I am trying to connect to a 3rd party VPN via a Azure VM.
Following the instructions here: https://support.surfshark.com/hc/en-us/articles/360011051133-How-to-set-up-manual-OpenVPN-connection-using-Linux-Terminal-
But, the process never gets completed, and I don't get the Initialization Sequence Completed message. How to solve this?
Server details
- Operating system: Ubuntu 20.04
- vCPUs: 2
- RAM: 4 GB
Terminal output
azureuser@AuditorNE:/etc/openvpn$ sudo openvpn us-mia.prod.surfshark.com_tcp.ovpn
Mon Feb 27 20:04:01 2023 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Mar 22 2022
Mon Feb 27 20:04:01 2023 library versions: OpenSSL 1.1.1f 31 Mar 2020, LZO 2.10
Enter Auth Username: <uname>
Enter Auth Password: <password>
Mon Feb 27 20:04:36 2023 WARNING: --ping should normally be used with --ping-restart or --ping-exit
Mon Feb 27 20:04:36 2023 NOTE: --fast-io is disabled since we are not using UDP
Mon Feb 27 20:04:36 2023 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Mon Feb 27 20:04:36 2023 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Mon Feb 27 20:04:36 2023 TCP/UDP: Preserving recently used remote address: [AF_INET]146.70.45.171:1443
Mon Feb 27 20:04:36 2023 Socket Buffers: R=[131072->131072] S=[16384->16384]
Mon Feb 27 20:04:36 2023 Attempting to establish TCP connection with [AF_INET]146.70.45.171:1443 [nonblock]
Mon Feb 27 20:04:37 2023 TCP connection established with [AF_INET]146.70.45.171:1443
Mon Feb 27 20:04:37 2023 TCP_CLIENT link local: (not bound)
Mon Feb 27 20:04:37 2023 TCP_CLIENT link remote: [AF_INET]146.70.45.171:1443
Mon Feb 27 20:04:37 2023 TLS: Initial packet from [AF_INET]146.70.45.171:1443, sid=d5301ce6 bb94a33e
Mon Feb 27 20:04:37 2023 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Mon Feb 27 20:04:38 2023 VERIFY OK: depth=2, C=VG, O=Surfshark, CN=Surfshark Root CA
Mon Feb 27 20:04:38 2023 VERIFY OK: depth=1, C=VG, O=Surfshark, CN=Surfshark Intermediate CA
Mon Feb 27 20:04:38 2023 VERIFY KU OK
Mon Feb 27 20:04:38 2023 Validating certificate extended key usage
Mon Feb 27 20:04:38 2023 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Feb 27 20:04:38 2023 VERIFY EKU OK
Mon Feb 27 20:04:38 2023 VERIFY OK: depth=0, CN=us-mia-v121.prod.surfshark.com
Mon Feb 27 20:04:38 2023 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1635', remote='link-mtu 1583'
Mon Feb 27 20:04:38 2023 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-256-GCM'
Mon Feb 27 20:04:38 2023 WARNING: 'auth' is used inconsistently, local='auth SHA512', remote='auth [null-digest]'
Mon Feb 27 20:04:38 2023 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Mon Feb 27 20:04:38 2023 [us-mia-v121.prod.surfshark.com] Peer Connection Initiated with [AF_INET]146.70.45.171:1443
Mon Feb 27 20:04:39 2023 SENT CONTROL [us-mia-v121.prod.surfshark.com]: 'PUSH_REQUEST' (status=1)
Mon Feb 27 20:04:39 2023 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 162.252.172.57,dhcp-option DNS 149.154.159.92,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,block-outside-dns,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.4 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Mon Feb 27 20:04:39 2023 Options error: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:7: block-outside-dns (2.4.7)
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: timers and/or timeouts modified
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Mon Feb 27 20:04:39 2023 Socket Buffers: R=[131072->1048576] S=[87040->425984]
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: --ifconfig/up options modified
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: route options modified
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: route-related options modified
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: peer-id set
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: adjusting link_mtu to 1658
Mon Feb 27 20:04:39 2023 OPTIONS IMPORT: data channel crypto options modified
Mon Feb 27 20:04:39 2023 Data Channel: using negotiated cipher 'AES-256-GCM'
Mon Feb 27 20:04:39 2023 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Feb 27 20:04:39 2023 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Feb 27 20:04:39 2023 ROUTE_GATEWAY 10.0.0.1/255.255.255.0 IFACE=eth0 HWADDR=00:22:48:33:ce:4e
Mon Feb 27 20:04:39 2023 TUN/TAP device tun0 opened
Mon Feb 27 20:04:39 2023 TUN/TAP TX queue length set to 100
Mon Feb 27 20:04:39 2023 /sbin/ip link set dev tun0 up mtu 1500
Mon Feb 27 20:04:39 2023 /sbin/ip addr add dev tun0 10.7.7.4/24 broadcast 10.7.7.255
Mon Feb 27 20:04:39 2023 /sbin/ip route add 146.70.45.171/32 via 10.0.0.1
Mon Feb 27 20:04:39 2023 /sbin/ip route add 0.0.0.0/1 via 10.7.7.1