That’s weird.
You might try clearing out any cookies from GRC and disabling javascript…
I can’t hit it to test any further right now, the VPN server is giving me a “time to live exceeded in transit”.
ICMP TTL is set to 1?
I’m using Firefox and I do not keep GRC cookies. Disabled Java script but still the same result.
Disconnected TrustConnect and connected Hotspotshield (which asked for Java script to be enabled), then ran ShieldsUP again. This time showed my ISP connection BUT after closing Firefox to remove the GRC cookies just added, I restarted Firefox and ShieldsUP shows the HotspotShield connection.
I’m having the same problem as Gordon and I have tried James’ suggestion for the log in but to no avail. I’m running Windows Vista 32bit with BOClean, Avant AV, and ZoneAlarm (waiting for CFP 3). Any suggestions would be a great help. I’ve attached the log (atleast I hope I have, I’m new at this) in the hopes that it will help.
I really am a newbie at trouble shooting things like this. I can figure out the basics and am learning more as I go along but I need more info. I really do appreciate you looking into it and trimming yours for comparison. I looked yours over compared to mine but honestly I have no idea how to use this info. If you can explain it to me great but if you don’t have the time that’s ok too. (:WAV)
I’ve never setup an Open VPN server so I’m not sure what it’s looking for from Comodo’s client. :-[
You might want to create a support ticket and point them to this thread and our logs to see if we can get an answer. No promises though as this is a beta product and we’re supposed to know what we are doing. ;D
FWIW, I’ve noticed reconnect attempts from mine seem to fail some of the time and am thinking the server isn’t handling my lease gracefully.
Melih, please see my previous post (Reply #14 dated October 28th). I have received neither a reply nor any comment. Can anyone clarify whether TrustConnect is supposed to work under 64-bit Vista? I still have no joy here.
The “Auth-Failed” message occurs when the server denies a connection request. This most often occurs because the user has exceeded bandwidth limits.
Any user that has used more than 10 GB will not be able to log in until their prior month of bandwidth usage drops below 10 GB.
As I am testing these VPNs at home, I am connected to the Internet via my ISP Orange France, with an ADSL. I am soon going away, so that is why I want the wifi security.
Now I don’t understand all this technical stuff, but I am beginning to think that the ISP may be blocking these connections, as I also saw something about VPNs bypassing sites blocked by ISPs. Is that possible?
Thanks a lot ! It is a great Idea, and it works great ! It is fast, easy: excellent, really !
(:CLP)
I have just one comment: TrustConnect Client is in fact a “packaged” OpenVpn client, so I think that it should also be under the GPL v2 licence… (:NRD)
Just to tell you to be careful if it’s not your intend to open your project to the community…
Tried to use TrustConnect the other day and received the following;
Sat Dec 01 09:10:36 2007 us=250000 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Sat Dec 01 09:10:36 2007 us=250000 [testvpn] Peer Connection Initiated with 75.127.65.162:443
Sat Dec 01 09:10:37 2007 us=484000 SENT CONTROL [testvpn]: ‘PUSH_REQUEST’ (status=1)
Sat Dec 01 09:10:37 2007 us=484000 TCPv4_CLIENT WRITE [104] to 75.127.65.162:443: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=90
Sat Dec 01 09:10:37 2007 us=718000 TCPv4_CLIENT READ [22] from 75.127.65.162:443: P_ACK_V1 kid=0 [ 8 ]
Sat Dec 01 09:10:38 2007 us=156000 TCPv4_CLIENT READ [104] from 75.127.65.162:443: P_CONTROL_V1 kid=0 [ ] pid=28 DATA len=90
Sat Dec 01 09:10:38 2007 us=156000 AUTH: Received AUTH_FAILED control message
Sat Dec 01 09:10:38 2007 us=156000 PID packet_id_free
Sat Dec 01 09:10:38 2007 us=156000 PID packet_id_free
Sat Dec 01 09:10:38 2007 us=156000 PID packet_id_free
Sat Dec 01 09:10:38 2007 us=156000 PID packet_id_free
Sat Dec 01 09:10:38 2007 us=156000 PID packet_id_free
Sat Dec 01 09:10:38 2007 us=156000 PID packet_id_free
Sat Dec 01 09:10:38 2007 us=156000 PID packet_id_free
Sat Dec 01 09:10:38 2007 us=156000 PID packet_id_free
Sat Dec 01 09:10:38 2007 us=156000 TCP/UDP: Closing socket
Sat Dec 01 09:10:38 2007 us=156000 PID packet_id_free
Sat Dec 01 09:10:38 2007 us=156000 SIGTERM[soft,auth-failure] received, process exiting
Sat Dec 01 09:10:38 2007 us=156000 PKCS#11: Removing providers
Sat Dec 01 09:10:38 2007 us=156000 PKCS#11: Releasing sessions
Sat Dec 01 09:10:38 2007 us=156000 PKCS#11: Marking as uninitialized
Sat Dec 01 09:10:38 2007 us=156000 Closing Win32 semaphore ‘openvpn_netcmd’
It would be nice if the client could verify whether it is connected really trough the VPN.
It is quite important because, a route mismatch on the PC can simply bypass the VPN.
An expert can check the default route, etc… but a beginner will probably not notice whether there is problem…