Leaderboard
Popular Content
Showing content with the highest reputation on 07/01/23 in Posts
-
2 points
After Mullvad, IVPN is now also phasing out port forwarding
–Phase– and one other reacted to Quallian for a post in a topic
This is where AirVPN's superiority becomes overwhelming. From single port randomly assigned per-session to inability to selectively link ports to devices and keys and other missing options (such as remapping), the other services are now lagging fatally behind airvpn. -
2 points@Undated8198 Hello, we have no plans to remove port forwarding, quite the contrary: we are currently deploying resources to delay port exhaustion and find alternative, but comfortable, procedures to keep offering this service in anticipation of port exhaustion. As you can see we already limited to new customers the amount of bookable ports, in order to preserve advertised features to those who are already our customers. We are committed to avoid retro-active modifications of the service for pre-existing customers, when such modifications would be detrimental for the service or anyway betraying an advertised feature. Kind regards
-
1 pointHello! Please note that starting Saturday, June 24, all new accounts will have the ability to forward remotely a maximum of 5 inbound ports. The decision is intended to extend the time period after which we will run out of ports. The change is not retroactive: all current customers and all accounts created before Saturday, June 24 will have the usual, total ports availability. In addition, we will continue to investigate viable alternatives in anticipation of port exhaustion. Kind regards & datalove AirVPN Staff
-
1 pointAfter I read of Eddie versioning system 🤮 ... I decided to try the Suite on some Linux distributions (VM of Ubuntu, for example). Very nice suite, very nice architecture when used with Bluetit and Goldcrest. ✌️ Pity that WireGuard is not supported, hopefully you will implement it sooner than later. I have Bluetit configured to start and connect during the system startup and therefore I put my credentials in bluetit.rc. When I completely stop Bluetit daemon, the global system DNS settings are restored correctly, while the interface DNS settings are lost. Not an issue in my case (in the meantime I got rid of systemd-resolved so no more this problem exists) but probably something to fix, I just wanted to make you aware. Another problem, a more serious one perhaps, is that it's not possible for Bluetit or Hummingbird to restore resolv.conf when it's linked improperly because of an old systemd bug. I know that's a third party bug, but since systemd now plagues 80% of distributions, and this bug has infected Ubuntu and its derivatives, please consider to implement some workaround. I know that it would fix a problem created by third party stupidity, but if you wait for a fix from systemd and/or Ubuntu devs, you might well wait forever. The problem is that /etc/resolv.conf links to ../run/something - meaning that they declare a relative path for a symlink. To boldly go where no genius had gone before... and then the resolv.conf backup file moved/renamed by Hummingbird or Bluetit is at another directory tree depth. When the backup file should be restored, disaster strikes because of the relative path. P.S. Incredible documentation!!! 🌟🌟🌟🌟🌟
-
1 point
Eddie Desktop 2.23 beta released
Oblivion 2013 reacted to Clodo for a post in a topic
Thanks for the report, linux 32bit builds missing for an issue with deploy, now fixed. -
1 point
Eddie Desktop 2.23 beta released
Oblivion 2013 reacted to debu for a post in a topic
FYI, 2.33.1 doesn't download Linux Debian/Ubuntu version on a 32 bit machine (clicking download button only opens blank new tab). 64 bit version does download but haven't tried to install on a 32 bit machine as I assume it is not compatible. 2.33.1 working normally on a Win10 64 bit machine. -
1 point
Port forwarding availability change
andrut reacted to cccthats3cs for a post in a topic
With news of Mullvad and now IVPN removing port forwarding, can we have assurance from staff that AirVPN is not planning to remove port forwarding? -
1 point
Eddie Desktop 2.23 beta released
Oblivion 2013 reacted to 9zkHR9tCN7bo for a post in a topic
Just caught same issue while using Eddie UI! Obviously, it has nothing to do with AirVPN software, but this bug is not exclusive to plain CLI openvpn with DCO. Connection was active for almost 5 hours, then I tried to disconnect manually - and there is no way anymore to kill openvpn process. Here is full Eddie log: . 2023.06.29 13:39:19 - Eddie version: 2.23.1 / linux_x64, System: Linux, Name: Arch Linux, Version: Linux host 6.3.9-273-tkg-bore #1 SMP PREEMPT_DYNAMIC TKG Tue, 27 Jun 2023 14:29:57 +0000 x86_64 GNU/Linux, Mono/.Net: 6.12.0 (makepkg/73df89a73d2 Sat May 27 11:12:33 UTC 2023); Framework: v4.0.30319 . 2023.06.29 13:39:19 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2023.06.29 13:39:19 - Raise system privileges . 2023.06.29 13:39:24 - Collect network information . 2023.06.29 13:39:26 - Reading options from /home/user/.config/eddie/default.profile . 2023.06.29 13:39:27 - OpenVPN - Version: 2.6.5 - OpenSSL 3.1.1 30 May 2023, LZO 2.10 (/usr/bin/openvpn) . 2023.06.29 13:39:27 - SSH - Version: OpenSSH_9.3p1, OpenSSL 3.1.1 30 May 2023 (/usr/local/bin/ssh) . 2023.06.29 13:39:27 - SSL - Version: 5.69 (/usr/bin/stunnel) I 2023.06.29 13:39:28 - Ready . 2023.06.29 13:39:29 - Collect information about AirVPN completed ! 2023.06.29 13:39:30 - Activation of Network Lock - Linux nftables I 2023.06.29 13:40:43 - Session starting. I 2023.06.29 13:40:43 - Checking authorization ... . 2023.06.29 13:42:52 - Checking authorization ..., 1° try failed (Fetch url error:Timeout was reached) ! 2023.06.29 13:42:52 - Connecting to Marsic (Serbia, Belgrade) . 2023.06.29 13:42:52 - Routes, add 146.70.111.22/32 for interface "enp37s0". . 2023.06.29 13:42:52 - Routes, add 146.70.111.22/32 for interface "enp37s0", already exists. . 2023.06.29 13:42:52 - SSL > LOG6[ui]: Initializing inetd mode configuration . 2023.06.29 13:42:52 - SSL > LOG5[ui]: stunnel 5.69 on x86_64-pc-linux-gnu platform . 2023.06.29 13:42:52 - SSL > LOG5[ui]: Compiled with OpenSSL 3.0.8 7 Feb 2023 . 2023.06.29 13:42:52 - SSL > LOG5[ui]: Running with OpenSSL 3.1.1 30 May 2023 . 2023.06.29 13:42:52 - SSL > LOG5[ui]: Update OpenSSL shared libraries or rebuild stunnel . 2023.06.29 13:42:52 - SSL > LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6,SYSTEMD TLS:ENGINE,OCSP,PSK,SNI . 2023.06.29 13:42:52 - SSL > LOG6[ui]: Initializing inetd mode configuration . 2023.06.29 13:42:52 - SSL > LOG5[ui]: Reading configuration from file /home/user/.config/eddie/cf878902972cd9b954d9e4c71c4ee2c6bcaf212480df304f8bd1bb26134ab059.tmp.ssl . 2023.06.29 13:42:52 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.06.29 13:42:52 - SSL > LOG5[ui]: FIPS mode disabled . 2023.06.29 13:42:52 - SSL > LOG6[ui]: Compression disabled . 2023.06.29 13:42:52 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.06.29 13:42:52 - SSL > LOG6[ui]: stunnel default security level set: 2 . 2023.06.29 13:42:52 - SSL > LOG6[ui]: Session resumption enabled . 2023.06.29 13:42:52 - SSL > LOG6[ui]: Configured trusted server CA: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org . 2023.06.29 13:42:52 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.06.29 13:42:52 - SSL > LOG6[ui]: DH initialization skipped: client section . 2023.06.29 13:42:52 - SSL > LOG5[ui]: Configuration successful . 2023.06.29 13:42:52 - SSL > LOG6[ui]: Service [openvpn] (FD=9) bound to 127.0.0.1:51789 . 2023.06.29 13:42:52 - SSL > LOG6[ui]: Accepting new connections . 2023.06.29 13:42:52 - SSL > LOG6[per-day]: Executing per-day jobs . 2023.06.29 13:42:52 - SSL > LOG6[per-day]: Per-day jobs completed in 0 seconds . 2023.06.29 13:42:52 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:33074 . 2023.06.29 13:42:52 - SSL > LOG6[0]: s_connect: connecting 146.70.111.22:443 . 2023.06.29 13:42:53 - OpenVPN > OpenVPN 2.6.5 [git:makepkg/cbc9e0ce412e7b42+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Jun 13 2023 . 2023.06.29 13:42:53 - OpenVPN > library versions: OpenSSL 3.1.1 30 May 2023, LZO 2.10 . 2023.06.29 13:42:53 - OpenVPN > DCO version: 0.2.20230426 . 2023.06.29 13:42:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:51789 . 2023.06.29 13:42:53 - OpenVPN > Socket Buffers: R=[131072->131072] S=[16384->16384] . 2023.06.29 13:42:53 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:51789 . 2023.06.29 13:42:53 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:51789 . 2023.06.29 13:42:53 - OpenVPN > TCPv4_CLIENT link local: (not bound) . 2023.06.29 13:42:53 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:51789 . 2023.06.29 13:42:53 - SSL > LOG5[0]: s_connect: connected 146.70.111.22:443 . 2023.06.29 13:42:53 - SSL > LOG5[0]: Service [openvpn] connected remote server from 10.21.10.1:54742 . 2023.06.29 13:42:53 - SSL > LOG6[0]: SNI: sending servername: 146.70.111.22 . 2023.06.29 13:42:53 - SSL > LOG6[0]: Peer certificate not required . 2023.06.29 13:42:53 - SSL > LOG6[0]: Certificate verification disabled . 2023.06.29 13:42:53 - SSL > LOG6[0]: Client certificate not requested . 2023.06.29 13:42:53 - SSL > LOG6[0]: Session id: C405CB513C2771CBE6DD8DFFEFB0CBE505253AAA352E554BF2872602B8CDAEB8 . 2023.06.29 13:42:53 - SSL > LOG6[0]: TLS connected: new session negotiated . 2023.06.29 13:42:53 - SSL > LOG6[0]: TLSv1.2 ciphersuite: ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption) . 2023.06.29 13:42:53 - SSL > LOG6[0]: Peer temporary key: ECDH, P-256, 256 bits . 2023.06.29 13:42:53 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:51789, sid=0cb9eebd 018f9d25 . 2023.06.29 13:42:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.06.29 13:42:53 - OpenVPN > VERIFY KU OK . 2023.06.29 13:42:53 - OpenVPN > Validating certificate extended key usage . 2023.06.29 13:42:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.06.29 13:42:53 - OpenVPN > VERIFY EKU OK . 2023.06.29 13:42:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Marsic, emailAddress=info@airvpn.org . 2023.06.29 13:42:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.06.29 13:42:53 - OpenVPN > [Marsic] Peer Connection Initiated with [AF_INET]127.0.0.1:51789 . 2023.06.29 13:42:53 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.06.29 13:42:53 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.06.29 13:42:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.30.27.1,dhcp-option DNS6 fde6:7a:7d20:1a1b::1,tun-ipv6,route-gateway 10.30.27.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1a1b::1001/64 fde6:7a:7d20:1a1b::1,ifconfig 10.30.27.3 255.255.255.0,peer-id 0,cipher CHACHA20-POLY1305,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' . 2023.06.29 13:42:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.06.29 13:42:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.30.27.1' . 2023.06.29 13:42:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1a1b::1' . 2023.06.29 13:42:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.06.29 13:42:53 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.06.29 13:42:53 - OpenVPN > OPTIONS IMPORT: tun-mtu set to 1500 . 2023.06.29 13:42:53 - OpenVPN > net_iface_new: add tun0 type ovpn-dco . 2023.06.29 13:42:53 - OpenVPN > DCO device tun0 opened . 2023.06.29 13:42:54 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.06.29 13:42:54 - OpenVPN > net_iface_up: set tun0 up . 2023.06.29 13:42:54 - OpenVPN > net_addr_v4_add: 10.30.27.3/24 dev tun0 . 2023.06.29 13:42:54 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.06.29 13:42:54 - OpenVPN > net_iface_up: set tun0 up . 2023.06.29 13:42:54 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:1a1b::1001/64 dev tun0 . 2023.06.29 13:42:54 - OpenVPN > Initialization Sequence Completed . 2023.06.29 13:42:54 - OpenVPN > Data Channel: cipher 'CHACHA20-POLY1305', peer-id: 0 . 2023.06.29 13:42:54 - DNS of the system switched to VPN DNS - via /etc/resolv.conf) . 2023.06.29 13:42:54 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.06.29 13:42:54 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.06.29 13:42:54 - Routes, add ::/1 for interface "tun0". . 2023.06.29 13:42:54 - Routes, add 8000::/1 for interface "tun0". . 2023.06.29 13:42:54 - Routes, add 146.70.111.19/32 for interface "tun0". . 2023.06.29 13:42:54 - Routes, add 2001:ac8:7d:41:1573:e655:4653:403a/128 for interface "tun0". . 2023.06.29 13:42:54 - Flushing DNS . 2023.06.29 13:42:54 - Flush DNS - nscd I 2023.06.29 13:42:54 - Checking route IPv4 I 2023.06.29 13:42:55 - Checking route IPv6 I 2023.06.29 13:42:56 - Checking DNS ! 2023.06.29 13:42:57 - Connected. . 2023.06.29 13:42:57 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.06.29 13:42:57 - OpenVPN > Protocol options: protocol-flags cc-exit tls-ekm dyn-tls-crypt . 2023.06.29 14:09:35 - Collect information about AirVPN completed . 2023.06.29 14:39:39 - Collect information about AirVPN completed . 2023.06.29 14:40:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.06.29 14:40:20 - OpenVPN > VERIFY KU OK . 2023.06.29 14:40:20 - OpenVPN > Validating certificate extended key usage . 2023.06.29 14:40:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.06.29 14:40:20 - OpenVPN > VERIFY EKU OK . 2023.06.29 14:40:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Marsic, emailAddress=info@airvpn.org . 2023.06.29 14:40:20 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.06.29 15:09:43 - Collect information about AirVPN completed . 2023.06.29 15:37:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.06.29 15:37:46 - OpenVPN > VERIFY KU OK . 2023.06.29 15:37:46 - OpenVPN > Validating certificate extended key usage . 2023.06.29 15:37:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.06.29 15:37:46 - OpenVPN > VERIFY EKU OK . 2023.06.29 15:37:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Marsic, emailAddress=info@airvpn.org . 2023.06.29 15:37:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.06.29 15:39:47 - Collect information about AirVPN completed . 2023.06.29 16:09:51 - Collect information about AirVPN completed . 2023.06.29 16:35:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.06.29 16:35:13 - OpenVPN > VERIFY KU OK . 2023.06.29 16:35:13 - OpenVPN > Validating certificate extended key usage . 2023.06.29 16:35:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.06.29 16:35:13 - OpenVPN > VERIFY EKU OK . 2023.06.29 16:35:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Marsic, emailAddress=info@airvpn.org . 2023.06.29 16:35:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.06.29 16:39:58 - Collect information about AirVPN completed . 2023.06.29 17:10:01 - Collect information about AirVPN completed . 2023.06.29 17:32:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.06.29 17:32:54 - OpenVPN > VERIFY KU OK . 2023.06.29 17:32:54 - OpenVPN > Validating certificate extended key usage . 2023.06.29 17:32:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.06.29 17:32:54 - OpenVPN > VERIFY EKU OK . 2023.06.29 17:32:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Marsic, emailAddress=info@airvpn.org . 2023.06.29 17:32:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.06.29 17:40:05 - Collect information about AirVPN completed . 2023.06.29 18:10:09 - Collect information about AirVPN completed ! 2023.06.29 18:28:24 - Disconnecting . 2023.06.29 18:28:24 - Sending soft termination signal . 2023.06.29 18:28:24 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4) . 2023.06.29 18:28:24 - OpenVPN > Closing DCO interface . 2023.06.29 18:28:24 - OpenVPN > net_addr_v4_del: 10.30.27.3 dev tun0 . 2023.06.29 18:28:24 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:1a1b::1001/64 dev tun0 . 2023.06.29 18:28:24 - OpenVPN > net_iface_del: delete tun0 . 2023.06.29 18:28:43 - Sending hard termination signal . 2023.06.29 18:29:03 - Sending hard termination signal . 2023.06.29 18:29:23 - Sending hard termination signal . 2023.06.29 18:31:23 - Above log line repeated 5 times more . 2023.06.29 18:31:23 - SSL > LOG6[0]: TLS closed (SSL_read) . 2023.06.29 18:31:23 - SSL > LOG3[0]: transfer: s_poll_wait: TIMEOUTclose exceeded: closing . 2023.06.29 18:31:23 - SSL > LOG5[0]: Connection closed: 70856413 byte(s) sent to TLS, 4093861747 byte(s) sent to socket . 2023.06.29 18:31:23 - Sending hard termination signal . 2023.06.29 18:31:43 - Sending hard termination signal . 2023.06.29 18:32:03 - Sending hard termination signal During reboot attempt, I have to use Alt+PrintScreen+REISUB, because system can't kill openvpn process. I see those lines on the screen: Reached target System Reboot. watchdog: watchdog0: watchdog did not stop! ovpn_tcp_tx_work: cannot send TCP packet to peer 0: -32 unregister_netdevice: waiting for tun0 to become free. Usage count = 2 systemd-shutdown[1]: Waiting for process: 3170 (openvpn) I found this thread about openvpn-dco, and it looks like it can be somehow related to what I am experiencing. However, my knowledge is now enough to say for sure is it so or not. # ip link del tun0 mentioned in linked thread didn't help in my case: command's output stated that tun0 doesn't exist (just like # ip link show). Is it known issue? Can you reproduce? If I can obtain more logs someway, please let me know. Update 2: Unfortunately, same happens for me even with root (not just sudo) and CLI openvpn. Maybe something is wrong on my side, since no one else here mentions it. I think I should retest everything one more time with newer & not-custom kernel version and reinstalled DCO dkms module. Update: Again =) . 2023.06.29 18:57:06 - Eddie version: 2.23.1 / linux_x64, System: Linux, Name: Arch Linux, Version: Linux host 6.3.9-273-tkg-bore #1 SMP PREEMPT_DYNAMIC TKG Tue, 27 Jun 2023 14:29:57 +0000 x86_64 GNU/Linux, Mono/.Net: 6.12.0 (makepkg/73df89a73d2 Sat May 27 11:12:33 UTC 2023); Framework: v4.0.30319 . 2023.06.29 18:57:06 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2023.06.29 18:57:06 - Raise system privileges . 2023.06.29 18:57:12 - Collect network information . 2023.06.29 18:57:13 - Reading options from /home/user/.config/eddie/default.profile . 2023.06.29 18:57:14 - OpenVPN - Version: 2.6.5 - OpenSSL 3.1.1 30 May 2023, LZO 2.10 (/usr/bin/openvpn) . 2023.06.29 18:57:14 - SSH - Version: OpenSSH_9.3p1, OpenSSL 3.1.1 30 May 2023 (/usr/local/bin/ssh) . 2023.06.29 18:57:14 - SSL - Version: 5.69 (/usr/bin/stunnel) . 2023.06.29 18:57:14 - DNS of the system restored - via /etc/resolv.conf) . 2023.06.29 18:57:14 - Recovery. Unexpected crash? ! 2023.06.29 18:57:14 - Deactivation of Network Lock I 2023.06.29 18:57:15 - Ready ! 2023.06.29 18:57:17 - Activation of Network Lock - Linux nftables I 2023.06.29 18:57:29 - Session starting. I 2023.06.29 18:57:29 - Checking authorization ... ! 2023.06.29 18:57:29 - Connecting to Marsic (Serbia, Belgrade) . 2023.06.29 18:57:29 - Routes, add 146.70.111.22/32 for interface "enp37s0". . 2023.06.29 18:57:29 - Routes, add 146.70.111.22/32 for interface "enp37s0", already exists. . 2023.06.29 18:57:29 - SSL > LOG6[ui]: Initializing inetd mode configuration . 2023.06.29 18:57:29 - SSL > LOG5[ui]: stunnel 5.69 on x86_64-pc-linux-gnu platform . 2023.06.29 18:57:29 - SSL > LOG5[ui]: Compiled with OpenSSL 3.0.8 7 Feb 2023 . 2023.06.29 18:57:29 - SSL > LOG5[ui]: Running with OpenSSL 3.1.1 30 May 2023 . 2023.06.29 18:57:29 - SSL > LOG5[ui]: Update OpenSSL shared libraries or rebuild stunnel . 2023.06.29 18:57:29 - SSL > LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6,SYSTEMD TLS:ENGINE,OCSP,PSK,SNI . 2023.06.29 18:57:29 - SSL > LOG6[ui]: Initializing inetd mode configuration . 2023.06.29 18:57:29 - SSL > LOG5[ui]: Reading configuration from file /home/user/.config/eddie/f309139e23b17a07d8591b4c937dbfe4611375bbad3a4a0ab2722f5af3d51815.tmp.ssl . 2023.06.29 18:57:29 - SSL > LOG5[ui]: UTF-8 byte order mark detected . 2023.06.29 18:57:29 - SSL > LOG5[ui]: FIPS mode disabled . 2023.06.29 18:57:29 - SSL > LOG6[ui]: Compression disabled . 2023.06.29 18:57:29 - SSL > LOG6[ui]: Initializing service [openvpn] . 2023.06.29 18:57:29 - SSL > LOG6[ui]: stunnel default security level set: 2 . 2023.06.29 18:57:29 - SSL > LOG6[ui]: Session resumption enabled . 2023.06.29 18:57:29 - SSL > LOG6[ui]: Configured trusted server CA: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org . 2023.06.29 18:57:29 - SSL > LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks . 2023.06.29 18:57:29 - SSL > LOG6[ui]: DH initialization skipped: client section . 2023.06.29 18:57:29 - SSL > LOG5[ui]: Configuration successful . 2023.06.29 18:57:29 - SSL > LOG6[ui]: Service [openvpn] (FD=9) bound to 127.0.0.1:7045 . 2023.06.29 18:57:29 - SSL > LOG6[ui]: Accepting new connections . 2023.06.29 18:57:29 - SSL > LOG6[per-day]: Executing per-day jobs . 2023.06.29 18:57:29 - SSL > LOG6[per-day]: Per-day jobs completed in 0 seconds . 2023.06.29 18:57:29 - SSL > LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:45490 . 2023.06.29 18:57:29 - SSL > LOG6[0]: s_connect: connecting 146.70.111.22:443 . 2023.06.29 18:57:30 - OpenVPN > OpenVPN 2.6.5 [git:makepkg/cbc9e0ce412e7b42+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on Jun 13 2023 . 2023.06.29 18:57:30 - OpenVPN > library versions: OpenSSL 3.1.1 30 May 2023, LZO 2.10 . 2023.06.29 18:57:30 - OpenVPN > DCO version: 0.2.20230426 . 2023.06.29 18:57:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:7045 . 2023.06.29 18:57:30 - OpenVPN > Socket Buffers: R=[131072->131072] S=[16384->16384] . 2023.06.29 18:57:30 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:7045 . 2023.06.29 18:57:30 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:7045 . 2023.06.29 18:57:30 - OpenVPN > TCPv4_CLIENT link local: (not bound) . 2023.06.29 18:57:30 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:7045 . 2023.06.29 18:57:30 - SSL > LOG5[0]: s_connect: connected 146.70.111.22:443 . 2023.06.29 18:57:30 - SSL > LOG5[0]: Service [openvpn] connected remote server from 10.21.10.1:51740 . 2023.06.29 18:57:30 - SSL > LOG6[0]: SNI: sending servername: 146.70.111.22 . 2023.06.29 18:57:30 - SSL > LOG6[0]: Peer certificate not required . 2023.06.29 18:57:30 - SSL > LOG6[0]: Certificate verification disabled . 2023.06.29 18:57:30 - SSL > LOG6[0]: Client certificate not requested . 2023.06.29 18:57:30 - SSL > LOG6[0]: Session id: C5B8857376951B288E944C4E28DE68AD7F2E66B8D31EB097143A3525968C1FF2 . 2023.06.29 18:57:30 - SSL > LOG6[0]: TLS connected: new session negotiated . 2023.06.29 18:57:30 - SSL > LOG6[0]: TLSv1.2 ciphersuite: ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption) . 2023.06.29 18:57:30 - SSL > LOG6[0]: Peer temporary key: ECDH, P-256, 256 bits . 2023.06.29 18:57:30 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:7045, sid=3930e0f1 3c7a13c8 . 2023.06.29 18:57:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.06.29 18:57:30 - OpenVPN > VERIFY KU OK . 2023.06.29 18:57:30 - OpenVPN > Validating certificate extended key usage . 2023.06.29 18:57:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.06.29 18:57:30 - OpenVPN > VERIFY EKU OK . 2023.06.29 18:57:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Marsic, emailAddress=info@airvpn.org . 2023.06.29 18:57:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.06.29 18:57:30 - OpenVPN > [Marsic] Peer Connection Initiated with [AF_INET]127.0.0.1:7045 . 2023.06.29 18:57:30 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 . 2023.06.29 18:57:30 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted . 2023.06.29 18:57:31 - OpenVPN > SENT CONTROL [Marsic]: 'PUSH_REQUEST' (status=1) . 2023.06.29 18:57:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.30.27.1,dhcp-option DNS6 fde6:7a:7d20:1a1b::1,tun-ipv6,route-gateway 10.30.27.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1a1b::1001/64 fde6:7a:7d20:1a1b::1,ifconfig 10.30.27.3 255.255.255.0,peer-id 0,cipher CHACHA20-POLY1305,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' . 2023.06.29 18:57:31 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.06.29 18:57:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.30.27.1' . 2023.06.29 18:57:31 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1a1b::1' . 2023.06.29 18:57:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.06.29 18:57:31 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.06.29 18:57:31 - OpenVPN > OPTIONS IMPORT: tun-mtu set to 1500 . 2023.06.29 18:57:31 - OpenVPN > net_iface_new: add tun0 type ovpn-dco . 2023.06.29 18:57:31 - OpenVPN > DCO device tun0 opened . 2023.06.29 18:57:31 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.06.29 18:57:31 - OpenVPN > net_iface_up: set tun0 up . 2023.06.29 18:57:31 - OpenVPN > net_addr_v4_add: 10.30.27.3/24 dev tun0 . 2023.06.29 18:57:31 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2023.06.29 18:57:31 - OpenVPN > net_iface_up: set tun0 up . 2023.06.29 18:57:31 - OpenVPN > net_addr_v6_add: fde6:7a:7d20:1a1b::1001/64 dev tun0 . 2023.06.29 18:57:31 - OpenVPN > Initialization Sequence Completed . 2023.06.29 18:57:31 - OpenVPN > Data Channel: cipher 'CHACHA20-POLY1305', peer-id: 0 . 2023.06.29 18:57:31 - DNS of the system switched to VPN DNS - via /etc/resolv.conf) . 2023.06.29 18:57:31 - Routes, add 0.0.0.0/1 for interface "tun0". . 2023.06.29 18:57:31 - Routes, add 128.0.0.0/1 for interface "tun0". . 2023.06.29 18:57:31 - Routes, add ::/1 for interface "tun0". . 2023.06.29 18:57:31 - Routes, add 8000::/1 for interface "tun0". . 2023.06.29 18:57:31 - Routes, add 146.70.111.19/32 for interface "tun0". . 2023.06.29 18:57:32 - Routes, add 2001:ac8:7d:41:1573:e655:4653:403a/128 for interface "tun0". . 2023.06.29 18:57:32 - Flushing DNS . 2023.06.29 18:57:32 - Flush DNS - nscd I 2023.06.29 18:57:32 - Checking route IPv4 I 2023.06.29 18:57:32 - Checking route IPv6 I 2023.06.29 18:57:33 - Checking DNS ! 2023.06.29 18:57:34 - Connected. . 2023.06.29 18:57:34 - OpenVPN > Timers: ping 10, ping-restart 60 . 2023.06.29 18:57:34 - OpenVPN > Protocol options: protocol-flags cc-exit tls-ekm dyn-tls-crypt . 2023.06.29 18:59:24 - Collect information about AirVPN ..., 1° try failed (Fetch url error:Timeout was reached) . 2023.06.29 18:59:25 - Collect information about AirVPN completed . 2023.06.29 19:27:21 - Collect information about AirVPN completed . 2023.06.29 19:57:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.06.29 19:57:18 - OpenVPN > VERIFY KU OK . 2023.06.29 19:57:18 - OpenVPN > Validating certificate extended key usage . 2023.06.29 19:57:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.06.29 19:57:18 - OpenVPN > VERIFY EKU OK . 2023.06.29 19:57:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Marsic, emailAddress=info@airvpn.org . 2023.06.29 19:57:18 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.06.29 19:57:30 - Collect information about AirVPN completed . 2023.06.29 20:27:36 - Collect information about AirVPN completed . 2023.06.29 20:57:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.06.29 20:57:04 - OpenVPN > VERIFY KU OK . 2023.06.29 20:57:04 - OpenVPN > Validating certificate extended key usage . 2023.06.29 20:57:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.06.29 20:57:04 - OpenVPN > VERIFY EKU OK . 2023.06.29 20:57:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Marsic, emailAddress=info@airvpn.org . 2023.06.29 20:57:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.06.29 20:57:44 - Collect information about AirVPN completed . 2023.06.29 21:27:52 - Collect information about AirVPN completed . 2023.06.29 21:56:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.06.29 21:56:51 - OpenVPN > VERIFY KU OK . 2023.06.29 21:56:51 - OpenVPN > Validating certificate extended key usage . 2023.06.29 21:56:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.06.29 21:56:51 - OpenVPN > VERIFY EKU OK . 2023.06.29 21:56:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Marsic, emailAddress=info@airvpn.org . 2023.06.29 21:56:51 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.06.29 21:58:00 - Collect information about AirVPN completed ! 2023.06.29 22:09:56 - Disconnecting . 2023.06.29 22:09:56 - Sending soft termination signal . 2023.06.29 22:09:57 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4) . 2023.06.29 22:09:57 - OpenVPN > Closing DCO interface . 2023.06.29 22:09:57 - OpenVPN > net_addr_v4_del: 10.30.27.3 dev tun0 . 2023.06.29 22:09:57 - OpenVPN > net_addr_v6_del: fde6:7a:7d20:1a1b::1001/64 dev tun0 . 2023.06.29 22:09:57 - OpenVPN > net_iface_del: delete tun0 . 2023.06.29 22:10:16 - Sending hard termination signal . 2023.06.29 22:10:36 - Sending hard termination signal . 2023.06.29 22:10:56 - Sending hard termination signal -
1 point
Eddie Desktop 2.23 beta released
Oblivion 2013 reacted to Staff for a post in a topic
Hello! Thank you for your valuable tests which helped us find bugs and glitches. Your work was not in vain, you can see how many bug fixes have been implemented on Eddie 2.23: most of them thanks to you and community testers like you. https://eddie.website/changelog/?software=client&format=html We assure you that your work is precious and that under no circumstance will we waste it. Eddie's Deskop edition versioning scheme and release cycle are unorthodox. For example, check what happened now with Eddie 2.23.0: a bug was found, thanks to testers from the community like you. The fix was implemented on a new version (2.23.1) and 2.23.0 has been thrown away. You don't have different betas for 2.23.0, and 2.23.0 will never be Release Candidate or release, to be clear. Similarly, Eddie 2.22.2 will never reach a Release status, and not even a Release Candidate status: each bug fix is implemented not in 2.22.2 but in a new version. You can see it as a customized SemVer (semantic versioning), where: every fix is condensed in the "post release cycle", the scheme is more similar to major.minor.patch than to major.minor.maintenance.build and a whole minor could be thrown completely away without reaching a stable phase (exactly the 2.22 you mention). https://en.wikipedia.org/wiki/Software_versioning With that said: So far no critical problem has been found by anyone on Eddie 2.22.2 so you can keep using it with the usual caveat: it does not include the bug fixes you can see on the 2.23.1 version. Furthermore, Linux users must be aware that Eddie 2.23.1 features full support, with proper DNS management, of every systemd-resolved working mode, which previous Eddie versions don't. Now that more and more Linux distributions come pre-packaged with systemd-resolved working in on-link or hybrid modes (examples: Fedora, Ubuntu), Linux users can seriously consider to jump directly to 2.23.x. Thank you again again for your valuable tests and we frankly hope that you will be among the testing group for Eddie 2.23.x as well. Kind regards -
1 pointBravo! That's how you do it. By preserving what was advertised to all previous customers you have proved your honesty and fairness again. 👏
-
1 pointOK, I was in contact with AirVPN support who were asking for the version of OpenVPN (it's 2.5.8 in DSM 7.2) and also for the OpenVPN log. I couldn't find it and, while googling the subject, came across a post by someone having similar problems with a different VPN provider. This worked for me: - Go to the config generator - Select Router - Don't click on Advanced, just select UDP 443 (I believe that's selected by default) - Select your server/country/whatever you like - Generate the ovpn file In DSM: - Create a VPN profile - Give it a name - Enter your AirVPN credentials - Select the ovpn file you just generated - Click the checkboxes in the next screen - Click Connect and it should connect... worked here anyway. This had been driving me nuts for a few hours. I even tried another VPN (free trial) which didn't work, so I was really wondering if the server's VPN module was broken!
-
0 points
Eddie Desktop 2.23 beta released
Oblivion 2013 reacted to neoragez for a post in a topic
Thanks for the fix. Everything is working fine with this version. I just have an exact same bug as previous versions: If I activate "Don't ask elevation every run" and after running Eddie, I click on "Exit" or the right top X, Eddie will be stuck at the end of the exit process. I can kill it with xKill but the remaining process is impossible to kill with a kill -9, it comes back after a few seconds and internet is not working anymore. Rebooting is the only option to have internet again. So for now, I don't activate the elevation option. It is not a big deal, but I have the same bug since several Eddie versions on Linux Mint and Debian. -
0 points
Eddie Desktop 2.23 beta released
Oblivion 2013 reacted to fishbasketballaries for a post in a topic
This is a really specific issue, but I'm experiencing extremely high network latency while playing Team Fortress 2, but only on Valve's casual matchmaking mode. Community operated servers work fine. Similarly, Counter-Strike: Global Offensive will say "Failed to reach any official servers" upon queuing for any game. I'm using WireGuard with Eddie 2.23.1. Neither of these issues occur under OpenVPN or Eddie 2.22.2. I haven't changed any settings between versions. What could be causing this? Could someone with a Linux machine also test this? Both games are free on Steam.