pembrokeVPN 1 Posted ... Came across this site from the pfSense forumhttps://ipx.ac/run When I connect over AirVPN on my OpenVPN server on pfSense nothing is detected under Network Link. However when I connect over my own OpenVPN connection on pfSense it detects "OpenVPN TCP bs128 SHA256 lzo". My query is what is the setting on OpenVPN server that prevents connection information from leaking, obviously AirVPN know what they are doing 🙂 Quote Share this post Link to post
OpenSourcerer 1435 Posted ... Could be --tls-crypt. It's encrypting all control channel packets, not only some of them. One of the packet types contains the peer (or client) info, e.g., whether LZO is used. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
pembrokeVPN 1 Posted ... Well I'm using tls-crypt on both on own OpenVPN instance and my AirVPN OpenVPN instance. The way I have setup the two OpenVPN servers are basically identical, so I think there is something on the AirVPN side that prevents some data leakage but it's not obvious what. Quote Share this post Link to post
OpenSourcerer 1435 Posted ... Hm. Maybe --push-peer-info is enabled on your side? Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
pembrokeVPN 1 Posted ... Had to look up push peer info, seems like it would present more information about the connection. However, I don't think I have in enabled in the client.My own OpenVPN client config: dev tun persist-tun persist-key data-ciphers AES-256-GCM data-ciphers-fallback AES-256-GCM auth SHA512 tls-client client resolv-retry infinite remote MY IP ADDRESS 1140 udp4 verify-x509-name "MY OPENVPN" name auth-user-pass remote-cert-tls server comp-lzo no explicit-exit-notifyMy AirVPN client config: client dev tun remote AirVPN Server 443 resolv-retry infinite nobind persist-key persist-tun auth-nocache verb 3 explicit-exit-notify 5 remote-cert-tls server cipher AES-256-CBC comp-lzo no proto udp auth SHA512 Now I see my client certs are not so similar, is there anything on my config which stands out or vice versa with the AirVPN config ? Quote Share this post Link to post