Leaderboard
Popular Content
Showing content with the highest reputation on 06/07/21 in Posts
-
1 point@cdysthe @Drk01 Hello! If those solutions are too complex, you might consider a Virtual Machine. Nowadays software like VirtualBox and VMWare make running a VM a piece of cake, you just need some time (once and for all) to install an OS from scratch. Then you can connect only the VM to the VPN (exactly as you do now in your machine) and use the applications whose traffic must be tunneled only in the VM. Host traffic will remain out of the VPN. Kind regards
-
1 point
AirVPN connection to internet via Mobile phone (Wifi Hotspot) not working
cyberskyway reacted to OpenSourcerer for a post in a topic
By pasting or uploading log output first. AFAIK, neither Android nor iOS are assigning IPv6 addresses to hotspot clients. Maybe this circumstance is where the problems start. -
1 point
Wireguard
ajchbkjsohvbshbkjabcvs reacted to jeuia3e9x74uxu6wk0r2u9kdos for a post in a topic
https://restoreprivacy.com/wireguard/ AirVPN has also chimed in over WireGuard’s implications for anonymity, as explained in their forum: Wireguard, in its current state, not only is dangerous because it lacks basic features and is an experimental software, but it also weakens dangerously the anonymity layer. Our service aims to provide some anonymity layer, therefore we can’t take into consideration something that weakens it so deeply. We will gladly take Wireguard into consideration when it reaches a stable release AND offers at least the most basic options which OpenVPN has been able to offer since 15 years ago. The infrastructure can be adapted, our mission can’t. In their forums, AirVPN further explained why WireGuard simply does not meet their requirements: Wireguard lacks dynamic IP address management. The client needs to be assigned in advance a pre-defined VPN IP address uniquely linked to its key on each VPN server. The impact on the anonymity layer is catastrophic; Wireguard client does not verify the server identity (a feature so essential that it will be surely implemented when Wireguard will be no more an experimental sofware); the impact on security caused by this flaw is very high; TCP support is missing (third party or anyway additional code is required to use TCP as the tunneling protocol, as you suggest, and that’s a horrible regression when compared to OpenVPN); there is no support to connect Wireguard to a VPN server over some proxy with a variety of authentication methods. Despite these concerns, many VPN services are already rolling out full WireGuard support. Other VPNs are watching the project and are interested in implementing WireGuard after it has been thoroughly audited and improved. In the meantime, however, as AirVPN stated in their forum: “We will not use our customers as testers.” -
1 pointI keep reading reviews about great VPNs maxing out a user's connection, but I can't get anywhere close to what I'm reading about. After trying quite a few VPNs and being disappointed with the speeds I figured I would just go with AirVPN, since it gets such fantastic reviews, and I've seen people talking about maxing out their 50 and 100 Mbit connections. I'm on a 50 Mbit connection that usually gets around 54 Mbit, but the max I can get with AirVPN is 10 Mbit. I've tried different ports, their client vs. OpenVPN, numerous servers, and the results are the same, 2 to 10 Mbit. I'm in Vancouver, BC, and even when I'm connected to one of their Vancouver servers (Cetus, Gemma, Homam), I'm getting 2-10 Mbit speeds. It just doesn't make sense to me based on what I've read about AirVPN. Is it possible it has something to do with my ISP, Telus? Do they mess with VPN traffic? I would really like to start using a VPN regularly for privacy, but none of the speeds I've gotten will allow me to do so without being incredibly frustrated all the time. EDIT: I'm literally on AirVPN as I type this, with a download speed of 1.45 Mbit (using AirVPN's speed tester), connected to a 1 Gbit server/connection that's local, has a 29ms response time, and only has 11% capacity right now. It just doesn't make a whole lot of sense to me. EDIT 2: It seems as though the issue is with one of the main network providers in my area. If I avoid local servers and use ones that are further away, where the problem servers are bypassed, my VPN speeds double. The speeds still aren't close to what other people have talked about getting, but it may be manageable now. Thanks to everyone who helped me troubleshoot this!
-
1 pointHello! Nowadays, traffic shaping is a common practice. Several ISPs have evaluated that investing in traffic shaping techniques is better than investing in infrastructure expansion. Overselling becomes easier and the devastating congestion impact gets mitigated by enforcing penalties to all protocols which are rarely used by the majority of customers or that are more onerous for the infrastructure. Protocols and traffic types are discovered in real time via SPI and DPI. A VPN impairs traffic shaping techniques because it makes both SPI and DPI impotent. Therefore, ISPs that share the above vision (wild overselling and traffic shaping) need to shape VPN themselves, unconditionally. OpenVPN has a typical fingerprint, so it's easy to identify it with DPI. However, we provide connection modes which make OpenVPN not discernible. The most effective and at the same time efficient is a connection with "tls-crypt" which encrypts the whole OpenVPN Control Channel. It is available on entry-IP addresses 3 and 4 of our VPN servers. Please test the following one (in Eddie desktop edition): - from Eddie main window select "Preferences" > "Protocols" - untick "Automatic" - select the line with entry-IP address 3, port 443, protocol TCP. The row will be highlighted in blue - click "Save" tls-crypt will circumvent specific OpenVPN shaping, while TCP will get rid of UDP shaping, which is another commonly targeted protocol. UDP might be shaped or not in your line, so it's worth that you try it too. Eddie Android edition 2.0 connects to entry-IP address 3 by default. You might anyway need to change the protocol from UDP to TCP in the "Settings" if UDP is throttled. Kind regards
-
1 point
problems with airvpn client under hotel's wifi public hotspot
cyberskyway reacted to rebelyell for a post in a topic
hi, I'm using airvpn since two months. It works fine when my laptop is connected through 3G data modem but I have some problems on hotel public hotspot. The first month of use it was ok. The behavior of hotel wifi is: 1. connect to wifi network 2. browser automatically redirects to login page 3. after login you can surf the internet access is time limited but it seems random and lower than 24 hours. Since some weeks, this behavior changed: it doesn't prompt the login page anymore (but it affects my user only, I know for sure that others in the hotel still need to use the login page every day). And the connection problem arised. The problem is that I lose connectivity to the server that I am connected to easily and randomly, even after 5 minutes (but airvpn client starts to count the login time from 2h:00:00). When I lose connection I must shutdown airvpn client and disconnect from the wifi network. Then reconnect it and restart airvpn client and hope that the connection will be solid. I am pretty sure that the problem is the hotel wifi network but why this happens? Logs are attached (network disconnection and reconnection failed). Thanks p.s.: 1. I use comodo firewall with rules described in your howto and win 8.1 2. I use airvpn client 3. It works fine with 3G mobile data connection log03.txt log04.txt -
1 point
Open VPN won't connect to Wi-Fi hotspot
cyberskyway reacted to wintersnow for a post in a topic
I set up three configurations using open VPN and all of them connect from my home network. But none of them connected today when I was on a Wi-Fi hotspot that my ISP provides free for its customers. What's going on and is there anyway around this? -
0 points
ANSWERED AirVPN does not recognize ICANN authority anymore
spinmaster reacted to Staff for a post in a topic
AIRVPN DOES NOT RECOGNIZE ANYMORE VERISIGN, AFILIAS AND ICANN AUTHORITY. OUR COMMITMENT AGAINST UNITED STATES OF AMERICA UNFAIR AND ILLEGAL DOMAIN NAMES SEIZURES. The United States of America authorities have been performing domain names seizures since the end of 2010. The seizures have been performed against perfectly legal web-sites and/or against web-sites outside US jurisdiction. Administrators of some of those web-sites had been previously acquitted of any charge by courts in the European Union. The domain name seizures affect the world wide web in its entirety since they are performed bypassing the original registrar and forcing VeriSign and Afilias (american companies which administer TLDs like .org, .net, .info and .com) to transfer the domain name to USA authorities property. No proper judicial overview is guaranteed during the seizure. Given all of the above, we repute that these acts: - are a violation of EU citizens fundamental rights, as enshrined in the European Convention on Human Rights; - are an attack against the Internet infrastructure and the cyberspace; - are a strong hint which shows that decision capacities of USA Department of Justice and ICE are severely impaired; and therefore from now on AirVPN does not recognize VeriSign, Afilias and/or ICANN authority over domain names. AirVPN refuses to resolve "seized" domain names to the IP address designated by USA authorities, allowing normal access to the original servers' websites / legitimate Ip addresses. In order to fulfil the objective, we have put in place an experimental service which is already working fine. If you find anomalies, please let us know, the system will surely improve in time. Kind regards AirVPN admins