padrevirtual / android-openvpn-settings

Automatically exported from code.google.com/p/android-openvpn-settings
GNU General Public License v3.0
0 stars 0 forks source link

After input Username/Password: No connection #84

Open GoogleCodeExporter opened 8 years ago

GoogleCodeExporter commented 8 years ago
What steps will reproduce the problem?
1. Input Username/Password
2. Auth
3. Get config
4. Connecting...
5. Fallback
*******************************************************

Thu Aug  4 09:55:58 2011 OpenVPN 2.1.1 i686-pc-linux-gnu [SSL] [LZO2] [EPOLL] 
built on Feb  2 2010
Thu Aug  4 09:55:58 2011 MANAGEMENT: TCP Socket listening on 127.0.0.1:33817
Thu Aug  4 09:55:58 2011 Need password(s) from management interface, waiting...
Thu Aug  4 09:56:02 2011 MANAGEMENT: Client connected from 127.0.0.1:33817
Thu Aug  4 09:56:02 2011 MANAGEMENT: CMD 'state'
Thu Aug  4 09:56:02 2011 MANAGEMENT: CMD 'state on'
Thu Aug  4 09:56:02 2011 MANAGEMENT: CMD 'bytecount 0'
Thu Aug  4 09:56:46 2011 MANAGEMENT: CMD 'username 'Auth' 'Kellerhoff ''
Thu Aug  4 09:56:46 2011 MANAGEMENT: CMD 'password [...]'
Thu Aug  4 09:56:46 2011 WARNING: No server certificate verification method has 
been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Thu Aug  4 09:56:46 2011 NOTE: OpenVPN 2.1 requires '--script-security 2' or 
higher to call user-defined scripts or executables
Thu Aug  4 09:56:46 2011 WARNING: file 'hotline.p12' is group or others 
accessible
Thu Aug  4 09:56:46 2011 WARNING: file 'ta.key' is group or others accessible
Thu Aug  4 09:56:46 2011 Control Channel Authentication: using 'ta.key' as a 
OpenVPN static key file
Thu Aug  4 09:56:46 2011 Outgoing Control Channel Authentication: Using 160 bit 
message hash 'SHA1' for HMAC authentication
Thu Aug  4 09:56:46 2011 Incoming Control Channel Authentication: Using 160 bit 
message hash 'SHA1' for HMAC authentication
Thu Aug  4 09:56:46 2011 LZO compression initialized
Thu Aug  4 09:56:46 2011 Control Channel MTU parms [ L:1542 D:166 EF:66 EB:0 
ET:0 EL:0 ]
Thu Aug  4 09:56:46 2011 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 
ET:0 EL:0 AF:3/1 ]
Thu Aug  4 09:56:46 2011 Local Options hash (VER=V4): '504e774e'
Thu Aug  4 09:56:46 2011 Expected Remote Options hash (VER=V4): '14168603'
Thu Aug  4 09:56:46 2011 Socket Buffers: R=[110592->131072] S=[110592->131072]
Thu Aug  4 09:56:46 2011 UDPv4 link local: [undef]
Thu Aug  4 09:56:46 2011 UDPv4 link remote: xxx.xxx.xxx.xxx:xxxx
Thu Aug  4 09:56:46 2011 MANAGEMENT: >STATE:1312444606,WAIT,,,
Thu Aug  4 09:56:46 2011 MANAGEMENT: CMD 'bytecount 0'
Thu Aug  4 09:56:50 2011 TLS Error: Unroutable control packet received from 
193.158.47.203:1194 (si=3 op=P_ACK_V1)
Thu Aug  4 09:56:51 2011 MANAGEMENT: >STATE:1312444611,AUTH,,,
Thu Aug  4 09:56:51 2011 TLS: Initial packet from 193.158.47.203:1194, 
sid=7c9acbd5 1422afce
Thu Aug  4 09:56:51 2011 MANAGEMENT: CMD 'bytecount 0'
Thu Aug  4 09:56:51 2011 WARNING: this configuration may cache passwords in 
memory -- use the auth-nocache option to prevent this
Thu Aug  4 09:56:52 2011 VERIFY OK: depth=1, 
/C=DE/ST=NW/L=Dortmund/O=XXX/OU=XXX/CN=Administration/emailAddress=support@XXX.d
e
Thu Aug  4 09:56:52 2011 VERIFY OK: depth=0, /C=DE/O=WIAG/OU=RZ/CN=openvpn01
Thu Aug  4 09:56:53 2011 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 
128 bit key
Thu Aug  4 09:56:53 2011 Data Channel Encrypt: Using 160 bit message hash 
'SHA1' for HMAC authentication
Thu Aug  4 09:56:53 2011 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 
128 bit key
Thu Aug  4 09:56:53 2011 Data Channel Decrypt: Using 160 bit message hash 
'SHA1' for HMAC authentication
Thu Aug  4 09:56:53 2011 Control Channel: TLSv1, cipher TLSv1/SSLv3 
DHE-RSA-AES256-SHA, 1024 bit RSA
Thu Aug  4 09:56:53 2011 [openvpn01] Peer Connection Initiated with 
193.158.47.203:1194
Thu Aug  4 09:56:54 2011 MANAGEMENT: >STATE:1312444614,GET_CONFIG,,,
Thu Aug  4 09:56:54 2011 MANAGEMENT: CMD 'bytecount 0'
Thu Aug  4 09:56:55 2011 SENT CONTROL [openvpn01]: 'PUSH_REQUEST' (status=1)
Thu Aug  4 09:56:55 2011 AUTH: Received AUTH_FAILED control message
Thu Aug  4 09:56:55 2011 TCP/UDP: Closing socket
Thu Aug  4 09:56:55 2011 SIGTERM[soft,auth-failure] received, process exiting
Thu Aug  4 09:56:55 2011 MANAGEMENT: >STATE:1312444615,EXITING,auth-failure,,

**********************************************************************

What version of the product are you using?
0.4.7

Which Android phone are you using?
Samsung I9000

Which firmware version are you using?
2.3.4

Original issue reported on code.google.com by dirk.kel...@gmail.com on 4 Aug 2011 at 8:07