Hello, I’m trying to start at HackTheBox, download the profile for OpenVPN, connect, the connection looks correct, I have no errors, but it is not detected from the site, I can not continue …
I waited more than 2 minutes, and tried several times with different OpenVPN servers in the last 2 days.
❯ sudo openvpn starting_point_retiolus.ovpn
2024-04-01 17:44:03 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2024-04-01 17:44:03 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023
2024-04-01 17:44:03 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
2024-04-01 17:44:03 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2024-04-01 17:44:03 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2024-04-01 17:44:03 TCP/UDP: Preserving recently used remote address: [AF_INET]<REDACTED_IP>:1337
2024-04-01 17:44:03 Socket Buffers: R=[212992->212992] S=[212992->212992]
2024-04-01 17:44:03 UDP link local: (not bound)
2024-04-01 17:44:03 UDP link remote: [AF_INET]<REDACTED_IP>:1337
2024-04-01 17:44:03 TLS: Initial packet from [AF_INET]<REDACTED_IP>:1337, sid=650a4a38 45e0c430
2024-04-01 17:44:03 VERIFY OK: depth=1, CN=<REDACTED_CN>
2024-04-01 17:44:03 VERIFY KU OK
2024-04-01 17:44:03 Validating certificate extended key usage
2024-04-01 17:44:03 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2024-04-01 17:44:03 VERIFY EKU OK
2024-04-01 17:44:03 VERIFY OK: depth=0, CN=<REDACTED_CN>
2024-04-01 17:44:03 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2024-04-01 17:44:03 [<REDACTED_CN>] Peer Connection Initiated with [AF_INET]<REDACTED_IP>:1337
2024-04-01 17:44:04 SENT CONTROL [<REDACTED_CN>]: 'PUSH_REQUEST' (status=1)
2024-04-01 17:44:04 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.254.0,route 10.129.0.0 255.255.0.0,route-ipv6 dead:beef::/64,explicit-exit-notify,tun-ipv6,route-gateway 10.10.14.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:2::10a9/64 dead:beef:2::1,ifconfig 10.10.14.171 255.255.254.0,peer-id 27,cipher AES-256-CBC'
2024-04-01 17:44:04 OPTIONS IMPORT: timers and/or timeouts modified
2024-04-01 17:44:04 OPTIONS IMPORT: explicit notify parm(s) modified
2024-04-01 17:44:04 OPTIONS IMPORT: --ifconfig/up options modified
2024-04-01 17:44:04 OPTIONS IMPORT: route options modified
2024-04-01 17:44:04 OPTIONS IMPORT: route-related options modified
2024-04-01 17:44:04 OPTIONS IMPORT: peer-id set
2024-04-01 17:44:04 OPTIONS IMPORT: adjusting link_mtu to 1625
2024-04-01 17:44:04 OPTIONS IMPORT: data channel crypto options modified
2024-04-01 17:44:04 Data Channel: using negotiated cipher 'AES-256-CBC'
2024-04-01 17:44:04 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
2024-04-01 17:44:04 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
2024-04-01 17:44:04 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
2024-04-01 17:44:04 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
2024-04-01 17:44:04 net_route_v4_best_gw query: dst 0.0.0.0
2024-04-01 17:44:04 net_route_v4_best_gw result: via <REDACTED_IP> dev eno1
2024-04-01 17:44:04 ROUTE_GATEWAY <REDACTED_IP>/255.255.255.0 IFACE=eno1 HWADDR=00:d8:61:c9:8d:f7
2024-04-01 17:44:04 GDG6: remote_host_ipv6=n/a
2024-04-01 17:44:04 net_route_v6_best_gw query: dst ::
2024-04-01 17:44:04 net_route_v6_best_gw result: via <REDACTED_IP> dev eno1
2024-04-01 17:44:04 ROUTE6_GATEWAY <REDACTED_IP> IFACE=eno1
2024-04-01 17:44:04 TUN/TAP device tun0 opened
2024-04-01 17:44:04 net_iface_mtu_set: mtu 1500 for tun0
2024-04-01 17:44:04 net_iface_up: set tun0 up
2024-04-01 17:44:04 net_addr_v4_add: <REDACTED_IP>/23 dev tun0
2024-04-01 17:44:04 net_iface_mtu_set: mtu 1500 for tun0
2024-04-01 17:44:04 net_iface_up: set tun0 up
2024-04-01 17:44:04 net_addr_v6_add: dead:beef:2::10a9/64 dev tun0
2024-04-01 17:44:04 net_route_v4_add: 10.10.10.0/23 via 10.10.14.1 dev [NULL] table 0 metric -1
2024-04-01 17:44:04 net_route_v4_add: 10.129.0.0/16 via 10.10.14.1 dev [NULL] table 0 metric -1
2024-04-01 17:44:04 add_route_ipv6(dead:beef::/64 -> dead:beef:2::1 metric -1) dev tun0
2024-04-01 17:44:04 net_route_v6_add: dead:beef::/64 via :: dev tun0 table 0 metric -1
2024-04-01 17:44:04 Initialization Sequence Completed