
go558a83nk
-
Content Count
1899 -
Joined
... -
Last visited
... -
Days Won
25
Posts posted by go558a83nk
-
-
Any change to https://airvpn.org/specs/ with this new capability?
LOL, I misread. Nevermind!pekUpsecta2 and pekUpsecte0 reacted to this -
2 hours ago, dougiepunk said:I'm a little confused. Is the "seamless tunnel" option in OpenVPN Connect for iOS the same as a kill switch? If not, then what are the differences?
Internet searches are a treasure trove.
https://openvpn.net/vpn-server-resources/faq-regarding-openvpn-connect-ios/ -
7 minutes ago, kbps said:Out of interest, who is the Data Center provider?
https://bgp.he.net/AS268581pekUpsecte0, Guest and Thomasalkaw reacted to this -
I believe the 2 way ping thing is something like this. Your web browser pings the test site and the test site pings the IP you appear to be at (VPN server).
Your browser ping goes from your PC to the VPN server to the test site. The test site ping is just to the VPN server. So, there's a good chance the latency of the ping from the browser will be higher. I'm sure there's some fudge factor that they consider "normal" difference because routes are not always symmetric anyway. But, a difference beyond the fudge factor is a good indication that a "proxy" is being used. -
Please look into your Netflix situation. I just attempted to watch a video but the speed that could be sustained was so slow the video was unwatchable. Playback on other video streaming services that worked through the VPN were quite speedy. Vudu, for example, burst to 300mbit/s to buffer. Curiousity Stream buffered at 100mbit/s. Your netflix setup could only manage 5mbit/s. Not near enough for a 4k stream.
Thanks. -
-
1 hour ago, mrbert said:I have the openVPN client on the router working but oly when I add a 2nd DNS server to the setings.
I have primary onnect to dns server 10.4.0.1
And the 2nd now to 51.15.98.97
If I use 10.5.0.1 as the 2nd DSN server as suggested on other topics the clien neven connects again.
I alway need the other 51.15.98.97 server or similar other DNS servers form https://www.opennicproject.org
But I can never connect without the 2nd set to a valid dns server.
How do I make sure my DNS request are also private?
The reason is likely because you're using a domain for the AirVPN server which means you need DNS to resolve it. But you can't access AirVPN DNS servers until you're connected to the VPN.
Instead use the IP address for the VPN server and you won't need to use public DNS to connect to the VPN. -
2 hours ago, jgiambona said:Sorry to resurrect such an old thread, but is it possible to use VPN over SSL with tls-crypt on iOS. Don't see any way to do it. Thanks!
iOS can't run stunnel unless it's jailbroken. Besides, this question is offtopic for this thread. -
2 hours ago, jgiambona said:Is it possible to use OpenVPN over SSL with tls-crypt on iOS? Thank you!
You shouldn't need openvpn through SSL tunnel (which isn't possible on iOS without jailbreaking anyway). Just load up several tls-crypt configs to try in openvpn connect. -
3 hours ago, Mad_Max said:Thank you @go558a83nk for your reply.
So, The i5-5200u is enough to run full time vpn with 100mbps speed?Yes, even the i3 should be plenty. Just be sure to enable cryptographic hardware here /system_advanced_misc.php and then select that hardware in your openvpn config you create. Then AES-NI plus whatever else is on the CPU is in use.
-
You don't need that much ram or storage for pfsense. You need a good CPU and good network card(s). The celeron j1900 is out due to lacking AES-NI which is very important for running openvpn. Both have intel network cards so you're good there.
Bennywaigo reacted to this -
That's just the limitation of the CPU. It takes a lot of power to encrypt/decrypt openvpn quickly. Or AES-NI.
-
-
The bottom line is Air isn't blocking your access to those trackers. So it must be them blocking Air. Why is another question and it really makes one ponder. Could be related to them favoring VPNs that they're working with. But that doesn't explain public trackers.... Maybe all public trackers are just honeypots that want to see your real IP address?
-
Air has port forwarding which is what you probably need. (I do know some security systems don't require port fowarding for you to be able to monitor them remotely)
However, you'll need to run VPN on a router so that the devices (blue iris) behind the router go through the VPN. That means buying another router to sit behind your ISP router.
Further steps can be discussed after you decide what to do.
-
It's just not resolving your remote address in the openvpn config because your DNS server is a private address in AirVPN's network. Since you're not connected yet, you can't access that private address to resolve the remote host.
There are 2 solutions.
1) Resolve the remote host separately, then put in the IP address of the remote server, not the domain. This keeps you to the one server. It won't be some random European server, which is what you may intend.
2) Use a public DNS in your general dd-wrt settings, then make sure that the openvpn client switches the router to VPN DNS upon connection. If your version of dd-wrt can't do that, then I suggest you find a firmware that does.
-
It's stated in the specifications that outbound port 25 is blocked to prevent spam.
-
I got to ask, cause I'm lazy to search, can pfsense be installed on this puppy
Sent from my SM-N960U using Tapatalk
No idea.
But I am curious, can this thing really do OpenVPN at 300Mbps with that CPU?
Where are you getting 300mbps from? Are you reading the wifi standard speed and confusing that with openvpn speed?
-
Merlin firmware using the policy routing option gives you the additional option to block VPN routed clients if the tunnel goes down. Is that the "killswitch" you're talking about?
-
In the past squid proxy and openvpn usage didn't play well together. What was meant to go through openvpn tunnel was in the clear. I don't know if that's still the case.
-
There are different ways to setup pfsense so this is not an easy thing to help with. And, this isn't an AirVPN topic but a pfsense topic. So, it should be moved to an off topic section.
If it were my setup I'd create NAT outgoing and LAN firewall rules that allow a device out the WAN instead of the VPN. But, I don't know how you've set yours up.
-
If you can use tls-crypt over UDP that will likely give you better speed than TCP. What port you use is up to you.
You'll need to use the tls-crypt key from a config for entry IP 3 or 4, be sure to use the correct entry IP address too, change the key usage mode to TLS encryption and authentication, and change the auth digest algorithm to SHA512.
-
DNS records don't exist yet from what I'm seeing.
-
While I agree with zhang888 that your CPU is old (8 years). It does not mean that your CPU isn't good enough for your pfSense build.
refer to these threads.
https://forum.pfsense.org/index.php?topic=128698.15
https://forum.pfsense.org/index.php?topic=130350.0
It seems that the AES-NI can be turned off since v2.4 In the OpenVPN client section; setting the Fast I/O and Send/Receive buffers set to 512 seems to speed things up (bottom of the page)
I was having some issues with my OpenVPN clients from a pfSense box. Setting the send/receive buffers to 512 more than doubled my speeds from ~10-15Mbps to 30-35Mbps on a 50Mbps internet connection. I have the SG-3100, so there's no aes-ni because it's an ARM a9 processor. Curious if you have any other suggestions?
Since its a netgate (pfsense) it has built in aes-ni into the arm chip. At 349 USD for the base it better support crypto since 2.5 will require it
https://www.netgate.com/solutions/pfsense/sg-3100.html This says nothing about AES-NI. Unfortunately, I think a lot of people will either be buying new hardware or won't be updating to 2.5.
TLS 1.3 supported on AirVPN web servers
in News and Announcement
Posted ...
Looks like I'm not the only one to "misread".
My friends, this applies to *web* servers.