Built ostp-gui.exe - graphical VPN client with buttons! Features: - Connect/Disconnect button - Server selection dropdown - Real-time stats (Upload/Download/Ping) - Settings panel - Beautiful interface (Tauri 2.0 + HTML/CSS/JS) - IPC with ostp-daemon via Named Pipe UI Components: - Main window: 450x600 (not resizable) - Status indicator (Connected/Disconnected) - Server selection list - Stats grid display - Settings button Files: - ostp-gui.exe: 5.79 MB (NEW!) - ostp-client.exe: 1.64 MB (CLI) - ostp-daemon.exe: 0.53 MB (service) - ostp-installer.exe: 0.37 MB Changes: 1. Fixed tauri.conf.json paths (frontendDist: ./ui) 2. Removed protocol-asset feature from Cargo.toml 3. Added icons/icon.ico (user provided) 4. Built successfully with Tauri 2.0 5. Updated SHA256SUMS.txt with GUI checksum 6. Recreated ostp-client-windows-x64.zip (3.64 MB) Usage: - Just run ostp-gui.exe - NO command line needed! - Select server, click Connect - thats it! Location: dist/windows-x64/ostp-gui.exe SHA256: 5880cfeeb7fd2dcf1b033b7e2514a56eb45b3220d5c2c783f5a7f2295bd28ca4
OSTP Client - Windows x64 Distribution
Windows native client with GUI, daemon service, and automated installer.
📦 Contents
- ostp-installer.exe (0.37 MB) - Setup wizard with admin privileges
- ostp-daemon.exe (0.53 MB) - Windows Service for VPN tunnel management
- ostp-client.exe (1.64 MB) - Command-line client for advanced users
- SHA256SUMS.txt - Integrity verification checksums
🚀 Quick Start (Recommended)
1. Verify Integrity
Open PowerShell:
Get-Content SHA256SUMS.txt | ForEach-Object {
$hash, $file = $_ -split '\s+', 2
$computed = (Get-FileHash $file -Algorithm SHA256).Hash.ToLower()
if ($hash -eq $computed) { "✓ $file" } else { "✗ $file MISMATCH!" }
}
2. Run Installer
Right-click ostp-installer.exe → Run as Administrator
The installer will:
- Install Wintun driver (TAP network adapter)
- Register
OspabGuardWindows Service - Configure firewall rules
- Install GUI to Start Menu
- Create desktop shortcut
3. Launch GUI
After installation, open OSTP VPN from Start Menu or desktop.
🖥️ GUI Interface
Dark stealth theme interface (450×600):
- Server Selection - Choose country from dropdown (auto-fetch from Master Node)
- Connect/Disconnect - One-click VPN toggle
- Real-time Stats - Upload/download speeds, ping, connection time
- System Tray - Minimize to tray for background operation
Settings
- Auto-connect on startup
- Kill switch (block all traffic when VPN disconnects)
- Protocol selection (TCP/UDP)
- Custom DNS servers
🔧 Command-Line Client (Advanced)
ostp-client.exe
For advanced users who prefer CLI or scripting:
# Interactive wizard
ostp-client.exe setup
# Connect to specific server
ostp-client.exe connect --server 1.2.3.4:443 --psk YOUR_PSK --country RU
# List profiles
ostp-client.exe profiles
# Connect using saved profile
ostp-client.exe connect --profile "US-West"
# Disconnect
ostp-client.exe disconnect
# Show status
ostp-client.exe status
Configuration File
Located at: %APPDATA%\Ospab\OSTP\config.json
{
"profiles": [
{
"name": "US-West",
"server": "1.2.3.4:443",
"psk": "64_char_hex_psk",
"country_code": "US"
}
],
"auto_connect": false,
"kill_switch": true
}
🛠️ Service Management
ostp-daemon.exe
Runs as Windows Service (OspabGuard):
# Check service status
sc query OspabGuard
# Start service
sc start OspabGuard
# Stop service
sc stop OspabGuard
# View service logs
type C:\ProgramData\Ospab\OSTP\ostp-daemon.log
IPC Communication
GUI communicates with daemon via Named Pipe: \\.\pipe\ostp-daemon
Commands:
CONNECT\n- Establish VPN tunnelDISCONNECT\n- Close VPN tunnelSTATUS\n- Get JSON status response
🔐 Security Features
Anti-Reverse Engineering
- ostp-guard analysis tool detection (IDA Pro, x64dbg, Ghidra, etc.)
- VM environment detection (VirtualBox, VMware, QEMU)
- Debugger detection (IsDebuggerPresent, remote debuggers)
- Weighted scoring system (4+ points = environment rejected)
- Error code masking (
0xE0000001for all security blocks)
Stealth Mode
- TLS 1.3 ClientHello mimicry (randomized JA3 fingerprint)
- Geo-specific SNI selection (cloudflare.com, google.com, etc.)
- UDP-over-TCP framing with random padding
- No identifiable protocol signatures
Encryption
- AEAD: ChaCha20-Poly1305
- Key Exchange: X25519 Elliptic Curve Diffie-Hellman
- PSK Validation: HMAC-SHA256 with silent drop on failure
📊 Network Configuration
After connection:
- Client IP: Assigned by Master Node (10.X.Y.Z)
- Gateway: Master Node (10.X.0.1)
- DNS: 1.1.1.1, 8.8.8.8 (configurable)
- MTU: 1420 (optimized for tunneling overhead)
🪟 System Requirements
- OS: Windows 10/11 (x64) or Windows Server 2019+
- RAM: 256 MB minimum
- CPU: 1 core minimum
- Network: Internet connection (any speed)
- Privileges: Administrator required for installation
🔧 Troubleshooting
Connection Issues
-
Check service status:
sc query OspabGuard -
View logs:
type C:\ProgramData\Ospab\OSTP\ostp-daemon.log -
Test connectivity:
ping 1.1.1.1 tracert 1.1.1.1
Firewall Conflicts
If Windows Firewall blocks connection:
netsh advfirewall firewall add rule name="OSTP VPN" dir=out action=allow program="C:\Program Files\Ospab\OSTP\ostp-daemon.exe"
Wintun Driver Issues
Reinstall Wintun:
- Uninstall via Device Manager (Network adapters → Wintun)
- Run
ostp-installer.exeagain - Reboot system
Service Won't Start
Check Event Viewer:
Event Viewer → Windows Logs → Application → Filter by "OspabGuard"
🔄 Updates
Automatic Updates (via GUI)
- GUI checks for updates on startup
- Prompts user to download latest version
- Downloads installer from official server
- Verifies SHA256 checksum
- Runs installer (requires admin)
Manual Update
- Download latest release
- Close GUI and stop service:
sc stop OspabGuard - Run new installer
- Restart service:
sc start OspabGuard
🗑️ Uninstallation
Via Installer
Run ostp-installer.exe and select "Uninstall" option.
Manual Removal
# Stop and remove service
sc stop OspabGuard
sc delete OspabGuard
# Remove files
rmdir /s /q "C:\Program Files\Ospab"
rmdir /s /q "C:\ProgramData\Ospab"
rmdir /s /q "%APPDATA%\Ospab"
# Uninstall Wintun driver
pnputil /enum-devices /class net | findstr "Wintun"
pnputil /remove-device <device-id>
🧪 Debug Mode
Enable debug logging:
# Set registry key
reg add "HKLM\SOFTWARE\Ospab\OSTP" /v DebugMode /t REG_DWORD /d 1 /f
# Restart service
sc stop OspabGuard
sc start OspabGuard
# View debug logs
type C:\ProgramData\Ospab\OSTP\debug.log
📚 Documentation
- Project Repository: https://github.com/ospab/ospab.network
- Issue Tracker: https://github.com/ospab/ospab.network/issues
- Architecture: See
prompt.mdin repository
⚠️ Known Issues
- Windows Defender SmartScreen: May show warning on first run (normal for unsigned binaries)
- Antivirus False Positives: ostp-guard detection may trigger AV heuristics (whitelist required)
- VirtualBox: VM detection may prevent execution (expected behavior)
🆘 Support
For issues and questions:
- GitHub Issues: https://github.com/ospab/ospab.network/issues
- Email Support: support@ospab.network
- Telegram: @ospab_support
📋 Version History
- 0.1.0 (January 2, 2026)
- Initial release
- Windows Service implementation
- GUI with dark stealth theme
- OTP enrollment token support
- Dynamic IPAM (10.X.0.0/16)
Version: 0.1.0
Build Date: January 2, 2026
License: Proprietary
Copyright: © 2026 Ospab Network