Auth_Fail error with Proton VPN OSMC 2024.10-01 --- VPN Manager V 7.0.3
Opened this issue · 0 comments
Hi,
I'm trying to use the UserDefined option to use my ProtonVPN credentials, which is an openvpn format. So i'm using the IKEv2 credentials and not my proton login. I'm also using 5 different ovpn configs in case one wasn't good enough. however i'm still getting the error below:
2024-11-16 13:39:01 WARNING: file '/home/osme/.kodi/addons/service.vpn.manager/UserDefined/pass.txt' is group or others accessible
2024-11-16 13:39:01 OpenVPN 2.5.1 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021
2024-11-16 13:39:01 library versions: OpenSSL 1.1.1w 11 Sep 2023, LZO 2.10
2024-11-16 13:39:01 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2024-11-16 13:39:01 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2024-11-16 13:39:01 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2024-11-16 13:39:01 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2024-11-16 13:39:01 TCP/UDP: Preserving recently used remote address: [AF_INET]XXX.XX.XXX.XXX:XXXXX
2024-11-16 13:39:01 Socket Buffers: R=[212992->212992] S=[212992->212992]
2024-11-16 13:39:01 UDP link local: (not bound)
2024-11-16 13:39:01 UDP link remote: [AF_INET]XXX.XX.XXX.XXX:XXXXX
2024-11-16 13:39:01 TLS: Initial packet from [AF_INET]XXX.XX.XXX.XXX:XXXXX, sid=d8dd0f8a 2f40a77d
2024-11-16 13:39:01 VERIFY OK: depth=2, C=CH, O=Proton Technologies AG, OU=ProtonVPN, CN=ProtonVPN Root CA
2024-11-16 13:39:01 VERIFY OK: depth=1, C=CH, O=ProtonVPN AG, CN=ProtonVPN Intermediate CA 1
2024-11-16 13:39:01 VERIFY KU OK
2024-11-16 13:39:01 Validating certificate extended key usage
2024-11-16 13:39:01 ++ Certificate has EKU (str) 1.3.6.1.5.5.8.2.2, expects TLS Web Server Authentication
2024-11-16 13:39:01 ++ Certificate has EKU (oid) 1.3.6.1.5.5.8.2.2, expects TLS Web Server Authentication
2024-11-16 13:39:01 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2024-11-16 13:39:01 VERIFY EKU OK
2024-11-16 13:39:01 Validating certificate extended key usage
2024-11-16 13:39:01 ++ Certificate has EKU (str) 1.3.6.1.5.5.8.2.2, expects TLS Web Server Authentication
2024-11-16 13:39:01 ++ Certificate has EKU (oid) 1.3.6.1.5.5.8.2.2, expects TLS Web Server Authentication
2024-11-16 13:39:01 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2024-11-16 13:39:01 VERIFY EKU OK
2024-11-16 13:39:01 VERIFY OK: depth=0, CN=node-us-165.protonvpn.net
2024-11-16 13:39:01 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1549', remote='link-mtu 1541'
2024-11-16 13:39:01 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1'
2024-11-16 13:39:01 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
2024-11-16 13:39:01 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA
2024-11-16 13:39:01 [node-us-165.protonvpn.net] Peer Connection Initiated with [AF_INET]XXX.XX.XXX.XXX:XXXXX
2024-11-16 13:39:03 SENT CONTROL [node-us-165.protonvpn.net]: 'PUSH_REQUEST' (status=1)
2024-11-16 13:39:08 SENT CONTROL [node-us-165.protonvpn.net]: 'PUSH_REQUEST' (status=1)
2024-11-16 13:39:08 AUTH: Received control message: AUTH_FAILED
2024-11-16 13:39:08 SIGTERM[soft,auth-failure] received, process exiting