TinCanTech wrote:
- Windows XP can only use upto version 2.3.x (currently 2.3.16)
- Windows 10 can use versions 2.3.x and 2.4.x
As I presume you are using 2.4.x on Windows 10 you have some other differences to consider.
Thank you for pointing out that even though I used the same openvpn config files on both the WinXP and Win10 machine, that there were other differences that can account for the fact that on WinXP there is no explicit "failed" message when closing using the [X] box versus the F4 hotkey.
Here are the relevant version lines from the Windows XP log file: (Are "code" tags what you prefer?)
Code: Select all
Tue Jun 06 04:56:13 2017 OpenVPN 2.3.11 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on May 10 2016
Tue Jun 06 04:56:13 2017 Windows version 5.1 (Windows XP) 32bit
Tue Jun 06 04:56:13 2017 library versions: OpenSSL 1.0.1t 3 May 2016, LZO 2.0
While here are the relevant version lines from the Windows 10 log file:
Code: Select all
Tue Jun 06 04:59:24 2017 OpenVPN 2.4.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on May 11 2017
Tue Jun 06 10:59:24 2017 Windows version 6.2 (Windows 8 or greater) 64bit
Tue Jun 06 10:59:24 2017 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.10
TinCanTech wrote:This is why we ask for complete logs and configs etc .. otherwise we can only guess!
Thank you for making that point that logs are required (and sometimes config files), which I agree with you.
I ran a few tests on Windows XP of the SAME openvpn config files that I run on Windows 10, which prove there is no "failed" message, but, which shows some anomalies.
Here's the WinXP test sequence, which never once elicited these new Win10-only "route addition failed" errors (but which did exhibit some anomalies).
I booted the WinXP machine to have a fresh start.
1a) I first doubleclicked on VPN config file 1 on WinXP (where you'll note there are no route addition failed errors).
Code: Select all
Tue Jun 06 05:53:24 2017 OpenVPN 2.3.11 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on May 10 2016
Tue Jun 06 05:53:24 2017 Windows version 5.1 (Windows XP) 32bit
Tue Jun 06 05:53:24 2017 library versions: OpenSSL 1.0.1t 3 May 2016, LZO 2.09
Tue Jun 06 05:53:24 2017 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Tue Jun 06 05:53:25 2017 Socket Buffers: R=[8192->8192] S=[8192->8192]
Tue Jun 06 05:53:25 2017 UDPv4 link local: [undef]
Tue Jun 06 05:53:25 2017 UDPv4 link remote: [AF_INET]60.239.246.247:1751
Tue Jun 06 05:53:25 2017 TLS: Initial packet from [AF_INET]60.239.246.247:1751, sid=43af8923 2a5aacd8
Tue Jun 06 05:53:25 2017 VERIFY OK: depth=2, C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority
Tue Jun 06 05:53:25 2017 VERIFY OK: depth=1, C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA
Tue Jun 06 05:53:25 2017 VERIFY OK: depth=0, OU=Domain Control Validated, OU=PositiveSSL Wildcard, CN=*.opengw.net
Tue Jun 06 05:53:26 2017 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Tue Jun 06 05:53:26 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jun 06 05:53:26 2017 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Tue Jun 06 05:53:26 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jun 06 05:53:26 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Tue Jun 06 05:53:26 2017 [*.opengw.net] Peer Connection Initiated with [AF_INET]60.239.246.247:1751
Tue Jun 06 05:53:28 2017 SENT CONTROL [*.opengw.net]: 'PUSH_REQUEST' (status=1)
Tue Jun 06 05:53:29 2017 PUSH: Received control message: 'PUSH_REPLY,ping 3,ping-restart 10,ifconfig 10.211.1.9 10.211.1.10,dhcp-option DNS 10.211.254.254,dhcp-option DNS 8.8.8.8,route-gateway 10.211.1.10,redirect-gateway def1'
Tue Jun 06 05:53:29 2017 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jun 06 05:53:29 2017 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jun 06 05:53:29 2017 OPTIONS IMPORT: route options modified
Tue Jun 06 05:53:29 2017 OPTIONS IMPORT: route-related options modified
Tue Jun 06 05:53:29 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Jun 06 05:53:29 2017 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=2 HWADDR=01:a1:03:bf:83:23
Tue Jun 06 05:53:29 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Tue Jun 06 05:53:29 2017 open_tun, tt->ipv6=0
Tue Jun 06 05:53:29 2017 TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{01A16D23-7693-2A2A-6DF2-854A343FF459}.tap
Tue Jun 06 05:53:29 2017 TAP-Windows Driver Version 9.9
Tue Jun 06 05:53:29 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.211.1.9/255.255.255.252 on interface {01A16D23-7693-2A2A-6DF2-854A343FF459} [DHCP-serv: 10.211.1.10, lease-time: 315 36000]
Tue Jun 06 05:53:29 2017 Successful ARP Flush on interface [3] {01A16D23-7693-2A2A-6DF2-854A343FF459}
Tue Jun 06 05:53:34 2017 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Tue Jun 06 05:53:34 2017 C:\WINDOWS\system32\route.exe ADD 60.239.246.247 MASK 255.255.255.255 192.168.1.1
Tue Jun 06 05:53:34 2017 Route addition via IPAPI succeeded [adaptive]
Tue Jun 06 05:53:34 2017 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.211.1.10
Tue Jun 06 05:53:34 2017 Route addition via IPAPI succeeded [adaptive]
Tue Jun 06 05:53:34 2017 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.211.1.10
Tue Jun 06 05:53:34 2017 Route addition via IPAPI succeeded [adaptive]
Tue Jun 06 05:53:34 2017 Initialization Sequence Completed
1b) I then killed that VPN session using the [X] box.
2a) After killing the VPN session above with the [x] box, I doubleclicked on VPN config file 2 on WinXP:
Code: Select all
Tue Jun 06 05:59:17 2017 OpenVPN 2.3.11 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on May 10 2016
Tue Jun 06 05:59:17 2017 Windows version 5.1 (Windows XP) 32bit
Tue Jun 06 05:59:17 2017 library versions: OpenSSL 1.0.1t 3 May 2016, LZO 2.09
Tue Jun 06 05:59:17 2017 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Tue Jun 06 05:59:17 2017 Socket Buffers: R=[8192->8192] S=[8192->8192]
Tue Jun 06 05:59:17 2017 UDPv4 link local: [undef]
Tue Jun 06 05:59:17 2017 UDPv4 link remote: [AF_INET]115.79.233.14:1787
Tue Jun 06 05:59:17 2017 TLS: Initial packet from [AF_INET]115.79.233.14:1787, sid=e520d1f3 bf15b14c
Tue Jun 06 05:59:18 2017 VERIFY OK: depth=2, C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority
Tue Jun 06 05:59:18 2017 VERIFY OK: depth=1, C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA
Tue Jun 06 05:59:18 2017 VERIFY OK: depth=0, OU=Domain Control Validated, OU=PositiveSSL Wildcard, CN=*.opengw.net
Tue Jun 06 05:59:18 2017 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Tue Jun 06 05:59:18 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jun 06 05:59:18 2017 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Tue Jun 06 05:59:18 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jun 06 05:59:18 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Tue Jun 06 05:59:18 2017 [*.opengw.net] Peer Connection Initiated with [AF_INET]115.79.233.14:1787
Tue Jun 06 05:59:20 2017 SENT CONTROL [*.opengw.net]: 'PUSH_REQUEST' (status=1)
Tue Jun 06 05:59:21 2017 PUSH: Received control message: 'PUSH_REPLY,ping 3,ping-restart 10,ifconfig 10.211.1.21 10.211.1.22,dhcp-option DNS 10.211.254.254,dhcp-option DNS 8.8.8.8,route-gateway 10.211.1.22,redirect-gateway def1'
Tue Jun 06 05:59:21 2017 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jun 06 05:59:21 2017 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jun 06 05:59:21 2017 OPTIONS IMPORT: route options modified
Tue Jun 06 05:59:21 2017 OPTIONS IMPORT: route-related options modified
Tue Jun 06 05:59:21 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Jun 06 05:59:21 2017 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=2 HWADDR=01:a1:03:bf:83:23
Tue Jun 06 05:59:21 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Tue Jun 06 05:59:21 2017 open_tun, tt->ipv6=0
Tue Jun 06 05:59:21 2017 TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{01A16D23-7693-2A2A-6DF2-854A343FF459}.tap
Tue Jun 06 05:59:21 2017 TAP-Windows Driver Version 9.9
Tue Jun 06 05:59:21 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.211.1.21/255.255.255.252 on interface {01A16D23-7693-2A2A-6DF2-854A343FF459} [DHCP-serv: 10.211.1.22, lease-time: 31 536000]
Tue Jun 06 05:59:21 2017 Successful ARP Flush on interface [3] {01A16D23-7693-2A2A-6DF2-854A343FF459}
Tue Jun 06 05:59:26 2017 TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
Tue Jun 06 05:59:26 2017 Route: Waiting for TUN/TAP interface to come up...
Tue Jun 06 05:59:27 2017 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Tue Jun 06 05:59:27 2017 C:\WINDOWS\system32\route.exe ADD 115.79.233.14 MASK 255.255.255.255 192.168.1.1
Tue Jun 06 05:59:27 2017 Route addition via IPAPI succeeded [adaptive]
Tue Jun 06 05:59:27 2017 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.211.1.22
Tue Jun 06 05:59:27 2017 Route addition via IPAPI succeeded [adaptive]
Tue Jun 06 05:59:27 2017 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.211.1.22
Tue Jun 06 05:59:27 2017 Route addition via IPAPI succeeded [adaptive]
Tue Jun 06 05:59:27 2017 Initialization Sequence Completed
2b) Then I killed VPN 2 using the [X] box.
3a) A bit later, I repeated step #1a above.
Code: Select all
Tue Jun 05 06:06:39 2017 OpenVPN 2.3.11 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on May 10 2016
Tue Jun 05 06:06:39 2017 Windows version 5.1 (Windows XP) 32bit
Tue Jun 05 06:06:39 2017 library versions: OpenSSL 1.0.1t 3 May 2016, LZO 2.09
Tue Jun 05 06:06:39 2017 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Tue Jun 05 06:06:40 2017 Socket Buffers: R=[8192->8192] S=[8192->8192]
Tue Jun 05 06:06:40 2017 UDPv4 link local: [undef]
Tue Jun 05 06:06:40 2017 UDPv4 link remote: [AF_INET]60.239.246.247:1751
Tue Jun 05 06:06:40 2017 TLS: Initial packet from [AF_INET]60.239.246.247:1751, sid=d0636cd5 bb841fda
Tue Jun 05 06:06:40 2017 VERIFY OK: depth=2, C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority
Tue Jun 05 06:06:40 2017 VERIFY OK: depth=1, C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA
Tue Jun 05 06:06:40 2017 VERIFY OK: depth=0, OU=Domain Control Validated, OU=PositiveSSL Wildcard, CN=*.opengw.net
Tue Jun 05 06:06:41 2017 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Tue Jun 05 06:06:41 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jun 05 06:06:41 2017 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Tue Jun 05 06:06:41 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jun 05 06:06:43 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Tue Jun 05 06:06:43 2017 [*.opengw.net] Peer Connection Initiated with [AF_INET]60.239.246.247:1751
Tue Jun 05 06:06:45 2017 SENT CONTROL [*.opengw.net]: 'PUSH_REQUEST' (status=1)
Tue Jun 05 06:06:46 2017 PUSH: Received control message: 'PUSH_REPLY,ping 3,ping-restart 10,ifconfig 10.211.1.9 10.211.1.10,dhcp-option DNS 10.211.254.254,dhcp-option DNS 8.8.8.8,route-gateway 10.211.1.10,redirect-gateway def1'
Tue Jun 05 06:06:46 2017 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jun 05 06:06:46 2017 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jun 05 06:06:46 2017 OPTIONS IMPORT: route options modified
Tue Jun 05 06:06:46 2017 OPTIONS IMPORT: route-related options modified
Tue Jun 05 06:06:46 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Jun 05 06:06:46 2017 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=2 HWADDR=01:a1:03:bf:83:23
Tue Jun 05 06:06:46 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Tue Jun 05 06:06:46 2017 open_tun, tt->ipv6=0
Tue Jun 05 06:06:46 2017 TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{01A16D23-7693-2A2A-6DF2-854A343FF459}.tap
Tue Jun 05 06:06:46 2017 TAP-Windows Driver Version 9.9
Tue Jun 05 06:06:46 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.211.1.9/255.255.255.252 on interface {01A16D23-7693-2A2A-6DF2-854A343FF459} [DHCP-serv: 10.211.1.10, lease-time: 31536000]
Tue Jun 05 06:06:46 2017 Successful ARP Flush on interface [3] {01A16D23-7693-2A2A-6DF2-854A343FF459}
Tue Jun 05 06:06:51 2017 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Tue Jun 05 06:06:51 2017 C:\WINDOWS\system32\route.exe ADD 60.239.246.247 MASK 255.255.255.255 192.168.1.1
Tue Jun 05 06:06:51 2017 Route addition via IPAPI succeeded [adaptive]
Tue Jun 05 06:06:51 2017 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.211.1.10
Tue Jun 05 06:06:51 2017 Route addition via IPAPI succeeded [adaptive]
Tue Jun 05 06:06:51 2017 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.211.1.10
Tue Jun 05 06:06:51 2017 Route addition via IPAPI succeeded [adaptive]
Tue Jun 05 06:06:51 2017 Initialization Sequence Completed
3b) This time, I killed VPN 1 using the more graceful [F4] key.
4a) Moment later I repeated step #3 above.
Code: Select all
Tue Jun 05 06:08:25 2017 OpenVPN 2.3.11 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on May 10 2016
Tue Jun 05 06:08:25 2017 Windows version 5.1 (Windows XP) 32bit
Tue Jun 05 06:08:25 2017 library versions: OpenSSL 1.0.1t 3 May 2016, LZO 2.09
Tue Jun 05 06:08:25 2017 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Tue Jun 05 06:08:25 2017 Socket Buffers: R=[8192->8192] S=[8192->8192]
Tue Jun 05 06:08:26 2017 UDPv4 link local: [undef]
Tue Jun 05 06:08:26 2017 UDPv4 link remote: [AF_INET]115.79.233.14:1787
Tue Jun 05 06:08:27 2017 TLS: Initial packet from [AF_INET]115.79.233.14:1787, sid=79c3baa6 322d46b5
Tue Jun 05 06:08:27 2017 VERIFY OK: depth=2, C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority
Tue Jun 05 06:08:27 2017 VERIFY OK: depth=1, C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA
Tue Jun 05 06:08:27 2017 VERIFY OK: depth=0, OU=Domain Control Validated, OU=PositiveSSL Wildcard, CN=*.opengw.net
Tue Jun 05 06:08:28 2017 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Tue Jun 05 06:08:28 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jun 05 06:08:28 2017 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Tue Jun 05 06:08:28 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jun 05 06:08:29 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Tue Jun 05 06:08:29 2017 [*.opengw.net] Peer Connection Initiated with [AF_INET]115.79.233.14:1787
Tue Jun 05 06:08:31 2017 SENT CONTROL [*.opengw.net]: 'PUSH_REQUEST' (status=1)
Tue Jun 05 06:08:31 2017 PUSH: Received control message: 'PUSH_REPLY,ping 3,ping-restart 10,ifconfig 10.211.1.21 10.211.1.22,dhcp-option DNS 10.211.254.254,dhcp-option DNS 8.8.8.8,route-gateway 10.211.1.22,redirect-gateway def1'
Tue Jun 05 06:08:31 2017 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jun 05 06:08:31 2017 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jun 05 06:08:31 2017 OPTIONS IMPORT: route options modified
Tue Jun 05 06:08:31 2017 OPTIONS IMPORT: route-related options modified
Tue Jun 05 06:08:31 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Jun 05 06:08:31 2017 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=2 HWADDR=01:a1:03:bf:83:23
Tue Jun 05 06:08:31 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Tue Jun 05 06:08:31 2017 open_tun, tt->ipv6=0
Tue Jun 05 06:08:31 2017 TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{01A16D23-7693-2A2A-6DF2-854A343FF459}.tap
Tue Jun 05 06:08:31 2017 TAP-Windows Driver Version 9.9
Tue Jun 05 06:08:31 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.211.1.21/255.255.255.252 on interface {01A16D23-7693-2A2A-6DF2-854A343FF459} [DHCP-serv: 10.211.1.22, lease-time: 31536000]
Tue Jun 05 06:08:31 2017 Successful ARP Flush on interface [3] {01A16D23-7693-2A2A-6DF2-854A343FF459}
Tue Jun 05 06:08:36 2017 TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down
Tue Jun 05 06:08:36 2017 Route: Waiting for TUN/TAP interface to come up...
Tue Jun 05 06:08:37 2017 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Tue Jun 05 06:08:37 2017 C:\WINDOWS\system32\route.exe ADD 115.79.233.14 MASK 255.255.255.255 192.168.1.1
Tue Jun 05 06:08:37 2017 Route addition via IPAPI succeeded [adaptive]
Tue Jun 05 06:08:37 2017 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.211.1.22
Tue Jun 05 06:08:37 2017 Route addition via IPAPI succeeded [adaptive]
Tue Jun 05 06:08:37 2017 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.211.1.22
Tue Jun 05 06:08:37 2017 Route addition via IPAPI succeeded [adaptive]
Tue Jun 05 06:08:37 2017 Initialization Sequence Completed
4b) Again, I killed VPN 2 using the more graceful [F4] key.
5a) Moments later I repeated step #1a above
Code: Select all
Tue Jun 05 06:09:42 2017 OpenVPN 2.3.11 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on May 10 2016
Tue Jun 05 06:09:42 2017 Windows version 5.1 (Windows XP) 32bit
Tue Jun 05 06:09:42 2017 library versions: OpenSSL 1.0.1t 3 May 2016, LZO 2.09
Tue Jun 05 06:09:42 2017 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Tue Jun 05 06:09:42 2017 Socket Buffers: R=[8192->8192] S=[8192->8192]
Tue Jun 05 06:09:42 2017 UDPv4 link local: [undef]
Tue Jun 05 06:09:42 2017 UDPv4 link remote: [AF_INET]60.239.246.247:1751
Tue Jun 05 06:09:42 2017 TLS: Initial packet from [AF_INET]60.239.246.247:1751, sid=3f62aff7 b66080f7
Tue Jun 05 06:09:42 2017 VERIFY OK: depth=2, C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority
Tue Jun 05 06:09:42 2017 VERIFY OK: depth=1, C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA
Tue Jun 05 06:09:42 2017 VERIFY OK: depth=0, OU=Domain Control Validated, OU=PositiveSSL Wildcard, CN=*.opengw.net
Tue Jun 05 06:09:43 2017 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Tue Jun 05 06:09:43 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jun 05 06:09:43 2017 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Tue Jun 05 06:09:43 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jun 05 06:09:43 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Tue Jun 05 06:09:43 2017 [*.opengw.net] Peer Connection Initiated with [AF_INET]60.239.246.247:1751
Tue Jun 05 06:09:45 2017 SENT CONTROL [*.opengw.net]: 'PUSH_REQUEST' (status=1)
Tue Jun 05 06:09:45 2017 PUSH: Received control message: 'PUSH_REPLY,ping 3,ping-restart 10,ifconfig 10.211.1.9 10.211.1.10,dhcp-option DNS 10.211.254.254,dhcp-option DNS 8.8.8.8,route-gateway 10.211.1.10,redirect-gateway def1'
Tue Jun 05 06:09:45 2017 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jun 05 06:09:45 2017 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jun 05 06:09:45 2017 OPTIONS IMPORT: route options modified
Tue Jun 05 06:09:45 2017 OPTIONS IMPORT: route-related options modified
Tue Jun 05 06:09:45 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Jun 05 06:09:45 2017 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=2 HWADDR=01:a1:03:bf:83:23
Tue Jun 05 06:09:45 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Tue Jun 05 06:09:45 2017 open_tun, tt->ipv6=0
Tue Jun 05 06:09:45 2017 TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{01A16D23-7693-2A2A-6DF2-854A343FF459}.tap
Tue Jun 05 06:09:45 2017 TAP-Windows Driver Version 9.9
Tue Jun 05 06:09:45 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.211.1.9/255.255.255.252 on interface {01A16D23-7693-2A2A-6DF2-854A343FF459} [DHCP-serv: 10.211.1.10, lease-time: 31536000]
Tue Jun 05 06:09:45 2017 Successful ARP Flush on interface [3] {01A16D23-7693-2A2A-6DF2-854A343FF459}
Tue Jun 05 06:09:50 2017 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Tue Jun 05 06:09:50 2017 C:\WINDOWS\system32\route.exe ADD 60.239.246.247 MASK 255.255.255.255 192.168.1.1
Tue Jun 05 06:09:50 2017 Route addition via IPAPI succeeded [adaptive]
Tue Jun 05 06:09:50 2017 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.211.1.10
Tue Jun 05 06:09:50 2017 Route addition via IPAPI succeeded [adaptive]
Tue Jun 05 06:09:50 2017 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.211.1.10
Tue Jun 05 06:09:51 2017 Route addition via IPAPI succeeded [adaptive]
Tue Jun 05 06:09:51 2017 Initialization Sequence Completed
5b) I then killed VPN 1 using the more graceful [F4] key.
I'm not sure what to make of the anomalies, but, they certainly don't use the word "failed" which is what Windows 10 logs had.
Anyway, while I can't find documentation on what is actually DIFFERENT about an [X] and the [F4], I can easily modify the tutorial to be correct.