Unfortnatly, this has returned.
I have been having problems with this widget since this morning. Token I am sing verifies correctly . The test page fails to
verify correct operation. when I go to the test page it fails. I can also no longer login to the member forum. Was working
perfectly yesterday. Widget comes up and says I am connected. Though evidently I am not. I can go to the token test page
and it verfies. Attached is the long fro the widget . I have run virus stuff and checked browser plugins. I am using chrome
Version 44.0.2403.18 beta-m (64-bit). Maybe you have an idea. Thanks. The log from widget startup follows.
Wed Jun 03 12:50:31 2015 us=860495 Current Parameter Settings:
Wed Jun 03 12:50:31 2015 us=860495 config = '..\user\custom.conf'
Wed Jun 03 12:50:31 2015 us=860495 mode = 0
Wed Jun 03 12:50:31 2015 us=860495 NOTE: --mute triggered...
Wed Jun 03 12:50:31 2015 us=860495 357 variation(s) on previous 3 message(s) suppressed by --mute
Wed Jun 03 12:50:31 2015 us=860495 OpenVPN 2.3.6 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Dec 1 2014
Wed Jun 03 12:50:31 2015 us=860495 library versions: OpenSSL 1.0.2 22 Jan 2015, LZO 2.08
Wed Jun 03 12:50:32 2015 us=94495 LZO compression initialized
Wed Jun 03 12:50:32 2015 us=94495 Control Channel MTU parms [ L:1606 D:138 EF:38 EB:0 ET:0 EL:0 ]
Wed Jun 03 12:50:32 2015 us=94495 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Jun 03 12:50:32 2015 us=250495 Data Channel MTU parms [ L:1606 D:1450 EF:106 EB:135 ET:0 EL:0 AF:3/1 ]
Wed Jun 03 12:50:32 2015 us=250495 Fragmentation MTU parms [ L:1606 D:1400 EF:105 EB:135 ET:1 EL:0 AF:3/1 ]
Wed Jun 03 12:50:32 2015 us=250495 Local Options String: 'V4,dev-type tun,link-mtu 1606,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client'
Wed Jun 03 12:50:32 2015 us=250495 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1606,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-server'
Wed Jun 03 12:50:32 2015 us=250495 Local Options hash (VER=V4): 'ff724a72'
Wed Jun 03 12:50:32 2015 us=250495 Expected Remote Options hash (VER=V4): '545e2783'
Wed Jun 03 12:50:32 2015 us=250495 UDPv4 link local: [undef]
Wed Jun 03 12:50:32 2015 us=250495 UDPv4 link remote: [AF_INET]76.164.234.13:443
Wed Jun 03 12:50:32 2015 us=375296 TLS: Initial packet from [AF_INET]76.164.234.13:443, sid=96861992 222eaea9
Wed Jun 03 12:50:32 2015 us=375296 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Wed Jun 03 12:50:33 2015 us=108497 VERIFY OK: depth=1, C=CA, ST=QC, L=Montreal, O=Katana Holdings Limite / cryptostorm_darknet, OU=Tech Ops, CN=cryptostorm_is, emailAddress=
certadmin@cryptostorm.is
Wed Jun 03 12:50:33 2015 us=108497 VERIFY OK: nsCertType=SERVER
Wed Jun 03 12:50:33 2015 us=108497 VERIFY OK: depth=0, C=CA, ST=QC, L=Montreal, O=Katana Holdings Limite / cryptostorm_darknet, OU=Tech Ops, CN=server, emailAddress=
certadmin@cryptostorm.is
Wed Jun 03 12:50:33 2015 us=732498 NOTE: --mute triggered...
Wed Jun 03 12:50:33 2015 us=732498 5 variation(s) on previous 3 message(s) suppressed by --mute
Wed Jun 03 12:50:33 2015 us=732498 [server] Peer Connection Initiated with [AF_INET]76.164.234.13:443
Wed Jun 03 12:50:36 2015 us=134902 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Wed Jun 03 12:50:36 2015 us=228502 PUSH: Received control message: 'PUSH_REPLY,persist-key,persist-tun,redirect-gateway def1,redirect-gateway bypass-dhcp,dhcp-option DNS 76.164.234.11,route-gateway 10.44.0.1,topology subnet,ping 20,ping-restart 60,ifconfig 10.44.0.10 255.255.0.0'
Wed Jun 03 12:50:36 2015 us=228502 OPTIONS IMPORT: timers and/or timeouts modified
Wed Jun 03 12:50:36 2015 us=228502 NOTE: --mute triggered...
Wed Jun 03 12:50:36 2015 us=244102 5 variation(s) on previous 3 message(s) suppressed by --mute
Wed Jun 03 12:50:36 2015 us=244102 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed Jun 03 12:50:36 2015 us=244102 open_tun, tt->ipv6=0
Wed Jun 03 12:50:36 2015 us=259702 TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{A8B3C977-EE54-47CD-9B2F-82B858FC7670}.tap
Wed Jun 03 12:50:36 2015 us=259702 TAP-Windows Driver Version 9.9
Wed Jun 03 12:50:36 2015 us=259702 TAP-Windows MTU=1500
Wed Jun 03 12:50:36 2015 us=259702 Set TAP-Windows TUN subnet mode network/local/netmask = 10.44.0.0/10.44.0.10/255.255.0.0 [SUCCEEDED]
Wed Jun 03 12:50:36 2015 us=259702 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.44.0.10/255.255.0.0 on interface {A8B3C977-EE54-47CD-9B2F-82B858FC7670} [DHCP-serv: 10.44.255.254, lease-time: 31536000]
Wed Jun 03 12:50:36 2015 us=259702 DHCP option string: 06044ca4 ea0b
Wed Jun 03 12:50:36 2015 us=259702 Successful ARP Flush on interface [24] {A8B3C977-EE54-47CD-9B2F-82B858FC7670}
Wed Jun 03 12:50:41 2015 us=470112 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Wed Jun 03 12:50:41 2015 us=470112 C:\Windows\system32\route.exe ADD 76.164.234.13 MASK 255.255.255.255 198.31.176.201
Wed Jun 03 12:50:41 2015 us=470112 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
Wed Jun 03 12:50:41 2015 us=470112 Route addition via IPAPI succeeded [adaptive]
Wed Jun 03 12:50:41 2015 us=470112 C:\Windows\system32\route.exe ADD 198.31.176.201 MASK 255.255.255.255 198.31.176.201 IF 12
Wed Jun 03 12:50:41 2015 us=470112 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
Wed Jun 03 12:50:41 2015 us=470112 Route addition via IPAPI succeeded [adaptive]
Wed Jun 03 12:50:41 2015 us=470112 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.44.0.1
Wed Jun 03 12:50:41 2015 us=470112 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Wed Jun 03 12:50:41 2015 us=470112 Route addition via IPAPI succeeded [adaptive]
Wed Jun 03 12:50:41 2015 us=470112 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.44.0.1
Wed Jun 03 12:50:41 2015 us=470112 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Wed Jun 03 12:50:41 2015 us=470112 Route addition via IPAPI succeeded [adaptive]
Wed Jun 03 12:50:41 2015 us=470112 Initialization Sequence Completed
Connected
Unfortnatly, this has returned.
I have been having problems with this widget since this morning. Token I am sing verifies correctly . The test page fails to
verify correct operation. when I go to the test page it fails. I can also no longer login to the member forum. Was working
perfectly yesterday. Widget comes up and says I am connected. Though evidently I am not. I can go to the token test page
and it verfies. Attached is the long fro the widget . I have run virus stuff and checked browser plugins. I am using chrome
Version 44.0.2403.18 beta-m (64-bit). Maybe you have an idea. Thanks. The log from widget startup follows.
Wed Jun 03 12:50:31 2015 us=860495 Current Parameter Settings:
Wed Jun 03 12:50:31 2015 us=860495 config = '..\user\custom.conf'
Wed Jun 03 12:50:31 2015 us=860495 mode = 0
Wed Jun 03 12:50:31 2015 us=860495 NOTE: --mute triggered...
Wed Jun 03 12:50:31 2015 us=860495 357 variation(s) on previous 3 message(s) suppressed by --mute
Wed Jun 03 12:50:31 2015 us=860495 OpenVPN 2.3.6 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Dec 1 2014
Wed Jun 03 12:50:31 2015 us=860495 library versions: OpenSSL 1.0.2 22 Jan 2015, LZO 2.08
Wed Jun 03 12:50:32 2015 us=94495 LZO compression initialized
Wed Jun 03 12:50:32 2015 us=94495 Control Channel MTU parms [ L:1606 D:138 EF:38 EB:0 ET:0 EL:0 ]
Wed Jun 03 12:50:32 2015 us=94495 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Jun 03 12:50:32 2015 us=250495 Data Channel MTU parms [ L:1606 D:1450 EF:106 EB:135 ET:0 EL:0 AF:3/1 ]
Wed Jun 03 12:50:32 2015 us=250495 Fragmentation MTU parms [ L:1606 D:1400 EF:105 EB:135 ET:1 EL:0 AF:3/1 ]
Wed Jun 03 12:50:32 2015 us=250495 Local Options String: 'V4,dev-type tun,link-mtu 1606,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client'
Wed Jun 03 12:50:32 2015 us=250495 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1606,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-server'
Wed Jun 03 12:50:32 2015 us=250495 Local Options hash (VER=V4): 'ff724a72'
Wed Jun 03 12:50:32 2015 us=250495 Expected Remote Options hash (VER=V4): '545e2783'
Wed Jun 03 12:50:32 2015 us=250495 UDPv4 link local: [undef]
Wed Jun 03 12:50:32 2015 us=250495 UDPv4 link remote: [AF_INET]76.164.234.13:443
Wed Jun 03 12:50:32 2015 us=375296 TLS: Initial packet from [AF_INET]76.164.234.13:443, sid=96861992 222eaea9
Wed Jun 03 12:50:32 2015 us=375296 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Wed Jun 03 12:50:33 2015 us=108497 VERIFY OK: depth=1, C=CA, ST=QC, L=Montreal, O=Katana Holdings Limite / cryptostorm_darknet, OU=Tech Ops, CN=cryptostorm_is, emailAddress=certadmin@cryptostorm.is
Wed Jun 03 12:50:33 2015 us=108497 VERIFY OK: nsCertType=SERVER
Wed Jun 03 12:50:33 2015 us=108497 VERIFY OK: depth=0, C=CA, ST=QC, L=Montreal, O=Katana Holdings Limite / cryptostorm_darknet, OU=Tech Ops, CN=server, emailAddress=certadmin@cryptostorm.is
Wed Jun 03 12:50:33 2015 us=732498 NOTE: --mute triggered...
Wed Jun 03 12:50:33 2015 us=732498 5 variation(s) on previous 3 message(s) suppressed by --mute
Wed Jun 03 12:50:33 2015 us=732498 [server] Peer Connection Initiated with [AF_INET]76.164.234.13:443
Wed Jun 03 12:50:36 2015 us=134902 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Wed Jun 03 12:50:36 2015 us=228502 PUSH: Received control message: 'PUSH_REPLY,persist-key,persist-tun,redirect-gateway def1,redirect-gateway bypass-dhcp,dhcp-option DNS 76.164.234.11,route-gateway 10.44.0.1,topology subnet,ping 20,ping-restart 60,ifconfig 10.44.0.10 255.255.0.0'
Wed Jun 03 12:50:36 2015 us=228502 OPTIONS IMPORT: timers and/or timeouts modified
Wed Jun 03 12:50:36 2015 us=228502 NOTE: --mute triggered...
Wed Jun 03 12:50:36 2015 us=244102 5 variation(s) on previous 3 message(s) suppressed by --mute
Wed Jun 03 12:50:36 2015 us=244102 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed Jun 03 12:50:36 2015 us=244102 open_tun, tt->ipv6=0
Wed Jun 03 12:50:36 2015 us=259702 TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{A8B3C977-EE54-47CD-9B2F-82B858FC7670}.tap
Wed Jun 03 12:50:36 2015 us=259702 TAP-Windows Driver Version 9.9
Wed Jun 03 12:50:36 2015 us=259702 TAP-Windows MTU=1500
Wed Jun 03 12:50:36 2015 us=259702 Set TAP-Windows TUN subnet mode network/local/netmask = 10.44.0.0/10.44.0.10/255.255.0.0 [SUCCEEDED]
Wed Jun 03 12:50:36 2015 us=259702 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.44.0.10/255.255.0.0 on interface {A8B3C977-EE54-47CD-9B2F-82B858FC7670} [DHCP-serv: 10.44.255.254, lease-time: 31536000]
Wed Jun 03 12:50:36 2015 us=259702 DHCP option string: 06044ca4 ea0b
Wed Jun 03 12:50:36 2015 us=259702 Successful ARP Flush on interface [24] {A8B3C977-EE54-47CD-9B2F-82B858FC7670}
Wed Jun 03 12:50:41 2015 us=470112 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Wed Jun 03 12:50:41 2015 us=470112 C:\Windows\system32\route.exe ADD 76.164.234.13 MASK 255.255.255.255 198.31.176.201
Wed Jun 03 12:50:41 2015 us=470112 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
Wed Jun 03 12:50:41 2015 us=470112 Route addition via IPAPI succeeded [adaptive]
Wed Jun 03 12:50:41 2015 us=470112 C:\Windows\system32\route.exe ADD 198.31.176.201 MASK 255.255.255.255 198.31.176.201 IF 12
Wed Jun 03 12:50:41 2015 us=470112 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
Wed Jun 03 12:50:41 2015 us=470112 Route addition via IPAPI succeeded [adaptive]
Wed Jun 03 12:50:41 2015 us=470112 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.44.0.1
Wed Jun 03 12:50:41 2015 us=470112 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Wed Jun 03 12:50:41 2015 us=470112 Route addition via IPAPI succeeded [adaptive]
Wed Jun 03 12:50:41 2015 us=470112 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.44.0.1
Wed Jun 03 12:50:41 2015 us=470112 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Wed Jun 03 12:50:41 2015 us=470112 Route addition via IPAPI succeeded [adaptive]
Wed Jun 03 12:50:41 2015 us=470112 Initialization Sequence Completed
Connected