Jump to content
Not connected, Your IP: 3.140.186.201
Sign in to follow this  
jmish

Connection Problems

Recommended Posts

Greetings,

Today I've been unable to connect to any of the remote servers. At first I thought it was our office network, since it was having issues. But once that seemed to be taken care of, I wasn't able to connect to any remote servers using the AirVPN client. I would get the "unable to connect to remote server" message and I would get disconnected from my office network for a few minutes. Part of me thought it had something to do with the IPCop software my office runs but I don't know. My connection logs are pasted below. Thanks. (btw, everything works perfectly on my Macbook at home using Tunnelblick. It's only on my PC at work that I have problems)

5/9/2012 - 5:17 PM AirVPN client version: 1.7

5/9/2012 - 5:17 PM Reading options from C:\Users\Josh\AppData\Roaming\AirVPN\Air\1.0.0.0\AirVPN.xml

5/9/2012 - 5:17 PM OpenVPN bundle version: OpenVPN 2.2.2

5/9/2012 - 5:17 PM OpenVPN current version: OpenVPN 2.2.2

5/9/2012 - 5:17 PM Ready.

5/9/2012 - 5:17 PM Login...

5/9/2012 - 5:17 PM Login success.

5/9/2012 - 5:17 PM Contacting service...

5/9/2012 - 5:17 PM Connecting...

5/9/2012 - 5:17 PM OpenVPN 2.2.2 Win32-MSVC++ [sSL] [LZO2] [PKCS11] built on Dec 15 2011

5/9/2012 - 5:17 PM NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

5/9/2012 - 5:17 PM LZO compression initialized

5/9/2012 - 5:17 PM Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]

5/9/2012 - 5:17 PM Socket Buffers: R=[8192->8192] S=[8192->8192]

5/9/2012 - 5:17 PM Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]

5/9/2012 - 5:17 PM Local Options hash (VER=V4): '22188c5b'

5/9/2012 - 5:17 PM Expected Remote Options hash (VER=V4): 'a8f55717'

5/9/2012 - 5:17 PM UDPv4 link local: [undef]

5/9/2012 - 5:17 PM UDPv4 link remote: 69.163.36.66:443

5/9/2012 - 5:17 PM TLS: Initial packet from 69.163.36.66:443, sid=6428f4ad acd4f192

5/9/2012 - 5:17 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

5/9/2012 - 5:17 PM VERIFY OK: nsCertType=SERVER

5/9/2012 - 5:17 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

5/9/2012 - 5:17 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

5/9/2012 - 5:17 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

5/9/2012 - 5:17 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

5/9/2012 - 5:17 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

5/9/2012 - 5:17 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

5/9/2012 - 5:17 PM [server] Peer Connection Initiated with 69.163.36.66:443

5/9/2012 - 5:17 PM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

5/9/2012 - 5:17 PM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

5/9/2012 - 5:18 PM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

5/9/2012 - 5:18 PM PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.4.12.246 10.4.12.245'

5/9/2012 - 5:18 PM OPTIONS IMPORT: timers and/or timeouts modified

5/9/2012 - 5:18 PM OPTIONS IMPORT: LZO parms modified

5/9/2012 - 5:18 PM OPTIONS IMPORT: --ifconfig/up options modified

5/9/2012 - 5:18 PM OPTIONS IMPORT: route options modified

5/9/2012 - 5:18 PM OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

5/9/2012 - 5:18 PM ROUTE default_gateway=192.168.3.250

5/9/2012 - 5:18 PM TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{584BF7D6-C6A0-4541-A263-6065725A7A93}.tap

5/9/2012 - 5:18 PM TAP-Win32 Driver Version 9.9

5/9/2012 - 5:18 PM TAP-Win32 MTU=1500

5/9/2012 - 5:18 PM Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.4.12.246/255.255.255.252 on interface {584BF7D6-C6A0-4541-A263-6065725A7A93} [DHCP-serv: 10.4.12.245, lease-time: 31536000]

5/9/2012 - 5:18 PM Successful ARP Flush on interface [20] {584BF7D6-C6A0-4541-A263-6065725A7A93}

5/9/2012 - 5:18 PM TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

5/9/2012 - 5:18 PM C:\WINDOWS\system32\route.exe ADD 69.163.36.66 MASK 255.255.255.255 192.168.3.250

5/9/2012 - 5:18 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

5/9/2012 - 5:18 PM Route addition via IPAPI succeeded [adaptive]

5/9/2012 - 5:18 PM C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.12.245

5/9/2012 - 5:18 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

5/9/2012 - 5:18 PM Route addition via IPAPI succeeded [adaptive]

5/9/2012 - 5:18 PM C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.12.245

5/9/2012 - 5:18 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

5/9/2012 - 5:18 PM Route addition via IPAPI succeeded [adaptive]

5/9/2012 - 5:18 PM C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.12.245

5/9/2012 - 5:18 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

5/9/2012 - 5:18 PM Route addition via IPAPI succeeded [adaptive]

5/9/2012 - 5:18 PM Initialization Sequence Completed

5/9/2012 - 5:18 PM Starting Management Interface...

5/9/2012 - 5:18 PM Checking...

5/9/2012 - 5:19 PM Unable to connect to the remote server

5/9/2012 - 5:19 PM SIGTERM received, sending exit notification to peer

5/9/2012 - 5:19 PM TCP/UDP: Closing socket

5/9/2012 - 5:19 PM C:\WINDOWS\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.12.245

5/9/2012 - 5:19 PM Route deletion via IPAPI succeeded [adaptive]

5/9/2012 - 5:19 PM C:\WINDOWS\system32\route.exe DELETE 69.163.36.66 MASK 255.255.255.255 192.168.3.250

5/9/2012 - 5:19 PM Route deletion via IPAPI succeeded [adaptive]

5/9/2012 - 5:19 PM C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.12.245

5/9/2012 - 5:19 PM Route deletion via IPAPI succeeded [adaptive]

5/9/2012 - 5:19 PM C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.12.245

5/9/2012 - 5:19 PM Route deletion via IPAPI succeeded [adaptive]

5/9/2012 - 5:19 PM Closing TUN/TAP interface

5/9/2012 - 5:19 PM SIGTERM[hard,] received, process exiting

5/9/2012 - 5:19 PM Disconnected.

Share this post


Link to post

@jmish

Hello!

Does your office network have a proxy? If so, you'll need to connect OpenVPN over that proxy. OpenVPN has full ability to connect over SOCKS and http proxies and supports all the authentication methods, if needed.

If your office network does not use a proxy, maybe a firewall blocks some outbound ports. Try to connect over port 80 TCP or 53 TCP.

Kind regards

Share this post


Link to post

My office doesn't have a proxy so I tried connecting over port 80 TCP and 53 TCP. I got the same result. I wasn't able to connect to the remote server and it disabled the entire network for a couple minutes. Any other ideas?

Thanks.

Share this post


Link to post

My office doesn't have a proxy so I tried connecting over port 80 TCP and 53 TCP. I got the same result. I wasn't able to connect to the remote server and it disabled the entire network for a couple minutes. Any other ideas?

Thanks.

Hello!

Are you able to obtain the network configuration from the system admin(s)? There's the chance that they use a firewall with a whitelist, in which case breaking through would require some additional configuration. A first attempt, if you can't obtain any information, can be to tunnel OpenVPN over an http proxy. A further, probably more effective attempt can be to perform full http-tunneling. Unfortunately, currently http-tunneling is not supported by OpenVPN. We'll evaluate in the near future whether to offer an http-tunneling service or not, which can't be considered as secure as OpenVPN access is but can be sometimes useful to circumvent some kinds of censorships.

Kind regards

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...