Jump to content
Not connected, Your IP: 54.158.251.104

Search the Community

Showing results for tags 'Eddie'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP
    • Mirrors

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 263 results

  1. I am unable to install eddie on Debian 11 Buster (stable), so any help will be greatly appreciated. Toward the end of the steps, after I run: sudo apt-get install eddie-ui I get this: Reading package lists... Done Building dependency tree... Done Reading state information... Done Some packages could not be installed. This may mean that you have requested an impossible situation or if you are using the unstable distribution that some required packages have not yet been created or been moved out of Incoming. The following information may help to resolve the situation: The following packages have unmet dependencies: eddie-ui : Depends: libappindicator1 but it is not installable E: Unable to correct problems, you have held broken packages. Running "apt-get install libappindicator1" did not do any good either, as it doesn't seem to be in the Debian Main repositories: Package libappindicator1 is not available, but is referred to by another package. This may mean that the package is missing, has been obsoleted, or is only available from another source E: Package 'libappindicator1' has no installation candidate Thanks!
  2. Hello. I have a minor, yet quite an annoying problem here. After switching OS (Windows -> Linux), I have noticed pings in the server overview being quite a bit higher. Has anyone had the same problem? Maybe any suggestions? I use: Arch Linux x86_64 Eddie 2.19.7 I'm using NetworkManager I tried comparing the results from Eddie with results from pinging using the terminal. With the first four results, I picked the first server on list from each country (sorted by lowest latency) With the last two I picked one near 100ms and a server near 150ms to hopefully see a pattern in the results. The IPs I pinged, are the ones you find if you right click a server, click more, and then take the IP from "remote". These are my results: Anser (Netherlands) Eddie: 19ms Terminal: 12.5ms Arion (UK) Eddie: 24ms Terminal: 16.8ms Cervantes (Germany) Eddie: 25ms Terminal: 16.4ms Algorab (Sweden) Eddie: 26ms Terminal: 15.1ms Dimidium (NY USA) Eddie: 104ms Terminal: 93ms Ran (Texas USA) Eddie: 150ms Terminal: 121ms
  3. I use AirVPN with Eddie on Linux (Ubuntu 21.04). I have certain applications (and even websites if possible) I would like to exclude from the VPN. I have to open and close the AirVPN connection numerous times a day since I need to open a VPN connection to my work where I download updated data. I also have an IRC client running which does not like the changes and cut me off every time I turn the VPN on and off. Other applications like Signal Desktop or Slack seems to handle these changes. Best would of course be if I could add my work VPN (OpenVPN) to the Eddie or in addition to Eddie, but that means two VPN's open at the same time and I do not even know if that is possible. I also have problems with Pandora which won't play when I set up my AirVPN connection to overseas locations (I live and work in the US). On Android it's easy to exclude apps, but on Linux I have no idea if it's possible and how I would go about setting it up.
  4. After trying to connect to airvpn through eddie, multiple installs and re-installs as well as removing the checkmarks in the "check airvpn dns", "check if tunnel works" and "enable latency test", the best I'm able to achieve is what appears to be a connection but does not allow access to the internet. A program I use to connect to the internet, I've noticed, seems to share the "systemd" dependency, specifically "systemd-networkd". I've tried rechecking the previously unchecked boxes listed above, and eddie starts to check the latency of various servers, seems to start at least, and then freezes at 167. In the logs, I double-click to restart this check and in the 'pinger stats' row the following is displayed: 'Invalid: 167, Older check:-, Latest check: Just now (alternating between this and '1 second ago') (double-click to update). I've gone as far as stopping and restarting the network, still no luck. Attached is my log file. Using the default settings in android, I am unable to connect to the internet with eddie on, and SOMETIMES it refuses to connect at all. Either way, appearing to be connected or not, I cannot connect to the internet via airvpn. Thanks for your help. Eddie_20210328_180658.txt
  5. Dear Maintainers, The Eddie application icon is very blocky both in the Dock and in Task Switcher. Using Gnome 3.30.2 on Debian Buster. It's been like this for the past few versions, for as long as I can remember. I don't know if this is Debian/Buster specific. The icon referred to in the packaged .desktop file (/usr/share/pixmaps/eddie-ui.png) looks fine when opened in GIMP as can be seen attached. Anyone else have this issue or know a fix? Thanks!
  6. I will be testing it on Xbian today since I have the same use case, but find that with proper resource management I can have my RPi 2 do double duty as a Deluge box and a mediacentre. I would actually prefer to bring things up using eddie-cli automatically at boot without user intervention, preferably as a service or alternately via rc.local. Almost there, after hours of struggling because I was trying to run eddie-cli as superuser, in my eddie-cli upstart configuration (Yay - no systemd!). Now that I am not, I get this, though: # /etc/rc.local . 2021.01.27 08:37:47 - Eddie version: 2.19.7 / linux_armv7l, System: Linux, Name: XBian GNU/Linux 10 \n \l, Version: Linux xbian 4.19.90+ #1 SMP PREEMPT Wed Dec 18 20:39:10 CET 2019 armv7l GNU/Linux, Mono/.Net: 5.18.0.240 (Debian 5.18.0.240+dfsg-3 Wed Apr 17 18:28:16 UTC 2019); Framework: v4.0.30319 . 2021.01.27 08:37:48 - Command line arguments (7): path.resources="/usr/share/eddie-cli" path.exec="/usr/bin/eddie-cli" netlock="True" login="airvpnclient" password="My.cat.has.pings." server="Rotanev" connect="True" . 2021.01.27 08:37:48 - Raise system privileges sudo: no tty present and no askpass program specified F 2021.01.27 08:37:48 - Unable to obtain elevated privileges (required): Unable to start (already exit) . 2021.01.27 08:37:48 - Shutdown in progress . 2021.01.27 08:37:48 - Shutdown complete ... Also, the script should work on this Debian based box since firewalld exists: root@xbian:/home/xbian# whereis firewalld firewalld: /usr/local/lib/firewalld
  7. Is it possible to introduce a feature to save master password to android keystore and unlock the app with fingerprint? I am referring to the Android version of Eddie. It is quite a hassle to have to enter the password every time I want to connect to my VPN. An alternative is to make the master password optional. I understand how this will result in the user credentials not being encrypted, but it can be an option at the user's risk.
  8. Hello, after I posted some suggestions for Eddie's CLI version in this thread and received some helpful information there, I set out to write my own little interface in bash for it to implement the suggestions. Being no programmer it turned out to be quite a project for me, and I would like to share it here in case anybody else prefers to run Eddie in the terminal rather than as a full GUI application. This script still uses Eddie itself, it's just a wrapper to make it as easy to use in the command line as it is as a desktop application. Screenshots are attached. Some features and advantages: uses less resources (top shows usually 0.3% CPU usage compared to 4-5% for the desktop version) can be exited without disconnecting interactive, sortable server list option to connect to another VPN with openconnect (since I need to do that from time to time, but it should be easy to add other connection methods as well) option to lock down the system's network traffic by default, so even without Eddie running with its own network lock there will be no leaks What to watch out for: The default network lock works with direct rules in firewalld because I'm using Fedora. It should be easy to change it to use iptables directly on other distributions since firewalld's direct rules are just a way to directly manipulate iptables. Once activated, the lock will stay in place until manually deactivated (also surviving reboots), so no internet connection will be possible unless connected to AirVPN or other whitelisted VPNs. AirVPN's network lock overwrites the default network lock, so there will be no interference. Check your /etc/resolv.conf file while not running Eddie (because Eddie's network lock replaces that file temporarily) to make sure your router is not set as a nameserver (so no 192.168... address). Some routers will push themselves on that list by DHCP whenever you connect to their network. Since communication with the router is allowed in the lock rules, DNS requests will be handled by the router and sent to whatever DNS server is configured there even when network traffic should be blocked. There are ways to prevent that file from being changed by DHCP, best configure network manager for that if you use it. To connect to other VPNs, their IPs must be whitelisted and DNS requests for their domains must be allowed in the default network lock rules. The rules for airvpn.org can be copied and adjusted. I haven't yet included an option to pass command line arguments to Eddie. So if you need to set more advanced options like black-/whitelists, use of certain protocols etc., you need to set them manually in the connect_server function. All the possible options can be found in 'man eddie-ui'. You need to insert your own API key in line 5. It can be found in your account under Client Area -> API. Without this, connections will still work, but user info and connection status in the main window will not be properly updated. I tried to only use basic system tools. The script relies mostly on dialog, awk and curl (and firewalld as described and openconnect if needed), so it should work on most systems, but I'm not sure. And, lastly, VERY IMPORTANT: As I said, I'm no programmer and new to this, so even though I tried my best to make this script secure and error free, there might very well be some bad practice, never-ever-do-this mistakes or other hiccups in there. It works well for me, but better check it yourself. Feel free to use this as you wish, I hope someone can benefit from this. I'm happy about any improvements and corrections and will update this if I find the time. UPDATE: A new version which uses Hummingbird and has been improved in many aspects (including automatic connection at boot) can be found here. #!/bin/bash # an interactive shell script to control the command line version of the AirVPN Eddie client and openconnect more comfortably PROFILE_PATH="$HOME/.airvpn/default.xml" API_KEY="<your api key>" DIALOG_OK=0 DIALOG_CANCEL=1 DIALOG_EXTRA=3 DIALOG_ESC=255 HEIGHT=0 WIDTH=0 BACKTITLE="VPN Control" FORMAT="text" URL="https://airvpn.org/api/" PID=$$ function check_sudo { # check if user has sudo privileges sudo -vn &> /dev/null # gain sudo privileges for commands that need it (better than running everything with sudo) if [ $? = "1" ] then unset EXIT_STATUS_SUDO PASS_PROMPT="Establishing VPN connections and changing network traffic rules requires root privileges. Please enter your password:" until [ "$EXIT_STATUS_SUDO" = "0" ] do dialog \ --backtitle "$BACKTITLE" \ --title "Password Needed" \ --output-fd 1 \ --insecure \ --passwordbox "$PASS_PROMPT" 11 35 | xargs printf '%s\n' | sudo -Svp '' &> /dev/null EXIT_STATUS_PIPE=( "${PIPESTATUS[@]}" ) EXIT_STATUS_DIALOG="${EXIT_STATUS_PIPE[0]}" EXIT_STATUS_SUDO="${EXIT_STATUS_PIPE[2]}" EXIT_SUDO_TEST="${EXIT_STATUS_PIPE[2]}" PASS_PROMPT="The password you entered is incorrect. Please try again:" case $EXIT_STATUS_DIALOG in $DIALOG_CANCEL|$DIALOG_ESC) return 1 ;; esac done # keep sudo permission until script exits or permissions are revoked (e.g. when computer goes to sleep) while [ "$EXIT_SUDO_TEST" = "0" ]; do sudo -vn; EXIT_SUDO_TEST=$?; sleep 60; kill -0 "$PID" || exit; done &> /dev/null & fi return 0 } function get_list { SERVICE_NAME="status" ARGS="{ \"format\":\"$FORMAT\", \"service\":\"$SERVICE_NAME\" }" timeout --signal=SIGINT 10 curl -s -d "$ARGS" -X POST "$URL" > "/tmp/.eddie_server_list.txt" } function sort_list { # pipe server status list to awk, filter out unnecessary stuff, # combine lines that relate to same server into single lines which are saved as array, # loop through array to format info, # print array and sort according to options, # add numbers to list for menu LIST=$(awk -F '[.]' \ 'BEGIN{OFS=";"} \ /^servers/ && !/ip_/ && !/country_code/ {c=$2; \ if (c in servers) servers[c]=servers[c] OFS $3; \ else servers[c]=$3; \ for (k in servers) gsub(/;bw=/, " :", servers[k]); \ for (k in servers) gsub(/;bw_max=/, "/", servers[k]); \ for (k in servers) gsub(/;currentload=/, " :", servers[k]); \ for (k in servers) gsub(/;health=/, "%:", servers[k]); \ for (k in servers) gsub(/;.*=/, ":", servers[k]); \ for (k in servers) gsub(/^.*=/, "", servers[k])} \ END{ \ for (c in servers) print servers[c]}' "/tmp/.eddie_server_list.txt" | sort -t ":" $1 | awk -F '[;]' 'BEGIN{OFS=":"} {print v++";"$1}') } function get_userinfo { SERVICE_NAME="userinfo" ARGS="{ \"format\":\"$FORMAT\", \"service\":\"$SERVICE_NAME\", \"key\":\"$API_KEY\" }" # filter specific lines, save values to variables after protecting whitespace read U_LOGIN U_EXP U_CONNECTED U_DEVICE U_SERVER_NAME U_SERVER_COUNTRY U_SERVER_LOCATION U_TIME <<< $( \ timeout --signal=SIGINT 10 curl -s -d "$ARGS" -X POST "$URL" | \ awk -F '[=]' \ 'BEGIN{ORS=";"} \ /^user.login|^user.expiration_days|^user.connected|^sessions.*device_name|^connection.server_name|^connection.server_country=|^connection.server_location|^connection.connected_since_date/ \ {print $2}' | \ sed 's/\ /\\\ /g' | sed 's/;/\ /g' \ ) if [ "$U_CONNECTED" = "1" ] then U_CONNECTED="connected" U_SERVER_FULL="$U_SERVER_NAME ($U_SERVER_LOCATION, $U_SERVER_COUNTRY)" U_TIME=$(date -d "$U_TIME UTC" +"%m/%d/%Y %H:%M:%S") else U_CONNECTED="not connected" U_SERVER_FULL="--" U_TIME="--" fi } function connect_server { if [ "$KILLED" = "true" ] then # create pipes to process status of client if [ ! -p "/tmp/.eddie_fifo1" ] then mkfifo "/tmp/.eddie_fifo1" fi if [ ! -p "/tmp/.eddie_fifo2" ] then mkfifo "/tmp/.eddie_fifo2" fi # run eddie in background and detached from current window, pipe output to named pipe (sudo eddie-ui --cli --netlock --connect --server="$1" --profile="$PROFILE_PATH" | tee "/tmp/.eddie_fifo2" &> "/tmp/.eddie_fifo1" &) cat "/tmp/.eddie_fifo2" | dialog --backtitle "$BACKTITLE" --title "Connecting to AirVPN..." --progressbox 20 80 & timeout --signal=SIGINT 60 grep -q -m 1 "Initialization Sequence Completed" "/tmp/.eddie_fifo1" INIT_EXIT=$? pkill -f cat.*eddie_fifo2 if [ $INIT_EXIT = "0" ] then get_userinfo else U_CONNECTED="error during connection attempt" U_SERVER_FULL="--" U_TIME="--" fi else U_CONNECTED="error during disconnection" U_SERVER_FULL="--" U_TIME="--" fi } function disconnect_server { # check for running instance of eddie pgrep -f mono.*eddie-ui &> /dev/null if [ $? = 0 ] then # kill process and wait for confirmation from process output if [ -p "/tmp/.eddie_fifo1" -a -p "/tmp/.eddie_fifo2" ] then sudo pkill -2 -f mono.*eddie-ui & cat "/tmp/.eddie_fifo1" | dialog --backtitle "$BACKTITLE" --title "Disconnecting AirVPN..." --progressbox 20 80 & timeout --signal=SIGINT 10 grep -q -m 1 "Shutdown complete" "/tmp/.eddie_fifo2" else # in case connection was started without this script sudo pkill -2 -f mono.*eddie-ui sleep 5 fi # give some time to completely close process, without sleep it's too early for new connection sleep 3 pgrep -f mono.*eddie-ui &> /dev/null if [ $? = 1 ] then KILLED1="true" else KILLED1="false" fi else KILLED1="true" fi # check for running instance of openconnect pgrep -f "openconnect.*--" &> /dev/null if [ $? = 0 ] then sudo pkill -2 -f "openconnect.*--" sleep 1 pgrep -f "openconnect.*--" &> /dev/null if [ $? = 1 ] then KILLED2="true" # somehow openconnect doesn't receive SIGINT and shuts down improperly, # so vpnc can't restore resolv.conf by itself sudo cp "/var/run/vpnc/resolv.conf-backup" "/etc/resolv.conf" else KILLED2="false" fi else KILLED2="true" fi if [ "$KILLED1" = "true" -a "$KILLED2" = "true" ] then KILLED="true" else KILLED="false" fi } function define_lock { if [ "$1" = "activate" ] then GAUGE_TITLE="Activating Network Lock" RULE_ACTION="add-rule" elif [ "$1" = "deactivate" ] then GAUGE_TITLE="Deactivating Network Lock" RULE_ACTION="remove-rule" else return 1 fi GAUGE_BODY="$1" IPRULES=(\ #allow loopback "sudo firewall-cmd --direct --permanent --$RULE_ACTION ipv4 filter INPUT 0 -i lo -j ACCEPT" \ "sudo firewall-cmd --direct --permanent --$RULE_ACTION ipv4 filter OUTPUT 0 -o lo -j ACCEPT" \ #allow lan (out) and broadcasting/dhcp "sudo firewall-cmd --direct --permanent --$RULE_ACTION ipv4 filter OUTPUT 0 -s 192.168.0.0/16 -d 192.168.0.0/16 -j ACCEPT" \ "sudo firewall-cmd --direct --permanent --$RULE_ACTION ipv4 filter INPUT 0 -s 255.255.255.255 -j ACCEPT" \ "sudo firewall-cmd --direct --permanent --$RULE_ACTION ipv4 filter OUTPUT 0 -d 255.255.255.255 -j ACCEPT" \ # allow tun device to communicate (so any VPN connection should be possible, also without Air, but respective DNS requests must be allowed) "sudo firewall-cmd --direct --permanent --$RULE_ACTION ipv4 filter FORWARD 0 -o tun+ -j ACCEPT" \ "sudo firewall-cmd --direct --permanent --$RULE_ACTION ipv4 filter FORWARD 0 -i tun+ -j ACCEPT" \ "sudo firewall-cmd --direct --permanent --$RULE_ACTION ipv4 filter OUTPUT 998 -o tun+ -j ACCEPT" \ # optional masquerade rule (NAT/ports) "sudo firewall-cmd --direct --permanent --$RULE_ACTION ipv4 nat POSTROUTING 0 -o tun+ -j MASQUERADE" \ # allow ipv4 only to airvpn.org for status update # allow DNS query to resolve hostname (hex string reads "06 airvpn 03 org" - numbers are counting bits), # restrict packet length to length of this specific request package (might change?) to avoid hijacking # of query (very unlikely I guess, but who cares if we're already being paranoid for the fun of it), # whitelist destination IP for TCP handshake "sudo firewall-cmd --direct --permanent --$RULE_ACTION ipv4 filter OUTPUT 1 -p udp --dport 53 -m string --hex-string '|06 61697276706e 03 6f7267|' --algo bm -m length --length 0:126 -m recent --set -j ACCEPT" \ "sudo firewall-cmd --direct --permanent --$RULE_ACTION ipv4 filter OUTPUT 1 -p tcp --dport 53 -m string --hex-string '|06 61697276706e 03 6f7267|' --algo bm -m length --length 0:126 -m recent --set -j ACCEPT" \ # add rules for other domains you wish to allow DNS requests to here (packet length can be determined with e.g. wireshark) and adjust array index # # allow SYN request to whitelisted IP to initiate handshake, remove IP from whitelist "sudo firewall-cmd --direct --permanent --$RULE_ACTION ipv4 filter OUTPUT 1 -p tcp --syn --dport 53 -m recent --remove -j ACCEPT" \ # allow outgoing connection to Air's IP "sudo firewall-cmd --direct --permanent --$RULE_ACTION ipv4 filter OUTPUT 1 -d 5.196.64.52 -j ACCEPT" \ # add rules for other IPs you wish to allow connections to here # # allow communication "sudo firewall-cmd --direct --permanent --$RULE_ACTION ipv4 filter INPUT 1 -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT" \ # drop outgoing ipv4 (if not specifically allowed by other rules) "sudo firewall-cmd --direct --permanent --$RULE_ACTION ipv4 filter OUTPUT 999 -j DROP" \ # block incoming ipv4 "sudo firewall-cmd --direct --permanent --$RULE_ACTION ipv4 filter INPUT 999 -j DROP" \ # drop all ipv6 "sudo firewall-cmd --direct --permanent --$RULE_ACTION ipv6 filter OUTPUT 0 -j DROP" \ "sudo firewall-cmd --direct --permanent --$RULE_ACTION ipv6 filter INPUT 0 -j DROP" \ # reload and restart firewalld to activate permanent rule changes "sudo firewall-cmd --reload" \ "sudo systemctl restart firewalld"\ ) toggle_lock } function toggle_lock { PERCENTAGE_STEP=$(awk -v rules="${#IPRULES[@]}" 'BEGIN {print 100/rules}') PERCENTAGE=0 COUNTER=0 # initial window dialog --backtitle "$BACKTITLE" \ --title "$GAUGE_TITLE" \ --mixedgauge "Applying iptable rules to $GAUGE_BODY the default network lock..." 35 80 "$(awk -v per="$PERCENTAGE" 'BEGIN {printf "%.0f", per}')" \ "Allow Loopback IN" "${RESULT[0]}" \ "Allow Loopback OUT" "${RESULT[1]}" \ "Allow LAN OUT" "${RESULT[2]}" \ "Allow DHCP IN" "${RESULT[3]}" \ "Allow DHCP OUT" "${RESULT[4]}" \ "Allow tun out FORWARD" "${RESULT[5]}" \ "Allow tun in FORWARD" "${RESULT[6]}" \ "Allow tun out OUT" "${RESULT[7]}" \ "tun masquerade" "${RESULT[8]}" \ "Allow DNS via UDP to airvpn.org" "${RESULT[9]}" \ "Allow DNS via TCP to airvpn.org" "${RESULT[10]}" \ "Allow connection initiation" "${RESULT[11]}" \ "Allow traffic to airvpn.org" "${RESULT[12]}" \ "Allow established connections" "${RESULT[13]}" \ "Block IPv4 OUT" "${RESULT[14]}" \ "Block IPv4 IN" "${RESULT[15]}" \ "Block IPv6 OUT" "${RESULT[16]}" \ "Block IPv6 IN" "${RESULT[17]}" \ "activate changes" "${RESULT[18]}" \ "restart firewalld" "${RESULT[19]}" for i in "${IPRULES[@]}" do RESULT["$COUNTER"]=$(eval $i) (( COUNTER++ )) PERCENTAGE=$(awk -v per="$PERCENTAGE" -v per_step="$PERCENTAGE_STEP" 'BEGIN {print per+per_step}') # progress window dialog --backtitle "$BACKTITLE" \ --title "$GAUGE_TITLE" \ --mixedgauge "Applying iptable rules to $GAUGE_BODY the default network lock..." 35 80 "$(awk -v per="$PERCENTAGE" 'BEGIN {printf "%.0f", per}')" \ "Allow Loopback IN" "${RESULT[0]}" \ "Allow Loopback OUT" "${RESULT[1]}" \ "Allow LAN OUT" "${RESULT[2]}" \ "Allow DHCP IN" "${RESULT[3]}" \ "Allow DHCP OUT" "${RESULT[4]}" \ "Allow tun out FORWARD" "${RESULT[5]}" \ "Allow tun in FORWARD" "${RESULT[6]}" \ "Allow tun out OUT" "${RESULT[7]}" \ "tun masquerade" "${RESULT[8]}" \ "Allow DNS via UDP to airvpn.org" "${RESULT[9]}" \ "Allow DNS via TCP to airvpn.org" "${RESULT[10]}" \ "Allow connection initiation" "${RESULT[11]}" \ "Allow traffic to airvpn.org" "${RESULT[12]}" \ "Allow established connections" "${RESULT[13]}" \ "Block IPv4 OUT" "${RESULT[14]}" \ "Block IPv4 IN" "${RESULT[15]}" \ "Block IPv6 OUT" "${RESULT[16]}" \ "Block IPv6 IN" "${RESULT[17]}" \ "activate changes" "${RESULT[18]}" \ "restart firewalld" "${RESULT[19]}" done # final window to show results dialog --backtitle "$BACKTITLE" \ --title "$GAUGE_TITLE" \ --mixedgauge "Applying iptable rules to $GAUGE_BODY the default network lock..." 35 80 "$(awk -v per="$PERCENTAGE" 'BEGIN {printf "%.0f", per}')" \ "Allow Loopback IN" "${RESULT[0]}" \ "Allow Loopback OUT" "${RESULT[1]}" \ "Allow LAN OUT" "${RESULT[2]}" \ "Allow DHCP IN" "${RESULT[3]}" \ "Allow DHCP OUT" "${RESULT[4]}" \ "Allow tun out FORWARD" "${RESULT[5]}" \ "Allow tun in FORWARD" "${RESULT[6]}" \ "Allow tun out OUT" "${RESULT[7]}" \ "tun masquerade" "${RESULT[8]}" \ "Allow DNS via UDP to airvpn.org" "${RESULT[9]}" \ "Allow DNS via TCP to airvpn.org" "${RESULT[10]}" \ "Allow connection initiation" "${RESULT[11]}" \ "Allow traffic to airvpn.org" "${RESULT[12]}" \ "Allow established connections" "${RESULT[13]}" \ "Block IPv4 OUT" "${RESULT[14]}" \ "Block IPv4 IN" "${RESULT[15]}" \ "Block IPv6 OUT" "${RESULT[16]}" \ "Block IPv6 IN" "${RESULT[17]}" \ "activate changes" "${RESULT[18]}" \ "restart firewalld" "${RESULT[19]}" sleep 2 unset RESULT check_lock } function check_lock { # check for success (not really though, needs improvement) LOCK_RULES=$( sudo firewall-cmd --direct --permanent --get-all-rules | wc -l ) if [ "$LOCK_RULES" -gt 16 ] then LOCK_ACTIVE="active" else LOCK_ACTIVE="inactive" fi } function yesno { dialog \ --backtitle "$BACKTITLE" \ --title "$1" \ --clear \ --yesno "$2" \ $HEIGHT $WIDTH EXIT_STATUS=$? } check_sudo if [ $? = "1" ] then clear exit fi get_userinfo # if currently connected by openconnect, set status to unknown (connection could have been established outside of this script) pgrep openconnect &> /dev/null if [ $? = 0 ] then U_CONNECTED="connected (openconnect)" U_SERVER_FULL="unknown" U_TIME="unknown" fi check_lock while true; do exec 3>&1 selection=$(dialog \ --cr-wrap \ --backtitle "$BACKTITLE" \ --title "Main Menu" \ --clear \ --cancel-label "Quit" \ --menu "This is a control script for VPN connections, primarily for Eddie, the AirVPN client.\nThis script can be exited and re-entered without affecting a running connection.\n\nUser: $U_LOGIN\nDays Until Expiration: $U_EXP\n\nDefault Network Lock: $LOCK_ACTIVE\n\nStatus: $U_CONNECTED\nServer: $U_SERVER_FULL\nConnected Since: $U_TIME\n\nPlease select one of the following options:" $HEIGHT $WIDTH 6 \ "0" "Connect to Recommended Server" \ "1" "Connect to Specific Server" \ "2" "Connect via openconnect" \ "3" "Disconnect" \ "4" "Refresh User Info" \ "5" "Toggle Default Network Lock" \ 2>&1 1>&3) EXIT_STATUS=$? exec 3>&- case $EXIT_STATUS in $DIALOG_CANCEL|$DIALOG_ESC) yesno "Quit" "Exit Script?" case $EXIT_STATUS in $DIALOG_CANCEL|$DIALOG_ESC) ;; $DIALOG_OK) break ;; esac ;; esac case $selection in 0 ) check_sudo if [ $? = "0" ] then disconnect_server connect_server "" fi ;; 1 ) while true; do exec 3>&1 SERVER_SORT=$(dialog \ --backtitle "$BACKTITLE" \ --title "Sort Server List" \ --no-collapse \ --ok-label "sort ascending" \ --extra-button \ --extra-label "sort descending" \ --menu "Please choose how you want to sort the server list." \ 14 0 7 \ "1" "Name" \ "2" "Country" \ "3" "Location" \ "4" "Continent" \ "5" "Bandwidth" \ "6" "Users" \ "7" "Load" \ 2>&1 1>&3) EXIT_STATUS=$? exec 3>&- case $EXIT_STATUS in $DIALOG_CANCEL|$DIALOG_ESC) break ;; $DIALOG_EXTRA) SERVER_SORT_OPTION="r" ;; $DIALOG_OK) SERVER_SORT_OPTION="" ;; esac if [ "$SERVER_SORT" = "5" -o "$SERVER_SORT" = "6" -o "$SERVER_SORT" = "7" ] then SERVER_NUM_OPTION="n" else SERVER_NUM_OPTION="" fi if [ ! -f "/tmp/.eddie_server_list.txt" ] then get_list fi while true do sort_list "-k$SERVER_SORT,$SERVER_SORT$SERVER_SORT_OPTION$SERVER_NUM_OPTION" IFS=$';\n' exec 3>&1 SERVER_NMBR=$(dialog \ --backtitle "$BACKTITLE" \ --title "Server List" \ --colors \ --no-collapse \ --extra-button \ --extra-label "Refresh List" \ --column-separator ":" \ --menu "Choose a server from the list to connect to it. (Press ESC to go back.)\n\n\Zb # Name Country Location Continent Bandwidth Users Load Health\ZB" \ 40 102 31 $LIST 2>&1 1>&3) EXIT_STATUS=$? exec 3>&- IFS=$' \t\n' case $EXIT_STATUS in $DIALOG_CANCEL) break 2 ;; $DIALOG_ESC) break ;; $DIALOG_EXTRA) get_list ;; $DIALOG_OK) check_sudo if [ $? = "0" ] then SELECTED_SERVER=$(printf -- '%s\n' "${LIST[@]}" | grep "^$SERVER_NMBR;" | cut -d ";" -f 2 | cut -d ":" -f 1) disconnect_server connect_server "$SELECTED_SERVER" break 2 fi ;; esac done done ;; 2 ) exec 3>&1 # adjust field lengths if necessary CONNECT_INFO=$(dialog \ --backtitle "$BACKTITLE" \ --title "VPN via openconnect" \ --insecure \ --mixedform "Please provide your login credentials to connect to a VPN via openconnect:\n(Leave unneeded fields blank and type options as in command line, separated by space.)" $HEIGHT $WIDTH 6 \ "Server:" 1 1 "" 1 21 25 0 0 \ "Group:" 2 1 "" 2 21 25 0 0 \ "User:" 3 1 "" 3 21 25 0 0 \ "Password:" 4 1 "" 4 21 25 0 1 \ "Additional Options:" 5 1 "" 5 21 25 0 0 \ 2>&1 1>&3) EXIT_STATUS=$? exec 3>&- case $EXIT_STATUS in $DIALOG_CANCEL|$DIALOG_ESC) ;; $DIALOG_OK) check_sudo if [ $? = "0" ] then disconnect_server if [ "$KILLED" = "true" ] then if [ ! -p "/tmp/.eddie_fifo1" ] then mkfifo "/tmp/.eddie_fifo1" fi ALT_SERVER=$(echo -n "$CONNECT_INFO" | cut -d$'\n' -f 1) ALT_GROUP=$(echo -n "$CONNECT_INFO" | cut -d$'\n' -f 2) ALT_USER=$(echo -n "$CONNECT_INFO" | cut -d$'\n' -f 3) ALT_PASS=$(echo -n "$CONNECT_INFO" | cut -d$'\n' -f 4) ALT_OPTS=$(echo -n "$CONNECT_INFO" | cut -d$'\n' -f 5) echo "$ALT_PASS" | (sudo openconnect $ALT_OPTS --authgroup=$ALT_GROUP --user=$ALT_USER --passwd-on-stdin $ALT_SERVER &> "/tmp/.eddie_fifo1" &) timeout --signal=SIGINT 3 cat "/tmp/.eddie_fifo1" | dialog --backtitle "$BACKTITLE" --title "Connecting via openconnect..." --timeout 5 --programbox 20 80 U_CONNECTED="connected" U_SERVER_FULL="$ALT_SERVER" U_TIME=$(date +"%m/%d/%Y %H:%M:%S") else U_CONNECTED="error during disconnection" U_SERVER_FULL="--" U_TIME="--" fi fi ;; esac ;; 3 ) check_sudo if [ $? = "0" ] then disconnect_server if [ "$KILLED" = "true" ] then get_userinfo else U_CONNECTED="error during disconnection" U_SERVER_FULL="--" U_TIME="--" fi if [ -p "/tmp/.eddie_fifo1" ] then rm "/tmp/.eddie_fifo1" fi if [ -p "/tmp/.eddie_fifo2" ] then rm "/tmp/.eddie_fifo2" fi fi ;; 4 ) get_userinfo ;; 5 ) pgrep -f mono.*eddie-ui &> /dev/null if [ $? = 0 ] then dialog --backtitle "$BACKTITLE" --title "Toggle Network Lock" --timeout 3 --msgbox "You need to be disconnected to change network traffic rules." 10 35 else if [ "$LOCK_ACTIVE" = "inactive" ] then yesno "Toggle Network Lock" "Are you sure you want to activate the default network lock and block all connections while not connected to (any) VPN?" case $EXIT_STATUS in $DIALOG_CANCEL|$DIALOG_ESC) ;; $DIALOG_OK) check_sudo if [ $? = "0" ] then define_lock "activate" fi ;; esac else yesno "Toggle Network Lock" "Are you sure you want to deactivate the default network lock and allow all connections, even when not connected to a VPN?" case $EXIT_STATUS in $DIALOG_CANCEL|$DIALOG_ESC) ;; $DIALOG_OK) check_sudo if [ $? = "0" ] then define_lock "deactivate" fi ;; esac fi fi ;; esac done clear
  9. Hello! I use Eddie for OSX on 10.13 and I'm trying to also use Zerotier One, because of other reasons not relevant in here. The thing is that the moment I activate Eddie the connection to Zerotier is lost. It may connect after a while (from 24 to 48 hs later) and everytime I reconnect with Eddie the same happens. I contacted the people from Zerotier and they told that maybe the VPN is blocking UDP ports. Zerotier creates a feth/ipv4 interface. I'm not a genius with networking, sorry for that ;·) Is there a something that I can do to improve the performance of Zerotier while using Eddie, or if there is an alternative way of using it like making Zerotier bypass the VPN? I can provide all the necessary information and make tests, but for the moment I'm a little bit lost. Any help will be appreciate it, thanks in advance. For more information, IPV6 is not being used.
  10. Hi there, A couple of times I've been torrenting overnight & found in the morning that Eddie was off & my internet was not blocked. Which is cause for concern... So today I upgraded Eddie to 2.18.9 & for the first time installed Hummingbird (I use MX Linux running sysv init). I have IPv6 blocked at the GRUB kernel line (& /etc/hosts for all its worth) & via the Eddie GUI interface as well. I believe that due to IPv6 being blocked I get a Hummingbird warning as follows (taken from the Eddie System Report) when I start Eddie: . 2020.09.21 12:21:54 - Elevated: __Shell, stderr: RTNETLINK answers: Operation not supported W 2020.09.21 12:21:54 - Routes, add 2606:6080:1002:7:def:437f:f6fa:7759 for gateway fde6:7a:7d20:1402::1 failed: Exception: RTNETLINK answers: Operation not supported This error doesn't really bother me, what does, is that the Eddie tray icon remains grey due to this warning (I think that's why, as in my ignorance I can see no other problems when I read the system report). Is there a way to get that tray icon to function properly - display blue when it is connected & grey when not? As I find that to be such a quick visual validation of what is happening with Eddie/Hummingbird. I made a conky script to display my external IP on desktop 1. only. As that is where I want to see it. This is nowhere near as good as the tray icon, as it is only hidden when I watch a video. Thanks for your time.
  11. So, yesterday night I logged in on airvpn to check the remaining time of my subscription and I randomly navigated through the forums to see what's new. And to my surprise I found that Eddie is on 2.14.4 version, while the version I was using was 2.10. And this has troubled me ever since. Is there a reason why there isn't an autoupdate/check for updates feature on Eddie? To my knowledge, even the most basic/indie/FOSS programs have a "check for update" option implemented. I would like to know the reasoning behind this. Thank you!
  12. When will the Eddie app on Android be updated again?😤 The latest update is from June 2019.
  13. I cannot have eddie's netlock feature working in a qube in Qubes OS 4. When trying to enable it within eddie-ui, I get a pop-up "Exception: Unable to initialize iptable_filter module". The same with the cli: $ eddie-ui -cli -netlock (...) Activation of Network Lock - Linux iptables Exception: Unable to initialize iptable_filter module (...) This behavior was observed both in a Debian 10 qube and in a Fedora 32 qube. I don't get this error in a Debian 10 installed over bare metal. eddie ver. 2.18.9
  14. Lately I get a lot of "netsh" errors, cannot connect to several servers (Canada).
  15. Here is the stack trace log to this problem: http://dpaste.com/1J8JFNS Kernel: 4.15.0-43-generic x86_64 (64 bit gcc: 5.4.0) Desktop: MATE 1.18.0 (Gtk 3.18.9-1ubuntu3.3) info: mate-panel dm: lightdm Distro: Linux Mint 18.3 Sylvia I do not know exactly when this problem started, but it is easily reproduced by exiting the client, that's all. Eddie has always been a little moody on my my machine. For example, if I disconnected from my modem or just turned off my ethernet connection in Network Manager or elsewhere before eddie was finished quitting, Eddie would freeze during exit and I would check in top see that xorg or mono would be at 100% cpu. Only way to get past it would be to ctrl-alt-bkspace or reboot from the terminal. A little worried by what is actually happening when my system freezes in this way. The log mentions something about raise.c not being found. Should I go back to 2.16? Please advise. I will post a trouble ticket if necessary but I figured someone else out there might be having this happening too.
  16. Hello, As the title suggests, I'm having issues with Eddie for Win10. The software works like a charm, I never had any problem with it. The only issue, if this deserves this name, is that everytime I shut down the computer, I have to manually close Eddie. When trying to automatically shutdown, the system complains saying that this software is preventing Win10 from shutting down properly. So, is there any configuration or setting I should modify to shut it down cleanly and automatically when I shut down windows or is just another security measure to prevent leakings? Thank you
  17. Hello. I recently looked for the newest servers (In hopes of finding one not being blocked yet by VPN blocklists). Unfortunately the servers I saw recently added isn't on the list. I tried refreshing (With the button in the bottom right in the server list). I also tried changing "Servers list update every" to "Every minute". I also tried switching between Stable and Beta Update channels. Nu luck. One of the servers I can't find is: https://airvpn.org/servers/alruba/ I also attached a screenshot of the country list. The server I was looking for is in Estonia, which is not on the list. Any suggestions to what I can try?
  18. Hello. Whenever I boot my computer, I have a few seconds where my internet works perfectly with my own IP. If I am quick, I can open my browser and find my own IP showing up. This means that all applications running before Eddie will leak my IP. Only a few seconds after when Eddie starts is the Killswitch active.. Does anyone know how I can have the killswitch working all the time? Even when Eddie isn't running? :)
  19. hi, over the last two days i have had real difficulty using the airvpn client. it remains stuck on the checking authorization phase and does not progress. i have to keep killing the process and retrying it in order to get a secure connection. anyone facing similar issues? any solutions? thanks
  20. Hi I like to choose only one favourite server (with the green tick), so the server list has one server. What happens if i choose "lock current" and then that server is removed for maintenance. What does Eddie do next... does the server list become populated (caused by my green ticked server gone) and Eddie choose a random server? Or will Eddie stay disconnected with the server list be empty... until i choose a new favourite by green ticking a server so the list has a server in it? Thanks
  21. While Eddie says I'm connected my computer thinks otherwise. Can someone help me with this? Here's my log! Eddie System/Environment Report - 25.04.2020 - 17:48 UTC Eddie version: 2.18.9 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Home OS version: Microsoft Windows NT 10.0.18363.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN driver: 0901: 9.24.2; wintun: Not found OpenVPN: 2.4.8 - OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: () SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) curl: 7.68.0 (C:\Program Files\AirVPN\curl.exe) Profile path: C:\Users\onurd\AppData\Local\Eddie\default.profile Data path: C:\Users\onurd\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (1 args) path="home" Network Lock Active: No Connected to VPN: No Detected DNS: 10.106.4.20 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 83 ms Test Ping IPv6: -1 ms Test HTTP IPv4: Ok Test HTTP IPv6: Error:curl: (7) Failed to connect to 2a03:b0c0:2:d0::11b4:6001 port 80: Network unreachable Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True netlock: True dns.check: False network.ipv6.mode: in-out windows.workarounds: True ---------------------------- Logs: . 2020.04.25 20:16:01 - Eddie version: 2.18.9 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.18363.0, Mono/.Net: v4.0.30319 . 2020.04.25 20:16:01 - Command line arguments (1): path="home" . 2020.04.25 20:16:01 - Profile path: C:\Users\onurd\AppData\Local\Eddie\default.profile . 2020.04.25 20:16:02 - Reading options from C:\Users\onurd\AppData\Local\Eddie\default.profile . 2020.04.25 20:16:03 - Tun Driver - 0901: 9.24.2; wintun: Not found . 2020.04.25 20:16:03 - OpenVPN - Version: 2.4.8 - OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2020.04.25 20:16:03 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe) . 2020.04.25 20:16:03 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) . 2020.04.25 20:16:03 - curl - Version: 7.68.0 (C:\Program Files\AirVPN\curl.exe) ! 2020.04.25 20:16:03 - Activation of Network Lock - Windows Filtering Platform I 2020.04.25 20:16:03 - Ready . 2020.04.25 20:16:04 - Collect information about AirVPN completed I 2020.04.25 20:16:09 - Session starting. . 2020.04.25 20:16:09 - Waiting for latency tests (71 to go) . 2020.04.25 20:16:10 - Waiting for latency tests (70 to go) . 2020.04.25 20:16:11 - Waiting for latency tests (46 to go) . 2020.04.25 20:16:14 - Waiting for latency tests (21 to go) I 2020.04.25 20:16:17 - Checking authorization ... ! 2020.04.25 20:16:18 - Connecting to Sheliak (Netherlands, Alblasserdam) . 2020.04.25 20:16:18 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.04.25 20:16:18 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.04.25 20:16:18 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.04.25 20:16:18 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.25 20:16:18 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.25 20:16:18 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.25 20:16:18 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.25 20:16:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.116:443 . 2020.04.25 20:16:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.04.25 20:16:18 - OpenVPN > UDP link local: (not bound) . 2020.04.25 20:16:18 - OpenVPN > UDP link remote: [AF_INET]213.152.162.116:443 . 2020.04.25 20:16:18 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.116:443, sid=ba873f7d b3c1ab7d . 2020.04.25 20:16:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.04.25 20:16:18 - OpenVPN > VERIFY KU OK . 2020.04.25 20:16:18 - OpenVPN > Validating certificate extended key usage . 2020.04.25 20:16:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.04.25 20:16:18 - OpenVPN > VERIFY EKU OK . 2020.04.25 20:16:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sheliak, emailAddress=info@airvpn.org . 2020.04.25 20:16:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.04.25 20:16:19 - OpenVPN > [Sheliak] Peer Connection Initiated with [AF_INET]213.152.162.116:443 . 2020.04.25 20:16:20 - OpenVPN > SENT CONTROL [Sheliak]: 'PUSH_REQUEST' (status=1) . 2020.04.25 20:16:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.30.58.1,dhcp-option DNS6 fde6:7a:7d20:1a3a::1,tun-ipv6,route-gateway 10.30.58.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1a3a::1063/64 fde6:7a:7d20:1a3a::1,ifconfig 10.30.58.101 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2020.04.25 20:16:20 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.04.25 20:16:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.04.25 20:16:20 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.04.25 20:16:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.04.25 20:16:20 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.04.25 20:16:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.04.25 20:16:20 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.04.25 20:16:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.04.25 20:16:20 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.04.25 20:16:20 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.04.25 20:16:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.04.25 20:16:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.04.25 20:16:20 - OpenVPN > interactive service msg_channel=0 . 2020.04.25 20:16:20 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 I=11 HWADDR=1e:35:05:6d:58:7b . 2020.04.25 20:16:20 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.04.25 20:16:20 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Eleman bulunamad�. (code=1168) . 2020.04.25 20:16:20 - OpenVPN > ROUTE6: default_gateway=UNDEF . 2020.04.25 20:16:20 - OpenVPN > open_tun . 2020.04.25 20:16:20 - OpenVPN > TAP-WIN32 device [Yerel Ağ Bağlantısı] opened: \\.\Global\{81E4C43A-3C71-4A1C-8A2B-DC30665D40CF}.tap . 2020.04.25 20:16:20 - OpenVPN > TAP-Windows Driver Version 9.24 . 2020.04.25 20:16:20 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.30.58.0/10.30.58.101/255.255.255.0 [SUCCEEDED] . 2020.04.25 20:16:20 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.30.58.101/255.255.255.0 on interface {81E4C43A-3C71-4A1C-8A2B-DC30665D40CF} [DHCP-serv: 10.30.58.254, lease-time: 31536000] . 2020.04.25 20:16:20 - OpenVPN > Successful ARP Flush on interface [16] {81E4C43A-3C71-4A1C-8A2B-DC30665D40CF} . 2020.04.25 20:16:21 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=16 fde6:7a:7d20:1a3a::1063 store=active . 2020.04.25 20:16:22 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns Yerel Ağ Bağlantısı static fde6:7a:7d20:1a3a::1 validate=no . 2020.04.25 20:16:23 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1a3a::/64 -> fde6:7a:7d20:1a3a::1063 metric 0) dev Yerel Ağ Bağlantısı . 2020.04.25 20:16:23 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1a3a::/64 interface=16 fe80::8 store=active . 2020.04.25 20:16:23 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.04.25 20:16:28 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.04.25 20:16:28 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.116 MASK 255.255.255.255 192.168.43.1 . 2020.04.25 20:16:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2020.04.25 20:16:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.04.25 20:16:28 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.30.58.1 . 2020.04.25 20:16:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.04.25 20:16:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.04.25 20:16:28 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.30.58.1 . 2020.04.25 20:16:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.04.25 20:16:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.04.25 20:16:28 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1a3a::1 metric -1) dev Yerel Ağ Bağlantısı . 2020.04.25 20:16:28 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route ::/3 interface=16 fe80::8 store=active . 2020.04.25 20:16:28 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.04.25 20:16:28 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1a3a::1 metric -1) dev Yerel Ağ Bağlantısı . 2020.04.25 20:16:28 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 2000::/4 interface=16 fe80::8 store=active . 2020.04.25 20:16:28 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.04.25 20:16:28 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1a3a::1 metric -1) dev Yerel Ağ Bağlantısı . 2020.04.25 20:16:28 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 3000::/4 interface=16 fe80::8 store=active . 2020.04.25 20:16:28 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.04.25 20:16:28 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1a3a::1 metric -1) dev Yerel Ağ Bağlantısı . 2020.04.25 20:16:28 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fc00::/7 interface=16 fe80::8 store=active . 2020.04.25 20:16:28 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.04.25 20:16:28 - Interface Yerel Ağ Bağlantısı metric changed from Automatic to 3, layer IPv4 . 2020.04.25 20:16:28 - Interface Yerel Ağ Bağlantısı metric changed from Automatic to 3, layer IPv6 . 2020.04.25 20:16:28 - DNS leak protection with packet filtering enabled. . 2020.04.25 20:16:28 - Routes, added a new route, 213.152.162.114 for gateway 10.30.58.1 . 2020.04.25 20:16:28 - Routes, added a new route, 2a00:1678:2470:36:13be:ff37:bd4a:7c35 for gateway fde6:7a:7d20:1a3a::1 . 2020.04.25 20:16:28 - Flushing DNS I 2020.04.25 20:16:32 - Checking route IPv4 I 2020.04.25 20:16:32 - Checking route IPv6 ! 2020.04.25 20:16:36 - Connected. . 2020.04.25 20:16:36 - OpenVPN > Initialization Sequence Completed ! 2020.04.25 20:24:03 - Disconnecting . 2020.04.25 20:24:03 - Routes, removed a route previously added, 213.152.162.114 for gateway 10.30.58.1 . 2020.04.25 20:24:03 - Routes, removed a route previously added, 2a00:1678:2470:36:13be:ff37:bd4a:7c35 for gateway fde6:7a:7d20:1a3a::1 . 2020.04.25 20:24:03 - Sending soft termination signal . 2020.04.25 20:24:06 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.04.25 20:24:08 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.116 MASK 255.255.255.255 192.168.43.1 . 2020.04.25 20:24:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.04.25 20:24:08 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.30.58.1 . 2020.04.25 20:24:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.04.25 20:24:08 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.30.58.1 . 2020.04.25 20:24:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.04.25 20:24:08 - OpenVPN > delete_route_ipv6(::/3) . 2020.04.25 20:24:08 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route ::/3 interface=16 fe80::8 store=active . 2020.04.25 20:24:08 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.04.25 20:24:08 - OpenVPN > delete_route_ipv6(2000::/4) . 2020.04.25 20:24:08 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=16 fe80::8 store=active . 2020.04.25 20:24:08 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.04.25 20:24:08 - OpenVPN > delete_route_ipv6(3000::/4) . 2020.04.25 20:24:08 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=16 fe80::8 store=active . 2020.04.25 20:24:08 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.04.25 20:24:08 - OpenVPN > delete_route_ipv6(fc00::/7) . 2020.04.25 20:24:08 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=16 fe80::8 store=active . 2020.04.25 20:24:08 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.04.25 20:24:08 - OpenVPN > Closing TUN/TAP interface . 2020.04.25 20:24:08 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1a3a::/64) . 2020.04.25 20:24:08 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1a3a::/64 interface=16 fe80::8 store=active . 2020.04.25 20:24:09 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address Yerel Ağ Bağlantısı fde6:7a:7d20:1a3a::1063 store=active . 2020.04.25 20:24:11 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns Yerel Ağ Bağlantısı all . 2020.04.25 20:24:11 - OpenVPN > TAP: DHCP address released . 2020.04.25 20:24:11 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.04.25 20:24:11 - Connection terminated. . 2020.04.25 20:24:11 - DNS leak protection with packet filtering disabled. . 2020.04.25 20:24:11 - Interface Yerel Ağ Bağlantısı metric restored from 3 to Automatic, layer IPv4 . 2020.04.25 20:24:11 - Interface Yerel Ağ Bağlantısı metric restored from 3 to Automatic, layer IPv6 . 2020.04.25 20:24:11 - Flushing DNS ! 2020.04.25 20:24:14 - Session terminated. I 2020.04.25 20:24:41 - Session starting. I 2020.04.25 20:24:42 - Checking authorization ... I 2020.04.25 20:25:06 - Cancel requested. ! 2020.04.25 20:25:06 - Session terminated. ! 2020.04.25 20:25:08 - Deactivation of Network Lock ! 2020.04.25 20:25:13 - Activation of Network Lock - Windows Filtering Platform I 2020.04.25 20:25:16 - Session starting. I 2020.04.25 20:25:16 - Checking authorization ... ! 2020.04.25 20:25:17 - Connecting to Subra (Netherlands, Alblasserdam) . 2020.04.25 20:25:17 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.04.25 20:25:17 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.04.25 20:25:17 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.04.25 20:25:17 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.25 20:25:17 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.25 20:25:17 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.25 20:25:17 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.25 20:25:17 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.101:443 . 2020.04.25 20:25:17 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.04.25 20:25:17 - OpenVPN > UDP link local: (not bound) . 2020.04.25 20:25:17 - OpenVPN > UDP link remote: [AF_INET]213.152.162.101:443 . 2020.04.25 20:25:17 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.101:443, sid=a481600b 96d8cdc2 . 2020.04.25 20:25:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.04.25 20:25:19 - OpenVPN > VERIFY KU OK . 2020.04.25 20:25:19 - OpenVPN > Validating certificate extended key usage . 2020.04.25 20:25:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.04.25 20:25:19 - OpenVPN > VERIFY EKU OK . 2020.04.25 20:25:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Subra, emailAddress=info@airvpn.org . 2020.04.25 20:25:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.04.25 20:25:27 - OpenVPN > [Subra] Peer Connection Initiated with [AF_INET]213.152.162.101:443 . 2020.04.25 20:25:28 - OpenVPN > SENT CONTROL [Subra]: 'PUSH_REQUEST' (status=1) . 2020.04.25 20:25:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.30.226.1,dhcp-option DNS6 fde6:7a:7d20:1ae2::1,tun-ipv6,route-gateway 10.30.226.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1ae2::1097/64 fde6:7a:7d20:1ae2::1,ifconfig 10.30.226.153 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2020.04.25 20:25:29 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.04.25 20:25:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.04.25 20:25:29 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.04.25 20:25:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.04.25 20:25:29 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.04.25 20:25:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.04.25 20:25:29 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.04.25 20:25:29 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.04.25 20:25:29 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.04.25 20:25:29 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.04.25 20:25:29 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.04.25 20:25:29 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.04.25 20:25:29 - OpenVPN > interactive service msg_channel=0 . 2020.04.25 20:25:29 - OpenVPN > ROUTE_GATEWAY 10.34.104.1/255.255.252.0 I=11 HWADDR=86:d9:01:ae:34:63 . 2020.04.25 20:25:29 - OpenVPN > ROUTE: bypass_host_route[0]=1.1.1.1 . 2020.04.25 20:25:29 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2020.04.25 20:25:29 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Eleman bulunamad�. (code=1168) . 2020.04.25 20:25:29 - OpenVPN > ROUTE6: default_gateway=UNDEF . 2020.04.25 20:25:29 - OpenVPN > open_tun . 2020.04.25 20:25:29 - OpenVPN > TAP-WIN32 device [Yerel Ağ Bağlantısı] opened: \\.\Global\{81E4C43A-3C71-4A1C-8A2B-DC30665D40CF}.tap . 2020.04.25 20:25:29 - OpenVPN > TAP-Windows Driver Version 9.24 . 2020.04.25 20:25:29 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.30.226.0/10.30.226.153/255.255.255.0 [SUCCEEDED] . 2020.04.25 20:25:29 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.30.226.153/255.255.255.0 on interface {81E4C43A-3C71-4A1C-8A2B-DC30665D40CF} [DHCP-serv: 10.30.226.254, lease-time: 31536000] . 2020.04.25 20:25:29 - OpenVPN > Successful ARP Flush on interface [16] {81E4C43A-3C71-4A1C-8A2B-DC30665D40CF} . 2020.04.25 20:25:30 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address interface=16 fde6:7a:7d20:1ae2::1097 store=active . 2020.04.25 20:25:31 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set dns Yerel Ağ Bağlantısı static fde6:7a:7d20:1ae2::1 validate=no . 2020.04.25 20:25:31 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1ae2::/64 -> fde6:7a:7d20:1ae2::1097 metric 0) dev Yerel Ağ Bağlantısı . 2020.04.25 20:25:31 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1ae2::/64 interface=16 fe80::8 store=active . 2020.04.25 20:25:31 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.04.25 20:25:36 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.04.25 20:25:36 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.101 MASK 255.255.255.255 10.34.104.1 . 2020.04.25 20:25:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2020.04.25 20:25:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.04.25 20:25:36 - OpenVPN > C:\Windows\system32\route.exe ADD 1.1.1.1 MASK 255.255.255.255 10.34.104.1 . 2020.04.25 20:25:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4 . 2020.04.25 20:25:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.04.25 20:25:36 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.30.226.1 . 2020.04.25 20:25:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.04.25 20:25:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.04.25 20:25:36 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.30.226.1 . 2020.04.25 20:25:36 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.04.25 20:25:36 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.04.25 20:25:36 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1ae2::1 metric -1) dev Yerel Ağ Bağlantısı . 2020.04.25 20:25:36 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route ::/3 interface=16 fe80::8 store=active . 2020.04.25 20:25:36 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.04.25 20:25:36 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1ae2::1 metric -1) dev Yerel Ağ Bağlantısı . 2020.04.25 20:25:36 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 2000::/4 interface=16 fe80::8 store=active . 2020.04.25 20:25:36 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.04.25 20:25:36 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1ae2::1 metric -1) dev Yerel Ağ Bağlantısı . 2020.04.25 20:25:36 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route 3000::/4 interface=16 fe80::8 store=active . 2020.04.25 20:25:36 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.04.25 20:25:36 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1ae2::1 metric -1) dev Yerel Ağ Bağlantısı . 2020.04.25 20:25:36 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fc00::/7 interface=16 fe80::8 store=active . 2020.04.25 20:25:36 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.04.25 20:25:36 - Interface Yerel Ağ Bağlantısı metric changed from Automatic to 3, layer IPv4 . 2020.04.25 20:25:36 - Interface Yerel Ağ Bağlantısı metric changed from Automatic to 3, layer IPv6 . 2020.04.25 20:25:36 - DNS leak protection with packet filtering enabled. . 2020.04.25 20:25:36 - Routes, added a new route, 213.152.162.99 for gateway 10.30.226.1 . 2020.04.25 20:25:36 - Routes, added a new route, 2a00:1678:2470:33:d3c3:e135:8475:645f for gateway fde6:7a:7d20:1ae2::1 . 2020.04.25 20:25:36 - Flushing DNS I 2020.04.25 20:25:40 - Checking route IPv4 . 2020.04.25 20:26:00 - curl: (28) Operation timed out after 20001 milliseconds with 0 out of 0 bytes received . 2020.04.25 20:26:00 - Checking route (2° try) . 2020.04.25 20:26:21 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received . 2020.04.25 20:26:21 - Checking route (3° try) I 2020.04.25 20:26:40 - Checking route IPv6 . 2020.04.25 20:27:00 - curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received . 2020.04.25 20:27:00 - Checking route (2° try) . 2020.04.25 20:27:21 - curl: (28) Operation timed out after 20014 milliseconds with 0 bytes received . 2020.04.25 20:27:21 - Checking route (3° try) E 2020.04.25 20:27:37 - curl: (35) error:1408F10B:SSL routines:ssl3_get_record:wrong version number ! 2020.04.25 20:27:37 - Connected. . 2020.04.25 20:27:37 - OpenVPN > Initialization Sequence Completed . 2020.04.25 20:47:33 - Cannot retrieve information about AirVPN: curl: (28) Operation timed out after 20006 milliseconds with 1921 out of 118944 bytes received ! 2020.04.25 20:47:35 - Disconnecting . 2020.04.25 20:47:35 - Routes, removed a route previously added, 213.152.162.99 for gateway 10.30.226.1 . 2020.04.25 20:47:35 - Routes, removed a route previously added, 2a00:1678:2470:33:d3c3:e135:8475:645f for gateway fde6:7a:7d20:1ae2::1 . 2020.04.25 20:47:35 - Sending soft termination signal . 2020.04.25 20:47:38 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.04.25 20:47:40 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.101 MASK 255.255.255.255 10.34.104.1 . 2020.04.25 20:47:40 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.04.25 20:47:40 - OpenVPN > C:\Windows\system32\route.exe DELETE 1.1.1.1 MASK 255.255.255.255 10.34.104.1 . 2020.04.25 20:47:40 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.04.25 20:47:40 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.30.226.1 . 2020.04.25 20:47:40 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.04.25 20:47:40 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.30.226.1 . 2020.04.25 20:47:40 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2020.04.25 20:47:40 - OpenVPN > delete_route_ipv6(::/3) . 2020.04.25 20:47:40 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route ::/3 interface=16 fe80::8 store=active . 2020.04.25 20:47:40 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.04.25 20:47:40 - OpenVPN > delete_route_ipv6(2000::/4) . 2020.04.25 20:47:40 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=16 fe80::8 store=active . 2020.04.25 20:47:40 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.04.25 20:47:40 - OpenVPN > delete_route_ipv6(3000::/4) . 2020.04.25 20:47:40 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=16 fe80::8 store=active . 2020.04.25 20:47:40 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.04.25 20:47:41 - OpenVPN > delete_route_ipv6(fc00::/7) . 2020.04.25 20:47:41 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=16 fe80::8 store=active . 2020.04.25 20:47:41 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2020.04.25 20:47:41 - OpenVPN > Closing TUN/TAP interface . 2020.04.25 20:47:41 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1ae2::/64) . 2020.04.25 20:47:41 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1ae2::/64 interface=16 fe80::8 store=active . 2020.04.25 20:47:42 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address Yerel Ağ Bağlantısı fde6:7a:7d20:1ae2::1097 store=active . 2020.04.25 20:47:43 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns Yerel Ağ Bağlantısı all . 2020.04.25 20:47:43 - OpenVPN > TAP: DHCP address released . 2020.04.25 20:47:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.04.25 20:47:43 - Connection terminated. . 2020.04.25 20:47:43 - DNS leak protection with packet filtering disabled. . 2020.04.25 20:47:43 - Interface Yerel Ağ Bağlantısı metric restored from 3 to Automatic, layer IPv4 . 2020.04.25 20:47:43 - Interface Yerel Ağ Bağlantısı metric restored from 3 to Automatic, layer IPv6 . 2020.04.25 20:47:43 - Flushing DNS ! 2020.04.25 20:47:46 - Session terminated. ! 2020.04.25 20:47:47 - Deactivation of Network Lock ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "interface": "{4F4575E6-4C9C-4428-BA18-E33502D21079}", "gateway": "10.34.104.1", "metric": "50" }, { "address": "10.34.104.0\/22", "interface": "{4F4575E6-4C9C-4428-BA18-E33502D21079}", "gateway": "link", "metric": "306" }, { "address": "10.34.104.248", "interface": "{4F4575E6-4C9C-4428-BA18-E33502D21079}", "gateway": "link", "metric": "306" }, { "address": "10.34.107.255", "interface": "{4F4575E6-4C9C-4428-BA18-E33502D21079}", "gateway": "link", "metric": "306" }, { "address": "127.0.0.0\/8", "interface": "{9B7F9960-B923-11E9-BB96-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.0.0.1", "interface": "{9B7F9960-B923-11E9-BB96-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.255.255.255", "interface": "{9B7F9960-B923-11E9-BB96-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "224.0.0.0\/4", "interface": "{9B7F9960-B923-11E9-BB96-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "224.0.0.0\/4", "interface": "{4F4575E6-4C9C-4428-BA18-E33502D21079}", "gateway": "link", "metric": "306" }, { "address": "255.255.255.255", "interface": "{9B7F9960-B923-11E9-BB96-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "255.255.255.255", "interface": "{4F4575E6-4C9C-4428-BA18-E33502D21079}", "gateway": "link", "metric": "306" }, { "address": "::1", "interface": "{9B7F9960-B923-11E9-BB96-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "fe80::\/64", "interface": "{4F4575E6-4C9C-4428-BA18-E33502D21079}", "gateway": "link", "metric": "306" }, { "address": "fe80::9174:8ed1:3c38:a7c0", "interface": "{4F4575E6-4C9C-4428-BA18-E33502D21079}", "gateway": "link", "metric": "306" }, { "address": "ff00::\/8", "interface": "{9B7F9960-B923-11E9-BB96-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "ff00::\/8", "interface": "{4F4575E6-4C9C-4428-BA18-E33502D21079}", "gateway": "link", "metric": "306" } ], "interfaces": [ { "friendly": "Ethernet", "id": "{857EABA8-FD1F-4688-86FF-F43C7A95D1C3}", "name": "Ethernet", "description": "Killer E3000 2.5 Gigabit Ethernet Controller", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::284c:23f4:14e8:6d49", "169.254.109.73" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Yerel A\u011f Ba\u011flant\u0131s\u0131", "id": "{81E4C43A-3C71-4A1C-8A2B-DC30665D40CF}", "name": "Yerel A\u011f Ba\u011flant\u0131s\u0131", "description": "TAP-Windows Adapter V9", "type": "53", "status": "Down", "bytes_received": "135831270", "bytes_sent": "10376388", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::2df1:2144:c24d:6d9a", "169.254.109.154" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Yerel A\u011f Ba\u011flant\u0131s\u0131* 1", "id": "{D20CE92B-233B-4FE0-8126-326DB434603C}", "name": "Yerel A\u011f Ba\u011flant\u0131s\u0131* 1", "description": "Microsoft Wi-Fi Direct Virtual Adapter", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::c464:adac:cf8:fcf0", "169.254.252.240" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Yerel A\u011f Ba\u011flant\u0131s\u0131* 10", "id": "{0210B37E-28F9-43B7-B2E1-679EE958D1AB}", "name": "Yerel A\u011f Ba\u011flant\u0131s\u0131* 10", "description": "Microsoft Wi-Fi Direct Virtual Adapter #2", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::3c:7d05:9a91:4078", "169.254.64.120" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Wi-Fi", "id": "{4F4575E6-4C9C-4428-BA18-E33502D21079}", "name": "Wi-Fi", "description": "Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz", "type": "Wireless80211", "status": "Up", "bytes_received": "927675", "bytes_sent": "1905021", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::9174:8ed1:3c38:a7c0", "10.34.104.248" ], "gateways": [ "10.34.104.1" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Bluetooth A\u011f Ba\u011flant\u0131s\u0131", "id": "{3E913861-E120-471D-982E-EF1E115901C7}", "name": "Bluetooth A\u011f Ba\u011flant\u0131s\u0131", "description": "Bluetooth Device (Personal Area Network)", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::8d71:78c0:50b4:4e78", "169.254.78.120" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{9B7F9960-B923-11E9-BB96-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "gateways": [], "bind": true, "dns4": "", "dns6": null } ], "ipv4-default-gateway": "10.34.104.1", "ipv4-default-interface": "{4F4575E6-4C9C-4428-BA18-E33502D21079}" } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : onurduran Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Mixed IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : kykwifi.com Ethernet adapter Ethernet: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Killer E3000 2.5 Gigabit Ethernet Controller Physical Address. . . . . . . . . : 30-65-EC-C5-72-14 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Unknown adapter Yerel A§ Ba§lants: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-81-E4-C4-3A DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Yerel A§ Ba§lants* 1: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter Physical Address. . . . . . . . . : 48-A4-72-52-60-AD DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Yerel A§ Ba§lants* 10: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2 Physical Address. . . . . . . . . : 4A-A4-72-52-60-AC DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Wireless LAN adapter Wi-Fi: Connection-specific DNS Suffix . : kykwifi.com Description . . . . . . . . . . . : Killer(R) Wireless-AC 1550i Wireless Network Adapter (9560NGW) 160MHz Physical Address. . . . . . . . . : 86-D9-01-AE-34-63 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::9174:8ed1:3c38:a7c0%11(Preferred) IPv4 Address. . . . . . . . . . . : 10.34.104.248(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.252.0 Lease Obtained. . . . . . . . . . : 25 Nisan 2020 Cumartesi 20:24:27 Lease Expires . . . . . . . . . . : 26 Nisan 2020 Pazar 08:52:03 Default Gateway . . . . . . . . . : 10.34.104.1 DHCP Server . . . . . . . . . . . : 1.1.1.1 DHCPv6 IAID . . . . . . . . . . . : 193386753 DHCPv6 Client DUID. . . . . . . . : 00-03-00-01-86-D9-01-AE-34-63 DNS Servers . . . . . . . . . . . : 10.106.4.20 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Bluetooth A§ Ba§lants: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) Physical Address. . . . . . . . . : 48-A4-72-52-60-B0 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes
  22. Hi, My operating system is Antix v.17, 32 bit (a lightweight Debian - Stretch based distro, with no systemd). For network managers, I have ceni and wicd. Firefox and Thunderbird are my primary internet applications. The system works very nicely, and will connect directly, or via AirVPN (using Eddie v.2.16.3). It also works well with the Windscribe cli application for Debian Linux. However, not long ago, I installed firejail (v.0.9.60) and apparmor. My practice is to run Firefox and Thunderbird in separate firejails. However, when either VPN (AirVPN or Windscribe) is active, there is no internet connection to either firejailed program. (Only one instance of Firefox runs at a time, either inside or outside of firejail.) I visited the firejail github support site. Apparently, there are ways to make firejail work with a vpn, but it's a bit confusing to me. I am relatively new to Linux... beginning to find my way around. But I have very limited understanding about network routing and configuration. I have also experimented with a couple of other openvpn VPN providers (both with Eddie v.2.18.7 and with direct openvpn connection). One of those services appears to form a tunnel, but the browser (not in firejail) did not find and use the new ip. At this point, I'll stick with AirVPN (and Windscribe, if I really need a server in a country that Air doesn't cover). Can you steer me in the right direction? Your help will be much appreciated!
  23. If you're running AirVPN on Linux you probably don't want to have to type your sudo password in each time it runs. Why? If you're auto-starting it, you want your network lock and VPN connection to happen as soon as you login. Here's what I did for Ubuntu (Actually Kubuntu)... Install gksu (sudo apt install gksu) Add AirVPN to your autostart list and for command use gksudo /usr/bin/airvpn Run sudo nano /usr/share/applications/AirVPN.desktop and change the command to gksudo /usr/bin/airvpn Edit the AirVPN entry in your application launcher and change the command to gksudo /usr/bin/airvpn Run sudo visudo and add the line %airvpn ALL=(ALL:ALL) NOPASSWD: /usr/bin/airvpn after all other rules (Press Ctrl+x and then Enter to exit and save). Run sudo groupadd airvpn Run sudo usermod -a -G airvpn user replacing "user" with your account's username. You're done. The next time you login (Or start it any any other way) AirVPN will start without entering any password. Note: Your AirVPN settings will be back to default after doing this. Don't worry, just set them again and they'll save.
  24. Hello again. After having my screen off for a bit of time, I'm not sure for how long, my connection to the VPN drops. I think we are talking about having the screen off for an hour or so, I'm not sure. How would I prevent this from happening? I have attached the part of the log which I believe says everything to see what is happening I especially think that these lines from the log can be useful: 01 Jan 2020 17:53:15 UTC [Error] OpenVPN3 KEEPALIVE_TIMEOUT: Eddie Library Session invalidated: KEEPALIVE_TIMEOUT 01 Jan 2020 17:53:15 UTC [Info] VPN error detected. Locking VPN 01 Jan 2020 17:53:15 UTC [Info] Eddie Library: Pausing OpenVPN client 01 Jan 2020 17:53:15 UTC [Info] Eddie Library: OpenVPN client paused 01 Jan 2020 17:53:15 UTC [Info] Successfully locked VPN 01 Jan 2020 17:53:15 UTC [Info] Eddie Library: Client terminated, restarting in 2000 ms... 01 Jan 2020 17:53:15 UTC [Debug] OpenVPN Event: type: 14, name: PAUSE, info: Lock VPN airvpnlog.txt
  25. When I use the KDE VPN tool to add a server - it connects in seconds, but when using the Eddie client under both Linux & Windows, it takes forever to connect or disconnect. Why?
×
×
  • Create New...