Jump to content
Not connected, Your IP: 18.220.2.183
Sign in to follow this  
Asif

authentication failure

Recommended Posts

Just renewed my subscription, and now i cant connect to any of the servers as i get authentication failure.please help

Fri May 25 03:26:18 2012 OpenVPN 2.2.1 Win32-MSVC++ [sSL] [LZO2] built on Jul 1 2011

Fri May 25 03:26:18 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

Fri May 25 03:26:19 2012 LZO compression initialized

Fri May 25 03:26:19 2012 Control Channel MTU parms [ L:1590 D:138 EF:38 EB:0 ET:0 EL:0 ]

Fri May 25 03:26:19 2012 Socket Buffers: R=[8192->8192] S=[8192->8192]

Fri May 25 03:26:19 2012 Data Channel MTU parms [ L:1590 D:1300 EF:58 EB:135 ET:32 EL:0 AF:3/1 ]

Fri May 25 03:26:19 2012 Local Options hash (VER=V4): 'fd83fad0'

Fri May 25 03:26:19 2012 Expected Remote Options hash (VER=V4): '00a0a914'

Fri May 25 03:26:19 2012 UDPv4 link local: [undef]

Fri May 25 03:26:19 2012 UDPv4 link remote: 89.149.226.185:53

Fri May 25 03:26:19 2012 TLS: Initial packet from 89.149.226.185:53, sid=7786ab48 ee07fd27

Fri May 25 03:26:19 2012 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this

Fri May 25 03:26:25 2012 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

Fri May 25 03:26:25 2012 VERIFY OK: nsCertType=SERVER

Fri May 25 03:26:25 2012 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

Fri May 25 03:26:51 2012 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

Fri May 25 03:26:51 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

Fri May 25 03:26:51 2012 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

Fri May 25 03:26:51 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

Fri May 25 03:26:51 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

Fri May 25 03:26:51 2012 [server] Peer Connection Initiated with 89.149.226.185:53

Fri May 25 03:26:53 2012 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

Fri May 25 03:26:54 2012 AUTH: Received AUTH_FAILED control message

Fri May 25 03:26:54 2012 TCP/UDP: Closing socket

Fri May 25 03:26:54 2012 SIGUSR1[soft,auth-failure] received, process restarting

Fri May 25 03:26:54 2012 Restart pause, 10 second(s)

Fri May 25 03:27:04 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

Fri May 25 03:27:04 2012 Re-using SSL/TLS context

Fri May 25 03:27:04 2012 LZO compression initialized

Fri May 25 03:27:04 2012 Control Channel MTU parms [ L:1590 D:138 EF:38 EB:0 ET:0 EL:0 ]

Fri May 25 03:27:04 2012 Socket Buffers: R=[8192->8192] S=[8192->8192]

Fri May 25 03:27:04 2012 TCP/UDP: Preserving recently used remote address: 89.149.226.185:53

Fri May 25 03:27:04 2012 Data Channel MTU parms [ L:1590 D:1300 EF:58 EB:135 ET:32 EL:0 AF:3/1 ]

Fri May 25 03:27:04 2012 Local Options hash (VER=V4): 'fd83fad0'

Fri May 25 03:27:04 2012 Expected Remote Options hash (VER=V4): '00a0a914'

Fri May 25 03:27:04 2012 UDPv4 link local: [undef]

Fri May 25 03:27:04 2012 UDPv4 link remote: 89.149.226.185:53

Fri May 25 03:27:05 2012 TLS: Initial packet from 89.149.226.185:53, sid=d22e8386 909fec66

Fri May 25 03:27:08 2012 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

Fri May 25 03:27:08 2012 VERIFY OK: nsCertType=SERVER

Fri May 25 03:27:08 2012 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

Fri May 25 03:27:21 2012 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

Fri May 25 03:27:21 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

Fri May 25 03:27:21 2012 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

Fri May 25 03:27:21 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

Fri May 25 03:27:21 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

Fri May 25 03:27:21 2012 [server] Peer Connection Initiated with 89.149.226.185:53

Fri May 25 03:27:23 2012 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

Fri May 25 03:27:24 2012 AUTH: Received AUTH_FAILED control message

Fri May 25 03:27:24 2012 TCP/UDP: Closing socket

Fri May 25 03:27:24 2012 SIGUSR1[soft,auth-failure] received, process restarting

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...