTE: --mute triggered...
20251217 22:48:50 3 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:48:50 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
20251217 22:48:50 NOTE: --mute triggered...
20251217 22:48:50 1 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:48:50 I TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.134.6:443
20251217 22:48:50 Socket Buffers: R=[262144->262144] S=[262144->262144]
20251217 22:48:50 I UDPv4 link local: (not bound)
20251217 22:48:50 I UDPv4 link remote: [AF_INET]198.44.134.6:443
20251217 22:48:50 TLS: Initial packet from [AF_INET]198.44.134.6:443 sid=b3e62f16 8d488507
20251217 22:48:50 NOTE: --mute triggered...
20251217 22:48:51 7 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:48:51 I [Imai] Peer Connection Initiated with [AF_INET]198.44.134.6:443
20251217 22:48:51 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
20251217 22:48:51 NOTE: --mute triggered...
20251217 22:48:52 1 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:48:52 SENT CONTROL [Imai]: 'PUSH_REQUEST' (status=1)
20251217 22:48:52 NOTE: --mute triggered...
20251217 22:48:52 9 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:48:52 I TUN/TAP device tun1 opened
20251217 22:48:52 do_ifconfig ipv4=1 ipv6=0
20251217 22:48:52 I net_iface_mtu_set: mtu 1500 for tun1
20251217 22:48:52 I net_iface_up: set tun1 up
20251217 22:48:52 I net_addr_v4_add: 10.27.94.4/24 dev tun1
20251217 22:48:52 Data Channel MTU parms [ mss_fix:1341 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
20251217 22:48:52 Outgoing dynamic tls-crypt: Cipher 'AES-256-CTR' initialized with 256 bit key
20251217 22:48:52 NOTE: --mute triggered...
20251217 22:48:52 5 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:48:52 I Initialization Sequence Completed
20251217 22:48:52 Data Channel: cipher 'CHACHA20-POLY1305' peer-id: 0 compression: 'stub'
20251217 22:48:52 NOTE: --mute triggered...
20251217 22:49:00 2 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:49:00 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:39908
20251217 22:49:00 D MANAGEMENT: CMD 'state'
20251217 22:49:00 MANAGEMENT: Client disconnected
20251217 22:49:00 NOTE: --mute triggered...
20251217 22:49:00 1 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:49:00 D MANAGEMENT: CMD 'state'
20251217 22:49:00 MANAGEMENT: Client disconnected
20251217 22:49:00 NOTE: --mute triggered...
20251217 22:49:00 1 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:49:00 D MANAGEMENT: CMD 'state'
20251217 22:49:00 MANAGEMENT: Client disconnected
20251217 22:49:00 NOTE: --mute triggered...
20251217 22:49:00 1 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:49:00 D MANAGEMENT: CMD 'status 2'
20251217 22:49:00 MANAGEMENT: Client disconnected
20251217 22:49:00 NOTE: --mute triggered...
20251217 22:49:00 1 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:49:00 D MANAGEMENT: CMD 'log 500'
20251217 22:49:00 MANAGEMENT: Client disconnected
20251217 22:49:10 NOTE: --mute triggered...
20251217 22:49:10 1 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:49:10 D MANAGEMENT: CMD 'state'
20251217 22:49:10 MANAGEMENT: Client disconnected
20251217 22:49:10 NOTE: --mute triggered...
20251217 22:49:10 1 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:49:10 D MANAGEMENT: CMD 'state'
20251217 22:49:10 MANAGEMENT: Client disconnected
20251217 22:49:10 NOTE: --mute triggered...
20251217 22:49:10 1 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:49:10 D MANAGEMENT: CMD 'state'
20251217 22:49:10 MANAGEMENT: Client disconnected
20251217 22:49:10 NOTE: --mute triggered...
20251217 22:49:10 1 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:49:10 D MANAGEMENT: CMD 'status 2'
20251217 22:49:10 MANAGEMENT: Client disconnected
20251217 22:49:10 NOTE: --mute triggered...
20251217 22:49:10 1 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:49:10 D MANAGEMENT: CMD 'log 500'
20251217 22:49:10 MANAGEMENT: Client disconnected
20251217 22:49:22 NOTE: --mute triggered...
20251217 22:49:22 1 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:49:22 D MANAGEMENT: CMD 'state'
20251217 22:49:22 MANAGEMENT: Client disconnected
20251217 22:49:22 NOTE: --mute triggered...
20251217 22:49:22 1 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:49:22 D MANAGEMENT: CMD 'state'
20251217 22:49:22 MANAGEMENT: Client disconnected
20251217 22:49:22 NOTE: --mute triggered...
20251217 22:49:22 1 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:49:22 D MANAGEMENT: CMD 'state'
20251217 22:49:22 MANAGEMENT: Client disconnected
20251217 22:49:22 NOTE: --mute triggered...
20251217 22:49:22 1 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:49:22 D MANAGEMENT: CMD 'status 2'
20251217 22:49:22 MANAGEMENT: Client disconnected
20251217 22:49:22 NOTE: --mute triggered...
20251217 22:49:22 1 variation(s) on previous 3 message(s) suppressed by --mute
20251217 22:49:22 D MANAGEMENT: CMD 'log 500' 

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...