Search the Community
Showing results for tags 'dnsleaktest'.
Found 2 results
-
Hi, I am taking the test here https://www.dnsleaktest.com Both 'standard test' and 'extended test' list my AirVPN server along with 1-4 DNS servers of my ISP provider (I can provide screenshot if needed). 'Reset to Default Settings' and reboot was performed before the final test and post here. There is no other VPN installed/used right now. Some info: * Eddie UI Logs: . 2022.03.09 21:15:39 - Eddie version: 2.21.5beta / linux_x64, System: Linux, Name: Arch Linux, Version: Linux myhostname 5.16.13-arch1-1 #1 SMP PREEMPT Tue, 08 Mar 2022 20:07:36 +0000 x86_64 GNU/Linux, Mono/.Net: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319 . 2022.03.09 21:15:39 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2022.03.09 21:15:39 - Raise system privileges . 2022.03.09 21:15:46 - Reading options from /home/myuser/.config/eddie/default.profile . 2022.03.09 21:15:47 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 (/usr/bin/openvpn) . 2022.03.09 21:15:47 - SSH - Version: OpenSSH_8.9p1, OpenSSL 1.1.1m 14 Dec 2021 (/usr/bin/ssh) I 2022.03.09 21:15:47 - SSL - Not available . 2022.03.09 21:15:47 - curl - Version: 7.82.0 (/usr/bin/curl) . 2022.03.09 21:15:47 - Recovery. Unexpected crash? . 2022.03.09 21:15:47 - IPv6 restored on network adapter (eno2) . 2022.03.09 21:15:47 - IPv6 restored on network adapter (ipv6leakintrf0) . 2022.03.09 21:15:47 - IPv6 restored on network adapter (wlo1) ! 2022.03.09 21:15:47 - Deactivation of Network Lock I 2022.03.09 21:15:50 - Ready . 2022.03.09 21:15:51 - Collect information about AirVPN completed I 2022.03.09 21:15:58 - Session starting. I 2022.03.09 21:15:58 - Checking authorization ... W 2022.03.09 21:15:59 - The server supports IPv6, but IPv6 is disabled at OS level. You need to re-enable it manually (reboot is required) or disable this warning by setting Preferences > Networking > Layer IPv6: Block. W 2022.03.09 21:15:59 - 'Preferences > Networking > Layer IPv6' automatically switched to 'Block'. . 2022.03.09 21:15:59 - IPv6 disabled on network adapter (eno2) . 2022.03.09 21:15:59 - IPv6 disabled on network adapter (wlo1) ! 2022.03.09 21:15:59 - Connecting to Lacaille (Singapore, Singapore) . 2022.03.09 21:15:59 - Routes, add 209.58.173.159/32 for interface "eno2". . 2022.03.09 21:15:59 - Routes, add 209.58.173.159/32 for interface "eno2", already exists. . 2022.03.09 21:15:59 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.03.09 21:15:59 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.03.09 21:15:59 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 21:15:59 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 21:15:59 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 21:15:59 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 21:15:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]209.58.173.159:443 . 2022.03.09 21:15:59 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.03.09 21:15:59 - OpenVPN > UDP link local: (not bound) . 2022.03.09 21:15:59 - OpenVPN > UDP link remote: [AF_INET]209.58.173.159:443 . 2022.03.09 21:15:59 - OpenVPN > TLS: Initial packet from [AF_INET]209.58.173.159:443, sid=0ef8b0c3 c6186b17 . 2022.03.09 21:15:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.09 21:15:59 - OpenVPN > VERIFY KU OK . 2022.03.09 21:15:59 - OpenVPN > Validating certificate extended key usage . 2022.03.09 21:15:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.09 21:15:59 - OpenVPN > VERIFY EKU OK . 2022.03.09 21:15:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Lacaille, emailAddress=info@airvpn.org . 2022.03.09 21:16:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.03.09 21:16:00 - OpenVPN > [Lacaille] Peer Connection Initiated with [AF_INET]209.58.173.159:443 . 2022.03.09 21:16:00 - OpenVPN > SENT CONTROL [Lacaille]: 'PUSH_REQUEST' (status=1) . 2022.03.09 21:16:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.28.34.1,dhcp-option DNS6 fde6:7a:7d20:1822::1,tun-ipv6,route-gateway 10.28.34.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1822::1034/64 fde6:7a:7d20:1822::1,ifconfig 10.28.34.54 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2022.03.09 21:16:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.09 21:16:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.28.34.1' . 2022.03.09 21:16:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1822::1' . 2022.03.09 21:16:00 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.09 21:16:00 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:1822::1034/64 fde6:7a:7d20:1822::1' . 2022.03.09 21:16:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.09 21:16:00 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.09 21:16:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.09 21:16:00 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.09 21:16:00 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.09 21:16:00 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.03.09 21:16:00 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.09 21:16:00 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.09 21:16:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 21:16:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 21:16:00 - OpenVPN > TUN/TAP device tun0 opened . 2022.03.09 21:16:00 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.03.09 21:16:00 - OpenVPN > net_iface_up: set tun0 up . 2022.03.09 21:16:00 - OpenVPN > net_addr_v4_add: 10.28.34.54/24 dev tun0 . 2022.03.09 21:16:05 - OpenVPN > Initialization Sequence Completed . 2022.03.09 21:16:06 - DNS of the system updated to VPN DNS (Rename method: /etc/resolv.conf generated) . 2022.03.09 21:16:06 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.03.09 21:16:06 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.03.09 21:16:06 - Routes, add 209.58.173.138/32 for interface "tun0". . 2022.03.09 21:16:06 - Routes, skipped for 2001:df1:800:a00e:4::a44e : IPv6 blocked. . 2022.03.09 21:16:06 - Flushing DNS . 2022.03.09 21:16:06 - Flush DNS - nscd I 2022.03.09 21:16:06 - Checking route IPv4 I 2022.03.09 21:16:07 - Checking DNS ! 2022.03.09 21:16:09 - Connected Eddie's System Report: Eddie System/Environment Report - 3/9/2022 - 7:31 PM UTC Eddie version: 2.21.5beta Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: Arch Linux OS version: Linux myhostname 5.16.13-arch1-1 #1 SMP PREEMPT Tue, 08 Mar 2022 20:07:36 +0000 x86_64 GNU/Linux OS architecture: x64 Mono /.Net Framework: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 (/usr/bin/openvpn) Hummingbird: 3.3.2 - Hummingbird - AirVPN OpenVPN 3 Client 1.1.2 - 4 June 2021 (/usr/local/bin/hummingbird) WireGuard: 1.0.0 SSH: OpenSSH_8.9p1, OpenSSL 1.1.1m 14 Dec 2021 (/usr/bin/ssh) SSL: Not available curl: 7.82.0 (/usr/bin/curl) Profile path: /home/myuser/.config/eddie/default.profile Data path: /home/myuser/.config/eddie Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/eddie-ui.exe Command line arguments: (2 args) path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" Network Lock Active: No Connected to VPN: Yes, Lacaille OS support IPv4: Yes OS support IPv6: No Detected DNS: 10.28.34.1 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 365 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: curl: (7) Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True servers.allowlist: a61744e4ad91aec37c94aeffc2d7344e79400c541b06df8f1d7773b130529191 areas.allowlist: ca,jp,nl,sg,es,br,ie proxy.mode: none network.ipv6.mode: block ---------------------------- Logs: . 2022.03.09 21:30:11 - Eddie version: 2.21.5beta / linux_x64, System: Linux, Name: Arch Linux, Version: Linux myhostname 5.16.13-arch1-1 #1 SMP PREEMPT Tue, 08 Mar 2022 20:07:36 +0000 x86_64 GNU/Linux, Mono/.Net: 6.12.0 (makepkg/c621c35ffa0 Thu Jun 17 02:48:02 PM -03 2021); Framework: v4.0.30319 . 2022.03.09 21:30:11 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" . 2022.03.09 21:30:11 - Raise system privileges . 2022.03.09 21:30:14 - Reading options from /home/myuser/.config/eddie/default.profile . 2022.03.09 21:30:15 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 (/usr/bin/openvpn) . 2022.03.09 21:30:15 - SSH - Version: OpenSSH_8.9p1, OpenSSL 1.1.1m 14 Dec 2021 (/usr/bin/ssh) I 2022.03.09 21:30:15 - SSL - Not available . 2022.03.09 21:30:15 - curl - Version: 7.82.0 (/usr/bin/curl) . 2022.03.09 21:30:15 - DNS of the system restored to original settings (Rename method) . 2022.03.09 21:30:15 - Recovery. Unexpected crash? . 2022.03.09 21:30:15 - IPv6 restored on network adapter (eno2) . 2022.03.09 21:30:15 - IPv6 restored on network adapter (wlo1) I 2022.03.09 21:30:18 - Ready . 2022.03.09 21:30:22 - Collect information about AirVPN completed ! 2022.03.09 21:30:35 - Activation of Network Lock - Linux nftables . 2022.03.09 21:30:35 - Network lock not enabled on IPv6 layer. IPv6 seems disabled at system level. I 2022.03.09 21:30:37 - Session starting. F 2022.03.09 21:30:37 - OpenVPN is already running (/usr/bin/openvpn Resolv.conf: $ cat /etc/resolv.conf # Generated by Eddie v2.21.5beta - https://eddie.website - Wednesday, March 9, 2022 7:31:11 PM UTC nameserver 10.28.34.1 $ cat /etc/resolv.conf.eddie # Generated by NetworkManager search home nameserver 192.168.1.1 NetworkManager: $ tree /etc/NetworkManager/ /etc/NetworkManager/ ├── conf.d ├── dispatcher.d │ ├── no-wait.d │ ├── pre-down.d │ └── pre-up.d ├── dnsmasq.d ├── dnsmasq-shared.d ├── NetworkManager.conf └── system-connections [error opening dir] $ cat /etc/NetworkManager/NetworkManager.conf # Configuration file for NetworkManager. # See "man 5 NetworkManager.conf" for details. Openvpn: $ sudo tree /etc/openvpn/ /etc/openvpn/ ├── client └── server 2 directories, 0 files Networking: $ ip a 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever 2: eno2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000 link/ether 00:00:00:00:00:01 brd ff:ff:ff:ff:ff:ff altname enp0s31f6 inet 192.168.1.2/24 brd 192.168.1.255 scope global dynamic eno2 valid_lft 84892sec preferred_lft 84892sec 3: wlo1: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN group default qlen 1000 link/ether 00:00:00:00:00:02 brd ff:ff:ff:ff:ff:ff permaddr 24:41:8c:ab:a6:ad altname wlp0s20f3 4: virbr0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default qlen 1000 link/ether 00:00:00:00:00:03 brd ff:ff:ff:ff:ff:ff inet 192.168.122.1/24 brd 192.168.122.255 scope global virbr0 valid_lft forever preferred_lft forever 5: virbr2: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default qlen 1000 link/ether 00:00:00:00:00:04 brd ff:ff:ff:ff:ff:ff 6: virbr1: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default qlen 1000 link/ether 00:00:00:00:00:05 brd ff:ff:ff:ff:ff:ff inet 10.0.2.2/24 brd 10.0.2.255 scope global virbr1 valid_lft forever preferred_lft forever 8: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 500 link/none inet 10.28.34.54/24 scope global tun0 valid_lft forever preferred_lft forever $ route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 0.0.0.0 128.0.0.0 U 0 0 0 tun0 0.0.0.0 192.168.1.1 0.0.0.0 UG 100 0 0 eno2 0.0.0.0 192.168.1.1 0.0.0.0 UG 100 0 0 eno2 10.0.2.0 0.0.0.0 255.255.255.0 U 0 0 0 virbr1 10.28.34.0 0.0.0.0 255.255.255.0 U 0 0 0 tun0 128.0.0.0 0.0.0.0 128.0.0.0 U 0 0 0 tun0 192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 eno2 192.168.1.0 0.0.0.0 255.255.255.0 U 100 0 0 eno2 192.168.1.1 0.0.0.0 255.255.255.255 UH 100 0 0 eno2 192.168.122.0 0.0.0.0 255.255.255.0 U 0 0 0 virbr0 209.58.173.138 0.0.0.0 255.255.255.255 UH 0 0 0 tun0 209.58.173.159 192.168.1.1 255.255.255.255 UGH 0 0 0 eno2 $ route -6 Kernel IPv6 routing table Destination Next Hop Flag Met Ref Use If [::]/0 [::] !n -1 1 0 lo [::]/0 [::] !n -1 1 0 lo What else I have tried: Deleted /etc/resolv.conf.eddie Enabling network-lock (doesn't matter I assume, just mentioning) Settings->DNS->DNS Switch Mode: Disabled -> Disconnect -> Connect -> leads to infinite Looping between server pool, can't connect, I assume it fails at "checking DNS" stdout log after setting DNS Switch Mode to Disabled: [...] I 2022.03.09 21:50:25 - Checking authorization ... . 2022.03.09 21:50:26 - IPv6 disabled on network adapter (eno2) . 2022.03.09 21:50:26 - IPv6 disabled on network adapter (wlo1) ! 2022.03.09 21:50:26 - Connecting to Azmidiske (Sweden, Uppsala) . 2022.03.09 21:50:26 - Routes, add 62.102.148.208/32 for interface "eno2". . 2022.03.09 21:50:26 - Routes, add 62.102.148.208/32 for interface "eno2", already exists. . 2022.03.09 21:50:26 - OpenVPN > OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021 . 2022.03.09 21:50:26 - OpenVPN > library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10 . 2022.03.09 21:50:26 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 21:50:26 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 21:50:26 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.03.09 21:50:26 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.03.09 21:50:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.208:443 . 2022.03.09 21:50:26 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992] . 2022.03.09 21:50:26 - OpenVPN > UDP link local: (not bound) . 2022.03.09 21:50:26 - OpenVPN > UDP link remote: [AF_INET]62.102.148.208:443 . 2022.03.09 21:50:26 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.208:443, sid=dab05c11 6caf74dc . 2022.03.09 21:50:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.03.09 21:50:26 - OpenVPN > VERIFY KU OK . 2022.03.09 21:50:26 - OpenVPN > Validating certificate extended key usage . 2022.03.09 21:50:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.03.09 21:50:26 - OpenVPN > VERIFY EKU OK . 2022.03.09 21:50:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Azmidiske, emailAddress=info@airvpn.org . 2022.03.09 21:50:26 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2022.03.09 21:50:26 - OpenVPN > [Azmidiske] Peer Connection Initiated with [AF_INET]62.102.148.208:443 . 2022.03.09 21:50:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.11.34.1,dhcp-option DNS6 fde6:7a:7d20:722::1,tun-ipv6,route-gateway 10.11.34.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:722::1024/64 fde6:7a:7d20:722::1,ifconfig 10.11.34.38 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2022.03.09 21:50:27 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.03.09 21:50:27 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.11.34.1' . 2022.03.09 21:50:27 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:722::1' . 2022.03.09 21:50:27 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2022.03.09 21:50:27 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:722::1024/64 fde6:7a:7d20:722::1' . 2022.03.09 21:50:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.03.09 21:50:27 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.03.09 21:50:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.03.09 21:50:27 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.03.09 21:50:27 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.03.09 21:50:27 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.03.09 21:50:27 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.03.09 21:50:27 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.03.09 21:50:27 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 21:50:27 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.03.09 21:50:27 - OpenVPN > TUN/TAP device tun0 opened . 2022.03.09 21:50:27 - OpenVPN > net_iface_mtu_set: mtu 1500 for tun0 . 2022.03.09 21:50:27 - OpenVPN > net_iface_up: set tun0 up . 2022.03.09 21:50:27 - OpenVPN > net_addr_v4_add: 10.11.34.38/24 dev tun0 . 2022.03.09 21:50:31 - OpenVPN > Initialization Sequence Completed . 2022.03.09 21:50:31 - Routes, add 0.0.0.0/1 for interface "tun0". . 2022.03.09 21:50:31 - Routes, add 128.0.0.0/1 for interface "tun0". . 2022.03.09 21:50:31 - Routes, add 62.102.148.154/32 for interface "tun0". . 2022.03.09 21:50:31 - Routes, skipped for 2a00:1520:27:1:dc5a:b7fa:4950:47c4 : IPv6 blocked. . 2022.03.09 21:50:31 - Flushing DNS . 2022.03.09 21:50:31 - Flush DNS - nscd I 2022.03.09 21:50:31 - Checking route IPv4 I 2022.03.09 21:50:32 - Checking DNS . 2022.03.09 21:50:39 - Checking DNS (4° try) . 2022.03.09 21:50:44 - Checking DNS (5° try) E 2022.03.09 21:50:44 - Checking DNS failed, last reason: Checking DNS failed: ! 2022.03.09 21:50:44 - Disconnecting . 2022.03.09 21:50:44 - Sending soft termination signal . 2022.03.09 21:50:44 - OpenVPN > event_wait : Interrupted system call (code=4) . 2022.03.09 21:50:44 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.03.09 21:50:49 - OpenVPN > Closing TUN/TAP interface . 2022.03.09 21:50:49 - OpenVPN > net_addr_v4_del: 10.11.34.38 dev tun0 . 2022.03.09 21:50:49 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2022.03.09 21:50:49 - Routes, delete 0.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 21:50:49 - Routes, delete 128.0.0.0/1 for interface "tun0", not exists. . 2022.03.09 21:50:49 - Routes, delete 62.102.148.208/32 for interface "eno2". . 2022.03.09 21:50:49 - Routes, delete 62.102.148.154/32 for interface "tun0", not exists. . 2022.03.09 21:50:49 - Routes, skipped for 2a00:1520:27:1:dc5a:b7fa:4950:47c4 : IPv6 blocked. . 2022.03.09 21:50:49 - Routes, delete 62.102.148.208/32 for interface "eno2", not exists. . 2022.03.09 21:50:49 - IPv6 restored on network adapter (eno2) . 2022.03.09 21:50:49 - IPv6 restored on network adapter (wlo1) . 2022.03.09 21:50:49 - Connection terminated. [...] Any thoughts on how to troubleshoot further? Thanks
-
IPv6 IS NOW WORKING AGAIN. 1. Does anyone have an IPv6 address with Lich? I can get one normally with other servers but not Lich. I've messaged support, they said (on December 11 or earlier) that the datacenter had one business day to reply to them about the problem and they confirmed issues with it. But they seem to be ignoring my responses. So do you have IPv6 with this server? 2. Why does IPLeak.com say the long, lat is 0 , 0? I mentioned that in the above mentioned support ticket and it was completely ignored. Dnsleaktest.com says unknown as the location and not United States or something.
- ...
- 5 replies
-
- lich
- problem
- server
- location
- ipleak
- dnsleaktest
- no support response
- no ipv6
-
(and 7 more)
Tagged with: