Jump to content
Not connected, Your IP: 216.73.216.222

All Activity

This stream auto-updates     

  1. Past hour
  2. Today
  3. As far as I am concerned, the internet doesn't know nationalities. Also, my location might be Germany, but I'm not exactly German. But thank you for pigeonholing, anyway. Learned another thing today, thank you
  4. Do any readers know whether it is would be normal for VPN providers to liaise with the biggest blocklists? (I would imagine it would be a lot of manual work, so I could understand why Air would not want to take it on). Hello! We confirm that we actively keep "our" IP addresses out of major blacklists, including the sector leader Spamhaus. Most address providers mandate that this is done as they want to keep their addresses "clean". Unfortunately there are thousands of black lists so it is not possible to know and intervene on all of them. About the IP address you mention, you can see here that it's "clean" on almost 100% of the minor black lists and on 100% of the major ones. https://check.spamhaus.org/results/?query=213.152.187.235 https://whatismyipaddress.com/blacklist-check https://dnschecker.org/ip-blacklist-checker.php?query=213.152.187.235 https://mxtoolbox.com/SuperTool.aspx?action=blacklist%3a213.152.187.235&run=toolpage Also, please be aware that some minor lists that you see above include an IP address simply because it is shared, regardless of anything else. Kind regards
  5. Hello! Error 111 means that the initial SYN packet was forwarded but it was actively rejected by your system or firewall that replies with a TCP RST (reset) packet. Possible causes: either your receiving host port does not exist and your system is configured to send back a TCP RST when a packet to a non-existing port is received (instead of silently dropping the packet), or a firewall is configured to reject (and not to drop silently) packets. Please follow this checklist: https://airvpn.org/forums/topic/66388-port-forwarding/?do=findComment&comment=243305 Kind regards
  6. Thank you very much for your reply! I will see if any of this solves the issue. I can already confirm that it doesn't start with my system, so if I want to use the VPN I have to start the application and click on connect. So that leaves us with option 3 and 4, which I'll check!
  7. Yesterday
  8. Partly because I poke fun at human behaviours rather frequently, I find myself tempted to make some harmless observations on our national stereotypes, Alex. In posting here you perhaps satisfy your Germanic requirement for deep detail, and meanwhile when I post, I get to express my English expectation of good manners. One of us may have to leave this conversation a touch disappointed, but his standards are quite exacting. 😝 For readers who are interested in this topic, I will answer the question myself, at least partially. I just found this site, and while I'll not know which scoring device is used for the sites I am having trouble with, it gives an idea of how it might work (and the kinds of report that give rise to it). https://www.abuseipdb.com/check/213.152.187.235 It turns out that yes, IP block owners can engage with abuse reports. From the above page: Do any readers know whether it is would be normal for VPN providers to liaise with the biggest blocklists? (I would imagine it would be a lot of manual work, so I could understand why Air would not want to take it on).
  9. my opened ports aren’t working and have a connection refused error does anyone have ideas?
  10. Hello people, I've been using Eddie - AirVPN for months now, on Windows 11 that is. Since about a week or so I've been running into a very annoying issue. Without exception, I had to reinstall the client every day of the week. I would install the VPN, connect to my preferred server and when done using it, I would disconnect and then exit the application. After shutting down or rebooting the PC, the next time it's turned on the VPN doesn't work anymore. I get a handshake timeout and it tries (and fails) again, each and every time. The only working solution I have is to fully reinstall the VPN with software like BcUninstaller or Revo Uninstaller (which delete user folders of applications as well) to get it working again after a reinstall. I have no issues with any other network adapters on the device or on other devices, i've checked my DNS settings as well which are fine too. Having to reinstall the VPN each and every time I turn on my PC gets boring quite quick. I would like to know if there's anything I could try to fix this, I tried manually setting protocols and disabling network lock, neither of which seemed to bring me any luck. If necessary I can send my logs, but for now it's next to empty as I have just reinstalled the application. So I can provide that in a while. Thank you in advance!
  11. We can of course think in black and white, like there are absolutely zero black sheep among VPN users. Ain't that a nice lullaby to fall asleep to? If anything, the services offered on the internet react to the crap coming from VPN users, because, yes, those people use it as a tool for, well, at least pseudonymity. Now, the question is, why would they do that instead of going via their normal internet connection? Privacy? Yeah, maybe. Geoblock circumvention so they can watch home TV when they're abroad? Sure. But the overwhelming majority obviously wants to do something they themselves don't want to be held liable for. I was a good example for this. Most times its torrenting of copyrighted material, that is, not paying for something other people create, but that won't trigger those automated defense systems. Some also abuse the servers for hacking-related things. Especially the latter people, even if they are a minority, are network-wise excessively loud. This shows in the automated defense systems being triggered for everyone, and that is why you post here with a bit of a rant, because it bothers your experience, obviously. Don't point your finger at the defense systems – point them at all those people who think once they paid for a product they share with others they can do what they want and so sully its reputation. It's so egoistical it's almost human. And it happened before. Okay, so someone contacts the admin team, works with them to remove some server from their blacklist. Job done, right? Problem is, three days later it's on a blacklist again. Do you know why? Because those people from before smell this, and use the unblocked server for their scripting relentlessly. The less walls to overcome there is, the easier the job, the more fun it is. They come back, even recommend the service as one that actively tries to tear down those walls, and they all think it's for the sake of their attacks. The service gets even more abused. Do not contact admins to ask for unblocks, it backfires in the most wondrous ways down the line. And yes, it's very likely a WAF. It's not that the internet is getting more dangerous for users, as the sentiment tends to be around these forums – the users get more dangerous for the hosters, and the hosters react. You really think those walls would be erected without reason? Necessity begets creation. They're not doing this to be a nuisance for VPN users. Service providers like Cloudflare sit in a comfortable position where they can analyze the traffic behavior from many parts of the internet and spot similarities. So I tend to agree with this statement.
  12. Yeah, this is a pain; I've seen this screen on other sites. It's a choice made by the technical team at your bank, and mostly the only way to handle it is to ask them to change their blocklist. I can understand why banks would be more worried about VPNs compared to owners of other kinds of web property. If you need a workaround, then consider disconnecting from your VPN temporarily to use this site, or have a cheap second device that doesn't have a VPN on it. It's not an ideal solution, but it's a start.
  13. Is this on the mobile app, or the web app? The web app has been solid for me for some years, and I always use it with a VPN.
  14. Your grumpy response is amusing, but perhaps not quite the spirit of helpfulness I am seeking. But I shall persist, Alex; you and I probably share a vision of an internet that is nudged into being VPN-friendly. We don't also need to be warring with each other on top of that. When I asked whether AirVPN could do something about it, what I actually meant was that AirVPN should do something about it. Specifically, if there are shared blocklists†, as I suspect, they could work with abuse teams to remove the blacklisting. I used to do some spam-fighting many years ago, with honeypots and the like, and that's exactly the kind of arms race that we had there. Reporters would report spam using the SMTP headers, it would influence various interconnected blocklists in subtle ways, and good service providers would be thus encouraged to terminate abusive accounts. I just contacted the admins of a large site, and I've mentioned their infra is emitting a high number of 429 responses, starting in the last few months, even though I've used them for many years. I've given them an example IP; I'm hopeful they'll come back to me with a concrete reason for their site's behaviour. Interestingly it makes no odds whether I am signed in, so I wonder if there could be some kind of WAF in the way. † Or they could be sharing the same large edge provider e.g. Cloudflare.
  15. Last week
  16. Then the results of Hybrid Analysis make even less sense. Debian does not contact snapcraft.io in any way, unless you use Snap. I think they put all results for the same filename in one result page and called it a day, not separating the distributions at all. This is poorly worked out; please do not use that website.
  17. Some law in some country is not universally valid in all countries.
  18. I had to uncheck "Block private networks and loopback addresses" in the WireGuard interface settings on OPNsense, otherwise the tunnel wouldn’t come up or pass traffic.
  19. I had a similar issue and switching to a different server location fixed it straight away. Seems some IPs might be blocked. Try a few to see what works.
  20. Not quite correct see patriot act. regards
  21. @marcosrojo Hit "like" on helpful posts and open a new post for your new problem. In this way the conversation on your new problem will: Reach an audience of new people able to help on the new problem (I don't have a lot of MTU experience, sorry); Not be buried in a post about the old and solved problem; Be more searchable for others looking for help in the future. Glad you are up and running!
  22. I am on Debian 12. Thank you. I assumed it was a false positive because I trust AirVPN greatly. I believe I installed the Eddie client via apt: http://eddie.website/repository/apt stable InRelease I am not using a portable version. Best regards and thank you for your response.
  23. Eddie is built on Mono, so Mono libraries are necessary. Now the question is whether you looked at Eddie Portable or the installed one, because only the portable one ships those .so files itself. The installed one uses the system ones provided by differently named packages. That "suspicious" libmonoposixhelper.so is in mono-runtime-common in Ubuntu, for example. For the links you posted, snapcraft.io is the homepage for Canonical's container format, Snap, and Cairo is a rendering API. That excessively long domain exceeds the maximum domain name length, some of the domains are nonexistent, and data.rel.ro is not a domain but probably references Relocation Read-Only, or relro for short, a security thing used in linkers like GNU ld, falsely labeled a domain, as there is a section in the binary file created by it called .data.rel.ro. In my eyes, if you downloaded Ubuntu from ubuntu.com, you get your package updates from archive.ubuntu.com and you downloaded Eddie from eddie.website, there is zero chance you're dealing with some intrusion or other. More likely, that Hybrid Analysis toolkit is massively spooking you…
  24. I'm going to publish some domains that the aforementioned files link to, apparently related to Eddie (I don't know, I need more information). canonical-bos01.cdn.snapcraftcontent.com dashboard.snapcraft.io snapcraft.io api.snapcraft.io birthpopuptypesapplyimagebeinguppernoteseveryshowsmeansextramatchtrackknownearlybegansuperpapernorthlearngivennamedendedtermspartsgroupbrandusingwomanfalsereadyaudiotakeswhile.com thing.org/multiheardpowerstandtokensolid genretrucklooksvalueframe.net http://bugs.freedesktop.org/enter_bug.cgi?product=cairo http://cairographics.org x.org http://www.winimage.com/zlibdll www.winimage.com data.rel.ro
  25. Hello, friends. I am investigating an intrusion. Some anti-rootkit solutions for Linux mention that these files from hybrid-analysis are suspicious. However, when I analyze them in VirusTotal, the name “Eddie” appears. Does this mean that it is related to the Eddie client, or should I investigate further? Thank you very much for responding to my security concerns! 1. https://hybrid-analysis.com/sample/2d877bed6f13810bc024cb5d53651d2c792f2047e1e2ccb6cea58b67460d418e 2. https://hybrid-analysis.com/sample/80a0e1625ed38e108e70708d119b58c8a3e94c448557922faaa6476830fd3739 3. https://hybrid-analysis.com/sample/9f33b6fa29396ef1e46082238076e61ef0064892dd84f008608abd09fa48b20a --
  26. I may have solved my own problem. I hadn't noticed that Tailscale was also active and defaulting to use its own DNS. Disabling that DNS immediately restored AirVPN's DNS servers when checked against IPLeak.
  27. I recently bought a new Mac and rather than restoring from a backup as I normally do, I thought I'd set everything up fresh and have a clean to start to everything. I was surprised to see that after installing the official Wireguard client and creating a config through the AVPN config generator that IPLeak reported by machine using my ISP's DNS. Wireguard was using the VPN servers IP addresses correctly. Similar happens at home, where IPLeak shows my DNS as being managed by Cloudflare, which is what I have my router set to use as a default rather than my ISP's DNS. I know this isn't a problem if I use Eddie, but I love the basic simplicity of the Wireguard app and would prefer to install as few applications as possible now I'm on a clean setup. If anyone can offer a suggestion to force my Mac to always use AirVPN's internal DNS that'd be really appreciated. Thanks. EDIT: I checked Wireguard's tunnel manager when the VPN was active and it shows the DNS being used is '10.128.0.1', which I believe is correct, but that's not what IPLeak sees. Presumably my Mac is ignoring that and defaulting to the default DNS.
  28. Hi there! I tried connecting to https://fitgirl-repacks.site/, however, was unable to. To verify this was not an issue with my connection, I checked the Routing page... https://airvpn.org/routes/?q=https%3A%2F%2Ffitgirl-repacks.site%2F ...And as you can see a lot of issues with the servers. This is my first time posting, apologies if this is not the right formatting.
  1. Load more activity
×
×
  • Create New...