Jump to content
Not connected, Your IP: 3.137.180.62

Recommended Posts

Hello

 

I can't connect cause timing out.

 

It freezed on "Checking Route" message

 

 

Any help please?

 

 

 

 

 

 

 

 

Share this post


Link to post

thanks man but it does'nt work yet

 

I attach error-log

 

Any help is appreciated

 

I 2015.02.18 18:26:32 - AirVPN client version: 2.8.8, System: Linux, Name: Kali GNU/Linux 1.1.0 \n \l, Architecture: x86
. 2015.02.18 18:26:32 - Reading options from /root/.airvpn/AirVPN.xml
. 2015.02.18 18:26:34 - Data Path: /root/.airvpn
. 2015.02.18 18:26:34 - App Path: /usr/lib/AirVPN
. 2015.02.18 18:26:34 - Executable Path: /usr/lib/AirVPN/AirVPN.exe
. 2015.02.18 18:26:34 - Command line arguments (1): path="/root/.airvpn"
. 2015.02.18 18:26:34 - Operating System: Unix 3.18.0.1 - Linux kali 3.18.0-kali1-686-pae #1 SMP Debian 3.18.3-1~kali4 (2015-01-22) i686 GNU/Linux
I 2015.02.18 18:26:34 - OpenVPN Driver - Found
I 2015.02.18 18:26:34 - OpenVPN - Version: OpenVPN 2.2.1 (/usr/sbin/openvpn)
I 2015.02.18 18:26:34 - SSH - Version: OpenSSH_6.0p1 Debian-4+deb7u2, OpenSSL 1.0.1e 11 Feb 2013 (/usr/bin/ssh)
I 2015.02.18 18:26:34 - SSL - Version: stunnel 4.53 (/usr/bin/stunnel4)
I 2015.02.18 18:26:34 - IPV6: Available
! 2015.02.18 18:26:34 - Ready
I 2015.02.18 18:28:33 - Session starting.
I 2015.02.18 18:28:33 - Installing tunnel driver
I 2015.02.18 18:28:33 - Checking authorization ...
! 2015.02.18 18:28:38 - Connecting to Grumium (Canada, Toronto, Ontario)
. 2015.02.18 18:28:38 - TOR Control authentication method: Cookie, from /root/Desktop/tor-browser_it/Browser/TorBrowser/Data/Tor/control_auth_cookie
. 2015.02.18 18:28:39 - TOR Control Guard IP detected: 37.187.130.68 (9C823407CE8D1880F34187E6E2F9CA341B1EB238)
. 2015.02.18 18:28:39 - TOR Control Guard IP detected: 195.154.226.5 (6648572801DA8919C78166CBEB06EC38FD482759)
. 2015.02.18 18:28:39 - TOR Control Guard IP detected: 193.11.114.45 (80AAF8D5956A43C197104CEF2550CD42D165C6FB)
. 2015.02.18 18:28:39 - OpenVPN > OpenVPN 2.2.1 i486-linux-gnu [sSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [iPv6 payload 20110424-2 (2.2RC2)] built on Dec  1 2014
. 2015.02.18 18:28:39 - OpenVPN > RESOLVE: NOTE: localhost resolves to 2 addresses
. 2015.02.18 18:28:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2015.02.18 18:28:39 - OpenVPN > NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
. 2015.02.18 18:28:39 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2015.02.18 18:28:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.02.18 18:28:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.02.18 18:28:39 - OpenVPN > LZO compression initialized
. 2015.02.18 18:28:39 - OpenVPN > Control Channel MTU parms [ L:1560 D:168 EF:68 EB:0 ET:0 EL:0 ]
. 2015.02.18 18:28:39 - OpenVPN > Socket Buffers: R=[87380->131072] S=[16384->131072]
. 2015.02.18 18:28:39 - OpenVPN > Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:135 ET:0 EL:0 AF:3/1 ]
. 2015.02.18 18:28:39 - OpenVPN > Local Options hash (VER=V4): '2f2c6498'
. 2015.02.18 18:28:39 - OpenVPN > Expected Remote Options hash (VER=V4): '9915e4a2'
. 2015.02.18 18:28:39 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 [nonblock]
. 2015.02.18 18:28:39 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:9150
. 2015.02.18 18:28:44 - OpenVPN > recv_socks_reply: TCP port read timeout expired: Operation now in progress (errno=115)
. 2015.02.18 18:28:44 - OpenVPN > TCP/UDP: Closing socket
. 2015.02.18 18:28:44 - OpenVPN > SIGTERM[soft,init_instance] received, process exiting
! 2015.02.18 18:28:44 - Disconnecting
. 2015.02.18 18:28:44 - Connection terminated.
I 2015.02.18 18:28:47 - Checking authorization ...
! 2015.02.18 18:28:54 - Connecting to Grumium (Canada, Toronto, Ontario)
. 2015.02.18 18:28:54 - TOR Control authentication method: Cookie, from /root/Desktop/tor-browser_it/Browser/TorBrowser/Data/Tor/control_auth_cookie
. 2015.02.18 18:28:54 - TOR Control Guard IP detected: 193.11.114.45 (80AAF8D5956A43C197104CEF2550CD42D165C6FB)
. 2015.02.18 18:28:55 - TOR Control Guard IP detected: 37.187.130.68 (9C823407CE8D1880F34187E6E2F9CA341B1EB238)
. 2015.02.18 18:28:55 - TOR Control Guard IP detected: 195.154.226.5 (6648572801DA8919C78166CBEB06EC38FD482759)
. 2015.02.18 18:28:55 - OpenVPN > OpenVPN 2.2.1 i486-linux-gnu [sSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [iPv6 payload 20110424-2 (2.2RC2)] built on Dec  1 2014
. 2015.02.18 18:28:55 - OpenVPN > RESOLVE: NOTE: localhost resolves to 2 addresses
. 2015.02.18 18:28:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2015.02.18 18:28:55 - OpenVPN > NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
. 2015.02.18 18:28:55 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2015.02.18 18:28:55 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.02.18 18:28:55 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.02.18 18:28:55 - OpenVPN > LZO compression initialized
. 2015.02.18 18:28:55 - OpenVPN > Control Channel MTU parms [ L:1560 D:168 EF:68 EB:0 ET:0 EL:0 ]
. 2015.02.18 18:28:55 - OpenVPN > Socket Buffers: R=[87380->131072] S=[16384->131072]
. 2015.02.18 18:28:55 - OpenVPN > Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:135 ET:0 EL:0 AF:3/1 ]
. 2015.02.18 18:28:55 - OpenVPN > Local Options hash (VER=V4): '2f2c6498'
. 2015.02.18 18:28:55 - OpenVPN > Expected Remote Options hash (VER=V4): '9915e4a2'
. 2015.02.18 18:28:55 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 [nonblock]
. 2015.02.18 18:28:55 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:9150
. 2015.02.18 18:28:59 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2015.02.18 18:28:59 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:9150
. 2015.02.18 18:29:01 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:9150, sid=5f4211c9 01190551
. 2015.02.18 18:29:09 - OpenVPN > VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org
. 2015.02.18 18:29:09 - OpenVPN > Validating certificate key usage
. 2015.02.18 18:29:09 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2015.02.18 18:29:09 - OpenVPN > VERIFY KU OK
. 2015.02.18 18:29:09 - OpenVPN > Validating certificate extended key usage
. 2015.02.18 18:29:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2015.02.18 18:29:09 - OpenVPN > VERIFY EKU OK
. 2015.02.18 18:29:09 - OpenVPN > VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org
. 2015.02.18 18:29:26 - OpenVPN > Connection reset, restarting [0]
. 2015.02.18 18:29:26 - OpenVPN > TCP/UDP: Closing socket
. 2015.02.18 18:29:26 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2015.02.18 18:29:26 - OpenVPN > Restart pause, 5 second(s)
! 2015.02.18 18:29:26 - Disconnecting
. 2015.02.18 18:29:26 - Connection terminated.
I 2015.02.18 18:29:29 - Checking authorization ...
! 2015.02.18 18:29:34 - Connecting to Grumium (Canada, Toronto, Ontario)
. 2015.02.18 18:29:35 - TOR Control authentication method: Cookie, from /root/Desktop/tor-browser_it/Browser/TorBrowser/Data/Tor/control_auth_cookie
. 2015.02.18 18:29:35 - TOR Control Guard IP detected: 193.11.114.45 (80AAF8D5956A43C197104CEF2550CD42D165C6FB)
. 2015.02.18 18:29:35 - TOR Control Guard IP detected: 37.187.130.68 (9C823407CE8D1880F34187E6E2F9CA341B1EB238)
. 2015.02.18 18:29:35 - TOR Control Guard IP detected: 195.154.226.5 (6648572801DA8919C78166CBEB06EC38FD482759)
. 2015.02.18 18:29:36 - OpenVPN > OpenVPN 2.2.1 i486-linux-gnu [sSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [iPv6 payload 20110424-2 (2.2RC2)] built on Dec  1 2014
. 2015.02.18 18:29:36 - OpenVPN > RESOLVE: NOTE: localhost resolves to 2 addresses
. 2015.02.18 18:29:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2015.02.18 18:29:36 - OpenVPN > NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
. 2015.02.18 18:29:36 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2015.02.18 18:29:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.02.18 18:29:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.02.18 18:29:36 - OpenVPN > LZO compression initialized
. 2015.02.18 18:29:36 - OpenVPN > Control Channel MTU parms [ L:1560 D:168 EF:68 EB:0 ET:0 EL:0 ]
. 2015.02.18 18:29:36 - OpenVPN > Socket Buffers: R=[87380->131072] S=[16384->131072]
. 2015.02.18 18:29:36 - OpenVPN > Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:135 ET:0 EL:0 AF:3/1 ]
. 2015.02.18 18:29:36 - OpenVPN > Local Options hash (VER=V4): '2f2c6498'
. 2015.02.18 18:29:36 - OpenVPN > Expected Remote Options hash (VER=V4): '9915e4a2'
. 2015.02.18 18:29:36 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 [nonblock]
. 2015.02.18 18:29:36 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:9150
. 2015.02.18 18:29:39 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2015.02.18 18:29:39 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:9150
 

Share this post


Link to post

. 2015.02.18 18:28:44 - OpenVPN > recv_socks_reply: TCP port read timeout expired: Operation now in progress (errno=115)

 

This seems to be a quite old (more than a year for sure) and unfixed problem of OpenVPN when routed through a SOCKS proxy. Seen here.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Hello,

 

we remind you that this years old bug has been patched since a long ago in our OpenVPN versions. You can find them (for Linux, Windows and OS X Mavericks/Yosemite) inside our client packages, if you wish to test.

 

Kind regards

Share this post


Link to post

 

Hello,

 

we remind you that this years old bug has been patched since a long ago in our OpenVPN versions. You can find them (for Linux, Windows and OS X Mavericks/Yosemite) inside our client packages, if you wish to test.

 

Kind regards

 

 

Dear Staff,

 

I didnt understand if i have to apply patch or download the OPNVPN Client version in the dedicated page.

 

I'm quite n00b and would be hard for me to apply that kind of patch to src/openvpn/init.c (i can't find it in my Kali's home)

 

 

Thx for support

Share this post


Link to post

Run a dpkg list / search to get the full name.

 

dpkg-query -l air

or

dpkg-query -l airvpn

 

Once you see the exact name then just run:

dpkg -r package-name

aka

dpkg -r airvpn.full.name

 

 

Then to install.

dpkg -i package.name

 

If its missing dependencies during the install just run:

apt-get -f install

Share this post


Link to post

Run a dpkg list / search to get the full name.

 

dpkg-query -l air

or

dpkg-query -l airvpn

 

Once you see the exact name then just run:

dpkg -r package-name

aka

dpkg -r airvpn.full.name

 

 

Then to install.

dpkg -i package.name

 

If its missing dependencies during the install just run:

apt-get -f install

Thanks a lot but after a quick test, i found a trick.

The issue exists only when i set the client in order to be used behind a TOR session

 

If i use the "normal" mode, it works correctly.

 

So, i dont know if its useful to download again the client....

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...