Jump to content
Not connected, Your IP: 3.215.182.81

All Activity

This stream auto-updates     

  1. Past hour
  2. Today
  3. Well, you never stop learning, eh? But really, Cloudflare says directly what the problem is: The owner of this website, i.e., not CloudFlare, has banned the entire AS number from access. CloudFlare is just a CDN and DDoS protection, therefore something like a proxy.
  4. Your quote is empty. Purge it with dpkg. dpkg -P eddie-ui && apt-get -f install Let us know of the result.
  5. Statement is logically correct. Though on the OpenVPN client's side the connections will come from the address of the TAP interface, i.e., 10.x.x.x. Something to check if setting up services you host to bind to specific addresses. Forward a random port to local port 80 or 443 (depending on whether you need HTTP or HTTPS), it's one of the fields when you forward a new port on the port forwarding page. Forward a port and it's reserved for your account. Easy. Reverse? What you can do is forward a random remote port (on the AirVPN server) to some local port (on your machine). If you forwarded port 9000 to local port 80, people connecting to 1.1.1.1 port 9000 for example will reach whatever is listening on port 80 on your machine, like a web server.
  6. I'm trying to do a reverse connection so, so i need a port forwarding...... MY QUESTIONS ARE 1. if i open a port 0000 and my exit ip is 1.1.1.1... and i set them to receive the reverse connection.... my connection will be listening through 1.1.1.1 and port 0000??? if not please correct that statement for me. 2. If i'm local website... i mean a website that can only be accessible on my LAN.... how can i use port forwarding to make any device outside my network access it.... 3. How will i reserve a PORT 4. How will i reverse some port to the reserved port.... i.e a web application support port 000... and i want all incoming connection of port 000 to be reversed to 1111....so i will be able to listen to the connection of 000 through 1111.... PLEASE I WANT THE 4 QUESTION TO BE ANSWER LIKE YOU'RE EXPLAINING TO SOMEONE THAT HAS NO IDEA OF THESE.... THAT'S WHY I TOOK MY TIME TO EXPLAIN MY PROBLEM... I HOPE I'LL SEE ANYONE TO HELP ME WITH THE 4 QUESTIONS.....
  7. I noticed that I'm no longer able to connect to ReliableSite.net using any AirVPN IP. Cloudflare seems to be the source of the block. Here's the error message (see attached screenshot). I've encountered errors like this before but was able to circumvent by changing the AirVPN server. But now, all AirVPN servers from all countries are blocked. EDIT: After posting my message, I noticed that you have a really handy utility at https://airvpn.org/routes/ that shows which AirVPN IPs can connect to a given site. That was super helpful. It looks like all but two or three IPs are getting 403 (IP Address Banned), but I was able to use one of the functioning IPs to get on to ReliableSite and conduct business there.
  8. Yeah i have try removing it that way and using synaptic package manger but it still won't remove.
  9. i'm an idiot. as i "said" - tired today. sry. too many work. many thx for your hints & help. great service/support as always!
  10. Well, you see, you even gave birth to the issue yourself. NetworkManager tends to simply override resolv.conf. You can configure a second profile for AirVPN with the DNS servers written on the specs page. Name it something like "AirDNS". In both v4 and v6, set the method to "Automatic (addresses only)". This is the way I did it in the past. Others suggested to simply prevent NetworkManager from updating resolv.conf at all. In /etc/NetworkManager/NetworkManager.conf in the [main] section, set dns=none.
  11. + firewall (hummingbird active): hain INPUT (policy DROP) target prot opt source destination ACCEPT all -- anywhere anywhere ACCEPT all -- 255.255.255.255 anywhere ACCEPT all -- 192.168.0.0/16 192.168.0.0/16 ACCEPT all -- 10.0.0.0/8 10.0.0.0/8 ACCEPT all -- 172.16.0.0/12 172.16.0.0/12 ACCEPT icmp -- anywhere anywhere icmp echo-request ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED ACCEPT all -- anywhere anywhere DROP all -- anywhere anywhere Chain FORWARD (policy DROP) target prot opt source destination ACCEPT all -- anywhere anywhere DROP all -- anywhere anywhere Chain OUTPUT (policy DROP) target prot opt source destination ACCEPT all -- anywhere 10.25.213.1 ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere 255.255.255.255 ACCEPT all -- 192.168.0.0/16 192.168.0.0/16 ACCEPT all -- 10.0.0.0/8 10.0.0.0/8 ACCEPT all -- 172.16.0.0/12 172.16.0.0/12 ACCEPT all -- 192.168.0.0/16 base-address.mcast.net/24 ACCEPT all -- 10.0.0.0/8 base-address.mcast.net/24 ACCEPT all -- 172.16.0.0/12 base-address.mcast.net/24 ACCEPT all -- 192.168.0.0/16 239.255.255.250 ACCEPT all -- 10.0.0.0/8 239.255.255.250 ACCEPT all -- 172.16.0.0/12 239.255.255.250 ACCEPT all -- 192.168.0.0/16 239.255.255.253 ACCEPT all -- 10.0.0.0/8 239.255.255.253 ACCEPT all -- 172.16.0.0/12 239.255.255.253 ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere state ESTABLISHED ACCEPT all -- anywhere 58.225.206.185.in-addr.arpa DROP all -- anywhere anywhere
  12. thx, it's clear linux; a little different from the debian & co. filesystem (stateless). yes, i've adjusted my router & gnome network manager to cloudflare dns. but no dns-over-https or dns-over-tls. here is the log: curl ifconfig.co/city Oslo ~ ❯❯❯ resolvectl status Global LLMNR setting: no MulticastDNS setting: yes DNSOverTLS setting: no DNSSEC setting: no DNSSEC supported: no Current DNS Server: 10.25.213.1 DNS Servers: 10.25.213.1 Fallback DNS Servers: 1.1.1.1 8.8.8.8 1.0.0.1 8.8.4.4 2606:4700:4700::1111 2001:4860:4860::8888 2606:4700:4700::1001 2001:4860:4860::8844 DNSSEC NTA: 10.in-addr.arpa 16.172.in-addr.arpa 168.192.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa corp d.f.ip6.arpa home internal intranet lan local private test Link 5 (tun0) Current Scopes: none DefaultRoute setting: no LLMNR setting: yes MulticastDNS setting: no DNSOverTLS setting: no DNSSEC setting: no DNSSEC supported: no Link 3 (wlp3s0) Current Scopes: DNS DefaultRoute setting: yes LLMNR setting: yes MulticastDNS setting: no DNSOverTLS setting: no DNSSEC setting: no DNSSEC supported: no Current DNS Server: 1.1.1.1 DNS Servers: 1.1.1.1 1.0.0.1 DNS Domain: ~. Link 2 (enp2s0) Current Scopes: none DefaultRoute setting: no LLMNR setting: yes MulticastDNS setting: no DNSOverTLS setting: no DNSSEC setting: no DNSSEC supported: no
  13. systemd-resolved here may be the culprit. Under its umbrella resolv.conf is a symlink to /lib/systemd/resolv.conf (on Debian; can vary from distro to distro), and this file is generated automatically by systemd-resolved based on the settings provided in /etc/systemd/resolved.conf or by the resolvectl command. Can you please post the output of resolvectl status? I'm thinking you might be using DNS-over-HTTPS or DNS-over-TLS by default here or resolved is otherwise configured to use CloudFlare as upstream DNS servers.
  14. yep: { "country_code": "NO", "country_name": "Norway", "continent_code": "EU", "continent_name": "Europe", "city_name": "Oslo", "postal_code": null, "postal_confidence": null, "latitude": "59.9384655", "longitude": "10.8348384", "accuracy_radius": 1, "time_zone": "Europe\/Oslo", "metro_code": null, "level": "min", "country_confidence": 100, "city_confidence": 100, "region_confidence": 100, "cache": 1585738428, "ip": "185.206.225.59", "type": "AirVPN Server (Exit, Ophiuchus)", "reverse": "", "tor": "unknown", "query_text": "185.206.225.59", "query_type": "myip", "query_date": 1585738428 }⏎ { "country_code": "NO", "country_name": "Norway", "region_code": "03", "region_name": "Oslo County", "continent_code": "EU", "continent_name": "Europe", "city_name": "Oslo", "postal_code": null, "postal_confidence": null, "latitude": 59.905, "longitude": 10.7487, "accuracy_radius": 100, "time_zone": "Europe\/Oslo", "metro_code": null, "level": "min", "cache": 1585737310, "ip": "162.158.221.35", "reverse": "", "tor": "unknown", "query_text": "162.158.221.35", "query_type": "mydns", "query_date": 1585738972 }⏎ Wed Apr 1 12:50:50.191 2020 Starting thread Wed Apr 1 12:50:50.192 2020 OpenVPN core 3.6.3 AirVPN linux x86_64 64-bit Wed Apr 1 12:50:50.202 2020 Frame=512/2048/512 mssfix-ctrl=1250 Wed Apr 1 12:50:50.211 2020 UNUSED OPTIONS 3 [resolv-retry] [infinite] 4 [nobind] 5 [persist-key] 6 [persist-tun] 7 [auth-nocache] 8 [route-delay] [5] 9 [verb] [3] Wed Apr 1 12:50:50.211 2020 EVENT: RESOLVE Wed Apr 1 12:50:50.211 2020 WARNING: NetworkManager is running on this system and may interfere with DNS management and cause DNS leaks Wed Apr 1 12:50:50.211 2020 WARNING: systemd-resolved is running on this system and may interfere with DNS management and cause DNS leaks Wed Apr 1 12:50:50.211 2020 Network filter and lock is using iptables-legacy Wed Apr 1 12:50:50.214 2020 Successfully loaded kernel module iptable_filter Wed Apr 1 12:50:50.220 2020 Successfully loaded kernel module iptable_nat Wed Apr 1 12:50:50.222 2020 Successfully loaded kernel module iptable_mangle Wed Apr 1 12:50:50.224 2020 Successfully loaded kernel module iptable_security Wed Apr 1 12:50:50.226 2020 Successfully loaded kernel module iptable_raw Wed Apr 1 12:50:50.228 2020 Successfully loaded kernel module ip6table_filter Wed Apr 1 12:50:50.232 2020 Successfully loaded kernel module ip6table_nat Wed Apr 1 12:50:50.234 2020 Successfully loaded kernel module ip6table_mangle Wed Apr 1 12:50:50.235 2020 Successfully loaded kernel module ip6table_security Wed Apr 1 12:50:50.237 2020 Successfully loaded kernel module ip6table_raw Wed Apr 1 12:50:50.240 2020 Network filter successfully initialized Wed Apr 1 12:50:50.240 2020 Local IPv4 address 10.0.0.2 Wed Apr 1 12:50:50.240 2020 Local IPv6 address fe80::2f4:8dff:fea8:ff6d Wed Apr 1 12:50:50.240 2020 Local interface enp2s0 Wed Apr 1 12:50:50.240 2020 Local interface wlp3s0 Wed Apr 1 12:50:50.240 2020 Setting up network filter and lock Wed Apr 1 12:50:50.240 2020 Allowing system DNS 10.16.245.1 to pass through the network filter Wed Apr 1 12:50:50.592 2020 Resolved server no.vpn.airdns.org into IPv4 185.206.225.58 Wed Apr 1 12:50:50.592 2020 Adding IPv4 server 185.206.225.58 to network filter Wed Apr 1 12:50:50.655 2020 Network filter and lock successfully activated Wed Apr 1 12:50:50.657 2020 Contacting 185.206.225.58:443 via TCPv4 Wed Apr 1 12:50:50.657 2020 EVENT: WAIT Wed Apr 1 12:50:50.657 2020 net_route_best_gw query IPv4: 185.206.225.58/32 Wed Apr 1 12:50:50.657 2020 sitnl_route_best_gw result: via 10.0.0.1 dev wlp3s0 Wed Apr 1 12:50:50.657 2020 net_route_add: 185.206.225.58/32 via 10.0.0.1 dev wlp3s0 table 0 metric 0 Wed Apr 1 12:50:50.658 2020 Wed Apr 1 12:50:50.721 2020 Connecting to [no.vpn.airdns.org]:443 (185.206.225.58) via TCPv4 Wed Apr 1 12:50:50.783 2020 EVENT: CONNECTING Wed Apr 1 12:50:50.784 2020 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client Wed Apr 1 12:50:50.784 2020 Peer Info: IV_VER=3.6.3 AirVPN IV_PLAT=linux IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 IV_GUI_VER=Hummingbird - AirVPN OpenVPN 3 Client 1.0.2 Wed Apr 1 12:50:51.005 2020 VERIFY OK : depth=1 cert. version : 3 serial number : 8C:D8:43:EF:E4:5F:20:03 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org issued on : 2014-04-11 10:15:45 expires on : 2024-04-08 10:15:45 signed using : RSA with SHA1 RSA key size : 4096 bits basic constraints : CA=true Wed Apr 1 12:50:51.005 2020 VERIFY OK : depth=0 cert. version : 3 serial number : 40 issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ophiuchus, emailAddress=info@airvpn.org issued on : 2016-12-02 16:49:50 expires on : 2026-11-30 16:49:50 signed using : RSA with SHA-512 RSA key size : 4096 bits basic constraints : CA=false cert. type : SSL Server key usage : Digital Signature, Key Encipherment ext key usage : TLS Web Server Authentication Wed Apr 1 12:50:51.466 2020 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 Wed Apr 1 12:50:51.467 2020 Session is ACTIVE Wed Apr 1 12:50:51.467 2020 EVENT: GET_CONFIG Wed Apr 1 12:50:51.467 2020 Sending PUSH_REQUEST to server... Wed Apr 1 12:50:51.779 2020 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.25.213.1] 3 [route-gateway] [10.25.213.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.25.213.25] [255.255.255.0] 8 [peer-id] [0] 9 [cipher] [AES-256-GCM] Wed Apr 1 12:50:51.780 2020 PROTOCOL OPTIONS: cipher: AES-256-GCM digest: NONE ncp enabled: yes compress: LZO_STUB peer ID: 0 Wed Apr 1 12:50:51.780 2020 EVENT: ASSIGN_IP Wed Apr 1 12:50:51.780 2020 VPN Server has pushed IPv4 DNS server 10.25.213.1 Wed Apr 1 12:50:51.787 2020 Setting pushed IPv4 DNS server 10.25.213.1 in resolv.conf Wed Apr 1 12:50:51.791 2020 net_iface_mtu_set: mtu 1500 for tun0 Wed Apr 1 12:50:51.791 2020 net_iface_up: set tun0 up Wed Apr 1 12:50:51.791 2020 net_addr_add: 10.25.213.25/24 brd 10.25.213.255 dev tun0 Wed Apr 1 12:50:51.792 2020 net_route_add: 0.0.0.0/1 via 10.25.213.1 dev tun0 table 0 metric 0 Wed Apr 1 12:50:51.792 2020 net_route_add: 128.0.0.0/1 via 10.25.213.1 dev tun0 table 0 metric 0 Wed Apr 1 12:50:51.792 2020 Connected via tun Wed Apr 1 12:50:51.792 2020 LZO-ASYM init swap=0 asym=1 Wed Apr 1 12:50:51.792 2020 Comp-stub init swap=0 Wed Apr 1 12:50:51.792 2020 EVENT: CONNECTED no.vpn.airdns.org:443 (185.206.225.58) via /TCPv4 on tun/10.25.213.25/ gw=[10.25.213.1/] Wed Apr 1 12:50:51.792 2020 Server has pushed its own DNS. Removing system DNS from network filter. Wed Apr 1 12:50:51.796 2020 System DNS 10.16.245.1 is now rejected by the network filter
  15. I am using internet in my home and I sure that he really knows my internet browsing and all my activities. How could I make me as a anonymous on internet. There are some ways to hide my identity like use a proxy and vpn but do I really need a vpn or proxy? May any other option that fix my issue? Please help me to suggest. Thanks in advance.
  16. Did you try running the command it gives you? apt-get -f install
  17. Hm. Can you please post the complete Hummingbird log here? And maybe the results of the following two commands: curl -sL https://ipleak.net/json curl -sL $(sha512sum ~/.bash_history | cut -b -40).ipleak.net/json
  18. sry i'm tired today. yes, exactly. it's not the cloudflare isp of my country, but the cloudflare isp of the country i connect too (instead of the airvpn isp). if i import an ovpn file & connect per network-manager on gnome, i do not have this issue. it's only happening with hummingbird.
  19. Not quite sure I get your problem. You connect to a server in Belgium or any other server whatsoever and you see your ISP being CloudFlare instead of whatever the datacenter is the AirVPN server is hosted in?
  20. thx 4 hummingbird on linux. problem: if i connect (for example) to belgium & test the connection per ipleak .. ect .. my isp is cloudflare (belgium = not my country - that's ok - but it should be airvpn?). same with netherlands, germany .. and so on. i'm on gnome, clear l. .. Server has pushed its own DNS. Removing system DNS from network filter. System DNS 1.1.1.1 is now rejected by the network filter System DNS 1.0.0.1 is now rejected by the network filter .. seems .. ok.
  21. You do realize that you are not bound to using Eddie with AirVPN?
  22. Thanks Clodo. LOL, I told myself that it couldn't be a bug ... I thought I messed up. I love Eddie so I'm fine with waiting. I prefer VPN clients be right instead of rushed.
  23. Yesterday
  24. Are you aware that you are using beta version? We all have problems and are testing experimental version. Patience is a key here, together with providing as much bug details as possible. It doesn't matter the version. They ALL do the same thing. I think I'll switch to another vpn. This is too frustrating for me going through the same damn thing over and over and over again.
  25. The Debian package of fahclient seems to rely on package versions which are in stretch only. If installed on testing/bullseye, dpkg errors out while configuring it. And since there is no portable, it's therefore unusable on newer Debians. 😕
  26. Hi everyone. If anybody's feeling hopeless about the Coronavirus outbreak still going on, you can shelve it. Because I found out about Folding@home, which is a research project that is currently pouring focus into Covid-19 as I speak. Check out their website http://foldingathome.org We can basically help out by downloading and installing their free client software. It allows you to share your computer's processor power to carry out protein simulations used to better understand how the virus works. Hopefully, as more and more of us use it to contribute to the research, we'll find a cure much sooner and save more lives that way. So what do you all think?
  27. Hello! Yes, as @go558a83nk explained, but in any case your CPU load is anomalous (too high) in both cases, could you please tell us your exact system architecture, OS name and version? Can you also make sure that during those tests which cause 100% CPU load no other computing intensive applications are running? Also, how do you determine exactly that the whole CPU is 100% loaded? Please describe with details to prevent any bias from wrong interpretations, just in case. Kind regards
  1. Load more activity
×
×
  • Create New...