Jump to content
Not connected, Your IP: 18.118.142.234

Search the Community

Showing results for tags 'lost connection'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 2 results

  1. i thought i had this issue figured out and was closed https://airvpn.org/topic/16427-high-latency-lost-connection-durring-hourly-tls-rekeying/?do=findComment&comment=35775 But, i have not had any issue for the last 7 month and have happily forgot the problems i had. But suddenly is it a issue again. I am loosing connection every hour during the TLS-rekeying where there is a drop in my connection for up to 6-10sec. I thought i was a issue with my router RT-ac66u with lack of CPU power. But the last 7-8 month hasnt there been any problems. So i can only conclude it isnt a client issue?! i have attached my log file during the TLS rekeying. see the timestamps 21.26.10 - 21.26.16 the 6 sec difference is a drop in connection. Jul 31 21:26:10 openvpn[11656]: TLS: soft reset sec=0 bytes=894520/-1 pkts=7903/0 Jul 31 21:26:10 openvpn[11656]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Jul 31 21:26:10 openvpn[11656]: Validating certificate key usage Jul 31 21:26:10 openvpn[11656]: ++ Certificate has key usage 00a0, expects 00a0 Jul 31 21:26:10 openvpn[11656]: VERIFY KU OK Jul 31 21:26:10 openvpn[11656]: Validating certificate extended key usage Jul 31 21:26:10 openvpn[11656]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Jul 31 21:26:10 openvpn[11656]: VERIFY EKU OK Jul 31 21:26:10 openvpn[11656]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org Jul 31 21:26:16 openvpn[11656]: Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key Jul 31 21:26:16 openvpn[11656]: Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key Jul 31 21:26:16 openvpn[11656]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Any ideas?
  2. Hi experts, i have a issue i wish to get enlightened a bit. Every time openvpn does a TLS rekeying once a hour. Do I lose connection for 5-6 sek, can you guys explane to me why this happens and what i can do to avoid this?? The system is a dual core 1300Mhz running linux those specs shouldnt be a problem.. I have add the logfile for the rekeying process. LOG: Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: Validating certificate key usage Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: ++ Certificate has key usage 00a0, expects 00a0 Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: VERIFY KU OK Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: Validating certificate extended key usage Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: VERIFY EKU OK Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org Jan 3 21:25:06 -- daemon.notice ovpn-client[19xx]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Jan 3 21:25:06 -- daemon.notice ovpn-client[19xx]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Jan 3 21:25:06 -- daemon.notice ovpn-client[19xx]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Jan 3 21:25:06 -- daemon.notice ovpn-client[19xx]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Jan 3 21:25:06 -- daemon.notice ovpn-client[19xx]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA Best Regards, TM
×
×
  • Create New...