Jump to content
Not connected, Your IP:


Popular Content

Showing content with the highest reputation on 05/19/22 in all areas

  1. 1 point
    Oh its too late, should've came back and made it aware I deleted openSUSE Leap from my KVM because of other issues. But I have NOT gotten this message from MX Linux or Windows. These are the only OS I'm using it on, but will try to install it on my pfSense. Having trouble trying to figure out how to allow local connections wile connected to the VPN. Thanks for replying!...
  2. 1 point
    Every troubleshooting effort, every attempt at support, starts with the description of the problem from the one requesting help, and with information gathering from the one willing to help. It's a quid pro quo: This for that. Fair change. The requester is in most cases relatively inexperienced when it comes to giving information, because most people are no magicians when it comes to computers. They can't know where to look for the right info. And they don't need to, that's okay! Because those willing to help usually do! Remember, quid pro quo: You give me your symptoms, I give you some questions. You give me answers, and I give you more questions. It continues until we eventually reach the diagnosis. I'm your doctor, while you are the patient with a problem. This thread deals with an early stage of this process in regards to AirVPN and the Eddie client, where the most helpful bit of info comes from what is referred to as the system report, or support file. I want to write about where to find it exactly, how it looks like and what to do with it. This obviously does not apply to cases where Eddie is not used, where the OpenVPN logs must be copied instead, if possible with a higher than normal verbosity (another topic). What is it? Nomen est omen, the system report is a snapshot of the current configuration and state of the Eddie client and includes extra info on system configuration relevant for connectivity to AirVPN or functionality of the client. Where do I find it? Open Eddie and navigate to the Logs tab on the left side. The window is filled with log output from Eddie and the programs it uses. On the right side you've got four buttons: From the top, they are Clear Logs, Copy to Clipboard and Save to File which do exactly what they say, no strings attached… The fourth button with a lifebelt or donut icon is the System Report button. Clicking it will open another window with another box for text output and more buttons: Copy to Clipboard and Save to File on the right, and if you're running a recent stable or beta version an Upload to paste URL in support ticket button in the bottom left. What you're seeing all over the window is the actual system report. What do I do with it? Life Pro Tip: This thing is editable! Apply some privacy if you want (see further down), then deal with it in one of the following ways. PASTE: Click the top right button to copy the report to your clipboard. Open the thread you want to paste it in and CTRL + V. UPLOAD: Click the second button from the top to save it to a file. Give it a name and save it somewhere, then open the thread you want to upload it to, drag the file into the editor and click on the file to add it to your post. LINK: Click the button in the bottom left. Eddie uploads the report to eddie.website and shows you a link to it. Copy the link, open the thread you want to paste it in, then paste it there. System Report sections explained Sections are separated by an army of dashes (----------------------------). Section 1: General information Program and OS versions, config paths and some connectivity test results. It gives people the chance to try and reproduce the problem in a virtual machine or an old device running your OS, kernel and program versions. This is done to either pinpoint or rule out used program versions as the problem. Section 2: Options not at defaults Every setting in Eddie has a unique key in the simple notation [category.]setting: value[,value,…]. There is a default setting for everything. For example, the default is to not have a username/password saved, but if you save it, they will show up here as setting keys login and password. This section shows options you manually changed and help tremendously to understand how you configured Eddie. This info opens up the chance for people to getting closer to your setup because they can set Eddie to use your config and see if they get a similar behavior. Section 3: Logs Eddie logs all events from itself and the programs it runs, most prominently OpenVPN and Wireguard. This is the info that is shown in picture 2 above, and the reason this section exists is why copying only the logs is too little. Note that this is a snapshot of what is in the log buffer when you clicked on the donut. If you clear the logs in the second picture, this section will be just as empty. Section 4: Interfaces and routes You are surely aware of the fact this is a VPN program which needs to change networking configuration of the system to function, so information on the current state of that networking configuration is kinda important. This is the section printing info about it in JSON format. Not too easy to read and notice stuff in there, even more difficult to somehow reproduce it, but it does present the chance to notice something in the first place. Sections after it: Output of OS-specific networking information programs On Windows this would be something like ipconfig /all, on Linux it's output from ifconfig or ip address show/ip link show. Similar goal as with section 4, to open up the chance to notice things. Golden Rules Read carefully what is requested of you! If a system report is requested, eat the donut! Do not copy the logs alone! I cannot stress this enough. They are part of the system report, eat the donut! Guidelines on applying privacy to the system report output For privacy, you can anonymize the report a little before saving: As written, the box where Eddie prints the system report is editable! Eat the donut, edit the output and then click one of the buttons. In the box, pay special attention to possible user names in Section 1 (general info) and MAC/IPv6 addresses after Section 4 (Interfaces/Routes and OS-specific network info). IPv4 addresses are almost surely in the private space and cannot be used in any way to trace or connect to you, they can be left as is. I hope this provides something people can refer to in the future. Don't hesitate to provide suggestions and corrections if you've got something. Thank you for your time.
  3. 1 point

    Using VPN in Australia

    Hi there. I've lived in Australia for a while. The internet is rubbish: expensive, unreliable, often slow and compromised (data retention). I had better internet in China! Airvpn does not have a server in Australia. There are posts in the forum on why not, but they revolve round the exorbitant cost (cost of living is often higher than the Scandi countries, without access to Europe and the culture. Beaches kind of do not make up for that.) And the data retention / surveillance state. This has been turned into a fine art in Australia. On the whole, Airvpn works well, but some of its servers have been blacklisted, by for instance Netflix or the BBC. You might need for those sites to get another VPN - but I would urge you to stick with Airvpn for all other activities. Why? Several reasons. Australia does not have a bill of rights, or even guaranteed freedom of speech (some political speech is protected, sort of). Politicians learned long ago they could simply lie to the voters, scare them or ignore the voters' criticisms - so overt control of the press was not required. In any case, one half of the press landscape is controlled by Murdoch. So, they do not need to, in any case. It is easy for the authorities to obtain a warrant, merely by saying they suspect X of doing Y - even if they do not have a lot of evidence. The judiciary is compliant. There is data retention too. The Federal Police (kind of like a cheap FBI) were caught accessing journalists data, without warrant. It was an "accident", they said. [see: http://www.zdnet.com/article/ombudsman-finds-australian-federal-police-unaware-of-journalist-metadata-requirements/; https://www.theguardian.com/australia-news/2017/apr/28/federal-police-admit-accessing-journalists-metadata-without-a-warrant; https://www.theregister.co.uk/2017/11/28/australian_federal_police_did_not_delete_metadata_as_promised/; https://www.theguardian.com/world/2016/apr/14/federal-police-admit-seeking-access-to-reporters-metadata-without-warrant]. So, all the promises that the data would be used only in extreme cases were hollow. As predicted. The other problem is that unlike the US, where information illegally obtained, and anything flowing from it, can't be used in court (the doctrine of the fruit of the poisoned tree) - no such prohibition exists in Australia. It is up to the judge. So, information can be used even if there was no valid warrant. Additionally, the domestic intelligence service is largely unaccountable; for instance, its evidence to court proceedings and coronal inquests is usually not published (and so cannot be tested) - unlike the US. And indeed, all records of those courts are usually not available publicly, on grounds of "privacy". [Contrast with the US and what happened in the lead up to 9/11. such public disclosure would not occur in Australia.] So, in short, if you live in Australia, you should be using a good quality VPN . They are not yet illegal - but there have been discussions from time to time of making them so. And stay off social media.
  • Create New...