HTB OpenVPN not assigning IPV4 address

Hi all,
I am new here, so please be gentle.
Trying to connect. Downloaded VPN configuration file, run “sudo openvpn file.ovpn” and HTB thinks I am connected. Shows green “online” icon.
But I am unable to connect to any of the machines, can’t ping, etc.

Openvpn log:
Sat Apr 2 14:16:24 2022 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Mar 22 2022
Sat Apr 2 14:16:24 2022 library versions: OpenSSL 1.1.1f 31 Mar 2020, LZO 2.10
Sat Apr 2 14:16:24 2022 Outgoing Control Channel Encryption: Cipher ‘AES-256-CTR’ initialized with 256 bit key
Sat Apr 2 14:16:24 2022 Outgoing Control Channel Encryption: Using 256 bit message hash ‘SHA256’ for HMAC authentication
Sat Apr 2 14:16:24 2022 Incoming Control Channel Encryption: Cipher ‘AES-256-CTR’ initialized with 256 bit key
Sat Apr 2 14:16:24 2022 Incoming Control Channel Encryption: Using 256 bit message hash ‘SHA256’ for HMAC authentication
Sat Apr 2 14:16:24 2022 TCP/UDP: Preserving recently used remote address: [AF_INET]5.44.235.181:443
Sat Apr 2 14:16:24 2022 Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Apr 2 14:16:24 2022 Attempting to establish TCP connection with [AF_INET]5.44.235.181:443 [nonblock]
Sat Apr 2 14:16:25 2022 TCP connection established with [AF_INET]5.44.235.181:443
Sat Apr 2 14:16:25 2022 TCP_CLIENT link local: (not bound)
Sat Apr 2 14:16:25 2022 TCP_CLIENT link remote: [AF_INET]5.44.235.181:443
Sat Apr 2 14:16:25 2022 TLS: Initial packet from [AF_INET]5.44.235.181:443, sid=4676cd6f 09dd6f89
Sat Apr 2 14:16:26 2022 VERIFY OK: depth=1, CN=HackTheBox
Sat Apr 2 14:16:26 2022 VERIFY KU OK
Sat Apr 2 14:16:26 2022 Validating certificate extended key usage
Sat Apr 2 14:16:26 2022 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr 2 14:16:26 2022 VERIFY EKU OK
Sat Apr 2 14:16:26 2022 VERIFY OK: depth=0, CN=htb
Sat Apr 2 14:16:27 2022 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
Sat Apr 2 14:16:27 2022 [htb] Peer Connection Initiated with [AF_INET]5.44.235.181:443
Sat Apr 2 14:16:28 2022 SENT CONTROL [htb]: ‘PUSH_REQUEST’ (status=1)
Sat Apr 2 14:16:29 2022 PUSH: Received control message: ‘PUSH_REPLY,route 10.10.10.0 255.255.254.0,route 10.129.0.0 255.255.0.0,route-ipv6 dead:beef::/64,tun-ipv6,route-gateway 10.10.16.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:4::1017/64 dead:beef:4::1,ifconfig 10.10.16.25 255.255.254.0,peer-id 0,cipher AES-256-GCM’
Sat Apr 2 14:16:29 2022 OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr 2 14:16:29 2022 OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr 2 14:16:29 2022 OPTIONS IMPORT: route options modified
Sat Apr 2 14:16:29 2022 OPTIONS IMPORT: route-related options modified
Sat Apr 2 14:16:29 2022 OPTIONS IMPORT: peer-id set
Sat Apr 2 14:16:29 2022 OPTIONS IMPORT: adjusting link_mtu to 1627
Sat Apr 2 14:16:29 2022 OPTIONS IMPORT: data channel crypto options modified
Sat Apr 2 14:16:29 2022 Data Channel: using negotiated cipher ‘AES-256-GCM’
Sat Apr 2 14:16:29 2022 Outgoing Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
Sat Apr 2 14:16:29 2022 Incoming Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
Sat Apr 2 14:16:29 2022 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=enp7s0 HWADDR=1c:6f:65:c5:12:99
Sat Apr 2 14:16:29 2022 GDG6: remote_host_ipv6=n/a
Sat Apr 2 14:16:29 2022 ROUTE6: default_gateway=UNDEF
Sat Apr 2 14:16:29 2022 TUN/TAP device tun0 opened
Sat Apr 2 14:16:29 2022 TUN/TAP TX queue length set to 100
Sat Apr 2 14:16:29 2022 /sbin/ip link set dev tun0 up mtu 1500
Sat Apr 2 14:16:29 2022 /sbin/ip addr add dev tun0 10.10.16.25/23 broadcast 10.10.17.255
Sat Apr 2 14:16:29 2022 /sbin/ip -6 addr add dead:beef:4::1017/64 dev tun0
Sat Apr 2 14:16:29 2022 /sbin/ip route add 10.10.10.0/23 via 10.10.16.1
Sat Apr 2 14:16:29 2022 /sbin/ip route add 10.129.0.0/16 via 10.10.16.1
Sat Apr 2 14:16:29 2022 add_route_ipv6(dead:beef::/64 → dead:beef:4::1 metric -1) dev tun0
Sat Apr 2 14:16:29 2022 /sbin/ip -6 route add dead:beef::/64 dev tun0
Sat Apr 2 14:16:29 2022 WARNING: this configuration may cache passwords in memory – use the auth-nocache option to prevent this
Sat Apr 2 14:16:29 2022 Initialization Sequence Completed

Looks OK to me.

running ifconfig shows I seem to only have IPV6 connection:
tun0: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST> mtu 1500
inet6 fe80::f295:b9c8:7913:127e prefixlen 64 scopeid 0x20
unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 txqueuelen 100 (UNSPEC)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 9 bytes 432 (432.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

I have to manually re-run:
sudo /sbin/ip addr add dev tun0 10.10.16.25/23 broadcast 10.10.17.255 in order to get tun0 an IPV4 address

Tried to re-connect few times, tried to re-generate VPN config file and tried both US and EU servers. Same problem.

Any ideas?

Thanks,
Rudolf