lavezzi7 0 Posted ... Hello I can't connect cause timing out. It freezed on "Checking Route" message Any help please? Quote Share this post Link to post
OpenSourcerer 1435 Posted ... https://airvpn.org/topic/13580-checking-route-fails/?hl=%2Bchecking+%2Broutehttps://airvpn.org/topic/13317-checking-route-failed-on-every-server/?hl=%2Bchecking+%2Broutehttps://airvpn.org/topic/13256-windows-timeout-during-checking-route-every-time/?hl=%2Bchecking+%2Broute.. and more. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
lavezzi7 0 Posted ... thanks man but it does'nt work yet I attach error-log Any help is appreciated I 2015.02.18 18:26:32 - AirVPN client version: 2.8.8, System: Linux, Name: Kali GNU/Linux 1.1.0 \n \l, Architecture: x86. 2015.02.18 18:26:32 - Reading options from /root/.airvpn/AirVPN.xml. 2015.02.18 18:26:34 - Data Path: /root/.airvpn. 2015.02.18 18:26:34 - App Path: /usr/lib/AirVPN. 2015.02.18 18:26:34 - Executable Path: /usr/lib/AirVPN/AirVPN.exe. 2015.02.18 18:26:34 - Command line arguments (1): path="/root/.airvpn". 2015.02.18 18:26:34 - Operating System: Unix 3.18.0.1 - Linux kali 3.18.0-kali1-686-pae #1 SMP Debian 3.18.3-1~kali4 (2015-01-22) i686 GNU/LinuxI 2015.02.18 18:26:34 - OpenVPN Driver - FoundI 2015.02.18 18:26:34 - OpenVPN - Version: OpenVPN 2.2.1 (/usr/sbin/openvpn)I 2015.02.18 18:26:34 - SSH - Version: OpenSSH_6.0p1 Debian-4+deb7u2, OpenSSL 1.0.1e 11 Feb 2013 (/usr/bin/ssh)I 2015.02.18 18:26:34 - SSL - Version: stunnel 4.53 (/usr/bin/stunnel4)I 2015.02.18 18:26:34 - IPV6: Available! 2015.02.18 18:26:34 - ReadyI 2015.02.18 18:28:33 - Session starting.I 2015.02.18 18:28:33 - Installing tunnel driverI 2015.02.18 18:28:33 - Checking authorization ...! 2015.02.18 18:28:38 - Connecting to Grumium (Canada, Toronto, Ontario). 2015.02.18 18:28:38 - TOR Control authentication method: Cookie, from /root/Desktop/tor-browser_it/Browser/TorBrowser/Data/Tor/control_auth_cookie. 2015.02.18 18:28:39 - TOR Control Guard IP detected: 37.187.130.68 (9C823407CE8D1880F34187E6E2F9CA341B1EB238). 2015.02.18 18:28:39 - TOR Control Guard IP detected: 195.154.226.5 (6648572801DA8919C78166CBEB06EC38FD482759). 2015.02.18 18:28:39 - TOR Control Guard IP detected: 193.11.114.45 (80AAF8D5956A43C197104CEF2550CD42D165C6FB). 2015.02.18 18:28:39 - OpenVPN > OpenVPN 2.2.1 i486-linux-gnu [sSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [iPv6 payload 20110424-2 (2.2RC2)] built on Dec 1 2014. 2015.02.18 18:28:39 - OpenVPN > RESOLVE: NOTE: localhost resolves to 2 addresses. 2015.02.18 18:28:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2015.02.18 18:28:39 - OpenVPN > NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables. 2015.02.18 18:28:39 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2015.02.18 18:28:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.18 18:28:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.18 18:28:39 - OpenVPN > LZO compression initialized. 2015.02.18 18:28:39 - OpenVPN > Control Channel MTU parms [ L:1560 D:168 EF:68 EB:0 ET:0 EL:0 ]. 2015.02.18 18:28:39 - OpenVPN > Socket Buffers: R=[87380->131072] S=[16384->131072]. 2015.02.18 18:28:39 - OpenVPN > Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:135 ET:0 EL:0 AF:3/1 ]. 2015.02.18 18:28:39 - OpenVPN > Local Options hash (VER=V4): '2f2c6498'. 2015.02.18 18:28:39 - OpenVPN > Expected Remote Options hash (VER=V4): '9915e4a2'. 2015.02.18 18:28:39 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 [nonblock]. 2015.02.18 18:28:39 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:9150. 2015.02.18 18:28:44 - OpenVPN > recv_socks_reply: TCP port read timeout expired: Operation now in progress (errno=115). 2015.02.18 18:28:44 - OpenVPN > TCP/UDP: Closing socket. 2015.02.18 18:28:44 - OpenVPN > SIGTERM[soft,init_instance] received, process exiting! 2015.02.18 18:28:44 - Disconnecting. 2015.02.18 18:28:44 - Connection terminated.I 2015.02.18 18:28:47 - Checking authorization ...! 2015.02.18 18:28:54 - Connecting to Grumium (Canada, Toronto, Ontario). 2015.02.18 18:28:54 - TOR Control authentication method: Cookie, from /root/Desktop/tor-browser_it/Browser/TorBrowser/Data/Tor/control_auth_cookie. 2015.02.18 18:28:54 - TOR Control Guard IP detected: 193.11.114.45 (80AAF8D5956A43C197104CEF2550CD42D165C6FB). 2015.02.18 18:28:55 - TOR Control Guard IP detected: 37.187.130.68 (9C823407CE8D1880F34187E6E2F9CA341B1EB238). 2015.02.18 18:28:55 - TOR Control Guard IP detected: 195.154.226.5 (6648572801DA8919C78166CBEB06EC38FD482759). 2015.02.18 18:28:55 - OpenVPN > OpenVPN 2.2.1 i486-linux-gnu [sSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [iPv6 payload 20110424-2 (2.2RC2)] built on Dec 1 2014. 2015.02.18 18:28:55 - OpenVPN > RESOLVE: NOTE: localhost resolves to 2 addresses. 2015.02.18 18:28:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2015.02.18 18:28:55 - OpenVPN > NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables. 2015.02.18 18:28:55 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2015.02.18 18:28:55 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.18 18:28:55 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.18 18:28:55 - OpenVPN > LZO compression initialized. 2015.02.18 18:28:55 - OpenVPN > Control Channel MTU parms [ L:1560 D:168 EF:68 EB:0 ET:0 EL:0 ]. 2015.02.18 18:28:55 - OpenVPN > Socket Buffers: R=[87380->131072] S=[16384->131072]. 2015.02.18 18:28:55 - OpenVPN > Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:135 ET:0 EL:0 AF:3/1 ]. 2015.02.18 18:28:55 - OpenVPN > Local Options hash (VER=V4): '2f2c6498'. 2015.02.18 18:28:55 - OpenVPN > Expected Remote Options hash (VER=V4): '9915e4a2'. 2015.02.18 18:28:55 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 [nonblock]. 2015.02.18 18:28:55 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:9150. 2015.02.18 18:28:59 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2015.02.18 18:28:59 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:9150. 2015.02.18 18:29:01 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:9150, sid=5f4211c9 01190551. 2015.02.18 18:29:09 - OpenVPN > VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org. 2015.02.18 18:29:09 - OpenVPN > Validating certificate key usage. 2015.02.18 18:29:09 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2015.02.18 18:29:09 - OpenVPN > VERIFY KU OK. 2015.02.18 18:29:09 - OpenVPN > Validating certificate extended key usage. 2015.02.18 18:29:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2015.02.18 18:29:09 - OpenVPN > VERIFY EKU OK. 2015.02.18 18:29:09 - OpenVPN > VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org. 2015.02.18 18:29:26 - OpenVPN > Connection reset, restarting [0]. 2015.02.18 18:29:26 - OpenVPN > TCP/UDP: Closing socket. 2015.02.18 18:29:26 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting. 2015.02.18 18:29:26 - OpenVPN > Restart pause, 5 second(s)! 2015.02.18 18:29:26 - Disconnecting. 2015.02.18 18:29:26 - Connection terminated.I 2015.02.18 18:29:29 - Checking authorization ...! 2015.02.18 18:29:34 - Connecting to Grumium (Canada, Toronto, Ontario). 2015.02.18 18:29:35 - TOR Control authentication method: Cookie, from /root/Desktop/tor-browser_it/Browser/TorBrowser/Data/Tor/control_auth_cookie. 2015.02.18 18:29:35 - TOR Control Guard IP detected: 193.11.114.45 (80AAF8D5956A43C197104CEF2550CD42D165C6FB). 2015.02.18 18:29:35 - TOR Control Guard IP detected: 37.187.130.68 (9C823407CE8D1880F34187E6E2F9CA341B1EB238). 2015.02.18 18:29:35 - TOR Control Guard IP detected: 195.154.226.5 (6648572801DA8919C78166CBEB06EC38FD482759). 2015.02.18 18:29:36 - OpenVPN > OpenVPN 2.2.1 i486-linux-gnu [sSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [iPv6 payload 20110424-2 (2.2RC2)] built on Dec 1 2014. 2015.02.18 18:29:36 - OpenVPN > RESOLVE: NOTE: localhost resolves to 2 addresses. 2015.02.18 18:29:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2015.02.18 18:29:36 - OpenVPN > NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables. 2015.02.18 18:29:36 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2015.02.18 18:29:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.18 18:29:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.02.18 18:29:36 - OpenVPN > LZO compression initialized. 2015.02.18 18:29:36 - OpenVPN > Control Channel MTU parms [ L:1560 D:168 EF:68 EB:0 ET:0 EL:0 ]. 2015.02.18 18:29:36 - OpenVPN > Socket Buffers: R=[87380->131072] S=[16384->131072]. 2015.02.18 18:29:36 - OpenVPN > Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:135 ET:0 EL:0 AF:3/1 ]. 2015.02.18 18:29:36 - OpenVPN > Local Options hash (VER=V4): '2f2c6498'. 2015.02.18 18:29:36 - OpenVPN > Expected Remote Options hash (VER=V4): '9915e4a2'. 2015.02.18 18:29:36 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 [nonblock]. 2015.02.18 18:29:36 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:9150. 2015.02.18 18:29:39 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2015.02.18 18:29:39 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:9150 Quote Share this post Link to post
OpenSourcerer 1435 Posted ... . 2015.02.18 18:28:44 - OpenVPN > recv_socks_reply: TCP port read timeout expired: Operation now in progress (errno=115) This seems to be a quite old (more than a year for sure) and unfixed problem of OpenVPN when routed through a SOCKS proxy. Seen here. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
Staff 9972 Posted ... Hello, we remind you that this years old bug has been patched since a long ago in our OpenVPN versions. You can find them (for Linux, Windows and OS X Mavericks/Yosemite) inside our client packages, if you wish to test. Kind regards Quote Share this post Link to post
lavezzi7 0 Posted ... Hello, we remind you that this years old bug has been patched since a long ago in our OpenVPN versions. You can find them (for Linux, Windows and OS X Mavericks/Yosemite) inside our client packages, if you wish to test. Kind regards Dear Staff, I didnt understand if i have to apply patch or download the OPNVPN Client version in the dedicated page. I'm quite n00b and would be hard for me to apply that kind of patch to src/openvpn/init.c (i can't find it in my Kali's home) Thx for support Quote Share this post Link to post
rickjames 106 Posted ... Go here: https://airvpn.org/linux/ Download the debian flavor.dpkg it like a pro. Quote Share this post Link to post
lavezzi7 0 Posted ... Go here: https://airvpn.org/linux/ Download the debian flavor.dpkg it like a pro. Thx, i got the 64bit version How to uninstall the previous one? Quote Share this post Link to post
rickjames 106 Posted ... Run a dpkg list / search to get the full name. dpkg-query -l airordpkg-query -l airvpn Once you see the exact name then just run:dpkg -r package-nameakadpkg -r airvpn.full.name Then to install.dpkg -i package.name If its missing dependencies during the install just run:apt-get -f install Quote Share this post Link to post
lavezzi7 0 Posted ... Run a dpkg list / search to get the full name. dpkg-query -l airordpkg-query -l airvpn Once you see the exact name then just run:dpkg -r package-nameakadpkg -r airvpn.full.name Then to install.dpkg -i package.name If its missing dependencies during the install just run:apt-get -f installThanks a lot but after a quick test, i found a trick.The issue exists only when i set the client in order to be used behind a TOR session If i use the "normal" mode, it works correctly. So, i dont know if its useful to download again the client.... Quote Share this post Link to post