openpyn-nordvpn icon indicating copy to clipboard operation
openpyn-nordvpn copied to clipboard

Failed to set DNS configuration: Could not activate remote peer.

Open lubi888 opened this issue 4 years ago • 6 comments

This is a fresh install on fedora 30.

`openpyn uk According to NordVPN, Least Busy 10 Servers in UK With 'Load' Less Than 70 Which Support OPENVPN-UDP Are: [['uk1321', 5], ['uk1081', 6], ['uk1074', 7], ['uk1172', 7], ['uk1212', 7], ['uk1235', 7], ['uk1322', 7], ['uk1359', 7], ['uk1404', 7], ['uk1466', 7]]

Pinging Server uk1321 min/avg/max/mdev = [54, 88, 155, 47]

Pinging Server uk1081 min/avg/max/mdev = [56, 58, 59, 0]

Pinging Server uk1074 min/avg/max/mdev = [57, 59, 64, 3]

Pinging Server uk1172 min/avg/max/mdev = [54, 62, 66, 5]

Pinging Server uk1212 min/avg/max/mdev = [53, 55, 57, 1]

Pinging Server uk1235 min/avg/max/mdev = [56, 58, 60, 1]

Pinging Server uk1322 min/avg/max/mdev = [56, 61, 64, 3]

Pinging Server uk1359 min/avg/max/mdev = [51, 67, 91, 17]

Pinging Server uk1404 min/avg/max/mdev = [58, 63, 72, 6]

Pinging Server uk1466 min/avg/max/mdev = [54, 73, 99, 19]

Top 10 Servers with Best Ping Are: ['uk1212', 'uk1081', 'uk1235', 'uk1074', 'uk1322', 'uk1172', 'uk1404', 'uk1359', 'uk1466', 'uk1321']

Out of the Best Available Servers, Chose uk1212

2019-08-10 20:17:05 [SUCCESS] CONNECTING TO SERVER uk1212 ON PORT udp 2019-08-10 20:17:05 [SUCCESS] Your OS 'linux' Does have '/sbin/resolvconf', using it to update DNS Resolver Entries Sat Aug 10 20:17:05 2019 WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure Sat Aug 10 20:17:05 2019 OpenVPN 2.4.7 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 20 2019 Sat Aug 10 20:17:05 2019 library versions: OpenSSL 1.1.1c FIPS 28 May 2019, LZO 2.08 Sat Aug 10 20:17:05 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:7015 Sat Aug 10 20:17:05 2019 WARNING: --ping should normally be used with --ping-restart or --ping-exit Sat Aug 10 20:17:05 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sat Aug 10 20:17:05 2019 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Sat Aug 10 20:17:05 2019 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Sat Aug 10 20:17:05 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]217.146.82.216:1194 Sat Aug 10 20:17:05 2019 Socket Buffers: R=[212992->212992] S=[212992->212992] Sat Aug 10 20:17:05 2019 UDP link local: (not bound) Sat Aug 10 20:17:05 2019 UDP link remote: [AF_INET]217.146.82.216:1194 Sat Aug 10 20:17:05 2019 TLS: Initial packet from [AF_INET]217.146.82.216:1194, sid=67483799 bcc1fa3b Sat Aug 10 20:17:05 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Sat Aug 10 20:17:05 2019 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Sat Aug 10 20:17:05 2019 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA3 Sat Aug 10 20:17:05 2019 VERIFY KU OK Sat Aug 10 20:17:05 2019 Validating certificate extended key usage Sat Aug 10 20:17:05 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sat Aug 10 20:17:05 2019 VERIFY EKU OK Sat Aug 10 20:17:05 2019 VERIFY OK: depth=0, CN=uk1212.nordvpn.com Sat Aug 10 20:17:06 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Sat Aug 10 20:17:06 2019 [uk1212.nordvpn.com] Peer Connection Initiated with [AF_INET]217.146.82.216:1194 Sat Aug 10 20:17:06 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:7015 Sat Aug 10 20:17:07 2019 SENT CONTROL [uk1212.nordvpn.com]: 'PUSH_REQUEST' (status=1) Sat Aug 10 20:17:07 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.1.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.1.5 255.255.255.0,peer-id 3,cipher AES-256-GCM' Sat Aug 10 20:17:07 2019 OPTIONS IMPORT: timers and/or timeouts modified Sat Aug 10 20:17:07 2019 OPTIONS IMPORT: explicit notify parm(s) modified Sat Aug 10 20:17:07 2019 OPTIONS IMPORT: compression parms modified Sat Aug 10 20:17:07 2019 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Sat Aug 10 20:17:07 2019 Socket Buffers: R=[212992->425984] S=[212992->425984] Sat Aug 10 20:17:07 2019 OPTIONS IMPORT: --ifconfig/up options modified Sat Aug 10 20:17:07 2019 OPTIONS IMPORT: route options modified Sat Aug 10 20:17:07 2019 OPTIONS IMPORT: route-related options modified Sat Aug 10 20:17:07 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Sat Aug 10 20:17:07 2019 OPTIONS IMPORT: peer-id set Sat Aug 10 20:17:07 2019 OPTIONS IMPORT: adjusting link_mtu to 1657 Sat Aug 10 20:17:07 2019 OPTIONS IMPORT: data channel crypto options modified Sat Aug 10 20:17:07 2019 Data Channel: using negotiated cipher 'AES-256-GCM' Sat Aug 10 20:17:07 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Sat Aug 10 20:17:07 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Sat Aug 10 20:17:07 2019 ROUTE_GATEWAY 192.168.43.190/255.255.255.0 IFACE=wlp58s0 HWADDR=9c:b6:d0:f3:39:77 Sat Aug 10 20:17:07 2019 TUN/TAP device tun0 opened Sat Aug 10 20:17:07 2019 TUN/TAP TX queue length set to 100 Sat Aug 10 20:17:07 2019 /sbin/ip link set dev tun0 up mtu 1500 Sat Aug 10 20:17:07 2019 /sbin/ip addr add dev tun0 10.8.1.5/24 broadcast 10.8.1.255 Sat Aug 10 20:17:07 2019 /usr/local/lib/python3.7/site-packages/openpyn/scripts/update-resolv-conf.sh tun0 1500 1585 10.8.1.5 255.255.255.0 init dhcp-option DNS 103.86.99.100 dhcp-option DNS 103.86.96.100 dhcp-option DNS 208.67.222.220 Failed to set DNS configuration: Could not activate remote peer. Sat Aug 10 20:17:07 2019 MANAGEMENT: Client disconnected Sat Aug 10 20:17:07 2019 WARNING: Failed running command (--up/--down): external program exited with error status: 1 Sat Aug 10 20:17:07 2019 Exiting due to fatal error ` any ideas?

lubi888 avatar Aug 10 '19 19:08 lubi888

I have the same issue. Apparently, it's due to this command

It generates this log "Failed to set DNS configuration: Could not activate remote peer."

I'm working on a fix.

jcapiitao avatar Sep 08 '19 13:09 jcapiitao

Still have this error. Any changes?


Pinging Server fr422 min/avg/max/mdev = [16, 16, 16, 0] 

Pinging Server fr383 min/avg/max/mdev = [16, 16, 16, 0] 

Pinging Server fr375 min/avg/max/mdev = [5, 6, 6, 0] 

Pinging Server fr354 min/avg/max/mdev = [5, 5, 5, 0] 

Pinging Server fr376 min/avg/max/mdev = [5, 5, 5, 0] 

Pinging Server fr379 min/avg/max/mdev = [5, 5, 5, 0] 

Pinging Server fr431 min/avg/max/mdev = [16, 16, 16, 0] 

Pinging Server fr435 min/avg/max/mdev = [15, 16, 16, 0] 

Pinging Server fr308 min/avg/max/mdev = [5, 5, 5, 0] 

Pinging Server fr365 min/avg/max/mdev = [15, 16, 16, 0] 

Top 10 Servers with Best Ping Are: ['fr354', 'fr376', 'fr379', 'fr308', 'fr375', 'fr422', 'fr383', 'fr431', 'fr435', 'fr365']

Out of the Best Available Servers, Chose fr354

2019-12-06 15:23:07 [SUCCESS] CONNECTING TO SERVER fr354 ON PORT udp
2019-12-06 15:23:07 [SUCCESS] Your OS 'linux' Does have '/sbin/resolvconf', using it to update DNS Resolver Entries
Fri Dec  6 15:23:08 2019 WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Fri Dec  6 15:23:08 2019 OpenVPN 2.4.8 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Nov  1 2019
Fri Dec  6 15:23:08 2019 library versions: OpenSSL 1.1.1d FIPS  10 Sep 2019, LZO 2.08
Fri Dec  6 15:23:08 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:7015
Fri Dec  6 15:23:08 2019 WARNING: --ping should normally be used with --ping-restart or --ping-exit
Fri Dec  6 15:23:08 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Fri Dec  6 15:23:08 2019 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Fri Dec  6 15:23:08 2019 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Fri Dec  6 15:23:08 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]185.93.2.150:1194
Fri Dec  6 15:23:08 2019 Socket Buffers: R=[212992->212992] S=[212992->212992]
Fri Dec  6 15:23:08 2019 UDP link local: (not bound)
Fri Dec  6 15:23:08 2019 UDP link remote: [AF_INET]185.93.2.150:1194
Fri Dec  6 15:23:08 2019 TLS: Initial packet from [AF_INET]185.93.2.150:1194, sid=a4d31697 b1ced25c
Fri Dec  6 15:23:08 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Fri Dec  6 15:23:08 2019 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Fri Dec  6 15:23:08 2019 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA4
Fri Dec  6 15:23:08 2019 VERIFY KU OK
Fri Dec  6 15:23:08 2019 Validating certificate extended key usage
Fri Dec  6 15:23:08 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Dec  6 15:23:08 2019 VERIFY EKU OK
Fri Dec  6 15:23:08 2019 VERIFY OK: depth=0, CN=fr354.nordvpn.com
Fri Dec  6 15:23:08 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Fri Dec  6 15:23:08 2019 [fr354.nordvpn.com] Peer Connection Initiated with [AF_INET]185.93.2.150:1194
Fri Dec  6 15:23:09 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:7015
Fri Dec  6 15:23:09 2019 SENT CONTROL [fr354.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Fri Dec  6 15:23:09 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.3.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.3.36 255.255.255.0,peer-id 33,cipher AES-256-GCM'
Fri Dec  6 15:23:09 2019 OPTIONS IMPORT: timers and/or timeouts modified
Fri Dec  6 15:23:09 2019 OPTIONS IMPORT: explicit notify parm(s) modified
Fri Dec  6 15:23:09 2019 OPTIONS IMPORT: compression parms modified
Fri Dec  6 15:23:09 2019 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Fri Dec  6 15:23:09 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
Fri Dec  6 15:23:09 2019 OPTIONS IMPORT: --ifconfig/up options modified
Fri Dec  6 15:23:09 2019 OPTIONS IMPORT: route options modified
Fri Dec  6 15:23:09 2019 OPTIONS IMPORT: route-related options modified
Fri Dec  6 15:23:09 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Dec  6 15:23:09 2019 OPTIONS IMPORT: peer-id set
Fri Dec  6 15:23:09 2019 OPTIONS IMPORT: adjusting link_mtu to 1657
Fri Dec  6 15:23:09 2019 OPTIONS IMPORT: data channel crypto options modified
Fri Dec  6 15:23:09 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
Fri Dec  6 15:23:09 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Dec  6 15:23:09 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Dec  6 15:23:09 2019 ROUTE_GATEWAY 192.168.0.100/255.255.255.0 IFACE=enp0s31f6 HWADDR=8c:ec:4b:e3:d6:80
Fri Dec  6 15:23:09 2019 TUN/TAP device tun0 opened
Fri Dec  6 15:23:09 2019 TUN/TAP TX queue length set to 100
Fri Dec  6 15:23:09 2019 /sbin/ip link set dev tun0 up mtu 1500
Fri Dec  6 15:23:09 2019 /sbin/ip addr add dev tun0 10.8.3.36/24 broadcast 10.8.3.255
Fri Dec  6 15:23:09 2019 /usr/local/lib/python3.7/site-packages/openpyn/scripts/update-resolv-conf.sh tun0 1500 1585 10.8.3.36 255.255.255.0 init
dhcp-option DNS 103.86.99.100
dhcp-option DNS 103.86.96.100
dhcp-option DNS 208.67.222.220
Failed to set DNS configuration: Could not activate remote peer.
Fri Dec  6 15:23:09 2019 MANAGEMENT: Client disconnected
Fri Dec  6 15:23:09 2019 WARNING: Failed running command (--up/--down): external program exited with error status: 1
Fri Dec  6 15:23:09 2019 Exiting due to fatal error

debnet avatar Dec 06 '19 14:12 debnet

have since upgraded to fedora 31.

have not updated openpyn since. openpyn --version openpyn 2.7.5

what's the best way to uninstall and then try a fresh install?

openpyn --update

still getting the

Failed to set DNS configuration: Could not activate remote peer.

lubi888 avatar Dec 07 '19 19:12 lubi888

Seems like >=F30 requires system-resolved, just: sudo systemctl enable --now systemd-resolved

lanthanplan avatar Jan 09 '20 16:01 lanthanplan

hi guys, sorry for the delay but I don't boot fedora all the time. This appears to have worked. However, the 1 extra step is systemctl start nordvpn in the beginning.

I consider this issue now closed but will leave it as open for a week just in case anyone else on fedora needs to know this command.

Here is the output from the command that you have suggested and the eventual connection.

sudo systemctl enable --now systemd-resolved
Created symlink /etc/systemd/system/dbus-org.freedesktop.resolve1.service → /usr/lib/systemd/system/systemd-resolved.service.
Created symlink /etc/systemd/system/multi-user.target.wants/systemd-resolved.service → /usr/lib/systemd/system/systemd-resolved.service.

now the connections are working and the nordvpn popup shows in the top right corner

[xxxxx@localhost ~]$ openpyn -c uk
According to NordVPN, Least Busy 10 Servers in UK With 'Load' Less Than 70 Which Support OPENVPN-UDP Are: [['uk1283', 8], ['uk1422', 8], ['uk1049', 11], ['uk829', 12], ['uk1530', 12], ['uk1535', 12], ['uk1460', 13], ['uk1521', 13], ['uk1538', 13], ['uk1775', 14]]

Pinging Server uk1283 min/avg/max/mdev = [42, 46, 51, 3] 

Pinging Server uk1422 min/avg/max/mdev = [42, 42, 43, 0] 

Pinging Server uk1049 min/avg/max/mdev = [33, 41, 54, 9] 

Pinging Server uk829 min/avg/max/mdev = [35, 42, 55, 8] 

Pinging Server uk1530 min/avg/max/mdev = [43, 56, 62, 9] 

Pinging Server uk1535 min/avg/max/mdev = [28, 41, 48, 8] 

Pinging Server uk1460 min/avg/max/mdev = [32, 48, 60, 12] 

Pinging Server uk1521 min/avg/max/mdev = [30, 45, 58, 11] 

Pinging Server uk1538 min/avg/max/mdev = [38, 39, 39, 0] 

Pinging Server uk1775 min/avg/max/mdev = [39, 54, 67, 11] 

Top 10 Servers with Best Ping Are: ['uk1538', 'uk1535', 'uk1049', 'uk1422', 'uk829', 'uk1521', 'uk1283', 'uk1460', 'uk1775', 'uk1530']

Out of the Best Available Servers, Chose uk1538

2020-01-19 14:59:33 [SUCCESS] CONNECTING TO SERVER uk1538 ON PORT udp
2020-01-19 14:59:33 [WARNING] systemd-resolved is running, but resolv.conf contains ['192.168.43.246'], test if DNS leaks!
2020-01-19 14:59:33 [SUCCESS] Your OS 'linux' has systemd-resolve running, using it to update DNS Resolver Entries
Sun Jan 19 14:59:33 2020 WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Sun Jan 19 14:59:33 2020 OpenVPN 2.4.8 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Nov  1 2019
Sun Jan 19 14:59:33 2020 library versions: OpenSSL 1.1.1d FIPS  10 Sep 2019, LZO 2.08
Sun Jan 19 14:59:33 2020 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:7015
Sun Jan 19 14:59:33 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
Sun Jan 19 14:59:33 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Jan 19 14:59:33 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Sun Jan 19 14:59:33 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Sun Jan 19 14:59:33 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]194.35.233.131:1194
Sun Jan 19 14:59:33 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
Sun Jan 19 14:59:33 2020 UDP link local: (not bound)
Sun Jan 19 14:59:33 2020 UDP link remote: [AF_INET]194.35.233.131:1194
Sun Jan 19 14:59:33 2020 TLS: Initial packet from [AF_INET]194.35.233.131:1194, sid=485c5dca a57abc36
Sun Jan 19 14:59:33 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sun Jan 19 14:59:33 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Sun Jan 19 14:59:33 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA4
Sun Jan 19 14:59:33 2020 VERIFY KU OK
Sun Jan 19 14:59:33 2020 Validating certificate extended key usage
Sun Jan 19 14:59:33 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Jan 19 14:59:33 2020 VERIFY EKU OK
Sun Jan 19 14:59:33 2020 VERIFY OK: depth=0, CN=uk1538.nordvpn.com
Sun Jan 19 14:59:33 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sun Jan 19 14:59:33 2020 [uk1538.nordvpn.com] Peer Connection Initiated with [AF_INET]194.35.233.131:1194
Sun Jan 19 14:59:34 2020 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:7015
Sun Jan 19 14:59:34 2020 SENT CONTROL [uk1538.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Sun Jan 19 14:59:34 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.0.48 255.255.255.0,peer-id 37,cipher AES-256-GCM'
Sun Jan 19 14:59:34 2020 OPTIONS IMPORT: timers and/or timeouts modified
Sun Jan 19 14:59:34 2020 OPTIONS IMPORT: explicit notify parm(s) modified
Sun Jan 19 14:59:34 2020 OPTIONS IMPORT: compression parms modified
Sun Jan 19 14:59:34 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Sun Jan 19 14:59:34 2020 Socket Buffers: R=[212992->425984] S=[212992->425984]
Sun Jan 19 14:59:34 2020 OPTIONS IMPORT: --ifconfig/up options modified
Sun Jan 19 14:59:34 2020 OPTIONS IMPORT: route options modified
Sun Jan 19 14:59:34 2020 OPTIONS IMPORT: route-related options modified
Sun Jan 19 14:59:34 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun Jan 19 14:59:34 2020 OPTIONS IMPORT: peer-id set
Sun Jan 19 14:59:34 2020 OPTIONS IMPORT: adjusting link_mtu to 1657
Sun Jan 19 14:59:34 2020 OPTIONS IMPORT: data channel crypto options modified
Sun Jan 19 14:59:34 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Sun Jan 19 14:59:34 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Jan 19 14:59:34 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Jan 19 14:59:34 2020 ROUTE_GATEWAY 192.168.43.246/255.255.255.0 IFACE=wlp58s0 HWADDR=9c:b6:d0:f3:39:77
Sun Jan 19 14:59:34 2020 TUN/TAP device tun0 opened
Sun Jan 19 14:59:34 2020 TUN/TAP TX queue length set to 100
Sun Jan 19 14:59:34 2020 /sbin/ip link set dev tun0 up mtu 1500
Sun Jan 19 14:59:34 2020 /sbin/ip addr add dev tun0 10.8.0.48/24 broadcast 10.8.0.255
Sun Jan 19 14:59:34 2020 /usr/local/lib/python3.7/site-packages/openpyn/scripts/update-systemd-resolved.sh tun0 1500 1585 10.8.0.48 255.255.255.0 init
<14>Jan 19 14:59:34 update-systemd-resolved.sh: Link 'tun0' coming up
<14>Jan 19 14:59:34 update-systemd-resolved.sh: Adding DNS Routed Domain .
<14>Jan 19 14:59:34 update-systemd-resolved.sh: Adding IPv4 DNS Server 103.86.96.100
<14>Jan 19 14:59:34 update-systemd-resolved.sh: Adding IPv4 DNS Server 103.86.99.100
<14>Jan 19 14:59:34 update-systemd-resolved.sh: SetLinkDNS(6 2 2 4 103 86 96 100 2 4 103 86 99 100)
<14>Jan 19 14:59:34 update-systemd-resolved.sh: SetLinkDomains(6 1 . true)
Sun Jan 19 14:59:34 2020 /sbin/ip route add 194.35.233.131/32 via 192.168.43.246
Sun Jan 19 14:59:34 2020 /sbin/ip route add 0.0.0.0/1 via 10.8.0.1
Sun Jan 19 14:59:34 2020 /sbin/ip route add 128.0.0.0/1 via 10.8.0.1
Sun Jan 19 14:59:34 2020 Initialization Sequence Completed

lubi888 avatar Jan 19 '20 15:01 lubi888

I was installing the WireGuard client on Almalinux 9.1. When I ran the command 'systemctl start wg-quick@wg0,' I encountered an error: 'Failed to set DNS configuration: Could not activate remote peer.' I saw your solution and executed the command 'systemctl enable --now systemd-resolved,' after which the WireGuard client started successfully. Thank you very much for your help.

xichuanwushao avatar May 08 '23 08:05 xichuanwushao