pyq 1 Posted ... Hello, after a lot of trying around I am still having problems using AirVPN on my Phone. I get disconnected after maybe a minute and have to manually reconnect every time. I wish I could keep using AirVPN, but I need to use a VPN on my phone a lot and it's just too annoying to keep reconnecting every minute. Now I am wondering if anyone else is having problems like that? I believe I am not one of few people who need to use a VPN on their phone on a daily basis. Also, are there any plans of building an app? I don't want to sound arrogant or anything, neither am I afraid of some manual configurations, but is it technically that difficult for the AirVPN team to put up an app (that matches its standards)? Cheers Quote Share this post Link to post
go558a83nk 364 Posted ... What different ports and protocols have you tried? Quote Share this post Link to post
pyq 1 Posted ... I have tried TCP (443), UDP (443), SSL (443, 28439) and SSH (22), also tried it with OpenVPN for Android and OpenVPN Connect. Oh but I figured that it is enough to lock the screen (black screen) and unlock again, then it will have connection again. Quote Share this post Link to post
pyq 1 Posted ... Just saw that others are having the same problem here. Sorry for the double posting. Quote Share this post Link to post
OpenSourcerer 1442 Posted ... Just saw that others are having the same problem here. Sorry for the double posting. NO! This is exactly what you need to do. Open your own threads and link to others if necessary! You did the right thing, this way we can help you directly here, and you get notified if someone posts something specific to your problem, and not the others' one. We need more info on your phone, the OpenVPN logs at least. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
pyq 1 Posted ... Oh okay then. I'm using a OnePlus 3 (chinese version without google). Here's my OpenVPN log: 2017-05-05 15:24:55 official build 0.6.65 running on OnePlus ONEPLUS A3000 (QC_Reference_Phone), Android 7.0 (NRD90M) API 24, ABI arm64-v8a, (OnePlus/OnePlus3/OnePlus3:7.0/NRD90M/01122125:user/release-keys)2017-05-05 15:24:55 Building configuration…2017-05-05 15:24:55 New OpenVPN Status (VPN_GENERATE_CONFIG->LEVEL_START):2017-05-05 15:24:55 New OpenVPN Status (VPN_GENERATE_CONFIG->LEVEL_START):2017-05-05 15:24:55 started Socket Thread2017-05-05 15:24:55 Network Status: CONNECTED to WIFI "ChinaNet-DQQu"2017-05-05 15:24:55 Debug state info: CONNECTED to WIFI "ChinaNet-DQQu", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED2017-05-05 15:24:55 Debug state info: CONNECTED to WIFI "ChinaNet-DQQu", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED2017-05-05 15:24:55 P:Initializing Google Breakpad!2017-05-05 15:24:55 Current Parameter Settings:2017-05-05 15:24:55 config = '/data/user/0/de.blinkt.openvpn/cache/android.conf'2017-05-05 15:24:55 mode = 02017-05-05 15:24:55 show_ciphers = DISABLED2017-05-05 15:24:55 show_digests = DISABLED2017-05-05 15:24:55 show_engines = DISABLED2017-05-05 15:24:55 genkey = DISABLED2017-05-05 15:24:55 key_pass_file = '[uNDEF]'2017-05-05 15:24:55 show_tls_ciphers = DISABLED2017-05-05 15:24:55 connect_retry_max = 02017-05-05 15:24:55 Connection profiles [0]:2017-05-05 15:24:55 Waiting 0s seconds between connection attempt2017-05-05 15:24:55 proto = tcp-client2017-05-05 15:24:55 local = '[uNDEF]'2017-05-05 15:24:55 local_port = '[uNDEF]'2017-05-05 15:24:55 remote = '127.0.0.1'2017-05-05 15:24:55 remote_port = '1413'2017-05-05 15:24:55 remote_float = DISABLED2017-05-05 15:24:55 bind_defined = DISABLED2017-05-05 15:24:55 bind_local = DISABLED2017-05-05 15:24:55 bind_ipv6_only = DISABLED2017-05-05 15:24:55 connect_retry_seconds = 22017-05-05 15:24:55 connect_timeout = 1202017-05-05 15:24:55 socks_proxy_server = '[uNDEF]'2017-05-05 15:24:55 socks_proxy_port = '[uNDEF]'2017-05-05 15:24:55 tun_mtu = 15002017-05-05 15:24:55 tun_mtu_defined = ENABLED2017-05-05 15:24:55 link_mtu = 15002017-05-05 15:24:55 link_mtu_defined = DISABLED2017-05-05 15:24:55 tun_mtu_extra = 02017-05-05 15:24:55 tun_mtu_extra_defined = DISABLED2017-05-05 15:24:55 mtu_discover_type = -12017-05-05 15:24:55 fragment = 02017-05-05 15:24:55 mssfix = 14502017-05-05 15:24:55 explicit_exit_notification = 02017-05-05 15:24:55 Connection profiles END2017-05-05 15:24:55 remote_random = DISABLED2017-05-05 15:24:55 ipchange = '[uNDEF]'2017-05-05 15:24:55 dev = 'tun'2017-05-05 15:24:55 dev_type = '[uNDEF]'2017-05-05 15:24:55 dev_node = '[uNDEF]'2017-05-05 15:24:55 lladdr = '[uNDEF]'2017-05-05 15:24:55 topology = 12017-05-05 15:24:55 ifconfig_local = '[uNDEF]'2017-05-05 15:24:55 ifconfig_remote_netmask = '[uNDEF]'2017-05-05 15:24:55 ifconfig_noexec = DISABLED2017-05-05 15:24:55 ifconfig_nowarn = ENABLED2017-05-05 15:24:55 ifconfig_ipv6_local = '[uNDEF]'2017-05-05 15:24:55 ifconfig_ipv6_netbits = 02017-05-05 15:24:55 ifconfig_ipv6_remote = '[uNDEF]'2017-05-05 15:24:55 shaper = 02017-05-05 15:24:55 mtu_test = 02017-05-05 15:24:55 mlock = DISABLED2017-05-05 15:24:55 keepalive_ping = 02017-05-05 15:24:55 keepalive_timeout = 02017-05-05 15:24:55 inactivity_timeout = 02017-05-05 15:24:55 ping_send_timeout = 02017-05-05 15:24:55 ping_rec_timeout = 02017-05-05 15:24:55 ping_rec_timeout_action = 02017-05-05 15:24:55 ping_timer_remote = DISABLED2017-05-05 15:24:55 remap_sigusr1 = 02017-05-05 15:24:55 persist_tun = ENABLED2017-05-05 15:24:55 persist_local_ip = DISABLED2017-05-05 15:24:55 persist_remote_ip = DISABLED2017-05-05 15:24:55 persist_key = DISABLED2017-05-05 15:24:55 passtos = DISABLED2017-05-05 15:24:55 resolve_retry_seconds = 10000000002017-05-05 15:24:55 resolve_in_advance = ENABLED2017-05-05 15:24:55 username = '[uNDEF]'2017-05-05 15:24:55 groupname = '[uNDEF]'2017-05-05 15:24:55 chroot_dir = '[uNDEF]'2017-05-05 15:24:55 cd_dir = '[uNDEF]'2017-05-05 15:24:55 writepid = '[uNDEF]'2017-05-05 15:24:55 up_script = '[uNDEF]'2017-05-05 15:24:55 down_script = '[uNDEF]'2017-05-05 15:24:55 down_pre = DISABLED2017-05-05 15:24:55 up_restart = DISABLED2017-05-05 15:24:55 up_delay = DISABLED2017-05-05 15:24:55 daemon = DISABLED2017-05-05 15:24:55 inetd = 02017-05-05 15:24:55 log = DISABLED2017-05-05 15:24:55 suppress_timestamps = DISABLED2017-05-05 15:24:55 machine_readable_output = ENABLED2017-05-05 15:24:55 nice = 02017-05-05 15:24:55 verbosity = 42017-05-05 15:24:55 mute = 02017-05-05 15:24:55 gremlin = 02017-05-05 15:24:55 status_file = '[uNDEF]'2017-05-05 15:24:55 status_file_version = 12017-05-05 15:24:55 status_file_update_freq = 602017-05-05 15:24:55 occ = ENABLED2017-05-05 15:24:55 rcvbuf = 02017-05-05 15:24:55 sndbuf = 02017-05-05 15:24:55 sockflags = 02017-05-05 15:24:55 fast_io = DISABLED2017-05-05 15:24:55 comp.alg = 22017-05-05 15:24:55 comp.flags = 12017-05-05 15:24:55 route_script = '[uNDEF]'2017-05-05 15:24:55 route_default_gateway = '[uNDEF]'2017-05-05 15:24:55 route_default_metric = 02017-05-05 15:24:55 route_noexec = DISABLED2017-05-05 15:24:55 route_delay = 02017-05-05 15:24:55 route_delay_window = 302017-05-05 15:24:55 route_delay_defined = DISABLED2017-05-05 15:24:55 route_nopull = DISABLED2017-05-05 15:24:55 route_gateway_via_dhcp = DISABLED2017-05-05 15:24:55 allow_pull_fqdn = DISABLED2017-05-05 15:24:55 route 194.187.251.156/255.255.255.255/net_gateway/default (not set)2017-05-05 15:24:55 management_addr = '/data/user/0/de.blinkt.openvpn/cache/mgmtsocket'2017-05-05 15:24:55 management_port = 'unix'2017-05-05 15:24:55 management_user_pass = '[uNDEF]'2017-05-05 15:24:55 management_log_history_cache = 2502017-05-05 15:24:55 management_echo_buffer_size = 1002017-05-05 15:24:55 management_write_peer_info_file = '[uNDEF]'2017-05-05 15:24:55 management_client_user = '[uNDEF]'2017-05-05 15:24:55 management_client_group = '[uNDEF]'2017-05-05 15:24:55 management_flags = 43902017-05-05 15:24:55 shared_secret_file = '[uNDEF]'2017-05-05 15:24:55 key_direction = 12017-05-05 15:24:55 ciphername = 'AES-256-CBC'2017-05-05 15:24:55 ncp_enabled = ENABLED2017-05-05 15:24:55 ncp_ciphers = 'AES-256-GCM:AES-128-GCM'2017-05-05 15:24:55 authname = 'SHA1'2017-05-05 15:24:55 prng_hash = 'SHA1'2017-05-05 15:24:55 prng_nonce_secret_len = 162017-05-05 15:24:55 keysize = 02017-05-05 15:24:55 engine = DISABLED2017-05-05 15:24:55 replay = ENABLED2017-05-05 15:24:55 mute_replay_warnings = DISABLED2017-05-05 15:24:55 replay_window = 642017-05-05 15:24:55 replay_time = 152017-05-05 15:24:55 packet_id_file = '[uNDEF]'2017-05-05 15:24:55 test_crypto = DISABLED2017-05-05 15:24:55 tls_server = DISABLED2017-05-05 15:24:55 tls_client = ENABLED2017-05-05 15:24:55 key_method = 22017-05-05 15:24:55 ca_file = '[[iNLINE]]'2017-05-05 15:24:55 ca_path = '[uNDEF]'2017-05-05 15:24:55 dh_file = '[uNDEF]'2017-05-05 15:24:55 cert_file = '[[iNLINE]]'2017-05-05 15:24:55 extra_certs_file = '[uNDEF]'2017-05-05 15:24:55 priv_key_file = '[[iNLINE]]'2017-05-05 15:24:55 pkcs12_file = '[uNDEF]'2017-05-05 15:24:55 cipher_list = '[uNDEF]'2017-05-05 15:24:55 tls_verify = '[uNDEF]'2017-05-05 15:24:55 tls_export_cert = '[uNDEF]'2017-05-05 15:24:55 verify_x509_type = 02017-05-05 15:24:55 verify_x509_name = '[uNDEF]'2017-05-05 15:24:55 crl_file = '[uNDEF]'2017-05-05 15:24:55 ns_cert_type = 02017-05-05 15:24:55 remote_cert_ku = 1602017-05-05 15:24:55 remote_cert_ku = 1362017-05-05 15:24:55 remote_cert_ku = 02017-05-05 15:24:55 remote_cert_ku = 02017-05-05 15:24:55 remote_cert_ku = 02017-05-05 15:24:55 remote_cert_ku = 02017-05-05 15:24:55 remote_cert_ku = 02017-05-05 15:24:55 remote_cert_ku = 02017-05-05 15:24:55 remote_cert_ku = 02017-05-05 15:24:55 remote_cert_ku = 02017-05-05 15:24:55 remote_cert_ku = 02017-05-05 15:24:55 remote_cert_ku = 02017-05-05 15:24:55 remote_cert_ku = 02017-05-05 15:24:55 remote_cert_ku = 02017-05-05 15:24:55 remote_cert_ku = 02017-05-05 15:24:55 remote_cert_ku = 02017-05-05 15:24:55 remote_cert_eku = 'TLS Web Server Authentication'2017-05-05 15:24:55 ssl_flags = 02017-05-05 15:24:55 tls_timeout = 22017-05-05 15:24:55 renegotiate_bytes = -12017-05-05 15:24:55 renegotiate_packets = 02017-05-05 15:24:55 renegotiate_seconds = 36002017-05-05 15:24:55 handshake_window = 602017-05-05 15:24:55 transition_window = 36002017-05-05 15:24:55 single_session = DISABLED2017-05-05 15:24:55 push_peer_info = DISABLED2017-05-05 15:24:55 tls_exit = DISABLED2017-05-05 15:24:55 tls_auth_file = '[[iNLINE]]'2017-05-05 15:24:55 tls_crypt_file = '[uNDEF]'2017-05-05 15:24:55 client = ENABLED2017-05-05 15:24:55 pull = ENABLED2017-05-05 15:24:55 auth_user_pass_file = '[uNDEF]'2017-05-05 15:24:55 OpenVPN 2.5-icsopenvpn [git:icsopenvpn-5711c5bd3a04f48b] android-21-arm64-v8a [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 4 20172017-05-05 15:24:55 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.092017-05-05 15:24:55 MANAGEMENT: Connected to management server at /data/user/0/de.blinkt.openvpn/cache/mgmtsocket2017-05-05 15:24:55 MANAGEMENT: CMD 'hold release'2017-05-05 15:24:55 MANAGEMENT: CMD 'proxy NONE'2017-05-05 15:24:55 MANAGEMENT: CMD 'bytecount 2'2017-05-05 15:24:55 MANAGEMENT: CMD 'state on'2017-05-05 15:24:56 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication2017-05-05 15:24:56 New OpenVPN Status (TCP_CONNECT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,2017-05-05 15:24:56 New OpenVPN Status (TCP_CONNECT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,2017-05-05 15:24:56 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication2017-05-05 15:24:56 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,2017-05-05 15:24:56 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,2017-05-05 15:24:56 LZO compression initializing2017-05-05 15:24:56 Control Channel MTU parms [ L:1624 D:1182 EF:68 EB:0 ET:0 EL:3 ]2017-05-05 15:24:56 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]2017-05-05 15:24:56 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'2017-05-05 15:24:56 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'2017-05-05 15:24:56 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:14132017-05-05 15:24:56 Socket Buffers: R=[1048576->1048576] S=[524288->524288]2017-05-05 15:24:56 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 [nonblock]2017-05-05 15:24:56 MANAGEMENT: >STATE:1493969096,TCP_CONNECT,,,,,,2017-05-05 15:24:56 TCP connection established with [AF_INET]127.0.0.1:14132017-05-05 15:24:56 TCP_CLIENT link local: (not bound)2017-05-05 15:24:56 TCP_CLIENT link remote: [AF_INET]127.0.0.1:14132017-05-05 15:24:56 MANAGEMENT: >STATE:1493969096,WAIT,,,,,,2017-05-05 15:24:58 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,2017-05-05 15:24:58 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,2017-05-05 15:24:58 MANAGEMENT: >STATE:1493969098,AUTH,,,,,,2017-05-05 15:24:58 TLS: Initial packet from [AF_INET]127.0.0.1:1413, sid=be0338e2 ff029d9a2017-05-05 15:24:58 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org2017-05-05 15:24:58 Validating certificate key usage2017-05-05 15:24:58 ++ Certificate has key usage 00a0, expects 00a02017-05-05 15:24:58 VERIFY KU OK2017-05-05 15:24:58 Validating certificate extended key usage2017-05-05 15:24:58 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication2017-05-05 15:24:58 VERIFY EKU OK2017-05-05 15:24:58 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org2017-05-05 15:24:59 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA2017-05-05 15:24:59 [server] Peer Connection Initiated with [AF_INET]127.0.0.1:14132017-05-05 15:25:00 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,2017-05-05 15:25:00 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,2017-05-05 15:25:00 MANAGEMENT: >STATE:1493969100,GET_CONFIG,,,,,,2017-05-05 15:25:00 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)2017-05-05 15:25:01 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.50.1.89,,,,2017-05-05 15:25:01 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.50.1.89,,,,2017-05-05 15:25:01 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.89 255.255.0.0'2017-05-05 15:25:01 OPTIONS IMPORT: timers and/or timeouts modified2017-05-05 15:25:01 OPTIONS IMPORT: compression parms modified2017-05-05 15:25:01 OPTIONS IMPORT: --ifconfig/up options modified2017-05-05 15:25:01 OPTIONS IMPORT: route options modified2017-05-05 15:25:01 OPTIONS IMPORT: route-related options modified2017-05-05 15:25:01 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified2017-05-05 15:25:01 Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:406 ET:0 EL:3 ]2017-05-05 15:25:01 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key2017-05-05 15:25:01 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,2017-05-05 15:25:01 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,2017-05-05 15:25:01 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication2017-05-05 15:25:01 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key2017-05-05 15:25:01 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication2017-05-05 15:25:01 GDG: SIOCGIFHWADDR(lo) failed2017-05-05 15:25:01 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo2017-05-05 15:25:01 Opening tun interface:2017-05-05 15:25:01 do_ifconfig, tt->did_ifconfig_ipv6_setup=02017-05-05 15:25:01 MANAGEMENT: >STATE:1493969101,ASSIGN_IP,,10.50.1.89,,,,2017-05-05 15:25:01 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'2017-05-05 15:25:01 MANAGEMENT: CMD 'needok 'ROUTE' ok'2017-05-05 15:25:01 MANAGEMENT: >STATE:1493969101,ADD_ROUTES,,,,,,2017-05-05 15:25:01 MANAGEMENT: CMD 'needok 'ROUTE' ok'2017-05-05 15:25:01 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'2017-05-05 15:25:01 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'2017-05-05 15:25:01 Ignoring multicast route: 224.0.0.0/32017-05-05 15:25:01 Local IPv4: 10.50.1.89/16 IPv6: null MTU: 15002017-05-05 15:25:01 DNS Server: 10.50.0.1, Domain: null2017-05-05 15:25:01 Routes: 0.0.0.0/0, 10.50.0.0/162017-05-05 15:25:01 Routes excluded: 192.168.1.2/24, 194.187.251.156/322017-05-05 15:25:01 VpnService routes installed: 0.0.0.0/1, 128.0.0.0/2, 192.0.0.0/9, 192.128.0.0/11, 192.160.0.0/13, 192.168.0.0/24, 192.168.2.0/23, 192.168.4.0/22, 192.168.8.0/21, 192.168.16.0/20, 192.168.32.0/19, 192.168.64.0/18, 192.168.128.0/17, 192.169.0.0/16, 192.170.0.0/15, 192.172.0.0/14, 192.176.0.0/12, 192.192.0.0/10, 193.0.0.0/8, 194.0.0.0/9, 194.128.0.0/11, 194.160.0.0/12, 194.176.0.0/13, 194.184.0.0/15, 194.186.0.0/16, 194.187.0.0/17, 194.187.128.0/18, 194.187.192.0/19, 194.187.224.0/20, 194.187.240.0/21, 194.187.248.0/23, 194.187.250.0/24, 194.187.251.0/25, 194.187.251.128/28, 194.187.251.144/29, 194.187.251.152/30, 194.187.251.157/32, 194.187.251.158/31, 194.187.251.160/27, 194.187.251.192/26, 194.187.252.0/22, 194.188.0.0/14, 194.192.0.0/10, 195.0.0.0/8, 196.0.0.0/6, 200.0.0.0/5, 208.0.0.0/4, 224.0.0.0/32017-05-05 15:25:01 Disallowed VPN apps: jackpal.androidterm2017-05-05 15:25:01 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.50.1.89,127.0.0.1,1413,127.0.0.1,443752017-05-05 15:25:01 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.50.1.89,127.0.0.1,1413,127.0.0.1,443752017-05-05 15:25:01 MANAGEMENT: CMD 'needok 'OPENTUN' ok'2017-05-05 15:25:01 Initialization Sequence Completed2017-05-05 15:25:01 MANAGEMENT: >STATE:1493969101,CONNECTED,SUCCESS,10.50.1.89,127.0.0.1,1413,127.0.0.1,443752017-05-05 15:25:01 Debug state info: CONNECTED to WIFI "ChinaNet-DQQu", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED2017-05-05 15:29:34 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,2017-05-05 15:29:34 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,2017-05-05 15:29:34 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 22017-05-05 15:29:34 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 22017-05-05 15:29:34 [server] Inactivity timeout (--ping-restart), restarting2017-05-05 15:29:34 Waiting 2s seconds between connection attempt2017-05-05 15:29:34 TCP/UDP: Closing socket2017-05-05 15:29:34 SIGUSR1[soft,ping-restart] received, process restarting2017-05-05 15:29:34 MANAGEMENT: >STATE:1493969374,RECONNECTING,ping-restart,,,,,2017-05-05 15:29:36 MANAGEMENT: CMD 'hold release'2017-05-05 15:29:36 MANAGEMENT: CMD 'proxy NONE'2017-05-05 15:29:36 MANAGEMENT: CMD 'bytecount 2'2017-05-05 15:29:36 MANAGEMENT: CMD 'state on'2017-05-05 15:29:37 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication2017-05-05 15:29:37 New OpenVPN Status (TCP_CONNECT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,2017-05-05 15:29:37 New OpenVPN Status (TCP_CONNECT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,2017-05-05 15:29:37 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication2017-05-05 15:29:37 Control Channel MTU parms [ L:1624 D:1182 EF:68 EB:0 ET:0 EL:3 ]2017-05-05 15:29:37 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]2017-05-05 15:29:37 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'2017-05-05 15:29:37 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'2017-05-05 15:29:37 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:14132017-05-05 15:29:37 Socket Buffers: R=[1048576->1048576] S=[524288->524288]2017-05-05 15:29:37 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 [nonblock]2017-05-05 15:29:37 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,2017-05-05 15:29:37 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,2017-05-05 15:29:37 MANAGEMENT: >STATE:1493969377,TCP_CONNECT,,,,,,2017-05-05 15:29:37 TCP connection established with [AF_INET]127.0.0.1:14132017-05-05 15:29:37 TCP_CLIENT link local: (not bound)2017-05-05 15:29:37 TCP_CLIENT link remote: [AF_INET]127.0.0.1:14132017-05-05 15:29:37 MANAGEMENT: >STATE:1493969377,WAIT,,,,,, I figured that maybe two times in the last three days the connection didn't break up for a longer time, lets say 15 minutes. If that is any help. Quote Share this post Link to post
pyq 1 Posted ... Here's my Terminal Emulator log: OnePlus3:/ $ cdOnePlus3:/data/user/0/jackpal.androidterm/app_HOME $./mebsuta2017.05.05 15:24:40 LOG5[ui]: stunnel 5.41 on arm-unknown-linux-androideabi platform2017.05.05 15:24:40 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k 26 Jan 20172017.05.05 15:24:40 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,FIPS,OCSP,PSK,SNI2017.05.05 15:24:40 LOG5[ui]: Reading configuration from file /data/data/jackpal.androidterm/app_HOME/AirVPN_BE-Brussels_Mebsuta_SSL-443.ssl2017.05.05 15:24:40 LOG5[ui]: UTF-8 byte order mark not detected2017.05.05 15:24:40 LOG5[ui]: FIPS mode disabled2017.05.05 15:24:40 LOG6[ui]: Initializing service [openvpn]2017.05.05 15:24:40 LOG5[ui]: Configuration successful2017.05.05 15:24:56 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:443752017.05.05 15:24:56 LOG6[0]: s_connect: connecting 194.187.251.156:4432017.05.05 15:24:57 LOG5[0]: s_connect: connected 194.187.251.156:4432017.05.05 15:24:57 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.2:412502017.05.05 15:24:57 LOG6[0]: SNI: sending servername: 194.187.251.1562017.05.05 15:24:57 LOG6[0]: Peer certificate required2017.05.05 15:24:57 LOG6[0]: CERT: Locally installed certificate matched2017.05.05 15:24:57 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org2017.05.05 15:24:57 LOG6[0]: Client certificate not requested2017.05.05 15:24:57 LOG6[0]: TLS connected: new session negotiated2017.05.05 15:24:57 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)2017.05.05 15:25:40 LOG6[cron]: Executing cron jobs2017.05.05 15:25:40 LOG6[cron]: Cron jobs completed in 0 seconds2017.05.05 15:30:45 LOG6[0]: Read socket closed (read hangup)2017.05.05 15:30:45 LOG5[1]: Service [openvpn] accepted connection from 127.0.0.1:445062017.05.05 15:30:45 LOG6[1]: s_connect: connecting 194.187.251.156:4432017.05.05 15:30:45 LOG3[0]: socket fd: Broken pipe (32)2017.05.05 15:30:45 LOG6[0]: SSL_shutdown successfully sent close_notify alert2017.05.05 15:30:45 LOG6[0]: writesocket: Socket is closed2017.05.05 15:30:45 LOG5[0]: Connection closed: 666328 byte(s) sent to TLS, 3679025 byte(s) sent to socket2017.05.05 15:30:45 LOG5[2]: Service [openvpn] accepted connection from 127.0.0.1:445342017.05.05 15:30:45 LOG6[2]: s_connect: connecting 194.187.251.156:4432017.05.05 15:30:46 LOG5[1]: s_connect: connected 194.187.251.156:4432017.05.05 15:30:46 LOG5[1]: Service [openvpn] connected remote server from 192.168.1.2:414092017.05.05 15:30:46 LOG6[1]: SNI: sending servername: 194.187.251.1562017.05.05 15:30:46 LOG6[1]: Peer certificate required2017.05.05 15:30:46 LOG5[2]: s_connect: connected 194.187.251.156:4432017.05.05 15:30:46 LOG5[2]: Service [openvpn] connected remote server from 192.168.1.2:414102017.05.05 15:30:46 LOG6[2]: SNI: sending servername: 194.187.251.1562017.05.05 15:30:46 LOG6[2]: Peer certificate required2017.05.05 15:30:46 LOG6[1]: CERT: Locally installed certificate matched2017.05.05 15:30:46 LOG5[1]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org2017.05.05 15:30:46 LOG6[2]: CERT: Locally installed certificate matched2017.05.05 15:30:46 LOG5[2]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org2017.05.05 15:30:46 LOG6[1]: Client certificate not requested2017.05.05 15:30:46 LOG6[2]: Client certificate not requested2017.05.05 15:30:47 LOG6[2]: TLS connected: new session negotiated2017.05.05 15:30:47 LOG6[2]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)2017.05.05 15:30:49 LOG6[1]: TLS connected: new session negotiated2017.05.05 15:30:49 LOG6[1]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)2017.05.05 15:30:49 LOG6[1]: Read socket closed (read hangup)2017.05.05 15:30:49 LOG6[1]: SSL_shutdown successfully sent close_notify alert2017.05.05 15:30:49 LOG3[1]: transfer: s_poll_wait: TIMEOUTclose exceeded: closing2017.05.05 15:30:49 LOG5[1]: Connection closed: 220 byte(s) sent to TLS, 0 byte(s) sent to socket Quote Share this post Link to post