Jump to content
Not connected, Your IP: 3.147.46.174
Sign in to follow this  
Sukmi

Can´t connect to any server. The vpn client disconnects constantly. Please help

Recommended Posts

Hi there, 

 

i have a big problem with the airvpn client since yesterday. I have tried several times yesterday and today to connect to any of the servers (manuelly and automaticly), but it doesn´t word. The client flushes DNS, checks the route and then disconnects, restarts and starts the same steps again. I have no idea where the problem comes. The client worked on saturday perfect. I have read that some other peoples have similar problems too. I have disabled the TCP/IPv6 on the TAP adaptor (this was a solution suggested in the topic) but it doesnt word for me...

 

Please help me! What should i do?? Thanks in advance ;-)

 

This are the logfiles from the client: 

 

 

I 2014.11.10 22:05:21 - AirVPN client version: 2.4, System: Windows, Architecture: x64
. 2014.11.10 22:05:21 - Reading options from C:\Users\Ivo\AppData\Local\AirVPN\AirVPN.xml
. 2014.11.10 22:05:21 - Data Path: C:\Users\Ivo\AppData\Local\AirVPN
. 2014.11.10 22:05:21 - App Path: C:\Program Files\AirVPN
. 2014.11.10 22:05:21 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2014.11.10 22:05:21 - Command line arguments: path="home"
. 2014.11.10 22:05:21 - Operating System: Microsoft Windows NT 6.1.7600.0
I 2014.11.10 22:05:21 - OpenVPN Driver - TAP-Windows Adapter V9
I 2014.11.10 22:05:22 - OpenVPN - Version: OpenVPN 2.3.4 (C:\Program Files\AirVPN\openvpn.exe)
I 2014.11.10 22:05:22 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2014.11.10 22:05:22 - SSL - Version: stunnel 4.56 (C:\Program Files\AirVPN\stunnel.exe)
I 2014.11.10 22:05:22 - IPV6: Available
! 2014.11.10 22:05:22 - Ready
! 2014.11.10 22:05:26 - Logout ...
! 2014.11.10 22:05:26 - Logged out.
! 2014.11.10 22:05:32 - Checking login ...
! 2014.11.10 22:05:33 - Logged in.
I 2014.11.10 22:05:35 - Session starting.
! 2014.11.10 22:05:35 - Checking environment
! 2014.11.10 22:05:35 - Checking authorization
! 2014.11.10 22:05:36 - Connecting to Leporis (Netherlands, Amsterdam)
. 2014.11.10 22:05:36 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 18 2014
. 2014.11.10 22:05:36 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05
. 2014.11.10 22:05:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2014.11.10 22:05:40 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2014.11.10 22:05:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.10 22:05:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.10 22:05:40 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192]
. 2014.11.10 22:05:40 - OpenVPN > UDPv4 link local: [undef]
. 2014.11.10 22:05:40 - OpenVPN > UDPv4 link remote: [AF_INET]95.211.191.33:443
. 2014.11.10 22:05:40 - OpenVPN > TLS: Initial packet from [AF_INET]95.211.191.33:443, sid=686de5df f2a76ce3
. 2014.11.10 22:05:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2014.11.10 22:05:40 - OpenVPN > Validating certificate key usage
. 2014.11.10 22:05:40 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2014.11.10 22:05:40 - OpenVPN > VERIFY KU OK
. 2014.11.10 22:05:40 - OpenVPN > Validating certificate extended key usage
. 2014.11.10 22:05:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2014.11.10 22:05:40 - OpenVPN > VERIFY EKU OK
. 2014.11.10 22:05:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2014.11.10 22:05:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2014.11.10 22:05:42 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.10 22:05:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2014.11.10 22:05:42 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.10 22:05:42 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2014.11.10 22:05:42 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]95.211.191.33:443
. 2014.11.10 22:05:44 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2014.11.10 22:05:44 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.129.146 10.4.129.145'
. 2014.11.10 22:05:44 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2014.11.10 22:05:44 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2014.11.10 22:05:44 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2014.11.10 22:05:44 - OpenVPN > OPTIONS IMPORT: route options modified
. 2014.11.10 22:05:44 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2014.11.10 22:05:44 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2014.11.10 22:05:44 - OpenVPN > open_tun, tt->ipv6=0
. 2014.11.10 22:05:44 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{B52228BE-8D34-4E3E-9DA3-ADEAECAA2F4E}.tap
. 2014.11.10 22:05:44 - OpenVPN > TAP-Windows Driver Version 9.9
. 2014.11.10 22:05:44 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.129.146/255.255.255.252 on interface {B52228BE-8D34-4E3E-9DA3-ADEAECAA2F4E} [DHCP-serv: 10.4.129.145, lease-time: 31536000]
. 2014.11.10 22:05:44 - OpenVPN > Successful ARP Flush on interface [17] {B52228BE-8D34-4E3E-9DA3-ADEAECAA2F4E}
. 2014.11.10 22:05:49 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2014.11.10 22:05:49 - OpenVPN > C:\windows\system32\route.exe ADD 95.211.191.33 MASK 255.255.255.255 192.168.1.1
. 2014.11.10 22:05:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2014.11.10 22:05:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2014.11.10 22:05:49 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.129.145
. 2014.11.10 22:05:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2014.11.10 22:05:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2014.11.10 22:05:49 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.129.145
. 2014.11.10 22:05:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2014.11.10 22:05:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2014.11.10 22:05:49 - OpenVPN > C:\windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.129.145
. 2014.11.10 22:05:49 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2014.11.10 22:05:49 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2014.11.10 22:05:49 - Starting Management Interface
. 2014.11.10 22:05:49 - OpenVPN > Initialization Sequence Completed
! 2014.11.10 22:05:49 - Flushing DNS
! 2014.11.10 22:05:57 - Checking route
W 2014.11.10 22:06:07 - Timeout für Vorgang überschritten
! 2014.11.10 22:06:07 - Disconnecting
. 2014.11.10 22:06:07 - Management - Send 'signal SIGTERM'
. 2014.11.10 22:06:07 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2014.11.10 22:06:07 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2014.11.10 22:06:08 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2014.11.10 22:06:12 - OpenVPN > C:\windows\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.129.145
. 2014.11.10 22:06:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2014.11.10 22:06:12 - OpenVPN > C:\windows\system32\route.exe DELETE 95.211.191.33 MASK 255.255.255.255 192.168.1.1
. 2014.11.10 22:06:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2014.11.10 22:06:12 - OpenVPN > C:\windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.129.145
. 2014.11.10 22:06:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2014.11.10 22:06:12 - OpenVPN > C:\windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.129.145
. 2014.11.10 22:06:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2014.11.10 22:06:12 - OpenVPN > Closing TUN/TAP interface
. 2014.11.10 22:06:12 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2014.11.10 22:06:12 - Connection terminated.
! 2014.11.10 22:06:15 - Checking authorization
! 2014.11.10 22:06:16 - Connecting to Leporis (Netherlands, Amsterdam)
. 2014.11.10 22:06:16 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 18 2014
. 2014.11.10 22:06:16 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05
. 2014.11.10 22:06:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2014.11.10 22:06:20 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2014.11.10 22:06:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.10 22:06:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.10 22:06:20 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192]
. 2014.11.10 22:06:20 - OpenVPN > UDPv4 link local: [undef]
. 2014.11.10 22:06:20 - OpenVPN > UDPv4 link remote: [AF_INET]95.211.191.33:443
. 2014.11.10 22:06:20 - OpenVPN > TLS: Initial packet from [AF_INET]95.211.191.33:443, sid=af49e840 a898c1a5
. 2014.11.10 22:06:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2014.11.10 22:06:20 - OpenVPN > Validating certificate key usage
. 2014.11.10 22:06:20 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2014.11.10 22:06:20 - OpenVPN > VERIFY KU OK
. 2014.11.10 22:06:20 - OpenVPN > Validating certificate extended key usage
. 2014.11.10 22:06:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2014.11.10 22:06:20 - OpenVPN > VERIFY EKU OK
. 2014.11.10 22:06:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2014.11.10 22:06:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2014.11.10 22:06:26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.10 22:06:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2014.11.10 22:06:26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.10 22:06:26 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2014.11.10 22:06:26 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]95.211.191.33:443
. 2014.11.10 22:06:28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2014.11.10 22:06:28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.129.146 10.4.129.145'
. 2014.11.10 22:06:28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2014.11.10 22:06:28 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2014.11.10 22:06:28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2014.11.10 22:06:28 - OpenVPN > OPTIONS IMPORT: route options modified
. 2014.11.10 22:06:28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2014.11.10 22:06:28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2014.11.10 22:06:28 - OpenVPN > open_tun, tt->ipv6=0
. 2014.11.10 22:06:28 - OpenVPN > TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{B52228BE-8D34-4E3E-9DA3-ADEAECAA2F4E}.tap
. 2014.11.10 22:06:28 - OpenVPN > TAP-Windows Driver Version 9.9
. 2014.11.10 22:06:28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.129.146/255.255.255.252 on interface {B52228BE-8D34-4E3E-9DA3-ADEAECAA2F4E} [DHCP-serv: 10.4.129.145, lease-time: 31536000]
. 2014.11.10 22:06:28 - OpenVPN > Successful ARP Flush on interface [17] {B52228BE-8D34-4E3E-9DA3-ADEAECAA2F4E}
. 2014.11.10 22:06:33 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2014.11.10 22:06:33 - OpenVPN > C:\windows\system32\route.exe ADD 95.211.191.33 MASK 255.255.255.255 192.168.1.1
. 2014.11.10 22:06:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2014.11.10 22:06:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2014.11.10 22:06:33 - OpenVPN > C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.129.145
. 2014.11.10 22:06:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2014.11.10 22:06:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2014.11.10 22:06:33 - OpenVPN > C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.129.145
. 2014.11.10 22:06:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2014.11.10 22:06:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2014.11.10 22:06:33 - OpenVPN > C:\windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.129.145
. 2014.11.10 22:06:33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2014.11.10 22:06:33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2014.11.10 22:06:33 - Starting Management Interface
. 2014.11.10 22:06:33 - OpenVPN > Initialization Sequence Completed
! 2014.11.10 22:06:33 - Flushing DNS
! 2014.11.10 22:06:41 - Checking route
 

Share this post


Link to post

Hello!

 

Please upgrade to client version 2.7 and try again.

 

If the problem persists, please try a connection in TCP. You can change connection mode in menu "AirVPN" -> "Preferences" -> "Protocols". Feel free to post the logs in TCP as well.

 

If the client keeps failing in UDP and/or TCP at "checking route" state, disable the check: in "AirVPN" -> "Preferences" -> "Advanced" un-tick "Check if the tunnel effectively works", click "Save" try again a connection, open a browser and browse to airvpn.org. Check whether the central bottom box is red or green.

 

Feel free to update the thread.

 

Kind regards

Share this post


Link to post

Hello, 

 

thank you for the quick reply on my topic! I have tried to test the client again this morning and it works again without doing any changes on the set up. Probably there was something wrong with the servers previous days or with my system. I don´t know but it works now and i am happy. 

 

Best regards

Share this post


Link to post
Posted ... (edited)

Hi there,

 

I have a similar issue,connection fails :timeout

 

Mar  6 11:23:56 **** nm-openvpn[15769]: Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 [nonblock]
Mar  6 11:23:56 **** nm-openvpn[15769]: TCP: connect to [AF_INET]127.0.0.1:1413 failed, will try again in 5 seconds: Connection refused
Mar  6 11:24:37 **** NetworkManager[714]: <warn> VPN connection 'AirVPN_FR-Furud_SSL-443' (IP Config Get) timeout exceeded.
Mar  6 11:24:37 ****NetworkManager[714]: <info> Policy set 'Wired connection 1' (eth0) as default for IPv4 routing and DNS.
Mar  6 11:24:36 **** nm-openvpn[15769]: message repeated 8 times: [ TCP: connect to [AF_INET]127.0.0.1:1413 failed, will try again in 5 seconds: Connection refused]
Mar  6 11:24:37 **** nm-openvpn[15769]: SIGTERM[hard,init_instance] received, process exiting
Mar  6 11:24:42 **** NetworkManager[714]: <info> VPN service 'openvpn' disappeared
 

i activated DMZ on my router as sugested here below no sucess either + Firewall & antispam are disactivated.

 

https://lafibre.info/images/bbox/Bbox_Technicolor_84K5_D6.png

https://lafibre.info/bbox-tutoriels/ouvrir-tous-les-ports-vers-un-pc-dmz-sur-une-bbox-adsl-thomson/

https://craym.eu/tutoriels/utilitaires/ouvrir_les_ports_de_sa_box/bbox_nat.png

 

i have made NAT/PAT rules :

TCP PORT 443 mySystem-IP  destination PORT 1413

UDP PORT 53   mySytem-IP    destination PORT 1413

 

no success

 

Best regards

 

edit:solved 2 days later with UDP PORT 80

without editing rules in Router

Thanks AirVpn Support Team for usefull info & support

Edited ... by TotalKheops

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...