Configuring dd-wrt OpenVPN client w/ PureVPN: Some Advice

Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking
Goto page Previous  1, 2, 3 ... 6, 7, 8, 9, 10, 11  Next
Author Message
Cableboxman
DD-WRT Novice


Joined: 22 Jul 2017
Posts: 2

PostPosted: Thu Oct 05, 2017 5:25    Post subject: Openvpn workaround latest firmware Reply with quote
mosher2k wrote:
hello,

thanks for your help and efforts.

i tried the script on my Linksys E1700 (DD-WRT v3.0-r33413 std (09/27/17) but without success.

anything else i could try ?


Clientlog:
20171003 15:20:30 Restart pause 5 second(s)
20171003 15:20:35 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20171003 15:20:35 I TCP/UDP: Preserving recently used remote address: [AF_INET]xxx.yyy.zz.v:53
20171003 15:20:35 Socket Buffers: R=[172032->344064] S=[172032->344064]
20171003 15:20:35 I UDPv4 link local: (not bound)
20171003 15:20:35 I UDPv4 link remote: [AF_INET]xxx.yyy.zz.v:53
20171003 15:20:35 TLS: Initial packet from [AF_INET]xxx.yyy.zz.v:53 sid=48197b10 550f510c
20171003 15:20:39 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
20171003 15:20:39 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
20171003 15:20:39 N TLS_ERROR: BIO read tls_read_plaintext error
20171003 15:20:39 N TLS Error: TLS object -> incoming plaintext read error
20171003 15:20:39 N TLS Error: TLS handshake failed
20171003 15:20:39 I SIGUSR1[soft tls-error] received process restarting
20171003 15:20:39 Restart pause 5 second(s)
20171003 15:20:44 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20171003 15:20:44 I TCP/UDP: Preserving recently used remote address: [AF_INET]aa.bb.c.ddd:53
20171003 15:20:44 Socket Buffers: R=[172032->344064] S=[172032->344064]
20171003 15:20:44 I UDPv4 link local: (not bound)
20171003 15:20:44 I UDPv4 link remote: [AF_INET]aa.bb.c.ddd:53
20171003 15:20:44 TLS: Initial packet from [AF_INET]aa.bb.c.ddd:53 sid=b1ad9a83 393c454d
20171003 15:20:44 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
20171003 15:20:44 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
20171003 15:20:44 N TLS_ERROR: BIO read tls_read_plaintext error
20171003 15:20:44 N TLS Error: TLS object -> incoming plaintext read error
20171003 15:20:44 N TLS Error: TLS handshake failed
20171003 15:20:44 I SIGUSR1[soft tls-error] received process restarting
20171003 15:20:44 Restart pause 5 second(s)
20171003 15:20:49 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20171003 15:20:49 I TCP/UDP: Preserving recently used remote address: [AF_INET]ddd.eee.ff.ggg:53
20171003 15:20:49 Socket Buffers: R=[172032->344064] S=[172032->344064]
20171003 15:20:49 I UDPv4 link local: (not bound)
20171003 15:20:49 I UDPv4 link remote: [AF_INET]ddd.eee.ff.ggg:53
20171003 15:20:51 N TLS Error: Unroutable control packet received from [AF_INET]ddd.eee.ff.ggg:53 (si=3 op=P_ACK_V1)
20171003 15:20:55 N TLS Error: Unroutable control packet received from [AF_INET]ddd.eee.ff.ggg:53 (si=3 op=P_ACK_V1)
20171003 15:20:56 TLS: Initial packet from [AF_INET]ddd.eee.ff.ggg:53 sid=7ea5f40f 7e813665
20171003 15:21:29 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
20171003 15:21:29 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
20171003 15:21:29 N TLS_ERROR: BIO read tls_read_plaintext error
20171003 15:21:29 N TLS Error: TLS object -> incoming plaintext read error
20171003 15:21:29 N TLS Error: TLS handshake failed
20171003 15:21:29 I SIGUSR1[soft tls-error] received process restarting
20171003 15:21:29 Restart pause 5 second(s)
20171003 15:21:34 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20171003 15:21:34 I TCP/UDP: Preserving recently used remote address: [AF_INET]rrr.sss.ttt.u:53
20171003 15:21:34 Socket Buffers: R=[172032->344064] S=[172032->344064]
20171003 15:21:34 I UDPv4 link local: (not bound)
20171003 15:21:34 I UDPv4 link remote: [AF_INET]rrr.sss.ttt.u:53
20171003 15:21:36 TLS: Initial packet from [AF_INET]rrr.sss.ttt.u:53 sid=579c06ac 17365a1f
20171003 15:21:38 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
20171003 15:21:38 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
20171003 15:21:38 N TLS_ERROR: BIO read tls_read_plaintext error
20171003 15:21:38 N TLS Error: TLS object -> incoming plaintext read error
20171003 15:21:38 N TLS Error: TLS handshake failed
20171003 15:21:38 I SIGUSR1[soft tls-error] received process restarting
20171003 15:21:38 Restart pause 5 second(s)
20171003 15:21:43 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20171003 15:21:43 I TCP/UDP: Preserving recently used remote address: [AF_INET]xxx.yyy.zz.v:53
20171003 15:21:43 Socket Buffers: R=[172032->344064] S=[172032->344064]
20171003 15:21:43 I UDPv4 link local: (not bound)
20171003 15:21:43 I UDPv4 link remote: [AF_INET]xxx.yyy.zz.v:53
20171003 15:21:43 TLS: Initial packet from [AF_INET]xxx.yyy.zz.v:53 sid=1db945a2 c182e673
20171003 15:21:43 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
20171003 15:21:43 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
20171003 15:21:43 N TLS_ERROR: BIO read tls_read_plaintext error
20171003 15:21:43 N TLS Error: TLS object -> incoming plaintext read error
20171003 15:21:43 N TLS Error: TLS handshake failed
20171003 15:21:43 I SIGUSR1[soft tls-error] received process restarting
20171003 15:21:43 Restart pause 5 second(s)
20171003 15:21:48 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20171003 15:21:48 I TCP/UDP: Preserving recently used remote address: [AF_INET]hhh.ii.jjj.k:53
20171003 15:21:48 Socket Buffers: R=[172032->344064] S=[172032->344064]
20171003 15:21:48 I UDPv4 link local: (not bound)
20171003 15:21:48 I UDPv4 link remote: [AF_INET]hhh.ii.jjj.k:53
20171003 15:21:48 TLS: Initial packet from [AF_INET]hhh.ii.jjj.k:53 sid=84d1e08d ac75cec5
20171003 15:21:48 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
20171003 15:21:48 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
20171003 15:21:48 N TLS_ERROR: BIO read tls_read_plaintext error
20171003 15:21:48 N TLS Error: TLS object -> incoming plaintext read error
20171003 15:21:48 N TLS Error: TLS handshake failed
20171003 15:21:49 I SIGUSR1[soft tls-error] received process restarting
20171003 15:21:49 Restart pause 5 second(s)
20171003 15:21:54 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20171003 15:21:54 I TCP/UDP: Preserving recently used remote address: [AF_INET]ccc.ddd.eee.f:53
20171003 15:21:54 Socket Buffers: R=[172032->344064] S=[172032->344064]
20171003 15:21:54 I UDPv4 link local: (not bound)
20171003 15:21:54 I UDPv4 link remote: [AF_INET]ccc.ddd.eee.f:53
20171003 15:21:57 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20171003 15:21:57 D MANAGEMENT: CMD 'state'
20171003 15:21:57 MANAGEMENT: Client disconnected
20171003 15:21:58 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20171003 15:21:58 D MANAGEMENT: CMD 'state'
20171003 15:21:58 MANAGEMENT: Client disconnected
20171003 15:21:58 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20171003 15:21:58 D MANAGEMENT: CMD 'state'
20171003 15:21:58 MANAGEMENT: Client disconnected
20171003 15:21:58 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20171003 15:21:58 D MANAGEMENT: CMD 'status 2'
20171003 15:21:58 MANAGEMENT: Client disconnected
20171003 15:21:58 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20171003 15:21:58 D MANAGEMENT: CMD 'log 500'
19691231 16:00:00




adding this under Additional Config worked instantly for me .

tls-cipher "DEFAULT:@SECLEVEL=0"
Sponsor
drhiii
DD-WRT User


Joined: 19 Mar 2012
Posts: 80

PostPosted: Fri Oct 27, 2017 6:53    Post subject: Buffalo WZR-600DHP, attn: sploit Reply with quote
Sploit, excellent thread. Haven’t seen much mention of Buffalo dd-wrt flashed routers. Wanted to ask opinion on following two Buffaloes. Are either of these candidates for your script? I’ve seen mention of older versions of dd-wrt are preferable. I’d like to give it a go. Very unhappy I ran with PureVPN but since I have it, figure I’d give it a go.

Related to this… one Buffalo is running as a primary router and the second is a client bridge. Works fine. Was wondering if it is possible to enable VPN on the secondary client bridged router and have it work for hard wired and wireless connections via this second client bridged router?? Am trying to run in this configuration for a reason. As an fyi, am getting 65-75MBs down on my current connection (which is a 55MBs service) with these routers, so they seem to be humping along ok.

Finally, if I get your script firing on one or both routers, where can I send you $25 for your hour of services? Hope folks are doing something like this towards you for all the work and expertise you have presented here.

Router Model
WZR-600DHP
Firmware Version
DD-WRT v3.0-r29660 std (05/12/16)
Kernel Version
Linux 3.10.101 #22491 Thu May 12 16:54:15 CEST 2016 mips

Router Model
WZR-600DHP
Firmware Version
DD-WRT v3.0-r30355 std (09/13/16)
Kernel Version
Linux 3.10.102 #27942 Tue Sep 13 15:32:20 CEST 2016 mips
drhiii
DD-WRT User


Joined: 19 Mar 2012
Posts: 80

PostPosted: Fri Nov 17, 2017 9:52    Post subject: repeater router Reply with quote
I have two Buffalo DD-WRT routers. Latest firmware.

Primary Buffalo DD-WRT connected to the cablemodem. Secondary Buffalo DD-WRT connects to the primary and acts as a repeater.

Question... is it possible to have your script run on the secondary repeater/router and establish a VPN that goes through the primary router, and out?
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 12881
Location: Netherlands

PostPosted: Fri Nov 17, 2017 13:15    Post subject: Reply with quote
Yes that is possible just setup as usual and then point your client (set gateway) to that particular router you have OpenVPN setup on
You can use DNSMasq to set alternate gateways or just configure the gateway on the client itself

_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
drhiii
DD-WRT User


Joined: 19 Mar 2012
Posts: 80

PostPosted: Fri Nov 17, 2017 19:38    Post subject: Reply with quote
egc wrote:
Yes that is possible just setup as usual and then point your client (set gateway) to that particular router you have OpenVPN setup on
You can use DNSMasq to set alternate gateways or just configure the gateway on the client itself


Tx for your reply. I've been able to engage with an 'expert' in this now and may be able to finally solve my needs via their experience. Am just weary of fighting through getting a VPN to work...
labo
DD-WRT Guru


Joined: 30 Jan 2015
Posts: 676
Location: Texas, USA

PostPosted: Tue Nov 28, 2017 5:30    Post subject: Reply with quote
I just ordered PureVPN and have the same issue. The documents and tutorials are outdated and nothing works.
Anyone successfully using PureVPN with latest dd-wrt builds?
Thanks,

_________________
ASUS GT-BE98 PRO Main: Fiber 5gbps up/down
ASUS AXE16000: AI Mesh node
2 X ASUS RT-AX89X: AI Mesh nodes
QNAP QSW-1208-8C 12-Port 10GbE Switch
XS712T ProSafe 12-Port 10GbE Switch
3 X R9000 DD-WRT Mesh
labo
DD-WRT Guru


Joined: 30 Jan 2015
Posts: 676
Location: Texas, USA

PostPosted: Tue Nov 28, 2017 18:38    Post subject: Reply with quote
Hmmm, no one Sad
_________________
ASUS GT-BE98 PRO Main: Fiber 5gbps up/down
ASUS AXE16000: AI Mesh node
2 X ASUS RT-AX89X: AI Mesh nodes
QNAP QSW-1208-8C 12-Port 10GbE Switch
XS712T ProSafe 12-Port 10GbE Switch
3 X R9000 DD-WRT Mesh
labo
DD-WRT Guru


Joined: 30 Jan 2015
Posts: 676
Location: Texas, USA

PostPosted: Tue Nov 28, 2017 19:21    Post subject: Reply with quote
Hi Sploit,

I followed your instructions and I get these errors:
Any idea on these errors?
Thanks.


19691231 16:04:04 I TCP/UDP: Preserving recently used remote address: [AF_INET]172.94.95.4:53
19691231 16:04:04 Socket Buffers: R=[180224->360448] S=[180224->360448]
19691231 16:04:04 I UDPv4 link local: (not bound)
19691231 16:04:04 I UDPv4 link remote: [AF_INET]172.94.95.4:53
19691231 16:04:04 TLS: Initial packet from [AF_INET]172.94.95.4:53
19691231 16:04:04 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
19691231 16:04:04 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
19691231 16:04:04 N TLS_ERROR: BIO read tls_read_plaintext error
19691231 16:04:04 N TLS Error: TLS object -> incoming plaintext read error
19691231 16:04:04 N TLS Error: TLS handshake failed
19691231 16:04:04 I SIGUSR1[soft tls-error] received pr

_________________
ASUS GT-BE98 PRO Main: Fiber 5gbps up/down
ASUS AXE16000: AI Mesh node
2 X ASUS RT-AX89X: AI Mesh nodes
QNAP QSW-1208-8C 12-Port 10GbE Switch
XS712T ProSafe 12-Port 10GbE Switch
3 X R9000 DD-WRT Mesh
tragik1234
DD-WRT Novice


Joined: 01 Dec 2017
Posts: 1

PostPosted: Fri Dec 01, 2017 18:37    Post subject: Reply with quote
add to additional config

tls-cipher "DEFAULT:@SECLEVEL=0"
laticsfan1985
DD-WRT Novice


Joined: 05 Dec 2017
Posts: 1

PostPosted: Tue Dec 05, 2017 23:21    Post subject: Reply with quote
labo wrote:
I just ordered PureVPN and have the same issue. The documents and tutorials are outdated and nothing works.
Anyone successfully using PureVPN with latest dd-wrt builds?
Thanks,


also like to know if anyone has done it with a recent build, wife bought me a flashed netgear ac1750 router from ebay (flashed with DD-WRT v3.0-r33615M (10/31/17)) are there any steps i can take to install the purevpn i have, ive read spoits but i would need to downgrade for that yes??

excuse the rambling but im knackered and the baby has only just gone to bed! lol thank you all in advance
m-snel
DD-WRT Novice


Joined: 10 Feb 2016
Posts: 35

PostPosted: Thu Jan 18, 2018 15:27    Post subject: Reply with quote
laticsfan1985 wrote:
also like to know if anyone has done it with a recent build, wife bought me a flashed netgear ac1750 router from ebay (flashed with DD-WRT v3.0-r33615M (10/31/17)) are there any steps i can take to install the purevpn i have, ive read spoits but i would need to downgrade for that yes??

excuse the rambling but im knackered and the baby has only just gone to bed! lol thank you all in advance


I have had the same issue since august.

DD-WRT v3.0-r33006 std (08/03/17) and older work with PureVPN (so you should indeed downgrade).

All versions after that (up to the today tested 01/07/1Cool give the "RECONNECTING tls-error". It seems something has changed in DD-WRT after august 3rd that breaks OpenVPN in combination with Purevpn. It would be great if this could be troubleshooted/solved.

**Edit** For PureVPN users, see also https://www.dd-wrt.com/phpBB2/viewtopic.php?t=313377
m-snel
DD-WRT Novice


Joined: 10 Feb 2016
Posts: 35

PostPosted: Sun Jan 21, 2018 13:49    Post subject: Reply with quote
Reconnecting tls-error Problem solved!!!

PureVPN is aware of the problem and has setup some servers that work. In my case (as I live in Holland) I had to change the server from nl1-ovpn-udp.pointtoserver.com to nl2-ovpn-udp.pointtoserver.com and got a new CA certificate.

So PureVPN is updating their servers and fixing the problem.

*** Edit, see https://www.dd-wrt.com/phpBB2/viewtopic.php?p=1114130#1114130 for the servers and certificate
sploit
DD-WRT User


Joined: 16 Apr 2016
Posts: 307
Location: California

PostPosted: Mon Jan 22, 2018 6:09    Post subject: OpenSSL and PureVPN Reply with quote
Ok so here is the get down.
The Great Developers at ddwrt always have your security in mind.
This being said, DDWRT uses newer OpenSSL that PureVPN is just now deciding to impliment.

HOWEVER, it is not necessary completely...

For all of you out there banging your heads into paste, here is what you ADD to your openvpn "Additional Config" section

Code:
tls-cipher "DEFAULT:@SECLEVEL=0"


Add that to the bottom line.

It will overide the TLS-Cipher options in ddwrt.

This does work and I just tested it to verify.

Again, I hate this company. I only did this because I feel sorry for their victims

I Will update my installation script to have this.

NOTE
INSTALL SCRIPT UPDATED

_________________
My Karma ran over your Dogma
SploitWorks Custom Flashed Routers
EdJanx
DD-WRT Novice


Joined: 09 Nov 2016
Posts: 14

PostPosted: Wed Apr 11, 2018 14:56    Post subject: PureVPN script gone.... Reply with quote
Figures, just when I thought I found a solution to PureVPN's horrible router support, the magic script seems to have disappeared.

eval `wget -q -O - http://vpnsetups.sploitworks.com/purevpn-has-rotten-manuals.sh`

wget: server returned error: HTTP/1.1 404 Not Found


Also tried right-clicking and downloading, but got 'Failed - No File'

Anyone happen to save a copy?

Thanks,
Janx
sploit
DD-WRT User


Joined: 16 Apr 2016
Posts: 307
Location: California

PostPosted: Wed Apr 11, 2018 16:18    Post subject: Its down? Reply with quote
Shouldnt be down. Let me check

-----

Update

Not down. You didn't copy and paste the code correctly.

Copy and Paste it exactly as it is on my guide on Page 1 of this thread. NOT anybody elses comments or comments to my original post. ONLY my post. Other people modify my posts and change stuff because they think they know what they are doing and clearly don't.

Not gonna explain why, you should be able to see it.
READ.

_________________
My Karma ran over your Dogma
SploitWorks Custom Flashed Routers
Goto page Previous  1, 2, 3 ... 6, 7, 8, 9, 10, 11  Next Display posts from previous:    Page 7 of 11
Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum