Jump to content
Not connected, Your IP: 3.135.208.236

Search the Community

Showing results for tags 'CHINA'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 22 results

  1. Currently lifted for the time being, nothing to see here.
  2. Since it is not very easy to use a VPN from countries like Iran a recorded a tutorial on how to use airvpn from these countries: https://usefulvid.com/bypass-the-persian-and-chinese-firewall-by-using-airvpn-with-ssl/ The videos are hosted on my website and on youtube. The reason is that it is not possible to access youtube from Iran. https://youtu.be/jl8I2-GQF94 It would be nice if you could share this with your friends in Iran, China, Turkey, Russia, UAE, Saudi Arabia and provide feedback if this method works. You can also download this video from my website to make it easier to share and spread the word. A video on how to use stunnel on android will follow and also published on this site. Update on 6.1.2018: The Video for Android is finally published: https://www.youtube.com/watch?v=zwf5JI6t0TI For all who suffer from youtube censorship this is the link for you: https://usefulvid.com/bypass-the-persian-and-chinese-firewall-by-using-airvpn-with-ssl/ Second Video on the page
  3. I just now saw a post in my Telegram newsfeed which had this to say: VPNs targeted, throttled - Gov Jan6 Patriot witch-hunt? https://youtu.be/38za1LYj2XQ Here is the info undeneath the actual YOUTUBE video: HOW can ANYONE "throttle" VPN traffic if it is encrypted? unless they watch a certain port all the time??? And AirVPN lets us pick our own ports or sets apart isolated ports for us.... Why is this even happening?!
  4. Hello everybody, first of all, I love AirVPN, and I will continue to use it. It works perfectly 99,9% of the times. But for these 00,1% I need a good alternative. I am living in China. I need a good VPN for China. Price isn’t important. It would be nice to run on Android and Windows and have a similar excellent policy like AirVPN. Does anybody have a suggestion? (and be sure that it works in China in the year 2018). Thank you very much for your help!
  5. Hey Guys, since yesterday all airVPN servers in Beijing (China) are down. I'm subscribed to two VPN providers and right now only 2 servers are working, none from airVPN. All servers went offline at the same time. Can't connect through my phone either. Just me? Thanks for quick responses!
  6. Hi, when, if ever will there be more Japan servers? (Question to staff) At least another one would be nice. It's the ONLY server which gives a good latency when connecting from China. For example, the Japan based Iskandar server can achieve 79ms whereas all the others start at 190ms + when connecting from China. Can other China users verify this is the case for them, too? (All China users reading this please comment about your latency!....)
  7. hello, i am using linux version of airvpn (ubuntu, x64) and it doesnt work in china. i was trying to fix it myself checking the forum. someone recommended to use IP addresses 3 and 4 tls-crypt which is not avalible in my version. how can we the problem be solved?
  8. hi I found that AirVPN does not work in china from last week,may be blocked by "The Great Wall",would u fix it pls? thank u very much
  9. Hey guys, just thought I'd provide some detail of my experiences using Airvpn in mainland China. Disclaimer: I'm in IT Platform: Nexus 6P, Oreo 8.1 April security patch, *not* rooted Client: OpenVPN for Android Location: Nanning, Guangxi I was last in mainland China in Oct 2017. We visited Guangxi and Guangdong, and I was forced to use the Hong Kong UDP-Altentry as nothing else worked. This was quite unreliable and whilst some places we visited were remote and rural, they still had good broadband speed for the locals. This time around everything works. Everything in the screenshot. I find that strange. The Chinese government officially cracked down *more" in Feb 2018, so why would these now all work? One thing I have noticed is in one hotel, only Hong Kong UDP-Altentry would work. This was sometimes the case in public free WiFi hotspots also. Everyone in IT security knows that layers are important, so I can only assume that large enough public WiFi (large hotel chains etc.) are required by law to have a level of filtering (perhaps dropping all UDP on 80 and 443, as sometimes only TCP would work) Presumably the Chinese government may look at forums like these in order to bolster their security, but perhaps they have relaxed VPN access in order to "catch" more nationals in the act. A friend lent us a SIM card, which is China Telecom and not only is the LTE *fast*, but again, all VPN tunnels in the screenshot here worked. Perhaps OpemVPN have upgraded their termination points, but either way this is both good and worrying news. On the plus side, there's no need for me to consider an alternative (nonsense chameleon marketing aside), and the speed is just as good as I've experienced when at home. On the down side, I'm convinced they are monitoring in order to create more filtering policies to block VPNs by allowing them to run more freely. I hope the cynic in me is wrong.
  10. Hello all, I am not an IT expert at all and honestly I'm confused in terminology related to vpns. I live in Germany and soon moving to China. I would like to take with me a router and get a good VPN and hopefully setup the routeur There to have it always connected to this vpn. I don't know the names or terminology about what to do to reach this result. 1) does most of recent routers can do that ? (Asus for example ?). Maybe I need to upload a file to the router from the VPN supplier. 2) which vpn could work ? Airvpn? Cyberghost? Torguard ? I plan to do all the setup here in Germany before leaving cause all is so much more complicated in China (tell me about getting an Android phone there during my last trip and get the google play store to work, was horrible !). If any of you know a combination router + VPN with a good tutorial how to set it up.. I'd be very appreciative!! Thanks in advance !
  11. I am planning a two to three month visit to China. I am interested in hearing any recent reports about using airvpn in China. Are there any difficulties, any suggestions, any advice? If anyone knows something that I should know, please let me know! If you know what I mean.
  12. Hi there, Currently, i am living in China now. I have been using airvpn for about one month. Everthing works perfectly except Asian-TCP-443. But today , just now, im facing connection issue on all servers including America, Europe and Asian(both TCP and UDP ports). Therefore i have to use my backup vpn to get access to this site. Any help to solve this problem would be appreciated. Thanks.
  13. Hello, I'm unable to resolve chinese domains via the airvpn internal DNS server and also unable to connect to websites hosted in China. For example: no resolve: baidu.com qq.com 360totalsecurity.com no connection: alipay.com 360.cn tmall.com This is only a small list, I have the feeling that it affects almost every chinese hosted website / domain. I tested it on the Dutch and Swiss servers, both have the same results. Are AirVPN's ips blocked by the Great Firewall of China so that you cannot even connect to chinese websites? Is it possible for you guys to reroute chinese traffic via an internal server?
  14. Staff

    China

    "airvpn.org" blocked (DNS poisoning) Solution: hosts file edit OpenVPN connections are frequently disrupted (reported in Shangai and Beijing) Solution: OpenVPN over SSL works just fine UNCONFIRMED: momentary blocks of Internet domestic lines if a high percentage of encrypted traffic is detected
  15. Hello All, Do you have any suggestions for somewhat-reliable connection to AirVPN servers using iOS devices in China? I ask this because OpenVPN connections over land-based ISPs barely work here without an SSL tunnel. Connection to servers using SSL tunneling through Eddie works great... but that's only for Linux/MacOS/Windows. Here are the ideas I have so far; can you please add if you have any suggestions? 1. Connections over cell service are much more reliable than land-based ISPs. The downside here is that I have to use my data plan, and doesn't work with my Wifi-only iPad. 2. I could hardwire a laptop to my router then try to share my connection through wifi with my iOS devices once the SSL tunnel is established. Has anyone tried this? This of course would only work when I'm at home. That's all I can think of. Any ideas? Thanks!
  16. Hi, Is there any development going on to enable SSH or SSL tunnels on Android to avoid DPI in China? Some other providers already have this service on Android. Thanks,
  17. One user descriped a way how to bypass the great firewall in china: https://airvpn.org/topic/11134-ssh-or-ssl-tunnel-on-android/?p=21319 Why isn't android supported officially? If the devs decide to support this I will make an video which would explain this feature and how to install it.
  18. I know that it is easy to use airvpn from china with an ssl tunnel works fine with Eddie. But there is still one problem: Lets say you are in wuhan, the next available server is Hongkong. The distance is very far, wouldn't it be possible to get nearer server locations in this reigion (japan / south korea / taiwan)?
  19. Hi all, Torvpn is able to make stealth profiles for android that work in China. Any possibility to have this for Airvpn? See examples below for both TCP and UDP for one of their servers in the Netherlands client dev tun proto tcp nobind remote-random remote 89.248.172.172 443 ca ca.crt auth-user-pass remote-cert-tls server cipher AES-256-CBC resolv-retry 5 tun-mtu 1500 tun-mtu-extra 32 mssfix 1450 route-delay 5 30 ping-restart 0 persist-key persist-tun comp-lzo mute-replay-warnings client dev tun proto udp nobind remote-random remote 89.248.172.172 53 ca ca.crt auth-user-pass remote-cert-tls server cipher AES-256-CBC resolv-retry 5 tun-mtu 1500 tun-mtu-extra 32 mssfix 1450 route-delay 5 30 ping-restart 0 persist-key persist-tun comp-lzo mute-replay-warnings fast-io
  20. Hello, I bought AirVPN to mainly use it in China and well... it doesn't work :/ I'm gonna travel for 6 months in China and i'm currently in Guilin (south of China). I'm using AirVPN client on MacOSX 10.9.4 and sometimes it works but mainly it don't. This is the logs : I 2014.09.14 12:21:54 - Session starting. ! 2014.09.14 12:21:54 - Checking environment ! 2014.09.14 12:21:54 - Checking authorization . 2014.09.14 12:21:55 - Error getting response stream (ReadDone1): ReceiveFailure . 2014.09.14 12:21:55 - Error getting response stream (ReadDone1): ReceiveFailure . 2014.09.14 12:22:05 - The request timed out ! 2014.09.14 12:22:06 - Connecting to Electra (United States, Manassas, Virginia) . 2014.09.14 12:22:06 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014 . 2014.09.14 12:22:06 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.14 12:22:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.14 12:22:06 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.14 12:22:06 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 12:22:06 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 12:22:06 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 12:22:06 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 12:22:06 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.225:443 . 2014.09.14 12:22:06 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.225:443, sid=96fcccd4 c989704f . 2014.09.14 12:22:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.14 12:22:08 - OpenVPN > Validating certificate key usage . 2014.09.14 12:22:08 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.14 12:22:08 - OpenVPN > VERIFY KU OK . 2014.09.14 12:22:08 - OpenVPN > Validating certificate extended key usage . 2014.09.14 12:22:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.14 12:22:08 - OpenVPN > VERIFY EKU OK . 2014.09.14 12:22:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.14 12:22:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.14 12:22:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 12:22:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.14 12:22:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 12:22:15 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.09.14 12:22:15 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.115.117.225:443 . 2014.09.14 12:22:17 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 12:22:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.65.250 10.4.65.249' . 2014.09.14 12:22:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2014.09.14 12:22:17 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2014.09.14 12:22:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2014.09.14 12:22:17 - OpenVPN > OPTIONS IMPORT: route options modified . 2014.09.14 12:22:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2014.09.14 12:22:17 - OpenVPN > Opened utun device utun0 . 2014.09.14 12:22:17 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2014.09.14 12:22:17 - OpenVPN > /sbin/ifconfig utun0 delete . 2014.09.14 12:22:17 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2014.09.14 12:22:17 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2014.09.14 12:22:17 - OpenVPN > /sbin/ifconfig utun0 10.4.65.250 10.4.65.249 mtu 1500 netmask 255.255.255.255 up . 2014.09.14 12:22:17 - OpenVPN > /sbin/route add -net 199.115.117.225 192.168.1.1 255.255.255.255 . 2014.09.14 12:22:17 - OpenVPN > add net 199.115.117.225: gateway 192.168.1.1 . 2014.09.14 12:22:17 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.65.249 128.0.0.0 . 2014.09.14 12:22:17 - OpenVPN > add net 0.0.0.0: gateway 10.4.65.249 . 2014.09.14 12:22:17 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.65.249 128.0.0.0 . 2014.09.14 12:22:17 - OpenVPN > add net 128.0.0.0: gateway 10.4.65.249 . 2014.09.14 12:22:17 - OpenVPN > /sbin/route add -net 10.4.0.1 10.4.65.249 255.255.255.255 . 2014.09.14 12:22:17 - OpenVPN > add net 10.4.0.1: gateway 10.4.65.249 . 2014.09.14 12:22:17 - Starting Management Interface . 2014.09.14 12:22:17 - OpenVPN > Initialization Sequence Completed I 2014.09.14 12:22:18 - DNS of a network adapter forced (SAMSUNG_Android) I 2014.09.14 12:22:18 - DNS of a network adapter forced (Wi-Fi) I 2014.09.14 12:22:18 - DNS of a network adapter forced (Bluetooth PAN) I 2014.09.14 12:22:18 - DNS of a network adapter forced (Thunderbolt Bridge) ! 2014.09.14 12:22:18 - Flushing DNS ! 2014.09.14 12:22:18 - Checking route ! 2014.09.14 12:22:23 - Connected. . 2014.09.14 12:22:23 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2014.09.14 12:22:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2014.09.14 12:51:38 - OpenVPN > write UDPv4: Network is down (code=50) . 2014.09.14 13:01:10 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2014.09.14 13:01:10 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2014.09.14 13:01:10 - OpenVPN > Restart pause, 2 second(s) ! 2014.09.14 13:01:10 - Disconnecting . 2014.09.14 13:01:10 - Management - Send 'signal SIGTERM' . 2014.09.14 13:01:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2014.09.14 13:01:10 - OpenVPN > MANAGEMENT: Client disconnected . 2014.09.14 13:01:10 - OpenVPN > Assertion failed at misc.c:785 . 2014.09.14 13:01:10 - OpenVPN > Exiting due to fatal error . 2014.09.14 13:01:10 - Connection terminated. I 2014.09.14 13:01:10 - DNS of a network adapter restored to original settings (SAMSUNG_Android) I 2014.09.14 13:01:10 - DNS of a network adapter restored to original settings (Wi-Fi) I 2014.09.14 13:01:10 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2014.09.14 13:01:10 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) ! 2014.09.14 13:01:14 - Waiting for latency tests ! 2014.09.14 13:01:14 - Checking authorization . 2014.09.14 13:01:14 - Error: ConnectFailure (Network is unreachable) . 2014.09.14 13:01:14 - Error: ConnectFailure (Network is unreachable) . 2014.09.14 13:01:14 - Error: ConnectFailure (Network is unreachable) . 2014.09.14 13:01:14 - Error: ConnectFailure (Network is unreachable) . 2014.09.14 13:01:14 - Error: ConnectFailure (Network is unreachable) . 2014.09.14 13:01:14 - Error: NameResolutionFailure . 2014.09.14 13:01:14 - Error: NameResolutionFailure . 2014.09.14 13:01:14 - Error: NameResolutionFailure W 2014.09.14 13:01:14 - Error: ConnectFailure (Network is unreachable) ! 2014.09.14 13:01:17 - Checking authorization . 2014.09.14 13:01:18 - Error getting response stream (ReadDone1): ReceiveFailure . 2014.09.14 13:01:18 - Error getting response stream (ReadDone1): ReceiveFailure . 2014.09.14 13:01:28 - The request timed out ! 2014.09.14 13:01:29 - Connecting to Kuma (United States, Manassas, Virginia) . 2014.09.14 13:01:29 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014 . 2014.09.14 13:01:29 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.14 13:01:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.14 13:01:29 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.14 13:01:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 13:01:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 13:01:29 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 13:01:29 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 13:01:29 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443 . 2014.09.14 13:01:29 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=4b058068 adbfd6e5 . 2014.09.14 13:01:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.14 13:01:30 - OpenVPN > Validating certificate key usage . 2014.09.14 13:01:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.14 13:01:30 - OpenVPN > VERIFY KU OK . 2014.09.14 13:01:30 - OpenVPN > Validating certificate extended key usage . 2014.09.14 13:01:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.14 13:01:30 - OpenVPN > VERIFY EKU OK . 2014.09.14 13:01:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.14 13:01:59 - Error getting response stream (ReadDone1): ReceiveFailure . 2014.09.14 13:01:59 - Error: SendFailure (Error writing headers) . 2014.09.14 13:02:05 - OpenVPN > [server] Inactivity timeout (--ping-exit), exiting . 2014.09.14 13:02:05 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.09.14 13:02:09 - The request timed out . 2014.09.14 13:02:10 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2014.09.14 13:02:10 - Disconnecting . 2014.09.14 13:02:10 - Connection terminated. ! 2014.09.14 13:02:13 - Checking authorization . 2014.09.14 13:02:13 - Error getting response stream (ReadDone1): ReceiveFailure . 2014.09.14 13:02:23 - The request timed out . 2014.09.14 13:02:33 - The request timed out ! 2014.09.14 13:02:34 - Connecting to Kuma (United States, Manassas, Virginia) . 2014.09.14 13:02:34 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014 . 2014.09.14 13:02:34 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.14 13:02:34 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.14 13:02:34 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.14 13:02:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 13:02:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 13:02:34 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 13:02:34 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 13:02:34 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443 . 2014.09.14 13:02:34 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=4fa4de69 82f0a521 . 2014.09.14 13:02:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.14 13:02:35 - OpenVPN > Validating certificate key usage . 2014.09.14 13:02:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.14 13:02:35 - OpenVPN > VERIFY KU OK . 2014.09.14 13:02:35 - OpenVPN > Validating certificate extended key usage . 2014.09.14 13:02:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.14 13:02:35 - OpenVPN > VERIFY EKU OK . 2014.09.14 13:02:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.14 13:03:34 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) . 2014.09.14 13:03:34 - OpenVPN > TLS Error: TLS handshake failed . 2014.09.14 13:03:34 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2014.09.14 13:03:34 - OpenVPN > Restart pause, 2 second(s) ! 2014.09.14 13:03:34 - Disconnecting . 2014.09.14 13:03:34 - Connection terminated. ! 2014.09.14 13:03:37 - Checking authorization . 2014.09.14 13:03:38 - Error getting response stream (ReadDone1): ReceiveFailure . 2014.09.14 13:03:48 - The request timed out . 2014.09.14 13:03:58 - The request timed out ! 2014.09.14 13:03:59 - Connecting to Kuma (United States, Manassas, Virginia) . 2014.09.14 13:03:59 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014 . 2014.09.14 13:03:59 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.14 13:03:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.14 13:03:59 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.14 13:03:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 13:03:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 13:03:59 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 13:03:59 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 13:03:59 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443 . 2014.09.14 13:03:59 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=12e18f82 107b3b50 . 2014.09.14 13:04:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.14 13:04:01 - OpenVPN > Validating certificate key usage . 2014.09.14 13:04:01 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.14 13:04:01 - OpenVPN > VERIFY KU OK . 2014.09.14 13:04:01 - OpenVPN > Validating certificate extended key usage . 2014.09.14 13:04:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.14 13:04:01 - OpenVPN > VERIFY EKU OK . 2014.09.14 13:04:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.14 13:04:36 - OpenVPN > [server] Inactivity timeout (--ping-exit), exiting . 2014.09.14 13:04:36 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.09.14 14:03:36 - OpenVPN > [server] Inactivity timeout (--ping-exit), exiting . 2014.09.14 14:03:36 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2014.09.14 14:03:36 - Disconnecting . 2014.09.14 14:03:36 - Connection terminated. I 2014.09.14 14:03:36 - Session terminated. . 2014.09.14 14:04:09 - Error getting response stream (ReadDone1): ReceiveFailure . 2014.09.14 14:04:19 - The request timed out . 2014.09.14 14:04:29 - The request timed out . 2014.09.14 14:04:39 - The request timed out I 2014.09.14 14:06:18 - Session starting. ! 2014.09.14 14:06:18 - Checking environment ! 2014.09.14 14:06:18 - Checking authorization . 2014.09.14 14:06:18 - Error getting response stream (ReadDone1): ReceiveFailure . 2014.09.14 14:06:28 - The request timed out . 2014.09.14 14:06:38 - The request timed out ! 2014.09.14 14:06:39 - Connecting to Kuma (United States, Manassas, Virginia) . 2014.09.14 14:06:39 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014 . 2014.09.14 14:06:39 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.14 14:06:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.14 14:06:39 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.14 14:06:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:06:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:06:39 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 14:06:39 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 14:06:39 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443 . 2014.09.14 14:06:40 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=f685cd52 e1cfa20b . 2014.09.14 14:06:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.14 14:06:41 - OpenVPN > Validating certificate key usage . 2014.09.14 14:06:41 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.14 14:06:41 - OpenVPN > VERIFY KU OK . 2014.09.14 14:06:41 - OpenVPN > Validating certificate extended key usage . 2014.09.14 14:06:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.14 14:06:41 - OpenVPN > VERIFY EKU OK . 2014.09.14 14:06:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.14 14:07:17 - OpenVPN > [server] Inactivity timeout (--ping-exit), exiting . 2014.09.14 14:07:17 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.09.14 14:07:23 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2014.09.14 14:07:23 - Disconnecting . 2014.09.14 14:07:23 - Connection terminated. ! 2014.09.14 14:07:26 - Checking authorization . 2014.09.14 14:07:26 - Error: SendFailure (Error writing headers) . 2014.09.14 14:07:36 - The request timed out . 2014.09.14 14:07:46 - The request timed out ! 2014.09.14 14:07:47 - Connecting to Kuma (United States, Manassas, Virginia) . 2014.09.14 14:07:47 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014 . 2014.09.14 14:07:47 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.14 14:07:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.14 14:07:47 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.14 14:07:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:07:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:07:47 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 14:07:47 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 14:07:47 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443 . 2014.09.14 14:07:48 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=c8379507 0d5926a1 . 2014.09.14 14:07:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.14 14:07:49 - OpenVPN > Validating certificate key usage . 2014.09.14 14:07:49 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.14 14:07:49 - OpenVPN > VERIFY KU OK . 2014.09.14 14:07:49 - OpenVPN > Validating certificate extended key usage . 2014.09.14 14:07:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.14 14:07:49 - OpenVPN > VERIFY EKU OK . 2014.09.14 14:07:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.14 14:08:24 - OpenVPN > [server] Inactivity timeout (--ping-exit), exiting . 2014.09.14 14:08:24 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.09.14 14:08:29 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2014.09.14 14:08:29 - Disconnecting . 2014.09.14 14:08:29 - Connection terminated. ! 2014.09.14 14:08:32 - Checking authorization . 2014.09.14 14:08:42 - The request timed out . 2014.09.14 14:08:52 - The request timed out . 2014.09.14 14:09:02 - The request timed out ! 2014.09.14 14:09:03 - Connecting to Kuma (United States, Manassas, Virginia) . 2014.09.14 14:09:03 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014 . 2014.09.14 14:09:03 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.14 14:09:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.14 14:09:03 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.14 14:09:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:09:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:09:03 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 14:09:03 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 14:09:03 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443 . 2014.09.14 14:09:04 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=4626bcab 57fd1f75 . 2014.09.14 14:09:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.14 14:09:05 - OpenVPN > Validating certificate key usage . 2014.09.14 14:09:05 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.14 14:09:05 - OpenVPN > VERIFY KU OK . 2014.09.14 14:09:05 - OpenVPN > Validating certificate extended key usage . 2014.09.14 14:09:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.14 14:09:05 - OpenVPN > VERIFY EKU OK . 2014.09.14 14:09:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.14 14:09:40 - OpenVPN > [server] Inactivity timeout (--ping-exit), exiting . 2014.09.14 14:09:40 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.09.14 14:09:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2014.09.14 14:09:45 - Disconnecting . 2014.09.14 14:09:45 - Connection terminated. I 2014.09.14 14:09:45 - Cancel requested. I 2014.09.14 14:09:45 - Session terminated. I 2014.09.14 14:10:49 - Session starting. ! 2014.09.14 14:10:49 - Checking environment ! 2014.09.14 14:10:49 - Checking authorization . 2014.09.14 14:10:59 - The request timed out . 2014.09.14 14:11:09 - The request timed out . 2014.09.14 14:11:19 - The request timed out ! 2014.09.14 14:11:20 - Connecting to Hadar (Hong Kong, Hong Kong) . 2014.09.14 14:11:20 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014 . 2014.09.14 14:11:20 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.14 14:11:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.14 14:11:20 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.14 14:11:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:11:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:11:20 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 14:11:20 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 14:11:20 - OpenVPN > UDPv4 link remote: [AF_INET]103.10.197.186:443 . 2014.09.14 14:11:20 - OpenVPN > TLS: Initial packet from [AF_INET]103.10.197.186:443, sid=c6944af9 f68af350 . 2014.09.14 14:12:20 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) . 2014.09.14 14:12:20 - OpenVPN > TLS Error: TLS handshake failed . 2014.09.14 14:12:20 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2014.09.14 14:12:20 - OpenVPN > Restart pause, 2 second(s) ! 2014.09.14 14:12:20 - Disconnecting . 2014.09.14 14:12:20 - Connection terminated. ! 2014.09.14 14:12:23 - Checking authorization . 2014.09.14 14:12:33 - The request timed out . 2014.09.14 14:12:43 - The request timed out . 2014.09.14 14:12:53 - The request timed out ! 2014.09.14 14:12:54 - Connecting to Kuma (United States, Manassas, Virginia) . 2014.09.14 14:12:54 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014 . 2014.09.14 14:12:54 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.14 14:12:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.14 14:12:54 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.14 14:12:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:12:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:12:54 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 14:12:54 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 14:12:54 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443 . 2014.09.14 14:12:55 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=c7c6f319 0d40277c . 2014.09.14 14:12:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.14 14:12:56 - OpenVPN > Validating certificate key usage . 2014.09.14 14:12:56 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.14 14:12:56 - OpenVPN > VERIFY KU OK . 2014.09.14 14:12:56 - OpenVPN > Validating certificate extended key usage . 2014.09.14 14:12:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.14 14:12:56 - OpenVPN > VERIFY EKU OK . 2014.09.14 14:12:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.14 14:12:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.14 14:12:59 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:12:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.14 14:12:59 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:12:59 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.09.14 14:12:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.115.117.213:443 . 2014.09.14 14:13:02 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:12 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:17 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:37 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:57 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:14:02 - OpenVPN > No reply from server after sending 12 push requests . 2014.09.14 14:14:02 - OpenVPN > SIGUSR1[soft,no-push-reply] received, process restarting . 2014.09.14 14:14:02 - OpenVPN > Restart pause, 2 second(s) . 2014.09.14 14:14:04 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 14:14:04 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 14:14:04 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443 . 2014.09.14 14:14:05 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=04fe4f86 f46d7934 ! 2014.09.14 14:14:07 - Disconnecting . 2014.09.14 14:14:07 - Connection terminated. I 2014.09.14 14:14:07 - Cancel requested. I 2014.09.14 14:14:07 - Session terminated. . 2014.09.14 14:15:05 - The request timed out . 2014.09.14 14:15:15 - The request timed out . 2014.09.14 14:15:25 - The request timed out BTW your site is completly blocked from China. [parts removed to protect competing services, see answer to this message] So what can i do now ? Thanks !
  21. Any one else working on an SSH Tunnelled OpenVPN connection on DD-WRT? I have the SSH Tunnel standing up correctly and the OpenVPN connection connecting correctly. HOWEVER, no port 80 traffic. Only pings, traceroute, etc. Ideas? Suggestions? Once I have it working I will write up a how to. If you are in China you need this info!
×
×
  • Create New...