morpheusthewhite / nordpy

A gui application to connect automatically to the recommended NordVPN server
GNU General Public License v3.0
105 stars 16 forks source link

Lost connection #51

Closed PL7963 closed 3 years ago

PL7963 commented 3 years ago

If I connect vpn once. I can't disconnect until reboot. When I disconnect I'll lost connection. Ubuntu 20.10

morpheusthewhite commented 3 years ago

Try to execute nordpy from command line, connect and disconnect and paste here the logs on the terminal

PL7963 commented 3 years ago

Connect

captured grep
# Warning: iptables-legacy tables present, use iptables-legacy-save to see them
Turning on killswitch
Default interface: wlxf4285317a477
IP and port of the VPN server: 167.88.10.163 443
Network address on wlxf4285317a477: 169.254.0.0/16
Launching tcp connection with 167.88.10.163:443 on wlxf4285317a477 (on network 169.254.0.0/16)
[OPENVPN]: Wed Jan 27 16:59:19 2021 OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jan 27 2021
[OPENVPN]: Wed Jan 27 16:59:19 2021 library versions: OpenSSL 1.1.1f  31 Mar 2020, LZO 2.10
[OPENVPN]: Wed Jan 27 16:59:19 2021 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
[OPENVPN]: Wed Jan 27 16:59:19 2021 NOTE: --fast-io is disabled since we are not using UDP
[OPENVPN]: Wed Jan 27 16:59:19 2021 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
[OPENVPN]: Wed Jan 27 16:59:19 2021 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
[OPENVPN]: Wed Jan 27 16:59:19 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]167.88.10.163:443
[OPENVPN]: Wed Jan 27 16:59:19 2021 Socket Buffers: R=[131072->131072] S=[16384->16384]
[OPENVPN]: Wed Jan 27 16:59:19 2021 Attempting to establish TCP connection with [AF_INET]167.88.10.163:443 [nonblock]
[OPENVPN]: Wed Jan 27 16:59:20 2021 TCP connection established with [AF_INET]167.88.10.163:443
[OPENVPN]: Wed Jan 27 16:59:20 2021 TCP_CLIENT link local: (not bound)
[OPENVPN]: Wed Jan 27 16:59:20 2021 TCP_CLIENT link remote: [AF_INET]167.88.10.163:443
[OPENVPN]: Wed Jan 27 16:59:21 2021 TLS: Initial packet from [AF_INET]167.88.10.163:443, sid=3b8c0351 d2b187be
[OPENVPN]: Wed Jan 27 16:59:21 2021 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
[OPENVPN]: Wed Jan 27 16:59:21 2021 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
[OPENVPN]: Wed Jan 27 16:59:21 2021 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
[OPENVPN]: Wed Jan 27 16:59:21 2021 VERIFY KU OK
[OPENVPN]: Wed Jan 27 16:59:21 2021 Validating certificate extended key usage
[OPENVPN]: Wed Jan 27 16:59:21 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
[OPENVPN]: Wed Jan 27 16:59:21 2021 VERIFY EKU OK
[OPENVPN]: Wed Jan 27 16:59:21 2021 VERIFY OK: depth=0, CN=us2947.nordvpn.com
[OPENVPN]: Wed Jan 27 16:59:22 2021 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
[OPENVPN]: Wed Jan 27 16:59:22 2021 [us2947.nordvpn.com] Peer Connection Initiated with [AF_INET]167.88.10.163:443
[OPENVPN]: Wed Jan 27 16:59:23 2021 SENT CONTROL [us2947.nordvpn.com]: 'PUSH_REQUEST' (status=1)
[OPENVPN]: Wed Jan 27 16:59:23 2021 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.0.3 255.255.0.0,peer-id 0,cipher AES-256-GCM'
[OPENVPN]: Wed Jan 27 16:59:23 2021 Option 'explicit-exit-notify' in [PUSH-OPTIONS]:6 is ignored by previous <connection> blocks
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: timers and/or timeouts modified
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: compression parms modified
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
[OPENVPN]: Wed Jan 27 16:59:23 2021 Socket Buffers: R=[131072->425984] S=[87040->425984]
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: --ifconfig/up options modified
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: route options modified
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: route-related options modified
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: peer-id set
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: adjusting link_mtu to 1659
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: data channel crypto options modified
[OPENVPN]: Wed Jan 27 16:59:23 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
[OPENVPN]: Wed Jan 27 16:59:23 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
[OPENVPN]: Wed Jan 27 16:59:23 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
[OPENVPN]: Wed Jan 27 16:59:23 2021 ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=wlxf4285317a477 HWADDR=f4:28:53:17:a4:77
[OPENVPN]: Wed Jan 27 16:59:23 2021 TUN/TAP device tun0 opened
[OPENVPN]: Wed Jan 27 16:59:23 2021 TUN/TAP TX queue length set to 100
[OPENVPN]: Wed Jan 27 16:59:23 2021 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
[OPENVPN]: Wed Jan 27 16:59:23 2021 /usr/sbin/ifconfig tun0 10.7.0.3 netmask 255.255.0.0 mtu 1500 broadcast 10.7.255.255
[OPENVPN]: Wed Jan 27 16:59:23 2021 /home/peter/App/NordVPN/nordpy-master/scripts/nordpy_up.sh tun0 1500 1587 10.7.0.3 255.255.0.0 init
[OPENVPN]: Wed Jan 27 16:59:23 2021 /usr/sbin/route add -net 167.88.10.163 netmask 255.255.255.255 gw 192.168.50.1
[OPENVPN]: Wed Jan 27 16:59:23 2021 /usr/sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.7.0.1
[OPENVPN]: Wed Jan 27 16:59:23 2021 /usr/sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.7.0.1
[OPENVPN]: Wed Jan 27 16:59:23 2021 Initialization Sequence Completed

Disconnect

Turning off killswitch
looking for iptables in /home/peter/App/NordVPN/nordpy-master/stored_iptables
morpheusthewhite commented 3 years ago

It was most likely caused by iptables. Now nordpy fallbacks to use iptables-legacy, when present. It may need to be updated to use the new iptables, but for the moment it works