wugamuga 3 Posted ... Hoping someone can help. Here is the log: I 2015.04.27 11:39:19 - Session starting.I 2015.04.27 11:39:20 - IPv6 disabled on network adapter (Bluetooth DUN)I 2015.04.27 11:39:20 - IPv6 disabled on network adapter (USB Ethernet 2)I 2015.04.27 11:39:20 - IPv6 disabled on network adapter (Wi-Fi)I 2015.04.27 11:39:20 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2015.04.27 11:39:20 - IPv6 disabled on network adapter (Thunderbolt Ethernet)I 2015.04.27 11:39:20 - IPv6 disabled on network adapter (Thunderbolt Bridge 2)I 2015.04.27 11:39:20 - Checking authorization ...! 2015.04.27 11:39:21 - Connecting to Almach (Canada, Toronto, Ontario). 2015.04.27 11:39:21 - OpenVPN > OpenVPN 2.3.6 x86_64-apple-darwin14.0.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Jan 12 2015. 2015.04.27 11:39:21 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08. 2015.04.27 11:39:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2015.04.27 11:39:21 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2015.04.27 11:39:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.04.27 11:39:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.04.27 11:39:21 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]. 2015.04.27 11:39:21 - OpenVPN > UDPv4 link local: [undef]. 2015.04.27 11:39:21 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.94.12:443. 2015.04.27 11:39:53 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2015.04.27 11:39:53 - OpenVPN > SIGTERM received, sending exit notification to peer. 2015.04.27 11:39:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2015.04.27 11:39:58 - Disconnecting. 2015.04.27 11:39:58 - Connection terminated.I 2015.04.27 11:40:01 - Checking authorization ...! 2015.04.27 11:40:02 - Connecting to Almach (Canada, Toronto, Ontario). 2015.04.27 11:40:02 - OpenVPN > OpenVPN 2.3.6 x86_64-apple-darwin14.0.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Jan 12 2015. 2015.04.27 11:40:02 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08. 2015.04.27 11:40:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2015.04.27 11:40:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2015.04.27 11:40:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.04.27 11:40:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.04.27 11:40:02 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]. 2015.04.27 11:40:02 - OpenVPN > UDPv4 link local: [undef]. 2015.04.27 11:40:02 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.94.12:443. 2015.04.27 11:40:09 - Updating systems & servers data .... 2015.04.27 11:40:09 - Systems & servers data update completed Quote Share this post Link to post
OpenSourcerer 1435 Posted ... At least in the forums, there's currently no solution known. Maybe this post by Mr. amnesty can help. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
wugamuga 3 Posted ... Also with non Canadian ones?Yes with many different servers. For some reason Canada seems to be a big favorite for Recommended Server regardless of whether I am in California, Virginia, Germany, France, etc.. Quote Share this post Link to post
wugamuga 3 Posted ... At least in the forums, there's currently no solution known. Maybe this post by Mr. amnesty can help. I tried every udp and tcp port in Eddie and none of them worked. When one changes the preferences in Eddie to choose a different port must one reboot or shutdown/restart eddie? I tried that a few times and, when going through every choice, sometimes did not shut down/restart in between. But in any case nothing worked.... Quote Share this post Link to post
wugamuga 3 Posted ... So I just tried choosing Port 443 under SSL Tunnel AND IT WORKED! There is a description in the Help link but is it strange that a hotel would require this choice to get around whatever they have blocked. Or no? The Eddie help file says to use this option when "OpenVPN connections are disrupted by your ISP". Help file warns of a performance hit but I see none. Quote Share this post Link to post
wugamuga 3 Posted ... So I just tried choosing Port 443 under SSL Tunnel AND IT WORKED! There is a description in the Help link but is it strange that a hotel would require this choice to get around whatever they have blocked. Or no? The Eddie help file says to use this option when "OpenVPN connections are disrupted by your ISP". Help file warns of a performance hit but I see none. Quote Share this post Link to post
Zaroad 26 Posted ... Typical Hotel WiFi Port Policy in order to block P2P Quote Share this post Link to post
wugamuga 3 Posted ... Typical Hotel WiFi Port Policy in order to block P2P So can anyone explain why choosing Port 443 under SSL Tunnel worked and nothing else did? I'm in a tiny hotel in southern France, not some corporate behemoth! I'd really like to understand this better. Also is there a tool that might have hinted at this choice as the only one not being blocked? Protocol TCP Port 443 did not work. Port 443 under SSL Tunnel did. Quote Share this post Link to post
Staff 9973 Posted ... Typical Hotel WiFi Port Policy in order to block P2P So can anyone explain why choosing Port 443 under SSL Tunnel worked and nothing else did? I'm in a tiny hotel in southern France, not some corporate behemoth! I'd really like to understand this better. Also is there a tool that might have hinted at this choice as the only one not being blocked? Protocol TCP Port 443 did not work. Port 443 under SSL Tunnel did. Hello! OpenVPN puts additional information in the headers for purposes of packets re-ordering. This represents a typical fingerprint which makes OpenVPN traffic recognizable with proper header analysis. When you tunnel OpenVPN over stunnel you encrypt OpenVPN packets headers and your traffic is pure SSL/TLS. Kind regards Quote Share this post Link to post