That sounds like a NAT and/or firewall issue. I'm not familiar with OPNsense so i don't know how things are laid out, but I would look in the NAt rules and then the firewall rules first.

Thanks!Main Sequence wrote: ↑Sat Jan 22, 2022 7:12 amUntil that is implemented, you can use timeanddate.com's "What Date is it in X Days?" function: https://www.timeanddate.com/date/dateadd.html
That 365 day token is VALID and will expire at midnight on 9th March 2022 (90 days from now).
Code: Select all
Server: 10.31.33.8
Address: 10.31.33.8#53
** server can't find stormgm7blbk7odd.onion: SERVFAIL
The auth database has a script which cleans up expired sessions. I'm not sure how often it runs though; I assume a minimum of once every 24 hours.
All's good here, how's things with you?
I'm back.Main Sequence wrote: ↑Sat Oct 03, 2020 5:17 pmLook at this way... September has come and gone.. we're now into October. No updates, no new news, no fixes. The Forum admin Parityboy hasn't logged-in for almost a month, with the result that the forum is overrun with spam postings. I can only conclude that the forum is essentially unmoderated, otherwise these spam posts would be long-gone. Everything seems to be running on autopilot.AnonAsPossible wrote: ↑Fri Sep 25, 2020 7:16 amWith cryptostorm.nu & Wireguard still down, it's a safe bet Df still ain't back. I hope he's OK, he is 'Cryptostorm', without him what do we have!?n8 wrote: ↑Thu Sep 24, 2020 11:49 amHey CS team
Any news on the network status?
- cryptostorm.nu is still bust
- Wireguard for CS is down
- OpenVPN is warning that it will soon discontinue 'compress' in your configs
- Is Df back? Last mention of him being available was end of August...
So an update would be higly appreciated. Thanks and take care.
n8
Over time, I can only anticipate that more and more services will break, and not be fixed. By all appearances, Cryptostorm is in terminal decline.
Your understanding would appear to be correct.
Code: Select all
Resolving saimei.ftp.acc.umu.se (saimei.ftp.acc.umu.se)... 194.71.11.138, 2001:6b0:19::138
Connecting to saimei.ftp.acc.umu.se (saimei.ftp.acc.umu.se)|194.71.11.138|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 2036826112 (1.9G) [application/x-iso9660-image]
Saving to: ‘linuxmint-19.3-cinnamon-64bit.iso’
linuxmint-19.3-cinnamon-64bit.iso 100%[=========================================================================>] 1.90G 7.28MB/s in 4m 20s
2019-12-30 22:50:03 (7.48 MB/s) - ‘linuxmint-19.3-cinnamon-64bit.iso’ saved [2036826112/2036826112]
I could be wrong but apart from a misconfiguration, the Frankfurt node might have a flaky network card in it.DudeOfLondon wrote: ↑Thu Dec 05, 2019 5:16 amAlso some European servers don't load all webpages. eg. the Frankfurt node does oly load half of my websites. Not ebven this forum loads with the Frankfurt node.
Absolutely no idea. He could have been hit by a car, struck down with illness, had to relocate @ short notice (although the last one is less likely, considering the lack of comms but you never know).
HavenLabs is not a Twitter account I follow, so I can't comment on that. However, there is certainly something strange (and presumably not good) happening.AnonAsPossible wrote: ↑Tue Dec 03, 2019 10:35 pmThis is worrying, lots of down servers, df not seen anywhere, strange message on twitter yesterday!!
parityboy, any insights?????
edit; also HavenLabs hasn't tweeted anything since july 7, they're part of CS, right? There's something strange going on...
Code: Select all
[SSL Connection Warning] The SSL certificate for the server irc.cryptostorm.is (port 6697) failed the authenticity check.
If you have a native IRC client, you can hop onto IRC at irc.cryptostorm.is, port 6697 (SSL) or 6667 (non-SSL).
With OpenVPN, which configs are you using (RSA, ed448, ed25519)? Also which server are you trying to connect to? Could you post any logs?
Code: Select all
nslookup la.cryptostorm.pw
Code: Select all
Server: 127.0.1.1
Address: 127.0.1.1#53
Non-authoritative answer:
Name: la.cryptostorm.pw
Address: 173.208.77.71
Name: la.cryptostorm.pw
Address: 173.208.77.70
Name: la.cryptostorm.pw
Address: 173.208.77.89
Name: la.cryptostorm.pw
Address: 23.19.67.117
Name: la.cryptostorm.pw
Address: 173.208.77.78
Name: la.cryptostorm.pw
Address: 173.208.77.82
Name: la.cryptostorm.pw
Address: 173.208.77.79
Name: la.cryptostorm.pw
Address: 173.208.77.67
Name: la.cryptostorm.pw
Address: 173.208.77.80
Name: la.cryptostorm.pw
Address: 173.208.77.84
Name: la.cryptostorm.pw
Address: 173.208.77.83
Name: la.cryptostorm.pw
Address: 173.208.77.81
Name: la.cryptostorm.pw
Address: 173.208.77.76
Name: la.cryptostorm.pw
Address: 173.208.77.86
Name: la.cryptostorm.pw
Address: 173.208.77.75
Name: la.cryptostorm.pw
Address: 173.208.77.77
Name: la.cryptostorm.pw
Address: 173.208.77.72
Name: la.cryptostorm.pw
Address: 173.208.77.85
Name: la.cryptostorm.pw
Address: 173.208.77.90
Name: la.cryptostorm.pw
Address: 173.208.77.88
Name: la.cryptostorm.pw
Address: 173.208.77.66
Name: la.cryptostorm.pw
Address: 23.19.67.119
Name: la.cryptostorm.pw
Address: 173.208.77.73
Name: la.cryptostorm.pw
Address: 173.208.77.69
Name: la.cryptostorm.pw
Address: 173.208.77.68
Name: la.cryptostorm.pw
Address: 173.208.77.87
Name: la.cryptostorm.pw
Address: 23.19.67.118
Name: la.cryptostorm.pw
Address: 173.208.77.91
Name: la.cryptostorm.pw
Address: 173.208.77.74
SourceOn the surface, it may seem that the VPN market is teeming with various companies competing for a piece of the growing consumer VPN pie.
However, when we began to look further into the VPNs and the companies that own them, we noticed something interesting: a lot of these products are owned by the same company. With our interests piqued, we decided to dig deeper to see just how many VPN products are owned or operated by which companies.
The number may surprise you:
Our research shows that at least 97 VPN products are owned or operated by only 23 companies.
This includes both cross-platform and mobile-only VPN products. It also includes direct subsidiaries or products/brands, as well as white label services. This represents a much bigger number than was previously reported in other research.
For our analysis, we only included parent companies that own or operate more than one VPN product.
You can find our infographic that summarizes our research here.
That's the one thing that pfSense cannot do. It'll do it on it's WAN interface, but not on any of the tunnel interfaces. If it could, it would make life far, far simpler...df wrote: ↑Sat May 04, 2019 7:45 pm@parityboy
...
As for the DNS leak test failing, I can only see that happening on a host behind the router, and only if the host is set to use DHCP and a DNS server running on the router (which would be connected to CS, and maybe set to use the DNS pushed by the VPN).
SourceWeird things are afoot with NordVPN's app and the traffic it generates - Reg readers have spotted it contacting strange domains in the same way compromised machines talk to botnets' command-and-control servers.
Although NordVPN has told us this is expected behaviour by the app and is intended as a counter-blocking mechanism, the company's explanation has shifted a number of times.
...
Further scratching of heads led to infosec bod Ryan Niemes' personal blog, where he had written about exactly the same odd traffic. Except Niemes had noticed something else too: these domains weren't owned by anybody. So he bought them and spun up an EC2 instance to log what was coming in.
Code: Select all
whoami.cryptostorm.is has address 88.202.180.213
Code: Select all
sudo -s
wget -O - https://swupdate.openvpn.net/repos/repo-public.gpg|apt-key add -
echo "deb http://build.openvpn.net/debian/openvpn/stable bionic main" > /etc/apt/sources.list.d/openvpn-aptrepo.list
apt-get update && apt-get install openvpn
exit