OpenVPN connection not detected by app.hackthebox.com

Hello, I’m trying to start at HackTheBox, download the profile for OpenVPN, connect, the connection looks correct, I have no errors, but it is not detected from the site, I can not continue …

I waited more than 2 minutes, and tried several times with different OpenVPN servers in the last 2 days.

❯ sudo openvpn starting_point_retiolus.ovpn
2024-04-01 17:44:03 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2024-04-01 17:44:03 OpenVPN 2.5.9 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 29 2023
2024-04-01 17:44:03 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
2024-04-01 17:44:03 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2024-04-01 17:44:03 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2024-04-01 17:44:03 TCP/UDP: Preserving recently used remote address: [AF_INET]<REDACTED_IP>:1337
2024-04-01 17:44:03 Socket Buffers: R=[212992->212992] S=[212992->212992]
2024-04-01 17:44:03 UDP link local: (not bound)
2024-04-01 17:44:03 UDP link remote: [AF_INET]<REDACTED_IP>:1337
2024-04-01 17:44:03 TLS: Initial packet from [AF_INET]<REDACTED_IP>:1337, sid=650a4a38 45e0c430
2024-04-01 17:44:03 VERIFY OK: depth=1, CN=<REDACTED_CN>
2024-04-01 17:44:03 VERIFY KU OK
2024-04-01 17:44:03 Validating certificate extended key usage
2024-04-01 17:44:03 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2024-04-01 17:44:03 VERIFY EKU OK
2024-04-01 17:44:03 VERIFY OK: depth=0, CN=<REDACTED_CN>
2024-04-01 17:44:03 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2024-04-01 17:44:03 [<REDACTED_CN>] Peer Connection Initiated with [AF_INET]<REDACTED_IP>:1337
2024-04-01 17:44:04 SENT CONTROL [<REDACTED_CN>]: 'PUSH_REQUEST' (status=1)
2024-04-01 17:44:04 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.254.0,route 10.129.0.0 255.255.0.0,route-ipv6 dead:beef::/64,explicit-exit-notify,tun-ipv6,route-gateway 10.10.14.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:2::10a9/64 dead:beef:2::1,ifconfig 10.10.14.171 255.255.254.0,peer-id 27,cipher AES-256-CBC'
2024-04-01 17:44:04 OPTIONS IMPORT: timers and/or timeouts modified
2024-04-01 17:44:04 OPTIONS IMPORT: explicit notify parm(s) modified
2024-04-01 17:44:04 OPTIONS IMPORT: --ifconfig/up options modified
2024-04-01 17:44:04 OPTIONS IMPORT: route options modified
2024-04-01 17:44:04 OPTIONS IMPORT: route-related options modified
2024-04-01 17:44:04 OPTIONS IMPORT: peer-id set
2024-04-01 17:44:04 OPTIONS IMPORT: adjusting link_mtu to 1625
2024-04-01 17:44:04 OPTIONS IMPORT: data channel crypto options modified
2024-04-01 17:44:04 Data Channel: using negotiated cipher 'AES-256-CBC'
2024-04-01 17:44:04 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
2024-04-01 17:44:04 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
2024-04-01 17:44:04 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
2024-04-01 17:44:04 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
2024-04-01 17:44:04 net_route_v4_best_gw query: dst 0.0.0.0
2024-04-01 17:44:04 net_route_v4_best_gw result: via <REDACTED_IP> dev eno1
2024-04-01 17:44:04 ROUTE_GATEWAY <REDACTED_IP>/255.255.255.0 IFACE=eno1 HWADDR=00:d8:61:c9:8d:f7
2024-04-01 17:44:04 GDG6: remote_host_ipv6=n/a
2024-04-01 17:44:04 net_route_v6_best_gw query: dst ::
2024-04-01 17:44:04 net_route_v6_best_gw result: via <REDACTED_IP> dev eno1
2024-04-01 17:44:04 ROUTE6_GATEWAY <REDACTED_IP> IFACE=eno1
2024-04-01 17:44:04 TUN/TAP device tun0 opened
2024-04-01 17:44:04 net_iface_mtu_set: mtu 1500 for tun0
2024-04-01 17:44:04 net_iface_up: set tun0 up
2024-04-01 17:44:04 net_addr_v4_add: <REDACTED_IP>/23 dev tun0
2024-04-01 17:44:04 net_iface_mtu_set: mtu 1500 for tun0
2024-04-01 17:44:04 net_iface_up: set tun0 up
2024-04-01 17:44:04 net_addr_v6_add: dead:beef:2::10a9/64 dev tun0
2024-04-01 17:44:04 net_route_v4_add: 10.10.10.0/23 via 10.10.14.1 dev [NULL] table 0 metric -1
2024-04-01 17:44:04 net_route_v4_add: 10.129.0.0/16 via 10.10.14.1 dev [NULL] table 0 metric -1
2024-04-01 17:44:04 add_route_ipv6(dead:beef::/64 -> dead:beef:2::1 metric -1) dev tun0
2024-04-01 17:44:04 net_route_v6_add: dead:beef::/64 via :: dev tun0 table 0 metric -1
2024-04-01 17:44:04 Initialization Sequence Completed

I checked Nord VPN, I do believe those guys are doing a hack, as that VPN is getting unmatched results day by day. the speed and everything.

Why the heck are you talking about Nord VPN?

Double check that you are connecting to the right lab for what you are trying to do.

just because you said that it was not being detected at the site, the one you were talking about, well i just shared that as an experience, i am sorry if that bothered you.

I go to Starting Point > Meow > Connect using OpenVPN > Select “EU - Starting Point” VPN 1 or 2 > Download VPN > execute VPN