Jump to content

gorcey

Members
  • Posts

    3
  • Joined

  • Last visited

Basic Info

  • DumaOS Routers Owned
    Netduma R3
  1. this is what im getting Sat Nov 2 19:45:12 2024 OpenVPN 2.4.9 arm-buildroot-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Sat Nov 2 19:45:12 2024 library versions: OpenSSL 1.1.1f 31 Mar 2020, LZO 2.10 Sat Nov 2 19:45:12 2024 WARNING: --ping should normally be used with --ping-restart or --ping-exit Sat Nov 2 19:45:12 2024 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sat Nov 2 19:45:12 2024 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Sat Nov 2 19:45:12 2024 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication Sat Nov 2 19:45:12 2024 TCP/UDP: Preserving recently used remote address: [AF_INET]45.95.161.1:1194 Sat Nov 2 19:45:12 2024 Socket Buffers: R=[212992->212992] S=[212992->212992] Sat Nov 2 19:45:12 2024 UDP link local: (not bound) Sat Nov 2 19:45:12 2024 UDP link remote: [AF_INET]45.95.161.1:1194 Sat Nov 2 19:45:12 2024 TLS: Initial packet from [AF_INET]45.95.161.1:1194, sid=2781340a 04933015 Sat Nov 2 19:45:12 2024 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Sat Nov 2 19:45:13 2024 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA Sat Nov 2 19:45:13 2024 VERIFY OK: depth=1, O=NordVPN, CN=NordVPN CA9 Sat Nov 2 19:45:13 2024 VERIFY KU OK Sat Nov 2 19:45:13 2024 Validating certificate extended key usage Sat Nov 2 19:45:13 2024 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sat Nov 2 19:45:13 2024 VERIFY EKU OK Sat Nov 2 19:45:13 2024 VERIFY X509NAME OK: CN=bd1.nordvpn.com Sat Nov 2 19:45:13 2024 VERIFY OK: depth=0, CN=bd1.nordvpn.com Sat Nov 2 19:45:13 2024 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sat Nov 2 19:45:13 2024 [bd1.nordvpn.com] Peer Connection Initiated with [AF_INET]45.95.161.1:1194 Sat Nov 2 19:45:14 2024 SENT CONTROL [bd1.nordvpn.com]: 'PUSH_REQUEST' (status=1) Sat Nov 2 19:45:14 2024 AUTH: Received control message: AUTH_FAILED Sat Nov 2 19:45:14 2024 SIGTERM[soft,auth-failure] received, process exiting Error: CONNECTION TIMEOUT Openvpn terminated
  2. it doesn't work gives me a error my credentials are correct
  3. so i wanna setup the hybrid vpn so the location will be in bangladesh i have the config from nord vpn but dont know what to do next and cant find a answer what i need to copy this is the entire config can someone help me out client dev tun proto udp remote 45.95.161.1 1194 resolv-retry infinite remote-random nobind tun-mtu 1500 tun-mtu-extra 32 mssfix 1450 persist-key persist-tun ping 15 ping-restart 0 ping-timer-rem reneg-sec 0 comp-lzo no verify-x509-name CN=bd1.nordvpn.com remote-cert-tls server auth-user-pass verb 3 pull fast-io cipher AES-256-CBC auth SHA512 <ca> -----BEGIN CERTIFICATE----- MIIFCjCCAvKgAwIBAgIBATANBgkqhkiG9w0BAQ0FADA5MQswCQYDVQQGEwJQQTEQ MA4GA1UEChMHTm9yZFZQTjEYMBYGA1UEAxMPTm9yZFZQTiBSb290IENBMB4XDTE2 MDEwMTAwMDAwMFoXDTM1MTIzMTIzNTk1OVowOTELMAkGA1UEBhMCUEExEDAOBgNV BAoTB05vcmRWUE4xGDAWBgNVBAMTD05vcmRWUE4gUm9vdCBDQTCCAiIwDQYJKoZI hvcNAQEBBQADggIPADCCAgoCggIBAMkr/BYhyo0F2upsIMXwC6QvkZps3NN2/eQF kfQIS1gql0aejsKsEnmY0Kaon8uZCTXPsRH1gQNgg5D2gixdd1mJUvV3dE3y9FJr XMoDkXdCGBodvKJyU6lcfEVF6/UxHcbBguZK9UtRHS9eJYm3rpL/5huQMCppX7kU eQ8dpCwd3iKITqwd1ZudDqsWaU0vqzC2H55IyaZ/5/TnCk31Q1UP6BksbbuRcwOV skEDsm6YoWDnn/IIzGOYnFJRzQH5jTz3j1QBvRIuQuBuvUkfhx1FEwhwZigrcxXu MP+QgM54kezgziJUaZcOM2zF3lvrwMvXDMfNeIoJABv9ljw969xQ8czQCU5lMVmA 37ltv5Ec9U5hZuwk/9QO1Z+d/r6Jx0mlurS8gnCAKJgwa3kyZw6e4FZ8mYL4vpRR hPdvRTWCMJkeB4yBHyhxUmTRgJHm6YR3D6hcFAc9cQcTEl/I60tMdz33G6m0O42s Qt/+AR3YCY/RusWVBJB/qNS94EtNtj8iaebCQW1jHAhvGmFILVR9lzD0EzWKHkvy WEjmUVRgCDd6Ne3eFRNS73gdv/C3l5boYySeu4exkEYVxVRn8DhCxs0MnkMHWFK6 MyzXCCn+JnWFDYPfDKHvpff/kLDobtPBf+Lbch5wQy9quY27xaj0XwLyjOltpiST LWae/Q4vAgMBAAGjHTAbMAwGA1UdEwQFMAMBAf8wCwYDVR0PBAQDAgEGMA0GCSqG SIb3DQEBDQUAA4ICAQC9fUL2sZPxIN2mD32VeNySTgZlCEdVmlq471o/bDMP4B8g nQesFRtXY2ZCjs50Jm73B2LViL9qlREmI6vE5IC8IsRBJSV4ce1WYxyXro5rmVg/ k6a10rlsbK/eg//GHoJxDdXDOokLUSnxt7gk3QKpX6eCdh67p0PuWm/7WUJQxH2S DxsT9vB/iZriTIEe/ILoOQF0Aqp7AgNCcLcLAmbxXQkXYCCSB35Vp06u+eTWjG0/ pyS5V14stGtw+fA0DJp5ZJV4eqJ5LqxMlYvEZ/qKTEdoCeaXv2QEmN6dVqjDoTAo k0t5u4YRXzEVCfXAC3ocplNdtCA72wjFJcSbfif4BSC8bDACTXtnPC7nD0VndZLp +RiNLeiENhk0oTC+UVdSc+n2nJOzkCK0vYu0Ads4JGIB7g8IB3z2t9ICmsWrgnhd NdcOe15BincrGA8avQ1cWXsfIKEjbrnEuEk9b5jel6NfHtPKoHc9mDpRdNPISeVa wDBM1mJChneHt59Nh8Gah74+TM1jBsw4fhJPvoc7Atcg740JErb904mZfkIEmojC VPhBHVQ9LHBAdM8qFI2kRK0IynOmAZhexlP/aT/kpEsEPyaZQlnBn3An1CRz8h0S PApL8PytggYKeQmRhl499+6jLxcZ2IegLfqq41dzIjwHwTMplg+1pKIOVojpWA== -----END CERTIFICATE----- </ca> key-direction 1 <tls-auth> # # 2048 bit OpenVPN static key # -----BEGIN OpenVPN Static key V1----- e685bdaf659a25a200e2b9e39e51ff03 0fc72cf1ce07232bd8b2be5e6c670143 f51e937e670eee09d4f2ea5a6e4e6996 5db852c275351b86fc4ca892d78ae002 d6f70d029bd79c4d1c26cf14e9588033 cf639f8a74809f29f72b9d58f9b8f5fe fc7938eade40e9fed6cb92184abb2cc1 0eb1a296df243b251df0643d53724cdb 5a92a1d6cb817804c4a9319b57d53be5 80815bcfcb2df55018cc83fc43bc7ff8 2d51f9b88364776ee9d12fc85cc7ea5b 9741c4f598c485316db066d52db4540e 212e1518a9bd4828219e24b20d88f598 a196c9de96012090e333519ae18d3509 9427e7b372d348d352dc4c85e18cd4b9 3f8a56ddb2e64eb67adfc9b337157ff4 -----END OpenVPN Static key V1----- </tls-auth>
×
×
  • Create New...