redman wrote:i opened cryptostorm a couple of days ago and it asked and performed an update. Since then I have not been able to connect, it hangs at the point "Logging into the darknet". I have uninstall and reinstalled with no luck. I have also removed OpenVPN and halted the AV software during the re-installation. How do I get the logs to see what is causing the issue as area where the logs are usually visible is black. I am running Windows 10 32 bit version.
For instance, it can enter your machine when you click on a malicious link, provided on YouTube, Facebook, Skype, visit a phishing web portal, put infected removable media drive onto your machine, etc. Besides, it is also known that Trojan: Win32/Fuery.B!cl has been spread through Java vulnerabilities and Adobe Flash
It's just a false positive. The CS widget installer randomly gets caught up in their database because it uses the same compression (LZ4) as some trojans.
I use a local win7 VM for widget dev, and the only thing installed on it is the stuff needed for widget dev (Perl, Notepad++, etc.).
I do file integrity checks on that stuff to make sure when I downloaded them they weren't MiTM'd.
The widget installer's hashes were generated on that local VM, and they're checked on the remote VM I use to build the widget, and then they're checked a final time when they're put up on the website.
So it's highly unlikely that something as simple as "Win32/Fuery.B!cl" is going to find it's way into the widget installer (unless your system is already infected ).
http://deletespywares.blogspot.com/2017 ... rybcl.html -For instance, it can enter your machine when you click on a malicious link, provided on YouTube, Facebook, Skype, visit a phishing web portal, put infected removable media drive onto your machine, etc. Besides, it is also known that Trojan: Win32/Fuery.B!cl has been spread through Java vulnerabilities and Adobe Flash
Yea, I'm not using/doing any of that crap on any of the VMs or servers.
Anyways, I'll do what I did last time this happened: send M$ a false positive report so they'll remove it.
I just tested with Windows Defender on win7 and win10 with updated databases, they didn't find anything in the latest installer.
Code: Select all
email@example.com [~/www]# grep ^\# whitelist
#onyx / paris
#cf-i / cryptofree
#alors / paris
#tagus / lisbon
#jord / switzerland
#skana / canadawest
#goo / useast (New York City, NY)
#windy / usnorth (Chicago, IL)
#resurgens / ussouth (Atlanta, GA) - will be removed in August 2018, replaced with "resurg"
#rugby / england
#ham - canadaeast
#silver - uswest (Las Vegas, NV)
#riga - latvia
#rotte - netherlands
#warsaw - poland
#stadi - finland
#warlock - dusseldorf
#brabant - netherlands
#stakaya - uswest (Seattle, WA)
#dc - useast (Washington, D.C.)
#lax - uswest (Los Angeles, CA)
#blocko - denmark
#gambit - rome
#zuna - frankfurt
#voodoo - isle of man
#voodoo - romania
#voodoo - russia
#sallad - ussouth (Dallas, TX)
#balaur - romania
#resurg - ussouth (Atlanta, GA)
#zur - switzerland
RubRiches wrote:Huh, that is weird. I ran Malware bytes and my system is ok.
No worries though I was able to download the new version and now I am stuck on the progress bar while connecting.
This is where it is stuck:
Sat Jul 07 07:52:09 2018 us=54756 [cryptostorm server] Peer Connection Initiated with [AF_INET]22.214.171.124:5060
Sat Jul 07 07:52:10 2018 us=150762 SENT CONTROL [cryptostorm server]: 'PUSH_REQUEST' (status=1)
Tried unchecking ECC instance, then DNS leak etc... but no good.
Please see if there is something I need to do.
One more request can you guys improve the widget as such that I don't have to exit the widget to go to Options while it is trying to connect.
marzametal wrote:Would it be safe to assume that the above means if I choose a random node to connect to in the widget, then all nodes will be attempted to be pre-resolved... and if I choose one specific node from the dropdown, then just that one will be pre-resolved?
Code: Select all
echo $management_password | csvpn.exe --config-options
df wrote:Also in v3.35 is a fix for this weird TAP adapter issue where it would be stuck in a loop of installing/deleting/reinstalling the TAP adapter.
Reason for that bug was that https://community.openvpn.net/openvpn/w ... nameScript doesn't work on Windows 10, but it did in Windows 7.
Instead of using that batch script, I rewrote it to instead use `openvpn --show-adapters` to get the TAP adapter's GUID, which is the part of the TapRenameScript that's broken on Windows 10.
Oh god damnit. You're right, I just tested on a Vista VM and it still did the TAP loop thing.
Pretty sure I know what the problem is though. Apparently M$ thought it was a good idea to change the way simple IF statements work in batch files across different Windows versions. Either that or it's getting different exit codes from the TAP installer each time, even though the installation happens the same each time, which in turn causes the IF statement to do different things.
Anyways, it should be fixed now in v3.36. That's up at https://cryptostorm.nu/cryptostorm_setup.exe
I'll test first on another win7 VM, and win8.1, and win10 just to be absolutely sure before I put it up at cryptostorm.is and push it to the clients who have auto-update enabled.
I've tested the latest v3.36 against win7 (32-bit and 64-bit), win8.1, and win10. The TAP issue seems to be fixed.
On the 32-bit win7 I also noticed a dnscrypt related bug for 32-bit Windows, and a potential DNS bug that could have left DNS set to 127.0.0.1 after exiting the widget (which means DNS would be broken if the widget wasn't running).
All that should be fixed now. https://cryptostorm.is/cryptostorm_setup.exe has the latest build of v3.36, and I'm uploading it to all the servers now, so the new version notification should popup next time you reconnect.
Users browsing this forum: Bing [Bot] and 13 guests