Jump to content
Not connected, Your IP: 3.145.103.100
wugamuga

Unable to connect to any server

Recommended Posts

Hoping someone can help.  Here is the log:

 

I 2015.04.27 11:39:19 - Session starting.
I 2015.04.27 11:39:20 - IPv6 disabled on network adapter (Bluetooth DUN)
I 2015.04.27 11:39:20 - IPv6 disabled on network adapter (USB Ethernet 2)
I 2015.04.27 11:39:20 - IPv6 disabled on network adapter (Wi-Fi)
I 2015.04.27 11:39:20 - IPv6 disabled on network adapter (Thunderbolt Bridge)
I 2015.04.27 11:39:20 - IPv6 disabled on network adapter (Thunderbolt Ethernet)
I 2015.04.27 11:39:20 - IPv6 disabled on network adapter (Thunderbolt Bridge 2)
I 2015.04.27 11:39:20 - Checking authorization ...
! 2015.04.27 11:39:21 - Connecting to Almach (Canada, Toronto, Ontario)
. 2015.04.27 11:39:21 - OpenVPN > OpenVPN 2.3.6 x86_64-apple-darwin14.0.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Jan 12 2015
. 2015.04.27 11:39:21 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08
. 2015.04.27 11:39:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2015.04.27 11:39:21 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2015.04.27 11:39:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.04.27 11:39:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.04.27 11:39:21 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]
. 2015.04.27 11:39:21 - OpenVPN > UDPv4 link local: [undef]
. 2015.04.27 11:39:21 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.94.12:443
. 2015.04.27 11:39:53 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2015.04.27 11:39:53 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2015.04.27 11:39:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2015.04.27 11:39:58 - Disconnecting
. 2015.04.27 11:39:58 - Connection terminated.
I 2015.04.27 11:40:01 - Checking authorization ...
! 2015.04.27 11:40:02 - Connecting to Almach (Canada, Toronto, Ontario)
. 2015.04.27 11:40:02 - OpenVPN > OpenVPN 2.3.6 x86_64-apple-darwin14.0.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Jan 12 2015
. 2015.04.27 11:40:02 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08
. 2015.04.27 11:40:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2015.04.27 11:40:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2015.04.27 11:40:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.04.27 11:40:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.04.27 11:40:02 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]
. 2015.04.27 11:40:02 - OpenVPN > UDPv4 link local: [undef]
. 2015.04.27 11:40:02 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.94.12:443
. 2015.04.27 11:40:09 - Updating systems & servers data ...
. 2015.04.27 11:40:09 - Systems & servers data update completed
 

Share this post


Link to post

At least in the forums, there's currently no solution known. Maybe this post by Mr. amnesty can help.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Also with non Canadian ones?

Yes with many different servers.  

 

For some reason Canada seems to be a big favorite for Recommended Server regardless of whether I am in California, Virginia, Germany, France, etc..

Share this post


Link to post

At least in the forums, there's currently no solution known. Maybe this post by Mr. amnesty can help.

 

I tried every udp and tcp port in Eddie and none of them worked.

 

When one changes the preferences in Eddie to choose a different port must one reboot or shutdown/restart eddie?  I tried that a few times and, when going through every choice, sometimes did not shut down/restart in between.  But in any case nothing worked....

Share this post


Link to post

So I just tried choosing Port 443 under SSL Tunnel AND IT WORKED!

 

There is a description in the Help link but is it strange that a hotel would require this choice to get around whatever they have blocked.  Or no?  The Eddie help file says to use this option when "OpenVPN connections are disrupted by your ISP".

 

Help file warns of a performance hit but I see none.

Share this post


Link to post

So I just tried choosing Port 443 under SSL Tunnel AND IT WORKED!

 

There is a description in the Help link but is it strange that a hotel would require this choice to get around whatever they have blocked.  Or no?  The Eddie help file says to use this option when "OpenVPN connections are disrupted by your ISP".

 

Help file warns of a performance hit but I see none.

Share this post


Link to post

Typical Hotel WiFi Port Policy in order to block P2P

 

So can anyone explain why choosing Port 443 under SSL Tunnel worked and nothing else did?  I'm in a tiny hotel in southern France, not some corporate behemoth!

 

I'd really like to understand this better.  Also is there a tool that might have hinted at this choice as the only one not being blocked?  Protocol TCP Port 443 did not work.  Port 443 under SSL Tunnel did.

Share this post


Link to post

 

Typical Hotel WiFi Port Policy in order to block P2P

 

So can anyone explain why choosing Port 443 under SSL Tunnel worked and nothing else did?  I'm in a tiny hotel in southern France, not some corporate behemoth!

 

I'd really like to understand this better.  Also is there a tool that might have hinted at this choice as the only one not being blocked?  Protocol TCP Port 443 did not work.  Port 443 under SSL Tunnel did.

 

Hello!

 

OpenVPN puts additional information in the headers for purposes of packets re-ordering. This represents a typical fingerprint which makes OpenVPN traffic recognizable with proper header analysis. When you tunnel OpenVPN over stunnel you encrypt OpenVPN packets headers and your traffic is pure SSL/TLS.

 

Kind regards

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...