Jump to content
Not connected, Your IP: 3.235.236.13

go558a83nk

Members2
  • Content Count

    1904
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    26

Posts posted by go558a83nk


  1.  

    Does it mean that for example I use port 16621 for my torrent client, tixati. So I should disable port forwarding for port 16621 in my router ? 

     

    Yes or use, for your torrent client, any other port like 16622 that is closed in your router but you had set it to forward in AirVPN config. You don't have to open any port in your router for  p2p when you are connected to the VPN, just set it on port forwarding

     

    to be clear, if you are using an openvpn client, such as AirVPN's eddie, on your computer, then it's bad to open ports on you router.

     

    but, if you run VPN from your router, then you do need to forward ports in the router.


  2.  

    I think the more important use of the chains is to take advantage of better routing.

     

    For example, I can connect to USA servers directly.  But, it might be faster for me to chain through Singapore, then USA.

    A buddy actually does that for gaming because his isp's routing is really horrible. He gets better pings by jumping to a nearby vpn then to the game server.

     

    I would love to see some downloadable configs for a simple 2 server hop though. Its easy to do with a vm but being able to ssh/ssl -> vpn -> vpn would make me smile.

     

    Air has some good tricks that most other VPN don't have (SSH and SSL and great config generator) but maybe they will implement the chains as a way of keeping a step ahead of the pack. 


  3. I know of another VPN provider that has VPN chains as part of their service.  You can build your own.  The way it works is that you connect to the gateway that's the start of the chain on a unique port.  Once connected you appear to be at the end link of the chain.

     

    They sell it by saying it increases security or anonymity.  However, I think the more important use of the chains is to take advantage of better routing.

     

    For example, I can connect to USA servers directly.  But, it might be faster for me to chain through Singapore, then USA.


  4. Of those I've been a customer of Air and PIA.  I typically use my router for VPN but when I've used apps on my windows 7 machine I've had more trouble with Air leaking DNS than with PIA's app.  PIA has a DNS leak protection switch that works perfectly every time that I've used it.

     

    Edit: if you're talking about WebRTC leak then you should make another column.  DNS leaks and WebRTC protection are completely and totally different.

     

    Edit2: you make negative remarks for the use of google DNS and yet you're using a google doc spreadsheet and have a gmail address.


  5.  

    that router can't run openvpn fast.  other routers can.  look for an Asus AC56 or AC68 or AC87 and use merlin-asuswrt firmware.

     

    Define 'fast'? I'd expect 150 Mbps plus, which I doubt anything other than a custom built pfSense box could achieve. 

     

    sorry, the routers I mentioned can't run it that fast.   50mb/s maybe a little higher is possible.


  6.  

    Get ready for some controversy...

    IMO PIA is NSA

    Said same thing on Reddit too.

     

    Edit: I have nothing to back this up, just saying do you honestly believe they can do all they advertise within US Jurisdiction.

     

     

    There are a lot of VPN companies based in USA.  Are they all NSA?  I don't see where PIA advertises to do anything more than the average VPN.

     

    By the way, PIA dynamically routes traffic from their USA gateways through Toronto when it's not the common WWW ports (80, 443, etc) to avoid legal problems as much as possible.  And only a few of their servers offer port forwarding (none in the USA), for further separation from potential legal trouble.


  7. the AC56 has the same CPU so it can. and the AC87 certainly can with its faster CPU.

     

    several other brands with similar CPU can also do it.  but, one thing to note is that merlin firmware for Asus may have some openvpn optimizations.

     

    also, I've seen some data that indicate that Astrill's applet for routers delivers impressive speeds when using their routerpro option.


  8.  

    I don't have any opinion on CanvasBlocker but there are a couple of problems with it:

    • it interferes with other extensions instead of only affecting websites
    • the author makes it unnecessarily difficult to work with the code  (but it's technically open source and also free-software licensed!)

    I don't use any extension to prevent canvas fingerprinting. Instead, I

    • block scripts with NoScript (canvas fingerprinting requires JavaScript)
    • use Tor Browser, which asks you whether to allow canvas image extraction (without the need to block scripts)

     

    what other extensions does canvasblocker interfere with?  I've begun to use it and need to know what to look out for


  9. This isn't related to AirVPN specifically but VPN in general.

     

    Today I was helping a friend get openVPN setup on a router. Main purpose is to be able to access Hulu from our location.

     

    He also has 3 ISP lines into his apartment, two different ISP. He has a subscription to another VPN service - not Air.

     

    I get the VPN running and soon enough Hulu is accessible.

     

    Then we switch the router to use a different ISP, trying to see which ISP has better bandwidth to USA.

     

    The VPN connects to the exact same server. However, Hulu blocks us.

     

    We switch back to the first ISP, connect to the same VPN server again, and Hulu works!

     

    So my conundrum is how the ISP make any difference in this situation.

     

    Can ISP tag traffic in a way such that Hulu can see it's ABC ISP traffic even after exiting a VPN?


  10. 1) SSH and SSL use common ports so it's unlikely  they'll be throttled.  They are probably throttling you based on deep packet inspection (DPI), not an overall throttle of the port.  DPI is able distinguish an openvpn connection but they cannot see the encrypted payload.

     

    2) SSH and SSL tunnels trick DPI becase they look like SSL or SSH, not openvpn.  Here you have an openvpn tunnel inside an SSH or SSL tunnel, so they are certainly as safe and encrypted.

×
×
  • Create New...