by Moonlight » Sat Nov 17, 2018 4:01 am
@DF
Win 10 Pro x64 OS Build 17763.134
clean install CS widget 3.36.0.274
reboot pc
cs tap-windows adapter is set to: obtain dns server address automatically
ethernet adapter is set to: obtain DNS server address automatically
cs-dnsc-p.exe not running
frankfurt - connection stalling (no difference if dns is set to 1.1.1.1 or to obtain dns server address automatically)
(don't know how to copy with the scrolling function)
Code: Select all
OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
Windows version 6.2 (Windows 8 or greater) 64bit
library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.10
Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
TCP/UDP: Preserving recently used remote address: [AF_INET]84.16.240.42:443
Socket Buffers: R=[65536->65536] S=[65536->65536]
UDP link local (bound): [AF_INET][undef]:1194
UDP link remote: [AF_INET]84.16.240.42:443
TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
TLS Error: TLS handshake failed
TCP/UDP: Closing socket
SIGUSR1[soft,tls-error] received, process restarting
Restart pause, 5 second(s)
Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
TCP/UDP: Preserving recently used remote address: [AF_INET]84.16.240.42:443
Socket Buffers: R=[65536->65536] S=[65536->65536]
UDP link local (bound): [AF_INET][undef]:1194
UDP link remote: [AF_INET]84.16.240.42:443
switzerland - working (will connect only if dns set to 1.1.1.1 [when presented with the message if i want the dns set to 1.1.1.1 i say yes, but it doesn't, i have to set it up manually - this option was working as intended in previous widget versions])
Code: Select all
OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
Windows version 6.2 (Windows 8 or greater) 64bit
library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.10
Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
TCP/UDP: Preserving recently used remote address: [AF_INET]81.17.31.36:443
Socket Buffers: R=[65536->65536] S=[65536->65536]
UDP link local (bound): [AF_INET][undef]:1194
UDP link remote: [AF_INET]81.17.31.36:443
TLS: Initial packet from [AF_INET]81.17.31.36:443, sid=b4513a84 634e3cce
VERIFY OK: depth=1, CN=cryptostorm CA
VERIFY KU OK
Validating certificate extended key usage
Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305, 521 bit EC, curve: secp521r1
[cryptostorm server] Peer Connection Initiated with [AF_INET]81.17.31.36:443
SENT CONTROL [cryptostorm server]: 'PUSH_REQUEST' (status=1)
PUSH: Received control message: 'PUSH_REPLY,persist-key,persist-tun,redirect-gateway def1,dhcp-option DNS 81.17.31.34,route-gateway 10.66.2.1,topology subnet,ping 20,ping-restart 60,redirect-gateway bypass-dhcp,register-dns,block-outside-dns,ifconfig 10.66.2.192 255.255.255.0,peer-id 0,cipher AES-256-GCM'
OPTIONS IMPORT: timers and/or timeouts modified
OPTIONS IMPORT: --persist options modified
Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=14 HWADDR=00:1a:a0:c0:47:62
open_tun
TAP-WIN32 device [cryptostorm] opened: \\.\Global\{E3A13870-D906-4C80-8063-8DBC242CD57B}.tap
TAP-Windows Driver Version 9.21
TAP-Windows MTU=1500
Set TAP-Windows TUN subnet mode network/local/netmask = 10.66.2.0/10.66.2.192/255.255.255.0 [SUCCEEDED]
DHCP option string: 06080a1f 21075111 1f22
Successful ARP Flush on interface [24] {E3A13870-D906-4C80-8063-8DBC242CD57B}
do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Blocking outside DNS
Block_DNS: WFP engine opened
Block_DNS: Using existing sublayer
Block_DNS: Added permit filters for exe_path
Block_DNS: Added block filters for all interfaces
Block_DNS: Added permit filters for TAP interface
C:\WINDOWS\system32\route.exe ADD 81.17.31.36 MASK 255.255.255.255 192.168.0.1
ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
Route addition via IPAPI succeeded [adaptive]
C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.66.2.1
ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=3 and dwForwardType=4
Route addition via IPAPI succeeded [adaptive]
C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.66.2.1
ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=3 and dwForwardType=4
Route addition via IPAPI succeeded [adaptive]
Initialization Sequence Completed
Sat Nov 17 08:40:29 2018 Start ipconfig commands for register-dns...
Sat Nov 17 08:40:29 2018 C:\WINDOWS\system32\ipconfig.exe /flushdns
Sat Nov 17 08:40:29 2018 C:\WINDOWS\system32\ipconfig.exe /registerdns
Connected
Sat Nov 17 08:40:32 2018 End ipconfig commands for register-dns...
Thank you.
! | Message from: parityboy |
Added code tags to improve readability of logs. |
@DF
Win 10 Pro x64 OS Build 17763.134
clean install CS widget 3.36.0.274
reboot pc
cs tap-windows adapter is set to: obtain dns server address automatically
ethernet adapter is set to: obtain DNS server address automatically
cs-dnsc-p.exe not running
frankfurt - connection stalling (no difference if dns is set to 1.1.1.1 or to obtain dns server address automatically)
(don't know how to copy with the scrolling function)
[code]OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
Windows version 6.2 (Windows 8 or greater) 64bit
library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.10
Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
TCP/UDP: Preserving recently used remote address: [AF_INET]84.16.240.42:443
Socket Buffers: R=[65536->65536] S=[65536->65536]
UDP link local (bound): [AF_INET][undef]:1194
UDP link remote: [AF_INET]84.16.240.42:443
TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
TLS Error: TLS handshake failed
TCP/UDP: Closing socket
SIGUSR1[soft,tls-error] received, process restarting
Restart pause, 5 second(s)
Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
TCP/UDP: Preserving recently used remote address: [AF_INET]84.16.240.42:443
Socket Buffers: R=[65536->65536] S=[65536->65536]
UDP link local (bound): [AF_INET][undef]:1194
UDP link remote: [AF_INET]84.16.240.42:443
[/code]
switzerland - working (will connect only if dns set to 1.1.1.1 [when presented with the message if i want the dns set to 1.1.1.1 i say yes, but it doesn't, i have to set it up manually - this option was working as intended in previous widget versions])
[code]OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
Windows version 6.2 (Windows 8 or greater) 64bit
library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.10
Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
TCP/UDP: Preserving recently used remote address: [AF_INET]81.17.31.36:443
Socket Buffers: R=[65536->65536] S=[65536->65536]
UDP link local (bound): [AF_INET][undef]:1194
UDP link remote: [AF_INET]81.17.31.36:443
TLS: Initial packet from [AF_INET]81.17.31.36:443, sid=b4513a84 634e3cce
VERIFY OK: depth=1, CN=cryptostorm CA
VERIFY KU OK
Validating certificate extended key usage
Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305, 521 bit EC, curve: secp521r1
[cryptostorm server] Peer Connection Initiated with [AF_INET]81.17.31.36:443
SENT CONTROL [cryptostorm server]: 'PUSH_REQUEST' (status=1)
PUSH: Received control message: 'PUSH_REPLY,persist-key,persist-tun,redirect-gateway def1,dhcp-option DNS 81.17.31.34,route-gateway 10.66.2.1,topology subnet,ping 20,ping-restart 60,redirect-gateway bypass-dhcp,register-dns,block-outside-dns,ifconfig 10.66.2.192 255.255.255.0,peer-id 0,cipher AES-256-GCM'
OPTIONS IMPORT: timers and/or timeouts modified
OPTIONS IMPORT: --persist options modified
Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=14 HWADDR=00:1a:a0:c0:47:62
open_tun
TAP-WIN32 device [cryptostorm] opened: \\.\Global\{E3A13870-D906-4C80-8063-8DBC242CD57B}.tap
TAP-Windows Driver Version 9.21
TAP-Windows MTU=1500
Set TAP-Windows TUN subnet mode network/local/netmask = 10.66.2.0/10.66.2.192/255.255.255.0 [SUCCEEDED]
DHCP option string: 06080a1f 21075111 1f22
Successful ARP Flush on interface [24] {E3A13870-D906-4C80-8063-8DBC242CD57B}
do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Blocking outside DNS
Block_DNS: WFP engine opened
Block_DNS: Using existing sublayer
Block_DNS: Added permit filters for exe_path
Block_DNS: Added block filters for all interfaces
Block_DNS: Added permit filters for TAP interface
C:\WINDOWS\system32\route.exe ADD 81.17.31.36 MASK 255.255.255.255 192.168.0.1
ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
Route addition via IPAPI succeeded [adaptive]
C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.66.2.1
ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=3 and dwForwardType=4
Route addition via IPAPI succeeded [adaptive]
C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.66.2.1
ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=3 and dwForwardType=4
Route addition via IPAPI succeeded [adaptive]
Initialization Sequence Completed
Sat Nov 17 08:40:29 2018 Start ipconfig commands for register-dns...
Sat Nov 17 08:40:29 2018 C:\WINDOWS\system32\ipconfig.exe /flushdns
Sat Nov 17 08:40:29 2018 C:\WINDOWS\system32\ipconfig.exe /registerdns
Connected
Sat Nov 17 08:40:32 2018 End ipconfig commands for register-dns...
[/code]
Thank you.
[mod=parityboy]Added code tags to improve readability of logs.[/mod]