jasonked 0 Posted ... I'm running the Vidalia relay bundle (set to client only) which connects fine. I'm then connecting to AirVPN using the OpenVPN client using the generated config file which also reports everything ok. When I go to https://check.torproject.org/ it says I'm not using Tor. This is because my 'exit node' is AirVPN server which breaks the tor chain making the Tor website think I'm not using it, right? Quote Share this post Link to post
Staff 10014 Posted ... I'm running the Vidalia relay bundle (set to client only) which connects fine. I'm then connecting to AirVPN using the OpenVPN client using the generated config file which also reports everything ok. When I go to https://check.torproject.org/ it says I'm not using Tor. This is because my 'exit node' is AirVPN server which breaks the tor chain making the Tor website think I'm not using it, right? Hello! Yes. It's not that it "breaks" the chain, it's that the final exit-node is a VPN server, which is not a TOR exit node. On the Internet your system is visible with the VPN server exit-IP, since OpenVPN connects to the TOR proxy. Your outgoing data, after having passed through the TOR nodes (still encrypted by OpenVPN), reach the VPN server. Kind regards Kind Quote Share this post Link to post
jasonked 0 Posted ... Thanks this is how I understood it. I did hesitate to use the term "breaks the chain" as it sounds like I'm talking about data not arriving at it's destination but I meant it in terms of all the links in the chain belonging to Tor or not in this case. Is there an easy way to check that I am actually going through Tor before I connect to the VPN server or do I just have to trust that no errors and internet access means it's working? It's made more a bit more awkward by the fact that I'm relying on OpenVPN to force my data through Tor so I've not had the reassurance of Tor connection test without the VPN. Quote Share this post Link to post
Staff 10014 Posted ... Thanks this is how I understood it. I did hesitate to use the term "breaks the chain" as it sounds like I'm talking about data not arriving at it's destination but I meant it in terms of all the links in the chain belonging to Tor or not in this case. Is there an easy way to check that I am actually going through Tor before I connect to the VPN server or do I just have to trust that no errors and internet access means it's working? Hello! Yes. Make sure that OpenVPN has connected to the TOR proxy, browse to airvpn.org web site (with a browser configured NOT to connect to TOR) and make sure that the central bottom box is green. If you can browse AND the central bottom box is green, then data are passing through a TOR fixed circuit, because OpenVPN sends all the packets over the proxy. If OpenVPN and/or TOR proxy lose connection, then you get either no browsing at all or a red bottom box. Kind regards Quote Share this post Link to post
Visentinel 13 Posted ... hi guys, i thought it was better to use tor over the vpn not the vpn over tor becuase tor does not support udp. in any case if speed is not what your after but extreme security you could use double black magic. connect to a first vpn, connect to tor over the first vpn then connect to a 2nd vpn over the tor network.vpn over tor over vpn as for how to actually configure that... dont look at me lol Quote Share this post Link to post