jasonc 0 Posted ... I'm running into a problem today where the only servers that accept my authentication are in the US. every other server gives me the following message using openvpn as my client on windows 7 x64 Sun Aug 26 10:45:57 2012 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Sun Aug 26 10:45:57 2012 AUTH: Received AUTH_FAILED control message Sun Aug 26 10:45:57 2012 TCP/UDP: Closing socket I'm using the generator to create my ovpn configs and I can auth to all 3 US servers without issue. Quote Share this post Link to post
Staff 9972 Posted ... I'm running into a problem today where the only servers that accept my authentication are in the US. every other server gives me the following message using openvpn as my client on windows 7 x64Sun Aug 26 10:45:57 2012 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)Sun Aug 26 10:45:57 2012 AUTH: Received AUTH_FAILED control messageSun Aug 26 10:45:57 2012 TCP/UDP: Closing socketI'm using the generator to create my ovpn configs and I can auth to all 3 US servers without issue.Hello!That's bizarre, to say the least. Can you please publish the complete log? We'll look into the issue immediately.Kind regards Quote Share this post Link to post
Staff 9972 Posted ... @jasonc Hello! We have just checked that your account is authorized to access all the servers and we don't detect any problem with it. Please note that an account can connect only to one server at the same time. You can switch servers as many times as you wish, but you can't be connected to two or more servers simultaneously. Please do not hesitate to contact us for any further support. Kind regards Quote Share this post Link to post
jasonc 0 Posted ... Wow, that was very fast response! It just cleared up about an hour ago, but this is an example of what I was receiving from every non us server for about 24 hours. Usually with several hours between attempts until when I posted this thread. Sun Aug 26 10:42:33 2012 OpenVPN 2.2.0 i686-pc-mingw32 [sSL] [LZO2] [PKCS11] [iPv6 payload 20110521-1 (2.2.0)] built on May 21 2011 Enter Management Password: Sun Aug 26 10:42:33 2012 MANAGEMENT: TCP Socket listening on 127.0.0.10:25347 Sun Aug 26 10:42:33 2012 Need hold release from management interface, waiting... Sun Aug 26 10:42:34 2012 MANAGEMENT: Client connected from 127.0.0.10:25347 Sun Aug 26 10:42:34 2012 MANAGEMENT: CMD 'state on' Sun Aug 26 10:42:34 2012 MANAGEMENT: CMD 'log all on' Sun Aug 26 10:42:34 2012 MANAGEMENT: CMD 'hold off' Sun Aug 26 10:42:34 2012 MANAGEMENT: CMD 'hold release' Sun Aug 26 10:42:34 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables Sun Aug 26 10:42:34 2012 LZO compression initialized Sun Aug 26 10:42:34 2012 Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ] Sun Aug 26 10:42:34 2012 Socket Buffers: R=[8192->8192] S=[8192->8192] Sun Aug 26 10:42:34 2012 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ] Sun Aug 26 10:42:34 2012 Local Options hash (VER=V4): '22188c5b' Sun Aug 26 10:42:34 2012 Expected Remote Options hash (VER=V4): 'a8f55717' Sun Aug 26 10:42:34 2012 UDPv4 link local: [undef] Sun Aug 26 10:42:34 2012 UDPv4 link remote: 62.212.85.65:53 Sun Aug 26 10:42:34 2012 MANAGEMENT: >STATE:1345995754,WAIT,,, Sun Aug 26 10:42:34 2012 MANAGEMENT: >STATE:1345995754,AUTH,,, Sun Aug 26 10:42:34 2012 TLS: Initial packet from 62.212.85.65:53, sid=c1a8812e 08646970 Sun Aug 26 10:42:35 2012 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org Sun Aug 26 10:42:35 2012 VERIFY OK: nsCertType=SERVER Sun Aug 26 10:42:35 2012 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org Sun Aug 26 10:42:37 2012 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Aug 26 10:42:37 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Sun Aug 26 10:42:37 2012 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Aug 26 10:42:37 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Sun Aug 26 10:42:37 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA Sun Aug 26 10:42:37 2012 [server] Peer Connection Initiated with 62.212.85.65:53 Sun Aug 26 10:42:39 2012 MANAGEMENT: >STATE:1345995759,GET_CONFIG,,, Sun Aug 26 10:42:40 2012 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Sun Aug 26 10:42:40 2012 AUTH: Received AUTH_FAILED control message Sun Aug 26 10:42:40 2012 TCP/UDP: Closing socket Sun Aug 26 10:42:40 2012 SIGUSR1[soft,auth-failure] received, process restarting Sun Aug 26 10:42:40 2012 MANAGEMENT: >STATE:1345995760,RECONNECTING,auth-failure,, Sun Aug 26 10:42:40 2012 Restart pause, 2 second(s) Sun Aug 26 10:42:42 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables Sun Aug 26 10:42:42 2012 LZO compression initialized Sun Aug 26 10:42:42 2012 Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ] Sun Aug 26 10:42:42 2012 Socket Buffers: R=[8192->8192] S=[8192->8192] Sun Aug 26 10:42:42 2012 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ] Sun Aug 26 10:42:42 2012 Local Options hash (VER=V4): '22188c5b' Sun Aug 26 10:42:42 2012 Expected Remote Options hash (VER=V4): 'a8f55717' Sun Aug 26 10:42:42 2012 UDPv4 link local: [undef] Sun Aug 26 10:42:42 2012 UDPv4 link remote: 62.212.85.65:53 Sun Aug 26 10:42:42 2012 MANAGEMENT: >STATE:1345995762,WAIT,,, Sun Aug 26 10:42:42 2012 MANAGEMENT: >STATE:1345995762,AUTH,,, Sun Aug 26 10:42:42 2012 TLS: Initial packet from 62.212.85.65:53, sid=52e7db96 c4e3fb0d Sun Aug 26 10:42:43 2012 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org Sun Aug 26 10:42:43 2012 VERIFY OK: nsCertType=SERVER Sun Aug 26 10:42:43 2012 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org Sun Aug 26 10:42:45 2012 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Aug 26 10:42:45 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Sun Aug 26 10:42:45 2012 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Aug 26 10:42:45 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Sun Aug 26 10:42:45 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA Sun Aug 26 10:42:45 2012 [server] Peer Connection Initiated with 62.212.85.65:53 Sun Aug 26 10:42:46 2012 MANAGEMENT: >STATE:1345995766,GET_CONFIG,,, Sun Aug 26 10:42:48 2012 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Sun Aug 26 10:42:48 2012 AUTH: Received AUTH_FAILED control message Sun Aug 26 10:42:48 2012 TCP/UDP: Closing socket Sun Aug 26 10:42:48 2012 SIGUSR1[soft,auth-failure] received, process restarting Sun Aug 26 10:42:48 2012 MANAGEMENT: >STATE:1345995768,RECONNECTING,auth-failure,, Sun Aug 26 10:42:48 2012 Restart pause, 2 second(s) Sun Aug 26 10:42:48 2012 MANAGEMENT: CMD 'auth-retry none' Sun Aug 26 10:42:50 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables Sun Aug 26 10:42:50 2012 LZO compression initialized Sun Aug 26 10:42:50 2012 Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ] Sun Aug 26 10:42:50 2012 Socket Buffers: R=[8192->8192] S=[8192->8192] Sun Aug 26 10:42:50 2012 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ] Sun Aug 26 10:42:50 2012 Local Options hash (VER=V4): '22188c5b' Sun Aug 26 10:42:50 2012 Expected Remote Options hash (VER=V4): 'a8f55717' Sun Aug 26 10:42:50 2012 UDPv4 link local: [undef] Sun Aug 26 10:42:50 2012 UDPv4 link remote: 62.212.85.65:53 Sun Aug 26 10:42:50 2012 MANAGEMENT: >STATE:1345995770,WAIT,,, Sun Aug 26 10:42:50 2012 MANAGEMENT: >STATE:1345995770,AUTH,,, Sun Aug 26 10:42:50 2012 TLS: Initial packet from 62.212.85.65:53, sid=f945adfa 61f7678b Sun Aug 26 10:42:50 2012 SIGTERM received, sending exit notification to peer Sun Aug 26 10:42:51 2012 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org Sun Aug 26 10:42:51 2012 VERIFY OK: nsCertType=SERVER Sun Aug 26 10:42:51 2012 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org Sun Aug 26 10:42:53 2012 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Aug 26 10:42:53 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Sun Aug 26 10:42:53 2012 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Aug 26 10:42:53 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Sun Aug 26 10:42:53 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA Sun Aug 26 10:42:53 2012 [server] Peer Connection Initiated with 62.212.85.65:53 Sun Aug 26 10:42:54 2012 MANAGEMENT: >STATE:1345995774,GET_CONFIG,,, Sun Aug 26 10:42:55 2012 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Sun Aug 26 10:42:55 2012 TCP/UDP: Closing socket Sun Aug 26 10:42:55 2012 SIGTERM[soft,exit-with-notification] received, process exiting Sun Aug 26 10:42:55 2012 MANAGEMENT: >STATE:1345995775,EXITING,exit-with-notification,, Thanks! Quote Share this post Link to post
Staff 9972 Posted ... Hello! We're glad to know that the problem is solved. Please do not hesitate to warn us if the problem occurs again, so that we can check to understand what really happens. Kind regards Quote Share this post Link to post