wintersnow 5 Posted ... I can connect to and log into Time Warner's Roadrunner webmail server when connected to one of AirVPN's US servers through OpenVPN from my iOS tablet (now on iOS 10, never had a problem with earlier versions either), but can't when running the same config on my Android phone. I can log in to every other site on the phone through the AirVPN server/OpenVPN connection, just not Roadrunner's webmail. I'm wondering if there is some setting I need to tweak on the Android phone? I'm running:Android - 4.4.2Baseband - M8974A-AAAANAZM-1.0.190084Kernel - 3.4.0Build - KOT491.080120gSoftware - D80120g Thanks for any help. Quote Share this post Link to post
OpenSourcerer 1451 Posted ... OpenVPN logs would be helpful. Please paste them here from line 1 into spoiler tags, how-to in my signature. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
wintersnow 5 Posted ... Thanks, giganerd. Here's the log. It records me failing to log into Time Warner's webmail server,succeeding in logging into news.google.com and into a non-Time Warner serverwhere I have an email account. Thanks for your help. 2016-11-08 18:26:45 Reread (2) log items from log cache file2016-11-08 18:26:54 official build 0.6.60 running on lge LG-D801 (MSM8974), Android 4.4.2 (KOT49I.D80120g) API 19, ABI armeabi-v7a, (lge/g2_tmo_us/g2:4.4.2/KOT49I.D80120g/D80120g.1414567414:user/release-keys)2016-11-08 18:26:54 Reread (1) log items from log cache file2016-11-08 18:29:17 Building configuration…2016-11-08 18:29:17 started Socket Thread2016-11-08 18:29:17 Network Status: CONNECTED to WIFI "ETKNetwork"2016-11-08 18:29:17 P:Initializing Google Breakpad!2016-11-08 18:29:17 Current Parameter Settings:2016-11-08 18:29:17 config = '/data/data/de.blinkt.openvpn/cache/android.conf'2016-11-08 18:29:17 mode = 02016-11-08 18:29:17 show_ciphers = DISABLED2016-11-08 18:29:17 show_digests = DISABLED2016-11-08 18:29:17 show_engines = DISABLED2016-11-08 18:29:17 genkey = DISABLED2016-11-08 18:29:17 key_pass_file = '[uNDEF]'2016-11-08 18:29:17 show_tls_ciphers = DISABLED2016-11-08 18:29:17 connect_retry_max = 52016-11-08 18:29:17 Connection profiles [0]:2016-11-08 18:29:17 proto = udp2016-11-08 18:29:17 local = '[uNDEF]'2016-11-08 18:29:17 local_port = '[uNDEF]'2016-11-08 18:29:17 remote = '46.21.154.82'2016-11-08 18:29:17 remote_port = '443'2016-11-08 18:29:17 remote_float = DISABLED2016-11-08 18:29:17 bind_defined = DISABLED2016-11-08 18:29:17 bind_local = DISABLED2016-11-08 18:29:17 bind_ipv6_only = DISABLED2016-11-08 18:29:17 connect_retry_seconds = 52016-11-08 18:29:17 connect_timeout = 1202016-11-08 18:29:17 socks_proxy_server = '[uNDEF]'2016-11-08 18:29:17 socks_proxy_port = '[uNDEF]'2016-11-08 18:29:17 tun_mtu = 15002016-11-08 18:29:17 tun_mtu_defined = ENABLED2016-11-08 18:29:17 link_mtu = 15002016-11-08 18:29:17 link_mtu_defined = DISABLED2016-11-08 18:29:17 tun_mtu_extra = 02016-11-08 18:29:17 tun_mtu_extra_defined = DISABLED2016-11-08 18:29:17 mtu_discover_type = -12016-11-08 18:29:17 fragment = 02016-11-08 18:29:17 mssfix = 14502016-11-08 18:29:17 explicit_exit_notification = 52016-11-08 18:29:17 Connection profiles END2016-11-08 18:29:17 remote_random = DISABLED2016-11-08 18:29:17 ipchange = '[uNDEF]'2016-11-08 18:29:17 dev = 'tun'2016-11-08 18:29:17 dev_type = '[uNDEF]'2016-11-08 18:29:17 dev_node = '[uNDEF]'2016-11-08 18:29:17 lladdr = '[uNDEF]'2016-11-08 18:29:17 topology = 12016-11-08 18:29:17 ifconfig_local = '[uNDEF]'2016-11-08 18:29:17 ifconfig_remote_netmask = '[uNDEF]'2016-11-08 18:29:17 ifconfig_noexec = DISABLED2016-11-08 18:29:17 ifconfig_nowarn = ENABLED2016-11-08 18:29:17 ifconfig_ipv6_local = '[uNDEF]'2016-11-08 18:29:17 ifconfig_ipv6_netbits = 02016-11-08 18:29:17 ifconfig_ipv6_remote = '[uNDEF]'2016-11-08 18:29:17 shaper = 02016-11-08 18:29:17 mtu_test = 02016-11-08 18:29:17 mlock = DISABLED2016-11-08 18:29:17 keepalive_ping = 02016-11-08 18:29:17 keepalive_timeout = 02016-11-08 18:29:17 inactivity_timeout = 02016-11-08 18:29:17 ping_send_timeout = 02016-11-08 18:29:17 ping_rec_timeout = 02016-11-08 18:29:17 ping_rec_timeout_action = 02016-11-08 18:29:17 ping_timer_remote = DISABLED2016-11-08 18:29:17 remap_sigusr1 = 02016-11-08 18:29:17 persist_tun = ENABLED2016-11-08 18:29:17 persist_local_ip = DISABLED2016-11-08 18:29:17 persist_remote_ip = DISABLED2016-11-08 18:29:17 persist_key = DISABLED2016-11-08 18:29:17 passtos = DISABLED2016-11-08 18:29:17 resolve_retry_seconds = 10000000002016-11-08 18:29:17 resolve_in_advance = ENABLED2016-11-08 18:29:17 username = '[uNDEF]'2016-11-08 18:29:17 groupname = '[uNDEF]'2016-11-08 18:29:17 chroot_dir = '[uNDEF]'2016-11-08 18:29:17 cd_dir = '[uNDEF]'2016-11-08 18:29:17 writepid = '[uNDEF]'2016-11-08 18:29:17 up_script = '[uNDEF]'2016-11-08 18:29:17 down_script = '[uNDEF]'2016-11-08 18:29:17 down_pre = DISABLED2016-11-08 18:29:17 up_restart = DISABLED2016-11-08 18:29:17 up_delay = DISABLED2016-11-08 18:29:17 daemon = DISABLED2016-11-08 18:29:17 inetd = 02016-11-08 18:29:17 log = DISABLED2016-11-08 18:29:17 suppress_timestamps = DISABLED2016-11-08 18:29:17 machine_readable_output = ENABLED2016-11-08 18:29:17 nice = 02016-11-08 18:29:17 verbosity = 42016-11-08 18:29:17 mute = 02016-11-08 18:29:17 gremlin = 02016-11-08 18:29:17 status_file = '[uNDEF]'2016-11-08 18:29:17 status_file_version = 12016-11-08 18:29:17 status_file_update_freq = 602016-11-08 18:29:17 occ = ENABLED2016-11-08 18:29:17 rcvbuf = 02016-11-08 18:29:17 sndbuf = 02016-11-08 18:29:17 sockflags = 02016-11-08 18:29:17 fast_io = DISABLED2016-11-08 18:29:17 comp.alg = 22016-11-08 18:29:17 comp.flags = 12016-11-08 18:29:17 route_script = '[uNDEF]'2016-11-08 18:29:17 route_default_gateway = '[uNDEF]'2016-11-08 18:29:17 route_default_metric = 02016-11-08 18:29:17 route_noexec = DISABLED2016-11-08 18:29:17 route_delay = 02016-11-08 18:29:17 route_delay_window = 302016-11-08 18:29:17 route_delay_defined = DISABLED2016-11-08 18:29:17 route_nopull = DISABLED2016-11-08 18:29:17 route_gateway_via_dhcp = DISABLED2016-11-08 18:29:17 allow_pull_fqdn = DISABLED2016-11-08 18:29:17 management_addr = '/data/data/de.blinkt.openvpn/cache/mgmtsocket'2016-11-08 18:29:17 management_port = 'unix'2016-11-08 18:29:17 management_user_pass = '[uNDEF]'2016-11-08 18:29:17 management_log_history_cache = 2502016-11-08 18:29:17 management_echo_buffer_size = 1002016-11-08 18:29:17 management_write_peer_info_file = '[uNDEF]'2016-11-08 18:29:17 management_client_user = '[uNDEF]'2016-11-08 18:29:17 management_client_group = '[uNDEF]'2016-11-08 18:29:17 management_flags = 43902016-11-08 18:29:17 shared_secret_file = '[uNDEF]'2016-11-08 18:29:17 key_direction = 22016-11-08 18:29:17 ciphername = 'AES-256-CBC'2016-11-08 18:29:17 authname = 'SHA1'2016-11-08 18:29:17 prng_hash = 'SHA1'2016-11-08 18:29:17 prng_nonce_secret_len = 162016-11-08 18:29:17 keysize = 02016-11-08 18:29:17 engine = DISABLED2016-11-08 18:29:17 replay = ENABLED2016-11-08 18:29:17 mute_replay_warnings = DISABLED2016-11-08 18:29:17 replay_window = 642016-11-08 18:29:17 replay_time = 152016-11-08 18:29:17 packet_id_file = '[uNDEF]'2016-11-08 18:29:17 use_iv = ENABLED2016-11-08 18:29:17 test_crypto = DISABLED2016-11-08 18:29:17 tls_server = DISABLED2016-11-08 18:29:17 tls_client = ENABLED2016-11-08 18:29:17 key_method = 22016-11-08 18:29:17 ca_file = '[[iNLINE]]'2016-11-08 18:29:17 ca_path = '[uNDEF]'2016-11-08 18:29:17 dh_file = '[uNDEF]'2016-11-08 18:29:17 cert_file = '[[iNLINE]]'2016-11-08 18:29:17 extra_certs_file = '[uNDEF]'2016-11-08 18:29:17 priv_key_file = '[[iNLINE]]'2016-11-08 18:29:17 pkcs12_file = '[uNDEF]'2016-11-08 18:29:17 cipher_list = '[uNDEF]'2016-11-08 18:29:17 tls_verify = '[uNDEF]'2016-11-08 18:29:17 tls_export_cert = '[uNDEF]'2016-11-08 18:29:17 verify_x509_type = 02016-11-08 18:29:17 verify_x509_name = '[uNDEF]'2016-11-08 18:29:17 crl_file = '[uNDEF]'2016-11-08 18:29:17 ns_cert_type = 02016-11-08 18:29:17 remote_cert_ku = 1602016-11-08 18:29:17 remote_cert_ku = 1362016-11-08 18:29:17 remote_cert_ku = 02016-11-08 18:29:17 remote_cert_ku = 02016-11-08 18:29:17 remote_cert_ku = 02016-11-08 18:29:17 remote_cert_ku = 02016-11-08 18:29:17 remote_cert_ku = 02016-11-08 18:29:17 remote_cert_ku = 02016-11-08 18:29:17 remote_cert_ku = 02016-11-08 18:29:17 remote_cert_ku = 02016-11-08 18:29:17 remote_cert_ku = 02016-11-08 18:29:17 remote_cert_ku = 02016-11-08 18:29:17 remote_cert_ku = 02016-11-08 18:29:17 remote_cert_ku = 02016-11-08 18:29:17 remote_cert_ku = 02016-11-08 18:29:17 remote_cert_ku = 02016-11-08 18:29:17 remote_cert_eku = 'TLS Web Server Authentication'2016-11-08 18:29:17 ssl_flags = 02016-11-08 18:29:17 tls_timeout = 22016-11-08 18:29:17 renegotiate_bytes = 02016-11-08 18:29:17 renegotiate_packets = 02016-11-08 18:29:17 renegotiate_seconds = 36002016-11-08 18:29:17 handshake_window = 602016-11-08 18:29:17 transition_window = 36002016-11-08 18:29:17 single_session = DISABLED2016-11-08 18:29:17 push_peer_info = DISABLED2016-11-08 18:29:17 tls_exit = DISABLED2016-11-08 18:29:17 tls_auth_file = '[[iNLINE]]'2016-11-08 18:29:17 client = ENABLED2016-11-08 18:29:17 pull = ENABLED2016-11-08 18:29:17 auth_user_pass_file = '[uNDEF]'2016-11-08 18:29:17 OpenVPN 2.4-icsopenvpn [git:HEAD-9d8801b6185d7453] android-14-armeabi-v7a [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [iPv6] built on Oct 9 20162016-11-08 18:29:17 library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.092016-11-08 18:29:17 MANAGEMENT: Connected to management server at /data/data/de.blinkt.openvpn/cache/mgmtsocket2016-11-08 18:29:17 MANAGEMENT: CMD 'hold release'2016-11-08 18:29:17 MANAGEMENT: CMD 'proxy NONE'2016-11-08 18:29:17 MANAGEMENT: CMD 'bytecount 2'2016-11-08 18:29:17 MANAGEMENT: CMD 'state on'2016-11-08 18:29:18 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication2016-11-08 18:29:18 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication2016-11-08 18:29:18 LZO compression initializing2016-11-08 18:29:18 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]2016-11-08 18:29:18 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]2016-11-08 18:29:18 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'2016-11-08 18:29:18 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'2016-11-08 18:29:18 TCP/UDP: Preserving recently used remote address: [AF_INET]46.21.154.82:4432016-11-08 18:29:18 Socket Buffers: R=[163840->163840] S=[163840->163840]2016-11-08 18:29:18 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'2016-11-08 18:29:18 UDP link local: (not bound)2016-11-08 18:29:18 UDP link remote: [AF_INET]46.21.154.82:4432016-11-08 18:29:18 MANAGEMENT: >STATE:1478647758,WAIT,,,,,,2016-11-08 18:29:18 MANAGEMENT: >STATE:1478647758,AUTH,,,,,,2016-11-08 18:29:18 TLS: Initial packet from [AF_INET]46.21.154.82:443, sid=dc322b79 bb1f49922016-11-08 18:29:18 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org2016-11-08 18:29:18 Validating certificate key usage2016-11-08 18:29:18 ++ Certificate has key usage 00a0, expects 00a02016-11-08 18:29:18 VERIFY KU OK2016-11-08 18:29:18 Validating certificate extended key usage2016-11-08 18:29:18 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication2016-11-08 18:29:18 VERIFY EKU OK2016-11-08 18:29:18 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org2016-11-08 18:29:19 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA2016-11-08 18:29:19 [server] Peer Connection Initiated with [AF_INET]46.21.154.82:4432016-11-08 18:29:20 MANAGEMENT: >STATE:1478647760,GET_CONFIG,,,,,,2016-11-08 18:29:20 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)2016-11-08 18:29:20 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.15.26 255.255.0.0'2016-11-08 18:29:20 OPTIONS IMPORT: timers and/or timeouts modified2016-11-08 18:29:20 OPTIONS IMPORT: compression parms modified2016-11-08 18:29:20 OPTIONS IMPORT: --ifconfig/up options modified2016-11-08 18:29:20 OPTIONS IMPORT: route options modified2016-11-08 18:29:20 OPTIONS IMPORT: route-related options modified2016-11-08 18:29:20 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified2016-11-08 18:29:20 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:406 ET:0 EL:3 ]2016-11-08 18:29:20 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key2016-11-08 18:29:20 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication2016-11-08 18:29:20 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key2016-11-08 18:29:20 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication2016-11-08 18:29:20 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo HWADDR=00:00:00:00:00:002016-11-08 18:29:20 do_ifconfig, tt->did_ifconfig_ipv6_setup=02016-11-08 18:29:20 MANAGEMENT: >STATE:1478647760,ASSIGN_IP,,10.4.15.26,,,,2016-11-08 18:29:20 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'2016-11-08 18:29:20 MANAGEMENT: CMD 'needok 'ROUTE' ok'2016-11-08 18:29:20 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'2016-11-08 18:29:20 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_AFTER_CLOSE'2016-11-08 18:29:20 Opening tun interface:2016-11-08 18:29:20 Local IPv4: 10.4.15.26/16 IPv6: null MTU: 15002016-11-08 18:29:20 DNS Server: 10.4.0.1, Domain: null2016-11-08 18:29:20 Routes: 0.0.0.0/02016-11-08 18:29:20 Routes excluded: 10.0.1.4/242016-11-08 18:29:20 VpnService routes installed: 0.0.0.0/5, 8.0.0.0/7, 10.0.0.0/24, 10.0.2.0/23, 10.0.4.0/22, 10.0.8.0/21, 10.0.16.0/20, 10.0.32.0/19, 10.0.64.0/18, 10.0.128.0/17, 10.1.0.0/16, 10.2.0.0/15, 10.4.0.0/14, 10.8.0.0/13, 10.16.0.0/12, 10.32.0.0/11, 10.64.0.0/10, 10.128.0.0/9, 11.0.0.0/8, 12.0.0.0/6, 16.0.0.0/4, 32.0.0.0/3, 64.0.0.0/2, 128.0.0.0/12016-11-08 18:29:21 MANAGEMENT: CMD 'needok 'OPENTUN' ok'2016-11-08 18:29:21 Initialization Sequence Completed2016-11-08 18:29:21 MANAGEMENT: >STATE:1478647761,CONNECTED,SUCCESS,10.4.15.26,46.21.154.82,443,, Quote Share this post Link to post
OpenSourcerer 1451 Posted ... What information does ipleak.net reveal on your iOS tablet and on Android? I believe that Roadrunner has blocked the US server in question and that one of the devices is not correctly routed through AirVPN. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
wintersnow 5 Posted ... I noticed that I was using two different AirVPN servers, both located in Chicago. alrischa was working on ios and alkaid was not working on android. So I added the alrischa profile to my android phone and was able to log into my Time Warner's webmail account using it. I also added the alkaid profile to my iPad and was not able to log into my Time Warner webmail account. It seems as if the problem is with the alkaid server or the configuration AirVPN is generating for it and there's nothing more I can do on my end to help diagnose it? if you think running the IP leak test would be helpful to AirVPN, please let me know and I will run it in the next day or so. Thanks very much for your help. Quote Share this post Link to post
OpenSourcerer 1451 Posted ... It seems as if the problem is with the alkaid server or the configuration AirVPN is generating for it and there's nothing more I can do on my end to help diagnose it? Grab the URL and enter it into the route checker. If it fails on Alkaid, it's temporarily not available from there. if you think running the IP leak test would be helpful to AirVPN, please let me know and I will run it in the next day or so. We found out you used two different servers, so we don't need that. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
wintersnow 5 Posted ... Alkaid failed, not surprisingly. I didn't know about the route checker. I tend to learn things as problems occur. Thank you for teaching me and helping me troubleshoot this issue. 1 OpenSourcerer reacted to this Quote Share this post Link to post