whistlewright 0 Posted ... Motorola Droid Maxx phone xt1080 with Android 4.4.4 started getting connection refused errors a couple of hours ago when trying to connect to Airvpn. I do not allow any automatic updates and I have not manually updated anything since I started using Airvpn earlier this week. I really need it to work on my phone. Here is the log: 2016-10-20 18:30:47 F-Droid built and signed version 0.6.60 running on motorola XT1080 (MSM8960), Android 4.4.4 (SU6-7.7) API 19, ABI armeabi-v7a, (motorola/obake-maxx_verizon/obake-maxx:4.4.4/SU6-7.7/5:user/release-keys)2016-10-20 18:30:47 Building configuration…2016-10-20 18:30:48 MANAGEMENT: CMD 'signal SIGINT'2016-10-20 18:30:48 SIGTERM received, sending exit notification to peer2016-10-20 18:30:50 started Socket Thread2016-10-20 18:30:50 Network Status: CONNECTED to WIFI "suddenlink.net-E7D2-5G"2016-10-20 18:30:50 Current Parameter Settings:2016-10-20 18:30:50 config = '/data/data/de.blinkt.openvpn/cache/android.conf'2016-10-20 18:30:50 mode = 02016-10-20 18:30:50 show_ciphers = DISABLED2016-10-20 18:30:50 show_digests = DISABLED2016-10-20 18:30:50 show_engines = DISABLED2016-10-20 18:30:50 genkey = DISABLED2016-10-20 18:30:50 key_pass_file = '[uNDEF]'2016-10-20 18:30:50 show_tls_ciphers = DISABLED2016-10-20 18:30:50 connect_retry_max = 02016-10-20 18:30:50 Connection profiles [0]:2016-10-20 18:30:50 proto = udp2016-10-20 18:30:50 local = '[uNDEF]'2016-10-20 18:30:50 local_port = '[uNDEF]'2016-10-20 18:30:50 remote = 'earth.vpn.airdns.org'2016-10-20 18:30:50 remote_port = '443'2016-10-20 18:30:50 remote_float = DISABLED2016-10-20 18:30:50 bind_defined = DISABLED2016-10-20 18:30:50 bind_local = DISABLED2016-10-20 18:30:50 bind_ipv6_only = DISABLED2016-10-20 18:30:50 connect_retry_seconds = 22016-10-20 18:30:50 connect_timeout = 1202016-10-20 18:30:50 socks_proxy_server = '[uNDEF]'2016-10-20 18:30:50 socks_proxy_port = '[uNDEF]'2016-10-20 18:30:50 tun_mtu = 15002016-10-20 18:30:50 tun_mtu_defined = ENABLED2016-10-20 18:30:50 link_mtu = 15002016-10-20 18:30:50 link_mtu_defined = DISABLED2016-10-20 18:30:50 tun_mtu_extra = 02016-10-20 18:30:50 tun_mtu_extra_defined = DISABLED2016-10-20 18:30:50 mtu_discover_type = -12016-10-20 18:30:50 fragment = 02016-10-20 18:30:50 mssfix = 14502016-10-20 18:30:50 explicit_exit_notification = 52016-10-20 18:30:50 Connection profiles END2016-10-20 18:30:50 remote_random = DISABLED2016-10-20 18:30:50 ipchange = '[uNDEF]'2016-10-20 18:30:50 dev = 'tun'2016-10-20 18:30:50 dev_type = '[uNDEF]'2016-10-20 18:30:50 dev_node = '[uNDEF]'2016-10-20 18:30:50 lladdr = '[uNDEF]'2016-10-20 18:30:50 topology = 12016-10-20 18:30:50 ifconfig_local = '[uNDEF]'2016-10-20 18:30:50 ifconfig_remote_netmask = '[uNDEF]'2016-10-20 18:30:50 ifconfig_noexec = DISABLED2016-10-20 18:30:50 ifconfig_nowarn = ENABLED2016-10-20 18:30:50 ifconfig_ipv6_local = '[uNDEF]'2016-10-20 18:30:50 ifconfig_ipv6_netbits = 02016-10-20 18:30:50 ifconfig_ipv6_remote = '[uNDEF]'2016-10-20 18:30:50 shaper = 02016-10-20 18:30:50 mtu_test = 02016-10-20 18:30:50 mlock = DISABLED2016-10-20 18:30:50 keepalive_ping = 02016-10-20 18:30:50 keepalive_timeout = 02016-10-20 18:30:50 inactivity_timeout = 02016-10-20 18:30:50 ping_send_timeout = 02016-10-20 18:30:50 ping_rec_timeout = 02016-10-20 18:30:50 ping_rec_timeout_action = 02016-10-20 18:30:50 ping_timer_remote = DISABLED2016-10-20 18:30:50 remap_sigusr1 = 02016-10-20 18:30:50 persist_tun = ENABLED2016-10-20 18:30:50 persist_local_ip = DISABLED2016-10-20 18:30:50 persist_remote_ip = DISABLED2016-10-20 18:30:50 persist_key = DISABLED2016-10-20 18:30:50 passtos = DISABLED2016-10-20 18:30:50 resolve_retry_seconds = 10000000002016-10-20 18:30:50 resolve_in_advance = ENABLED2016-10-20 18:30:50 username = '[uNDEF]'2016-10-20 18:30:50 groupname = '[uNDEF]'2016-10-20 18:30:50 chroot_dir = '[uNDEF]'2016-10-20 18:30:50 cd_dir = '[uNDEF]'2016-10-20 18:30:50 writepid = '[uNDEF]'2016-10-20 18:30:50 up_script = '[uNDEF]'2016-10-20 18:30:50 down_script = '[uNDEF]'2016-10-20 18:30:50 down_pre = DISABLED2016-10-20 18:30:50 up_restart = DISABLED2016-10-20 18:30:50 up_delay = DISABLED2016-10-20 18:30:50 daemon = DISABLED2016-10-20 18:30:50 inetd = 02016-10-20 18:30:50 log = DISABLED2016-10-20 18:30:50 suppress_timestamps = DISABLED2016-10-20 18:30:50 machine_readable_output = ENABLED2016-10-20 18:30:50 nice = 02016-10-20 18:30:50 verbosity = 42016-10-20 18:30:50 mute = 02016-10-20 18:30:50 gremlin = 02016-10-20 18:30:50 status_file = '[uNDEF]'2016-10-20 18:30:50 status_file_version = 12016-10-20 18:30:50 status_file_update_freq = 602016-10-20 18:30:50 occ = ENABLED2016-10-20 18:30:50 rcvbuf = 02016-10-20 18:30:50 sndbuf = 02016-10-20 18:30:50 sockflags = 02016-10-20 18:30:50 fast_io = DISABLED2016-10-20 18:30:50 comp.alg = 22016-10-20 18:30:50 comp.flags = 12016-10-20 18:30:50 route_script = '[uNDEF]'2016-10-20 18:30:50 route_default_gateway = '[uNDEF]'2016-10-20 18:30:50 route_default_metric = 02016-10-20 18:30:50 route_noexec = DISABLED2016-10-20 18:30:50 route_delay = 02016-10-20 18:30:50 route_delay_window = 302016-10-20 18:30:50 route_delay_defined = DISABLED2016-10-20 18:30:50 route_nopull = DISABLED2016-10-20 18:30:50 route_gateway_via_dhcp = DISABLED2016-10-20 18:30:50 allow_pull_fqdn = DISABLED2016-10-20 18:30:50 management_addr = '/data/data/de.blinkt.openvpn/cache/mgmtsocket'2016-10-20 18:30:50 management_port = 'unix'2016-10-20 18:30:50 management_user_pass = '[uNDEF]'2016-10-20 18:30:50 management_log_history_cache = 2502016-10-20 18:30:50 management_echo_buffer_size = 1002016-10-20 18:30:50 management_write_peer_info_file = '[uNDEF]'2016-10-20 18:30:50 management_client_user = '[uNDEF]'2016-10-20 18:30:50 management_client_group = '[uNDEF]'2016-10-20 18:30:50 management_flags = 43902016-10-20 18:30:50 shared_secret_file = '[uNDEF]'2016-10-20 18:30:50 key_direction = 22016-10-20 18:30:50 ciphername = 'AES-256-CBC'2016-10-20 18:30:50 authname = 'SHA1'2016-10-20 18:30:50 prng_hash = 'SHA1'2016-10-20 18:30:50 prng_nonce_secret_len = 162016-10-20 18:30:50 keysize = 02016-10-20 18:30:50 engine = DISABLED2016-10-20 18:30:50 replay = ENABLED2016-10-20 18:30:50 mute_replay_warnings = DISABLED2016-10-20 18:30:50 replay_window = 642016-10-20 18:30:50 replay_time = 152016-10-20 18:30:50 packet_id_file = '[uNDEF]'2016-10-20 18:30:50 use_iv = ENABLED2016-10-20 18:30:50 test_crypto = DISABLED2016-10-20 18:30:50 tls_server = DISABLED2016-10-20 18:30:50 tls_client = ENABLED2016-10-20 18:30:50 key_method = 22016-10-20 18:30:50 ca_file = '[[iNLINE]]'2016-10-20 18:30:50 ca_path = '[uNDEF]'2016-10-20 18:30:50 dh_file = '[uNDEF]'2016-10-20 18:30:50 cert_file = '[[iNLINE]]'2016-10-20 18:30:50 extra_certs_file = '[uNDEF]'2016-10-20 18:30:50 priv_key_file = '[[iNLINE]]'2016-10-20 18:30:50 pkcs12_file = '[uNDEF]'2016-10-20 18:30:50 cipher_list = '[uNDEF]'2016-10-20 18:30:50 tls_verify = '[uNDEF]'2016-10-20 18:30:50 tls_export_cert = '[uNDEF]'2016-10-20 18:30:50 verify_x509_type = 02016-10-20 18:30:50 verify_x509_name = '[uNDEF]'2016-10-20 18:30:50 crl_file = '[uNDEF]'2016-10-20 18:30:50 ns_cert_type = 02016-10-20 18:30:50 remote_cert_ku = 1602016-10-20 18:30:50 remote_cert_ku = 1362016-10-20 18:30:50 remote_cert_ku = 02016-10-20 18:30:50 remote_cert_ku = 02016-10-20 18:30:50 remote_cert_ku = 02016-10-20 18:30:50 remote_cert_ku = 02016-10-20 18:30:50 remote_cert_ku = 02016-10-20 18:30:50 remote_cert_ku = 02016-10-20 18:30:50 remote_cert_ku = 02016-10-20 18:30:50 remote_cert_ku = 02016-10-20 18:30:50 remote_cert_ku = 02016-10-20 18:30:50 remote_cert_ku = 02016-10-20 18:30:50 remote_cert_ku = 02016-10-20 18:30:50 remote_cert_ku = 02016-10-20 18:30:50 remote_cert_ku = 02016-10-20 18:30:50 remote_cert_ku = 02016-10-20 18:30:50 remote_cert_eku = 'TLS Web Server Authentication'2016-10-20 18:30:50 ssl_flags = 02016-10-20 18:30:50 tls_timeout = 22016-10-20 18:30:50 renegotiate_bytes = 02016-10-20 18:30:50 renegotiate_packets = 02016-10-20 18:30:50 renegotiate_seconds = 36002016-10-20 18:30:50 handshake_window = 602016-10-20 18:30:50 transition_window = 36002016-10-20 18:30:50 single_session = DISABLED2016-10-20 18:30:50 push_peer_info = DISABLED2016-10-20 18:30:50 tls_exit = DISABLED2016-10-20 18:30:50 tls_auth_file = '[[iNLINE]]'2016-10-20 18:30:50 client = ENABLED2016-10-20 18:30:50 pull = ENABLED2016-10-20 18:30:50 auth_user_pass_file = '[uNDEF]'2016-10-20 18:30:50 OpenVPN 2.4-icsopenvpn [git:HEAD-9d8801b6185d7453] android-14-armeabi-v7a [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [iPv6] built on Oct 13 20162016-10-20 18:30:50 library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.092016-10-20 18:30:50 MANAGEMENT: Connected to management server at /data/data/de.blinkt.openvpn/cache/mgmtsocket2016-10-20 18:30:50 MANAGEMENT: CMD 'hold release'2016-10-20 18:30:50 MANAGEMENT: CMD 'bytecount 2'2016-10-20 18:30:50 MANAGEMENT: CMD 'state on'2016-10-20 18:30:50 MANAGEMENT: CMD 'proxy NONE'2016-10-20 18:30:50 Connection to OpenVPN closed (socket closed)2016-10-20 18:30:50 MANAGEMENT: Client disconnected2016-10-20 18:30:50 MANAGEMENT: Triggering management exit2016-10-20 18:30:50 TCP/UDP: Closing socket2016-10-20 18:30:50 SIGTERM[soft,management-exit] received, process exiting2016-10-20 18:30:50 MANAGEMENT: >STATE:1477006250,EXITING,management-exit,,,,,2016-10-20 18:30:51 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication2016-10-20 18:30:51 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication2016-10-20 18:30:51 LZO compression initializing2016-10-20 18:30:51 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]2016-10-20 18:30:51 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]2016-10-20 18:30:51 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'2016-10-20 18:30:51 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'2016-10-20 18:30:51 TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.249.195:4432016-10-20 18:30:51 Socket Buffers: R=[163840->163840] S=[163840->163840]2016-10-20 18:30:51 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'2016-10-20 18:30:51 UDP link local: (not bound)2016-10-20 18:30:51 UDP link remote: [AF_INET]71.19.249.195:4432016-10-20 18:30:51 MANAGEMENT: >STATE:1477006251,WAIT,,,,,,2016-10-20 18:30:51 read UDP [ECONNREFUSED]: Connection refused (code=111)2016-10-20 18:30:53 read UDP [ECONNREFUSED]: Connection refused (code=111)2016-10-20 18:30:57 read UDP [ECONNREFUSED]: Connection refused (code=111)2016-10-20 18:31:05 read UDP [ECONNREFUSED]: Connection refused (code=111)2016-10-20 18:31:21 read UDP [ECONNREFUSED]: Connection refused (code=111)2016-10-20 18:31:51 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)2016-10-20 18:31:51 TLS Error: TLS handshake failed2016-10-20 18:31:51 TCP/UDP: Closing socket2016-10-20 18:31:51 SIGUSR1[soft,tls-error] received, process restarting2016-10-20 18:31:51 MANAGEMENT: >STATE:1477006311,RECONNECTING,tls-error,,,,,2016-10-20 18:31:53 MANAGEMENT: CMD 'hold release'2016-10-20 18:31:53 MANAGEMENT: CMD 'bytecount 2'2016-10-20 18:31:53 MANAGEMENT: CMD 'state on'2016-10-20 18:31:53 MANAGEMENT: CMD 'proxy NONE'2016-10-20 18:31:54 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication2016-10-20 18:31:54 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication2016-10-20 18:31:54 LZO compression initializing2016-10-20 18:31:54 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]2016-10-20 18:31:54 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]2016-10-20 18:31:54 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'2016-10-20 18:31:54 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'2016-10-20 18:31:54 TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.249.195:4432016-10-20 18:31:54 Socket Buffers: R=[163840->163840] S=[163840->163840]2016-10-20 18:31:54 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'2016-10-20 18:31:54 UDP link local: (not bound)2016-10-20 18:31:54 UDP link remote: [AF_INET]71.19.249.195:4432016-10-20 18:31:54 MANAGEMENT: >STATE:1477006314,WAIT,,,,,,2016-10-20 18:31:54 read UDP [ECONNREFUSED]: Connection refused (code=111)2016-10-20 18:31:56 read UDP [ECONNREFUSED]: Connection refused (code=111)2016-10-20 18:32:01 read UDP [ECONNREFUSED]: Connection refused (code=111)2016-10-20 18:32:10 read UDP [ECONNREFUSED]: Connection refused (code=111)2016-10-20 18:32:25 read UDP [ECONNREFUSED]: Connection refused (code=111)2016-10-20 18:32:54 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)2016-10-20 18:32:54 TLS Error: TLS handshake failed2016-10-20 18:32:54 TCP/UDP: Closing socket2016-10-20 18:32:54 SIGUSR1[soft,tls-error] received, process restarting2016-10-20 18:32:54 MANAGEMENT: >STATE:1477006374,RECONNECTING,tls-error,,,,,2016-10-20 18:32:56 MANAGEMENT: CMD 'hold release'2016-10-20 18:32:56 MANAGEMENT: CMD 'proxy NONE'2016-10-20 18:32:56 MANAGEMENT: CMD 'bytecount 2'2016-10-20 18:32:56 MANAGEMENT: CMD 'state on' Help please. Quote Share this post Link to post
Fly AirVPN 12 Posted ... This thread is a bit aged, but I'll add what worked for me. I was having connection refused issue on a Nexus 5 and Samsung Tab S using OpenVPN for Android 0.6.63 with an AirVPN Linux UDP 443 profile. The fix for me, was to edit the profile under Routing to uncheck the Bypass VPN for local networks setting.As a side note, on a Samsung Tab A the profile connects successfully regardless if the Bypass setting is on or off. I have no idea why the difference. All devices are currently running Android 6.0.1. Quote Share this post Link to post
LZ1 673 Posted ... This thread is a bit aged, but I'll add what worked for me. I was having connection refused issue on a Nexus 5 and Samsung Tab S using OpenVPN for Android 0.6.63 with an AirVPN Linux UDP 443 profile. The fix for me, was to edit the profile under Routing to uncheck the Bypass VPN for local networks setting. As a side note, on a Samsung Tab A the profile connects successfully regardless if the Bypass setting is on or off. I have no idea why the difference. All devices are currently running Android 6.0.1.Hello! Thank you for sharing your solution with the community Staff did sticky a thread in the Eddie Client forum regarding connection refused. Quote Hide LZ1's signature Hide all signatures Hi there, are you new to AirVPN? Many of your questions are already answered in this guide. You may also read the Eddie Android FAQ. Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you. Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily. Share this post Link to post
OpenSourcerer 1441 Posted ... Could you try upgrading to version 0.6.63? Apparently it is using OpenVPN 2.5 already... 13:17 OpenVPN 2.5-icsopenvpn [git:icsopenvpn-d0314998c474c182+] android-14-armeabi-v7a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 26 201Also reenable the bypass option after updating. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post