I need to setup a VPN connection for my work, my head sent me an .ovpn config. Trying to establish a connection using it with no result. Connection ends up with "Connection Timeout -- Connection failed to establish witihn given time" error when I use OpenVPN Connect (3.3.6 (2752)). I`ve changed the "verb 3" line in the provided .ovpn file to "verb 7". Connection log:
Code: Select all
[Oct 19, 2022, 23:13:26] OpenVPN core 3.git::d3f8b18b win x86_64 64-bit built on Mar 17 2022 11:42:02
⏎[Oct 19, 2022, 23:13:26] Frame=512/2048/512 mssfix-ctrl=1250
⏎[Oct 19, 2022, 23:13:26] UNUSED OPTIONS
6 [nobind]
7 [persist-tun]
10 [verb] [7]
11 [mute] [3]
18 [sndbuf] [393216]
19 [rcvbuf] [393216]
⏎[Oct 19, 2022, 23:13:26] EVENT: RESOLVE ⏎[Oct 19, 2022, 23:13:26] Contacting 159.69.89.0:13250 via UDP
⏎[Oct 19, 2022, 23:13:26] EVENT: WAIT ⏎[Oct 19, 2022, 23:13:26] WinCommandAgent: transmitting bypass route to 159.69.89.0
{
"host" : "159.69.89.0",
"ipv6" : false
}
⏎[Oct 19, 2022, 23:13:26] Connecting to [159.69.89.0]:13250 (159.69.89.0) via UDPv4
⏎[Oct 19, 2022, 23:13:26] EVENT: CONNECTING ⏎[Oct 19, 2022, 23:13:26] Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client
⏎[Oct 19, 2022, 23:13:26] Creds: UsernameEmpty/PasswordEmpty
⏎[Oct 19, 2022, 23:13:26] Peer Info:
IV_VER=3.git::d3f8b18b
IV_PLAT=win
IV_NCP=2
IV_TCPNL=1
IV_PROTO=30
IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305:AES-128-CBC
IV_LZO_STUB=1
IV_COMP_STUB=1
IV_COMP_STUBv2=1
IV_AUTO_SESS=1
UV_ID=f138f87d112a4ffe8c38fbf326a10c0b
UV_NAME=lively-refuge-5434
UV_ASCLI_VER=3.3.6-2752
UV_PLAT_REL=Microsoft Windows 11 Home_10.0.22621
UV_UUID=32444335-3931-4A39-4435-846993586BC6
IV_GUI_VER=OCWindows_3.3.6-2752
IV_SSO=webauth,openurl,crtext
IV_HWADDR=14:13:33:28:b7:43
IV_SSL=OpenSSL 1.1.1n 15 Mar 2022
⏎[Oct 19, 2022, 23:14:26] EVENT: CONNECTION_TIMEOUT BYTES_IN : 54
BYTES_OUT : 19902
PACKETS_IN : 1
PACKETS_OUT : 61
CONNECTION_TIMEOUT : 1
⏎[Oct 19, 2022, 23:14:26] EVENT: DISCONNECTED ⏎
Code: Select all
2022-10-19 23:20:02 NOTE: debug verbosity (--verb 7) is enabled but this build lacks debug support.
2022-10-19 23:20:02 us=468000 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
2022-10-19 23:20:02 us=468000 Current Parameter Settings:
2022-10-19 23:20:02 us=468000 config = 'nwent_vk10_de.ovpn'
2022-10-19 23:20:02 us=468000 mode = 0
2022-10-19 23:20:02 us=468000 NOTE: --mute triggered...
2022-10-19 23:20:02 us=468000 298 variation(s) on previous 3 message(s) suppressed by --mute
2022-10-19 23:20:02 us=468000 OpenVPN 2.5.7 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on May 27 2022
2022-10-19 23:20:02 us=468000 Windows version 10.0 (Windows 10 or greater) 64bit
2022-10-19 23:20:02 us=468000 library versions: OpenSSL 1.1.1o 3 May 2022, LZO 2.10
2022-10-19 23:20:02 us=468000 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
2022-10-19 23:20:02 us=468000 Need hold release from management interface, waiting...
2022-10-19 23:20:02 us=953000 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
2022-10-19 23:20:03 us=62000 MANAGEMENT: CMD 'state on'
2022-10-19 23:20:03 us=62000 MANAGEMENT: CMD 'log all on'
2022-10-19 23:20:03 us=78000 MANAGEMENT: CMD 'echo all on'
2022-10-19 23:20:03 us=93000 NOTE: --mute triggered...
2022-10-19 23:20:03 us=93000 9 variation(s) on previous 3 message(s) suppressed by --mute
2022-10-19 23:20:03 us=93000 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2022-10-19 23:20:03 us=93000 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2022-10-19 23:20:03 us=93000 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 28 bytes
2022-10-19 23:20:03 us=93000 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
2022-10-19 23:20:03 us=93000 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-19 23:20:03 us=93000 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 56 bytes
2022-10-19 23:20:03 us=93000 calc_options_string_link_mtu: link-mtu 1622 -> 1558
2022-10-19 23:20:03 us=93000 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 56 bytes
2022-10-19 23:20:03 us=93000 NOTE: --mute triggered...
2022-10-19 23:20:03 us=93000 1 variation(s) on previous 3 message(s) suppressed by --mute
2022-10-19 23:20:03 us=93000 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
2022-10-19 23:20:03 us=93000 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
2022-10-19 23:20:03 us=93000 TCP/UDP: Preserving recently used remote address: [AF_INET]159.69.89.0:13250
2022-10-19 23:20:03 us=93000 Socket Buffers: R=[65536->393216] S=[65536->393216]
2022-10-19 23:20:03 us=93000 UDP link local: (not bound)
2022-10-19 23:20:03 us=93000 UDP link remote: [AF_INET]159.69.89.0:13250
2022-10-19 23:20:03 us=93000 MANAGEMENT: >STATE:1666203603,WAIT,,,,,,
2022-10-19 23:20:03 us=93000 UDP WRITE [42] to [AF_INET]159.69.89.0:13250: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0
2022-10-19 23:20:03 us=93000 UDP READ [0] from [AF_UNSPEC]: DATA UNDEF len=-1
2022-10-19 23:20:03 us=218000 UDP READ [54] from [AF_INET]159.69.89.0:13250: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ 0 ] pid=0 DATA len=0
2022-10-19 23:20:03 us=218000 MANAGEMENT: >STATE:1666203603,AUTH,,,,,,
2022-10-19 23:20:03 us=218000 TLS: Initial packet from [AF_INET]159.69.89.0:13250, sid=b1550bdc 2902f3d8
2022-10-19 23:20:03 us=218000 UDP WRITE [50] to [AF_INET]159.69.89.0:13250: P_ACK_V1 kid=0 pid=[ #2 ] [ 0 ]
2022-10-19 23:20:03 us=234000 UDP WRITE [319] to [AF_INET]159.69.89.0:13250: P_CONTROL_V1 kid=0 pid=[ #3 ] [ ] pid=1 DATA len=277
2022-10-19 23:20:05 us=375000 UDP WRITE [319] to [AF_INET]159.69.89.0:13250: P_CONTROL_V1 kid=0 pid=[ #4 ] [ ] pid=1 DATA len=277
2022-10-19 23:20:09 us=640000 NOTE: --mute triggered...
2022-10-19 23:21:03 us=234000 3 variation(s) on previous 3 message(s) suppressed by --mute
2022-10-19 23:21:03 us=234000 [UNDEF] Inactivity timeout (--ping-restart), restarting
2022-10-19 23:21:03 us=234000 TCP/UDP: Closing socket
2022-10-19 23:21:03 us=234000 SIGUSR1[soft,ping-restart] received, process restarting
2022-10-19 23:21:03 us=234000 MANAGEMENT: >STATE:1666203663,RECONNECTING,ping-restart,,,,,
2022-10-19 23:21:03 us=234000 Restart pause, 5 second(s)
2022-10-19 23:21:08 us=296000 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2022-10-19 23:21:08 us=296000 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2022-10-19 23:21:08 us=296000 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 28 bytes
2022-10-19 23:21:08 us=296000 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
2022-10-19 23:21:08 us=296000 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-19 23:21:08 us=296000 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 56 bytes
2022-10-19 23:21:08 us=296000 calc_options_string_link_mtu: link-mtu 1622 -> 1558
2022-10-19 23:21:08 us=296000 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 56 bytes
2022-10-19 23:21:08 us=296000 NOTE: --mute triggered...
2022-10-19 23:21:08 us=296000 1 variation(s) on previous 3 message(s) suppressed by --mute
2022-10-19 23:21:08 us=296000 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
2022-10-19 23:21:08 us=296000 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
2022-10-19 23:21:08 us=296000 TCP/UDP: Preserving recently used remote address: [AF_INET]159.69.89.0:13250
2022-10-19 23:21:08 us=296000 Socket Buffers: R=[65536->393216] S=[65536->393216]
2022-10-19 23:21:08 us=296000 UDP link local: (not bound)
2022-10-19 23:21:08 us=296000 UDP link remote: [AF_INET]159.69.89.0:13250
2022-10-19 23:21:08 us=296000 MANAGEMENT: >STATE:1666203668,WAIT,,,,,,
2022-10-19 23:21:08 us=296000 UDP WRITE [42] to [AF_INET]159.69.89.0:13250: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0
2022-10-19 23:21:08 us=312000 UDP READ [0] from [AF_UNSPEC]: DATA UNDEF len=-1
2022-10-19 23:21:08 us=421000 UDP READ [54] from [AF_INET]159.69.89.0:13250: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ 0 ] pid=0 DATA len=0
2022-10-19 23:21:08 us=421000 MANAGEMENT: >STATE:1666203668,AUTH,,,,,,
2022-10-19 23:21:08 us=421000 TLS: Initial packet from [AF_INET]159.69.89.0:13250, sid=6e5d0ac7 e4037564
2022-10-19 23:21:08 us=421000 UDP WRITE [50] to [AF_INET]159.69.89.0:13250: P_ACK_V1 kid=0 pid=[ #2 ] [ 0 ]
2022-10-19 23:21:08 us=437000 UDP WRITE [319] to [AF_INET]159.69.89.0:13250: P_CONTROL_V1 kid=0 pid=[ #3 ] [ ] pid=1 DATA len=277
2022-10-19 23:21:10 us=609000 UDP WRITE [319] to [AF_INET]159.69.89.0:13250: P_CONTROL_V1 kid=0 pid=[ #4 ] [ ] pid=1 DATA len=277
2022-10-19 23:21:14 us=968000 NOTE: --mute triggered...
2022-10-19 23:22:08 us=921000 3 variation(s) on previous 3 message(s) suppressed by --mute
2022-10-19 23:22:08 us=921000 [UNDEF] Inactivity timeout (--ping-restart), restarting
2022-10-19 23:22:08 us=921000 TCP/UDP: Closing socket
2022-10-19 23:22:08 us=921000 SIGUSR1[soft,ping-restart] received, process restarting
2022-10-19 23:22:08 us=921000 MANAGEMENT: >STATE:1666203728,RECONNECTING,ping-restart,,,,,
2022-10-19 23:22:08 us=921000 Restart pause, 5 second(s)
2022-10-19 23:22:13 us=968000 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2022-10-19 23:22:13 us=984000 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2022-10-19 23:22:13 us=984000 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 28 bytes
2022-10-19 23:22:13 us=984000 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
2022-10-19 23:22:13 us=984000 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-19 23:22:13 us=984000 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 56 bytes
2022-10-19 23:22:13 us=984000 calc_options_string_link_mtu: link-mtu 1622 -> 1558
2022-10-19 23:22:13 us=984000 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 56 bytes
2022-10-19 23:22:13 us=984000 NOTE: --mute triggered...
2022-10-19 23:22:13 us=984000 1 variation(s) on previous 3 message(s) suppressed by --mute
2022-10-19 23:22:13 us=984000 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
2022-10-19 23:22:13 us=984000 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
2022-10-19 23:22:13 us=984000 TCP/UDP: Preserving recently used remote address: [AF_INET]159.69.89.0:13250
2022-10-19 23:22:13 us=984000 Socket Buffers: R=[65536->393216] S=[65536->393216]
2022-10-19 23:22:13 us=984000 UDP link local: (not bound)
2022-10-19 23:22:13 us=984000 UDP link remote: [AF_INET]159.69.89.0:13250
2022-10-19 23:22:13 us=984000 MANAGEMENT: >STATE:1666203733,WAIT,,,,,,
2022-10-19 23:22:13 us=984000 UDP WRITE [42] to [AF_INET]159.69.89.0:13250: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0
2022-10-19 23:22:13 us=984000 UDP READ [0] from [AF_UNSPEC]: DATA UNDEF len=-1
2022-10-19 23:22:14 us=156000 UDP READ [54] from [AF_INET]159.69.89.0:13250: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ 0 ] pid=0 DATA len=0
2022-10-19 23:22:14 us=156000 MANAGEMENT: >STATE:1666203734,AUTH,,,,,,
2022-10-19 23:22:14 us=156000 TLS: Initial packet from [AF_INET]159.69.89.0:13250, sid=b613fb7d 809d1052
2022-10-19 23:22:14 us=156000 UDP WRITE [50] to [AF_INET]159.69.89.0:13250: P_ACK_V1 kid=0 pid=[ #2 ] [ 0 ]
2022-10-19 23:22:14 us=156000 UDP WRITE [319] to [AF_INET]159.69.89.0:13250: P_CONTROL_V1 kid=0 pid=[ #3 ] [ ] pid=1 DATA len=277
2022-10-19 23:22:16 us=515000 UDP WRITE [319] to [AF_INET]159.69.89.0:13250: P_CONTROL_V1 kid=0 pid=[ #4 ] [ ] pid=1 DATA len=277
2022-10-19 23:22:20 us=46000 NOTE: --mute triggered...
2022-10-19 23:23:14 us=828000 3 variation(s) on previous 3 message(s) suppressed by --mute
2022-10-19 23:23:14 us=828000 [UNDEF] Inactivity timeout (--ping-restart), restarting
2022-10-19 23:23:14 us=828000 TCP/UDP: Closing socket
2022-10-19 23:23:14 us=828000 SIGUSR1[soft,ping-restart] received, process restarting
2022-10-19 23:23:14 us=828000 MANAGEMENT: >STATE:1666203794,RECONNECTING,ping-restart,,,,,
2022-10-19 23:23:14 us=828000 Restart pause, 5 second(s)
2022-10-19 23:23:19 us=875000 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2022-10-19 23:23:19 us=875000 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2022-10-19 23:23:19 us=875000 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 28 bytes
2022-10-19 23:23:19 us=875000 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
2022-10-19 23:23:19 us=875000 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-19 23:23:19 us=875000 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 56 bytes
2022-10-19 23:23:19 us=875000 calc_options_string_link_mtu: link-mtu 1622 -> 1558
2022-10-19 23:23:19 us=875000 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 56 bytes
2022-10-19 23:23:19 us=875000 NOTE: --mute triggered...
2022-10-19 23:23:19 us=875000 1 variation(s) on previous 3 message(s) suppressed by --mute
2022-10-19 23:23:19 us=875000 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
2022-10-19 23:23:19 us=875000 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
2022-10-19 23:23:19 us=875000 TCP/UDP: Preserving recently used remote address: [AF_INET]159.69.89.0:13250
2022-10-19 23:23:19 us=875000 Socket Buffers: R=[65536->393216] S=[65536->393216]
2022-10-19 23:23:19 us=875000 UDP link local: (not bound)
2022-10-19 23:23:19 us=875000 UDP link remote: [AF_INET]159.69.89.0:13250
2022-10-19 23:23:19 us=875000 MANAGEMENT: >STATE:1666203799,WAIT,,,,,,
2022-10-19 23:23:19 us=875000 UDP WRITE [42] to [AF_INET]159.69.89.0:13250: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0
2022-10-19 23:23:19 us=890000 UDP READ [0] from [AF_UNSPEC]: DATA UNDEF len=-1
2022-10-19 23:23:20 us=62000 UDP READ [54] from [AF_INET]159.69.89.0:13250: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ 0 ] pid=0 DATA len=0
2022-10-19 23:23:20 us=62000 MANAGEMENT: >STATE:1666203800,AUTH,,,,,,
2022-10-19 23:23:20 us=62000 TLS: Initial packet from [AF_INET]159.69.89.0:13250, sid=f1947c90 8c01bf76
2022-10-19 23:23:20 us=62000 UDP WRITE [50] to [AF_INET]159.69.89.0:13250: P_ACK_V1 kid=0 pid=[ #2 ] [ 0 ]
2022-10-19 23:23:20 us=93000 UDP WRITE [319] to [AF_INET]159.69.89.0:13250: P_CONTROL_V1 kid=0 pid=[ #3 ] [ ] pid=1 DATA len=277
2022-10-19 23:23:21 us=156000 TCP/UDP: Closing socket
2022-10-19 23:23:21 us=156000 SIGTERM[hard,] received, process exiting
2022-10-19 23:23:21 us=156000 MANAGEMENT: >STATE:1666203801,EXITING,SIGTERM,,,,,
2022-10-19 23:23:21 us=156000 PKCS#11: Terminating openssl
2022-10-19 23:23:21 us=156000 PKCS#11: Removing providers
2022-10-19 23:23:21 us=156000 PKCS#11: Releasing sessions
2022-10-19 23:23:21 us=156000 NOTE: --mute triggered...
Could someone please help me out with connection? I will be glad to provide more info if it is needed.
Thanks in advance!