Jump to content


Photo

Eddie fails to connect to server and continuously retries

eddie connection problem timeout

  • Please log in to reply
3 replies to this topic

#1 randomhash

randomhash

    Newbie

  • Members
  • Pip
  • 1 posts

Posted 12 October 2017 - 10:11 PM

Hello, I'm using Arch Linux. I installed eddie from the AUR repositories and have tried the official release to the same effect. I log in and try to connect to a server. This is the output for both clients. Any idea what's causing the issue?

I 2017.10.13 00:03:20 - OpenVPN Driver - Found, /dev/net/tun
I 2017.10.13 00:03:20 - OpenVPN - Version: 2.4.4 - OpenSSL 1.1.0f  25 May 2017, LZO 2.10 (/usr/bin/openvpn)
I 2017.10.13 00:03:20 - SSH - Version: OpenSSH_7.6p1, OpenSSL 1.1.0f  25 May 2017 (/usr/bin/ssh)
I 2017.10.13 00:03:20 - SSL - Version: stunnel 5.42 (/usr/bin/stunnel)
I 2017.10.13 00:03:20 - curl - Version: 7.56.0 (/usr/bin/curl)
I 2017.10.13 00:03:20 - Certification Authorities: /usr/share/AirVPN/cacert.pem
. 2017.10.13 00:03:20 - Updating systems & servers data ...
! 2017.10.13 00:03:20 - Ready
. 2017.10.13 00:03:21 - Systems & servers data update completed
I 2017.10.13 00:03:31 - Session starting.
I 2017.10.13 00:03:31 - Checking authorization ...
! 2017.10.13 00:03:31 - Connecting to Fornax (Bulgaria, Sofia)
. 2017.10.13 00:03:31 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
. 2017.10.13 00:03:31 - OpenVPN > library versions: OpenSSL 1.1.0f  25 May 2017, LZO 2.10
. 2017.10.13 00:03:31 - Connection to OpenVPN Management Interface
. 2017.10.13 00:03:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]93.123.73.113:443
. 2017.10.13 00:03:31 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2017.10.13 00:03:31 - OpenVPN > UDP link local: (not bound)
. 2017.10.13 00:03:31 - OpenVPN > UDP link remote: [AF_INET]93.123.73.113:443
. 2017.10.13 00:03:31 - OpenVPN > TLS: Initial packet from [AF_INET]93.123.73.113:443, sid=5e2226af 3c6a2d05
. 2017.10.13 00:03:32 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.13 00:03:32 - OpenVPN > VERIFY KU OK
. 2017.10.13 00:03:32 - OpenVPN > Validating certificate extended key usage
. 2017.10.13 00:03:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.13 00:03:32 - OpenVPN > VERIFY EKU OK
. 2017.10.13 00:03:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fornax, emailAddress=info@airvpn.org
. 2017.10.13 00:03:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.13 00:03:32 - OpenVPN > [Fornax] Peer Connection Initiated with [AF_INET]93.123.73.113:443
. 2017.10.13 00:03:33 - OpenVPN > SENT CONTROL [Fornax]: 'PUSH_REQUEST' (status=1)
! 2017.10.13 00:03:33 - Disconnecting
. 2017.10.13 00:03:33 - Connection terminated.
I 2017.10.13 00:03:36 - Checking authorization ...
! 2017.10.13 00:03:36 - Connecting to Alphecca (Netherlands, Alblasserdam)
. 2017.10.13 00:03:36 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
. 2017.10.13 00:03:36 - OpenVPN > library versions: OpenSSL 1.1.0f  25 May 2017, LZO 2.10
. 2017.10.13 00:03:36 - Connection to OpenVPN Management Interface
. 2017.10.13 00:03:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.4:443
. 2017.10.13 00:03:36 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2017.10.13 00:03:36 - OpenVPN > UDP link local: (not bound)
. 2017.10.13 00:03:36 - OpenVPN > UDP link remote: [AF_INET]109.202.107.4:443
. 2017.10.13 00:03:36 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.4:443, sid=8ccd6516 2fbe28e9
. 2017.10.13 00:03:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.13 00:03:36 - OpenVPN > VERIFY KU OK
. 2017.10.13 00:03:36 - OpenVPN > Validating certificate extended key usage
. 2017.10.13 00:03:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.13 00:03:36 - OpenVPN > VERIFY EKU OK
. 2017.10.13 00:03:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.13 00:03:37 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.13 00:03:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.4:443
. 2017.10.13 00:03:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
! 2017.10.13 00:03:38 - Disconnecting
. 2017.10.13 00:03:38 - Connection terminated.
I 2017.10.13 00:03:41 - Checking authorization ...
! 2017.10.13 00:03:41 - Connecting to Crater (Netherlands, Alblasserdam)
. 2017.10.13 00:03:41 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
. 2017.10.13 00:03:41 - OpenVPN > library versions: OpenSSL 1.1.0f  25 May 2017, LZO 2.10
. 2017.10.13 00:03:41 - Connection to OpenVPN Management Interface
. 2017.10.13 00:03:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.14:443
. 2017.10.13 00:03:41 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2017.10.13 00:03:41 - OpenVPN > UDP link local: (not bound)
. 2017.10.13 00:03:41 - OpenVPN > UDP link remote: [AF_INET]213.152.162.14:443
. 2017.10.13 00:03:41 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.14:443, sid=01fb8967 6413d3d5
. 2017.10.13 00:03:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.13 00:03:41 - OpenVPN > VERIFY KU OK
. 2017.10.13 00:03:41 - OpenVPN > Validating certificate extended key usage
. 2017.10.13 00:03:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.13 00:03:41 - OpenVPN > VERIFY EKU OK
. 2017.10.13 00:03:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Crater, emailAddress=info@airvpn.org
. 2017.10.13 00:03:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.13 00:03:41 - OpenVPN > [Crater] Peer Connection Initiated with [AF_INET]213.152.162.14:443
. 2017.10.13 00:03:42 - OpenVPN > SENT CONTROL [Crater]: 'PUSH_REQUEST' (status=1)
! 2017.10.13 00:03:42 - Disconnecting
. 2017.10.13 00:03:42 - Connection terminated.
I 2017.10.13 00:03:45 - Checking authorization ...
. 2017.10.13 00:04:06 - Above log line repeated 6 times more
I 2017.10.13 00:04:06 - Cancel requested.
! 2017.10.13 00:04:06 - Session terminated.



#2 !Ma;*T9NTT@n@>Cr

!Ma;*T9NTT@n@>Cr

    Newbie

  • Members
  • Pip
  • 1 posts

Posted 18 October 2017 - 05:15 AM

I think I have the same issue, I'm going to send a ticket to support as well with logs. Is there any way to use Air VPN without Eddie?



#3 YamiNoKeshin

YamiNoKeshin

    Newbie

  • Members
  • Pip
  • 2 posts

Posted 18 October 2017 - 07:40 AM

I had the same issue this morning. After trying it manually with OpenVPN I found out the last kernel update "broke" the tun device. After a reboot it worked again



#4 giganerd

giganerd

    I shall have no title

  • Members2
  • PipPipPip
  • 2687 posts
  • LocationGermany

Posted 18 October 2017 - 08:21 AM

I think I have the same issue, I'm going to send a ticket to support as well with logs. Is there any way to use Air VPN without Eddie?

Of course there is. Use vanilla OpenVPN/OpenVPN GUI on Windows, Viscosity, Securepoint SSL-VPN, Tunnelblick, etc.. How-tos are in the How-To section of the forums.

Sent via Tapatalk. Means, I don't have a computer available now.

Always remember:
There's a guide to AirVPN,

Amazon IPs are not dangerous here,
running TOR exits is discouraged,

using spoilers for your logs helps us read your thread.

~ Furthermore, I propose that your paranoia is to be destroyed. ~

Instead of writing me a personal mail, consider contacting me via XMPP at gigan3rd@xmpp.airvpn.org or join the lounge@conference.xmpp.airvpn.org. I might read the mail too late whereas I'm always available on XMPP ;)






Similar Topics Collapse


1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users

Servers online. Online Sessions: 14794 - BW: 46945 Mbit/sYour IP: 34.226.208.185Guest Access.