Jump to content
Not connected, Your IP: 3.147.73.62

go558a83nk

Members2
  • Content Count

    2148
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    40

Everything posted by go558a83nk

  1. I currently only use "don't pull" but I tested both and each one separately, and also the topology. Nothing changes what the server pushes to the client. Much of my pfsense setup is following the excellent guide that's here on the forums. In that don't pull and don't add/remove are selected and therefore you don't have problems of subnets overlapping. And perhaps there are some other settings that affect this too that I don't recall. Anyway, I've never had problems running multiple clients. What the server pushes doesn't change but it's that pfsense ignores it.
  2. I'm curious. What's the purpose of this?
  3. Are you using the options in the openvpn client setup "don't pull routes" and "don't add/remove routes"?
  4. To check for leaks I've always looked at the state table to make sure no connections are being made that I don't want, filtering it to see what I want. Is that a flawed method?
  5. I am assuming you're using pfSense ... The way to catch LAN DNS queries, regardless of whatever server they have configured, is by making sure a client default gateway is set to pfSense and creating a port forward and associated firewall rule. The steps are outlined in Step 6 in this guide. I tested this extensively and I can set my DNS server to 1.2.3.4 (doesn't exist!) and DNS simply works. Never do I see packets fly out over port 53 on my WAN. The NAT+rule above will catch ALL packets on port 53 that wants to go OUT, will get caught and redirected to pfSense. Then, if pfSense is configured as I described above, no one will ever be able to see your queries, except Cloudflare DNS server, but they guarantee they don't keep personal logs (anonimized only). As I describe above, in my situation, this still randomly leaks DNS info to your ISP over WAN. No. The NAT + Rules redirect all DNS traffic. The procedure I describe above only makes sure that DNS Resolver from pfSense sends its queries to 1.1.1.1. I think you misunderstand how things work (or I misunderstand your question). When your browser requests a webpage using a domain name (and not an IP address directly), your PC first queries whatever DNS server it has configured for that domain. It will get an IP address back, and will do a handshake with that IP address over HTTP/HTTPS. This handshake is sent over the VPN tunnel. Your URL is sent along with some other information, so that the server accessing knows which domain and URL you are trying to access. The communication from the handshake and following, runs over your VPN tunnel. Whether the initial DNS query is sent over VPN, depends on your configuration. In my config I describe above, it is NOT sent over VPN, but that doesn't matter because its TLS encrypted traffic to the DNS server. So, it doesn't matter where the VPN server is, or where your webserver or CDN is located. The DNS query is always done by your client whether you're using a VPN or not. Your client cannot communicate with a domain name or URL directly, the internet does not "talk" in domain names or URL's, only in IP addresses. DNS resolution is always the first step done by your client. Yes, I'm using pfsense. Maybe I'll have to keep a closer eye on things but whenever I've looked I don't see any leaks out the WAN for DNS queries...though I did realize that if the VPN tunnel went down my firewall rules were allowing non-VPN devices to send their DNS requests out the WAN. But, I fixed that. My point in the second question is this basically: Say you're connected to a Netherlands VPN server but you physically reside in the USA. With your setup your DNS queries will resolve to a physically nearby youtube CDN. However, you'd want your VPN tunneled devices to access a Netherlands youtube CDN for best performance of youtube. The only way to make that happen is for DNS queries of VPN tunneled devices to go through the VPN tunnel as well.
  6. One thing I like to make sure is that my devices (streaming media devices like Shield TV) don't use some other DNS that's coded into its OS or whatever app I'm using. I often see them trying to use google DNS. Anyway, I've gone the way of assigning whatever DNS server I want to use to DHCP clients, forcing them to use only that via firewall rules, and also forcing all those requests through a VPN tunnel so it can't be seen by my ISP. Your way sounds pretty cool but I have a couple questions off the top of my head. 1) does the forward "all" as you say really mean that attempts to use other DNS as I wrote about are re-written, so to say, to go instead to 1.1.1.1? 2) what if you're using a VPN server quite far away and want your DNS queries to resolve to CDN close to that server? It seems that your way here would resolve to CDN close to your real location. right?
  7. Your title is misleading. TLS 1.2 has been in use for some time. tls-crypt is what's new. Paste in the tls-crypt.key info into the key field, and then below it select the option for authentication and encryption. Then also change the auth digest to SHA512. that should be what you need to connect. If you aren't already doing it, you should also see performance improvement using AES-256-GCM as data cipher vs CBC
  8. 1 and 2 are tls-auth, 3 and 4 are tls-crypt. The reason for having two of each is in case one is blocked by .... ISP or something. If you resolve a server name, for example, "nslookup leo.airvpn.org", it'll resolve to its #1 IP.
  9. Oh, that was with resolved hosts enabled. With resolved hosts disabled the config has no remote server at all.
  10. # -------------------------------------------------------- # Air VPN | https://airvpn.org | Wednesday 16th of May 2018 07:06:42 PM # OpenVPN Client Configuration # AirVPN_CA-Toronto-Ontario_Rana_UDP-443-Entry3 # -------------------------------------------------------- client dev tun remote h.root-servers.net. 443 remote a.root-servers.net. 443 remote g.root-servers.net. 443 remote j.root-servers.net. 443 remote k.root-servers.net. 443 remote b.root-servers.net. 443 remote d.root-servers.net. 443 remote c.root-servers.net. 443 remote i.root-servers.net. 443 remote m.root-servers.net. 443 remote f.root-servers.net. 443 remote e.root-servers.net. 443 remote l.root-servers.net. 443 remote-random
  11. Been using Chamaeleon with tls-crypt but this evening am noticing a problem but the status page isn't showing anything wrong. What I see is intermittent packet loss in my pfsense gateway monitoring, and traffic at random intervals goes to zero for a very short time then starts up again. When I tried to connect to Chamaeleon at entry 1 (not tls-crypt) but it wouldn't connect at all. I did, of course, change the static key to the proper one for the attempt. So, I switched back to tls-crypt and it connected just fine. But, I'm still getting packet loss. Something amiss with that server I'm afraid.
  12. There is no real issue there. Unless you really don't trust your network, to the level you don't want them to know you tried to access xx.airvpn.org, you can use OpenNIC/Cloudflare (1.1.1.1) DNS servers pre-VPN. This does not provide any good layer of extra security or anonymity, since if your provider is hostile, it can still detect OpenVPN traffic unless you use SSL/SSH tunnels. Pre-VPN DNS is really not an important factor here, since it depends on what your ISP is -known- to censor afterwards. Still, as an outside VPN resolver for DNS I would recommend OpenNIC DNScrypt resolvers, but since not many devices can support that out of the box, the new alternative from Cloudflare is a good choice as well (1.1.1.1). Probably still better than your ISP resolver, but still the same in terms of logging unless you use DNS over TLS. whoa, zhang is still here! I thought you'd left us.
  13. Staff, can you tell us more about the new DNS server engine you speak of in the OP? Besides necessary changes for IPv6 is there anything else new?
  14. I tried to do this and actually completely set up a VM using hyper-v on win 10 - then I set up a homegroup between the VM and the PC - this is where the issue arose, I couldn't get the homegroup to consistently work. Is there a simple way to be able to automatically transfer downloaded files between the VM and the PC running it? I also need programs on the PC side to tell the download programs (qbittorrent and SABNZBD) what to download. I use virtualbox with a Mint install as the guest virtual machine, windows 10 host. With vitualbox you can allow the guest VM to access folders on the host directly. It's called shared folders IIRC.
  15. It's not something that's easy to do, certainly not something that can be done through Eddie. The easiest way to do it is to run the two apps you want (and Eddie) in a separate virtual machine, setup so that it's got its own IP address on your local network.
  16. It looks like for wan and lan interfaces we'd have to enable IPv6, and do so for the wan gateway too. But, I haven't wrapped my head around how IPv6 works. I mean, as I understand it there's no NAT? That makes me feel naked.
  17. good question. I don't want to use IPv6 but it would be good to know how to do it.
  18. prng is pseudo random number generator. Apparently there were/are some hardware random number generators that were/are flawed. This is a way to be a little more secure.
  19. I was connecting to the Dallas servers this morning just fine.
  20. others are reporting that the LA servers are refusing connections
  21. Thanks. Could you please tell me how to make a config for my android phone and how to connect using the generated files ? Why? Above you implied you used your android mobile already - "i cant establish an SSL connection neither from my PC (Eddie) nor my mobile ( Android)" Therefore, you should already know how to do this.
  22. Why aren't you using the latest stable version?
  23. Regular connections are just as safe. SSL or SSH are needed to bypass blocks or throttles. It would be interesting for you to try a tls-crypt config on your mobile if you can. Another person has reported that that bypassed a block.
×
×
  • Create New...