zomboided Mike1605 as mentioned in my previous post above. I have been having issues setting up ExpressVPN within VPN Manager for OpenVPN on clean LibreELEC installation running on my Device(s) I have tested today on rpi4 with clean LibreELEC OS and clean install of add-on and I am unable to set-up add-on correctly whatever method I use within addon.
Here is kodi.log (debug switched on) with info when utilising add-ons user defined wizard to transfer and then setup personally downloaded ExpressVPN *.opvn and key files that I checked and included in device downloads folder. (I sshd own files as initially thought that perhaps issue was due to possibly out of date expressvpn files being provided via addon)
Please note that before performing all above I took your troubleshooting advice from add-on wiki to test OpenVPN with ExpressVPN manually (sshing into device etc)
Following is ssh terminal information for a “successful vpn connection” when using exact same *.opvn files held in downloads folder and running OpenVPN manually. (key files not required)
LibreELEC:~/downloads # openvpn --config my_expressvpn_uk_-_london_udp.ovpn
Fri Apr 10 09:06:25 2020 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
Fri Apr 10 09:06:25 2020 OpenVPN 2.4.7 armv8a-libreelec-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [AEAD] built on Mar 5 2020
Fri Apr 10 09:06:25 2020 library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.10
Enter Auth Username: (removed)
Enter Auth Password: (hidden)
Fri Apr 10 09:06:59 2020 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
Fri Apr 10 09:06:59 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Fri Apr 10 09:06:59 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Fri Apr 10 09:06:59 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]185.192.70.115:1195
Fri Apr 10 09:06:59 2020 Socket Buffers: R=[163840->327680] S=[163840->327680]
Fri Apr 10 09:06:59 2020 UDP link local: (not bound)
Fri Apr 10 09:06:59 2020 UDP link remote: [AF_INET]185.192.70.115:1195
Fri Apr 10 09:06:59 2020 TLS: Initial packet from [AF_INET]185.192.70.115:1195, sid=a4d4261c 52e960b6
Fri Apr 10 09:06:59 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Fri Apr 10 09:06:59 2020 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, [email protected]
Fri Apr 10 09:06:59 2020 VERIFY OK: nsCertType=SERVER
Fri Apr 10 09:06:59 2020 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-7010-0a, [email protected]
Fri Apr 10 09:06:59 2020 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-7010-0a, [email protected]
Fri Apr 10 09:06:59 2020 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
Fri Apr 10 09:06:59 2020 [Server-7010-0a] Peer Connection Initiated with [AF_INET]185.192.70.115:1195
Fri Apr 10 09:07:00 2020 SENT CONTROL [Server-7010-0a]: 'PUSH_REQUEST' (status=1)
Fri Apr 10 09:07:01 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.115.0.1,comp-lzo no,route 10.115.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.115.0.66 10.115.0.65,peer-id 10,cipher AES-256-GCM'
Fri Apr 10 09:07:01 2020 OPTIONS IMPORT: timers and/or timeouts modified
Fri Apr 10 09:07:01 2020 OPTIONS IMPORT: compression parms modified
Fri Apr 10 09:07:01 2020 OPTIONS IMPORT: --ifconfig/up options modified
Fri Apr 10 09:07:01 2020 OPTIONS IMPORT: route options modified
Fri Apr 10 09:07:01 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Apr 10 09:07:01 2020 OPTIONS IMPORT: peer-id set
Fri Apr 10 09:07:01 2020 OPTIONS IMPORT: adjusting link_mtu to 1629
Fri Apr 10 09:07:01 2020 OPTIONS IMPORT: data channel crypto options modified
Fri Apr 10 09:07:01 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Fri Apr 10 09:07:01 2020 NCP: overriding user-set keysize with default
Fri Apr 10 09:07:01 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Apr 10 09:07:01 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Apr 10 09:07:01 2020 TUN/TAP device tun0 opened
Fri Apr 10 09:07:01 2020 TUN/TAP TX queue length set to 100
Fri Apr 10 09:07:01 2020 /sbin/ip link set dev tun0 up mtu 1500
Fri Apr 10 09:07:01 2020 /sbin/ip addr add dev tun0 local 10.115.0.66 peer 10.115.0.65
Fri Apr 10 09:07:03 2020 /sbin/ip route add 185.192.70.115/32 via 192.168.1.1
Fri Apr 10 09:07:03 2020 /sbin/ip route add 0.0.0.0/1 via 10.115.0.65
Fri Apr 10 09:07:03 2020 /sbin/ip route add 128.0.0.0/1 via 10.115.0.65
Fri Apr 10 09:07:03 2020 /sbin/ip route add 10.115.0.1/32 via 10.115.0.65
Fri Apr 10 09:07:03 2020 Initialization Sequence Completed
Display More
I have checked and double checked username and password to be sure they are correctly entered within GUI of addon and transfered into settings.xml. In case its relevant I have noted that Userdata\addon_data\service.vpn.manager\settings.xml does not include validated username and password strings in "vpn_username_validated" and "vpn_password_validated" settings. (Which I do see within settings.xml of a working installation, set-up longtime ago on much earlier version of LibreELEC)
Hope provided information is helpful in understanding what issue could be?