Score:0

Cannot connect to Surfshark via a Azure VM

ae flag

I am trying to connect to a 3rd party VPN via a Azure VM.

Following the instructions here: https://support.surfshark.com/hc/en-us/articles/360011051133-How-to-set-up-manual-OpenVPN-connection-using-Linux-Terminal-

But, the process never gets completed, and I don't get the Initialization Sequence Completed message. How to solve this?

Server details

  • Operating system: Ubuntu 20.04
  • vCPUs: 2
  • RAM: 4 GB

Terminal output

azureuser@AuditorNE:/etc/openvpn$ sudo openvpn us-mia.prod.surfshark.com_tcp.ovpn
Mon Feb 27 20:04:01 2023 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Mar 22 2022
Mon Feb 27 20:04:01 2023 library versions: OpenSSL 1.1.1f  31 Mar 2020, LZO 2.10
Enter Auth Username: <uname>
Enter Auth Password: <password>
Mon Feb 27 20:04:36 2023 WARNING: --ping should normally be used with --ping-restart or --ping-exit
Mon Feb 27 20:04:36 2023 NOTE: --fast-io is disabled since we are not using UDP
Mon Feb 27 20:04:36 2023 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Mon Feb 27 20:04:36 2023 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Mon Feb 27 20:04:36 2023 TCP/UDP: Preserving recently used remote address: [AF_INET]146.70.45.171:1443
Mon Feb 27 20:04:36 2023 Socket Buffers: R=[131072->131072] S=[16384->16384]
Mon Feb 27 20:04:36 2023 Attempting to establish TCP connection with [AF_INET]146.70.45.171:1443 [nonblock]
Mon Feb 27 20:04:37 2023 TCP connection established with [AF_INET]146.70.45.171:1443
Mon Feb 27 20:04:37 2023 TCP_CLIENT link local: (not bound)
Mon Feb 27 20:04:37 2023 TCP_CLIENT link remote: [AF_INET]146.70.45.171:1443
Mon Feb 27 20:04:37 2023 TLS: Initial packet from [AF_INET]146.70.45.171:1443, sid=d5301ce6 bb94a33e
Mon Feb 27 20:04:37 2023 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Mon Feb 27 20:04:38 2023 VERIFY OK: depth=2, C=VG, O=Surfshark, CN=Surfshark Root CA
Mon Feb 27 20:04:38 2023 VERIFY OK: depth=1, C=VG, O=Surfshark, CN=Surfshark Intermediate CA
Mon Feb 27 20:04:38 2023 VERIFY KU OK
Mon Feb 27 20:04:38 2023 Validating certificate extended key usage
Mon Feb 27 20:04:38 2023 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Feb 27 20:04:38 2023 VERIFY EKU OK
Mon Feb 27 20:04:38 2023 VERIFY OK: depth=0, CN=us-mia-v121.prod.surfshark.com
Mon Feb 27 20:04:38 2023 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1635', remote='link-mtu 1583'
Mon Feb 27 20:04:38 2023 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-256-GCM'
Mon Feb 27 20:04:38 2023 WARNING: 'auth' is used inconsistently, local='auth SHA512', remote='auth [null-digest]'
Mon Feb 27 20:04:38 2023 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Mon Feb 27 20:04:38 2023 [us-mia-v121.prod.surfshark.com] Peer Connection Initiated with [AF_INET]146.70.45.171:1443
Mon Feb 27 20:04:39 2023 SENT CONTROL [us-mia-v121.prod.surfshark.com]: 'PUSH_REQUEST' (status=1)
Mon Feb 27 20:04:39 2023 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 162.252.172.57,dhcp-option DNS 149.154.159.92,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,block-outside-dns,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.4 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Mon Feb 27 20:04:39 2023 Options error: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:7: block-outside-dns (2.4.7)
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: timers and/or timeouts modified
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Mon Feb 27 20:04:39 2023 Socket Buffers: R=[131072->1048576] S=[87040->425984]
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: --ifconfig/up options modified
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: route options modified
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: route-related options modified
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: peer-id set
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: adjusting link_mtu to 1658
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: data channel crypto options modified
Mon Feb 27 20:04:39 2023 Data Channel: using negotiated cipher 'AES-256-GCM'
Mon Feb 27 20:04:39 2023 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Feb 27 20:04:39 2023 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Feb 27 20:04:39 2023 ROUTE_GATEWAY 10.0.0.1/255.255.255.0 IFACE=eth0 HWADDR=00:22:48:33:ce:4e
Mon Feb 27 20:04:39 2023 TUN/TAP device tun0 opened
Mon Feb 27 20:04:39 2023 TUN/TAP TX queue length set to 100
Mon Feb 27 20:04:39 2023 /sbin/ip link set dev tun0 up mtu 1500
Mon Feb 27 20:04:39 2023 /sbin/ip addr add dev tun0 10.7.7.4/24 broadcast 10.7.7.255
Mon Feb 27 20:04:39 2023 /sbin/ip route add 146.70.45.171/32 via 10.0.0.1
Mon Feb 27 20:04:39 2023 /sbin/ip route add 0.0.0.0/1 via 10.7.7.1
I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.