Jump to content

Hybrid VPN failing from time to time.


Recommended Posts

Hey,

XR700 using hybrid VPN from nordVPN with TCP file.

From time to time my connections is failing, anyone who can read the log file, and help me find a solution or atleast a reason?

Once every hour its running a check starting with "TLS: tls_process......", 21 october 05:50 shit got real. Help anyone :D

I removed all ip adresses and replaced with IP.

Wed Oct 21 03:13:22 2020 TLS: tls_process: killed expiring key
Wed Oct 21 03:13:23 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Wed Oct 21 03:13:23 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Wed Oct 21 03:13:23 2020 VERIFY KU OK
Wed Oct 21 03:13:23 2020 Validating certificate extended key usage
Wed Oct 21 03:13:23 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Oct 21 03:13:23 2020 VERIFY EKU OK
Wed Oct 21 03:13:23 2020 VERIFY OK: depth=0, CN=dk221.nordvpn.com
Wed Oct 21 03:13:23 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Oct 21 03:13:23 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Oct 21 03:13:23 2020 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Wed Oct 21 04:13:22 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Wed Oct 21 04:13:22 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Wed Oct 21 04:13:22 2020 VERIFY KU OK
Wed Oct 21 04:13:22 2020 Validating certificate extended key usage
Wed Oct 21 04:13:22 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Oct 21 04:13:22 2020 VERIFY EKU OK
Wed Oct 21 04:13:22 2020 VERIFY OK: depth=0, CN=dk221.nordvpn.com
Wed Oct 21 04:13:23 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Oct 21 04:13:23 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Oct 21 04:13:23 2020 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Wed Oct 21 05:13:22 2020 TLS: tls_process: killed expiring key
Wed Oct 21 05:13:22 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Wed Oct 21 05:13:22 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Wed Oct 21 05:13:22 2020 VERIFY KU OK
Wed Oct 21 05:13:22 2020 Validating certificate extended key usage
Wed Oct 21 05:13:22 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Oct 21 05:13:22 2020 VERIFY EKU OK
Wed Oct 21 05:13:22 2020 VERIFY OK: depth=0, CN=dk221.nordvpn.com
Wed Oct 21 05:13:22 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Oct 21 05:13:22 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Oct 21 05:13:22 2020 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Wed Oct 21 05:50:57 2020 Connection reset, restarting [-1]
Wed Oct 21 05:50:57 2020 SIGUSR1[soft,connection-reset] received, process restarting
Wed Oct 21 05:50:57 2020 Restart pause, 5 second(s)
Wed Oct 21 05:51:02 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Wed Oct 21 05:51:02 2020 NOTE: --fast-io is disabled since we are not using UDP
Wed Oct 21 05:51:02 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]IP
Wed Oct 21 05:51:02 2020 Socket Buffers: R=[87380->327680] S=[16384->327680]
Wed Oct 21 05:51:02 2020 Attempting to establish TCP connection with [AF_INET]IP [nonblock]
Wed Oct 21 05:51:03 2020 TCP connection established with [AF_INET]IP
Wed Oct 21 05:51:03 2020 TCP_CLIENT link local: (not bound)
Wed Oct 21 05:51:03 2020 TCP_CLIENT link remote: [AF_INET] IP
Wed Oct 21 05:51:03 2020 TLS: Initial packet from [AF_INET]IP, sid=b5361e54 ee6babbf
Wed Oct 21 05:51:03 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Wed Oct 21 05:51:03 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Wed Oct 21 05:51:03 2020 VERIFY KU OK
Wed Oct 21 05:51:03 2020 Validating certificate extended key usage
Wed Oct 21 05:51:03 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Oct 21 05:51:03 2020 VERIFY EKU OK
Wed Oct 21 05:51:03 2020 VERIFY OK: depth=0, CN=dk221.nordvpn.com
Wed Oct 21 05:51:03 2020 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Wed Oct 21 05:51:03 2020 [dk221.nordvpn.com] Peer Connection Initiated with [AF_INET]IP
Wed Oct 21 05:51:04 2020 SENT CONTROL [dk221.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Wed Oct 21 05:51:04 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.3.1,topology subnet,ping 60,ping-restart 180,ifconfig IP,peer-id 0,cipher AES-256-GCM'
Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: timers and/or timeouts modified
Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: compression parms modified
Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Wed Oct 21 05:51:04 2020 Socket Buffers: R=[327680->327680] S=[327680->327680]
Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: --ifconfig/up options modified
Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: route options modified
Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: route-related options modified
Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: peer-id set
Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: adjusting link_mtu to 1659
Wed Oct 21 05:51:04 2020 OPTIONS IMPORT: data channel crypto options modified
Wed Oct 21 05:51:04 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Wed Oct 21 05:51:04 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Oct 21 05:51:04 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Oct 21 05:51:04 2020 Preserving previous TUN/TAP instance: tun0
Wed Oct 21 05:51:04 2020 NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
Wed Oct 21 05:51:04 2020 Closing TUN/TAP interface
Wed Oct 21 05:51:04 2020 /sbin/ifconfig tun0 0.0.0.0
Wed Oct 21 05:51:04 2020 /dumaos/apps/usr/com.netdumasoftware.hybridvpn/openvpn-event.lua openvpndown 4 tun0 1500 1587 IP init
openvpn-event.lua: bad argument #3 to 'format' (string expected, got nil) -> stack traceback:
    ?: in function <?:73>
    [C]: in function 'format'
    ?: in function 'safe_execute'
    ?: in function '?'
    ?: in function 'on_vpn_down'
    ?: in function '?'
    ?: in function '?'
    ?: in function '?'
    ?: in function <?:48>
    [C]: in function 'xpcall'
    ?: in function 'try'
    ?: in function <?:46>
    [C]: in function 'run'
    ?: in function <?:356>
    [C]: in function 'xpcall'
    ?: in function 'try'
    ?: in function <?:261>
    (tail call): ?
    /dumaos/api/cli.lua:48: in function </dumaos/api/cli.lua:30>
    [C]: in function 'xpcall'
    /dumaos/api/cli.lua:59: in main chunk
    [C]: ?
Wed Oct 21 05:51:04 2020 WARNING: Failed running command (--up/--down): external program exited with error status: 3
Wed Oct 21 05:51:04 2020 Exiting due to fatal error

Link to comment
Share on other sites

Like this??? keepalive with BOLD

 

 

client
dev tun
proto tcp
remote 185.245.84.83 443
resolv-retry infinite
remote-random
nobind
tun-mtu 1500
tun-mtu-extra 32
mssfix 1450
persist-key
persist-tun
ping 15
ping-restart 0
ping-timer-rem
reneg-sec 0
comp-lzo no

keepalive 10 30

remote-cert-tls server

auth-user-pass
verb 3
pull
fast-io
cipher AES-256-CBC
auth SHA512
<ca>
-----BEGIN CERTIFICATE-----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==
-----END CERTIFICATE-----
</ca>
key-direction 1
<tls-auth>
#
# 2048 bit OpenVPN static key
#
-----BEGIN OpenVPN Static key V1-----
e685bdaf659a25a200e2b9e39e51ff03
0fc72cf1ce07232bd8b2be5e6c670143
f51e937e670eee09d4f2ea5a6e4e6996
5db852c275351b86fc4ca892d78ae002
d6f70d029bd79c4d1c26cf14e9588033
cf639f8a74809f29f72b9d58f9b8f5fe
fc7938eade40e9fed6cb92184abb2cc1
0eb1a296df243b251df0643d53724cdb
5a92a1d6cb817804c4a9319b57d53be5
80815bcfcb2df55018cc83fc43bc7ff8
2d51f9b88364776ee9d12fc85cc7ea5b
9741c4f598c485316db066d52db4540e
212e1518a9bd4828219e24b20d88f598
a196c9de96012090e333519ae18d3509
9427e7b372d348d352dc4c85e18cd4b9
3f8a56ddb2e64eb67adfc9b337157ff4
-----END OpenVPN Static key V1-----
</tls-auth>

 

Link to comment
Share on other sites

32 minutes ago, Netduma Fraser said:

Hey, welcome to the forum!

Add --keepalive 10 30 to your config and see if that helps it to sustain a connection.

thanks!

This is the output after i put in --keepalive 10 30

Options error: --keepalive conflicts with --ping, --ping-exit, or --ping-restart. If you use --keepalive, you don't need any of the other --ping directives. Use --help for more information.

Link to comment
Share on other sites

Failed again :(

Thu Oct 22 15:10:30 2020 TLS: tls_process: killed expiring key
Thu Oct 22 15:10:31 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Thu Oct 22 15:10:31 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Thu Oct 22 15:10:31 2020 VERIFY KU OK
Thu Oct 22 15:10:31 2020 Validating certificate extended key usage
Thu Oct 22 15:10:31 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Oct 22 15:10:31 2020 VERIFY EKU OK
Thu Oct 22 15:10:31 2020 VERIFY OK: depth=0, CN=dk218.nordvpn.com
Thu Oct 22 15:10:31 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Oct 22 15:10:31 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Oct 22 15:10:31 2020 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Thu Oct 22 16:10:31 2020 TLS: tls_process: killed expiring key
Thu Oct 22 16:10:32 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Thu Oct 22 16:10:32 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Thu Oct 22 16:10:32 2020 VERIFY KU OK
Thu Oct 22 16:10:32 2020 Validating certificate extended key usage
Thu Oct 22 16:10:32 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Oct 22 16:10:32 2020 VERIFY EKU OK
Thu Oct 22 16:10:32 2020 VERIFY OK: depth=0, CN=dk218.nordvpn.com
Thu Oct 22 16:10:33 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Oct 22 16:10:33 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Oct 22 16:10:33 2020 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Thu Oct 22 16:45:51 2020 [dk218.nordvpn.com] Inactivity timeout (--ping-restart), restarting
Thu Oct 22 16:45:51 2020 SIGUSR1[soft,ping-restart] received, process restarting
Thu Oct 22 16:45:51 2020 Restart pause, 5 second(s)
Thu Oct 22 16:45:56 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Oct 22 16:45:56 2020 NOTE: --fast-io is disabled since we are not using UDP
Thu Oct 22 16:45:56 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]IP
Thu Oct 22 16:45:56 2020 Socket Buffers: R=[87380->327680] S=[16384->327680]
Thu Oct 22 16:45:56 2020 Attempting to establish TCP connection with [AF_INET]IP [nonblock]
Thu Oct 22 16:45:57 2020 TCP connection established with [AF_INET]IP
Thu Oct 22 16:45:57 2020 TCP_CLIENT link local: (not bound)
Thu Oct 22 16:45:57 2020 TCP_CLIENT link remote: [AF_INET]IP
Thu Oct 22 16:45:57 2020 TLS: Initial packet from [AF_INET]IP, sid=d4f968b3 cb7ccb79
Thu Oct 22 16:45:57 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Thu Oct 22 16:45:57 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Thu Oct 22 16:45:57 2020 VERIFY KU OK
Thu Oct 22 16:45:57 2020 Validating certificate extended key usage
Thu Oct 22 16:45:57 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Oct 22 16:45:57 2020 VERIFY EKU OK
Thu Oct 22 16:45:57 2020 VERIFY OK: depth=0, CN=dk218.nordvpn.com
Thu Oct 22 16:45:57 2020 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Thu Oct 22 16:45:57 2020 [dk218.nordvpn.com] Peer Connection Initiated with [AF_INET]IP
Thu Oct 22 16:45:58 2020 SENT CONTROL [dk218.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Thu Oct 22 16:45:58 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS IP,dhcp-option DNS IP,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway IP,topology subnet,ping 60,ping-restart 180,ifconfig IP,peer-id 0,cipher AES-256-GCM'
Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: timers and/or timeouts modified
Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: compression parms modified
Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Thu Oct 22 16:45:58 2020 Socket Buffers: R=[327680->327680] S=[327680->327680]
Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: --ifconfig/up options modified
Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: route options modified
Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: route-related options modified
Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: peer-id set
Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: adjusting link_mtu to 1659
Thu Oct 22 16:45:58 2020 OPTIONS IMPORT: data channel crypto options modified
Thu Oct 22 16:45:58 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Oct 22 16:45:58 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Oct 22 16:45:58 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Oct 22 16:45:58 2020 Preserving previous TUN/TAP instance: tun0
Thu Oct 22 16:45:58 2020 NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
Thu Oct 22 16:45:58 2020 Closing TUN/TAP interface
Thu Oct 22 16:45:58 2020 /sbin/ifconfig tun0 0.0.0.0
Thu Oct 22 16:45:58 2020 /dumaos/apps/usr/com.netdumasoftware.hybridvpn/openvpn-event.lua openvpndown 7 tun0 1500 1587 IP init
openvpn-event.lua: bad argument #3 to 'format' (string expected, got nil) -> stack traceback:
    ?: in function <?:73>
    [C]: in function 'format'
    ?: in function 'safe_execute'
    ?: in function '?'
    ?: in function 'on_vpn_down'
    ?: in function '?'
    ?: in function '?'
    ?: in function '?'
    ?: in function <?:48>
    [C]: in function 'xpcall'
    ?: in function 'try'
    ?: in function <?:46>
    [C]: in function 'run'
    ?: in function <?:356>
    [C]: in function 'xpcall'
    ?: in function 'try'
    ?: in function <?:261>
    (tail call): ?
    /dumaos/api/cli.lua:48: in function </dumaos/api/cli.lua:30>
    [C]: in function 'xpcall'
    /dumaos/api/cli.lua:59: in main chunk
    [C]: ?
Thu Oct 22 16:45:58 2020 WARNING: Failed running command (--up/--down): external program exited with error status: 3
Thu Oct 22 16:45:58 2020 Exiting due to fatal error

Link to comment
Share on other sites

  • 4 weeks later...

Annnd im back :D

 

Still having issues. I talked with my VPN provider which handed me some service credentials.

The result was a more stable connection(for some reason), but still failing, but now with 1 week in between.

 

Anything else i can try ?

 

 

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

×
×
  • Create New...