Great that you have included 1.1.0h in the latest beta update :)
Wasn't sure if I should post this here or create a new topic, but as it was directly related to the 1.1.0 branch, I thought I might carry it on here (let me know if you'd rather I create a new topic): unfortunately, having installed the latest beta update, and eagerly updating my settings in the gui so that the connection would use openvpn 2.4.5 with openssl 1.1.0h, when attempting to connect to my openvpn server, which is now compiled with 1.1.0h, the connection fails. Tunnelblick reports that TLS negotiation did not succeed within 60 seconds.
However, what is strange is that I can still use the openssl 1.0.2 branch. When selecting openvpn 2.4.5 with openssl 1.0.2o. the connection succeeds. Looking at the openvpn server log, I can see that, when trying to connnect using 1.1.0h on tunnelblick, I was getting the following errors:
TLS error: The server has no TLS ciphersuites in common with the client. Your --tls-cipher setting might be too restrictive.
Thu Mar 29 22:45:53 2018 OpenSSL: error:1417A0C1:SSL routines:tls_post_process_client_hello:no shared cipher
Thu Mar 29 22:45:53 2018 TLS_ERROR: BIO read tls_read_plaintext error
Thu Mar 29 22:45:53 TLS Error: TLS object -> incoming plaintext read error
Thu Mar 29 22:45:53 TLS Error: TLS handshake failed
This error seems to be client side, as , like I say, it doesn't occur when using 1.0.2o. I don't have any tls-cipher options in either the server or client config files, so it's certainly a strange one. Any idea what could be causing this?