-
Posts
19 -
Joined
-
Last visited
About Hunts
- Birthday January 22
Basic Info
-
Gender
Male
-
DumaOS Routers Owned
Netduma R2
XR450
Online Presence
-
Discord
Hunts#0001
-
Xbox Live
Hunts
Gaming
-
Gamer Type
Console Gamer
-
Favourite Genres
Shooters
-
Connection Speed
301-500mbps
-
How to use Geo Filter on Destiny 2 Now
Hunts replied to Jayco93's topic in NETGEAR Nighthawk Support (XR range)
Fraser is there a way you guys could make a firmware update that gives the option to automatically allow any pinged servers/peers within the radius of the geo-filter? -
robert27841 reacted to a post in a topic: XR700 not connecting to any VPN Hybrid servers ( I have a paid subscription )
-
Sat Jan 28 20:17:07 2023 OpenVPN 2.4.7 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on May 12 2022 Sat Jan 28 20:17:07 2023 library versions: OpenSSL 1.0.2l-CVE-2022-0778 25 May 2017, LZO 2.06 Sat Jan 28 20:17:07 2023 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead. Sat Jan 28 20:17:07 2023 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sat Jan 28 20:17:07 2023 TCP/UDP: Preserving recently used remote address: [AF_INET]5.62.43.218:553 Sat Jan 28 20:17:07 2023 Socket Buffers: R=[163840->163840] S=[163840->163840] Sat Jan 28 20:17:07 2023 UDP link local: (not bound) Sat Jan 28 20:17:07 2023 UDP link remote: [AF_INET]5.62.43.218:553 Sat Jan 28 20:17:07 2023 TLS: Initial packet from [AF_INET]5.62.43.218:553, sid=3cd4f7c6 803efbd2 Sat Jan 28 20:17:07 2023 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Sat Jan 28 20:17:07 2023 VERIFY OK: depth=1, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=hidemyass.com, [email protected] Sat Jan 28 20:17:07 2023 VERIFY OK: nsCertType=SERVER Sat Jan 28 20:17:07 2023 VERIFY OK: depth=0, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=server, [email protected] Sat Jan 28 20:17:08 2023 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Sat Jan 28 20:17:08 2023 [server] Peer Connection Initiated with [AF_INET]5.62.43.218:553 Sat Jan 28 20:17:09 2023 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Sat Jan 28 20:17:09 2023 AUTH: Received control message: AUTH_FAILED Sat Jan 28 20:17:09 2023 SIGTERM[soft,auth-failure] received, process exiting
-
Hunts changed their profile photo
-
I've just said i've used both the basic and the advanced setup. The Log is identical everytime.. I know i'm not being stupid here, im using the only available login, that i've always used. i've reset password and retried. nothing is working, there has to be a fault somewhere Sat Jan 28 17:05:55 2023 OpenVPN 2.4.7 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on May 12 2022 Sat Jan 28 17:05:55 2023 library versions: OpenSSL 1.0.2l-CVE-2022-0778 25 May 2017, LZO 2.06 Sat Jan 28 17:05:55 2023 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead. Sat Jan 28 17:05:55 2023 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sat Jan 28 17:05:55 2023 TCP/UDP: Preserving recently used remote address: [AF_INET]77.234.43.185:553 Sat Jan 28 17:05:55 2023 Socket Buffers: R=[163840->163840] S=[163840->163840] Sat Jan 28 17:05:55 2023 UDP link local: (not bound) Sat Jan 28 17:05:55 2023 UDP link remote: [AF_INET]77.234.43.185:553 Sat Jan 28 17:05:55 2023 TLS: Initial packet from [AF_INET]77.234.43.185:553, sid=c69e44c6 eb689c32 Sat Jan 28 17:05:55 2023 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Sat Jan 28 17:05:55 2023 VERIFY OK: depth=1, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=hidemyass.com, [email protected] Sat Jan 28 17:05:55 2023 VERIFY OK: nsCertType=SERVER Sat Jan 28 17:05:55 2023 VERIFY OK: depth=0, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=server, [email protected] Sat Jan 28 17:05:55 2023 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Sat Jan 28 17:05:55 2023 [server] Peer Connection Initiated with [AF_INET]77.234.43.185:553 Sat Jan 28 17:05:57 2023 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Sat Jan 28 17:05:57 2023 AUTH: Received control message: AUTH_FAILED Sat Jan 28 17:05:57 2023 SIGTERM[soft,auth-failure] received, process exiting
-
Sat Jan 28 15:26:56 2023 OpenVPN 2.4.7 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on May 12 2022 Sat Jan 28 15:26:56 2023 library versions: OpenSSL 1.0.2l-CVE-2022-0778 25 May 2017, LZO 2.06 Sat Jan 28 15:26:56 2023 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead. Sat Jan 28 15:26:56 2023 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sat Jan 28 15:26:56 2023 TCP/UDP: Preserving recently used remote address: [AF_INET]77.234.43.175:553 Sat Jan 28 15:26:56 2023 Socket Buffers: R=[163840->163840] S=[163840->163840] Sat Jan 28 15:26:56 2023 UDP link local: (not bound) Sat Jan 28 15:26:56 2023 UDP link remote: [AF_INET]77.234.43.175:553 Sat Jan 28 15:26:56 2023 TLS: Initial packet from [AF_INET]77.234.43.175:553, sid=951e8dc6 c0f59612 Sat Jan 28 15:26:56 2023 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Sat Jan 28 15:26:56 2023 VERIFY OK: depth=1, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=hidemyass.com, [email protected] Sat Jan 28 15:26:56 2023 VERIFY OK: nsCertType=SERVER Sat Jan 28 15:26:56 2023 VERIFY OK: depth=0, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=server, [email protected] Sat Jan 28 15:26:56 2023 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Sat Jan 28 15:26:56 2023 [server] Peer Connection Initiated with [AF_INET]77.234.43.175:553 Sat Jan 28 15:26:58 2023 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Sat Jan 28 15:26:58 2023 AUTH: Received control message: AUTH_FAILED Sat Jan 28 15:26:58 2023 SIGTERM[soft,auth-failure] received, process exiting
-
If anyone could help me that would be greatly appreciated, these are the steps I've done just to see if I could fix. reset router changed firmware from the newest to one update back, and then forward again tried multiple servers both UDP and TCP tried connecting via the different config files Checked subscription to HMA everything checks out. I have a virgin media hub 4 on the 1Gig broadband the hub 4 is in modem mode, and the XR700 is acting as the main router i've never had any issues with VPN Hybrid in the past. Just keeps telling me failed once trying to connect to any server.