Jump to content
Not connected, Your IP: 52.91.67.23

Search the Community

Showing results for tags 'key'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 2 results

  1. I use AirVPN on my desktop and my android phone (Galaxy S7). Everything has been fine for years. But now, all of a sudden, when I open the AirVPN client on my phone and press the config file to connect with, it comes up with an error saying "Need PKCS file encryption key, enter password for key." I have never been asked this before. The only thing that has changed recently that I can think of is that Verizon recently updated the phone's software. As far as I know I have never been asked for a password other than to log into my AirVPN account, and then probably only once. Would this key want my AirVPN username password, or something else? I don't think I ever made/used/recorded a password for this "PKCS key". What should I do? I'm unprotected! Thanks...
  2. Here's the log. It just cycles over and over again, never connecting. ___________________________________________________________________________________________________ I 2017.03.05 19:45:19 - DNS of a network adapter restored to original settings (Ralink RT5390R 802.11bgn Wi-Fi Adapter)I 2017.03.05 19:45:20 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2017.03.05 19:45:23 - Checking authorization ...! 2017.03.05 19:45:23 - Connecting to Gemma (Canada, Vancouver). 2017.03.05 19:45:24 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2017.03.05 19:45:24 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.03.05 19:45:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.03.05 19:45:24 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.03.05 19:45:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.03.05 19:45:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.03.05 19:45:25 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2017.03.05 19:45:25 - OpenVPN > UDPv4 link local: [undef]. 2017.03.05 19:45:25 - OpenVPN > UDPv4 link remote: [AF_INET]71.19.252.113:443. 2017.03.05 19:45:25 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=6b36d440 0ea641d4. 2017.03.05 19:45:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.03.05 19:45:25 - OpenVPN > Validating certificate key usage. 2017.03.05 19:45:25 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.03.05 19:45:25 - OpenVPN > VERIFY KU OK. 2017.03.05 19:45:25 - OpenVPN > Validating certificate extended key usage. 2017.03.05 19:45:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.03.05 19:45:25 - OpenVPN > VERIFY EKU OK. 2017.03.05 19:45:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2017.03.05 19:45:31 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.03.05 19:45:31 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.03.05 19:45:31 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.03.05 19:45:31 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.03.05 19:45:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.03.05 19:45:31 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443. 2017.03.05 19:45:33 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2017.03.05 19:45:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.37.190 255.255.0.0'. 2017.03.05 19:45:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.03.05 19:45:34 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.03.05 19:45:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.03.05 19:45:34 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.03.05 19:45:34 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.03.05 19:45:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.03.05 19:45:34 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.03.05 19:45:34 - OpenVPN > open_tun, tt->ipv6=0. 2017.03.05 19:45:34 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4DDBFCB8-FB95-4B51-AB55-F8E9B44F34EA}.tap. 2017.03.05 19:45:34 - OpenVPN > TAP-Windows Driver Version 9.21. 2017.03.05 19:45:34 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.37.190/255.255.0.0 [sUCCEEDED]. 2017.03.05 19:45:34 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.37.190/255.255.0.0 on interface {4DDBFCB8-FB95-4B51-AB55-F8E9B44F34EA} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2017.03.05 19:45:34 - OpenVPN > Successful ARP Flush on interface [6] {4DDBFCB8-FB95-4B51-AB55-F8E9B44F34EA}. 2017.03.05 19:45:39 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2017.03.05 19:45:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.113 MASK 255.255.255.255 192.168.1.1. 2017.03.05 19:45:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.03.05 19:45:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.03.05 19:45:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 4. 2017.03.05 19:45:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2017.03.05 19:45:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.03.05 19:45:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.03.05 19:45:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2017.03.05 19:45:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.03.05 19:45:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.03.05 19:45:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2017.03.05 19:45:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2017.03.05 19:45:39 - Starting Management Interface. 2017.03.05 19:45:39 - OpenVPN > Initialization Sequence CompletedI 2017.03.05 19:45:40 - DNS of a network adapter forced (Ralink RT5390R 802.11bgn Wi-Fi Adapter)I 2017.03.05 19:45:40 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2017.03.05 19:45:40 - Flushing DNSI 2017.03.05 19:45:41 - Checking routeW 2017.03.05 19:46:42 - The operation has timed out! 2017.03.05 19:46:42 - Disconnecting. 2017.03.05 19:46:42 - Management - Send 'signal SIGTERM'. 2017.03.05 19:46:42 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2017.03.05 19:46:42 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2017.03.05 19:46:42 - OpenVPN > SIGTERM received, sending exit notification to peer. 2017.03.05 19:46:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 71.19.252.113 MASK 255.255.255.255 192.168.1.1. 2017.03.05 19:46:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.03.05 19:46:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1. 2017.03.05 19:46:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.03.05 19:46:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.03.05 19:46:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.03.05 19:46:47 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2017.03.05 19:46:47 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2017.03.05 19:46:47 - OpenVPN > Closing TUN/TAP interface. 2017.03.05 19:46:47 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2017.03.05 19:46:47 - Connection terminated.
×
×
  • Create New...