Jump to content
Not connected, Your IP: 3.91.106.223
randomhash

Eddie fails to connect to server and continuously retries

Recommended Posts

Hello, I'm using Arch Linux. I installed eddie from the AUR repositories and have tried the official release to the same effect. I log in and try to connect to a server. This is the output for both clients. Any idea what's causing the issue?

I 2017.10.13 00:03:20 - OpenVPN Driver - Found, /dev/net/tun
I 2017.10.13 00:03:20 - OpenVPN - Version: 2.4.4 - OpenSSL 1.1.0f  25 May 2017, LZO 2.10 (/usr/bin/openvpn)
I 2017.10.13 00:03:20 - SSH - Version: OpenSSH_7.6p1, OpenSSL 1.1.0f  25 May 2017 (/usr/bin/ssh)
I 2017.10.13 00:03:20 - SSL - Version: stunnel 5.42 (/usr/bin/stunnel)
I 2017.10.13 00:03:20 - curl - Version: 7.56.0 (/usr/bin/curl)
I 2017.10.13 00:03:20 - Certification Authorities: /usr/share/AirVPN/cacert.pem
. 2017.10.13 00:03:20 - Updating systems & servers data ...
! 2017.10.13 00:03:20 - Ready
. 2017.10.13 00:03:21 - Systems & servers data update completed
I 2017.10.13 00:03:31 - Session starting.
I 2017.10.13 00:03:31 - Checking authorization ...
! 2017.10.13 00:03:31 - Connecting to Fornax (Bulgaria, Sofia)
. 2017.10.13 00:03:31 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
. 2017.10.13 00:03:31 - OpenVPN > library versions: OpenSSL 1.1.0f  25 May 2017, LZO 2.10
. 2017.10.13 00:03:31 - Connection to OpenVPN Management Interface
. 2017.10.13 00:03:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]93.123.73.113:443
. 2017.10.13 00:03:31 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2017.10.13 00:03:31 - OpenVPN > UDP link local: (not bound)
. 2017.10.13 00:03:31 - OpenVPN > UDP link remote: [AF_INET]93.123.73.113:443
. 2017.10.13 00:03:31 - OpenVPN > TLS: Initial packet from [AF_INET]93.123.73.113:443, sid=5e2226af 3c6a2d05
. 2017.10.13 00:03:32 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.13 00:03:32 - OpenVPN > VERIFY KU OK
. 2017.10.13 00:03:32 - OpenVPN > Validating certificate extended key usage
. 2017.10.13 00:03:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.13 00:03:32 - OpenVPN > VERIFY EKU OK
. 2017.10.13 00:03:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fornax, emailAddress=info@airvpn.org
. 2017.10.13 00:03:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.13 00:03:32 - OpenVPN > [Fornax] Peer Connection Initiated with [AF_INET]93.123.73.113:443
. 2017.10.13 00:03:33 - OpenVPN > SENT CONTROL [Fornax]: 'PUSH_REQUEST' (status=1)
! 2017.10.13 00:03:33 - Disconnecting
. 2017.10.13 00:03:33 - Connection terminated.
I 2017.10.13 00:03:36 - Checking authorization ...
! 2017.10.13 00:03:36 - Connecting to Alphecca (Netherlands, Alblasserdam)
. 2017.10.13 00:03:36 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
. 2017.10.13 00:03:36 - OpenVPN > library versions: OpenSSL 1.1.0f  25 May 2017, LZO 2.10
. 2017.10.13 00:03:36 - Connection to OpenVPN Management Interface
. 2017.10.13 00:03:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.4:443
. 2017.10.13 00:03:36 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2017.10.13 00:03:36 - OpenVPN > UDP link local: (not bound)
. 2017.10.13 00:03:36 - OpenVPN > UDP link remote: [AF_INET]109.202.107.4:443
. 2017.10.13 00:03:36 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.4:443, sid=8ccd6516 2fbe28e9
. 2017.10.13 00:03:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.13 00:03:36 - OpenVPN > VERIFY KU OK
. 2017.10.13 00:03:36 - OpenVPN > Validating certificate extended key usage
. 2017.10.13 00:03:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.13 00:03:36 - OpenVPN > VERIFY EKU OK
. 2017.10.13 00:03:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.13 00:03:37 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.13 00:03:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.4:443
. 2017.10.13 00:03:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
! 2017.10.13 00:03:38 - Disconnecting
. 2017.10.13 00:03:38 - Connection terminated.
I 2017.10.13 00:03:41 - Checking authorization ...
! 2017.10.13 00:03:41 - Connecting to Crater (Netherlands, Alblasserdam)
. 2017.10.13 00:03:41 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
. 2017.10.13 00:03:41 - OpenVPN > library versions: OpenSSL 1.1.0f  25 May 2017, LZO 2.10
. 2017.10.13 00:03:41 - Connection to OpenVPN Management Interface
. 2017.10.13 00:03:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.14:443
. 2017.10.13 00:03:41 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2017.10.13 00:03:41 - OpenVPN > UDP link local: (not bound)
. 2017.10.13 00:03:41 - OpenVPN > UDP link remote: [AF_INET]213.152.162.14:443
. 2017.10.13 00:03:41 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.14:443, sid=01fb8967 6413d3d5
. 2017.10.13 00:03:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.13 00:03:41 - OpenVPN > VERIFY KU OK
. 2017.10.13 00:03:41 - OpenVPN > Validating certificate extended key usage
. 2017.10.13 00:03:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.13 00:03:41 - OpenVPN > VERIFY EKU OK
. 2017.10.13 00:03:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Crater, emailAddress=info@airvpn.org
. 2017.10.13 00:03:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.13 00:03:41 - OpenVPN > [Crater] Peer Connection Initiated with [AF_INET]213.152.162.14:443
. 2017.10.13 00:03:42 - OpenVPN > SENT CONTROL [Crater]: 'PUSH_REQUEST' (status=1)
! 2017.10.13 00:03:42 - Disconnecting
. 2017.10.13 00:03:42 - Connection terminated.
I 2017.10.13 00:03:45 - Checking authorization ...
. 2017.10.13 00:04:06 - Above log line repeated 6 times more
I 2017.10.13 00:04:06 - Cancel requested.
! 2017.10.13 00:04:06 - Session terminated.

Share this post


Link to post

I had the same issue this morning. After trying it manually with OpenVPN I found out the last kernel update "broke" the tun device. After a reboot it worked again

Share this post


Link to post

I think I have the same issue, I'm going to send a ticket to support as well with logs. Is there any way to use Air VPN without Eddie?

Of course there is. Use vanilla OpenVPN/OpenVPN GUI on Windows, Viscosity, Securepoint SSL-VPN, Tunnelblick, etc.. How-tos are in the How-To section of the forums.

 

Sent via Tapatalk. Means, I don't have a computer available now.


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...