Jump to content
Not connected, Your IP: 54.175.120.161
Sign in to follow this  
Anaisd

Impossible to use in China

Recommended Posts

Hello,

I bought AirVPN to mainly use it in China and well... it doesn't work :/

I'm gonna travel for 6 months in China and i'm currently in Guilin (south of China).

 

I'm using AirVPN client on MacOSX 10.9.4 and sometimes it works but mainly it don't.

This is the logs :

I 2014.09.14 12:21:54 - Session starting.
! 2014.09.14 12:21:54 - Checking environment
! 2014.09.14 12:21:54 - Checking authorization
. 2014.09.14 12:21:55 - Error getting response stream (ReadDone1): ReceiveFailure
. 2014.09.14 12:21:55 - Error getting response stream (ReadDone1): ReceiveFailure
. 2014.09.14 12:22:05 - The request timed out
! 2014.09.14 12:22:06 - Connecting to Electra (United States, Manassas, Virginia)
. 2014.09.14 12:22:06 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014
. 2014.09.14 12:22:06 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05
. 2014.09.14 12:22:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2014.09.14 12:22:06 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2014.09.14 12:22:06 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 12:22:06 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 12:22:06 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]
. 2014.09.14 12:22:06 - OpenVPN > UDPv4 link local: [undef]
. 2014.09.14 12:22:06 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.225:443
. 2014.09.14 12:22:06 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.225:443, sid=96fcccd4 c989704f
. 2014.09.14 12:22:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2014.09.14 12:22:08 - OpenVPN > Validating certificate key usage
. 2014.09.14 12:22:08 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2014.09.14 12:22:08 - OpenVPN > VERIFY KU OK
. 2014.09.14 12:22:08 - OpenVPN > Validating certificate extended key usage
. 2014.09.14 12:22:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2014.09.14 12:22:08 - OpenVPN > VERIFY EKU OK
. 2014.09.14 12:22:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2014.09.14 12:22:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2014.09.14 12:22:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 12:22:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2014.09.14 12:22:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 12:22:15 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2014.09.14 12:22:15 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.115.117.225:443
. 2014.09.14 12:22:17 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2014.09.14 12:22:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.65.250 10.4.65.249'
. 2014.09.14 12:22:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2014.09.14 12:22:17 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2014.09.14 12:22:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2014.09.14 12:22:17 - OpenVPN > OPTIONS IMPORT: route options modified
. 2014.09.14 12:22:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2014.09.14 12:22:17 - OpenVPN > Opened utun device utun0
. 2014.09.14 12:22:17 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2014.09.14 12:22:17 - OpenVPN > /sbin/ifconfig utun0 delete
. 2014.09.14 12:22:17 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2014.09.14 12:22:17 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2014.09.14 12:22:17 - OpenVPN > /sbin/ifconfig utun0 10.4.65.250 10.4.65.249 mtu 1500 netmask 255.255.255.255 up
. 2014.09.14 12:22:17 - OpenVPN > /sbin/route add -net 199.115.117.225 192.168.1.1 255.255.255.255
. 2014.09.14 12:22:17 - OpenVPN > add net 199.115.117.225: gateway 192.168.1.1
. 2014.09.14 12:22:17 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.65.249 128.0.0.0
. 2014.09.14 12:22:17 - OpenVPN > add net 0.0.0.0: gateway 10.4.65.249
. 2014.09.14 12:22:17 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.65.249 128.0.0.0
. 2014.09.14 12:22:17 - OpenVPN > add net 128.0.0.0: gateway 10.4.65.249
. 2014.09.14 12:22:17 - OpenVPN > /sbin/route add -net 10.4.0.1 10.4.65.249 255.255.255.255
. 2014.09.14 12:22:17 - OpenVPN > add net 10.4.0.1: gateway 10.4.65.249
. 2014.09.14 12:22:17 - Starting Management Interface
. 2014.09.14 12:22:17 - OpenVPN > Initialization Sequence Completed
I 2014.09.14 12:22:18 - DNS of a network adapter forced (SAMSUNG_Android)
I 2014.09.14 12:22:18 - DNS of a network adapter forced (Wi-Fi)
I 2014.09.14 12:22:18 - DNS of a network adapter forced (Bluetooth PAN)
I 2014.09.14 12:22:18 - DNS of a network adapter forced (Thunderbolt Bridge)
! 2014.09.14 12:22:18 - Flushing DNS
! 2014.09.14 12:22:18 - Checking route
! 2014.09.14 12:22:23 - Connected.
. 2014.09.14 12:22:23 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2014.09.14 12:22:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2014.09.14 12:51:38 - OpenVPN > write UDPv4: Network is down (code=50)
. 2014.09.14 13:01:10 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2014.09.14 13:01:10 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2014.09.14 13:01:10 - OpenVPN > Restart pause, 2 second(s)
! 2014.09.14 13:01:10 - Disconnecting
. 2014.09.14 13:01:10 - Management - Send 'signal SIGTERM'
. 2014.09.14 13:01:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2014.09.14 13:01:10 - OpenVPN > MANAGEMENT: Client disconnected
. 2014.09.14 13:01:10 - OpenVPN > Assertion failed at misc.c:785
. 2014.09.14 13:01:10 - OpenVPN > Exiting due to fatal error
. 2014.09.14 13:01:10 - Connection terminated.
I 2014.09.14 13:01:10 - DNS of a network adapter restored to original settings (SAMSUNG_Android)
I 2014.09.14 13:01:10 - DNS of a network adapter restored to original settings (Wi-Fi)
I 2014.09.14 13:01:10 - DNS of a network adapter restored to original settings (Bluetooth PAN)
I 2014.09.14 13:01:10 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)
! 2014.09.14 13:01:14 - Waiting for latency tests
! 2014.09.14 13:01:14 - Checking authorization
. 2014.09.14 13:01:14 - Error: ConnectFailure (Network is unreachable)
. 2014.09.14 13:01:14 - Error: ConnectFailure (Network is unreachable)
. 2014.09.14 13:01:14 - Error: ConnectFailure (Network is unreachable)
. 2014.09.14 13:01:14 - Error: ConnectFailure (Network is unreachable)
. 2014.09.14 13:01:14 - Error: ConnectFailure (Network is unreachable)
. 2014.09.14 13:01:14 - Error: NameResolutionFailure
. 2014.09.14 13:01:14 - Error: NameResolutionFailure
. 2014.09.14 13:01:14 - Error: NameResolutionFailure
W 2014.09.14 13:01:14 - Error: ConnectFailure (Network is unreachable)
! 2014.09.14 13:01:17 - Checking authorization
. 2014.09.14 13:01:18 - Error getting response stream (ReadDone1): ReceiveFailure
. 2014.09.14 13:01:18 - Error getting response stream (ReadDone1): ReceiveFailure
. 2014.09.14 13:01:28 - The request timed out
! 2014.09.14 13:01:29 - Connecting to Kuma (United States, Manassas, Virginia)
. 2014.09.14 13:01:29 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014
. 2014.09.14 13:01:29 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05
. 2014.09.14 13:01:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2014.09.14 13:01:29 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2014.09.14 13:01:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 13:01:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 13:01:29 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]
. 2014.09.14 13:01:29 - OpenVPN > UDPv4 link local: [undef]
. 2014.09.14 13:01:29 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443
. 2014.09.14 13:01:29 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=4b058068 adbfd6e5
. 2014.09.14 13:01:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2014.09.14 13:01:30 - OpenVPN > Validating certificate key usage
. 2014.09.14 13:01:30 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2014.09.14 13:01:30 - OpenVPN > VERIFY KU OK
. 2014.09.14 13:01:30 - OpenVPN > Validating certificate extended key usage
. 2014.09.14 13:01:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2014.09.14 13:01:30 - OpenVPN > VERIFY EKU OK
. 2014.09.14 13:01:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2014.09.14 13:01:59 - Error getting response stream (ReadDone1): ReceiveFailure
. 2014.09.14 13:01:59 - Error: SendFailure (Error writing headers)
. 2014.09.14 13:02:05 - OpenVPN > [server] Inactivity timeout (--ping-exit), exiting
. 2014.09.14 13:02:05 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2014.09.14 13:02:09 - The request timed out
. 2014.09.14 13:02:10 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2014.09.14 13:02:10 - Disconnecting
. 2014.09.14 13:02:10 - Connection terminated.
! 2014.09.14 13:02:13 - Checking authorization
. 2014.09.14 13:02:13 - Error getting response stream (ReadDone1): ReceiveFailure
. 2014.09.14 13:02:23 - The request timed out
. 2014.09.14 13:02:33 - The request timed out
! 2014.09.14 13:02:34 - Connecting to Kuma (United States, Manassas, Virginia)
. 2014.09.14 13:02:34 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014
. 2014.09.14 13:02:34 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05
. 2014.09.14 13:02:34 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2014.09.14 13:02:34 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2014.09.14 13:02:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 13:02:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 13:02:34 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]
. 2014.09.14 13:02:34 - OpenVPN > UDPv4 link local: [undef]
. 2014.09.14 13:02:34 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443
. 2014.09.14 13:02:34 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=4fa4de69 82f0a521
. 2014.09.14 13:02:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2014.09.14 13:02:35 - OpenVPN > Validating certificate key usage
. 2014.09.14 13:02:35 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2014.09.14 13:02:35 - OpenVPN > VERIFY KU OK
. 2014.09.14 13:02:35 - OpenVPN > Validating certificate extended key usage
. 2014.09.14 13:02:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2014.09.14 13:02:35 - OpenVPN > VERIFY EKU OK
. 2014.09.14 13:02:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2014.09.14 13:03:34 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
. 2014.09.14 13:03:34 - OpenVPN > TLS Error: TLS handshake failed
. 2014.09.14 13:03:34 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting
. 2014.09.14 13:03:34 - OpenVPN > Restart pause, 2 second(s)
! 2014.09.14 13:03:34 - Disconnecting
. 2014.09.14 13:03:34 - Connection terminated.
! 2014.09.14 13:03:37 - Checking authorization
. 2014.09.14 13:03:38 - Error getting response stream (ReadDone1): ReceiveFailure
. 2014.09.14 13:03:48 - The request timed out
. 2014.09.14 13:03:58 - The request timed out
! 2014.09.14 13:03:59 - Connecting to Kuma (United States, Manassas, Virginia)
. 2014.09.14 13:03:59 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014
. 2014.09.14 13:03:59 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05
. 2014.09.14 13:03:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2014.09.14 13:03:59 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2014.09.14 13:03:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 13:03:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 13:03:59 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]
. 2014.09.14 13:03:59 - OpenVPN > UDPv4 link local: [undef]
. 2014.09.14 13:03:59 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443
. 2014.09.14 13:03:59 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=12e18f82 107b3b50
. 2014.09.14 13:04:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2014.09.14 13:04:01 - OpenVPN > Validating certificate key usage
. 2014.09.14 13:04:01 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2014.09.14 13:04:01 - OpenVPN > VERIFY KU OK
. 2014.09.14 13:04:01 - OpenVPN > Validating certificate extended key usage
. 2014.09.14 13:04:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2014.09.14 13:04:01 - OpenVPN > VERIFY EKU OK
. 2014.09.14 13:04:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2014.09.14 13:04:36 - OpenVPN > [server] Inactivity timeout (--ping-exit), exiting
. 2014.09.14 13:04:36 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2014.09.14 14:03:36 - OpenVPN > [server] Inactivity timeout (--ping-exit), exiting
. 2014.09.14 14:03:36 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting
! 2014.09.14 14:03:36 - Disconnecting
. 2014.09.14 14:03:36 - Connection terminated.
I 2014.09.14 14:03:36 - Session terminated.
. 2014.09.14 14:04:09 - Error getting response stream (ReadDone1): ReceiveFailure
. 2014.09.14 14:04:19 - The request timed out
. 2014.09.14 14:04:29 - The request timed out
. 2014.09.14 14:04:39 - The request timed out
I 2014.09.14 14:06:18 - Session starting.
! 2014.09.14 14:06:18 - Checking environment
! 2014.09.14 14:06:18 - Checking authorization
. 2014.09.14 14:06:18 - Error getting response stream (ReadDone1): ReceiveFailure
. 2014.09.14 14:06:28 - The request timed out
. 2014.09.14 14:06:38 - The request timed out
! 2014.09.14 14:06:39 - Connecting to Kuma (United States, Manassas, Virginia)
. 2014.09.14 14:06:39 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014
. 2014.09.14 14:06:39 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05
. 2014.09.14 14:06:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2014.09.14 14:06:39 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2014.09.14 14:06:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 14:06:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 14:06:39 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]
. 2014.09.14 14:06:39 - OpenVPN > UDPv4 link local: [undef]
. 2014.09.14 14:06:39 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443
. 2014.09.14 14:06:40 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=f685cd52 e1cfa20b
. 2014.09.14 14:06:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2014.09.14 14:06:41 - OpenVPN > Validating certificate key usage
. 2014.09.14 14:06:41 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2014.09.14 14:06:41 - OpenVPN > VERIFY KU OK
. 2014.09.14 14:06:41 - OpenVPN > Validating certificate extended key usage
. 2014.09.14 14:06:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2014.09.14 14:06:41 - OpenVPN > VERIFY EKU OK
. 2014.09.14 14:06:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2014.09.14 14:07:17 - OpenVPN > [server] Inactivity timeout (--ping-exit), exiting
. 2014.09.14 14:07:17 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2014.09.14 14:07:23 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2014.09.14 14:07:23 - Disconnecting
. 2014.09.14 14:07:23 - Connection terminated.
! 2014.09.14 14:07:26 - Checking authorization
. 2014.09.14 14:07:26 - Error: SendFailure (Error writing headers)
. 2014.09.14 14:07:36 - The request timed out
. 2014.09.14 14:07:46 - The request timed out
! 2014.09.14 14:07:47 - Connecting to Kuma (United States, Manassas, Virginia)
. 2014.09.14 14:07:47 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014
. 2014.09.14 14:07:47 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05
. 2014.09.14 14:07:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2014.09.14 14:07:47 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2014.09.14 14:07:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 14:07:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 14:07:47 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]
. 2014.09.14 14:07:47 - OpenVPN > UDPv4 link local: [undef]
. 2014.09.14 14:07:47 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443
. 2014.09.14 14:07:48 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=c8379507 0d5926a1
. 2014.09.14 14:07:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2014.09.14 14:07:49 - OpenVPN > Validating certificate key usage
. 2014.09.14 14:07:49 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2014.09.14 14:07:49 - OpenVPN > VERIFY KU OK
. 2014.09.14 14:07:49 - OpenVPN > Validating certificate extended key usage
. 2014.09.14 14:07:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2014.09.14 14:07:49 - OpenVPN > VERIFY EKU OK
. 2014.09.14 14:07:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2014.09.14 14:08:24 - OpenVPN > [server] Inactivity timeout (--ping-exit), exiting
. 2014.09.14 14:08:24 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2014.09.14 14:08:29 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2014.09.14 14:08:29 - Disconnecting
. 2014.09.14 14:08:29 - Connection terminated.
! 2014.09.14 14:08:32 - Checking authorization
. 2014.09.14 14:08:42 - The request timed out
. 2014.09.14 14:08:52 - The request timed out
. 2014.09.14 14:09:02 - The request timed out
! 2014.09.14 14:09:03 - Connecting to Kuma (United States, Manassas, Virginia)
. 2014.09.14 14:09:03 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014
. 2014.09.14 14:09:03 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05
. 2014.09.14 14:09:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2014.09.14 14:09:03 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2014.09.14 14:09:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 14:09:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 14:09:03 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]
. 2014.09.14 14:09:03 - OpenVPN > UDPv4 link local: [undef]
. 2014.09.14 14:09:03 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443
. 2014.09.14 14:09:04 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=4626bcab 57fd1f75
. 2014.09.14 14:09:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2014.09.14 14:09:05 - OpenVPN > Validating certificate key usage
. 2014.09.14 14:09:05 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2014.09.14 14:09:05 - OpenVPN > VERIFY KU OK
. 2014.09.14 14:09:05 - OpenVPN > Validating certificate extended key usage
. 2014.09.14 14:09:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2014.09.14 14:09:05 - OpenVPN > VERIFY EKU OK
. 2014.09.14 14:09:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2014.09.14 14:09:40 - OpenVPN > [server] Inactivity timeout (--ping-exit), exiting
. 2014.09.14 14:09:40 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2014.09.14 14:09:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2014.09.14 14:09:45 - Disconnecting
. 2014.09.14 14:09:45 - Connection terminated.
I 2014.09.14 14:09:45 - Cancel requested.
I 2014.09.14 14:09:45 - Session terminated.
I 2014.09.14 14:10:49 - Session starting.
! 2014.09.14 14:10:49 - Checking environment
! 2014.09.14 14:10:49 - Checking authorization
. 2014.09.14 14:10:59 - The request timed out
. 2014.09.14 14:11:09 - The request timed out
. 2014.09.14 14:11:19 - The request timed out
! 2014.09.14 14:11:20 - Connecting to Hadar (Hong Kong, Hong Kong)
. 2014.09.14 14:11:20 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014
. 2014.09.14 14:11:20 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05
. 2014.09.14 14:11:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2014.09.14 14:11:20 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2014.09.14 14:11:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 14:11:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 14:11:20 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]
. 2014.09.14 14:11:20 - OpenVPN > UDPv4 link local: [undef]
. 2014.09.14 14:11:20 - OpenVPN > UDPv4 link remote: [AF_INET]103.10.197.186:443
. 2014.09.14 14:11:20 - OpenVPN > TLS: Initial packet from [AF_INET]103.10.197.186:443, sid=c6944af9 f68af350
. 2014.09.14 14:12:20 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
. 2014.09.14 14:12:20 - OpenVPN > TLS Error: TLS handshake failed
. 2014.09.14 14:12:20 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting
. 2014.09.14 14:12:20 - OpenVPN > Restart pause, 2 second(s)
! 2014.09.14 14:12:20 - Disconnecting
. 2014.09.14 14:12:20 - Connection terminated.
! 2014.09.14 14:12:23 - Checking authorization
. 2014.09.14 14:12:33 - The request timed out
. 2014.09.14 14:12:43 - The request timed out
. 2014.09.14 14:12:53 - The request timed out
! 2014.09.14 14:12:54 - Connecting to Kuma (United States, Manassas, Virginia)
. 2014.09.14 14:12:54 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014
. 2014.09.14 14:12:54 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05
. 2014.09.14 14:12:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2014.09.14 14:12:54 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2014.09.14 14:12:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 14:12:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 14:12:54 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]
. 2014.09.14 14:12:54 - OpenVPN > UDPv4 link local: [undef]
. 2014.09.14 14:12:54 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443
. 2014.09.14 14:12:55 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=c7c6f319 0d40277c
. 2014.09.14 14:12:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2014.09.14 14:12:56 - OpenVPN > Validating certificate key usage
. 2014.09.14 14:12:56 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2014.09.14 14:12:56 - OpenVPN > VERIFY KU OK
. 2014.09.14 14:12:56 - OpenVPN > Validating certificate extended key usage
. 2014.09.14 14:12:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2014.09.14 14:12:56 - OpenVPN > VERIFY EKU OK
. 2014.09.14 14:12:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2014.09.14 14:12:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2014.09.14 14:12:59 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 14:12:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2014.09.14 14:12:59 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.09.14 14:12:59 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2014.09.14 14:12:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.115.117.213:443
. 2014.09.14 14:13:02 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2014.09.14 14:13:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2014.09.14 14:13:12 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2014.09.14 14:13:17 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2014.09.14 14:13:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2014.09.14 14:13:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2014.09.14 14:13:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2014.09.14 14:13:37 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2014.09.14 14:13:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2014.09.14 14:13:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2014.09.14 14:13:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2014.09.14 14:13:57 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2014.09.14 14:14:02 - OpenVPN > No reply from server after sending 12 push requests
. 2014.09.14 14:14:02 - OpenVPN > SIGUSR1[soft,no-push-reply] received, process restarting
. 2014.09.14 14:14:02 - OpenVPN > Restart pause, 2 second(s)
. 2014.09.14 14:14:04 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]
. 2014.09.14 14:14:04 - OpenVPN > UDPv4 link local: [undef]
. 2014.09.14 14:14:04 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443
. 2014.09.14 14:14:05 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=04fe4f86 f46d7934
! 2014.09.14 14:14:07 - Disconnecting
. 2014.09.14 14:14:07 - Connection terminated.
I 2014.09.14 14:14:07 - Cancel requested.
I 2014.09.14 14:14:07 - Session terminated.
. 2014.09.14 14:15:05 - The request timed out
. 2014.09.14 14:15:15 - The request timed out
. 2014.09.14 14:15:25 - The request timed out

 

BTW your site is completly blocked from China.

 

[parts removed to protect competing services, see answer to this message]

 

So what can i do now ?

Thanks !

Share this post


Link to post

Hello!

 

Our service is based on OpenVPN and OpenVPN connections are disrupted in most China residential lines. This is possible because OpenVPN packets headers (not payload, which are of course encrypted) have some additional information for packet re-ordering that make them discernible (with DPI) from pure TLS/SSL connections.

 

PPTP with insecure authentication (not supported by us) is not disrupted (that's why you could use other non-OpenVPN based services, probably), maybe because it's not a problem for Chinese authorities (they can break it and decrypt the traffic flow very quickly and easily).

In order to bypass the block, OpenVPN over SSL is necessary. The first SSL tunnel encrypts the OpenVPN "fingerprint" to make it not detectable. The method has been tested as successful since more than a year ago from various China areas, including Shanghai and Beijing.

Unfortunately, OpenVPN over SSL is available for Linux, Windows and OS X only. It is not working on Android and iOS for limitations of the openvpn app. Anyway, many mobile networks in China do not block OpenVPN, so this is a relatively minor problem.

Our client Eddie (for Linux, OS X and Windows) implements OpenVPN over SSL, that can be activated with a click. All of our VPN servers accept this connection mode. On Eddie, click "AirVPN" button, select "Preferences", click "Protocols" tab, select "SSL Tunnel - Port 443" and click "Save".

 

As you can see from the logs, Eddie client is perfectly capable to establish a connection even if your system can't reach our web site. Please contact us in private (open a ticket) if you want to access our web site even without VPN.

Kind regards
 

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...