Quote:
Originally Posted by /dev/random
I don't think it's your ISP, unless they are blocking openvpns default ports, there is no way for them to block the traffic.
The way they block VPN traffic is to blacklist the ip/hostname and port, so check to see if the port is being filtered.
|
yes i used 1195 instead of 1194 port with my own vpn.... is there command to check which ports are filtered?
Thu Nov 23 00:58:34 2017 OpenVPN 2.2.1 i686-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Dec 1 2014
Thu Nov 23 00:58:34 2017 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Thu Nov 23 00:58:34 2017 Control Channel Authentication: tls-auth using INLINE static key file
Thu Nov 23 00:58:34 2017 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Nov 23 00:58:34 2017 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Nov 23 00:58:34 2017 LZO compression initialized
Thu Nov 23 00:58:34 2017 Control Channel MTU parms [ L:1000 D:010 EF:000 EB:0 ET:0 EL:0 ]
Thu Nov 23 00:58:34 2017 Socket Buffers: R=[163840->163840] S=[163840->163840]
Thu Nov 23 00:58:34 2017 Data Channel MTU parms [ L:1000 D:010 EF:000 EB:00 ET:0 EL:0 AF:3/1 ]
Thu Nov 23 00:58:34 2017 Local Options hash (VER=V4): 'a5xxxxx'
Thu Nov 23 00:58:34 2017 Expected Remote Options hash (VER=V4): '14xxxxx'
Thu Nov 23 00:58:34 2017 UDPv4 link local: [undef]
Thu Nov 23 00:58:34 2017 UDPv4 link remote: [AF_INET]4x.xx.xx.xx:1195
Thu Nov 23 00:58:35 2017 TLS: Initial packet from [AF_INET]4x.xx.xx.xx:1195, sid=9d00000 410000