Jump to content

Hunts

Members
  • Posts

    19
  • Joined

  • Last visited

About Hunts

  • Birthday January 22

Basic Info

  • Gender
    Male
  • DumaOS Routers Owned
    Netduma R2
    XR450

Online Presence

  • Discord
    Hunts#0001
  • Xbox Live
    Hunts

Gaming

  • Gamer Type
    Console Gamer
  • Favourite Genres
    Shooters
  • Connection Speed
    301-500mbps
  1. Fraser is there a way you guys could make a firmware update that gives the option to automatically allow any pinged servers/peers within the radius of the geo-filter?
  2. Sat Jan 28 20:17:07 2023 OpenVPN 2.4.7 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on May 12 2022 Sat Jan 28 20:17:07 2023 library versions: OpenSSL 1.0.2l-CVE-2022-0778 25 May 2017, LZO 2.06 Sat Jan 28 20:17:07 2023 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead. Sat Jan 28 20:17:07 2023 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sat Jan 28 20:17:07 2023 TCP/UDP: Preserving recently used remote address: [AF_INET]5.62.43.218:553 Sat Jan 28 20:17:07 2023 Socket Buffers: R=[163840->163840] S=[163840->163840] Sat Jan 28 20:17:07 2023 UDP link local: (not bound) Sat Jan 28 20:17:07 2023 UDP link remote: [AF_INET]5.62.43.218:553 Sat Jan 28 20:17:07 2023 TLS: Initial packet from [AF_INET]5.62.43.218:553, sid=3cd4f7c6 803efbd2 Sat Jan 28 20:17:07 2023 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Sat Jan 28 20:17:07 2023 VERIFY OK: depth=1, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=hidemyass.com, [email protected] Sat Jan 28 20:17:07 2023 VERIFY OK: nsCertType=SERVER Sat Jan 28 20:17:07 2023 VERIFY OK: depth=0, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=server, [email protected] Sat Jan 28 20:17:08 2023 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Sat Jan 28 20:17:08 2023 [server] Peer Connection Initiated with [AF_INET]5.62.43.218:553 Sat Jan 28 20:17:09 2023 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Sat Jan 28 20:17:09 2023 AUTH: Received control message: AUTH_FAILED Sat Jan 28 20:17:09 2023 SIGTERM[soft,auth-failure] received, process exiting
  3. Is there a way to completing factory reset the router? Obviously I have already done the reset button on the back but not sure if thats the same thing
  4. I've just said i've used both the basic and the advanced setup. The Log is identical everytime.. I know i'm not being stupid here, im using the only available login, that i've always used. i've reset password and retried. nothing is working, there has to be a fault somewhere Sat Jan 28 17:05:55 2023 OpenVPN 2.4.7 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on May 12 2022 Sat Jan 28 17:05:55 2023 library versions: OpenSSL 1.0.2l-CVE-2022-0778 25 May 2017, LZO 2.06 Sat Jan 28 17:05:55 2023 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead. Sat Jan 28 17:05:55 2023 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sat Jan 28 17:05:55 2023 TCP/UDP: Preserving recently used remote address: [AF_INET]77.234.43.185:553 Sat Jan 28 17:05:55 2023 Socket Buffers: R=[163840->163840] S=[163840->163840] Sat Jan 28 17:05:55 2023 UDP link local: (not bound) Sat Jan 28 17:05:55 2023 UDP link remote: [AF_INET]77.234.43.185:553 Sat Jan 28 17:05:55 2023 TLS: Initial packet from [AF_INET]77.234.43.185:553, sid=c69e44c6 eb689c32 Sat Jan 28 17:05:55 2023 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Sat Jan 28 17:05:55 2023 VERIFY OK: depth=1, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=hidemyass.com, [email protected] Sat Jan 28 17:05:55 2023 VERIFY OK: nsCertType=SERVER Sat Jan 28 17:05:55 2023 VERIFY OK: depth=0, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=server, [email protected] Sat Jan 28 17:05:55 2023 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Sat Jan 28 17:05:55 2023 [server] Peer Connection Initiated with [AF_INET]77.234.43.185:553 Sat Jan 28 17:05:57 2023 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Sat Jan 28 17:05:57 2023 AUTH: Received control message: AUTH_FAILED Sat Jan 28 17:05:57 2023 SIGTERM[soft,auth-failure] received, process exiting
  5. I've used the same details to login to both the basic and advanced for the last year, no issues. I just changed my HMA password and retried... still nothing
  6. Sat Jan 28 15:26:56 2023 OpenVPN 2.4.7 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on May 12 2022 Sat Jan 28 15:26:56 2023 library versions: OpenSSL 1.0.2l-CVE-2022-0778 25 May 2017, LZO 2.06 Sat Jan 28 15:26:56 2023 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead. Sat Jan 28 15:26:56 2023 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sat Jan 28 15:26:56 2023 TCP/UDP: Preserving recently used remote address: [AF_INET]77.234.43.175:553 Sat Jan 28 15:26:56 2023 Socket Buffers: R=[163840->163840] S=[163840->163840] Sat Jan 28 15:26:56 2023 UDP link local: (not bound) Sat Jan 28 15:26:56 2023 UDP link remote: [AF_INET]77.234.43.175:553 Sat Jan 28 15:26:56 2023 TLS: Initial packet from [AF_INET]77.234.43.175:553, sid=951e8dc6 c0f59612 Sat Jan 28 15:26:56 2023 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Sat Jan 28 15:26:56 2023 VERIFY OK: depth=1, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=hidemyass.com, [email protected] Sat Jan 28 15:26:56 2023 VERIFY OK: nsCertType=SERVER Sat Jan 28 15:26:56 2023 VERIFY OK: depth=0, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=server, [email protected] Sat Jan 28 15:26:56 2023 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Sat Jan 28 15:26:56 2023 [server] Peer Connection Initiated with [AF_INET]77.234.43.175:553 Sat Jan 28 15:26:58 2023 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Sat Jan 28 15:26:58 2023 AUTH: Received control message: AUTH_FAILED Sat Jan 28 15:26:58 2023 SIGTERM[soft,auth-failure] received, process exiting
  7. If anyone could help me that would be greatly appreciated, these are the steps I've done just to see if I could fix. reset router changed firmware from the newest to one update back, and then forward again tried multiple servers both UDP and TCP tried connecting via the different config files Checked subscription to HMA everything checks out. I have a virgin media hub 4 on the 1Gig broadband the hub 4 is in modem mode, and the XR700 is acting as the main router i've never had any issues with VPN Hybrid in the past. Just keeps telling me failed once trying to connect to any server.
×
×
  • Create New...