maikcat wrote:hi there,
the telnet test janjust mentioned works only if tcp is used.
you have to check 3 things:
1)if router on your client side is blocking outbound access
2)if router on your server side is blocking inbound access
3)if vpn server itself performs any type of filtering
cheers,
michael.
Hi...
i think i found what's the problem!
The ISP is blocking any kind of package which have some parameters in their headers.
for example if in the header of package which send from openvpn some sort of detail available which shows that it's a openvpn package and contain of it encrypted they drop this to not allow people tunneling the censorship engine so is there anything available to change the header of packages? like some sort of script or things like that?
I already use ta.key but nothing changed.
here is my config files and log file
server config file
Code: Select all
local X.X.X.X
port 443
proto tcp
dev tun
ifconfig 10.9.0.1 255.255.255.0
ca "C:\\Program Files\\OpenVPN\\easy-rsa\\keys\\ca.crt"
cert "C:\\Program Files\\OpenVPN\\easy-rsa\\keys\\server.crt"
key "C:\\Program Files\\OpenVPN\\easy-rsa\\keys\\server.key"
dh "C:\\Program Files\\OpenVPN\\easy-rsa\\keys\\dh1024.pem"
tls-auth "C:\\Program Files\\OpenVPN\\easy-rsa\\keys\\ta.key" 0
server 10.9.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt
push "redirect-gateway"
push "dhcp-option DNS 208.67.222.222"
push "dhcp-option DNS 208.67.220.220"
keepalive 5 30
comp-lzo
cipher AES-256-CBC
persist-key
persist-tun
status server-tcp.log
verb 3
client config file
Code: Select all
client
dev tap
proto tcp
remote X.X.X.X 54698
resolv-retry infinite
nobind
persist-key
persist-tun
ca "C:\\Program Files\\OpenVPN\\easy-rsa\\keys\\ca.crt"
cert "C:\\Program Files\\OpenVPN\\easy-rsa\\keys\\asghar.crt"
key "C:\\Program Files\\OpenVPN\\easy-rsa\\keys\\asghar.key"
tls-auth "C:\\Program Files\\OpenVPN\\easy-rsa\\keys\\ta.key" 1
ns-cert-type server
cipher AES-256-CBC
comp-lzo
verb 3
Server log
Code: Select all
Thu Mar 03 09:30:31 2011 MULTI: multi_create_instance called
Thu Mar 03 09:30:31 2011 Re-using SSL/TLS context
Thu Mar 03 09:30:31 2011 LZO compression initialized
Thu Mar 03 09:30:31 2011 Control Channel MTU parms [ L:1549 D:168 EF:68 EB:0 ET:0 EL:0 ]
Thu Mar 03 09:30:31 2011 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:135 ET:0 EL:0 AF:3/1 ]
Thu Mar 03 09:30:31 2011 Local Options hash (VER=V4): 'eca919a6'
Thu Mar 03 09:30:31 2011 Expected Remote Options hash (VER=V4): 'faf8d2b2'
Thu Mar 03 09:30:31 2011 TCP connection established with Y.Y.Y.Y:18003
Thu Mar 03 09:30:31 2011 TCPv4_SERVER link local: [undef]
Thu Mar 03 09:30:31 2011 TCPv4_SERVER link remote: Y.Y.Y.Y:18003
Thu Mar 03 09:30:31 2011 Y.Y.Y.Y:18003 TLS: Initial packet from Y.Y.Y.Y:18003, sid=7f19c2aa f81a8645
Thu Mar 03 09:31:31 2011 Y.Y.Y.Y:18003 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Thu Mar 03 09:31:31 2011 Y.Y.Y.Y:18003 TLS Error: TLS handshake failed
Thu Mar 03 09:31:31 2011 Y.Y.Y.Y:18003 Fatal TLS error (check_tls_errors_co), restarting
Thu Mar 03 09:31:31 2011 Y.Y.Y.Y:18003 SIGUSR1[soft,tls-error] received, client-instance restarting
Thu Mar 03 09:31:31 2011 TCP/UDP: Closing socket
Client log
Code: Select all
Thu Mar 03 19:00:27 2011 OpenVPN 2.1.4 i686-pc-mingw32 [SSL] [LZO2] [PKCS11] built on Nov 8 2010
Thu Mar 03 19:00:27 2011 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Thu Mar 03 19:00:27 2011 Control Channel Authentication: using 'C:\Program Files\OpenVPN\easy-rsa\keys\ta.key' as a OpenVPN static key file
Thu Mar 03 19:00:27 2011 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Mar 03 19:00:27 2011 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Mar 03 19:00:27 2011 LZO compression initialized
Thu Mar 03 19:00:27 2011 Control Channel MTU parms [ L:1549 D:168 EF:68 EB:0 ET:0 EL:0 ]
Thu Mar 03 19:00:27 2011 Socket Buffers: R=[8192->8192] S=[8192->8192]
Thu Mar 03 19:00:27 2011 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:135 ET:0 EL:0 AF:3/1 ]
Thu Mar 03 19:00:27 2011 Local Options hash (VER=V4): 'faf8d2b2'
Thu Mar 03 19:00:27 2011 Expected Remote Options hash (VER=V4): 'eca919a6'
Thu Mar 03 19:00:27 2011 Attempting to establish TCP connection with X.X.X.X:443
Thu Mar 03 19:00:27 2011 TCP connection established with X.X.X.X:443
Thu Mar 03 19:00:27 2011 TCPv4_CLIENT link local: [undef]
Thu Mar 03 19:00:27 2011 TCPv4_CLIENT link remote: X.X.X.X:443
Thu Mar 03 19:00:28 2011 TLS: Initial packet from X.X.X.X:443, sid=9f09d0c3 0b3e549a
Thu Mar 03 19:01:27 2011 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Thu Mar 03 19:01:27 2011 TLS Error: TLS handshake failed
Thu Mar 03 19:01:27 2011 Fatal TLS error (check_tls_errors_co), restarting
Thu Mar 03 19:01:27 2011 TCP/UDP: Closing socket
Thu Mar 03 19:01:27 2011 SIGUSR1[soft,tls-error] received, process restarting
Thu Mar 03 19:01:27 2011 Restart pause, 5 second(s)