*** Note ***
It is good practice with PureVPN to use the server IP instead of the name.... This company has resolve problems...
)
I don't however guarantee [i]PureVPN[/i] service reliability.... they lack reliability and in my opinion some security also.
Sploit wrote use the Servers IP address
where do we find them .
this is whats Added to my Additional Config when i use his
setup file
it works for client UDP but not for Client TCP
I had to delete it and then Client TCP worked
help please
----------------
resolv-retry infinite
nobind
persist-key
persist-tun
comp-lzo
route-delay 2
fast-io
### Below Used only if no TLS key specified
remote-cert-tls server
sndbuf 524288
rcvbuf 524288
### Additional Tweaks PUREVPN Specific
explicit-exit-notify 2
mute 20
route 0.0.0.0 0.0.0.0
ifconfig-nowarn
Well.... Simply open up your command prompt and ping the server... it will give you the IP address of the server...
It is Internet for Dummies like me .
I did my network courses 1992 . then there were no jobs so i Forgot it all
Thanks for your help whoops not that bad 2002
Is there any Chance of you doing a new new Basic dd-wrt router setup for us Newbies out here .
Thanks
_________________ £££££££££££££££
Linksys 1900acsv2 dd-wrt r32170
Asus rtn56u not in use
hard wired
Vusolo2
Android tv
Windows 10 pc
Try Once .. Try Again ... Keep Going
Last edited by PeterTosh on Wed Sep 06, 2017 5:07; edited 1 time in total
*** Note ***
It is good practice with PureVPN to use the server IP instead of the name.... This company has resolve problems...
If you guys can't get connected, and don't want to deal with installation, I charge $25.00/hour for remote tech support for dd-wrt users and connection is guaranteed. (For all VPN providers that support openvpn)
I don't however guarantee [i]PureVPN[/i] service reliability.... they lack reliability and in my opinion some security also.
Still getting the tls error on the linksys 1200AC after reinstalling the script here is the log:State
Client: WAIT
Local Address:
Remote Address:
Log
Clientlog:
20170904 15:26:47 I SIGUSR1[soft tls-error] received process restarting
20170904 15:26:47 Restart pause 5 second(s)
20170904 15:26:52 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20170904 15:26:52 I TCP/UDP: Preserving recently used remote address: [AF_INET]108.61.41.3:53
20170904 15:26:52 Socket Buffers: R=[180224->360448] S=[180224->360448]
20170904 15:26:52 I UDPv4 link local: (not bound)
20170904 15:26:52 I UDPv4 link remote: [AF_INET]108.61.41.3:53
20170904 15:26:52 TLS: Initial packet from [AF_INET]108.61.41.3:53 sid=367325d3 dea34214
20170904 15:26:52 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
20170904 15:26:52 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
20170904 15:26:52 N TLS_ERROR: BIO read tls_read_plaintext error
20170904 15:26:52 N TLS Error: TLS object -> incoming plaintext read error
20170904 15:26:52 N TLS Error: TLS handshake failed
20170904 15:26:52 I SIGUSR1[soft tls-error] received process restarting
20170904 15:26:52 Restart pause 5 second(s)
20170904 15:26:57 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20170904 15:26:57 I TCP/UDP: Preserving recently used remote address: [AF_INET]172.94.40.3:53
20170904 15:26:57 Socket Buffers: R=[180224->360448] S=[180224->360448]
20170904 15:26:57 I UDPv4 link local: (not bound)
20170904 15:26:57 I UDPv4 link remote: [AF_INET]172.94.40.3:53
20170904 15:26:57 TLS: Initial packet from [AF_INET]172.94.40.3:53 sid=aa92becb d8209882
20170904 15:26:57 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
20170904 15:26:57 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
20170904 15:26:57 N TLS_ERROR: BIO read tls_read_plaintext error
20170904 15:26:57 N TLS Error: TLS object -> incoming plaintext read error
20170904 15:26:57 N TLS Error: TLS handshake failed
20170904 15:26:57 I SIGUSR1[soft tls-error] received process restarting
20170904 15:26:57 Restart pause 5 second(s)
20170904 15:27:02 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20170904 15:27:02 I TCP/UDP: Preserving recently used remote address: [AF_INET]172.94.40.3:53
20170904 15:27:02 Socket Buffers: R=[180224->360448] S=[180224->360448]
20170904 15:27:02 I UDPv4 link local: (not bound)
20170904 15:27:02 I UDPv4 link remote: [AF_INET]172.94.40.3:53
20170904 15:27:02 TLS: Initial packet from [AF_INET]172.94.40.3:53 sid=d6f5533e 3ca32ede
20170904 15:27:03 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
20170904 15:27:03 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
20170904 15:27:03 N TLS_ERROR: BIO read tls_read_plaintext error
20170904 15:27:03 N TLS Error: TLS object -> incoming plaintext read error
20170904 15:27:03 N TLS Error: TLS handshake failed
20170904 15:27:03 I SIGUSR1[soft tls-error] received process restarting
20170904 15:27:03 Restart pause 5 second(s)
20170904 15:27:08 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20170904 15:27:08 I TCP/UDP: Preserving recently used remote address: [AF_INET]108.61.41.3:53
20170904 15:27:08 Socket Buffers: R=[180224->360448] S=[180224->360448]
20170904 15:27:08 I UDPv4 link local: (not bound)
20170904 15:27:08 I UDPv4 link remote: [AF_INET]108.61.41.3:53
20170904 15:27:08 TLS: Initial packet from [AF_INET]108.61.41.3:53 sid=875b296e 568b02b7
20170904 15:27:08 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
20170904 15:27:08 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
20170904 15:27:08 N TLS_ERROR: BIO read tls_read_plaintext error
20170904 15:27:08 N TLS Error: TLS object -> incoming plaintext read error
20170904 15:27:08 N TLS Error: TLS handshake failed
20170904 15:27:08 I SIGUSR1[soft tls-error] received process restarting
20170904 15:27:08 Restart pause 5 second(s)
20170904 15:27:13 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20170904 15:27:13 I TCP/UDP: Preserving recently used remote address: [AF_INET]108.61.41.3:53
20170904 15:27:13 Socket Buffers: R=[180224->360448] S=[180224->360448]
20170904 15:27:13 I UDPv4 link local: (not bound)
20170904 15:27:13 I UDPv4 link remote: [AF_INET]108.61.41.3:53
20170904 15:27:13 TLS: Initial packet from [AF_INET]108.61.41.3:53 sid=4b6c96b1 c4d991d4
20170904 15:27:13 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
20170904 15:27:13 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
20170904 15:27:13 N TLS_ERROR: BIO read tls_read_plaintext error
20170904 15:27:13 N TLS Error: TLS object -> incoming plaintext read error
20170904 15:27:13 N TLS Error: TLS handshake failed
20170904 15:27:13 I SIGUSR1[soft tls-error] received process restarting
20170904 15:27:13 Restart pause 5 second(s)
20170904 15:27:18 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20170904 15:27:18 I TCP/UDP: Preserving recently used remote address: [AF_INET]172.94.40.3:53
20170904 15:27:18 Socket Buffers: R=[180224->360448] S=[180224->360448]
20170904 15:27:18 I UDPv4 link local: (not bound)
20170904 15:27:18 I UDPv4 link remote: [AF_INET]172.94.40.3:53
20170904 15:27:18 TLS: Initial packet from [AF_INET]172.94.40.3:53 sid=2241efa4 7b8a19ec
20170904 15:27:18 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
20170904 15:27:18 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
20170904 15:27:18 N TLS_ERROR: BIO read tls_read_plaintext error
20170904 15:27:18 N TLS Error: TLS object -> incoming plaintext read error
20170904 15:27:18 N TLS Error: TLS handshake failed
20170904 15:27:18 I SIGUSR1[soft tls-error] received process restarting
20170904 15:27:18 Restart pause 5 second(s)
20170904 15:27:23 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20170904 15:27:23 I TCP/UDP: Preserving recently used remote address: [AF_INET]172.94.40.3:53
20170904 15:27:23 Socket Buffers: R=[180224->360448] S=[180224->360448]
20170904 15:27:23 I UDPv4 link local: (not bound)
20170904 15:27:23 I UDPv4 link remote: [AF_INET]172.94.40.3:53
20170904 15:27:23 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20170904 15:27:23 D MANAGEMENT: CMD 'state'
20170904 15:27:23 MANAGEMENT: Client disconnected
20170904 15:27:23 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20170904 15:27:23 D MANAGEMENT: CMD 'state'
20170904 15:27:23 MANAGEMENT: Client disconnected
20170904 15:27:23 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20170904 15:27:23 D MANAGEMENT: CMD 'state'
20170904 15:27:23 MANAGEMENT: Client disconnected
20170904 15:27:23 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20170904 15:27:23 D MANAGEMENT: CMD 'status 2'
20170904 15:27:23 MANAGEMENT: Client disconnected
20170904 15:27:23 TLS: Initial packet from [AF_INET]172.94.40.3:53 sid=16fc3310 a68bb6d4
20170904 15:27:23 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20170904 15:27:23 D MANAGEMENT: CMD 'log 500'
19691231 16:00:00
I reinstalled the script on my TP-Link C9 Archer and now the Pure VPN is giving me that same TLS error I had with the Linksys 1200 AC guess I wil need to roll back the firmware on that router also.
Posted: Thu Sep 07, 2017 8:15 Post subject: £££££££££££££££££££ for me
Spoilt
Please check this out
this as stated before is your set up addedd to Additional config in dd-wrt vpn cleint.
........................
resolv-retry infinite
nobind
persist-key
persist-tun
comp-lzo
route-delay 2
fast-io
### Below Used only if no TLS key specified
remote-cert-tls server
sndbuf 524288
rcvbuf 524288
### Additional Tweaks PUREVPN Specific
explicit-exit-notify 2
mute 20
route 0.0.0.0 0.0.0.0
ifconfig-nowarn
.......
when i use it i get no connection at all .
i hvae removed each line in the bottom section
after
### Additional Tweaks PUREVPN Specific
explicit-exit-notify 2
mute 20
route 0.0.0.0 0.0.0.0
ifconfig-nowarn
and then checed connection ...
One of the forum users told me there may be an issue with newest brainslayer builds with PureVPN.
I hooked up a WRT1200ACv2 and Confirmed the Issue.
It turns out Brainslayers builds (the main ftp.dd-wrt.com from 08-22-2017 to curremt 08-29-2017 are busted for the TLS Cipher.
This is specific for PureVPN but may be a problem for another VPN company that is using the same style of TLS Ciphers
More than likely Purevpn doesn't like some new openvpn commands. Who knows. PureVPN is strange.
I tested all builds from 04-24-2017 to 08-29-2017 and it broke on 08-22-2017. 08-03-2017 is most current that can be used for PureVPN
This may be the case for other routers as well.
For anyone going crazy with the TLS error using my script more than likely its the firmware build.
Roll back to 08-03-2017 ddwrt and try the script.
My script only modifies the NVRAM variables and doesnt install any crapware so it should work accross ALL working ddwrt builds with OpenVPN Client... Always
Also, for those hands on techies interested, check out my Keep Alive Script for VPN's.
It was built to keep pain in the @$$ VPN companies connections up and running. _________________ My Karma ran over your Dogma
SploitWorks Custom Flashed Routers
Posted: Sat Sep 16, 2017 20:56 Post subject: Re: For all going crazy
sploit wrote:
I tested all builds from 04-24-2017 to 08-29-2017 and it broke on 08-22-2017. 08-03-2017 is most current that can be used for PureVPN
This may be the case for other routers as well.
I have an issue as well. I don't know if it's related, but I thought I'd mention it just in case.
I have a Netgear WNDR-4500v2 router. I had been using a pretty old version of dd-wrt with PureVPN working just fine, and eibgrad's basic script to route it to specific devices.
For various reasons I upgraded to DD-WRT v3.0-r33006 giga (08/03/17) and now I seem to be able to get my router to connect to PureVPN but eibgrad's scripts (both basic and advanced) no longer work.
I've tried a factory reset as well, and no matter what I do it's always the same. As far as I can tell (with some educated guesswork, realistically), it looks as if the scripts create two files in a folder called "ovpn_split" and then they run somehow to get everything working.
When I check my router, I can find an "ovpn_split" folder in both /tmp/ and /jffs/tmp/ and neither one has any files inside it.
Is this possibly related to the problems listed above?
Joined: 16 Apr 2016 Posts: 307 Location: California
Posted: Mon Sep 18, 2017 0:38 Post subject: Split Tunneling
Not sure exactly what you are doing BUT.... If you already ran a factory reset install purevpn using my automation just to get the VPN up and running and then consult Eibgrads notes. _________________ My Karma ran over your Dogma
SploitWorks Custom Flashed Routers