GL-AR300M16 unable to connect to VPN

Hello, I just bought GL-AR300M16 with the goal of routing all traffic to a VPN service.
I have tried expressvpn, surfshark, and nothing works, it just stay in “yellow” pending state for ever.

That’s what I managed to get from the logs when using expressvpn accessing UK.

Please note that I live in Egypt, and expressvpn normally works on my laptop and phone.

Tue Jul 26 15:33:17 2022 user.info : 1247: gl-vpn-client>> Start, vpnpath=/etc/openvpn/ovpn0, serverfile=my_expressvpn_uk_-_docklands_udp.ovpn
Tue Jul 26 15:33:17 2022 user.debug : ------ss-redir is not running!------
Tue Jul 26 15:33:17 2022 user.info : 1324: gl-vpn-client>> glconfig.openvpn.ovpn=/etc/openvpn/ovpn0/my_expressvpn_uk_-_docklands_udp.ovpn, glconfig.openvpn.clientid=ovpn0
Tue Jul 26 15:33:19 2022 daemon.info dnsmasq[13128]: exiting on receipt of SIGTERM
Tue Jul 26 15:33:20 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Tue Jul 26 15:33:20 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: started, version 2.80 cachesize 150
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: DNS service limited to local subnets
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth nettlehash DNSSEC no-ID loop-detect inotify dumpfile
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq-dhcp[20704]: DHCP, IP range 192.168.8.100 -- 192.168.8.249, lease time 12h
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: using local addresses only for domain test
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: using local addresses only for domain onion
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: using local addresses only for domain localhost
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: using local addresses only for domain local
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: using local addresses only for domain invalid
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: using local addresses only for domain bind
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: using local addresses only for domain lan
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: reading /tmp/resolv.conf.auto
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: using local addresses only for domain test
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: using local addresses only for domain onion
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: using local addresses only for domain localhost
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: using local addresses only for domain local
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: using local addresses only for domain invalid
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: using local addresses only for domain bind
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: using local addresses only for domain lan
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: using nameserver 192.168.100.1#53
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: read /etc/hosts - 4 addresses
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq[20704]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Tue Jul 26 15:33:20 2022 daemon.info dnsmasq-dhcp[20704]: read /etc/ethers - 0 addresses
Tue Jul 26 15:33:24 2022 daemon.warn openvpn[20924]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Tue Jul 26 15:33:24 2022 daemon.warn openvpn[20924]: WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
Tue Jul 26 15:33:24 2022 daemon.notice openvpn[20924]: OpenVPN 2.5.2 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Tue Jul 26 15:33:24 2022 daemon.notice openvpn[20924]: library versions: OpenSSL 1.1.1k  25 Mar 2021
Tue Jul 26 15:33:24 2022 daemon.warn openvpn[20936]: WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
Tue Jul 26 15:33:24 2022 daemon.warn openvpn[20936]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Tue Jul 26 15:33:24 2022 daemon.notice openvpn[20936]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Tue Jul 26 15:33:24 2022 daemon.notice openvpn[20936]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Tue Jul 26 15:33:24 2022 daemon.notice openvpn[20936]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.208.9.191:1195
Tue Jul 26 15:33:24 2022 daemon.notice openvpn[20936]: Socket Buffers: R=[163840->327680] S=[163840->327680]
Tue Jul 26 15:33:24 2022 daemon.notice openvpn[20936]: UDP link local: (not bound)
Tue Jul 26 15:33:24 2022 daemon.notice openvpn[20936]: UDP link remote: [AF_INET]185.208.9.191:1195
Tue Jul 26 15:33:24 2022 daemon.notice openvpn[20936]: TLS: Initial packet from [AF_INET]185.208.9.191:1195, sid=06f2c72e e4717790
Tue Jul 26 15:34:24 2022 daemon.err openvpn[20936]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jul 26 15:34:24 2022 daemon.err openvpn[20936]: TLS Error: TLS handshake failed
Tue Jul 26 15:34:24 2022 daemon.notice openvpn[20936]: SIGHUP[soft,tls-error] received, process restarting
Tue Jul 26 15:34:24 2022 daemon.warn openvpn[20936]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Tue Jul 26 15:34:24 2022 daemon.warn openvpn[20936]: WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
Tue Jul 26 15:34:24 2022 daemon.notice openvpn[20936]: OpenVPN 2.5.2 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Tue Jul 26 15:34:24 2022 daemon.notice openvpn[20936]: library versions: OpenSSL 1.1.1k  25 Mar 2021
Tue Jul 26 15:34:24 2022 daemon.notice openvpn[20936]: Restart pause, 5 second(s)
Tue Jul 26 15:34:29 2022 daemon.warn openvpn[20936]: WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
Tue Jul 26 15:34:29 2022 daemon.warn openvpn[20936]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Tue Jul 26 15:34:29 2022 daemon.notice openvpn[20936]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Tue Jul 26 15:34:29 2022 daemon.notice openvpn[20936]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Tue Jul 26 15:34:29 2022 daemon.notice openvpn[20936]: TCP/UDP: Preserving recently used remote address: [AF_INET]185.208.9.244:1195
Tue Jul 26 15:34:29 2022 daemon.notice openvpn[20936]: Socket Buffers: R=[163840->327680] S=[163840->327680]
Tue Jul 26 15:34:29 2022 daemon.notice openvpn[20936]: UDP link local: (not bound)
Tue Jul 26 15:34:29 2022 daemon.notice openvpn[20936]: UDP link remote: [AF_INET]185.208.9.244:1195
Tue Jul 26 15:34:29 2022 daemon.notice openvpn[20936]: TLS: Initial packet from [AF_INET]185.208.9.244:1195, sid=d708446f d767da0f
1 Like

I have tried Wireguard as well and it’s not working as well, that’s the log

Tue Jul 26 15:38:16 2022 user.debug : ------ss-redir is not running!------
Tue Jul 26 15:38:16 2022 user.notice wireguard: wireguard client start
Tue Jul 26 15:38:17 2022 daemon.info dnsmasq[23405]: exiting on receipt of SIGTERM
Tue Jul 26 15:38:18 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Tue Jul 26 15:38:18 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: started, version 2.80 cachesize 150
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: DNS service limited to local subnets
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth nettlehash DNSSEC no-ID loop-detect inotify dumpfile
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq-dhcp[27115]: DHCP, IP range 192.168.8.100 -- 192.168.8.249, lease time 12h
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: using local addresses only for domain test
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: using local addresses only for domain onion
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: using local addresses only for domain localhost
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: using local addresses only for domain local
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: using local addresses only for domain invalid
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: using local addresses only for domain bind
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: using local addresses only for domain lan
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: reading /tmp/resolv.conf.vpn
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: using local addresses only for domain test
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: using local addresses only for domain onion
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: using local addresses only for domain localhost
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: using local addresses only for domain local
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: using local addresses only for domain invalid
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: using local addresses only for domain bind
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: using local addresses only for domain lan
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: using nameserver 2a07:241:1:4000::1#53
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: using nameserver 10.20.0.1#53
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: read /etc/hosts - 4 addresses
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq[27115]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Tue Jul 26 15:38:19 2022 daemon.info dnsmasq-dhcp[27115]: read /etc/ethers - 0 addresses
Tue Jul 26 15:38:30 2022 user.info mwan3rtmon[2614]: Detect rtchange event.
Tue Jul 26 15:38:31 2022 user.notice wiregaurd: client start completed, del glwg.lock

Unfortunately it is like your country’s firewall blocks the vpn service.

Express vpn app may has obfuscation in its protocol.