Jump to content

DumaOppsKnowiGotADuma? :)

Members
  • Posts

    9
  • Joined

  • Last visited

Everything posted by DumaOppsKnowiGotADuma? :)

  1. Last log: Wed Sep 6 00:35:53 2023 us=733438 OpenVPN 2.4.7 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Wed Sep 6 00:35:53 2023 us=733810 library versions: OpenSSL 1.0.2p 14 Aug 2018, LZO 2.10 Wed Sep 6 00:35:53 2023 us=734402 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Wed Sep 6 00:35:53 2023 us=738784 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication Wed Sep 6 00:35:53 2023 us=739201 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication Wed Sep 6 00:35:53 2023 us=740064 Control Channel MTU parms [ L:1623 D:1170 EF:80 EB:0 ET:0 EL:3 ] Wed Sep 6 00:35:53 2023 us=923103 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ] Wed Sep 6 00:35:53 2023 us=923830 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1571,tun-mtu 1500,proto TCPv4_CLIENT,keydir 1,cipher AES-256-CBC,auth SHA256,keysize 256,tls-auth,key-method 2,tls-client' Wed Sep 6 00:35:53 2023 us=924066 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1571,tun-mtu 1500,proto TCPv4_SERVER,keydir 0,cipher AES-256-CBC,auth SHA256,keysize 256,tls-auth,key-method 2,tls-server' Wed Sep 6 00:35:53 2023 us=924345 TCP/UDP: Preserving recently used remote address: [AF_INET]102.68.86.130:1194 Wed Sep 6 00:35:53 2023 us=924681 Socket Buffers: R=[87380->87380] S=[16384->16384] Wed Sep 6 00:35:53 2023 us=924910 Attempting to establish TCP connection with [AF_INET]102.68.86.130:1194 [nonblock] Wed Sep 6 00:35:54 2023 us=926632 TCP connection established with [AF_INET]102.68.86.130:1194 Wed Sep 6 00:35:54 2023 us=927062 TCP_CLIENT link local: (not bound) Wed Sep 6 00:35:54 2023 us=927269 TCP_CLIENT link remote: [AF_INET]102.68.86.130:1194 Wed Sep 6 00:35:55 2023 us=936289 TLS: Initial packet from [AF_INET]102.68.86.130:1194, sid=631e0fb9 53571ef5 Wed Sep 6 00:35:55 2023 us=937608 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Wed Sep 6 00:35:59 2023 us=811097 VERIFY OK: depth=1, CN=Easy-RSA CA Wed Sep 6 00:35:59 2023 us=816112 VERIFY KU OK Wed Sep 6 00:35:59 2023 us=816473 Validating certificate extended key usage Wed Sep 6 00:35:59 2023 us=816727 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Wed Sep 6 00:35:59 2023 us=816911 VERIFY EKU OK Wed Sep 6 00:35:59 2023 us=817090 VERIFY OK: depth=0, CN=serverultimate Wed Sep 6 00:36:01 2023 us=307448 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Wed Sep 6 00:36:01 2023 us=308061 [serverultimate] Peer Connection Initiated with [AF_INET]102.68.86.130:1194 Wed Sep 6 00:36:02 2023 us=367686 SENT CONTROL [serverultimate]: 'PUSH_REQUEST' (status=1) Error: CONNECTION TIMEOUT Wed Sep 6 00:36:02 2023 us=720053 event_wait : Interrupted system call (code=4) Wed Sep 6 00:36:02 2023 us=722054 TCP/UDP: Closing socket Wed Sep 6 00:36:02 2023 us=723142 SIGINT[hard,] received, process exiting
  2. Since I've updated dumaOS firmware(3.3.280), I haven't been able to connect my hybrid vpn at all. Not sure what the issue is, but it says failed every time i try it. Ive tried multiple servers, and even factory reset to start fresh and try again. Any suggestions?! Lmk :)
×
×
  • Create New...