mo3u8se 0 Posted ... It doesn't matter if I use the AirVpn client or the OpenVpn thing. I can connect. For the airvpn client I can login but when I chose a server it just says failed to start. OR The AirVpn client says that I'm already connected which I am not. If I use the OpenVpn way it says that It has failed to start. Here is a log. Thu Sep 27 16:23:45 2012 OpenVPN 2.2.2 Win32-MSVC++ [sSL] [LZO2] [PKCS11] built on Dec 15 2011 Thu Sep 27 16:23:45 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables Thu Sep 27 16:23:45 2012 LZO compression initialized Thu Sep 27 16:23:45 2012 Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ] Thu Sep 27 16:23:45 2012 Socket Buffers: R=[8192->8192] S=[8192->8192] Thu Sep 27 16:23:45 2012 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ] Thu Sep 27 16:23:45 2012 Local Options hash (VER=V4): '22188c5b' Thu Sep 27 16:23:45 2012 Expected Remote Options hash (VER=V4): 'a8f55717' Thu Sep 27 16:23:45 2012 UDPv4 link local: [undef] Thu Sep 27 16:23:45 2012 UDPv4 link remote: 198.15.111.162:443 Thu Sep 27 16:23:45 2012 TLS: Initial packet from 198.15.111.162:443, sid=533a8363 4e5378ef Thu Sep 27 16:23:46 2012 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org Thu Sep 27 16:23:46 2012 VERIFY OK: nsCertType=SERVER Thu Sep 27 16:23:46 2012 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org Thu Sep 27 16:23:47 2012 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Thu Sep 27 16:23:47 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Sep 27 16:23:47 2012 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Thu Sep 27 16:23:47 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Sep 27 16:23:47 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA Thu Sep 27 16:23:47 2012 [server] Peer Connection Initiated with 198.15.111.162:443 Thu Sep 27 16:23:50 2012 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Thu Sep 27 16:23:50 2012 AUTH: Received AUTH_FAILED control message Thu Sep 27 16:23:50 2012 SIGTERM received, sending exit notification to peer Thu Sep 27 16:23:55 2012 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Thu Sep 27 16:23:55 2012 TCP/UDP: Closing socket Thu Sep 27 16:23:55 2012 SIGTERM[soft,exit-with-notification] received, process exiting Thu Sep 27 16:23:56 2012 OpenVPN 2.2.2 Win32-MSVC++ [sSL] [LZO2] [PKCS11] built on Dec 15 2011 Thu Sep 27 16:23:56 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables Thu Sep 27 16:23:56 2012 LZO compression initialized Thu Sep 27 16:23:56 2012 Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ] Thu Sep 27 16:23:56 2012 Socket Buffers: R=[8192->8192] S=[8192->8192] Thu Sep 27 16:23:56 2012 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ] Thu Sep 27 16:23:56 2012 Local Options hash (VER=V4): '22188c5b' Thu Sep 27 16:23:56 2012 Expected Remote Options hash (VER=V4): 'a8f55717' Thu Sep 27 16:23:56 2012 UDPv4 link local: [undef] Thu Sep 27 16:23:56 2012 UDPv4 link remote: 198.15.111.162:443 Thu Sep 27 16:23:56 2012 TLS: Initial packet from 198.15.111.162:443, sid=27eab97c 6b3ec682 Thu Sep 27 16:23:57 2012 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org Thu Sep 27 16:23:57 2012 VERIFY OK: nsCertType=SERVER Thu Sep 27 16:23:57 2012 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org Thu Sep 27 16:23:59 2012 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Thu Sep 27 16:23:59 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Sep 27 16:23:59 2012 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Thu Sep 27 16:23:59 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Sep 27 16:23:59 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA Thu Sep 27 16:23:59 2012 [server] Peer Connection Initiated with 198.15.111.162:443 Thu Sep 27 16:24:01 2012 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Thu Sep 27 16:24:06 2012 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Thu Sep 27 16:24:08 2012 AUTH: Received AUTH_FAILED control message Thu Sep 27 16:24:08 2012 SIGTERM received, sending exit notification to peer Thu Sep 27 16:24:08 2012 AUTH: Received AUTH_FAILED control message Thu Sep 27 16:24:08 2012 TCP/UDP: Closing socket Thu Sep 27 16:24:08 2012 SIGTERM[soft,auth-failure] received, process exiting This has been happening on an off for like a month. Please help/fix this. Quote Share this post Link to post
Staff 9972 Posted ... Hello! We have checked that your account is allowed to access all the VPN servers. Can you please enable your statitistics (in your "Member Area"->"Settings") in order to help troubleshooting? On your control panel you will also find useful information about the reasons for which your last connection attempt failed. Also, please try connections on a TCP port in order to check whether the problem is solved. About the Air client problem, can you please send us the logs? Kind regards Quote Share this post Link to post