Replies: 1 comment
-
I somehow just found an answer elsewhere. It seems hotspotshield generate a unique ovpn config for every account, so the repo of files won't work and the only option is to go down the custom config route with an ovpn file downloaded from your account. I will try this and in the meantime close this. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hi All,
Anyone come across anything like this - I've got my VPN provider configured properly, the docker starts up, connections seem to be attempted but are then closed. I've tried a couple of different regions, both seem to be read properly from the configuration parameter, but I get the same result.
For user and password parameters I'm using the ovpn router settings from hotspotshield, though I don't think it's getting as far as authenticating tbh - changing these doesn't make any difference
I also don't see any sign in time update on the hotspotshield account pages.
I've tried bridge and host networks, both fail at the same point.
I would appreciate any ideas on this,
thanks,
Matt
Starting container with revision: 81277fb
TRANSMISSION_HOME is currently set to: /config/transmission-home
Creating TUN device /dev/net/tun
Using OpenVPN provider: HOTSPOTSHIELD
Running with VPN_CONFIG_SOURCE auto
No bundled config script found for HOTSPOTSHIELD. Defaulting to external config
Will get configs from https://github.com/haugene/vpn-configs-contrib.git
Repository is already cloned, checking for update
Already up to date.
Already on 'main'
Your branch is up to date with 'origin/main'.
Found configs for HOTSPOTSHIELD in /config/vpn-configs-contrib/openvpn/hotspotshield, will replace current content in /etc/openvpn/hotspotshield
Starting OpenVPN using config HotspotShield_DE_v4.ovpn
Modifying /etc/openvpn/hotspotshield/HotspotShield_DE_v4.ovpn for best behaviour in this container
Modification: Point auth-user-pass option to the username/password file
Modification: Change ca certificate path
Modification: Change ping options
Modification: Update/set resolv-retry to 15 seconds
Modification: Change tls-crypt keyfile path
Modification: Set output verbosity to 3
Modification: Remap SIGUSR1 signal to SIGTERM, avoid OpenVPN restart loop
Modification: Updating status for config failure detection
Setting OpenVPN credentials...
2023-09-21 10:51:03 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
2023-09-21 10:51:03 OpenVPN 2.5.5 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022
2023-09-21 10:51:03 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
2023-09-21 10:51:03 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2023-09-21 10:51:03 TCP/UDP: Preserving recently used remote address: [AF_INET]185.171.126.250:8041
2023-09-21 10:51:03 Socket Buffers: R=[212992->212992] S=[212992->212992]
2023-09-21 10:51:03 UDP link local: (not bound)
2023-09-21 10:51:03 UDP link remote: [AF_INET]185.171.126.250:8041
2023-09-21 10:51:03 TLS: Initial packet from [AF_INET]185.171.126.250:8041, sid=d5e923b9 b746479e
2023-09-21 10:51:03 VERIFY OK: depth=2, C=US, O=Internet Security Research Group, CN=ISRG Root X1
2023-09-21 10:51:03 VERIFY OK: depth=1, C=US, O=Let's Encrypt, CN=R3
2023-09-21 10:51:03 VERIFY KU OK
2023-09-21 10:51:03 Validating certificate extended key usage
2023-09-21 10:51:03 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-09-21 10:51:03 VERIFY EKU OK
2023-09-21 10:51:03 VERIFY X509NAME OK: CN=metalinjection.us
2023-09-21 10:51:03 VERIFY OK: depth=0, CN=metalinjection.us
2023-09-21 10:51:03 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1601', remote='link-mtu 1569'
2023-09-21 10:51:03 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1532', remote='tun-mtu 1500'
2023-09-21 10:51:03 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2023-09-21 10:51:03 [metalinjection.us] Peer Connection Initiated with [AF_INET]185.171.126.250:8041
2023-09-21 10:51:03 Connection reset command was pushed by server ('')
2023-09-21 10:51:03 SIGTERM[soft,server-pushed-connection-reset] received, process exiting
Beta Was this translation helpful? Give feedback.
All reactions