Jump to content


Photo

Eddie fails to connect to server and continuously retries

eddie connection problem timeout

  • Please log in to reply
3 replies to this topic

#1 randomhash

randomhash

    Newbie

  • New Members
  • Pip
  • 1 posts

Posted 12 October 2017 - 10:11 PM

Hello, I'm using Arch Linux. I installed eddie from the AUR repositories and have tried the official release to the same effect. I log in and try to connect to a server. This is the output for both clients. Any idea what's causing the issue?

I 2017.10.13 00:03:20 - OpenVPN Driver - Found, /dev/net/tun
I 2017.10.13 00:03:20 - OpenVPN - Version: 2.4.4 - OpenSSL 1.1.0f  25 May 2017, LZO 2.10 (/usr/bin/openvpn)
I 2017.10.13 00:03:20 - SSH - Version: OpenSSH_7.6p1, OpenSSL 1.1.0f  25 May 2017 (/usr/bin/ssh)
I 2017.10.13 00:03:20 - SSL - Version: stunnel 5.42 (/usr/bin/stunnel)
I 2017.10.13 00:03:20 - curl - Version: 7.56.0 (/usr/bin/curl)
I 2017.10.13 00:03:20 - Certification Authorities: /usr/share/AirVPN/cacert.pem
. 2017.10.13 00:03:20 - Updating systems & servers data ...
! 2017.10.13 00:03:20 - Ready
. 2017.10.13 00:03:21 - Systems & servers data update completed
I 2017.10.13 00:03:31 - Session starting.
I 2017.10.13 00:03:31 - Checking authorization ...
! 2017.10.13 00:03:31 - Connecting to Fornax (Bulgaria, Sofia)
. 2017.10.13 00:03:31 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
. 2017.10.13 00:03:31 - OpenVPN > library versions: OpenSSL 1.1.0f  25 May 2017, LZO 2.10
. 2017.10.13 00:03:31 - Connection to OpenVPN Management Interface
. 2017.10.13 00:03:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]93.123.73.113:443
. 2017.10.13 00:03:31 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2017.10.13 00:03:31 - OpenVPN > UDP link local: (not bound)
. 2017.10.13 00:03:31 - OpenVPN > UDP link remote: [AF_INET]93.123.73.113:443
. 2017.10.13 00:03:31 - OpenVPN > TLS: Initial packet from [AF_INET]93.123.73.113:443, sid=5e2226af 3c6a2d05
. 2017.10.13 00:03:32 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.13 00:03:32 - OpenVPN > VERIFY KU OK
. 2017.10.13 00:03:32 - OpenVPN > Validating certificate extended key usage
. 2017.10.13 00:03:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.13 00:03:32 - OpenVPN > VERIFY EKU OK
. 2017.10.13 00:03:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fornax, emailAddress=info@airvpn.org
. 2017.10.13 00:03:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.13 00:03:32 - OpenVPN > [Fornax] Peer Connection Initiated with [AF_INET]93.123.73.113:443
. 2017.10.13 00:03:33 - OpenVPN > SENT CONTROL [Fornax]: 'PUSH_REQUEST' (status=1)
! 2017.10.13 00:03:33 - Disconnecting
. 2017.10.13 00:03:33 - Connection terminated.
I 2017.10.13 00:03:36 - Checking authorization ...
! 2017.10.13 00:03:36 - Connecting to Alphecca (Netherlands, Alblasserdam)
. 2017.10.13 00:03:36 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
. 2017.10.13 00:03:36 - OpenVPN > library versions: OpenSSL 1.1.0f  25 May 2017, LZO 2.10
. 2017.10.13 00:03:36 - Connection to OpenVPN Management Interface
. 2017.10.13 00:03:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]109.202.107.4:443
. 2017.10.13 00:03:36 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2017.10.13 00:03:36 - OpenVPN > UDP link local: (not bound)
. 2017.10.13 00:03:36 - OpenVPN > UDP link remote: [AF_INET]109.202.107.4:443
. 2017.10.13 00:03:36 - OpenVPN > TLS: Initial packet from [AF_INET]109.202.107.4:443, sid=8ccd6516 2fbe28e9
. 2017.10.13 00:03:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.13 00:03:36 - OpenVPN > VERIFY KU OK
. 2017.10.13 00:03:36 - OpenVPN > Validating certificate extended key usage
. 2017.10.13 00:03:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.13 00:03:36 - OpenVPN > VERIFY EKU OK
. 2017.10.13 00:03:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.13 00:03:37 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.13 00:03:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]109.202.107.4:443
. 2017.10.13 00:03:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
! 2017.10.13 00:03:38 - Disconnecting
. 2017.10.13 00:03:38 - Connection terminated.
I 2017.10.13 00:03:41 - Checking authorization ...
! 2017.10.13 00:03:41 - Connecting to Crater (Netherlands, Alblasserdam)
. 2017.10.13 00:03:41 - OpenVPN > OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
. 2017.10.13 00:03:41 - OpenVPN > library versions: OpenSSL 1.1.0f  25 May 2017, LZO 2.10
. 2017.10.13 00:03:41 - Connection to OpenVPN Management Interface
. 2017.10.13 00:03:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.13 00:03:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.14:443
. 2017.10.13 00:03:41 - OpenVPN > Socket Buffers: R=[212992->212992] S=[212992->212992]
. 2017.10.13 00:03:41 - OpenVPN > UDP link local: (not bound)
. 2017.10.13 00:03:41 - OpenVPN > UDP link remote: [AF_INET]213.152.162.14:443
. 2017.10.13 00:03:41 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.14:443, sid=01fb8967 6413d3d5
. 2017.10.13 00:03:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.13 00:03:41 - OpenVPN > VERIFY KU OK
. 2017.10.13 00:03:41 - OpenVPN > Validating certificate extended key usage
. 2017.10.13 00:03:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.13 00:03:41 - OpenVPN > VERIFY EKU OK
. 2017.10.13 00:03:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Crater, emailAddress=info@airvpn.org
. 2017.10.13 00:03:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.13 00:03:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.13 00:03:41 - OpenVPN > [Crater] Peer Connection Initiated with [AF_INET]213.152.162.14:443
. 2017.10.13 00:03:42 - OpenVPN > SENT CONTROL [Crater]: 'PUSH_REQUEST' (status=1)
! 2017.10.13 00:03:42 - Disconnecting
. 2017.10.13 00:03:42 - Connection terminated.
I 2017.10.13 00:03:45 - Checking authorization ...
. 2017.10.13 00:04:06 - Above log line repeated 6 times more
I 2017.10.13 00:04:06 - Cancel requested.
! 2017.10.13 00:04:06 - Session terminated.



#2 !Ma;*T9NTT@n@>Cr

!Ma;*T9NTT@n@>Cr

    Newbie

  • New Members
  • Pip
  • 1 posts

Posted 18 October 2017 - 05:15 AM

I think I have the same issue, I'm going to send a ticket to support as well with logs. Is there any way to use Air VPN without Eddie?



#3 YamiNoKeshin

YamiNoKeshin

    Newbie

  • New Members
  • Pip
  • 2 posts

Posted 18 October 2017 - 07:40 AM

I had the same issue this morning. After trying it manually with OpenVPN I found out the last kernel update "broke" the tun device. After a reboot it worked again



#4 giganerd

giganerd

    I shall have no title

  • Members
  • PipPipPip
  • 2522 posts
  • LocationGermany

Posted 18 October 2017 - 08:21 AM

I think I have the same issue, I'm going to send a ticket to support as well with logs. Is there any way to use Air VPN without Eddie?

Of course there is. Use vanilla OpenVPN/OpenVPN GUI on Windows, Viscosity, Securepoint SSL-VPN, Tunnelblick, etc.. How-tos are in the How-To section of the forums.

Sent via Tapatalk. Means, I don't have a computer available now.

Always remember:
There's a guide to AirVPN,

Amazon IPs are not dangerous here,
running TOR exits is discouraged,

using spoilers for your logs is the proper way to heaven.
Same issues are rare! Search for solutions and if not successful open your own threads.

~ Furthermore, I propose that your paranoia is to be destroyed. ~

 






Similar Topics Collapse


1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users

Servers online. Online Sessions: 12826 - BW: 44399 Mbit/sYour IP: 54.145.83.79Guest Access.