Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.comp.os.windows-10    |    Steaming pile of horseshit Windows 10    |    197,590 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 195,895 of 197,590    |
|    Marian to All    |
|    VPN+Psiphon+ProxyBridge & Psiphon+ProxyB    |
|    01 Dec 25 15:47:38    |
   
   XPost: alt.comp.os.windows-11, alt.comp.microsoft.windows   
   From: marianjones@helpfulpeople.com   
      
   Hooray!   
      
   VPN now works reliably first or last in the VPN+Psiphon+ProxyBridge   
   or Psiphon+ProxyBridge+VPN encryption chain of events on Windows.   
      
   I finally fixed a huge problem in that I could never (until now) get VPN to   
   work *last* in the chain (i.e., psiphon + proxybridge + VPN) even as VPN   
   worked fine *first* in the chain (i.e., VPN + psiphon + proxybridge).   
      
   MULTIPLE problems needed to be identified:   
   1. Windows TAP adapter race condition ("Waiting for TUN/TAP interface to come   
   up")   
   2. Psiphon SOCKS5 proxy lacks UDP ASSOCIATE   
   3. TAP adapter DHCP failures -> APIPA fallback   
   4. VPNGate server variability (static IP vs DHCP push)   
      
   Now VPN works fine whether it's first or last in they encryption chain.   
      
   MULTIPLE problems needed to be identified, but these were the main ones:   
   1. Windows is too slow so we get "Waiting for TUN/TAP interface to come up"   
   2. The Psiphon SOCKS5 proxy supports TCP ASSOCIATE but not UDP ASSOCIATE   
      
   What took a while to identify was WHY both UDP & TCP OpenVPN configs failed   
   (where the VPN error for TCP was DIFFERENT than the error for UDP configs).   
    TCP: "Waiting for TUN/TAP interface to come up"   
    UDP: AIPA fallback "Initialization Sequence Completed With Errors"   
      
   What first needed to be modified in order for both TCP & UDP configs to   
   work (whether or not VPN was first or last in the encryption chain) was   
   each OpenVPN config file needed to tell OpenVPN.exe to employ adaptive   
   commands to set up the TAP interface, and to wait longer before route   
   injection occurs.   
    # Adaptively choose how Windows OpenVPN configures the TAP adapter   
    ip-win32 adaptive   
    # Give Windows 10 seconds longer before route injection begins   
    route-delay 10   
      
   In addition to that TAP adapter setup race with route injection, there is   
   no way around the fact that Psiphon's SOCKS5 proxy doesn't support UDP.   
      
   So the Psiphon rules.txt file needed to be modified extensively.   
      
   The rules.txt file had to be modified so that OpenVPN traffic   
   was handled correctly depending on protocol type. Before, both   
   TCP and UDP configs failed when VPN was placed last in the chain.   
      
   Here are the key changes between version 1p7 & 2p0 rules.txt:   
   a. Explicitly route OpenVPN.exe TCP traffic through Psiphon   
    Rule added:   
    openvpn.exe:*:443:TCP -> PROXY   
    This ensures that TCP VPN configs are proxied through   
    Psiphon's SOCKS5 tunnel.   
      
   b. Explicitly allow OpenVPN.exe UDP traffic to bypass Psiphon   
    Rule added:   
    openvpn.exe:*:*:UDP -> DIRECT   
    Because Psiphon's SOCKS5 proxy does not support UDP ASSOCIATE,   
    UDP VPN configs must go direct to the server.   
      
   c. Allow TAP/DHCP/DNS setup traffic to go DIRECT   
    Rules added:   
    svchost.exe:*:53:UDP -> DIRECT   
    svchost.exe:*:67,68:UDP -> DIRECT   
    system:*:*:UDP -> DIRECT   
    These ensure that Windows can perform DNS lookups and DHCP   
    lease negotiation for the TAP adapter without being blocked   
    or forced through Psiphon.   
      
   d. Block unwanted UDP traffic from browsers and apps   
    Rules added such as:   
    chrome.exe:*:443:UDP -> BLOCK   
    firefox.exe:*:443:UDP -> BLOCK   
    brave.exe:*:443:UDP -> BLOCK   
    This prevents browsers from leaking QUIC/UDP traffic outside   
    the encrypted chain.   
      
   e. Maintain TCP direct access for system processes   
    Rules like:   
    svchost.exe:*:*:TCP -> DIRECT   
    services.exe:*:*:TCP -> DIRECT   
    system:*:*:TCP -> DIRECT   
    These allow Windows core services to function normally while   
    keeping user applications proxied.   
      
   Here is the current status as of version 2p0 of the rules.txt file:   
   1. TCP OpenVPN configs now work when VPN is last in the chain,   
    because their traffic is correctly proxied through Psiphon.   
   2. UDP OpenVPN configs now work when VPN is last in the chain,   
    because their traffic bypasses Psiphon and goes direct.   
   3. TAP adapter setup traffic (DNS, DHCP) is allowed direct, so   
    Windows no longer fails with APIPA addresses.   
   4. Browser UDP traffic (QUIC) is blocked, preventing leaks.   
      
   The critical changes in rules.txt were:   
   1. Split handling of OpenVPN.exe traffic: TCP -> PROXY, UDP -> DIRECT.   
   2. Allow svchost/system UDP traffic direct for TAP setup.   
   3. Block browser UDP traffic to prevent leaks.   
   4. Keep system TCP traffic direct for stability.   
      
   Together with the OpenVPN config additions   
   (ip-win32 adaptive + route-delay 10), these rules fixed the   
   longstanding problem which had prevented VPN from being used after   
   ProxyBridge. Now VPN works reliably whether it is first or last in the   
   encryption chain.   
      
   Here is the version 2p0 of the rules.txt file to donate to the team.   
    # C:\app\network\proxy\proxybridge\rules.txt v1p0 20251023   
    # This is version 2p0   
    # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # #   
    # Load this into ProxyBridge using the pb.bat script.   
    # Syntax: --rule
|
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca