Jump to content
Not connected, Your IP: 3.147.83.8
wintersnow

Connection to TWC webmail with OpenVPN from Android Phone

Recommended Posts

I can connect to and log into Time Warner's Roadrunner webmail server when connected to one of AirVPN's US servers through OpenVPN from my iOS tablet (now on iOS 10, never had a problem with earlier versions either), but can't when running the same config on my Android phone.  I can log in to every other site on the phone through the AirVPN server/OpenVPN connection, just not Roadrunner's webmail.

 

I'm wondering if there is some setting I need to tweak on the Android phone? 

 

I'm running:

Android - 4.4.2

Baseband - M8974A-AAAANAZM-1.0.190084

Kernel - 3.4.0

Build - KOT491.080120g

Software - D80120g

 

Thanks for any help.

 

Share this post


Link to post

OpenVPN logs would be helpful. Please paste them here from line 1 into spoiler tags, how-to in my signature.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Thanks, giganerd.

 

Here's the log. It records me failing to log into Time Warner's webmail server,

succeeding in logging into news.google.com and into a non-Time Warner server

where I have an email account.

 

Thanks for your help.

 

2016-11-08 18:26:45 Reread (2) log items from log cache file
2016-11-08 18:26:54 official build 0.6.60 running on lge LG-D801 (MSM8974), Android 4.4.2 (KOT49I.D80120g) API 19, ABI armeabi-v7a, (lge/g2_tmo_us/g2:4.4.2/KOT49I.D80120g/D80120g.1414567414:user/release-keys)
2016-11-08 18:26:54 Reread (1) log items from log cache file
2016-11-08 18:29:17 Building configuration…
2016-11-08 18:29:17 started Socket Thread
2016-11-08 18:29:17 Network Status: CONNECTED to WIFI "ETKNetwork"
2016-11-08 18:29:17 P:Initializing Google Breakpad!
2016-11-08 18:29:17 Current Parameter Settings:
2016-11-08 18:29:17 config = '/data/data/de.blinkt.openvpn/cache/android.conf'
2016-11-08 18:29:17 mode = 0
2016-11-08 18:29:17 show_ciphers = DISABLED
2016-11-08 18:29:17 show_digests = DISABLED
2016-11-08 18:29:17 show_engines = DISABLED
2016-11-08 18:29:17 genkey = DISABLED
2016-11-08 18:29:17 key_pass_file = '[uNDEF]'
2016-11-08 18:29:17 show_tls_ciphers = DISABLED
2016-11-08 18:29:17 connect_retry_max = 5
2016-11-08 18:29:17 Connection profiles [0]:
2016-11-08 18:29:17 proto = udp
2016-11-08 18:29:17 local = '[uNDEF]'
2016-11-08 18:29:17 local_port = '[uNDEF]'
2016-11-08 18:29:17 remote = '46.21.154.82'
2016-11-08 18:29:17 remote_port = '443'
2016-11-08 18:29:17 remote_float = DISABLED
2016-11-08 18:29:17 bind_defined = DISABLED
2016-11-08 18:29:17 bind_local = DISABLED
2016-11-08 18:29:17 bind_ipv6_only = DISABLED
2016-11-08 18:29:17 connect_retry_seconds = 5
2016-11-08 18:29:17 connect_timeout = 120
2016-11-08 18:29:17 socks_proxy_server = '[uNDEF]'
2016-11-08 18:29:17 socks_proxy_port = '[uNDEF]'
2016-11-08 18:29:17 tun_mtu = 1500
2016-11-08 18:29:17 tun_mtu_defined = ENABLED
2016-11-08 18:29:17 link_mtu = 1500
2016-11-08 18:29:17 link_mtu_defined = DISABLED
2016-11-08 18:29:17 tun_mtu_extra = 0
2016-11-08 18:29:17 tun_mtu_extra_defined = DISABLED
2016-11-08 18:29:17 mtu_discover_type = -1
2016-11-08 18:29:17 fragment = 0
2016-11-08 18:29:17 mssfix = 1450
2016-11-08 18:29:17 explicit_exit_notification = 5
2016-11-08 18:29:17 Connection profiles END
2016-11-08 18:29:17 remote_random = DISABLED
2016-11-08 18:29:17 ipchange = '[uNDEF]'
2016-11-08 18:29:17 dev = 'tun'
2016-11-08 18:29:17 dev_type = '[uNDEF]'
2016-11-08 18:29:17 dev_node = '[uNDEF]'
2016-11-08 18:29:17 lladdr = '[uNDEF]'
2016-11-08 18:29:17 topology = 1
2016-11-08 18:29:17 ifconfig_local = '[uNDEF]'
2016-11-08 18:29:17 ifconfig_remote_netmask = '[uNDEF]'
2016-11-08 18:29:17 ifconfig_noexec = DISABLED
2016-11-08 18:29:17 ifconfig_nowarn = ENABLED
2016-11-08 18:29:17 ifconfig_ipv6_local = '[uNDEF]'
2016-11-08 18:29:17 ifconfig_ipv6_netbits = 0
2016-11-08 18:29:17 ifconfig_ipv6_remote = '[uNDEF]'
2016-11-08 18:29:17 shaper = 0
2016-11-08 18:29:17 mtu_test = 0
2016-11-08 18:29:17 mlock = DISABLED
2016-11-08 18:29:17 keepalive_ping = 0
2016-11-08 18:29:17 keepalive_timeout = 0
2016-11-08 18:29:17 inactivity_timeout = 0
2016-11-08 18:29:17 ping_send_timeout = 0
2016-11-08 18:29:17 ping_rec_timeout = 0
2016-11-08 18:29:17 ping_rec_timeout_action = 0
2016-11-08 18:29:17 ping_timer_remote = DISABLED
2016-11-08 18:29:17 remap_sigusr1 = 0
2016-11-08 18:29:17 persist_tun = ENABLED
2016-11-08 18:29:17 persist_local_ip = DISABLED
2016-11-08 18:29:17 persist_remote_ip = DISABLED
2016-11-08 18:29:17 persist_key = DISABLED
2016-11-08 18:29:17 passtos = DISABLED
2016-11-08 18:29:17 resolve_retry_seconds = 1000000000
2016-11-08 18:29:17 resolve_in_advance = ENABLED
2016-11-08 18:29:17 username = '[uNDEF]'
2016-11-08 18:29:17 groupname = '[uNDEF]'
2016-11-08 18:29:17 chroot_dir = '[uNDEF]'
2016-11-08 18:29:17 cd_dir = '[uNDEF]'
2016-11-08 18:29:17 writepid = '[uNDEF]'
2016-11-08 18:29:17 up_script = '[uNDEF]'
2016-11-08 18:29:17 down_script = '[uNDEF]'
2016-11-08 18:29:17 down_pre = DISABLED
2016-11-08 18:29:17 up_restart = DISABLED
2016-11-08 18:29:17 up_delay = DISABLED
2016-11-08 18:29:17 daemon = DISABLED
2016-11-08 18:29:17 inetd = 0
2016-11-08 18:29:17 log = DISABLED
2016-11-08 18:29:17 suppress_timestamps = DISABLED
2016-11-08 18:29:17 machine_readable_output = ENABLED
2016-11-08 18:29:17 nice = 0
2016-11-08 18:29:17 verbosity = 4
2016-11-08 18:29:17 mute = 0
2016-11-08 18:29:17 gremlin = 0
2016-11-08 18:29:17 status_file = '[uNDEF]'
2016-11-08 18:29:17 status_file_version = 1
2016-11-08 18:29:17 status_file_update_freq = 60
2016-11-08 18:29:17 occ = ENABLED
2016-11-08 18:29:17 rcvbuf = 0
2016-11-08 18:29:17 sndbuf = 0
2016-11-08 18:29:17 sockflags = 0
2016-11-08 18:29:17 fast_io = DISABLED
2016-11-08 18:29:17 comp.alg = 2
2016-11-08 18:29:17 comp.flags = 1
2016-11-08 18:29:17 route_script = '[uNDEF]'
2016-11-08 18:29:17 route_default_gateway = '[uNDEF]'
2016-11-08 18:29:17 route_default_metric = 0
2016-11-08 18:29:17 route_noexec = DISABLED
2016-11-08 18:29:17 route_delay = 0
2016-11-08 18:29:17 route_delay_window = 30
2016-11-08 18:29:17 route_delay_defined = DISABLED
2016-11-08 18:29:17 route_nopull = DISABLED
2016-11-08 18:29:17 route_gateway_via_dhcp = DISABLED
2016-11-08 18:29:17 allow_pull_fqdn = DISABLED
2016-11-08 18:29:17 management_addr = '/data/data/de.blinkt.openvpn/cache/mgmtsocket'
2016-11-08 18:29:17 management_port = 'unix'
2016-11-08 18:29:17 management_user_pass = '[uNDEF]'
2016-11-08 18:29:17 management_log_history_cache = 250
2016-11-08 18:29:17 management_echo_buffer_size = 100
2016-11-08 18:29:17 management_write_peer_info_file = '[uNDEF]'
2016-11-08 18:29:17 management_client_user = '[uNDEF]'
2016-11-08 18:29:17 management_client_group = '[uNDEF]'
2016-11-08 18:29:17 management_flags = 4390
2016-11-08 18:29:17 shared_secret_file = '[uNDEF]'
2016-11-08 18:29:17 key_direction = 2
2016-11-08 18:29:17 ciphername = 'AES-256-CBC'
2016-11-08 18:29:17 authname = 'SHA1'
2016-11-08 18:29:17 prng_hash = 'SHA1'
2016-11-08 18:29:17 prng_nonce_secret_len = 16
2016-11-08 18:29:17 keysize = 0
2016-11-08 18:29:17 engine = DISABLED
2016-11-08 18:29:17 replay = ENABLED
2016-11-08 18:29:17 mute_replay_warnings = DISABLED
2016-11-08 18:29:17 replay_window = 64
2016-11-08 18:29:17 replay_time = 15
2016-11-08 18:29:17 packet_id_file = '[uNDEF]'
2016-11-08 18:29:17 use_iv = ENABLED
2016-11-08 18:29:17 test_crypto = DISABLED
2016-11-08 18:29:17 tls_server = DISABLED
2016-11-08 18:29:17 tls_client = ENABLED
2016-11-08 18:29:17 key_method = 2
2016-11-08 18:29:17 ca_file = '[[iNLINE]]'
2016-11-08 18:29:17 ca_path = '[uNDEF]'
2016-11-08 18:29:17 dh_file = '[uNDEF]'
2016-11-08 18:29:17 cert_file = '[[iNLINE]]'
2016-11-08 18:29:17 extra_certs_file = '[uNDEF]'
2016-11-08 18:29:17 priv_key_file = '[[iNLINE]]'
2016-11-08 18:29:17 pkcs12_file = '[uNDEF]'
2016-11-08 18:29:17 cipher_list = '[uNDEF]'
2016-11-08 18:29:17 tls_verify = '[uNDEF]'
2016-11-08 18:29:17 tls_export_cert = '[uNDEF]'
2016-11-08 18:29:17 verify_x509_type = 0
2016-11-08 18:29:17 verify_x509_name = '[uNDEF]'
2016-11-08 18:29:17 crl_file = '[uNDEF]'
2016-11-08 18:29:17 ns_cert_type = 0
2016-11-08 18:29:17 remote_cert_ku = 160
2016-11-08 18:29:17 remote_cert_ku = 136
2016-11-08 18:29:17 remote_cert_ku = 0
2016-11-08 18:29:17 remote_cert_ku = 0
2016-11-08 18:29:17 remote_cert_ku = 0
2016-11-08 18:29:17 remote_cert_ku = 0
2016-11-08 18:29:17 remote_cert_ku = 0
2016-11-08 18:29:17 remote_cert_ku = 0
2016-11-08 18:29:17 remote_cert_ku = 0
2016-11-08 18:29:17 remote_cert_ku = 0
2016-11-08 18:29:17 remote_cert_ku = 0
2016-11-08 18:29:17 remote_cert_ku = 0
2016-11-08 18:29:17 remote_cert_ku = 0
2016-11-08 18:29:17 remote_cert_ku = 0
2016-11-08 18:29:17 remote_cert_ku = 0
2016-11-08 18:29:17 remote_cert_ku = 0
2016-11-08 18:29:17 remote_cert_eku = 'TLS Web Server Authentication'
2016-11-08 18:29:17 ssl_flags = 0
2016-11-08 18:29:17 tls_timeout = 2
2016-11-08 18:29:17 renegotiate_bytes = 0
2016-11-08 18:29:17 renegotiate_packets = 0
2016-11-08 18:29:17 renegotiate_seconds = 3600
2016-11-08 18:29:17 handshake_window = 60
2016-11-08 18:29:17 transition_window = 3600
2016-11-08 18:29:17 single_session = DISABLED
2016-11-08 18:29:17 push_peer_info = DISABLED
2016-11-08 18:29:17 tls_exit = DISABLED
2016-11-08 18:29:17 tls_auth_file = '[[iNLINE]]'
2016-11-08 18:29:17 client = ENABLED
2016-11-08 18:29:17 pull = ENABLED
2016-11-08 18:29:17 auth_user_pass_file = '[uNDEF]'
2016-11-08 18:29:17 OpenVPN 2.4-icsopenvpn [git:HEAD-9d8801b6185d7453] android-14-armeabi-v7a [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [iPv6] built on Oct 9 2016
2016-11-08 18:29:17 library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09
2016-11-08 18:29:17 MANAGEMENT: Connected to management server at /data/data/de.blinkt.openvpn/cache/mgmtsocket
2016-11-08 18:29:17 MANAGEMENT: CMD 'hold release'
2016-11-08 18:29:17 MANAGEMENT: CMD 'proxy NONE'
2016-11-08 18:29:17 MANAGEMENT: CMD 'bytecount 2'
2016-11-08 18:29:17 MANAGEMENT: CMD 'state on'
2016-11-08 18:29:18 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2016-11-08 18:29:18 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2016-11-08 18:29:18 LZO compression initializing
2016-11-08 18:29:18 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
2016-11-08 18:29:18 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2016-11-08 18:29:18 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
2016-11-08 18:29:18 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
2016-11-08 18:29:18 TCP/UDP: Preserving recently used remote address: [AF_INET]46.21.154.82:443
2016-11-08 18:29:18 Socket Buffers: R=[163840->163840] S=[163840->163840]
2016-11-08 18:29:18 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2016-11-08 18:29:18 UDP link local: (not bound)
2016-11-08 18:29:18 UDP link remote: [AF_INET]46.21.154.82:443
2016-11-08 18:29:18 MANAGEMENT: >STATE:1478647758,WAIT,,,,,,
2016-11-08 18:29:18 MANAGEMENT: >STATE:1478647758,AUTH,,,,,,
2016-11-08 18:29:18 TLS: Initial packet from [AF_INET]46.21.154.82:443, sid=dc322b79 bb1f4992
2016-11-08 18:29:18 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
2016-11-08 18:29:18 Validating certificate key usage
2016-11-08 18:29:18 ++ Certificate has key usage 00a0, expects 00a0
2016-11-08 18:29:18 VERIFY KU OK
2016-11-08 18:29:18 Validating certificate extended key usage
2016-11-08 18:29:18 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2016-11-08 18:29:18 VERIFY EKU OK
2016-11-08 18:29:18 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
2016-11-08 18:29:19 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
2016-11-08 18:29:19 [server] Peer Connection Initiated with [AF_INET]46.21.154.82:443
2016-11-08 18:29:20 MANAGEMENT: >STATE:1478647760,GET_CONFIG,,,,,,
2016-11-08 18:29:20 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
2016-11-08 18:29:20 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.15.26 255.255.0.0'
2016-11-08 18:29:20 OPTIONS IMPORT: timers and/or timeouts modified
2016-11-08 18:29:20 OPTIONS IMPORT: compression parms modified
2016-11-08 18:29:20 OPTIONS IMPORT: --ifconfig/up options modified
2016-11-08 18:29:20 OPTIONS IMPORT: route options modified
2016-11-08 18:29:20 OPTIONS IMPORT: route-related options modified
2016-11-08 18:29:20 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2016-11-08 18:29:20 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:406 ET:0 EL:3 ]
2016-11-08 18:29:20 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2016-11-08 18:29:20 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
2016-11-08 18:29:20 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2016-11-08 18:29:20 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
2016-11-08 18:29:20 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo HWADDR=00:00:00:00:00:00
2016-11-08 18:29:20 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
2016-11-08 18:29:20 MANAGEMENT: >STATE:1478647760,ASSIGN_IP,,10.4.15.26,,,,
2016-11-08 18:29:20 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2016-11-08 18:29:20 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2016-11-08 18:29:20 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2016-11-08 18:29:20 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_AFTER_CLOSE'
2016-11-08 18:29:20 Opening tun interface:
2016-11-08 18:29:20 Local IPv4: 10.4.15.26/16 IPv6: null MTU: 1500
2016-11-08 18:29:20 DNS Server: 10.4.0.1, Domain: null
2016-11-08 18:29:20 Routes: 0.0.0.0/0
2016-11-08 18:29:20 Routes excluded: 10.0.1.4/24
2016-11-08 18:29:20 VpnService routes installed: 0.0.0.0/5, 8.0.0.0/7, 10.0.0.0/24, 10.0.2.0/23, 10.0.4.0/22, 10.0.8.0/21, 10.0.16.0/20, 10.0.32.0/19, 10.0.64.0/18, 10.0.128.0/17, 10.1.0.0/16, 10.2.0.0/15, 10.4.0.0/14, 10.8.0.0/13, 10.16.0.0/12, 10.32.0.0/11, 10.64.0.0/10, 10.128.0.0/9, 11.0.0.0/8, 12.0.0.0/6, 16.0.0.0/4, 32.0.0.0/3, 64.0.0.0/2, 128.0.0.0/1
2016-11-08 18:29:21 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
2016-11-08 18:29:21 Initialization Sequence Completed
2016-11-08 18:29:21 MANAGEMENT: >STATE:1478647761,CONNECTED,SUCCESS,10.4.15.26,46.21.154.82,443,,

 

Share this post


Link to post

What information does ipleak.net reveal on your iOS tablet and on Android? I believe that Roadrunner has blocked the US server in question and that one of the devices is not correctly routed through AirVPN.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

I noticed that I was using two different AirVPN servers, both located in Chicago. alrischa was working on ios and alkaid was not working on android. So I added the alrischa profile to my android phone and was able to log into my Time Warner's webmail account using it.

 

I also added the alkaid profile to my iPad and was not able to log into my Time Warner webmail account.

 

It seems as if the problem is with the alkaid server or the configuration AirVPN is generating for it and there's nothing more I can do on my end to help diagnose it? if you think running the IP leak test would be helpful to AirVPN, please let me know and I will run it in the next day or so.

 

Thanks very much for your help.

Share this post


Link to post

It seems as if the problem is with the alkaid server or the configuration AirVPN is generating for it and there's nothing more I can do on my end to help diagnose it?

 

Grab the URL and enter it into the route checker. If it fails on Alkaid, it's temporarily not available from there.

 

if you think running the IP leak test would be helpful to AirVPN, please let me know and I will run it in the next day or so.

 

We found out you used two different servers, so we don't need that.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Alkaid failed, not surprisingly.  I didn't know about the route checker.  I tend to learn things as problems occur.  Thank you for teaching me and helping me troubleshoot this issue.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...