Jump to content
Not connected, Your IP: 18.219.208.117

go558a83nk

Members2
  • Content Count

    2095
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    37

Posts posted by go558a83nk


  1.  

    Staff, I don't usually disagree with you but what about the point of the fast speeds to another VPN provider?

     

    Hello,

     

    how can you know whether the other provider provides connections to the same ports with the same ciphers and same protocol tried on our servers by ddrnewb or not? And even if it did, you can't assume that ddrnewb tested exactly under the same conditions both services. Actually ddrnewb did not specify anything about that, so it's not correct to make such an assumption. And as you can see from the results he/she posted, we were right, either his/her ISP is performing traffic shaping or it's his/her system to do that.

     

    Kind regards

     

    I didn't assume as much as you think.

     

    1) the OP says he doesn't like TCP, so I deduced that he would NOT have used TCP for the other VPN provider.

    2) from what I can see IPvanish employs no special obfuscation techniques.

    3) I think it's a big assumption to say that the speed difference shown is due to protocol.  it could just be because of the different time of day and all the many other things that determine internet quality.  I believe that point is made in the third speed test posted, where the speed is back down to being similar to the first even though it was an SSL tunnel test.


  2. If what Staff says is true regarding your OS and use of tunnelblick, that it ignores the DNS push from AirVPN (no reason to doubt it), then it means that if you set nicproject DNS manually in your OS you'll still be using nicproject DNS even when connected to VPN.  this isn't a bad thing.  All DNS requests will go through the tunnel, but will go to nicproject servers, not Air DNS.


  3. Air will assign you a random port that will be forwarded to you: client area > forwarded ports > click the add button.

     

    Insert that port into your P2P client in the listening port area.

     

    And go.  Simple as that.  Of course, you must be connected to an Air server and you must be running the P2P client for the port check to say the port is open.

     

    Turn UPnP and NAT-PMP and randomize port off.  You can turn UPnP off on your router too unless you need it for something else.


  4.  

    Does it mean that for example I use port 16621 for my torrent client, tixati. So I should disable port forwarding for port 16621 in my router ? 

     

    Yes or use, for your torrent client, any other port like 16622 that is closed in your router but you had set it to forward in AirVPN config. You don't have to open any port in your router for  p2p when you are connected to the VPN, just set it on port forwarding

     

    to be clear, if you are using an openvpn client, such as AirVPN's eddie, on your computer, then it's bad to open ports on you router.

     

    but, if you run VPN from your router, then you do need to forward ports in the router.


  5.  

    I think the more important use of the chains is to take advantage of better routing.

     

    For example, I can connect to USA servers directly.  But, it might be faster for me to chain through Singapore, then USA.

    A buddy actually does that for gaming because his isp's routing is really horrible. He gets better pings by jumping to a nearby vpn then to the game server.

     

    I would love to see some downloadable configs for a simple 2 server hop though. Its easy to do with a vm but being able to ssh/ssl -> vpn -> vpn would make me smile.

     

    Air has some good tricks that most other VPN don't have (SSH and SSL and great config generator) but maybe they will implement the chains as a way of keeping a step ahead of the pack. 


  6. I know of another VPN provider that has VPN chains as part of their service.  You can build your own.  The way it works is that you connect to the gateway that's the start of the chain on a unique port.  Once connected you appear to be at the end link of the chain.

     

    They sell it by saying it increases security or anonymity.  However, I think the more important use of the chains is to take advantage of better routing.

     

    For example, I can connect to USA servers directly.  But, it might be faster for me to chain through Singapore, then USA.


  7. Of those I've been a customer of Air and PIA.  I typically use my router for VPN but when I've used apps on my windows 7 machine I've had more trouble with Air leaking DNS than with PIA's app.  PIA has a DNS leak protection switch that works perfectly every time that I've used it.

     

    Edit: if you're talking about WebRTC leak then you should make another column.  DNS leaks and WebRTC protection are completely and totally different.

     

    Edit2: you make negative remarks for the use of google DNS and yet you're using a google doc spreadsheet and have a gmail address.

×
×
  • Create New...