Jump to content
Not connected, Your IP: 3.22.242.169

Recommended Posts

Here I am with a technical problem with the setup "AIR VPN over TOR". This is working absolutely fine, I have installed TOR, opened TOR browser, then connected to AIR VPN client - right now my Entry IP is from TOR, and Exit IP is from AIR VPN server - this is exactly what I wanted and achieved, so no problem here.

However, when the VPN connection gone down suddenly and it was trying to reconnect, my firefox browser showing IP from my local ISP, it means I am exposed already! I tried "Network lock", but it's not working with "VPN over TOR" setup. I then checked the guide page here https://airvpn.org/tor/ and found this "Warning: not compatible with Network Lock at the moment."

Therefore, this setup currently is not full proof and giving a false sense of security. VPN disconnection is very common, and in that case, it will expose my true-identity any time without any notice. This only thing making all this setup absolutely vulnerable, yet you recommended this. In the guide you said, by this setup, my true IP won't be revealed even to you, but you forgot that if VPN gets disconnected, my true ip will be revealed to all other site/software which is consistently using data.


Tell me what to do to make it full proof totally

Waiting for your prompt reply, thanks.

Share this post


Link to post

Sounds like what's going down isn't the VPN connection, but rather your connection to Tor, which is subsequently messing up your VPN connection. Because VPN going down SHOULD be leaving you with your Tor IP if Tor wasn't going down.

 

I think you need to uninstall and reinstall your Tor bundle. Seems like you have some, broken, leaky functionality that shouldn't be possible.

Share this post


Link to post

Sounds like what's going down isn't the VPN connection, but rather your connection to Tor, which is subsequently messing up your VPN connection. Because VPN going down SHOULD be leaving you with your Tor IP if Tor wasn't going down.

 

I think you need to uninstall and reinstall your Tor bundle. Seems like you have some, broken, leaky functionality that shouldn't be possible.

 

Probably you didn't understand the problem, or I am missing something here, in any case, I am rephrasing it again. I am doing "VPN over TOR" setup. It is like the Air VPN client take TOR as it's entry point instead of my home ISP, and when the client fired up - it tunnels all internet traffic (not only web browser, but all internet traffic) through itself - so it's great and it's what I want, End of the story! Right? Wrong!

 

Now AIR VPN client gets disconnected in regular interval, it can be my TOR installation problem that I am getting frequent disconnection, may be something else, may be it's the VPN server, I am not sure and that's not the problem here! I am telling again, VPN disconnection is not my problem, I am not torrenting, downloading etc. I am just browsing, so I can live with this disconnection - it's not the point I am making.

 

Also the "number" of this "disconnection" is not my problem, it doesn't matter if it's getting disconnected every half an hour or once every day - even if it's getting disconnected only ONCE in the WRONG moment (the moment when I hit the go button in a browser), that's my problem.

 

Now, coming to the setup again, in my laptop - I have my home ISP connection (wireless). Now I fired up TOR browser, here my entry IP is my home ISP (I don't care if my ISP sees me I am using TOR, my ISP don't care about TOR, nor they block/restrict it anyway) and exit IP is the TOR exit node. But I can only use TOR browser here, not other regular sites in other browser which restrict/block known TOR exit nodes. Now I fired up AIR VPN client, here the VPN take TOR exit node as it's entry and give me VPN server IP as exit - for browser and all other programs which use internet basically. So, now, all my traffic including my normal browser is protected through VPN tunnel, except the TOR itself which is independent from the VPN tunnel as the VPN client itself depends on TOR for its base.

 

So the picture is like, Tor depends on my ISP as base and VPN depends on TOR as base, so the VPN is no way connected to my ISP. Therefore if, for any reason, VPN gets disconnected, it's all over my ISP again - all the program and normal browsers will start taking connection from my ISP from the very moment the VPN goes down - and when 'auto-reconnect' selected, VPN client takes a while to get connected again - and during this window period (if I don't notice the small pop-up saying "Air VPN disconnected", I am unknowingly exposing my own ISP IP on every page I am visiting.

 

You said ":Because VPN going down SHOULD be leaving you with your Tor IP if Tor wasn't going down" - you're wrong here! It's my own ISP IP, not TOR IP I'll be left with if VPN gets down. Cause, when I am using "VPN over TOR" setup, I am doing it for my regular browser, not TOR browser which is already independent from the VPN itself and using my ISP to get the connection.

 

There's a feature called "Network lock" which unfortunately works on the reverse setup (TOR over VPN), when if VPN goes down, all the traffic get blocked instantly and only resumed when the VPN gets reconnected again - so no IP leaks here. But in my case, the "network lock" feature don't work.

Share this post


Link to post

Right, you are using the regular browser, not the TOR browser.  I understand what you mean now.  I tried to reproduce your error, but the VPN connection stays connected rock solid for me, even when I connect through TOR.  Have you tried different servers?  Does this happen with all of them?  

Share this post


Link to post

Right, you are using the regular browser, not the TOR browser.  I understand what you mean now.  I tried to reproduce your error, but the VPN connection stays connected rock solid for me, even when I connect through TOR.  Have you tried different servers?  Does this happen with all of them?  

 

Yes, the very purpose of using setup like "VPN over TOR" is to browse via regular browser, so that the websites can't detect my TOR use and at the same time AIR VPN can't detect my ISP IP. If I had to use TOR only, I could have used TOR browser alone, no need for any VPN - or maximum I could have used "TOR over VPN" setup, not the reverse.

 

Bro, again the problem is not the "disconnection", so don't try to reproduce that "disconnection error", your setup may be rock solid so you're not having any disconnection at the moment. But that's not a guarantee - disconnection can happen any time, may be your setup is rock solid, but disconnection happens due to many other factors like VPN-server status etc which are beyond your control.

 

You can do one thing, just disconnect it manually (as you can't reproduce disconnection normally), and then check your IP in your regular browser and you'll see it's not the VPN IP, but your own ISP IP. Then open the VPN client, go to "preference", and select "automatic", instead of "TOR". Then start the VPN again, now it's taking entry from your ISP directly, now click the "Network lock" and connect to any server. Once it starts running, check your IP and it will be your VPN exit IP of course. Then manually disconnect it (but don't close or exit the VPN client itself), and check your IP again - you'll see no internet connection is there. That's what I am trying to achieve in my "TOR over VPN" setup - this "Network lock" button don't work in this setup.

 

I messaged the support also, they are saying that there are some firewall rules must be implemented to achive this network lock fuction properly in this "VPN over TOR" setup which they might implement in the VPN client in future, but probably not in next client update.

 

We all know we have to just "trust" our VPN provider, no matter which VPN you're using, no matter what they are saying like "NO logging" etc, at the end of the day, it all depends on the VPN provider itself - and if time comes, I don't believe a VPN company will protect you for your mere 10$/month subscription, especially when your enemies are big enough.

 

In this particular setup, VPN over TOR, you won't have to TRUST a VPN provider, as you're backed by technology. Till date, nobody can detect your own ISP IP if you're using this setup, regardless of the fact what logs VPN provider is keeping (provided you signed up using TOR, paid by bitcoin etc), however, except the fact that "Network lock" is not working in this setup.

 

You seems veteran in this VPN things, I request you and support stuffs also, give us the firewall rules setup here so that we can implement them manually, untill you come up with an universal "network lock" feature built in your client - that way, we will be backed by technology, not by the VPN company.

Share this post


Link to post

I'm 100% agree with you airyairy,

 

I use the same config like you.

 

I've tried months and months to set up a safe config with that (gufw, iptables, firestarter...) but it still doesn't work. I've

lose my time and my money (because my account is corrupted).

 

The goal of this config, is NEVER show your real ip to the VPN. One time your client crash, and all your security is compromised.

 

I have 174 days in my account but can't consider them safe longer.

 

 

Since few days, My ip is register in red on the top of the airvpn website and google show me my real location. I don't now why, I 've no changed nothing. TBB is on, Eddie too, ipv6 blocked...

 

For now I'm disgusted and blocked to do my job...

 

 

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...