Bishen 0 Posted ... I just bought Xiaomi AI from China, which is a Chinese version of Amazon Alexia. I’m based in London, my iPhone 6 doesn’t connect it by Bluetooth initially. After using Airvpn in Hong Kong the phone connects the AI system by Bluetooth but not WiFi. I wonder if it’s because the server in Hong Kong is blocked by China or I missed something. Any help is highly appreciated. The log for the connection, which is fine, is attached. Hi 2018-09-02 13:50:09 1 2018-09-02 13:50:09 ----- OpenVPN Start -----OpenVPN core 3.2 ios arm64 64-bit PT_PROXY built on Aug 17 2018 09:49:39 2018-09-02 13:50:09 Frame=512/2048/512 mssfix-ctrl=1250 2018-09-02 13:50:09 UNUSED OPTIONS3 [resolv-retry] [infinite] 4 [nobind] 5 [persist-key] 6 [persist-tun] 7 [auth-nocache] 8 [verb] [3] 9 [explicit-exit-notify] [5] 2018-09-02 13:50:09 EVENT: RESOLVE 2018-09-02 13:50:09 Contacting [103.10.197.186]:443/UDP via UDP 2018-09-02 13:50:09 EVENT: WAIT 2018-09-02 13:50:09 Connecting to [hk.vpn.airdns.org]:443 (103.10.197.186) via UDPv4 2018-09-02 13:50:10 EVENT: CONNECTING 2018-09-02 13:50:10 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client 2018-09-02 13:50:10 Creds: UsernameEmpty/PasswordEmpty 2018-09-02 13:50:10 Peer Info:IV_GUI_VER=net.openvpn.connect.ios 3.0.0-712IV_VER=3.2IV_PLAT=iosIV_NCP=2IV_TCPNL=1IV_PROTO=2IV_LZO=1IV_LZO_SWAP=1IV_LZ4=1IV_LZ4v2=1IV_COMP_STUB=1IV_COMP_STUBv2=1IV_AUTO_SESS=1 2018-09-02 13:50:10 VERIFY OK : depth=1cert. version : 3serial number : 8C:D8:43:EF:E4:5F:20:03issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.orgsubject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.orgissued on : 2014-04-11 10:15:45expires on : 2024-04-08 10:15:45signed using : RSA with SHA1RSA key size : 4096 bitsbasic constraints : CA=true 2018-09-02 13:50:10 VERIFY OK : depth=0cert. version : 3serial number : 5Bissuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.orgsubject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.orgissued on : 2014-05-07 11:06:02expires on : 2024-05-04 11:06:02signed using : RSA with SHA1RSA key size : 4096 bitsbasic constraints : CA=falsecert. type : SSL Serverkey usage : Digital Signature, Key Enciphermentext key usage : TLS Web Server Authentication 2018-09-02 13:50:12 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 2018-09-02 13:50:12 Session is ACTIVE 2018-09-02 13:50:12 EVENT: GET_CONFIG 2018-09-02 13:50:12 Sending PUSH_REQUEST to server... 2018-09-02 13:50:13 Sending PUSH_REQUEST to server... 2018-09-02 13:50:13 OPTIONS:0 [comp-lzo] [no] 1 [redirect-gateway] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.18.64.1] 3 [route-gateway] [10.18.64.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.18.64.134] [255.255.255.0] 8 [peer-id] [0] 9 [cipher] [AES-256-GCM] 2018-09-02 13:50:13 PROTOCOL OPTIONS: cipher: AES-256-GCM digest: SHA1 compress: LZO_STUB peer ID: 0 2018-09-02 13:50:13 EVENT: ASSIGN_IP 2018-09-02 13:50:13 NIP: preparing TUN network settings 2018-09-02 13:50:13 NIP: init TUN network settings with endpoint: 103.10.197.186 2018-09-02 13:50:13 NIP: adding IPv4 address to network settings 10.18.64.134/255.255.255.0 2018-09-02 13:50:13 NIP: adding (included) IPv4 route 10.18.64.0/24 2018-09-02 13:50:13 NIP: redirecting all IPv4 traffic to TUN interface 2018-09-02 13:50:13 NIP: adding DNS 10.18.64.1 2018-09-02 13:50:13 Connected via NetworkExtensionTUN 2018-09-02 13:50:13 LZO-ASYM init swap=0 asym=1 2018-09-02 13:50:13 Comp-stub init swap=0 2018-09-02 13:50:13 EVENT: CONNECTED hk.vpn.airdns.org:443 (103.10.197.186) via /UDPv4 on NetworkExtensionTUN/10.18.64.134/ gw=[/] Quote Share this post Link to post
Staff 9972 Posted ... Hello! Please try the following connection mode (you can see it in the Configuration Generator after you have ticked "Advanced Mode"); - entry-IP 3- protocol TCP- port 443 Connections to entry-IP address 3 will enable "tls-crypt" which is effective in bypassing the OpenVPN general block in China and other countries. TCP will get rid of UDP blocks, if any. Kind regards Quote Share this post Link to post