Jump to content

Trouble connecting Hybrid VPN


Recommended Posts

Last log: 

 

Wed Sep 6 00:35:53 2023 us=733438 OpenVPN 2.4.7 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Wed Sep 6 00:35:53 2023 us=733810 library versions: OpenSSL 1.0.2p 14 Aug 2018, LZO 2.10 Wed Sep 6 00:35:53 2023 us=734402 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Wed Sep 6 00:35:53 2023 us=738784 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication Wed Sep 6 00:35:53 2023 us=739201 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication Wed Sep 6 00:35:53 2023 us=740064 Control Channel MTU parms [ L:1623 D:1170 EF:80 EB:0 ET:0 EL:3 ] Wed Sep 6 00:35:53 2023 us=923103 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ] Wed Sep 6 00:35:53 2023 us=923830 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1571,tun-mtu 1500,proto TCPv4_CLIENT,keydir 1,cipher AES-256-CBC,auth SHA256,keysize 256,tls-auth,key-method 2,tls-client' Wed Sep 6 00:35:53 2023 us=924066 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1571,tun-mtu 1500,proto TCPv4_SERVER,keydir 0,cipher AES-256-CBC,auth SHA256,keysize 256,tls-auth,key-method 2,tls-server' Wed Sep 6 00:35:53 2023 us=924345 TCP/UDP: Preserving recently used remote address: [AF_INET]102.68.86.130:1194 Wed Sep 6 00:35:53 2023 us=924681 Socket Buffers: R=[87380->87380] S=[16384->16384] Wed Sep 6 00:35:53 2023 us=924910 Attempting to establish TCP connection with [AF_INET]102.68.86.130:1194 [nonblock] Wed Sep 6 00:35:54 2023 us=926632 TCP connection established with [AF_INET]102.68.86.130:1194 Wed Sep 6 00:35:54 2023 us=927062 TCP_CLIENT link local: (not bound) Wed Sep 6 00:35:54 2023 us=927269 TCP_CLIENT link remote: [AF_INET]102.68.86.130:1194 Wed Sep 6 00:35:55 2023 us=936289 TLS: Initial packet from [AF_INET]102.68.86.130:1194, sid=631e0fb9 53571ef5 Wed Sep 6 00:35:55 2023 us=937608 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Wed Sep 6 00:35:59 2023 us=811097 VERIFY OK: depth=1, CN=Easy-RSA CA Wed Sep 6 00:35:59 2023 us=816112 VERIFY KU OK Wed Sep 6 00:35:59 2023 us=816473 Validating certificate extended key usage Wed Sep 6 00:35:59 2023 us=816727 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Wed Sep 6 00:35:59 2023 us=816911 VERIFY EKU OK Wed Sep 6 00:35:59 2023 us=817090 VERIFY OK: depth=0, CN=serverultimate Wed Sep 6 00:36:01 2023 us=307448 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Wed Sep 6 00:36:01 2023 us=308061 [serverultimate] Peer Connection Initiated with [AF_INET]102.68.86.130:1194 Wed Sep 6 00:36:02 2023 us=367686 SENT CONTROL [serverultimate]: 'PUSH_REQUEST' (status=1) Error: CONNECTION TIMEOUT Wed Sep 6 00:36:02 2023 us=720053 event_wait : Interrupted system call (code=4) Wed Sep 6 00:36:02 2023 us=722054 TCP/UDP: Closing socket Wed Sep 6 00:36:02 2023 us=723142 SIGINT[hard,] received, process exiting

Link to comment
Share on other sites

  • Administrators

Are you using the basic setup or the advanced setup? If you're using the basic setup you will need to use the advanced setup by obtaining the OpenVPN configuration file for the server you want to connect to from the VPN provider and enter it into advanced setup.

If you're using the advanced setup could you provide the configuration file you're using please?

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

×
×
  • Create New...