My VPN speeds have been really slow.
Nothing else has changed except upgrading the widget. The speeds were fine before upgrading.
This is the most recent speed test. This is the log from the widget.
Code: Select all
Thu Jan 04 13:08:03 2018 us=812597 Current Parameter Settings:
Thu Jan 04 13:08:03 2018 us=812597 config = '..\user\custom.conf'
Thu Jan 04 13:08:03 2018 us=812597 mode = 0
Thu Jan 04 13:08:03 2018 us=812597 NOTE: --mute triggered...
Thu Jan 04 13:08:03 2018 us=812597 360 variation(s) on previous 3 message(s) suppressed by --mute
Thu Jan 04 13:08:03 2018 us=812597 OpenVPN 2.3.18 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 26 2017
Thu Jan 04 13:08:03 2018 us=812597 Windows version 6.1 (Windows 7) 32bit
Thu Jan 04 13:08:05 2018 us=93847 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
Thu Jan 04 13:08:05 2018 us=93847 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:5000
Thu Jan 04 13:08:05 2018 us=171972 LZO compression initialized
Thu Jan 04 13:08:05 2018 us=171972 Control Channel MTU parms [ L:1606 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Thu Jan 04 13:08:05 2018 us=171972 Socket Buffers: R=[8192->8192] S=[8192->8192]
Thu Jan 04 13:08:05 2018 us=312597 Data Channel MTU parms [ L:1606 D:1450 EF:106 EB:143 ET:0 EL:3 AF:3/1 ]
Thu Jan 04 13:08:05 2018 us=312597 Fragmentation MTU parms [ L:1606 D:1400 EF:105 EB:143 ET:1 EL:3 AF:3/1 ]
Thu Jan 04 13:08:05 2018 us=312597 Local Options String: 'V4,dev-type tun,link-mtu 1606,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client'
Thu Jan 04 13:08:05 2018 us=312597 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1606,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-server'
Thu Jan 04 13:08:05 2018 us=312597 Local Options hash (VER=V4): 'ff724a72'
Thu Jan 04 13:08:05 2018 us=312597 Expected Remote Options hash (VER=V4): '545e2783'
Thu Jan 04 13:08:05 2018 us=312597 UDPv4 link local: [undef]
Thu Jan 04 13:08:05 2018 us=312597 UDPv4 link remote: [AF_INET]109.71.42.164:443
Thu Jan 04 13:08:05 2018 us=515722 TLS: Initial packet from [AF_INET]109.71.42.164:443, sid=b9937727 0195fac7
Thu Jan 04 13:08:05 2018 us=515722 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Jan 04 13:08:05 2018 us=781347 VERIFY OK: depth=1, C=CA, ST=QC, L=Montreal, O=Katana Holdings Limite / cryptostorm_darknet, OU=Tech Ops, CN=cryptostorm_is, emailAddress=certadmin@cryptostorm.is
Thu Jan 04 13:08:05 2018 us=781347 Validating certificate key usage
Thu Jan 04 13:08:05 2018 us=781347 ++ Certificate has key usage 00a0, expects 00a0
Thu Jan 04 13:08:05 2018 us=781347 NOTE: --mute triggered...
Thu Jan 04 13:08:06 2018 us=656347 10 variation(s) on previous 3 message(s) suppressed by --mute
Thu Jan 04 13:08:06 2018 us=656347 [server] Peer Connection Initiated with [AF_INET]109.71.42.164:443
Thu Jan 04 13:08:08 2018 us=875097 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Thu Jan 04 13:08:09 2018 us=62597 PUSH: Received control message: 'PUSH_REPLY,persist-key,persist-tun,redirect-gateway def1,redirect-gateway bypass-dhcp,dhcp-option DNS 109.71.42.228,route-gateway 10.44.0.1,topology subnet,ping 20,ping-restart 60,ifconfig 10.44.199.179 255.255.0.0'
Thu Jan 04 13:08:09 2018 us=62597 OPTIONS IMPORT: timers and/or timeouts modified
Thu Jan 04 13:08:09 2018 us=62597 NOTE: --mute triggered...
Thu Jan 04 13:08:09 2018 us=62597 5 variation(s) on previous 3 message(s) suppressed by --mute
Thu Jan 04 13:08:09 2018 us=62597 ROUTE_GATEWAY 10.0.2.2/255.255.255.0 I=10 HWADDR=08:00:27:f3:17:ab
Thu Jan 04 13:08:09 2018 us=62597 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Thu Jan 04 13:08:09 2018 us=62597 open_tun, tt->ipv6=0
Thu Jan 04 13:08:09 2018 us=62597 TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{41DC3B80-C0AD-4991-AA78-B19865B90729}.tap
Thu Jan 04 13:08:09 2018 us=62597 TAP-Windows Driver Version 9.21
Thu Jan 04 13:08:09 2018 us=62597 TAP-Windows MTU=1500
Thu Jan 04 13:08:09 2018 us=78222 Set TAP-Windows TUN subnet mode network/local/netmask = 10.44.0.0/10.44.199.179/255.255.0.0 [SUCCEEDED]
Thu Jan 04 13:08:09 2018 us=78222 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.44.199.179/255.255.0.0 on interface {41DC3B80-C0AD-4991-AA78-B19865B90729} [DHCP-serv: 10.44.255.254, lease-time: 31536000]
Thu Jan 04 13:08:09 2018 us=78222 DHCP option string: 06046d47 2ae4
Thu Jan 04 13:08:09 2018 us=78222 Successful ARP Flush on interface [12] {41DC3B80-C0AD-4991-AA78-B19865B90729}
Thu Jan 04 13:08:09 2018 us=78222 Blocking outside DNS
Thu Jan 04 13:08:09 2018 us=78222 Opening WFP engine
Thu Jan 04 13:08:09 2018 us=109472 Added a persistent sublayer with pre-defined UUID
Thu Jan 04 13:08:09 2018 us=109472 Blocking DNS using WFP
Thu Jan 04 13:08:09 2018 us=109472 Tap Luid: 1688850011258880
Thu Jan 04 13:08:09 2018 us=109472 Filter (Permit OpenVPN IPv4 DNS) added with ID=71306
Thu Jan 04 13:08:09 2018 us=109472 Filter (Permit OpenVPN IPv6 DNS) added with ID=71307
Thu Jan 04 13:08:09 2018 us=109472 NOTE: --mute triggered...
Thu Jan 04 13:08:14 2018 us=328222 4 variation(s) on previous 3 message(s) suppressed by --mute
Thu Jan 04 13:08:14 2018 us=328222 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Thu Jan 04 13:08:14 2018 us=328222 C:\Windows\system32\route.exe ADD 109.71.42.164 MASK 255.255.255.255 10.0.2.2
Thu Jan 04 13:08:14 2018 us=328222 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
Thu Jan 04 13:08:14 2018 us=328222 Route addition via IPAPI succeeded [adaptive]
Thu Jan 04 13:08:14 2018 us=328222 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.44.0.1
Thu Jan 04 13:08:14 2018 us=328222 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Thu Jan 04 13:08:14 2018 us=328222 Route addition via IPAPI succeeded [adaptive]
Thu Jan 04 13:08:14 2018 us=328222 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.44.0.1
Thu Jan 04 13:08:14 2018 us=328222 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Thu Jan 04 13:08:14 2018 us=328222 Route addition via IPAPI succeeded [adaptive]
Thu Jan 04 13:08:14 2018 us=328222 Initialization Sequence Completed
Connected
Thu Jan 04 13:09:45 2018 us=19767 FRAG TTL expired i=15
Thu Jan 04 13:09:45 2018 us=19767 FRAG TTL expired i=16
Thu Jan 04 13:10:55 2018 us=966725 Recursive routing detected, drop tun packet to [AF_INET]109.71.42.164:443
Thu Jan 04 13:10:58 2018 us=966725 Recursive routing detected, drop tun packet to [AF_INET]109.71.42.164:443
Thu Jan 04 13:11:23 2018 us=898366 Recursive routing detected, drop tun packet to [AF_INET]109.71.42.164:443
Thu Jan 04 13:11:24 2018 us=696217 NOTE: --mute triggered...
Thanks