Cannot connect to OpenVPN server

cryptofree: full-bore cryptostorm protection... for free! Capped to 1 megabit down / 500kb up, it's a great way to use cryptostorm in a pinch. Play nice & be safe, ok?
geogie

Cannot connect to OpenVPN server

Post by geogie » Wed Apr 13, 2022 7:12 pm

Hi.
I want to use Cryptofree's OpenVPN server,
but I cannot connect to it.
Could you fix this problem?

Here is the messages.
$sudo openvpn cryptofree_rsa-tcp.ovpn
2022-04-13 12:58:07 us=165494 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
2022-04-13 12:58:07 us=165776 Current Parameter Settings:
2022-04-13 12:58:07 us=165913 config = 'cryptofree_rsa-tcp.ovpn'
2022-04-13 12:58:07 us=166041 mode = 0
2022-04-13 12:58:07 us=166168 NOTE: --mute triggered...
2022-04-13 12:58:07 us=166985 285 variation(s) on previous 3 message(s) suppressed by --mute
2022-04-13 12:58:07 us=167029 OpenVPN 2.5.5 [git:makepkg/869f194c23ae93c4+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 15 2021
2022-04-13 12:58:07 us=167060 library versions: OpenSSL 1.1.1m 14 Dec 2021, LZO 2.10
Enter Auth Username: hoge
���� Enter Auth Password:
2022-04-13 12:58:09 us=703965 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
2022-04-13 12:58:09 us=703981 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
2022-04-13 12:58:09 us=704028 Control Channel MTU parms [ L:1623 D:1138 EF:112 EB:0 ET:0 EL:3 ]
2022-04-13 12:58:10 us=13577 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
2022-04-13 12:58:10 us=13615 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1603,tun-mtu 1500,proto TCPv4_CLIENT,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
2022-04-13 12:58:10 us=13619 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1603,tun-mtu 1500,proto TCPv4_SERVER,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
2022-04-13 12:58:10 us=13628 TCP/UDP: Preserving recently used remote address: [AF_INET]212.129.0.80:443
2022-04-13 12:58:10 us=13639 Socket Buffers: R=[131072->131072] S=[16384->16384]
2022-04-13 12:58:10 us=13642 Attempting to establish TCP connection with [AF_INET]212.129.0.80:443 [nonblock]
^C2022-04-13 12:59:00 us=252268 TCP/UDP: Closing socket
2022-04-13 12:59:00 us=252302 SIGINT[hard,init_instance] received, process exiting
(Looping)