Administrators Netduma Fraser Posted May 10, 2019 Administrators Share Posted May 10, 2019 Thanks for the ticket information, I'll pass that on to our team who take care of testing. Could you change the R1 DNS to the same DNS as PureVPN and see if that resolves the issue please. Link to comment Share on other sites More sharing options...
Guest Posted May 10, 2019 Share Posted May 10, 2019 4 hours ago, Netduma Fraser said: Thanks for the ticket information, I'll pass that on to our team who take care of testing. Could you change the R1 DNS to the same DNS as PureVPN and see if that resolves the issue please. Fraser........ I'm in the Nighthawk forum. Are you trolling me right now? Yes I will see if I can make changes to the DNS. Link to comment Share on other sites More sharing options...
Guest Posted May 10, 2019 Share Posted May 10, 2019 So basically I've had 3 days of good servers and no real issues. Today it's back to the pre-vpn frequency. It's like the filter took awhile to narrow down where I was located and which servers I prefer and starts fucking with me again. This is beyond useful. How can I be connecting a an obviously blocked server if the filter is on and has NEVER been off? Once I get it working well I generally leave it filtered. There is nothing else connected to that ISP but my pc to control the router if changes are needed. Right back to square one with this POS. More matches than not are outside the filtered range and then I get kicked to the start menu, LOBBY UNAVAILABLE because the filter finally decides to block it. FUCK ME Link to comment Share on other sites More sharing options...
Administrators Netduma Fraser Posted May 10, 2019 Administrators Share Posted May 10, 2019 Sorry, I just meant could you change the DNS to match, R1 was a slip. That looks like either it's whitelisted from the cloud side or it was denied after a connection was made, or was it one you've denied a long time ago? Link to comment Share on other sites More sharing options...
Guest Posted May 11, 2019 Share Posted May 11, 2019 21 hours ago, Netduma Fraser said: Sorry, I just meant could you change the DNS to match, R1 was a slip. That looks like either it's whitelisted from the cloud side or it was denied after a connection was made, or was it one you've denied a long time ago? Its fine, just giving you shit. Is that referred to as 'taking the piss?' 😁 I believe pureVPN uses 8.8.8.8 or 208.67.222.222 someone correct me if I'm wrong. I am using 8.8.8.8 already. The server is one that's been on my list for quite awhile since the most recent router reset frenzy. What you've mentioned though, " or it was denied after a connection was made," is exactly how all of our filters are behaving that have complained about the filter. It is allowing you to connect to banned servers and then it finally bans it after you are already connecting to the lobby so you basically appear to the game to leave the match and forfeit. With error message in game lobby is no longer available or similar. Another thing it's doing is half the time it chooses a server outside of the range like the one displayed above, it will be one that's in my DENY list but still shows a yield sign vs. the blocked sign. Seems to be just outright broken. It does all of this with or without vpn now. Why? Link to comment Share on other sites More sharing options...
Guest Posted May 11, 2019 Share Posted May 11, 2019 ok so check this out. since I have been testing this with vpn I have noticed that my allow/deny list is basically only good for your existing IP. So if you create a list of friends to ALLOW. And your IP changes, which I can do with a vpn easily, those same allowed friends are not allowed and show as a yield sign as if they have never been Identified before and added to the list. I can then click on their ping icon from the allow list, allow them, and it will let them in the lobby with me or chat party without NAT restrictions. So whatever is causing my issue has something to do with that. Before my IP wasn't changing but for some reason it acts identical to as if it were. Make sense? And it's not just me it's several other users in this forum. These are the shared common instances that have been posted and unanswered. -Servers being allowed form outside the filter range -Denied servers from the deny list being allowed -Nat restrictions; intermittently with party and or game -servers within the filtered range being skipped over or blocked entirely -servers on the allow list being skipped over or blocked entirely inside filtered range -servers on the allow list being skipped over or blocked entirely outside filtered range -servers within the threshold of Ping Assist being skipped over or blocked entirely inside filter range -servers within the threshold of Ping Assist being skipped over or blocked entirely outside filter range -servers outside the threshold of Ping Assist being allowed outside filter range Link to comment Share on other sites More sharing options...
Administrators Netduma Fraser Posted May 11, 2019 Administrators Share Posted May 11, 2019 Haha it is! I don't think that's correct, use this table to find the server you're using https://support.purevpn.com/vpn-servers# then use the addresses from the OpenVPN column with this guide https://support.purevpn.com/how-to-get-server-ip-or-convert-hostdomain-name-to-ip-address# for the DNS IPs that you can use on the router, see if that resolves it. I can't really explain that at all, theres no scenario that I can think of that we haven't already covered that would explain it. Thanks for the summary as well, I'm updating the team on this so they can take a look. Link to comment Share on other sites More sharing options...
Guest Posted May 11, 2019 Share Posted May 11, 2019 46 minutes ago, Netduma Fraser said: Haha it is! I don't think that's correct, use this table to find the server you're using https://support.purevpn.com/vpn-servers# then use the addresses from the OpenVPN column with this guide https://support.purevpn.com/how-to-get-server-ip-or-convert-hostdomain-name-to-ip-address# for the DNS IPs that you can use on the router, see if that resolves it. I can't really explain that at all, theres no scenario that I can think of that we haven't already covered that would explain it. Thanks for the summary as well, I'm updating the team on this so they can take a look. 😁 Are you sure? From what I'm reading in those two links I only see taking the hostname for my udp server and converting it to an IP. I can't find the spot where it says here is the DNS. Should I just use the gateway IP as the DNS? Thanks Link to comment Share on other sites More sharing options...
Administrators Netduma Fraser Posted May 11, 2019 Administrators Share Posted May 11, 2019 I believe so for example if you're using the Houston VPN server via UDP you have ustx2-ovpn-udp.pointtoserver.com which translates to 45.74.60.4 so you would use that as your DNS if I've understood correctly. Link to comment Share on other sites More sharing options...
Guest Posted May 11, 2019 Share Posted May 11, 2019 1 hour ago, Netduma Fraser said: I believe so for example if you're using the Houston VPN server via UDP you have ustx2-ovpn-udp.pointtoserver.com which translates to 45.74.60.4 so you would use that as your DNS if I've understood correctly. OK. I've done that for the last 45 minutes, were on the same page. But the only place to use it is with either the ps4 or router and in the router I can only add it as the WAN DNS. This resulted in this message over and over. "The operation is taking longer than expected. Please briefly wait before using this R-App." On the filter page. Link to comment Share on other sites More sharing options...
Administrators Netduma Fraser Posted May 11, 2019 Administrators Share Posted May 11, 2019 Remove DNS then remove the device from the Geo-Filter then redo the DNS and then add the device again, does that work? Link to comment Share on other sites More sharing options...
Guest Posted May 11, 2019 Share Posted May 11, 2019 17 minutes ago, Netduma Fraser said: Remove DNS then remove the device from the Geo-Filter then redo the DNS and then add the device again, does that work? This does not work either. Same message and once it starts doing that, everything slows down it's taking 30-45 seconds for the hybrid vpn page to even be displayed also after about 15 minutes the vpn tunnel is disconnected and won't reconnect. Link to comment Share on other sites More sharing options...
Guest Posted May 12, 2019 Share Posted May 12, 2019 On 5/10/2019 at 6:00 PM, Netduma Fraser said: Sorry, I just meant could you change the DNS to match, R1 was a slip. That looks like either it's whitelisted from the cloud side or it was denied after a connection was made, or was it one you've denied a long time ago? Fraser I honestly think it has nothing to do with the setup or what dns etc.. I feel 90% confident that the issues is within something that has been changed for the backend on the OS. It's almost like when an IP changes it works for a bit then after it learns all of your habits it starts working against you. I can change the IP with the VPN at will by changing servers. Wipe the Allow/Deny list. Start an entirely new list for that geo location, let's say Chicago now. The first 1-3 days everything is beautiful. After that it's right back to the same song and dance as before the VPN. It learns your range, you provide detail after detail with allow/deny and preffered latency them WHAM... blocking your normal servers within range or within PA and choosing outside of both set parameters. Once I get it set I have no use to tinker with turning the filter off and on. I am familiar enough to know where the server locations are as well as new ser IP are lost/added and PA can come in handy to allow those outside of the range due to age of IP and not being added to the cloud with the correct location because they are new or whatever reason. So by that setup with no changes until things go south, in theory my setup should never "go bad" due to user errors or the filter not being in use quick enough or booting the game with it on vs off since it's always on. I have tested this by changing firs tto the VPn to rule out an issue with my CGNAT from ISP as well as to move my IP at will. I have now tested again moving from Dallas server and IP to Houston and it was the exact same scenario. A few days in and the filter creates it's own errors. Link to comment Share on other sites More sharing options...
Administrators Netduma Alex Posted May 13, 2019 Administrators Share Posted May 13, 2019 Closed alternate thread to keep everything in one place. Here's what was written in the alternate thread: 11 hours ago, stalker4hire- said: Please don't close this until it's resolved just saying a bunch of words that don;t even apply to my issue is not a remedy. Using hybrid VPN to run through different scenarios today why do I keep getting a connected then after a few minutes failed? I'm trying to test in London today. This failure is exact same message minus the fact it is for Manchester. Things connect with warning then disconnect. I can use PureVPN app and stay connected but that doesn't help me when trying to use the router feature. This happens with all servers in UK for me today. -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Sun May 12 22:32:31 2019 OpenVPN 2.4.3 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 17 2019 Sun May 12 22:32:31 2019 library versions: OpenSSL 1.0.2n 7 Dec 2017, LZO 2.06 Sun May 12 22:32:31 2019 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Sun May 12 22:32:31 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sun May 12 22:32:31 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]172.111.186.2:53 Sun May 12 22:32:31 2019 UDP link local: (not bound) Sun May 12 22:32:31 2019 UDP link remote: [AF_INET]172.111.186.2:53 Sun May 12 22:32:31 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Sun May 12 22:32:34 2019 [PureVPN] Peer Connection Initiated with [AF_INET]172.111.186.2:53 Sun May 12 22:32:37 2019 TUN/TAP device tun0 opened Sun May 12 22:32:37 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0 Sun May 12 22:32:37 2019 /sbin/ifconfig tun0 172.111.186.131 netmask 255.255.255.192 mtu 1500 broadcast 172.111.186.191 Sun May 12 22:32:37 2019 /dumaos/apps/usr/com.netdumasoftware.hybridvpn/openvpn-event.lua openvpnup 3 tun0 1500 1558 172.111.186.131 255.255.255.192 init Sun May 12 22:32:39 2019 Initialization Sequence Completed Sun May 12 22:34:37 2019 [PureVPN] Inactivity timeout (--ping-restart), restarting Sun May 12 22:34:37 2019 SIGUSR1[soft,ping-restart] received, process restarting Sun May 12 22:34:42 2019 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Sun May 12 22:34:42 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sun May 12 22:34:42 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]172.111.186.2:53 Sun May 12 22:34:42 2019 UDP link local: (not bound) Sun May 12 22:34:42 2019 UDP link remote: [AF_INET]172.111.186.2:53 Sun May 12 22:34:48 2019 [PureVPN] Peer Connection Initiated with [AF_INET]172.111.186.2:53 Sun May 12 22:35:03 2019 Preserving previous TUN/TAP instance: tun0 Sun May 12 22:35:03 2019 NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device. Sun May 12 22:35:03 2019 /sbin/ifconfig tun0 0.0.0.0 Sun May 12 22:35:03 2019 /dumaos/apps/usr/com.netdumasoftware.hybridvpn/openvpn-event.lua openvpndown 3 tun0 1500 1558 172.111.186.131 255.255.255.192 init openvpn-event.lua: bad argument #3 to 'format' (string expected, got nil) -> stack traceback: ?: in function <?:73> [C]: in function 'format' ?: in function 'safe_execute' ?: in function '?' ?: in function 'on_vpn_down' ?: in function 'on_vpn_down' ?: in function '?' ?: in function '?' ?: in function '?' ?: in function <?:48> [C]: in function 'xpcall' ... [C]: in function 'run' ?: in function <?:345> [C]: in function 'xpcall' ?: in function 'try' ?: in function <?:261> (tail call): ? /dumaos/api/cli.lua:48: in function </dumaos/api/cli.lua:30> [C]: in function 'xpcall' /dumaos/api/cli.lua:59: in main chunk [C]: ? Sun May 12 22:35:03 2019 WARNING: Failed running command (--up/--down): external program exited with error status: 3 Sun May 12 22:35:03 2019 Exiting due to fatal error ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Link to comment Share on other sites More sharing options...
Guest Posted May 13, 2019 Share Posted May 13, 2019 9 hours ago, Netduma Alex said: Closed alternate thread to keep everything in one place. Here's what was written in the alternate thread: These are two separate issues but whatever. Link to comment Share on other sites More sharing options...
Guest Posted May 13, 2019 Share Posted May 13, 2019 Also, can I get an answer on why Port Forwarding does NOT work ONLY with the DumaOS hybrid VPN? Hopefully Alex you read the post, since you're combining them, you seem to have an issue with comprehension. Earlier posts you literally posted a link to explain how to use the advanced tab to connect when I said there was an issue within the Hyrbid VPN for selecting Houston UDP. The very post before yours shows that I stated I was already connected with the advanced tab and a config file work around. It would help the matter along if everyone involved was trying to offer actual solutions versus adding links from the same resources we all have. All of the issues that have gone unanswered for those of us having issues with hybridVPN and GeoFilter are something outside of the box, not to be answered by documentation that still shows these items functioning normally for all, they don't. Link to comment Share on other sites More sharing options...
Administrators Netduma Fraser Posted May 14, 2019 Administrators Share Posted May 14, 2019 Could you provide a paste of the exact config that you're using please so I can take a look? Okay so here is a weird workaround for the server issue, not ideal I know but I do not know what could be causing the issue, it requires a dev input in my opinion. Find the server IP that you want to consistently connect to from the Geo-Filter then follow the video here: does that work at all? Whats the exact port forwarding rule you're using? It may be set the wrong way round, i.e. src port you have should actually be dst for example If that's it then I'm not sure why that would be happening, have you tried triggering as well? Link to comment Share on other sites More sharing options...
Guest Posted May 17, 2019 Share Posted May 17, 2019 On 5/14/2019 at 1:21 PM, Netduma Fraser said: Could you provide a paste of the exact config that you're using please so I can take a look? Okay so here is a weird workaround for the server issue, not ideal I know but I do not know what could be causing the issue, it requires a dev input in my opinion. Find the server IP that you want to consistently connect to from the Geo-Filter then follow the video here: does that work at all? Whats the exact port forwarding rule you're using? It may be set the wrong way round, i.e. src port you have should actually be dst for example If that's it then I'm not sure why that would be happening, have you tried triggering as well? Thanks for the reply Fraser, I will try the above. Also here is the exact config. client verb 1 proto udp remote ustx2-ovpn-udp.pointtoserver.com 5500 connect-retry-max 3 connect-retry 3 resolv-retry 15 dev tun auth-user-pass persist-key persist-tun nobind <ca> -----BEGIN CERTIFICATE----- MIIE6DCCA9CgAwIBAgIJAMjXFoeo5uSlMA0GCSqGSIb3DQEBCwUAMIGoMQswCQYD VQQGEwJISzEQMA4GA1UECBMHQ2VudHJhbDELMAkGA1UEBxMCSEsxGDAWBgNVBAoT D1NlY3VyZS1TZXJ2ZXJDQTELMAkGA1UECxMCSVQxGDAWBgNVBAMTD1NlY3VyZS1T ZXJ2ZXJDQTEYMBYGA1UEKRMPU2VjdXJlLVNlcnZlckNBMR8wHQYJKoZIhvcNAQkB FhBtYWlsQGhvc3QuZG9tYWluMB4XDTE2MDExNTE1MzQwOVoXDTI2MDExMjE1MzQw OVowgagxCzAJBgNVBAYTAkhLMRAwDgYDVQQIEwdDZW50cmFsMQswCQYDVQQHEwJI SzEYMBYGA1UEChMPU2VjdXJlLVNlcnZlckNBMQswCQYDVQQLEwJJVDEYMBYGA1UE AxMPU2VjdXJlLVNlcnZlckNBMRgwFgYDVQQpEw9TZWN1cmUtU2VydmVyQ0ExHzAd BgkqhkiG9w0BCQEWEG1haWxAaG9zdC5kb21haW4wggEiMA0GCSqGSIb3DQEBAQUA A4IBDwAwggEKAoIBAQDluufhyLlyvXzPUL16kAWAdivl1roQv3QHbuRshyKacf/1 Er1JqEbtW3Mx9Fvr/u27qU2W8lQI6DaJhU2BfijPe/KHkib55mvHzIVvoexxya26 nk79F2c+d9PnuuMdThWQO3El5a/i2AASnM7T7piIBT2WRZW2i8RbfJaTT7G7LP7O pMKIV1qyBg/cWoO7cIWQW4jmzqrNryIkF0AzStLN1DxvnQZwgXBGv0CwuAkfQuNS Lu0PQgPp0PhdukNZFllv5D29IhPr0Z+kwPtrAgPQo+lHlOBHBMUpDT4XChTPeAvM aUSBsqmonAE8UUHEabWrqYN/kWNHCNkYXMkiVmK1AgMBAAGjggERMIIBDTAdBgNV HQ4EFgQU456ijsFrYnzHBShLAPpOUqQ+Z2cwgd0GA1UdIwSB1TCB0oAU456ijsFr YnzHBShLAPpOUqQ+Z2ehga6kgaswgagxCzAJBgNVBAYTAkhLMRAwDgYDVQQIEwdD ZW50cmFsMQswCQYDVQQHEwJISzEYMBYGA1UEChMPU2VjdXJlLVNlcnZlckNBMQsw CQYDVQQLEwJJVDEYMBYGA1UEAxMPU2VjdXJlLVNlcnZlckNBMRgwFgYDVQQpEw9T ZWN1cmUtU2VydmVyQ0ExHzAdBgkqhkiG9w0BCQEWEG1haWxAaG9zdC5kb21haW6C CQDI1xaHqObkpTAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQCvga2H MwOtUxWH/inL2qk24KX2pxLg939JNhqoyNrUpbDHag5xPQYXUmUpKrNJZ0z+o/Zn NUPHydTSXE7Z7E45J0GDN5E7g4pakndKnDLSjp03NgGsCGW+cXnz6UBPM5FStFvG dDeModeSUyoS9fjk+mYROvmiy5EiVDP91sKGcPLR7Ym0M7zl2aaqV7bb98HmMoBO xpeZQinof67nKrCsgz/xjktWFgcmPl4/PQSsmqQD0fTtWxGuRX+FzwvF2OCMCAJg p1RqJNlk2g50/kBIoJVPPCfjDFeDU5zGaWGSQ9+z1L6/z7VXdjUiHL0ouOcHwbiS 4ZjTr9nMn6WdAHU2 -----END CERTIFICATE----- </ca> <cert> -----BEGIN CERTIFICATE----- MIIEnzCCA4egAwIBAgIBAzANBgkqhkiG9w0BAQsFADCBqDELMAkGA1UEBhMCSEsx EDAOBgNVBAgTB0NlbnRyYWwxCzAJBgNVBAcTAkhLMRgwFgYDVQQKEw9TZWN1cmUt U2VydmVyQ0ExCzAJBgNVBAsTAklUMRgwFgYDVQQDEw9TZWN1cmUtU2VydmVyQ0Ex GDAWBgNVBCkTD1NlY3VyZS1TZXJ2ZXJDQTEfMB0GCSqGSIb3DQEJARYQbWFpbEBo b3N0LmRvbWFpbjAeFw0xNjAxMTUxNjE1MzhaFw0yNjAxMTIxNjE1MzhaMIGdMQsw CQYDVQQGEwJISzEQMA4GA1UECBMHQ2VudHJhbDELMAkGA1UEBxMCSEsxFjAUBgNV BAoTDVNlY3VyZS1DbGllbnQxCzAJBgNVBAsTAklUMRYwFAYDVQQDEw1TZWN1cmUt Q2xpZW50MREwDwYDVQQpEwhjaGFuZ2VtZTEfMB0GCSqGSIb3DQEJARYQbWFpbEBo b3N0LmRvbWFpbjCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAxsnyn4v6xxDP nuDaYS0b9M1N8nxgg7OBPBlK+FWRxdTQ8yxt5U5CZGm7riVp7fya2J2iPZIgmHQE v/KbxztsHAVlYSfYYlalrnhEL3bDP2tY+N43AwB1k5BrPq2s1pPLT2XG951drDKG 4PUuFHUP1sHzW5oQlfVCmxgIMAP8OYkCAwEAAaOCAV8wggFbMAkGA1UdEwQCMAAw LQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAd BgNVHQ4EFgQU9MwUnUDbQKKZKjoeieD2OD5NlAEwgd0GA1UdIwSB1TCB0oAU456i jsFrYnzHBShLAPpOUqQ+Z2ehga6kgaswgagxCzAJBgNVBAYTAkhLMRAwDgYDVQQI EwdDZW50cmFsMQswCQYDVQQHEwJISzEYMBYGA1UEChMPU2VjdXJlLVNlcnZlckNB MQswCQYDVQQLEwJJVDEYMBYGA1UEAxMPU2VjdXJlLVNlcnZlckNBMRgwFgYDVQQp Ew9TZWN1cmUtU2VydmVyQ0ExHzAdBgkqhkiG9w0BCQEWEG1haWxAaG9zdC5kb21h aW6CCQDI1xaHqObkpTATBgNVHSUEDDAKBggrBgEFBQcDAjALBgNVHQ8EBAMCB4Aw DQYJKoZIhvcNAQELBQADggEBAFyFo2VUX/UFixsdPdK9/Yt6mkCWc+XS1xbapGXX b9U1d+h1iBCIV9odUHgNCXWpz1hR5Uu/OCzaZ0asLE4IFMZlQmJs8sMT0c1tfPPG W45vxbL0lhqnQ8PNcBH7huNK7VFjUh4szXRKmaQPaM4S91R3L4CaNfVeHfAg7mN2 m9Zn5Gto1Q1/CFMGKu2hxwGEw5p+X1czBWEvg/O09ckx/ggkkI1NcZsNiYQ+6Pz8 DdGGX3+05YwLZu94+O6iIMrzxl/il0eK83g3YPbsOrASARvw6w/8sOnJCK5eOacl 21oww875KisnYdWjHB1FiI+VzQ1/gyoDsL5kPTJVuu2CoG8= -----END CERTIFICATE----- </cert> <key> -----BEGIN PRIVATE KEY----- MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAMbJ8p+L+scQz57g 2mEtG/TNTfJ8YIOzgTwZSvhVkcXU0PMsbeVOQmRpu64lae38mtidoj2SIJh0BL/y m8c7bBwFZWEn2GJWpa54RC92wz9rWPjeNwMAdZOQaz6trNaTy09lxvedXawyhuD1 LhR1D9bB81uaEJX1QpsYCDAD/DmJAgMBAAECgYEAvTHbDupE5U0krUvHzBEIuHbl ptGlcfNYHoDcD3oxYR3pOGeiuElBexv+mgHVzcFLBrsQfJUlHLPfCWi3xmjRvDQc r7N7U1u7NIzazy/PpRBaKolMRiM1KMYi2DG0i4ZONwFT8bvNHOIrZzCLY54KDrqO n55OzC70WYjWh4t5evkCQQDkkzZUAeskBC9+JP/zLps8jhwfoLBWGw/zbC9ePDmX 0N8MTZdcUpg6KUTf1wbkLUyVtIRjS2ao6qu1jWG6K0x3AkEA3qPWyaWQWCynhNDq u2U1cPb2kh5AJip+gqxO3emikAdajsSxeoyEC2AfyBITbeB1tvCUZH17J4i/0+OF TEQp/wJAb/zEOGJ8PzghwK8GC7JA8mk51DEZVAaMSRovFv9wxDXcoh191AjPdmdz zCuAv9iF1i8MUc3GbWoUWK39PIYsPwJAWh63sqfx5b8tj/WBDpnJKBDPfhYAoXJS A1L8GZeY1fQkE+ZKcPCwAmrGcpXeh3t0Krj3WDXyw+32uC5Apr5wwQJAPZwOORea C4YNfBPZN9BdHvVjOYGGUffpI+X+hWpLRnQFJteAi+eqwyk0Oi0SkJB+a7jcerK2 d7q7xhec5WHlng== -----END PRIVATE KEY----- </key> <tls-auth> # # 2048 bit OpenVPN static key # -----BEGIN OpenVPN Static key V1----- e30af995f56d07426d9ba1f824730521 d4283db4b4d0cdda9c6e8759a3799dcb 7939b6a5989160c9660de0f6125cbb1f 585b41c074b2fe88ecfcf17eab9a33be 1352379cdf74952b588fb161a93e13df 9135b2b29038231e02d657a6225705e6 868ccb0c384ed11614690a1894bfbeb2 74cebf1fe9c2329bdd5c8a40fe882062 4d2ea7540cd79ab76892db51fc371a3a c5fc9573afecb3fffe3281e61d72e915 79d9b03d8cbf7909b3aebf4d90850321 ee6b7d0a7846d15c27d8290e031e951e 19438a4654663cad975e138f5bc5af89 c737ad822f27e19057731f41e1e254cc 9c95b7175c622422cde9f1f2cfd3510a dd94498b4d7133d3729dd214a16b27fb -----END OpenVPN Static key V1----- </tls-auth> key-direction 1 remote-cert-tls server cipher AES-256-CBC comp-lzo route-method exe route-delay 2 route 0.0.0.0 0.0.0.0 script-security 2 Link to comment Share on other sites More sharing options...
Administrators Netduma Admin Posted May 18, 2019 Administrators Share Posted May 18, 2019 Thanks for the info. Could you link us to the page where you got the config from? Thanks. Link to comment Share on other sites More sharing options...
Guest Posted May 19, 2019 Share Posted May 19, 2019 22 hours ago, Netduma Admin said: Thanks for the info. Could you link us to the page where you got the config from? Thanks. This particular config came from support chat with PureVPN. But they also linked me to this page https://support.purevpn.com/openvpn-files. I hope that helps. Link to comment Share on other sites More sharing options...
Guest Posted May 19, 2019 Share Posted May 19, 2019 So if I am looking at this correctly then what this guy did was create a static route for a particular server IP. Which, with his game, may be the only server in that region? For Cod there could be 20+ IP from different ranges even just for one data center or server cluster. Also tonight I reinstalled MWR and had zero issues. I am going to play just MWR for the next few days and see if the issues appears over time as it seems to with bo4:blackout. Link to comment Share on other sites More sharing options...
Guest Killhippie Posted May 20, 2019 Share Posted May 20, 2019 Sun May 12 22:32:31 2019 OpenVPN 2.4.3 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 17 2019 Sun May 12 22:32:31 2019 library versions: OpenSSL 1.0.2n 7 Dec 2017, LZO 2.06 Sun May 12 22:32:31 2019 Looking at this I wonder if any issues are based on the use of OpenVPN 2.4.3 when the latest is 2.4.7 along with OpenSSL1.0.2n being well over years old. This is what concerns me sometimes with Netgear and their very out of date packages and compatibility with some VPN providers, I may be well of course but the R7800's OpenVPN works very well running the latest updates if you use Voxels firmware (fork of Netgears) Using up to date code does seem to make for a lot less issues, just a thought. Hope it all works out. Link to comment Share on other sites More sharing options...
Administrators Netduma Fraser Posted May 21, 2019 Administrators Share Posted May 21, 2019 I've edited the config, could you see if this works?: clientverb 1proto udpremote ustx2-ovpn-udp.pointtoserver.com 5500 connect-retry-max 3connect-retry 3resolv-retry 15dev tunauth-user-passpersist-keypersist-tunnobindkey-direction 1remote-cert-tls servercipher AES-256-CBCcomp-lzoroute-method exe route-delay 2 route 0.0.0.0 0.0.0.0script-security 2<ca>-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----</ca><cert>-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----</cert><key>-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----</key> There's rarely just one IP in a cluster like you've said, just thought it could be worth a try. Link to comment Share on other sites More sharing options...
Guest Posted May 21, 2019 Share Posted May 21, 2019 @Netduma Fraser I'll give it a whirl. Link to comment Share on other sites More sharing options...
Guest Posted May 23, 2019 Share Posted May 23, 2019 The geofilter is now not doing anything. It's been ON for days now and all of the sudden it started allowing servers that are on my list as DENY and have been for weeks or even servers that aren't on my list at all it shows them as ALLOWED. Servers all over the US, like I don't even have a DENY list or the filter ON. This is beyond retarded. If the main feature of the router doesn't work then.... Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.