Thursday, October 6, 2011

IPHONE JAILBREAKING


iPhone Jailbreak
This iPhone Jailbreak guide contains everything you need to know about the iPhone Jailbreak process and how to Jailbreak iPhone.
This guide lists some of the best Jailbreak software for jailbreaking iPhone, along with jailbreak instructions for all the latest iPhone versions.
Also, check out the iPhone jailbreak FAQ below and the comments section for answers to commonly asked questions about jailbreak.

iPhone Jailbreak Instructions

For detailed iPhone jailbreak instructions, scroll down for a comprehensive database of directions on how to jailbreak your iPhone.
Scroll down further for an introduction to jailbreak, pros & cons of iPhone jailbreak, and an iPhone jailbreak FAQ.


This Ultimate Guide to iPhone Jailbreak contains helpful information for jailbreaking your iPhone, no matter what version. I have included text resources with directions on jailbreaking using the best jailbreak software, plus some videos on how to Jailbreak iPhone.
Note: I have not attempted all of these iPhone Jailbreak instructions, I am merely compiling what information I have found and selected with my best judgment. Let me know what is helpful and what is not.

Text Resources

The following guides contain jailbreak instructions and download links necessary for jailbreaking various iPhone models with different iOS versions.
To see what version of the iOS (operating system) you are running, go to Settings >> General >> About.
Choose the iPhone Jailbreak guide that is right for you. Read everything extremely carefully, including comments, before attempting to Jailbreak. I have not personally attempted all of these, so jailbreak AT YOUR OWN RISK.
iPhone Model Version Jailbreak Software Jailbreak Instructions
iPhone 4 4.3.5 Redsn0w Jailbreak iPhone 4, iOS 4.3.5
4.3.4 Redsn0w Jailbreak iPhone 4, iOS 4.3.4
4.3.3 Redsn0w Jailbreak iPhone 4, iOS 4.3.3
4.3.2 Redsn0w Jailbreak iPhone 4, iOS 4.3.2
4.3.1 Redsn0w Jailbreak iPhone 4, iOS 4.3.1
4.3 Sn0wbreeze, Pwnage Tool Jailbreak iPhone 4, iOS 4.3
4.2.10 (CDMA) Redsn0w Jailbreak Verizon iPhone 4, iOS 4.2.10
4.2.9 (CDMA) Redsn0w Jailbreak Verizon iPhone 4, iOS 4.2.9
4.2.8 (CDMA) Redsn0w Jailbreak Verizon iPhone 4, iOS 4.2.8
4.2.7 (CDMA) Sn0wbreeze, Redsn0w Jailbreak Verizon iPhone 4, iOS 4.2.7
4.2.6 (CDMA) Greenpois0n Jailbreak Verizon iPhone 4, iOS 4.2.6
4.2.5 (CDMA) Greenpois0n Jailbreak Verizon iPhone 4, iOS 4.2.5
4.2.1 Greenpois0n Jailbreak iPhone 4, iOS 4.2.1
4.2 Greenpois0n Jailbreak iPhone 4, iOS 4.2
4.1 Greenpois0n Jailbreak iPhone 4, iOS 4.1
4.0.2 Redsn0w Jailbreak iPhone 4, iOS 4.0.2
4.0.1 Redsn0w Jailbreak iPhone 4, iOS 4.0.1
4.0 JailbreakMe.com Jailbreak iPhone 4, iOS 4.0
iPhone Model Version Jailbreak Software Jailbreak Instructions
iPhone 3GS 4.3.5 Redsn0w Jailbreak iPhone 3GS, iOS 4.3.5
4.3.4 Redsn0w Jailbreak iPhone 3GS, iOS 4.3.4
4.3.3 Redsn0w Jailbreak iPhone 3GS, iOS 4.3.3
4.3.2 Redsn0w Jailbreak iPhone 3GS, iOS 4.3.2
4.3.1 Redsn0w Jailbreak iPhone 3GS, iOS 4.3.1
4.3 Sn0wbreeze, Pwnage Tool Jailbreak iPhone 3GS, iOS 4.3
4.2.1 Greenpois0n Jailbreak iPhone 3GS, iOS 4.2.1
4.2 Greenpois0n Jailbreak iPhone 3GS, iOS 4.2
4.1 Greenpois0n Jailbreak iPhone 3GS, iOS 4.1
4.0.2 Redsn0w Jailbreak iPhone 4, iOS 4.0.2
4.0.1 Redsn0w Jailbreak iPhone 4, iOS 4.0.1
4.0 JailbreakMe.com Jailbreak iPhone 4, iOS 4.0
Find this post helpful? “Like” us on Facebook for more iPhone tutorials, accessory reviews & commentary:
Please upgrade your browser

More Jailbreak Instructions

Back to Basics: iPhone Jailbreak for Beginners

What is iPhone Jailbreak?

In short, iPhone Jailbreak is the process of hacking an iPhone to free it from Apple restrictions.
Because the iPhone is far from flawless as Apple created it, millions of iPhone users have flocked to Jailbreak in search of changes and improvements to their devices. iPhone has been held back by limited customizability, text message privacy issues, arbitrary data restrictions, and a lack of true multitasking capabilities. But iPhone Jailbreak can solve all of these problems with apps and fixes available in Cydia and Installer.
What is Cydia?/What is Installer?
Cydia and Installer are the unofficial “App Stores” of the Jailbreak world. Developers create apps and tweaks and different utilities and upload them to these package managers, which organize everything into categories. The differences between Cydia and the App Store are the lack of an app approval process, and the lack of access limits on the iPhone software. In other words, with iPhone jailbreak, you can do things Apple did not design the iPhone software to do.

Why Jailbreak iPhone?

  1. No restrictions. Want a custom wallpaper on your home screen? Custom icons for your apps? Internet tethering? A category system for organizing your apps? The ability to hide native iPhone apps you don’t use? You can do all of this and more with iPhone Jailbreak.
  2. To join the subculture. Sick of Apple’s stranglehold on the iPhone? Those who Jailbreak iPhone belong to a movement of people who demand more from their iPhones. And they’re not gonna let Apple stop them. Beat the system: Jailbreak your iPhone.
  3. Unlock iPhone. To unlock your iPhone and use it on any carrier, you must first Jailbreak your iPhone. Some of the best Jailbreak software below also lets you unlock the iPhone, though unlocking is generally beyond the scope of this tutorial.

Why NOT Jailbreak iPhone?

  1. The folks at Apple know what they are doing. Apple is first and foremost a design company, and there is no doubt the iPhone is a remarkably designed piece of hardware and software. By controlling the user experience, Apple ensures that your iPhone “just works,” and you don’t have to worry about managing battery life or any other technical details.
  2. Jailbreak could (maybe?) brick your iPhone. “When someone develops something for an Apple product and that development isn’t sanctioned by Apple, you run the risk of it not working as it should, conflicting with the device itself, or just all-around bricking that iPhone,” warns Chris Pirillo, who prefers not to Jailbreak his iPhone because “my iPhone just works already.” But I have never heard of Jailbreak completely ruining an iPhone. The consensus at this forum seems to be that the chance is “extremely slim.”
  3. Every iPhone update from iTunes disables even the best Jailbreak software. Every time Apple comes out with an update for iPhone, they find a way to prevent hackers from cracking the code again. Hackers then scramble to Jailbreak the iPhone again and release the new methods. That means if you like to download Apple’s iPhone updates, you are going to have to figure out each time how to Jailbreak your iPhone yet again. Do you really want to play this cat and mouse game?
  4. iPhone Jailbreak could increase your risk of getting a virus on your device. The only two iPhone viruses ever reported have spread across iPhones that have been Jailbroken. That’s not to say the iPhone platform as Apple built it is totally secure. In fact, some say compromising an iPhone’s security is “child’s play” (i.e. easy).
  5. Jailbreak voids your iPhone warranty. If your iPhone is bricked because of Jailbreak, or if your iPhone has another problem and it happens to be Jailbreaked, your warranty becomes void. I once saw a sign at the Genius Bar of The Falls, Miami Apple Store that warned customers not to Jailbreak iPhones or they would void their warranties. Harsh. However, if you simply restore your iPhone software (via iTunes) to factory settings, then you should have no trouble at the Genius Bar.

iPhone Jailbreak Videos

Jailbreak iOS 4.1 on iPhone 4, 3GS, Using Limera1n

Jailbreak Unlock 3.1.1 and 3.1.2 Mac and Windows:

iPhone 3.0.1 Firmware and Jailbreak with Redsnow 0.8:

How To Jailbreak NEW 3.0 Firmware For iPhone,iPhone 3G … On Windows/Mac:

Jailbreak & Unlock 2.2.1 iPhone 2g, 3g, and iPod Touch:

Jailbreak iPhone 2.2:

ZiPhone Jailbreak is History

iPhone caveman
I made this video a couple of years ago to demonstrate how to Jailbreak with ZiPhone. ZiPhone is now obsolete for most iPhone versions, so please do not try to use it unless you know what you are doing. This video has been posted here for historical and humorous purposes only.
Read: Once-Great ZiPhone Jailbreak Now Sadly a Scam.
ZiPhone Jailbreak: (Was) So Easy a Caveman Could Do It

iPhone Jailbreak FAQ

Still confused about jailbreak? Need help jailbreaking your iPhone? Check out the following iPhone Jailbreak FAQ (Frequently Asked Questions) or request help in the comments area below.
What is jailbreaking an iPhone? What can you do with a jailbroken iPhone?
To jailbreak an iPhone means to modify it in a way that makes the file system accessible. With the file system unrestricted, you are able to customize the iPhone in ways other than those intended by Apple. For example, with a jailbroken iPhone, you can add passwords to individual apps, trick the iPhone into believing it is using WiFi when it’s using 3G (i.e. for FaceTime calls), add to-do lists to your lock screen with LockInfo, change your app icons, and much more.
Read more about the best iPhone jailbreak apps.
Is it easy to jailbreak iPhone?
It depends what model and what version you are jailbreaking. Sometimes, jailbreaking an iPhone is as easy as clicking a button, and sometimes you are required to download multiple files and modify the file system. See the jailbreak guides above for the model and version you would like to jailbreak.
How do you jailbreak an iPhone?
If you’re wondering how do you jailbreak an iPhone, simply scroll up on this page and find the software that pertains to your iPhone version. Then, click the link to the jailbreak instructions for your particular version and follow directions. Good luck!
Is jailbreaking bad for your iPhone? Will jailbreak brick my iPhone?
Jailbreak is not always completely reliable, but it is not bad for your iPhone, per se. Sometimes your iPhone will become unusable when attempting to jailbreak. However, this is almost always easy to fix by simply restoring your iPhone via iTunes. Sometimes, a jailbroken iPhone will act up or become glitchy, but you can always restore.
Does jailbreak void my iPhone warranty?
Since Apple does not authorize jailbreak, jailbreak will void your iPhone warranty. Therefore, you should consider restoring your iPhone before taking it into an Apple Store for service.
Is jailbreak illegal?
Jailbreak is NOT illegal. A federal court in the US recently ruled that it is entirely legal to jailbreak your iPhone. It is your property, afterall.
How to jailbreak iPhone 4? How to jailbreak iPhone 3GS? How to jailbreak iPhone 3G?
See the guides above for instructions on how to jailbreak iPhone. There are instructions on how to jailbreak iPhone 4, 3GS and 3G. The guide is updated frequently.
What is the best jailbreak software tool or the best jailbreak programs?
The best jailbreak software or program depends on the model and version you are jailbreaking. See resources above.
What is Cydia? What is Installer?
Cydia and Installer are the “App Stores” of the jailbreak community. Through Cydia and Installer, you can download apps and modifications that are not available on the regular App Store.
Is iPhone jailbreak free?
iPhone jailbreak is almost always released free by developers, with occasional exceptions. Beware of scams that make you pay for jailbreak software that you can obtain for free.
Does jailbreak make apps free?
No. Jailbreak does not make apps free. Apps in the App Store still cost money, and even some Cydia and Installer apps are paid apps that require you to pay before downloading.
How to update a jailbroken iPhone?
You cannot usually update a jailbroken iPhone. Normally, a jailbroken iPhone can be restored to factory settings, updated, and then jailbroken again.

Conclusion: Why I Jailbreak

Jailbreak iPhone
The iPhone hardware offers endless possibilities for expressing the human imagination, but Apple’s software restrictions hold your iPhone back. iPhone Jailbreak frees your iPhone by letting you do almost anything that is physically possible to do with your iPhone. Jailbreak is the will of the people manifesting itself in an active and thriving subculture.
Yes, the App Store reflects the imaginations and creativity of thousands of developers and iPhone users. Apple has done a great job of making a line of “blank slates” — iPhone 4, iPhone 3GS, iPhone 3G, iPad, etc. — that are able to continually mold to our collective consciousness as iPhone users. Yet, iPhone can do and be so much more when it is without limits. That is why I Jailbreak.

What Do You Think About iPhone Jailbreak?

Did you Jailbreak your iPhone? What is the best jailbreak software, in your opinion? Please share your thoughts and questions in the comments.
Please note: Comments are welcome, however I cannot personally address everyone’s iPhone Jailbreak issues, so if you are Jailbreak-savvy, please assist commenters who are having trouble. (Thank you!)

Wednesday, July 13, 2011

COMPUTER VIRUSES 2011

              Threat Name: .Virut.CF - Also Known As: W32/Virut.n,                     


                                         Threat type: Virus


 


Situation Summary


The Virut family of viruses has been spreading through infected Web sites – often bypassing traditional firewalls and virus scanners. Norton’s products detect this threat and our Browser Protection technology, found in Norton 360 as well as the 2009 versions of Norton AntiVirus and Norton Internet Security, prevents this threat from infecting your system.


Who is at risk?
Because these viruses infect Web sites, anyone who surfs the internet is at risk. There is no way to know ahead of time if a Web page is infected. However, users of up-to-date Norton products including Norton 360 as well as the 2009 versions of Norton AntiVirus and Norton Internet Security are protected from being infected through our unique Browser Protection technology.


What does this threat do specifically?
This family of viruses infects program files and Web files on your computer – in some case irreparably damaging them. If your computer is also a web server the virus will also attack anyone who visits your Web site. The virus has the ability to silently install new programs onto your system including updated versions of itself and programs that might grant the virus’s author remote control over your computer.


What to do if you are infected?
Because of the extent of the damage some variants of these viruses do to files, if your computer is infected it is best to restore your computer from a clean backup. Detailed removal instructions are available here.


How To Avoid The Threat
Run a great security suite – one with Browser Protection technology. Stand alone virus scanners such as many freeware solutions are not sufficient.
Keep your computer updated with the latest security patches. If you don’t know how to do this, have someone help you set your system to update itself.
Don’t use “free” security scans that pop-up on many Web sites. All too often these are fake, using scare tactics to try to get you to purchase their “full” service. In many cases these are actually infecting you while they run.
Don’t download files from BitTorrent, LimeWire or other peer-to-peer networks. As valuable as those services can be, criminals have learned to use them to distribute viruses, trojans and worms.
Turn off the “autorun” feature that will automatically run programs found on memory sticks and other USB devices.
Have backups of your computer. If you don’t have a backup solution, consider purchasing a hard drive and using Norton Ghost 14.0.
Be smart with your passwords. Here are tips to secure your passwords:
Change your passwords periodically
Use complex passwords – no simple names or words, use special characters and numbers
Using a separate, longer password for each site that has sensitive personal information or access to your bank accounts or credit cards.
Use a passwords management system such as Identity Safe (included in Norton Internet Security and Norton 360) to track your passwords and to fill out forms automatically.
Use an internet browser with strong security such as Firefox, Opera or Internet Explorer 8.0.




Recommended Actions
Make sure your computer is clean with a free Norton Security Scan
Try Norton 360, Norton Internet Security or Norton AntiVirus
Or you can buy Norton 360, Norton Internet Security, Norton AntiVirus or Norton Ghost

Tuesday, May 3, 2011

FACEBOOK VIRUS

Facebook Chat Virus:

  • (La versione italiana la trovate qui)

Have you clicked a link in FaceBook chat and now your computer is infected?
 Have you received a strange message with a link in FaceBook chat and you
 don't know what is it? This is a good starting point to find more about.

How the virus works
Since December, there is a virus crawling through the FaceBook Chat: 
worm, to be more accurate
What is this virus?
Pretty easy: like almost all the infections you can get through a social network,
 it is just a simple message you'll receive in FaceBook Chat. One of your
 friend will send you this message, which is something like "foto :-)", "pic :)"
 and a link to the photo itself. Presumably.
DON'T click it.
Whatever thing could happen, don't click that link. Never.
What to do, then? The first thing is "Don't panic". Until now, nothing bad 
happened: you've only received a message with a potential virus, but the
 virus is not in your computer, yet. Simply close that chat window and 
everything will be fine. And DON'T click the link.
As a second step, I'd suggest you to write a message to your friend, the 
one who sent you the link with the virus. It's not mandatory, but it's a nice
 thing from you. DON'T copy the link in the message: just write "I got a 
strange link from you" and explain what happened and everything will 
be fine. If you got the link from his/her Facebook profile, this means 
that your friend is already infected by that virus and now the virus itself
 is trying to spread, without your friend ever notice it. If you inform him/her, 
you'll surely do him/her a favour and you'll help avoiding that other 
friends will be infected by the virus
Now, what happens if you click the link?
First of all, you made a really bad move. But well, it can happen. 
Maybe you involuntarily clicked it, or you really trusted your friend, 
who knows. It would be better to be more cautious in the Web, but 
by now you did it. Time to find a solution. Let's see.
If you click the link, you'll be send to a fake FaceBook page, 
which says that the picture you were looking for has been moved, for
 whatever reason. If you want to see the picture, you must click on a button, 
which looks exactly like a common FaceBook button, like the one
 you usually click in order to activate an app. Have you clicked it?
 Great! Now, your computer has just won a new virus.

Clicking on that fake button, you haven't activated any app and you 
haven't seen any picture, since no picture ever existed! It was a trick, 
made by the one who programmed the virus: a bait, in order to make 
you click and install the virus in your computer. Maybe the virus has a 
name, which looks like a real photo from FaceBook, but the truth is
 that it's not a photo: it's an executable file, which will install itself in your
 computer as soon as you click and accept.
This kind of virus is usually called "Worm": it is a virus often hidden in
 a fake web page, which spreads itself through the Web, from a 
computer to another. Those pages are clearly fake, but very similar
 to an original page and they can deceive an inattentive user. 
After infected your computer, this virus will keep working, trying to
 spread through all of your contacts, using the same trick which 
already worked with you: fake links and fake pages.
A worm virus works like this. Their name comes exactly from it: worm,
 since they crawl from a computer to another, digging through fake pages.

How to remove it
You got yourselves infected. And now?
And now you must clean up your computer, in order to erase the 
virus and bound the damages it already did.
First of all, you must scan you whole hard disk with a good and 
updated antivirus. All the hard disk, folder after folder. You can 
never be too cautious about it.
Usually this is not enough. You need a specific software, in order to
 remove this kind of virus. There are many of them, as for example 
Malwarebytes, which is also downloadable in a free version. 
You can download it by clicking here.
Another mirror site to download it:
Download it, install it and scan all your computer with it, too: then, 
follow the instructions. Next time, please be more careful and avoid 
to blindly click any link you find.
One last thing, but very important.
Once you have removed the virus and your computer is clean,
 change all of your passwords. Change the answers to the questions
 for recovering your passwords. You can't be sure whether your 
passwords have already been stolen or not, but it's better to play safe. 
For sure, someone had a chance for putting his nose inside your 
computer, potentially finding and copying all of your data stored
 inside of it, passwords included. Maybe he did it, or maybe not, 
but why should you risk?
Change your passwords and you'll be safer.

Thursday, January 27, 2011

REMOVAL TOOL

Noob Killer by Droid

Noob Killer by Leerz is a simple but effective virus removal tool
 that I frequently use on my computer repair jobs. Easy to use, fast,
 lightweight and like I said, effective. What more can you asked for?

Download Link

Requirements:
Noob Killer by Leerz error:

You will need the VB6 Runtime Environment as this program was written 
using Visual Basic program, if not you will receive this error
 when trying to open the program:
NOOB.KILLER.leerz.exe - Unable to Locate Component
This application has failed to start because MSVBVM60.DLL

was not found. Re-installing the application may fix this problem.

Noob Killer Description:
Noob Killer by Leerz most recent version is able to pick up and
 remove the following annoying viruses:

* VBS Worm\Solow
* Hacked by Godzilla (and its other variants)
*Taga Lipa Are virus
* Baguio Strawberry Worm
* Yahoo! Worm (Sohanad) || Some Variants
* Krag.exe (I'm Not The Only One)
* Destrukto | explorar.vbs
* jay.exe | jaymykawen9
* w32dranyam | marcmaynard.exe
* Funny UST Scandal(Avi).exe
* SilentSoftech.exe | anti-taga lipa are
* Disk Knight
* Thank You!! Password WinZip123 | password_viewer.exe bar311.exe
* iloveher.exe | say no to drugs!!!
* display monitor.exe | new folder variant
* ImgKulot and variants, jamesgo, bungoton and the like 
[*.bat, *.reg, *.vbs collection]
* kxvx | kavo, amvo, kevo
* transmit.exe setup.exe | black pegasus
* .. and still counting!
Noob Killer by Leerz can also patch your registry to enable:
1. Enable Folder Option
2. Enable Registry Editor
3. Enable Task Manager
4. Show all Hidden Files
Written in Visual Basic, Initially it was only for cleaning and removing 
VBS\Worm.Solow variants, popularly known as “Hacked by Godzilla” and
 “Taga Lipa Are” which that spreads through removable mass storage
 devices (flashdrives | flash drives) via Visual Basic(VBS) and autorun.inf scripts.
The Noob Killer by Leerz now caters a hefty amount of worms and 
viruses listed for cleaning, with the current active development, the 
list is still counting everyday.

How to use Noob Killer by Leerz:
1. There are several files at the noob killer folder. You need to run 
NOOB.KILLER.leerz.exe
2. Update the program if you are not sure that you are using the
 latest one. Select X at the toolbar and select Live Update Now!
3. After updating, click 8-X Kill All and it will scan for all possible 
virus infection it can get rid off. Remember that it will restart your 
computer after that so you need to save all your work prior to running 
Noob Killer by Leerz.

Thursday, January 6, 2011

NETWORK SCANNER

SoftPerfect Network Scanner

SoftPerfect Network ScannerSoftPerfect Network Scanner is a free multi-threaded IP, NetBIOS and SNMP scanner with a modern interface and many advanced features. It is intended for both system administrators and general users interested in computer security. The program pings computers, scans for listening TCP/UDP ports and displays which types of resources are shared on the network (including system and hidden).

In addition, it allows you to mount shared folders as network drives, browse them using Windows Explorer, filter the results list and more. SoftPerfect Network Scanner can also check for a user-defined port and report back if one is open. It can also resolve host names and auto-detect your local and external IP range. It supports remote shutdown and Wake-On-LAN.
Key features

* Pings computers and displays those alive.
* Detects hardware MAC-addresses, even across routers.
* Detects hidden shared folders and writable ones.
* Detects your internal and external IP addresses.
* Scans for listening TCP ports, some UDP and SNMP services.
* Retrieves currently logged-on users, configured user accounts, uptime, etc.
* You can mount and explore network resources.
* Can launch external third party applications.
* Exports results to HTML, XML, CSV and TXT
* Supports Wake-On-LAN, remote shutdown and sending network messages.
* Retrieves potentially any information via WMI.
* Retrieves information from remote registry, file system and service manager.
* It is absolutely free, requires no installation, and does not contain any adware/spyware/malware.

Screenshots

The network scanner main window with some scan results.
The main window. Click to enlarge The main window. Click to enlarge.

The network scanner can be easily configured according to your needs.
General options Additonal optionsWorkstation optionsShares settings
LINKS OF POSSIBLE INTEREST

PRODUCT INFO
Latest version

5.1 (Dec 21, 2010)
Changelog
Supported platforms

Windows 2000, XP, 2003, Vista, 2008, Seven

32-bit and 64-bit
License

Freeware

Download Now
Download Now
Size: 729K

Online User Manual
Online User Manual

Don't forget to check out our other FREE and commercial applications!
© 2000–20

Friday, December 31, 2010

VPN VS BRIDGE BY: DROID

Installation Notes - Installation (Win32)

Article Index
Installation Notes
installation-win32
All Pages

OpenVPN on Windows notes


These notes are intended to highlight the Windows-specific characteristics of OpenVPN. For a general introduction to OpenVPN configuration, see the FAQ.
Please report any bugs to the openvpn-users list ( openvpn-users@lists.sourceforge.netThis e-mail address is being protected from spambots. You need JavaScript enabled to view it ).
Before you post, check out the FAQ (http://openvpn.net/index.php/open-source/faq.html) for more info.
Currently, OpenVPN runs on Win 2000/XP, Linux, Mac OS X, Solaris, FreeBSD, NetBSD, and OpenBSD, making it one of the most portable VPN packages today.
Note however that OpenVPN does NOT run on Win9x/Me.

OpenVPN GUI for Windows

Mathias Sundman has developed an OpenVPN GUI for Windows which includes the standard OpenVPN package plus a Windows GUI.

Installing OpenVPN on Windows

See the HOWTO.

Running OpenVPN from a console window

First, create a config file. A sample is provided in \Program Files\OpenVPN\config\sample.ovpn.txt
Edit this file and save to a .ovpn extension. Now, run OpenVPN by right clicking on the .ovpn filename and selecting "Start OpenVPN on this config file".
You can also run from a command prompt window:
openvpn --config sample.ovpn

Running OpenVPN as a Windows Service

When OpenVPN runs as a service it will start a separate OpenVPN process for each configuration file it finds in the \Program Files\OpenVPN\config directory and will output a logfile of the same name to the \Program Files\OpenVPN\log directory.
When installed as a service, OpenVPN will default to manual start mode. You can go to the "Services" control panel in Control Panel -> Administrative Tools to start the service or to set it to Automatic Start mode.
A sample config file has been provided in \Program Files\OpenVPN\config\sample.ovpn.txt which can be adapted to your needs.

Service Notes:

  • When you install OpenVPN as a service, you are actually installing openvpnserv.exe which is a service wrapper for OpenVPN, i.e. it reads the config file directory and starts up a separate OpenVPN process for each config file. openvpnserv.exe performs the same function under windows as the /etc/init.d/openvpn startup script does under linux.
  • When you stop the OpenVPN service, it will send a terminate signal to all OpenVPN processes which were started by it.
  • If the OpenVPN service wrapper (openvpnserv.exe) encounters fatal errors, it will write them to the windows event log, which can be viewed in Control Panel -> Administrative Tools -> Event Viewer -> Application Log.
  • If the OpenVPN processes themselves encounter errors, they will write them to their respective log files in the log file directory.
  • There is a one-to-one correspondence between an OpenVPN process, an OpenVPN config file, an OpenVPN log file, and a TAP-Win32 adapter which represents an endpoint of a VPN tunnel.
  • OpenVPN tunnels are point-to-point in their simplest form, but can be made point-to-multi-point through the use of bridging or routing (see below).
  • Multiple OpenVPN processes can run concurrently, each on a different TAP-Win32 adapter.
  • openvpn.exe gets all configuration information from its config file, not from the registry.
  • The openvpnserv.exe program (the service wrapper) gets several string parameters from the registry which can be modified by the user. If you change any of these parameters, you should be able to upgrade OpenVPN to a new version without the installer overwriting your changes: HKEY_LOCAL_MACHINE\SOFTWARE\OpenVPN
    config_dir
    configuration file directory to scan, defaults to "\Program Files\OpenVPN\config"
    config_ext
    file extension on configuration files, defaults to "ovpn"
    exe_path
    path to openvpn.exe, defaults to "\Program Files\OpenVPN\bin\openvpn.exe"
    log_dir
    log file directory, defaults to "\Program Files\OpenVPN\log"
    log_append
    if set to "1", multiple instantiations of an OpenVPN process will append onto the same log file, if set to "0" (default), each new instantiation will truncate the previous log file
    priority
    the windows priority class for each instantiated OpenVPN process, can be one of:
    • "IDLE_PRIORITY_CLASS"
    • "BELOW_NORMAL_PRIORITY_CLASS"
    • "NORMAL_PRIORITY_CLASS" (default)
    • "ABOVE_NORMAL_PRIORITY_CLASS"
    • "HIGH_PRIORITY_CLASS"


Bridging vs. Routing

Bridging and routing are two methods of linking systems via a VPN.
See FAQ for more info.

Example running a point-to-point VPN

This example will work between Windows and Windows, Windows and Linux, or Windows and FreeBSD.
For purposes of this example, we will refer to our two Windows machines as "A" and "B".
The Windows OpenVPN installer should have already installed a TAP-Win32 adapter on each machine which you should see in the Network Connections control panel.
We will choose the network 10.3.0.0 subnet 255.255.255.0 as our virtual VPN subnet.
We are assuming that the network 10.3.0.0 subnet 255.255.255.0 is a new and distinct subnet from any that you are currently using. If it is not, choose a different subnet by substituting something else for the "10.3.0" component of the subnet.
It is very important that the virtual VPN subnet you use is private and unique from any other physical or virtual subnets in use. If your virtual subnet clashes with your physical subnet, the VPN will not work and there will likely be no error messages to tell you why.
Now generate a static key on Machine A:
openvpn --genkey --secret key
(Or use the shortcut in the start menu)
Copy this key to Machine B over a secure medium.
Now edit the config files for both ends of the connection.
On Machine A create a file config.ovpn:
remote [IP address of B]
    dev tap
    ifconfig 10.3.0.1 255.255.255.0
    secret key
    ping 10
    verb 3
    mute 10
On Machine B create a file config.ovpn:
remote [IP address of A]
    dev tap
    ifconfig 10.3.0.2 255.255.255.0
    secret key
    ping 10
    verb 3
    mute 10
Another important point to remember is that the addresses used in the "remote" option are real addresses, not virtual addresses. Before OpenVPN is started you must be able to ping the address given after the "remote" option. OpenVPN will try to connect to that address and if you can't ping it beforehand, OpenVPN will not be able to connect to it either.
The rule of thumb to remember is that "remote" specifies real, non-VPN addresses while "ifconfig" specifies virtual VPN addresses. The address used in "remote" should NEVER be a part of the subnet defined by the "ifconfig" option.
Now the moment of truth... Type:
openvpn --config config.ovpn
On both A and B.
Alternatively, bring up the folder that contains the .ovpn file, right click on the .ovpn file, and select "Start OpenVPN on this config file".
If everything worked correctly you will now have a point-to-point VPN connecting the two boxes.
On Machine A you can ping B with the following command:
ping 10.3.0.2
On Machine B you can ping A with the following command:
ping 10.3.0.1
A few notes to be aware of:
  • If you are using different versions of OpenVPN on either side of the connection, then add the following lines to both configs:
tun-mtu 1500
        tun-mtu-extra 32
  • If one side of the connection is running on Linux, make sure you tell your linux firewall to allow incoming connections on virtual tap interfaces. The command for iptables would be:
iptables -A INPUT -i tap+ -j ACCEPT
  • Make sure that both boxes can talk to each other over UDP port 1194. It is a good idea to ping the "remote" address in the config file before actually starting OpenVPN to confirm that it is reachable.

Setting up routing

If you set up a routed VPN, i.e. one where local and remote subnets differ, you need to set up routing between the subnets so that packets will transit the VPN.
Here is a possible road warrior network configuration:
Road Warrior (Windows)
TAP-Win32 Adapter
    10.3.0.2 subnet 255.255.255.0
ifconfig option in OpenVPN config:
ifconfig 10.3.0.2 255.255.255.0
Main Office, server (any OS)
tap adapter
    10.3.0.1 subnet 255.255.255.0
ifconfig option in OpenVPN config:
ifconfig 10.3.0.1 255.255.255.0
private ethernet
    10.0.0.1 subnet 255.255.255.0
The road warrior needs this route in order to reach machines on the main office subnet:
route add 10.0.0.0 mask 255.255.255.0 10.3.0.1 (this is a shell command)
Routes can be conveniently specified in the OpenVPN config file itself using the --route option:
route 10.0.0.0 255.255.255.0 10.3.0.1
If the OpenVPN server in the main office is also the gateway for machines on the remote subnet, no special route is required on the main office side.
On the other hand, if the main office OpenVPN server is NOT also the gateway, then whatever machine or router which IS the gateway must know to route 10.3.0.0 subnet 255.255.255.0 to the machine which is running OpenVPN.

Notes -- Ethernet bridging, Windows client, Linux Server

Ethernet bridging is a powerful networking capability that allows remote systems (such as "Road Warriors") to connect over a VPN to an ethernet LAN in such a way that their system appears to be directly connected to the LAN, i.e. they have an IP address taken right from the LAN's subnet and they are able to interact with other hosts on the LAN including sending and receiving broadcasts and being able to conveniently browse and access the Windows network neighborhood.
I have tested ethernet bridging with Windows clients connecting to a Linux server. On the linux side, basically follow the instructions in the Ethernet bridging Mini-Howto on the OpenVPN web site.
On the Linux side you must first set up ethernet bridging. Here is a configuration which I use:
#!/bin/bash

    modprobe tun
    modprobe bridge

    openvpn --mktun --dev tap0
    openvpn --mktun --dev tap1

    brctl addbr br0
    brctl addif br0 eth1
    brctl addif br0 tap0
    brctl addif br0 tap1

    ifconfig tap0 0.0.0.0 promisc up
    ifconfig tap1 0.0.0.0 promisc up
    ifconfig eth1 0.0.0.0 promisc up

    ifconfig br0 10.5.0.1 netmask 255.255.255.0 broadcast 10.5.0.255

    # end of script
This script will set up ethernet bridging between eth1, tap0, and tap1. Change the br0 ifconfig to match the ifconfig that would be used for eth1 under normal, non-bridged configuration. Use as many tapX virtual adapters as you will have remote clients connecting.
In the firewall, add these entries to allow TAP devices and ethernet bridges to operate:
iptables -A INPUT -i tap+ -j ACCEPT
    iptables -A INPUT -i br0 -j ACCEPT
    iptables -A FORWARD -i br0 -j ACCEPT
Now make an OpenVPN configuration on the server side to receive incoming connections such as:
###################################
    # OpenVPN bridge config, Linux side

    local [public IP address or hostname]

    # IP settings
    port 8888
    dev tap0

    # crypto config
    secret key.txt

    # restart control
    persist-key
    persist-tun
    ping-timer-rem
    ping-restart 60
    ping 10

    # compression
    comp-lzo

    # UID
    user nobody
    group nobody

    # verbosity
    verb 3

    # end of config
    ###################################
For additional clients, copy the configuration above, but use a different port number, tapX unit number, and secret key.
Now on the windows client side:
############################################
    # OpenVPN bridge config, windows client side

    remote [public IP address or hostname of server]
    port 8888
    dev tap

    # This is the address the client will
    # "appear as" when it connects to the
    # bridged LAN.
    ifconfig 10.5.0.5 255.255.255.0
    ifconfig-nowarn

    secret key.txt
    ping 10
    comp-lzo
    verb 3

    # end of config
    ###################################
Now run OpenVPN on both sides with the appropriate configuration file, using the --config option.
On the Linux side, you probably want to run as a daemon, so include --daemon and --cd [dir], where dir is the directory that contains the key file.
If everything worked correctly, the Linux server or any host on its subnet should be able to ping 10.5.0.5 and see the remote VPN connected client.
The Windows client should be able to ping any address on the 10.5.0.x subnet, including addresses of other remote, OpenVPN-bridged clients.
If Windows machines or Samba servers exist on the LAN bridged by the Linux server (including Samba running on the Linux server itself), the Windows client should see them in its network neighborhood, and vice versa.
Furthermore, ethernet bridging allows for the transport of all protocols which are compatible with Ethernet, including IPv6 and IPX.
Ethernet bridging is a great way to work when on the road, and I personally use it for securely connecting to home or office from WiFi Internet cafes.

Notes -- Ethernet bridging, with the bridge occurring on the Windows side.

This configuration requires Windows XP or higher on the bridge side. To my knowledge, Windows 2000 does not support bridging, however a Windows 2000 machine can be a client on a bridged network, where the other end of the OpenVPN connection where the bridging is occurring is a Linux or Windows XP machine.
First make a TAP-Win32 adapter ("tap-bridge") without setting any TCP/IP properties.
Select "tap-bridge" and your ethernet adapter in Control Panel -> Network Connections, then right click and select "Bridge Connections". I am assuming that the bridged network address is 10.0.0.0 subnet 255.255.255.0. The connecting client will use an address of 10.0.0.7.
Note that if your ethernet adapter is a DHCP client, the act of bridging the connection may cause it to get a new IP address lease.
Use this config on the Windows side (the side doing the bridging):
remote [myremote]
    dev tap
    dev-node tap-bridge
    ping 5
    secret key
Use this config on the remote (which in this case is a linux box but could also be a windows box):
remote [myremote]
    dev tap
    ifconfig 10.0.0.7 255.255.255.0
    ping 5
    secret key

Notes -- Setting TAP-Win32 address/subnet automatically via DHCP

Setting the TAP-Win32 address/subnet automatically via DHCP is a convenient method of managing IP addresses in a bridge situation, though there are some caveats that must be handled.
The problem with getting addresses for VPN clients via DHCP is that you only want to get the IP address and subnet mask, not the gateway. Therefore in a bridge situation, a DHCP server must be able to differentiate between local clients and remote VPN clients.
Dave Lau contributed a config file for ISC's dhcp3 server that does just this. I reproduce Dave's email describing his setup in full below, including the DHCP server config file.
[Editors note: The 00:FF MAC prefix is not my original idea -- I got it from the Linux TAP driver.]
I've been using openVPN since you ported it to windows, and I must say it is fantastic. In just 2 short weeks of testing, I have decided to scrap my IPSec VPN that I have been using for my small business in place of openVPN. One thing that I have found to be immensely useful is the ethernet bridging. I would rather bridge than route for my particular situation, because I want my remote vpn clients to be on the same subnet as the office-bound clients for myriad reasons. I did not like having to manually configure IP addresses for each client, so I elected to use a dhcp server to serve my remote clients an IP address through the openVPN tunnel.
Rather than relying on client hostnames to distinguish between openVPN and non-openVPN connections, I took advantage of your clever idea to create MAC addresses for the Tap adapters as 00:FF:xx:xx:xx:xx, and I wrote my dhcpd.conf file accordingly. The reason this is necessary for me is that I do not want to hand out a default gateway or DNS server to my openVPN clients, I only want local traffic going through the tunnel. I'm sure there are many other possible instances in which the dhcp server would like to handle openVPN clients differently from standard clients, so I though I would share my dhcp server config with you on the off chance that it might be useful to others. This particular config is for ISC's dhcp3 server, but I'm sure it would work with just about anything. There is nothing particularly clever or tricky about this config file, I just did not happen to see any examples of it anywhere, so if this could save someone some time and effort, that would be great:
Thank you, Jim, for writing this fantastic piece of software.
Sincerely,
Dave Lau


beefcake:~# cat /etc/dhcp3/dhcpd.conf
## If hardware address begins with 00:FF, the client is an
## openvpn tap adapter, and we do not want to assign a
## default gateway or dns server.  Assign then to a special
## subclass and configure a pool which does not hand out
## these parameters.

class "openvpn" {
     match if substring (hardware, 1, 2) = 00:FF;
 }
## end class declaration

## subnet for br0

authoritative;
subnet 172.16.0.0 netmask 255.255.255.0 {
always-broadcast on;
max-lease-time 3600;
default-lease-time 1800;
option domain-name "ezone.net";
option subnet-mask 255.255.255.0;

pool {
     deny members of "openvpn";
     range 172.16.0.150 172.16.0.254;
     option routers 172.16.0.1;
     option domain-name-servers 172.16.0.1;
     option tftp-server-name "172.16.0.209";
     }

pool {
     allow members of "openvpn";
     range 172.16.0.100 172.16.0.125;
     }

}

Notes -- Driver Stability

The stability of the TAP-Win32 driver is obviously of great concern since any crash by a driver will also crash the entire system, producing the infamous blue screen of death (BSOD).
Between 1.5-beta1 and 1.5-beta2, significant stability improvements have been made in the driver, and it now passes the Windows Driver Verifier when running in its most rigourous verification mode. The 1.5-beta1 driver had problems crashing on sleep/resume and I believe these bugs have been fixed in 1.5-beta2 and higher.
Versions of the TAP-Win32 driver prior to 1.5-beta8 are NOT safe for usage on SMP (i.e. multiprocessor) systems.
1.5-Beta8 has been redesigned to be SMP-safe but more real world testing will be required before its stability can be assured.

Notes -- TUN devices

Tun device support (via the --dev tun option) was first included in OpenVPN 1.5-beta8.
A "tun" device is a virtual point-to-point IP link.
Using --dev tun also requires that you use --ifconfig to tell OpenVPN the local and remote IP endpoints for the point-to-point tunnel.
The --ifconfig option also calls the Windows "netsh" command, and some problems have been reported with this command on Win2K at lower service packet levels.
If you would like to use --dev tun but would rather set the TCP/IP properties manually rather than having OpenVPN try to do it automatically with netsh, follow these steps:
  • Specify --ifconfig with endpoint addresses.
  • Specify the --ifconfig-noexec option.
  • Manually set the network/subnet in the TCP/IP properties. You should use a "/30" subnet that encloses the addresses that were specified in the --ifconfig option. The netmask, therefore, will be 255.255.255.252.

Notes -- TAP vs. TUN devices

A "tap" device is a virtual ethernet adapter, while a "tun" device is a virtual point-to-point IP link.
As of OpenVPN 1.5-beta8, the TAP-Win32 driver supports both "tun or "tap" style devices.
You cannot mix --dev tun and --dev tap on different ends of the connection. Use one or the other consistently.
There are some caveats to be aware of when using "tun" style devices on Windows: the --ifconfig endpoints chosen must be the two "middle" addresses in a 255.255.255.252 subnet.
The command
openvpn --show-valid-subnets
will show more information about how to choose VPN endpoints when --dev tun is used.
The other caveat concerns MTU. On most platforms, OpenVPN programatically sets the MTU of the "tun" or "tap" interface. Currently on Windows, the only way to change the TAP-Win32 MTU is to go to the adapter advanced properties and do it manually.
Because of this, the easiest choice is to leave the TAP-Win32 MTU setting at "1500" and tell OpenVPN on both sides of the connection to use an MTU of "1500" with the config option:
tun-mtu 1500
If you then need to lower the MTU because of fragmentation or router problems, use something like
fragment 1400
    mssfix
to lower OpenVPN's tunnel carrier UDP packet size to "1400".

Notes -- MTU

Setting the MTU is an important but sometimes problematic aspect of VPN configuration. The MTU (maximum transmission units) is the maximum packet size in bytes that can be sent or received by a real or virtual network adapter.
The common symptom of MTU problems is a VPN connection which appears to start up fine, but then locks up under real usage.
The easiest way to solve MTU problems is by using the --mssfix and/or --fragment options which were added in beta8. Typical usage would be:
fragment 1400
    mssfix
Some notes:
  • The TAP-Win32 adapter MTU defaults to "1500" which is the required setting for ethernet bridging.
  • For some time before the Windows port of OpenVPN was completed, a default --link-mtu of "1300" has been in place for "tun" interfaces. Because the Windows TAP-Win32 interface prefers an MTU of "1500", it is essential to not rely on the default MTU value in this case, but to explicitly include "tun-mtu 1500" on both sides of the connection.
  • The MTU on both sides of an OpenVPN connection must exactly match. On non-windows systems, the MTU of a tap device is usually set by the ifconfig command.
  • The MTU of a TAP-Win32 adapter can be changed by going to Control Panel -> Network Connections -> [TAP-Win32 adapter name] -> Configure -> Advanced.

Notes -- Firewall on the Windows client

In general, it's a good idea to always protect a VPN client or server with a firewall.
The important points for setting up firewalling on a Windows system running OpenVPN are:
  1. Make sure that your connection to the internet is always firewalled, especially when you are running a VPN. VPNs create trusted relationships between geographically disparate networks, and if any network on the VPN is compromised by a virus or worm, the exploit has the potential of jumping across the VPN and infecting other machines.
  2. You can enable firewalling on a given network adapter by going to Control Panel -> Network Connections, right-click on the icon that represents your link to the internet, select "Properties", go the the "Advanced" tab, and enable "Internet Connection Firewall".
  3. If you are running OpenVPN as a server on a Windows machine, you will need to configure your firewall to allow incoming clients to connect to OpenVPN's port number which is "UDP 1194" by default.
  4. In general, running OpenVPN as a client doesn't require any special firewall configuration, provided you use the --ping option to preserve the state of the OpenVPN connection in the firewall.
  5. In general, you don't need to enable firewalling on the TAP-Win32 adapter. Once an IP packet appears to be "coming in" on the TAP-Win32 adapter, it has already been decrypted and authenticated by OpenVPN, even though the connection between OpenVPN peers might transit an untrusted network such as the internet.
  6. One case where you might want to firewall the TAP-Win32 adapter is if you are connecting to an untrusted machine, or a machine which will route or bridge your connection with an untrusted network.

Notes -- Media Status

1.5-beta2 of the driver has the Media Status patch. This patch shows the TAP-Win32 adapter as being "unplugged" whenever OpenVPN is not running.

Notes -- Error message from OpenVPN

OpenVPN can be on the chatty side when it comes to error messages, and sleep-resume activity often produces a flurry of non-fatal messages. Most of these messages can be safely ignored and are provided for informational and debugging purposes only.
To suppress repeating messages, the --mute option can be used. For example --mute 10 will print no more than 10 consecutive messages in the same error class. To suppress all error messages except those that are fatal, use --verb 0.

Notes -- ARP/MAC Issues with the TAP-Win32 driver

Most TAP drivers allocate a random MAC to their virtual NIC. If OpenVPN running on Windows disconnects and reconnects to a remote peer, it is possible that that peer will reinitialize its TAP device and generate a new random MAC, causing Windows to temporarily lose access to the IP addresses exported by that remote peer. This is because Windows doesn't know that a given IP address on the virtual TAP network now is associated with a new MAC, so it tries to send packets to the old MAC, causing them to be dropped.
Luckily, there is an easy solution to this problem. Create a batch file with one or more of the following commands:
arp -d [ip-address]
Where ip-address is a remote IP address at the other end of the virtual TAP network whose access was lost due to an OpenVPN restart. The "arp -d" command will cause Windows to "forget" the MAC address which it previously associated with the given IP address. Next time that IP address is used, Windows will actively query the remote peer (with an "arp who-has" message) to get the new MAC address.
You can also use
arp -d *
to purge all MAC addresses from the cache.
You can use the --up option in OpenVPN to automatically run a given batch file immediately after TAP device initialization -- such a batch file can contain "arp" commands as described above.
Note that OpenVPN 1.5-beta8 and higher will execute the "arp -d *" command automatically, unless explicitly disabled with the --no-arp-del option.

Notes -- Limitations

The following features which are normally available in the Posix version of OpenVPN are either missing or implemented differently in the Windows version as of 1.5-beta3.
  1. Only TAP virtual devices are supported on Windows, not TUN devices. This means that OpenVPN on Windows can only connect to other platforms which also support TAP devices.
  2. --shaper doesn't work yet due to the lack of a gettimeofday library function. This is not difficult to fix and could be implemented by borrowing some code from the cygwin library.
  3. Windows doesn't support Posix-style signals directly, however when OpenVPN is run from a command prompt window, keyboard shortcuts have been set up to simulate signals using the following mapping: "F1:USR1 F2:USR2 F3:HUP F4:TERM". When running as a service, the OpenVPN service wrapper will send a terminate signal to all OpenVPN subprocesses when it gets a stop signal from the SCM (Service Control Manager).

Notes -- Differences between TAP-Win32 driver and CIPE driver

The TAP-Win32 driver distributed with OpenVPN 1.5-beta5 and later is derived from Cipe-Win32 2.0-pre15 with some significant changes:
  1. Stability is much improved, especially with sleep/resume, using Michael Clarke's patch which upgrades the driver to NDIS5, properly implements sleep/resume OIDs, and fixes a race condition between "AdapterTransmit" and "IRP_MJ_READ".
  2. Added Christof Meerwald's "Media Status" patch which shows a given TAP-Win32 adapter as being "unplugged" when it is not currently open by an OpenVPN instance.
  3. Modified the MAC generation code to follow the Linux algorithm for generating MACs, using "0:FF:XX:XX:XX:XX" where "XX:XX:XX:XX" is random.
  4. Added code to lock the TAP device so that only one OpenVPN instance can have it open at a time.
  5. Added an MTU parameter which acts like the ifconfig mtu parameter under Linux. The MTU defaults to "1500" and can be changed through the adapter advanced properties dialog.
  6. Set up the driver to keep track of its Rx/Tx stats rather than depending on userspace to set them.
  7. Ran the driver through the windows driver verifier with all testing modes enabled, including low-resource simulation mode. Based on the resulting bug checks, I was able to fix a number of problems including using "MmGetSystemAddressForMdlSafe" instead of "MmGetSystemAddressForMdl", fixing several places in the code where the return status of "NdisAllocateMemory" is not checked, and making the flags match between "NdisAllocateMemory" and "NdisFreeMemory" calls.
  8. Renamed the driver so that it shows up as a "TAP-Win32" adapter in the network control panel, and does not conflict with the CIPE driver.
  9. Brought the driver up to SMP standards (beta8), redid the packet queueing subroutines as a circular queue for better efficiency and more straightforward locking semantics under SMP.
  10. Fixed dangling IRP bug that could potentially cause a bug check if driver was unloaded or disabled while still open by a userspace process (beta8).
  11. Fixed bug that rendered an adapter instance unusable if a userspace process tried to read a packet of data but provided a buffer that was too small to completely return the packet (beta8).
  12. Added several new ioctls to return interesting status information back to userspace, such as currently configured MTU value, driver version number, and extended error status information (beta8).
  13. Added "tun" device emulation (beta8).
  14. Adapter media state is now controlled directly from userspace using the "TAP_IOCTL_SET_MEDIA_STATUS" ioctl.
  15. An option has been added to the TAP-Win32 driver advanced properties page that allows you to control whether the adapter appears to Windows as "Always Connected" or whether the connection status is dynamically brought up and down by OpenVPN ("Application Controlled").
  16. To a certain extent, backwards compatibility with NT 4 has been sacrificed in the interest of better usability and stability on Win2K/XP.

Notes -- Manual configuration of the TAP-Win32 adapter

On XP Go to Start -> Control Panel -> Network Connections.
On Win2K, go to Start -> Settings -> Control Panel -> Network (and Dial-up) Connections.
You should see a "TAP-Win32 Adapter" with a name like "Local Area Connection 3". Right click and rename this to something shorter and without embedded spaces such as "my-tap".
Now right click again and select properties.
Select Internet Protocol (TCP/IP) from the list and click on "Properties".
Set the IP address and subnet mask of your new TAP device. For the example below we will use an IP of 10.3.0.1 and a subnet mask of 255.255.255.0. Other fields can be left as they are.
Note also that the command line tool "netsh" can do many of these same functions.
For example, the following command will set the IP and subnet for my-tap:
netsh interface ip set address my-tap static 10.3.0.1 255.255.255.0
This setting is persistent across reboots.

Notes -- List available TAP-Win32 adapters

Type:
openvpn --show-adapters
at a command prompt.
You should see a list that looks like this:
Available TAP-Win32 devices:
    [1] 'my-tap'
You can list all network interfaces with the Windows "ipconfig" command, and all TAP-Win32 interfaces should be included among them.

Notes -- Windows and TAP device naming

Basically what happens when you install the TAP-Win32 driver is that you get a new network adapter that shows up in your network control panel. You right click on the TAP adapter and set the TCP/IP properties, i.e. IP address and netmask. Then you rename the TAP adapter icon to something like "my-tap" and reference it using the --dev-node option in OpenVPN.
Windows also has command line utilities to accomplish these same kinds of tasks such as "devcon", "netsh", and "ipconfig".

Notes -- Building from source

This section is for developers only.
You will need the following:
  1. MinGW/MSYS environment
    http://www.mingw.org/
  2. OpenSSL library
    http://www.openssl.org/
  3. LZO library
    http://www.oberhumer.com/opensource/lzo/
  4. Windows DDK (available only from Microsoft)
    http://www.microsoft.com/whdc/devtools/WDK/default.mspx
  5. Nullsoft Install System (optional)
    http://nsis.sourceforge.net/Main_Page
It should be noted that Visual C++ is NOT required. The open-source MinGW compiler is used to build the userspace component of OpenVPN, and the DDK is used to build the driver component.
First build the usermode component of OpenVPN from the top-level directory of the OpenVPN source distribution:
Edit makefile.32 with the location of your OpenSSL and LZO distributions. Note that it is only necessary to build these distributions, not to install them.
Note that the makefile accepts a "dynamic" or "static" target, depending on the way you want to link with the OpenSSL library.
By default the makefile will attempt to dynamically link with OpenSSL.
Type:
make -f makefile.w32
This will build the user mode component of OpenVPN.
Now build the TAP-Win32 kernel driver:
Go to Start -> All Programs -> Development Kits -> Windows DDK -> Build Environments -> Win Free Build Environment
Use the Checked Build Environment if you want a debugging version.
A command prompt window will open. Go to the tap-win32 directory of the OpenVPN distribution.
Type:
build -cef
This will build the kernel driver in the i386 directory.
At this point you will have built:
  • .\openvpn.exe -- openvpn daemon
  • .\tap-win32\i386\tap0801.sys -- TAP-Win32 kernel driver
Copy openvpn.exe to a directory in your path. If you build dynamically with OpenSSL, copy the OpenSSL DLLs to a directory in your path.
If you want to build a self-installing EXE, consult the NSIS install script (openvpn.nsi) in the install-win32 directory. You will need to edit openvpn.nsi to reflect the setup of your development environment.
See instructions below for installing the kernel driver.

Notes -- Manual Install/Update/Uninstall of the TAP-Win32 kernel driver

This is best done using tapinstall.exe, a utility based on a DDK sample which is distributed with the self-installing form of OpenVPN on Windows. Cd to the directory which contains OemWin2k.inf and tap0801.sys.
To install:
tapinstall install OemWin2k.inf TAP0801
To update:
tapinstall update OemWin2k.inf TAP0801
To uninstall:
tapinstall remove TAP0801
By installing multiple times, you will create additional TAP-Win32 adapter instances, which can be used for multiple concurrent VPN tunnels.
It is also possible to install using Control Panel -> Add New Hardware, and it is possible to uninstall using Control Panel -> System -> Hardware -> Device Manager.

Notes -- OpenVPN Performance Benchmarks

All tests with OpenVPN 1.5-beta2 on systems locally connected to a 100Mbps LAN using UDP tunnel transport, TAP devices with an MTU of 1500, and no compression.

TEST #1

Transfer of 33,128,460 bytes -- Linux 2.4.21 P2 266Mhz <-> Linux 2.4.21 P4 2.4Ghz

FTP get on 266MhzFTP send on 266MHz
OpenVPN Blowfish tunnel 23.1 sec (1.4e+03 Kbytes/sec)
25.7 sec (1.3e+03 Kbytes/sec)
16.9 sec (1.9e+03 Kbytes/sec)
15.8 sec (2e+03 Kbytes/sec)
OpenVPN plaintext tunnel 9.75 sec (3.3e+03 Kbytes/sec)
9.65 sec (3.4e+03 Kbytes/sec)
8.21 secs (3.9e+03 Kbytes/sec)
9.65 secs (3.4e+03 Kbytes/sec)
Direct FTP without OpenVPN 4.73 sec (6.8e+03 Kbytes/sec)
4.75 sec (6.8e+03 Kbytes/sec)
4 secs (8.1e+03 Kbytes/sec)
3.93 secs (8.2e+03 Kbytes/sec)

TEST #2

Transfer of 33,128,460 bytes -- Linux 2.4.21 P2 266Mhz <-> Win XP SP1 P4 2.2 Ghz

FTP get on WinXPFTP send on WinXP
OpenVPN Blowfish tunnel 19.14 sec (1731.03 Kbytes/sec)
19.11 sec (1733.84 Kbytes/sec)
23.46 sec.(1411.94 Kbytes/sec)
23.44 sec (1413.09 Kbytes/sec)
OpenVPN plaintext tunnel 11.31 sec (2930.17 Kbytes/sec)
11.89 sec (2786.95 Kbytes/sec)
11.72 sec (2827.38 Kbytes/sec)
10.71 sec (3094.67 Kbytes/sec)
Direct FTP without OpenVPN 5.55 sec (5971.24 Kbytes/sec)
5.39 sec (6148.56 Kbytes/sec)
4.90 sec (6765.05 Kbytes/sec)
4.91 sec (6751.27 Kbytes/sec)


Copyright © OpenVPN Technologies, Inc. ( info@openvpn.netThis e-mail address is being protected from spambots. You need JavaScript enabled to view it ), 2003-2010