Not signed in (Sign In)

Welcome, Guest

Want to take part in these discussions? Sign in if you have an account, or apply for one below

Vanilla 1.1.10 is a product of Lussumo. More Information: Documentation, Community Support.

  1.  
    am trying to connect my ip on my window 8 pls get back to me asap


    Sat Nov 07 15:21:37 2015 OpenVPN 2.1.4 i686-pc-mingw32 [SSL] [LZO2] [PKCS11] built on Nov 8 2010
    Sat Nov 07 15:21:47 2015 WARNING: Make sure you understand the semantics of --tls-remote before using it (see the man page).
    Sat Nov 07 15:21:47 2015 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
    Sat Nov 07 15:21:47 2015 NOTE: --script-security method='system' is deprecated due to the fact that passed parameters will be subject to shell expansion
    Sat Nov 07 15:21:48 2015 Control Channel Authentication: using 'alwaysvpn-ta.key' as a OpenVPN static key file
    Sat Nov 07 15:21:48 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Nov 07 15:21:48 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Nov 07 15:21:48 2015 LZO compression initialized
    Sat Nov 07 15:21:48 2015 Control Channel MTU parms [ L:1576 D:168 EF:68 EB:0 ET:0 EL:0 ]
    Sat Nov 07 15:21:48 2015 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Sat Nov 07 15:21:48 2015 Data Channel MTU parms [ L:1576 D:1450 EF:44 EB:135 ET:32 EL:0 AF:3/1 ]
    Sat Nov 07 15:21:48 2015 Local Options hash (VER=V4): 'e39a3273'
    Sat Nov 07 15:21:48 2015 Expected Remote Options hash (VER=V4): '3c14feac'
    Sat Nov 07 15:21:48 2015 Attempting to establish TCP connection with (AlwaysVPN IP):443
    Sat Nov 07 15:21:49 2015 TCP connection established with (AlwaysVPN IP):443
    Sat Nov 07 15:21:49 2015 TCPv4_CLIENT link local: [undef]
    Sat Nov 07 15:21:49 2015 TCPv4_CLIENT link remote: (AlwaysVPN IP):443
    Sat Nov 07 15:21:49 2015 TLS: Initial packet from (AlwaysVPN IP):443, sid=d8a0b4ad 86206005
    Sat Nov 07 15:21:49 2015 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
    Sat Nov 07 15:21:59 2015 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=AlwaysVPN/CN=AlwaysVPN_CA/emailAddress=support@alwaysvpn.com
    Sat Nov 07 15:21:59 2015 VERIFY OK: nsCertType=SERVER
    Sat Nov 07 15:21:59 2015 VERIFY X509NAME OK: /C=US/ST=NY/L=New_York/O=AlwaysVPN/CN=alwaysvpn_server5/emailAddress=support@alwaysvpn.com
    Sat Nov 07 15:21:59 2015 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=AlwaysVPN/CN=alwaysvpn_server5/emailAddress=support@alwaysvpn.com
    Sat Nov 07 15:22:11 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sat Nov 07 15:22:11 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Nov 07 15:22:11 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sat Nov 07 15:22:11 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Nov 07 15:22:11 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
    Sat Nov 07 15:22:11 2015 [alwaysvpn_server5] Peer Connection Initiated with (AlwaysVPN IP):443
    Sat Nov 07 15:22:13 2015 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Sat Nov 07 15:22:15 2015 AUTH: Received AUTH_FAILED control message
    Sat Nov 07 15:22:15 2015 TCP/UDP: Closing socket
    Sat Nov 07 15:22:15 2015 SIGUSR1[soft,auth-failure] received, process restarting
    Sat Nov 07 15:22:15 2015 Restart pause, 1 second(s)
    Sat Nov 07 15:23:27 2015 WARNING: Make sure you understand the semantics of --tls-remote before using it (see the man page).
    Sat Nov 07 15:23:27 2015 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
    Sat Nov 07 15:23:27 2015 NOTE: --script-security method='system' is deprecated due to the fact that passed parameters will be subject to shell expansion
    Sat Nov 07 15:23:27 2015 Re-using SSL/TLS context
    Sat Nov 07 15:23:27 2015 LZO compression initialized
    Sat Nov 07 15:23:27 2015 Control Channel MTU parms [ L:1576 D:168 EF:68 EB:0 ET:0 EL:0 ]
    Sat Nov 07 15:23:27 2015 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Sat Nov 07 15:23:28 2015 Data Channel MTU parms [ L:1576 D:1450 EF:44 EB:135 ET:32 EL:0 AF:3/1 ]
    Sat Nov 07 15:23:28 2015 Local Options hash (VER=V4): 'e39a3273'
    Sat Nov 07 15:23:28 2015 Expected Remote Options hash (VER=V4): '3c14feac'
    Sat Nov 07 15:23:28 2015 Attempting to establish TCP connection with (AlwaysVPN IP):443
    Sat Nov 07 15:23:28 2015 TCP connection established with (AlwaysVPN IP):443
    Sat Nov 07 15:23:28 2015 TCPv4_CLIENT link local: [undef]
    Sat Nov 07 15:23:28 2015 TCPv4_CLIENT link remote: (AlwaysVPN IP):443
    Sat Nov 07 15:23:28 2015 TLS: Initial packet from (AlwaysVPN IP):443, sid=cb59ac24 42332943
    Sat Nov 07 15:23:28 2015 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
    Sat Nov 07 15:23:42 2015 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=AlwaysVPN/CN=AlwaysVPN_CA/emailAddress=support@alwaysvpn.com
    Sat Nov 07 15:23:42 2015 VERIFY OK: nsCertType=SERVER
    Sat Nov 07 15:23:42 2015 VERIFY X509NAME OK: /C=US/ST=NY/L=New_York/O=AlwaysVPN/CN=alwaysvpn_server5/emailAddress=support@alwaysvpn.com
    Sat Nov 07 15:23:42 2015 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=AlwaysVPN/CN=alwaysvpn_server5/emailAddress=support@alwaysvpn.com
    Sat Nov 07 15:23:58 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sat Nov 07 15:23:58 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Nov 07 15:23:58 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Sat Nov 07 15:23:58 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Sat Nov 07 15:23:58 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
    Sat Nov 07 15:23:58 2015 [alwaysvpn_server5] Peer Connection Initiated with (AlwaysVPN IP):443
    Sat Nov 07 15:24:01 2015 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Sat Nov 07 15:24:05 2015 AUTH: Received AUTH_FAILED control message
    Sat Nov 07 15:24:05 2015 TCP/UDP: Closing socket
    Sat Nov 07 15:24:05 2015 SIGUSR1[soft,auth-failure] received, process restarting
    Sat Nov 07 15:24:05 2015 Restart pause, 1 second(s)
    • CommentAuthoradmin
    • CommentTimeNov 7th 2015
     
    Have you tried logging in here https://ssl.alwaysvpn.com/login.php and checking your account bandwidth?

    Also I would recommend downloading the latest VPN client after you login at the link above by clicking at the DOWNLOAD link at the top of the page.
    • CommentAuthorelsantos12
    • CommentTimeFeb 25th 2016
     
    yes have login into my acct, i still have Total Available Bandwidth: 21.58 GB and am going to try and download the latest version
    • CommentAuthorelsantos12
    • CommentTimeFeb 25th 2016
     
    i just did download the latest version its not working
    Thu Feb 25 04:57:07 2016 OpenVPN 2.3.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Mar 19 2015
    Thu Feb 25 04:57:07 2016 library versions: OpenSSL 1.0.1m 19 Mar 2015, LZO 2.08
    Thu Feb 25 04:57:07 2016 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
    Thu Feb 25 04:57:07 2016 Need hold release from management interface, waiting...
    Thu Feb 25 04:57:07 2016 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
    Thu Feb 25 04:57:07 2016 MANAGEMENT: CMD 'state on'
    Thu Feb 25 04:57:07 2016 MANAGEMENT: CMD 'log all on'
    Thu Feb 25 04:57:07 2016 MANAGEMENT: CMD 'hold off'
    Thu Feb 25 04:57:07 2016 MANAGEMENT: CMD 'hold release'
    Thu Feb 25 04:57:13 2016 MANAGEMENT: CMD 'username "Auth" "elsantos247"'
    Thu Feb 25 04:57:13 2016 MANAGEMENT: CMD 'password [...]'
    Thu Feb 25 04:57:13 2016 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
    Thu Feb 25 04:57:14 2016 Control Channel Authentication: tls-auth using INLINE static key file
    Thu Feb 25 04:57:14 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Thu Feb 25 04:57:14 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Thu Feb 25 04:57:14 2016 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Thu Feb 25 04:57:14 2016 MANAGEMENT: >STATE:1456405034,RESOLVE,,,
    Thu Feb 25 04:57:14 2016 Attempting to establish TCP connection with [AF_INET](AlwaysVPN IP):443 [nonblock]
    Thu Feb 25 04:57:14 2016 MANAGEMENT: >STATE:1456405034,TCP_CONNECT,,,
    Thu Feb 25 04:57:15 2016 TCP connection established with [AF_INET](AlwaysVPN IP):443
    Thu Feb 25 04:57:15 2016 TCPv4_CLIENT link local: [undef]
    Thu Feb 25 04:57:15 2016 TCPv4_CLIENT link remote: [AF_INET](AlwaysVPN IP):443
    Thu Feb 25 04:57:15 2016 MANAGEMENT: >STATE:1456405035,WAIT,,,
    Thu Feb 25 04:57:16 2016 MANAGEMENT: >STATE:1456405036,AUTH,,,
    Thu Feb 25 04:57:16 2016 TLS: Initial packet from [AF_INET](AlwaysVPN IP):443, sid=a4c9f8d6 72f43dfb
    Thu Feb 25 04:57:16 2016 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
    Thu Feb 25 04:57:20 2016 VERIFY OK: depth=1, C=US, ST=NY, L=New York, O=AlwaysVPN, CN=AlwaysVPN CA, emailAddress=support@alwaysvpn.com
    Thu Feb 25 04:57:20 2016 VERIFY OK: nsCertType=SERVER
    Thu Feb 25 04:57:20 2016 VERIFY X509NAME OK: C=US, ST=NY, L=New York, O=AlwaysVPN, CN=alwaysvpn_server5, emailAddress=support@alwaysvpn.com
    Thu Feb 25 04:57:20 2016 VERIFY OK: depth=0, C=US, ST=NY, L=New York, O=AlwaysVPN, CN=alwaysvpn_server5, emailAddress=support@alwaysvpn.com
    Thu Feb 25 04:57:24 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Thu Feb 25 04:57:24 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Thu Feb 25 04:57:24 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Thu Feb 25 04:57:24 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Thu Feb 25 04:57:24 2016 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
    Thu Feb 25 04:57:24 2016 [alwaysvpn_server5] Peer Connection Initiated with [AF_INET](AlwaysVPN IP):443
    Thu Feb 25 04:57:25 2016 MANAGEMENT: >STATE:1456405045,GET_CONFIG,,,
    Thu Feb 25 04:57:26 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:57:31 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:57:36 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:57:41 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:57:46 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:57:51 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:57:56 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:58:02 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:58:08 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:58:13 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:58:18 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:58:23 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:58:28 2016 No reply from server after sending 12 push requests
    Thu Feb 25 04:58:28 2016 SIGUSR1[soft,no-push-reply] received, process restarting
    Thu Feb 25 04:58:28 2016 MANAGEMENT: >STATE:1456405108,RECONNECTING,no-push-reply,,
    Thu Feb 25 04:58:28 2016 Restart pause, 5 second(s)
    Thu Feb 25 04:58:33 2016 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
    Thu Feb 25 04:58:33 2016 Socket Buffers: R=[65536->65536] S=[65536->65536]
    Thu Feb 25 04:58:33 2016 MANAGEMENT: >STATE:1456405113,RESOLVE,,,
    Thu Feb 25 04:58:34 2016 Attempting to establish TCP connection with [AF_INET](AlwaysVPN IP):80 [nonblock]
    Thu Feb 25 04:58:34 2016 MANAGEMENT: >STATE:1456405114,TCP_CONNECT,,,
    Thu Feb 25 04:58:38 2016 TCP connection established with [AF_INET](AlwaysVPN IP):80
    Thu Feb 25 04:58:38 2016 TCPv4_CLIENT link local: [undef]
    Thu Feb 25 04:58:38 2016 TCPv4_CLIENT link remote: [AF_INET](AlwaysVPN IP):80
    Thu Feb 25 04:58:38 2016 MANAGEMENT: >STATE:1456405118,WAIT,,,
    Thu Feb 25 04:58:39 2016 MANAGEMENT: >STATE:1456405119,AUTH,,,
    Thu Feb 25 04:58:39 2016 TLS: Initial packet from [AF_INET](AlwaysVPN IP):80, sid=cf4b8142 45414d35
    Thu Feb 25 04:58:43 2016 VERIFY OK: depth=1, C=US, ST=NY, L=New York, O=AlwaysVPN, CN=AlwaysVPN CA, emailAddress=support@alwaysvpn.com
    Thu Feb 25 04:58:43 2016 VERIFY OK: nsCertType=SERVER
    Thu Feb 25 04:58:43 2016 VERIFY X509NAME OK: C=US, ST=NY, L=New York, O=AlwaysVPN, CN=alwaysvpn_server5, emailAddress=support@alwaysvpn.com
    Thu Feb 25 04:58:43 2016 VERIFY OK: depth=0, C=US, ST=NY, L=New York, O=AlwaysVPN, CN=alwaysvpn_server5, emailAddress=support@alwaysvpn.com
    Thu Feb 25 04:58:46 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Thu Feb 25 04:58:46 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Thu Feb 25 04:58:46 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Thu Feb 25 04:58:46 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Thu Feb 25 04:58:46 2016 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
    Thu Feb 25 04:58:46 2016 [alwaysvpn_server5] Peer Connection Initiated with [AF_INET](AlwaysVPN IP):80
    Thu Feb 25 04:58:48 2016 MANAGEMENT: >STATE:1456405128,GET_CONFIG,,,
    Thu Feb 25 04:58:49 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:58:54 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:58:59 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:59:04 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:59:10 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:59:15 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:59:21 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:59:26 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Thu Feb 25 04:59:31 2016 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    • CommentAuthoradmin
    • CommentTimeFeb 25th 2016
     
    Could you please try connecting to one of the USA-West locations and let me know if it works for you?