Jump to content
Not connected, Your IP: 216.73.216.21
willowvpn

airvpn push ipv6 on ipv4 only connection floods log

Recommended Posts

openvpn 2.6.14, remote random, router

I removed

push-peer-info
setenv UV_IPV6 yes
I added "4" to tcp, which log confirms
proto tcp4
airvpn keeps trying to push ipv6, but since router is strict ipv4 only
Linux can't add IPv6 to interface tun0
Exiting due to fatal error
this keeps going a few hundred times, random servers, until suddenly some server (seems variable) no longer tries to push ipv6 and connection gets established.

I tried also, to no avail
pull-filter ignore "ifconfig-ipv6"
pull-filter ignore "route-ipv6"

setenv UV_IPV6=no

setenv UV_IPV6 no
Which ovpn file or other setting would get rid of airvpn pushing ipv6?

Share this post


Link to post

Please add or change the directive verb 4, then post the complete log of such a failed connection attempt.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post
17 hours ago, Tech Jedi Alex said:

Please add or change the directive verb 4, then post the complete log of such a failed connection attempt.

Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Note: --data-ciphers-fallback with cipher 'AES-256-CBC' disables data channel offload.
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: OpenVPN 2.6.14 aarch64-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] [DCO]
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: library versions: OpenSSL 3.0.18 30 Sep 2025, LZO 2.10
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: DCO version: N/A
Mon Dec 15 10:16:00 2025 daemon.warn openvpn(airvpn)[3559]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.90:443
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Attempting to establish TCP connection with [AF_INET]194.187.251.90:443
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TCP connection established with [AF_INET]194.187.251.90:443
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TCPv4_CLIENT link local: (not bound)
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TCPv4_CLIENT link remote: [AF_INET]194.187.251.90:443
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TLS: Initial packet from [AF_INET]194.187.251.90:443, sid=045ec4f4 d2c2a118
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: VERIFY KU OK
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Validating certificate extended key usage
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: VERIFY EKU OK
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Capricornus, emailAddress=info@airvpn.org
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: [Capricornus] Peer Connection Initiated with [AF_INET]194.187.251.90:443
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: TLS: tls_multi_process: initial untrusted session promoted to trusted
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: SENT CONTROL [Capricornus]: 'PUSH_REQUEST' (status=1)
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.12.177.1,dhcp-option DNS6 fde6:7a:7d20:8b1::1,tun-ipv6,route-gateway 10.12.177.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:8b1::1000/64 fde6:7a:7d20:8b1::1,ifconfig 10.12.177.2 255.255.255.0,peer-id 0,cipher CHACHA20-POLY1305,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500'
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: --ifconfig/up options modified
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: route options modified
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: route-related options modified
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: tun-mtu set to 1500
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_route_v4_best_gw query: dst 0.0.0.0
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_route_v4_best_gw result: via 192.168.8.8 dev wan
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: GDG6: remote_host_ipv6=n/a
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_route_v6_best_gw query: dst ::
Mon Dec 15 10:16:01 2025 daemon.warn openvpn(airvpn)[3559]: sitnl_send: rtnl: generic error (-101): Network unreachable
Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is enabled
Mon Dec 15 10:16:01 2025 daemon.notice netifd: Network device 'tun0' link is up
Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' has link connectivity
Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is setting up now
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: TUN/TAP device tun0 opened
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_iface_mtu_set: mtu 1500 for tun0
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_iface_up: set tun0 up
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_addr_v4_add: 10.12.177.2/24 dev tun0
Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is now up
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_iface_mtu_set: mtu 1500 for tun0
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_iface_up: set tun0 up
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_addr_v6_add: fde6:7a:7d20:8b1::1000/64 dev tun0
Mon Dec 15 10:16:01 2025 daemon.warn openvpn(airvpn)[3559]: sitnl_send: rtnl: generic error (-13): Permission denied
Mon Dec 15 10:16:01 2025 daemon.err openvpn(airvpn)[3559]: Linux can't add IPv6 to interface tun0
Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: Exiting due to fatal error
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is now down
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Mon Dec 15 10:16:01 2025 user.notice firewall: Reloading firewall due to ifup of airvpn (tun0)
Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is disabled
Mon Dec 15 10:16:01 2025 daemon.notice netifd: Network device 'tun0' link is down
Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' has link connectivity loss

Share this post


Link to post

Somehow --verb 4 was not applied, it's still verbosity level 3. I would've expected a complete listing of all OpenVPN directives first, to see what OpenVPN actually applied. But no matter, I'm seeing that you didn't filter out redirect-gateway ipv6 and tun-ipv6.
But what's more alarming, OpenVPN does not print out that it actually ignored those pushed options. Somehow I doubt your manual changes in the config are applied at all, so can you please check on that first?


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...