Jump to content
TorGuard
  • 0
Sign in to follow this  
Guest

Unable to acquire a fake IP

Rate this question

Question

Guest

Hi,

 

Unable to get a fake Ip (has worked fine in the past) Coincides with Torguard being unable to detect my real Ip.

 

Steps taken:

rebooted pc

reset nics

changed password

re-install torguard.

tried several servers

 

log of most recent attempt.

 

Thanks in advance for any guidance.

 

> Tue Jun 10 17:53:35 2014 OpenVPN 2.3.3 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Apr 14 2014

> Tue Jun 10 17:53:35 2014 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:9000

> Tue Jun 10 17:53:35 2014 Need password(s) from management interface, waiting...

> Tue Jun 10 17:53:36 2014 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:9000

> Tue Jun 10 17:53:36 2014 MANAGEMENT: CMD 'username Auth oneshotpaddy'

> Tue Jun 10 17:53:36 2014 MANAGEMENT: CMD 'password [...]'

> Tue Jun 10 17:53:36 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.

> Tue Jun 10 17:53:36 2014 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

> Tue Jun 10 17:53:36 2014 NOTE: --fast-io is disabled since we are running on Windows

> Tue Jun 10 17:53:36 2014 Socket Buffers: R=[8192->8192] S=[8192->8192]

> Tue Jun 10 17:53:36 2014 UDPv4 link local: [undef]

> Tue Jun 10 17:53:36 2014 UDPv4 link remote: [AF_INET]111.90.140.185:443

> Tue Jun 10 17:53:36 2014 MANAGEMENT: Client disconnected

> Tue Jun 10 17:53:36 2014 TLS: Initial packet from [AF_INET]111.90.140.185:443, sid=bbf54558 c02af978

> Tue Jun 10 17:53:36 2014 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this

> Tue Jun 10 17:53:38 2014 VERIFY OK: depth=1, C=US, ST=FL, L=Orlando, O=TorGuard, OU=VPN, CN=TG-OVPN-CA, name=TorGuard, [email protected]

> Tue Jun 10 17:53:38 2014 VERIFY OK: depth=0, C=US, ST=FL, L=Orlando, O=TorGuard, OU=VPN, CN=TG-OVPN-CA, name=TorGuard, [email protected]

> Tue Jun 10 17:53:40 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key

> Tue Jun 10 17:53:40 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

> Tue Jun 10 17:53:40 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key

> Tue Jun 10 17:53:40 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

> Tue Jun 10 17:53:40 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

> Tue Jun 10 17:53:40 2014 [TG-OVPN-CA] Peer Connection Initiated with [AF_INET]111.90.140.185:443

> Tue Jun 10 17:53:42 2014 SENT CONTROL [TG-OVPN-CA]: 'PUSH_REQUEST' (status=1)

> Tue Jun 10 17:53:42 2014 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.9.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.9.0.10 10.9.0.9'

> Tue Jun 10 17:53:42 2014 OPTIONS IMPORT: timers and/or timeouts modified

> Tue Jun 10 17:53:42 2014 OPTIONS IMPORT: --ifconfig/up options modified

> Tue Jun 10 17:53:42 2014 OPTIONS IMPORT: route options modified

> Tue Jun 10 17:53:42 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

> Tue Jun 10 17:53:42 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

> Tue Jun 10 17:53:42 2014 open_tun, tt->ipv6=0

> Tue Jun 10 17:53:42 2014 TAP-WIN32 device [Local Area Connection 2] opened: \.Global{B71CE42D-A694-4775-9A9C-3DE2F17EBC0B}.tap

> Tue Jun 10 17:53:42 2014 TAP-Windows Driver Version 9.9

> Tue Jun 10 17:53:42 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.9.0.10/255.255.255.252 on interface {B71CE42D-A694-4775-9A9C-3DE2F17EBC0B} [DHCP-serv: 10.9.0.9, lease-time: 31536000]

> Tue Jun 10 17:53:42 2014 Successful ARP Flush on interface [21] {B71CE42D-A694-4775-9A9C-3DE2F17EBC0B}

> Tue Jun 10 17:53:42 2014 up.exe Local Area Connection 2 1500 1574 10.9.0.10 10.9.0.9 init

> Tue Jun 10 17:53:42 2014 env_block: add PATH=C:WindowsSystem32;C:WINDOWS;C:WINDOWSSystem32Wbem

> Tue Jun 10 17:53:48 2014 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

> Tue Jun 10 17:53:48 2014 C:Windowssystem32route.exe ADD 111.90.140.185 MASK 255.255.255.255 10.0.0.1

> Tue Jun 10 17:53:48 2014 ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=12]

> Tue Jun 10 17:53:48 2014 Route addition via IPAPI failed [adaptive]

> Tue Jun 10 17:53:48 2014 Route addition fallback to route.exe

> Tue Jun 10 17:53:48 2014 env_block: add PATH=C:WindowsSystem32;C:WINDOWS;C:WINDOWSSystem32Wbem

> Tue Jun 10 17:53:48 2014 C:Windowssystem32route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.9.0.9

> Tue Jun 10 17:53:48 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

> Tue Jun 10 17:53:48 2014 Route addition via IPAPI succeeded [adaptive]

> Tue Jun 10 17:53:48 2014 C:Windowssystem32route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.9.0.9

> Tue Jun 10 17:53:48 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

> Tue Jun 10 17:53:48 2014 Route addition via IPAPI succeeded [adaptive]

> Tue Jun 10 17:53:48 2014 C:Windowssystem32route.exe ADD 10.9.0.1 MASK 255.255.255.255 10.9.0.9

> Tue Jun 10 17:53:48 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

> Tue Jun 10 17:53:48 2014 Route addition via IPAPI succeeded [adaptive]

> Tue Jun 10 17:53:48 2014 Initialization Sequence Completed

 

 

 

Share this post


Link to post
Share on other sites

2 answers to this question

Recommended Posts

  • 0
Guest

This is the most common one. (auth failure received)

 

Tue Jun 10 18:14:15 2014 OpenVPN 2.3.3 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Apr 14 2014

> Tue Jun 10 18:14:15 2014 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:9000

> Tue Jun 10 18:14:15 2014 Need password(s) from management interface, waiting...

> Tue Jun 10 18:14:15 2014 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:9000

> Tue Jun 10 18:14:15 2014 MANAGEMENT: CMD 'username Auth oneshotpaddy'

> Tue Jun 10 18:14:15 2014 MANAGEMENT: CMD 'password [...]'

> Tue Jun 10 18:14:15 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.

> Tue Jun 10 18:14:15 2014 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

> Tue Jun 10 18:14:15 2014 NOTE: --fast-io is disabled since we are running on Windows

> Tue Jun 10 18:14:16 2014 Socket Buffers: R=[8192->8192] S=[8192->8192]

> Tue Jun 10 18:14:16 2014 UDPv4 link local: [undef]

> Tue Jun 10 18:14:16 2014 UDPv4 link remote: [AF_INET]41.231.5.22:443

> Tue Jun 10 18:14:16 2014 MANAGEMENT: Client disconnected

> Tue Jun 10 18:14:18 2014 TLS: Initial packet from [AF_INET]41.231.5.22:443, sid=f6c3452e 396861dd

> Tue Jun 10 18:14:18 2014 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this

> Tue Jun 10 18:14:19 2014 VERIFY OK: depth=1, C=US, ST=FL, L=Orlando, O=TorGuard, OU=VPN, CN=TG-OVPN-CA, name=TorGuard, [email protected]

> Tue Jun 10 18:14:19 2014 VERIFY OK: depth=0, C=US, ST=FL, L=Orlando, O=TorGuard, OU=VPN, CN=TG-OVPN-CA, name=TorGuard, [email protected]

> Tue Jun 10 18:14:19 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key

> Tue Jun 10 18:14:19 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

> Tue Jun 10 18:14:19 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key

> Tue Jun 10 18:14:19 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

> Tue Jun 10 18:14:19 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

> Tue Jun 10 18:14:19 2014 [TG-OVPN-CA] Peer Connection Initiated with [AF_INET]41.231.5.22:443

> Tue Jun 10 18:14:22 2014 SENT CONTROL [TG-OVPN-CA]: 'PUSH_REQUEST' (status=1)

> Tue Jun 10 18:14:22 2014 AUTH: Received control message: AUTH_FAILED

> Tue Jun 10 18:14:22 2014 SIGTERM[soft,auth-failure] received, process exiting

Share this post


Link to post
Share on other sites
  • 0
Support

Hello

 

The first log is successful, if its not routing you through VPN, try disconnect, reset TAP adapter, disable it and then enable it.

 

Do you run the app with admin rights ?

 

Regards

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Answer this question...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
Sign in to follow this  

×
×
  • Create New...