Basically, for a while now, I've been able to have only qBittorrent be using various vpngate VPN's. The method is the one where you paste something like this into the config file:
Code: Select all
dev tun
route-nopull
route 0.0.0.0 0.0.0.0 vpn_gateway
pull-filter ignore "dhcp-option DNS "
script-security 2
up 'C:\Users\crepo\Downloads\3proxy-0.8.13\bin\up.cmd'
down 'C:\Users\crepo\Downloads\3proxy-0.8.13\bin\down.cmd'
Windows 10 with OpenVPN GUI 11.25.00
I'll paste the output I get when attempting to connect to one such VPN in such a way:
I can also share that exact config file if that's helpful. Appreciate it!Sun Nov 14 10:52:44 2021 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
Sun Nov 14 10:52:44 2021 OpenVPN 2.5.4 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 20 2021
Sun Nov 14 10:52:44 2021 Windows version 10.0 (Windows 10 or greater) 64bit
Sun Nov 14 10:52:44 2021 library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10
Sun Nov 14 10:52:44 2021 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25343
Sun Nov 14 10:52:44 2021 Need hold release from management interface, waiting...
Sun Nov 14 10:52:44 2021 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25343
Sun Nov 14 10:52:44 2021 MANAGEMENT: CMD 'state on'
Sun Nov 14 10:52:44 2021 MANAGEMENT: CMD 'log all on'
Sun Nov 14 10:52:44 2021 MANAGEMENT: CMD 'echo all on'
Sun Nov 14 10:52:44 2021 MANAGEMENT: CMD 'bytecount 5'
Sun Nov 14 10:52:44 2021 MANAGEMENT: CMD 'hold off'
Sun Nov 14 10:52:44 2021 MANAGEMENT: CMD 'hold release'
Sun Nov 14 10:52:44 2021 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Sun Nov 14 10:52:44 2021 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Nov 14 10:52:44 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]219.100.37.60:1195
Sun Nov 14 10:52:44 2021 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sun Nov 14 10:52:44 2021 UDP link local: (not bound)
Sun Nov 14 10:52:44 2021 UDP link remote: [AF_INET]219.100.37.60:1195
Sun Nov 14 10:52:44 2021 MANAGEMENT: >STATE:1636905164,WAIT,,,,,,
Sun Nov 14 10:52:45 2021 MANAGEMENT: >STATE:1636905165,AUTH,,,,,,
Sun Nov 14 10:52:45 2021 TLS: Initial packet from [AF_INET]219.100.37.60:1195, sid=847b4fe0 eca8fe4e
Sun Nov 14 10:52:45 2021 VERIFY OK: depth=2, C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority
Sun Nov 14 10:52:45 2021 VERIFY OK: depth=1, C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA
Sun Nov 14 10:52:45 2021 VERIFY OK: depth=0, CN=*.opengw.net
Sun Nov 14 10:52:45 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
Sun Nov 14 10:52:45 2021 [*.opengw.net] Peer Connection Initiated with [AF_INET]219.100.37.60:1195
Sun Nov 14 10:52:46 2021 MANAGEMENT: >STATE:1636905166,GET_CONFIG,,,,,,
Sun Nov 14 10:52:46 2021 SENT CONTROL [*.opengw.net]: 'PUSH_REQUEST' (status=1)
Sun Nov 14 10:52:51 2021 SENT CONTROL [*.opengw.net]: 'PUSH_REQUEST' (status=1)