Configuring dd-wrt OpenVPN client w/ PureVPN: Some Advice

Post new topic   Reply to topic    DD-WRT Forum Forum Index -> Advanced Networking
Goto page Previous  1, 2, 3, 4, 5, 6, 7, 8, 9, 10  Next
Author Message
slphelan
DD-WRT Novice


Joined: 04 Sep 2017
Posts: 6

PostPosted: Tue Sep 05, 2017 2:23    Post subject: Re: Did you... Reply with quote
rsatoshi wrote:
slphelan wrote:
sploit wrote:
Did you try any other install methods on the internet before using this script?

There may be crap data installed on the router....

You dont have anything installed i custom scripts do you?


Tried to install the pure vpn open vpn instructions that were posted on their website as well as at flash routers. And the purevpn beta WRT app and that was a command script.

Prior to installing your script I did a 30/30/30 reset of the router then I installed the script. The only thing i set up was my wireless settings and wireless security settings.




Hi,

Take a look in my message above. I had to downgrade the DD-WRT firmware to make it work. I am using a TP-Link C7 v2.


Did you downgrade with the webflash.bin or both the factory to ddwrt and the webflash bin
Sponsor
rsatoshi
DD-WRT Novice


Joined: 02 Sep 2017
Posts: 9

PostPosted: Tue Sep 05, 2017 2:31    Post subject: Re: Did you... Reply with quote
slphelan wrote:

Did you downgrade with the webflash.bin or both the factory to ddwrt and the webflash bin


If you already have the ddwrt in your router you don't need to use the factory to ddwrt
PeterTosh
DD-WRT Novice


Joined: 15 Aug 2017
Posts: 12

PostPosted: Tue Sep 05, 2017 11:19    Post subject: Re: Install the Reply with quote
sploit wrote:
Install the script again...I had to remove forcing TLS 384 Handshake, some routers dont support it... (Sorry guys.)

Now, once the script installs...
Enter your PureVPN username and Pass under :SETTINGS...VPN (scroll down to client)

Your PureVPN username looks like purevpn0s22817

For the Server...
You can get the server names here...(Make sure and get the OpenVPN Server name for UDP)
https://support.purevpn.com/vpn-servers


*** Note ***
It is good practice with PureVPN to use the server IP instead of the name.... This company has resolve problems...


)


I don't however guarantee [i]PureVPN[/i] service reliability.... they lack reliability and in my opinion some security also.


Sploit wrote use the Servers IP address
where do we find them .
this is whats Added to my Additional Config when i use his
setup file
it works for client UDP but not for Client TCP
I had to delete it and then Client TCP worked
help please
----------------
resolv-retry infinite
nobind
persist-key
persist-tun
comp-lzo
route-delay 2
fast-io
### Below Used only if no TLS key specified
remote-cert-tls server
sndbuf 524288
rcvbuf 524288
### Additional Tweaks PUREVPN Specific
explicit-exit-notify 2
mute 20
route 0.0.0.0 0.0.0.0
ifconfig-nowarn
sploit
DD-WRT User


Joined: 16 Apr 2016
Posts: 302
Location: California

PostPosted: Tue Sep 05, 2017 17:36    Post subject: Re: Install the Reply with quote
PeterTosh wrote:
sploit wrote:
Install the script again...I had to remove forcing TLS 384 Handshake, some routers dont support it... (Sorry guys.)

Now, once the script installs...
Enter your PureVPN username and Pass under :SETTINGS...VPN (scroll down to client)

Your PureVPN username looks like purevpn0s22817

For the Server...
You can get the server names here...(Make sure and get the OpenVPN Server name for UDP)
https://support.purevpn.com/vpn-servers


*** Note ***
It is good practice with PureVPN to use the server IP instead of the name.... This company has resolve problems...


)


I don't however guarantee [i]PureVPN[/i] service reliability.... they lack reliability and in my opinion some security also.


Sploit wrote use the Servers IP address
where do we find them .
this is whats Added to my Additional Config when i use his
setup file
it works for client UDP but not for Client TCP
I had to delete it and then Client TCP worked
help please
----------------
resolv-retry infinite
nobind
persist-key
persist-tun
comp-lzo
route-delay 2
fast-io
### Below Used only if no TLS key specified
remote-cert-tls server
sndbuf 524288
rcvbuf 524288
### Additional Tweaks PUREVPN Specific
explicit-exit-notify 2
mute 20
route 0.0.0.0 0.0.0.0
ifconfig-nowarn



Well.... Simply open up your command prompt and ping the server... it will give you the IP address of the server...

You can also resolve them with

https://mxtoolbox.com/DNSLookup.aspx


This is like internet 101 ... Confused

Also, you shouldnt have had to delete a anythin out of the additional config except (if you want):

fast-io
sndbuf 524288
rcvbuf 524288

As those are specific for udp.

All I do on all the routers I have (25+ Models) is switch the protocol and port.

However, PureVPN does have some TCP servers that are different than the UDP.

Resolve the servername to IP to find out

_________________
My Karma ran over your Dogma
SploitWorks Custom Flashed Routers
PeterTosh
DD-WRT Novice


Joined: 15 Aug 2017
Posts: 12

PostPosted: Tue Sep 05, 2017 20:58    Post subject: Reply with quote
It is Internet for Dummies like me .
I did my network courses 1992 . then there were no jobs so i Forgot it all
Thanks for your help whoops not that bad 2002

Is there any Chance of you doing a new new Basic dd-wrt router setup for us Newbies out here .
Thanks
Rolling Eyes Wink

_________________
£££££££££££££££

Linksys 1900acsv2 dd-wrt r32170
Asus rtn56u not in use
hard wired
Vusolo2
Android tv
Windows 10 pc
Try Once .. Try Again ... Keep Going


Last edited by PeterTosh on Wed Sep 06, 2017 5:07; edited 1 time in total
sploit
DD-WRT User


Joined: 16 Apr 2016
Posts: 302
Location: California

PostPosted: Tue Sep 05, 2017 22:01    Post subject: 1992! Reply with quote
1992!

You have been forgiven lol

_________________
My Karma ran over your Dogma
SploitWorks Custom Flashed Routers
PeterTosh
DD-WRT Novice


Joined: 15 Aug 2017
Posts: 12

PostPosted: Wed Sep 06, 2017 5:05    Post subject: Is this needed Reply with quote
Sploit
Some time ago
platbob said that we should add a command to the security firewall


Code:
#VPN Kill Switch
WAN_IF="$(ip route | awk '/^default/{print $NF}')"
iptables -I FORWARD -i br0 -o $WAN_IF -m state --state NEW -j REJECT

In another post you tell us about pureVPN leaving ports open then selling us firewall cover for an extra 1$

Is the firewall code good
shall I turn firewall on in VPN client and Security

_________________
£££££££££££££££

Linksys 1900acsv2 dd-wrt r32170
Asus rtn56u not in use
hard wired
Vusolo2
Android tv
Windows 10 pc
Try Once .. Try Again ... Keep Going
sploit
DD-WRT User


Joined: 16 Apr 2016
Posts: 302
Location: California

PostPosted: Wed Sep 06, 2017 6:47    Post subject: Uhhhh Reply with quote
Sell script for a $1 ?? I mighta been joking if I said that... lol

If you want the security use a Kill Switch like you posted.

Except I use a much simpler one

_________________
My Karma ran over your Dogma
SploitWorks Custom Flashed Routers
slphelan
DD-WRT Novice


Joined: 04 Sep 2017
Posts: 6

PostPosted: Wed Sep 06, 2017 22:54    Post subject: Re: Did you... Reply with quote
rsatoshi wrote:
slphelan wrote:

Did you downgrade with the webflash.bin or both the factory to ddwrt and the webflash bin


If you already have the ddwrt in your router you don't need to use the factory to ddwrt


I downgraded the firmware to the 4/24/2017 beta and the script worked and is still working on my Linksys 1200AC Thanks
slphelan
DD-WRT Novice


Joined: 04 Sep 2017
Posts: 6

PostPosted: Wed Sep 06, 2017 23:03    Post subject: Re: Install the Reply with quote
slphelan wrote:
sploit wrote:
Install the script again...I had to remove forcing TLS 384 Handshake, some routers dont support it... (Sorry guys.)

Now, once the script installs...
Enter your PureVPN username and Pass under :SETTINGS...VPN (scroll down to client)

Your PureVPN username looks like purevpn0s22817

For the Server...
You can get the server names here...(Make sure and get the OpenVPN Server name for UDP)
https://support.purevpn.com/vpn-servers


*** Note ***
It is good practice with PureVPN to use the server IP instead of the name.... This company has resolve problems...



If you guys can't get connected, and don't want to deal with installation, I charge $25.00/hour for remote tech support for dd-wrt users and connection is guaranteed. (For all VPN providers that support openvpn)


I don't however guarantee [i]PureVPN[/i] service reliability.... they lack reliability and in my opinion some security also.


Still getting the tls error on the linksys 1200AC after reinstalling the script here is the log:State
Client: WAIT
Local Address:
Remote Address:

Status
VPN Client Stats
TUN/TAP read bytes 0
TUN/TAP write bytes 0
TCP/UDP read bytes 0
TCP/UDP write bytes 42
Auth read bytes 0
pre-compress bytes 0
post-compress bytes 0
pre-decompress bytes 0
post-decompress bytes 0

Log
Clientlog:
20170904 15:26:47 I SIGUSR1[soft tls-error] received process restarting
20170904 15:26:47 Restart pause 5 second(s)
20170904 15:26:52 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20170904 15:26:52 I TCP/UDP: Preserving recently used remote address: [AF_INET]108.61.41.3:53
20170904 15:26:52 Socket Buffers: R=[180224->360448] S=[180224->360448]
20170904 15:26:52 I UDPv4 link local: (not bound)
20170904 15:26:52 I UDPv4 link remote: [AF_INET]108.61.41.3:53
20170904 15:26:52 TLS: Initial packet from [AF_INET]108.61.41.3:53 sid=367325d3 dea34214
20170904 15:26:52 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
20170904 15:26:52 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
20170904 15:26:52 N TLS_ERROR: BIO read tls_read_plaintext error
20170904 15:26:52 N TLS Error: TLS object -> incoming plaintext read error
20170904 15:26:52 N TLS Error: TLS handshake failed
20170904 15:26:52 I SIGUSR1[soft tls-error] received process restarting
20170904 15:26:52 Restart pause 5 second(s)
20170904 15:26:57 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20170904 15:26:57 I TCP/UDP: Preserving recently used remote address: [AF_INET]172.94.40.3:53
20170904 15:26:57 Socket Buffers: R=[180224->360448] S=[180224->360448]
20170904 15:26:57 I UDPv4 link local: (not bound)
20170904 15:26:57 I UDPv4 link remote: [AF_INET]172.94.40.3:53
20170904 15:26:57 TLS: Initial packet from [AF_INET]172.94.40.3:53 sid=aa92becb d8209882
20170904 15:26:57 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
20170904 15:26:57 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
20170904 15:26:57 N TLS_ERROR: BIO read tls_read_plaintext error
20170904 15:26:57 N TLS Error: TLS object -> incoming plaintext read error
20170904 15:26:57 N TLS Error: TLS handshake failed
20170904 15:26:57 I SIGUSR1[soft tls-error] received process restarting
20170904 15:26:57 Restart pause 5 second(s)
20170904 15:27:02 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20170904 15:27:02 I TCP/UDP: Preserving recently used remote address: [AF_INET]172.94.40.3:53
20170904 15:27:02 Socket Buffers: R=[180224->360448] S=[180224->360448]
20170904 15:27:02 I UDPv4 link local: (not bound)
20170904 15:27:02 I UDPv4 link remote: [AF_INET]172.94.40.3:53
20170904 15:27:02 TLS: Initial packet from [AF_INET]172.94.40.3:53 sid=d6f5533e 3ca32ede
20170904 15:27:03 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
20170904 15:27:03 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
20170904 15:27:03 N TLS_ERROR: BIO read tls_read_plaintext error
20170904 15:27:03 N TLS Error: TLS object -> incoming plaintext read error
20170904 15:27:03 N TLS Error: TLS handshake failed
20170904 15:27:03 I SIGUSR1[soft tls-error] received process restarting
20170904 15:27:03 Restart pause 5 second(s)
20170904 15:27:08 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20170904 15:27:08 I TCP/UDP: Preserving recently used remote address: [AF_INET]108.61.41.3:53
20170904 15:27:08 Socket Buffers: R=[180224->360448] S=[180224->360448]
20170904 15:27:08 I UDPv4 link local: (not bound)
20170904 15:27:08 I UDPv4 link remote: [AF_INET]108.61.41.3:53
20170904 15:27:08 TLS: Initial packet from [AF_INET]108.61.41.3:53 sid=875b296e 568b02b7
20170904 15:27:08 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
20170904 15:27:08 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
20170904 15:27:08 N TLS_ERROR: BIO read tls_read_plaintext error
20170904 15:27:08 N TLS Error: TLS object -> incoming plaintext read error
20170904 15:27:08 N TLS Error: TLS handshake failed
20170904 15:27:08 I SIGUSR1[soft tls-error] received process restarting
20170904 15:27:08 Restart pause 5 second(s)
20170904 15:27:13 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20170904 15:27:13 I TCP/UDP: Preserving recently used remote address: [AF_INET]108.61.41.3:53
20170904 15:27:13 Socket Buffers: R=[180224->360448] S=[180224->360448]
20170904 15:27:13 I UDPv4 link local: (not bound)
20170904 15:27:13 I UDPv4 link remote: [AF_INET]108.61.41.3:53
20170904 15:27:13 TLS: Initial packet from [AF_INET]108.61.41.3:53 sid=4b6c96b1 c4d991d4
20170904 15:27:13 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
20170904 15:27:13 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
20170904 15:27:13 N TLS_ERROR: BIO read tls_read_plaintext error
20170904 15:27:13 N TLS Error: TLS object -> incoming plaintext read error
20170904 15:27:13 N TLS Error: TLS handshake failed
20170904 15:27:13 I SIGUSR1[soft tls-error] received process restarting
20170904 15:27:13 Restart pause 5 second(s)
20170904 15:27:18 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20170904 15:27:18 I TCP/UDP: Preserving recently used remote address: [AF_INET]172.94.40.3:53
20170904 15:27:18 Socket Buffers: R=[180224->360448] S=[180224->360448]
20170904 15:27:18 I UDPv4 link local: (not bound)
20170904 15:27:18 I UDPv4 link remote: [AF_INET]172.94.40.3:53
20170904 15:27:18 TLS: Initial packet from [AF_INET]172.94.40.3:53 sid=2241efa4 7b8a19ec
20170904 15:27:18 N VERIFY ERROR: depth=0 error=CA signature digest algorithm too weak: C=HK ST=HK L=HongKong O=PureVPN OU=IT CN=PureVPN name=PureVPN emailAddress=mail@host.domain
20170904 15:27:18 N OpenSSL: error:1416F086:lib(20):func(367):reason(134)
20170904 15:27:18 N TLS_ERROR: BIO read tls_read_plaintext error
20170904 15:27:18 N TLS Error: TLS object -> incoming plaintext read error
20170904 15:27:18 N TLS Error: TLS handshake failed
20170904 15:27:18 I SIGUSR1[soft tls-error] received process restarting
20170904 15:27:18 Restart pause 5 second(s)
20170904 15:27:23 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20170904 15:27:23 I TCP/UDP: Preserving recently used remote address: [AF_INET]172.94.40.3:53
20170904 15:27:23 Socket Buffers: R=[180224->360448] S=[180224->360448]
20170904 15:27:23 I UDPv4 link local: (not bound)
20170904 15:27:23 I UDPv4 link remote: [AF_INET]172.94.40.3:53
20170904 15:27:23 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20170904 15:27:23 D MANAGEMENT: CMD 'state'
20170904 15:27:23 MANAGEMENT: Client disconnected
20170904 15:27:23 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20170904 15:27:23 D MANAGEMENT: CMD 'state'
20170904 15:27:23 MANAGEMENT: Client disconnected
20170904 15:27:23 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20170904 15:27:23 D MANAGEMENT: CMD 'state'
20170904 15:27:23 MANAGEMENT: Client disconnected
20170904 15:27:23 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20170904 15:27:23 D MANAGEMENT: CMD 'status 2'
20170904 15:27:23 MANAGEMENT: Client disconnected
20170904 15:27:23 TLS: Initial packet from [AF_INET]172.94.40.3:53 sid=16fc3310 a68bb6d4
20170904 15:27:23 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20170904 15:27:23 D MANAGEMENT: CMD 'log 500'
19691231 16:00:00



I reinstalled the script on my TP-Link C9 Archer and now the Pure VPN is giving me that same TLS error I had with the Linksys 1200 AC guess I wil need to roll back the firmware on that router also.
PeterTosh
DD-WRT Novice


Joined: 15 Aug 2017
Posts: 12

PostPosted: Thu Sep 07, 2017 8:15    Post subject: £££££££££££££££££££ for me Reply with quote
Spoilt
Please check this out
this as stated before is your set up addedd to Additional config in dd-wrt vpn cleint.
........................
resolv-retry infinite
nobind
persist-key
persist-tun
comp-lzo
route-delay 2
fast-io
### Below Used only if no TLS key specified
remote-cert-tls server
sndbuf 524288
rcvbuf 524288
### Additional Tweaks PUREVPN Specific
explicit-exit-notify 2
mute 20
route 0.0.0.0 0.0.0.0
ifconfig-nowarn

.......
when i use it i get no connection at all .
i hvae removed each line in the bottom section
after

### Additional Tweaks PUREVPN Specific
explicit-exit-notify 2
mute 20
route 0.0.0.0 0.0.0.0
ifconfig-nowarn
and then checed connection ...

ONLY THIS WORKS FOR ME

.........


### Additional Tweaks PUREVPN Specific
mute 20
route 0.0.0.0 0.0.0.0
ifconfig-nowarn

i deleted line 2

and i get full connection
Please check this out or update

_________________
£££££££££££££££

Linksys 1900acsv2 dd-wrt r32170
Asus rtn56u not in use
hard wired
Vusolo2
Android tv
Windows 10 pc
Try Once .. Try Again ... Keep Going
drewbert3370
DD-WRT Novice


Joined: 28 Aug 2017
Posts: 8

PostPosted: Thu Sep 07, 2017 14:26    Post subject: Reply with quote
hi,

got myself a linksys wrt1200acv2, new install, checked net was working then applied script, still no joy.

log

Clientlog:
20170907 07:15:38 W WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
20170907 07:15:38 W WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
20170907 07:15:38 I OpenVPN 2.4.1 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 24 2017
20170907 07:15:38 I library versions: OpenSSL 1.0.2k 26 Jan 2017 LZO 2.09
20170907 07:15:38 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
20170907 07:15:38 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20170907 07:15:38 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
20170907 07:15:38 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
20170907 07:15:38 I TCP/UDP: Preserving recently used remote address: [AF_INET]95.154.215.14:53
20170907 07:15:38 Socket Buffers: R=[180224->360448] S=[180224->360448]
20170907 07:15:38 I UDPv4 link local: (not bound)
20170907 07:15:38 I UDPv4 link remote: [AF_INET]95.154.215.14:53
20170907 07:16:08 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20170907 07:16:08 D MANAGEMENT: CMD 'state'
20170907 07:16:08 MANAGEMENT: Client disconnected
20170907 07:16:08 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20170907 07:16:08 D MANAGEMENT: CMD 'state'
20170907 07:16:08 MANAGEMENT: Client disconnected
20170907 07:16:08 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20170907 07:16:08 D MANAGEMENT: CMD 'state'
20170907 07:16:08 MANAGEMENT: Client disconnected
20170907 07:16:08 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20170907 07:16:08 D MANAGEMENT: CMD 'status 2'
20170907 07:16:08 MANAGEMENT: Client disconnected
20170907 07:16:08 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
20170907 07:16:08 D MANAGEMENT: CMD 'log 500'
19691231 16:00:00

do i have to forward port 53 from my plusnet hub to linksys?

doing my head in now, please help.
sploit
DD-WRT User


Joined: 16 Apr 2016
Posts: 302
Location: California

PostPosted: Fri Sep 08, 2017 4:15    Post subject: For all going crazy Reply with quote
@drewbert and the rest of everyone else having TLS issued on PureVPN (And maybe others)

Downgrade you Linksys WRT1200ACv2 ddwrt Firmware to 08-03-2017

ftp://ftp.dd-wrt.com/betas/2017/08-03-2017-r33006/

One of the forum users told me there may be an issue with newest brainslayer builds with PureVPN.

I hooked up a WRT1200ACv2 and Confirmed the Issue.
It turns out Brainslayers builds (the main ftp.dd-wrt.com from 08-22-2017 to curremt 08-29-2017 are busted for the TLS Cipher.

This is specific for PureVPN but may be a problem for another VPN company that is using the same style of TLS Ciphers

More than likely Purevpn doesn't like some new openvpn commands. Who knows. PureVPN is strange.

I tested all builds from 04-24-2017 to 08-29-2017 and it broke on 08-22-2017. 08-03-2017 is most current that can be used for PureVPN

This may be the case for other routers as well.

For anyone going crazy with the TLS error using my script more than likely its the firmware build.

Roll back to 08-03-2017 ddwrt and try the script.

My script only modifies the NVRAM variables and doesnt install any crapware so it should work accross ALL working ddwrt builds with OpenVPN Client... Always


Also, for those hands on techies interested, check out my Keep Alive Script for VPN's.

http://www.dd-wrt.com/phpBB2/viewtopic.php?t=311060

It was built to keep pain in the @$$ VPN companies connections up and running.

_________________
My Karma ran over your Dogma
SploitWorks Custom Flashed Routers
SisyphusBond
DD-WRT Novice


Joined: 26 Jan 2017
Posts: 38

PostPosted: Sat Sep 16, 2017 20:56    Post subject: Re: For all going crazy Reply with quote
sploit wrote:
I tested all builds from 04-24-2017 to 08-29-2017 and it broke on 08-22-2017. 08-03-2017 is most current that can be used for PureVPN

This may be the case for other routers as well.

I have an issue as well. I don't know if it's related, but I thought I'd mention it just in case.

I have a Netgear WNDR-4500v2 router. I had been using a pretty old version of dd-wrt with PureVPN working just fine, and eibgrad's basic script to route it to specific devices.

For various reasons I upgraded to DD-WRT v3.0-r33006 giga (08/03/17) and now I seem to be able to get my router to connect to PureVPN but eibgrad's scripts (both basic and advanced) no longer work.

I've tried a factory reset as well, and no matter what I do it's always the same. As far as I can tell (with some educated guesswork, realistically), it looks as if the scripts create two files in a folder called "ovpn_split" and then they run somehow to get everything working.

When I check my router, I can find an "ovpn_split" folder in both /tmp/ and /jffs/tmp/ and neither one has any files inside it.

Is this possibly related to the problems listed above?
sploit
DD-WRT User


Joined: 16 Apr 2016
Posts: 302
Location: California

PostPosted: Mon Sep 18, 2017 0:38    Post subject: Split Tunneling Reply with quote
Not sure exactly what you are doing BUT.... If you already ran a factory reset install purevpn using my automation just to get the VPN up and running and then consult Eibgrads notes.
_________________
My Karma ran over your Dogma
SploitWorks Custom Flashed Routers
Goto page Previous  1, 2, 3, 4, 5, 6, 7, 8, 9, 10  Next Display posts from previous:    Page 6 of 10
Post new topic   Reply to topic    DD-WRT Forum Forum Index -> Advanced Networking All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum