Jump to content
Not connected, Your IP: 3.133.109.211
randomhash

Eddie fails to connect to server and continuously retries

Recommended Posts

Hello, I'm using Arch Linux. I installed eddie from the AUR repositories and have tried the official release to the same effect. I log in and try to connect to a server. This is the output for both clients. Any idea what's causing the issue?

I 2017.10.13 00:03:20 - OpenVPN Driver - Found, /dev/net/tun
I 2017.10.13 00:03:20 - OpenVPN - Version: 2.4.4 - OpenSSL 1.1.0f  25 May 2017, LZO 2.10 (/usr/bin/openvpn)
I 2017.10.13 00:03:20 - SSH - Version: OpenSSH_7.6p1, OpenSSL 1.1.0f  25 May 2017 (/usr/bin/ssh)
I 2017.10.13 00:03:20 - SSL - Version: stunnel 5.42 (/usr/bin/stunnel)
I 2017.10.13 00:03:20 - curl - Version: 7.56.0 (/usr/bin/curl)
I 2017.10.13 00:03:20 - Certification Authorities: /usr/share/AirVPN/cacert.pem
. 2017.10.13 00:03:20 - Updating systems & servers data ...
! 2017.10.13 00:03:20 - Ready
. 2017.10.13 00:03:21 - Systems & servers data update completed
I 2017.10.13 00:03:31 - Session starting.
I 2017.10.13 00:03:31 - Checking authorization ...
! 2017.10.13 00:03:31 - Connecting to Fornax (Bulgaria, Sofia)
. 2017.10.13 00:03:31 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
. 2017.10.13 00:03:31 - OpenVPN > library versions: OpenSSL 1.1.0f  25 May 2017, LZO 2.10
. 2017.10.13 00:03:31 - Connection to OpenVPN Management Interface
. 2017.10.13 00:03:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]93.123.73.113:443
. 2017.10.13 00:03:31 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2017.10.13 00:03:31 - OpenVPN > UDP link local: (not bound)
. 2017.10.13 00:03:31 - OpenVPN > UDP link remote: [AF_INET]93.123.73.113:443
. 2017.10.13 00:03:31 - OpenVPN > TLS: Initial packet from [AF_INET]93.123.73.113:443, sid=5e2226af 3c6a2d05
. 2017.10.13 00:03:32 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.13 00:03:32 - OpenVPN > VERIFY KU OK
. 2017.10.13 00:03:32 - OpenVPN > Validating certificate extended key usage
. 2017.10.13 00:03:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.13 00:03:32 - OpenVPN > VERIFY EKU OK
. 2017.10.13 00:03:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fornax, emailAddress=info@airvpn.org
. 2017.10.13 00:03:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.13 00:03:32 - OpenVPN > [Fornax] Peer Connection Initiated with [AF_INET]93.123.73.113:443
. 2017.10.13 00:03:33 - OpenVPN > SENT CONTROL [Fornax]: 'PUSH_REQUEST' (status=1)
! 2017.10.13 00:03:33 - Disconnecting
. 2017.10.13 00:03:33 - Connection terminated.
I 2017.10.13 00:03:36 - Checking authorization ...
! 2017.10.13 00:03:36 - Connecting to Alphecca (Netherlands, Alblasserdam)
. 2017.10.13 00:03:36 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
. 2017.10.13 00:03:36 - OpenVPN > library versions: OpenSSL 1.1.0f  25 May 2017, LZO 2.10
. 2017.10.13 00:03:36 - Connection to OpenVPN Management Interface
. 2017.10.13 00:03:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.4:443
. 2017.10.13 00:03:36 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2017.10.13 00:03:36 - OpenVPN > UDP link local: (not bound)
. 2017.10.13 00:03:36 - OpenVPN > UDP link remote: [AF_INET]109.202.107.4:443
. 2017.10.13 00:03:36 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.4:443, sid=8ccd6516 2fbe28e9
. 2017.10.13 00:03:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.13 00:03:36 - OpenVPN > VERIFY KU OK
. 2017.10.13 00:03:36 - OpenVPN > Validating certificate extended key usage
. 2017.10.13 00:03:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.13 00:03:36 - OpenVPN > VERIFY EKU OK
. 2017.10.13 00:03:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.13 00:03:37 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.13 00:03:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.4:443
. 2017.10.13 00:03:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
! 2017.10.13 00:03:38 - Disconnecting
. 2017.10.13 00:03:38 - Connection terminated.
I 2017.10.13 00:03:41 - Checking authorization ...
! 2017.10.13 00:03:41 - Connecting to Crater (Netherlands, Alblasserdam)
. 2017.10.13 00:03:41 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
. 2017.10.13 00:03:41 - OpenVPN > library versions: OpenSSL 1.1.0f  25 May 2017, LZO 2.10
. 2017.10.13 00:03:41 - Connection to OpenVPN Management Interface
. 2017.10.13 00:03:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.14:443
. 2017.10.13 00:03:41 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2017.10.13 00:03:41 - OpenVPN > UDP link local: (not bound)
. 2017.10.13 00:03:41 - OpenVPN > UDP link remote: [AF_INET]213.152.162.14:443
. 2017.10.13 00:03:41 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.14:443, sid=01fb8967 6413d3d5
. 2017.10.13 00:03:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.13 00:03:41 - OpenVPN > VERIFY KU OK
. 2017.10.13 00:03:41 - OpenVPN > Validating certificate extended key usage
. 2017.10.13 00:03:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.13 00:03:41 - OpenVPN > VERIFY EKU OK
. 2017.10.13 00:03:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Crater, emailAddress=info@airvpn.org
. 2017.10.13 00:03:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.13 00:03:41 - OpenVPN > [Crater] Peer Connection Initiated with [AF_INET]213.152.162.14:443
. 2017.10.13 00:03:42 - OpenVPN > SENT CONTROL [Crater]: 'PUSH_REQUEST' (status=1)
! 2017.10.13 00:03:42 - Disconnecting
. 2017.10.13 00:03:42 - Connection terminated.
I 2017.10.13 00:03:45 - Checking authorization ...
. 2017.10.13 00:04:06 - Above log line repeated 6 times more
I 2017.10.13 00:04:06 - Cancel requested.
! 2017.10.13 00:04:06 - Session terminated.

Share this post


Link to post

I had the same issue this morning. After trying it manually with OpenVPN I found out the last kernel update "broke" the tun device. After a reboot it worked again

Share this post


Link to post

I think I have the same issue, I'm going to send a ticket to support as well with logs. Is there any way to use Air VPN without Eddie?

Of course there is. Use vanilla OpenVPN/OpenVPN GUI on Windows, Viscosity, Securepoint SSL-VPN, Tunnelblick, etc.. How-tos are in the How-To section of the forums.

 

Sent via Tapatalk. Means, I don't have a computer available now.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...