Jump to content
Not connected, Your IP: 3.138.68.200

go558a83nk

Members2
  • Content Count

    2143
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    40

Everything posted by go558a83nk

  1. How do you make your download speed visible at the top user speed on that section? I couldn't find and answer to that anywhere. Reaching speeds well above anyone there, but still not on that list for some reason. That's an average speed over several minutes. So doing a speed test with ookla, for example, won't be reflected there.
  2. I know that I can use 1500 MTU on my ISP, so 1400 Wireguard MTU will work the best for my connection If 1500 byte is possible with your ISP then 1420 for wireguard should work fine. In pfsense I use 1420 for MTU and MSS, and with that TCP connections though the tunnel are capped at 1380 bytes.
  3. The highest MTU that doesn't have problems should be the fastest. Going to 1320 or even 1280 is basically a way to make sure wireguard works for everybody. But many people will have no problem using one even as high as 1420.
  4. From logs posted above Eddie attempts to connect to 217.138.195.21 but gets no response. This does seem to be a correct AirVPN IP address so DNS doesn't seem poisoned. Rather it does look like ISPs are preventing connection to that IP address. I do wonder if TCP, rather than UDP, would work.
  5. AirVPN doesn't use username and password. They use a certificate and key.
  6. actually that log is them trying UDP entry 3 and then TCP and SSH and SSL. none of them worked. so, yes, chances are some software is blocking the connection.
  7. Eddie is getting no response from the servers. Do you live in a nation that blocks VPNs? I think you'll need to try TCP. Go into settings > protocols. Uncheck automatic. Choose openvpn TCP any port and entry IP 3 or 4. If that doesn't work, you'll have to try SSL or SSH.
  8. I've yet to have an ISP that supports IPv6 besides mobile data.
  9. Can we still expect a new server soon? The 25th came and went.
  10. Wireguard in Eddie? Or wireguard the app? Wireguard in Eddie
  11. make sure to try wireguard if you haven't already
  12. it wasn't me but that's really nice of somebody!
  13. The phoenix location is definitely spoofed. You can check the m247 site to see their list (or a map) of their actual locations. The Phoenix location as it is adds bandwidth but not route diversity since it's likely found by the same route as the LA location. Something better may be out there but maybe not. https://m247.com/eu/data-center-locations/
  14. I don't blame you for wanting to use wireguard especially on a router but openvpn using tls-crypt does connect easily from Egypt.
  15. have you confirmed it also announces the specified IP address to DHT peers or only tracker based peers?
  16. Thank you, this answers the question that had been rolling around in my head. I do think it would be good to allow users to pick the exit IP for each connection VPN connection.
  17. I currently have need to be able to connect to the same server and get the same exit IP address for both connections. I'm not using port forwarding. With this new system is it possible that one of the two connections will get a different exit IP?
  18. So is it working? The other thing that often breaks port forwarding on pfsense is if there are any rules in the openvpn or wireguard "group" firewall rules since those group rules override individual interface rules.
  19. I'm confused because you said "it is down a lot of time". But not enough for you to break the contract legally?
  20. You only need the first port forward rule, for your AirVPN interface, assuming that's the interface/gateway that the transmission device is allowed to use in policy routing. So, delete the one you made for your WAN. The only mistake I see is setting filter rule association to pass. You need to set that to "create new associated filter rule" and save. That'll create the necessary firewall rule. Of course, make sure transmission is listening at 192.168.3.102:19151 when you test to see if the port is open.
  21. I'm curious why you signed a contract that didn't give you the option of abandoning the contract if they didn't keep certain quality and uptime requirements?
  22. It used to be that you could use the same "device" for openvpn for multiple connections to the same server so long as you connect to different ports. I'm not sure if that's the same for wireguard... Because, as I'm sure you've realized, with wireguard, you have that pesky tunnel address that isn't auto created when you connect like with openvpn. So, yes, you have to make a new "device" for each wireguard tunnel you want to have on your pfsense box. But, the good news is that if you want to switch to a different AirVPN server, whether it's openvpn or wireguard, all you have to do is change the IP address of the endpoint/server. (with wireguard you need to disable the peer first, in my experience)
  23. Neither AirVPN's port open test nor yougetsignal's port open test will show "green" unless your whole chain is working and your server (qbit) is listening and responds to the query. This is important. Your server must be up and responding. So if things seem correct on pfsense then then problem is somewhere else, that's my thought.
  24. yeah, for me the group rules section is empty. but the individual interface gets auto created by using the associated filter rule option in the port forward. your problem may be due to a firewall on the unraid box and/or the qbit container?
  25. so they're saying they had an any/any rule in their firewall/rules/openvpn or /firewall/rules/wireguard group which overrode the automatically created rule (when you create the port forward) in firewall/rules/individual_interface
×
×
  • Create New...