Jump to content
Not connected, Your IP: 3.133.144.197

LZ1

Members2
  • Content Count

    2089
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    78

Reputation Activity

  1. Like
    LZ1 reacted to Staff in Can't connect. Have tried all recommended fixes.   ...
    Hello,
     
    something is blocking UDP, please check any packet filtering tool in your system and router. If you find nothing blocking then your ISP can be culprit, switch to TCP.
     
    Kind regards
  2. Like
    LZ1 reacted to sarum4n in Eddie 2.11.x cli warns about non-existant double instance   ...
    To reproduce, you have to suffer a crash from airvpn. My cron checks every hour the presence of tun0 and, if it doesn't exist, it restarts eddie by systemctl (I created a proper service). On this occasion, cron (and therefore systemctl) wasn't able to restart eddie, because of the fact that, when it crashed, its pid was still present in /tmp directory and I had to manually change its chattr before being able to delete it. As workaround, I modified my cron script: when tun0 is no more present at the check, the script now changes chattr for eddie's pid file, then deletes it and only then calls the restart by systemctl. The script works in conjunction with another script, tied to udev, but that's another story (whenever udev registers tun0 coming down, it changes the iptables rules, denying input and output to packets marked by mangle table and restoring iproute to its default values, to prevent any leak)
     
    Inviato dal mio Nexus 5 utilizzando Tapatalk
  3. Like
    LZ1 reacted to OpenSourcerer in Is this working?   ...
    LZ1 is speaking Martian -> he's coming from Mars -> he might still live there -> he wants a server in Mars because it'd be the closest server to him geographically!
     
    Mystery solved, go home everyone.
     
  4. Like
    LZ1 got a reaction from Veep Peep in Amazon Prime Streaming Blocked on 79.* servers   ...
    Hello!
     
    It's always a bit hit and miss, so one has to try different servers out . The route checking tool is the only really easy "automated" way to get a sense of which servers may be okay.
  5. Like
    LZ1 reacted to wer in Connection Refused. Problem 02.01.2017 USA (Temporarily)   ...
    Thanks a lot! Didn't know about that until now. :-)
  6. Like
    LZ1 got a reaction from wer in Connection Refused. Problem 02.01.2017 USA (Temporarily)   ...
    Hello!
     
    This has been reported here
  7. Like
    LZ1 reacted to Hengemyr in BBC Iplayer stopped working   ...
    Thank you for the very very quick reply, the community is well worth the yearly subscription  
     
    I did all of the above and switched off Internet Protocol Version 6 too as suggested by a post, now it's all working splendidly ^^ 
  8. Like
    LZ1 got a reaction from Spyker in Checking route fails   ...
    Hello!
     
    Firstly, this is a very old thread and it should be noted that people in it were running Eddie 2.8, which is ancient. The current Stable is 2.10.
     
    In the Eddie preferences, there's a tab related to OVPN directives. You may need to go into Advanced and enable Expert mode to see it.
     
    In the directives area, you can try to add
    block-outside-dnsOtherwise, look around the preferences area for "AirVPN DNS checking" and try to disable it.
     
    That should solve it. Take care
  9. Like
    LZ1 reacted to sarum4n in Eddie 2.11.x cli warns about non-existant double instance   ...
    As stated in topic title, stopping and restarting Eddie 2.11.x on a Debian GNU/Linux box makes it to warn about a previous instance still running, but that's not true, because NO Eddie instance is running (checked with ps aux). It seems critical bug to me.
     
    That's what the program tells:
    I 2016.12.17 15:41:17 - Eddie client version: 2.11.9 / linux_x64, System: Linux, Name: Debian GNU/Linux stretch/sid \n \l, Mono/.Net Framework: v4.0.30319 . 2016.12.17 15:41:17 - Reading options from /etc/airvpn/AirVPN.xml F 2016.12.17 15:41:18 - An instance of Eddie is already running.  That's my ps aux output:
     
    ps aux | grep airvpn root     12862  0.0  0.0  12804   972 pts/0    S+   15:41   0:00 grep --colour=auto airvpn    ps aux | grep openvpn root     12865  0.0  0.0  12804   972 pts/0    S+   15:42   0:00 grep --colour=auto openvpn   
    EDIT: I found an Eddie .pid file in my /tmp directory and I couldn't delete it before doing a chattr -i on it (and I was root!). This seems to me a pretty poor implementation. After deleting the .pid file, I could start Eddie again. 
  10. Like
    LZ1 reacted to ometec in random disconnects   ...
    Thanks LZ1... the response i got from the support was the advice to check my wifi connection )
    i will try the options you have shared.... cheers.. .
  11. Like
    LZ1 got a reaction from devidd55 in Cant connect to any server, always restarting   ...
    Hello!
     
    Just turn off IPv6. Support for it is planned for 2017 .
     
    Staff has said there's no DNS leaks on Linux. If you use Network Lock, then that's definitely ensured.
     
    Do check ipleak.net as well.
     
    Welcome to AirVPN and happy new year !
  12. Like
    LZ1 got a reaction from FromtheWalls in What countries do you want to see added in 2017?   ...
    Hello!

    I think Air should definitely go ahead and add in Nigeria, why not?
     
    Nigeria is fairly centrally located, meaning lots of under-served African users can get access. Nigeria isn't (even) on PIAs list of server locations it seems, which is frankly incredible in and of itself if you know PIA . Nigeria is, as of 2015, the worlds 20th largest economy, so there's plenty of room for expansion! Nigeria would be AirVPNs first African server no?, so why not! Nigeria because... Nigeria? The shock factor alone would be something to watch.
    Jokes aside haha...
     
    Cheap answer: I think Air should add the server locations that Air deems to be best for their mission and current budget and options.
     
    But otherwise I agree Iceland would be a nice to have - but I definitely don't expect it, as it seems totally unrealistic. Perhaps we should see about getting the French servers back first, if possible . More Asian servers would be really cool as well, but again, reality hits back hard. It would seem Air already has lots of things planned. Of those that I know of: IPv6 support, Eddie 3, updating client software section, re-assessing France as a server location, EFF & FSF funding, getting back to some of the other projects after Eddie is updated and probably lots more. Australia would be cool, since Australians are
    always underserved in networking-related matters haha. But personally, I don't mind if no new servers are added. I'm content.  We shouldn't forget that Air, despite being Italian, also actually still
    doesn't have any Italian servers either! So perhaps they'll be adding that again, if they can get around the legal hurdles .
     
    Happy New Year to you all ! I hope everyone, including AirVPN & Staff will have a good 2017 .
  13. Like
    LZ1 got a reaction from Ricnvolved1956 in Fake News   ...
    Takes a big man to concede anything these days. Then I bow my virtual hat to you in return. I always found CGP Greys videos on voting quite instructive for explaining all the voting-related issues. (For people who read this comment and don't know the issues with the voting systems).
  14. Like
    LZ1 got a reaction from FromtheWalls in What countries do you want to see added in 2017?   ...
    Hello!

    I think Air should definitely go ahead and add in Nigeria, why not?
     
    Nigeria is fairly centrally located, meaning lots of under-served African users can get access. Nigeria isn't (even) on PIAs list of server locations it seems, which is frankly incredible in and of itself if you know PIA . Nigeria is, as of 2015, the worlds 20th largest economy, so there's plenty of room for expansion! Nigeria would be AirVPNs first African server no?, so why not! Nigeria because... Nigeria? The shock factor alone would be something to watch.
    Jokes aside haha...
     
    Cheap answer: I think Air should add the server locations that Air deems to be best for their mission and current budget and options.
     
    But otherwise I agree Iceland would be a nice to have - but I definitely don't expect it, as it seems totally unrealistic. Perhaps we should see about getting the French servers back first, if possible . More Asian servers would be really cool as well, but again, reality hits back hard. It would seem Air already has lots of things planned. Of those that I know of: IPv6 support, Eddie 3, updating client software section, re-assessing France as a server location, EFF & FSF funding, getting back to some of the other projects after Eddie is updated and probably lots more. Australia would be cool, since Australians are
    always underserved in networking-related matters haha. But personally, I don't mind if no new servers are added. I'm content.  We shouldn't forget that Air, despite being Italian, also actually still
    doesn't have any Italian servers either! So perhaps they'll be adding that again, if they can get around the legal hurdles .
     
    Happy New Year to you all ! I hope everyone, including AirVPN & Staff will have a good 2017 .
  15. Like
    LZ1 reacted to Bong_Marley in TAP Driver 9.21.0 causing a myriad of issues.   ...
    Thanks for the tip! I think your story holds. Let me start off by saying that disabling and enabling the TAP driver ends the loop (disconnecting > authorization failed and so fort) in which Eddie gets stuck after my torrents nosedive to 0kb/s. That said, I have tried every solution available on the forum and none would work:
     
    - Reinstalling Eddie
    - Reinstalling my network drivers
    - Using a different version of Eddie (2.10 and 2.11)
    - Using a different version of the TAP driver (9.21.0, 9.21.1 and 9.21.2) -> haven't been able to install any version of the 9.9 driver on the latest build of Windows 10 (build 14393), it persistently gives me an error (which makes sense, because the driver was meant for Windows XP and older)
    - Changing the media status to always connected
     
    I have finally managed to fix the problem by changing the packet rules of my Kasperksy firewall. The local services (TCP and UDP) - inbound were set to "block". By changing them to "by application rules" and adding AirVPN and the TAP driver to the trusted applications, my problem with p2p software was fixed.
  16. Like
    LZ1 got a reaction from Zentford3 in Try before purchase   ...
    Hello!
     
    You could also get a 1 euro trial and either try to get your money back or say "nah, it's 1 euro, who am I lol" haha .
     
    Welcome to AirVPN! It's good you decided to do something for your privacy/security online, in the face of such laws (which have been much-talked about around here too).
  17. Like
    LZ1 reacted to elcr in Extremely high ping when uploading   ...
    I'm getting an extremely high ping and low speeds whenever I upload anything with the VPN on. I've tried a couple UK servers and a Belgian one and it happens on all of them.
     
    My speeds normally, with the VPN one on the right. Sadly this is the best you can get in my area.

     
    My speeds when uploading a video to YouTube. It's the exact same when uploading through other means, like seeding a torrent for example. I've seen pings anywhere from 195ms to 1150ms.

     
    The only change I've made to the client's settings was to downgrade TAP to 9.9.23 as suggested in a thread here, which fixed another issue I had wherein every time I downloaded something through Steam my entire connection would slow to around 100KB/s. I thought that change might be the source of this problem, so I upgraded it back to the most recent version, but it's no different. Furthermore, I get the same speeds if I try uploading on my phone running OpenVPN for Android. I don't know where to start trying to fix this.
     
    Logs:

    I 2016.12.30 15:11:06 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.1.7601 Service Pack 1 / x64
    . 2016.12.30 15:11:06 - Reading options from C:\Users\elcr\AppData\Local\AirVPN\AirVPN.xml
    . 2016.12.30 15:11:06 - Data Path: C:\Users\elcr\AppData\Local\AirVPN
    . 2016.12.30 15:11:06 - App Path: C:\Program Files\AirVPN
    . 2016.12.30 15:11:06 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
    . 2016.12.30 15:11:06 - Command line arguments (1): path="home"
    . 2016.12.30 15:11:06 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1
    . 2016.12.30 15:11:06 - Updating systems & servers data ...
    I 2016.12.30 15:11:06 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.9.1
    I 2016.12.30 15:11:06 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
    I 2016.12.30 15:11:06 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
    I 2016.12.30 15:11:06 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
    ! 2016.12.30 15:11:06 - Activation of Network Lock - Windows Firewall
    . 2016.12.30 15:11:07 - Systems & servers data update completed
    ! 2016.12.30 15:11:08 - Ready
    I 2016.12.30 15:11:14 - Session starting.
    I 2016.12.30 15:11:14 - Checking authorization ...
    ! 2016.12.30 15:12:27 - Connecting to Alathfar (United Kingdom, Maidenhead)
    . 2016.12.30 15:12:27 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
    . 2016.12.30 15:12:27 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
    . 2016.12.30 15:12:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
    . 2016.12.30 15:12:27 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
    . 2016.12.30 15:12:27 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2016.12.30 15:12:27 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2016.12.30 15:12:27 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
    . 2016.12.30 15:12:27 - OpenVPN > UDPv4 link local: [undef]
    . 2016.12.30 15:12:27 - OpenVPN > UDPv4 link remote: [AF_INET]185.103.96.132:443
    . 2016.12.30 15:12:27 - OpenVPN > TLS: Initial packet from [AF_INET]185.103.96.132:443, sid=4da0d8be af881a6b
    . 2016.12.30 15:12:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    . 2016.12.30 15:12:27 - OpenVPN > Validating certificate key usage
    . 2016.12.30 15:12:27 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
    . 2016.12.30 15:12:27 - OpenVPN > VERIFY KU OK
    . 2016.12.30 15:12:27 - OpenVPN > Validating certificate extended key usage
    . 2016.12.30 15:12:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    . 2016.12.30 15:12:27 - OpenVPN > VERIFY EKU OK
    . 2016.12.30 15:12:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
    . 2016.12.30 15:12:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2016.12.30 15:12:28 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2016.12.30 15:12:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2016.12.30 15:12:28 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2016.12.30 15:12:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
    . 2016.12.30 15:12:28 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]185.103.96.132:443
    . 2016.12.30 15:12:30 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
    . 2016.12.30 15:12:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.28.161 255.255.0.0'
    . 2016.12.30 15:12:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
    . 2016.12.30 15:12:30 - OpenVPN > OPTIONS IMPORT: LZO parms modified
    . 2016.12.30 15:12:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
    . 2016.12.30 15:12:30 - OpenVPN > OPTIONS IMPORT: route options modified
    . 2016.12.30 15:12:30 - OpenVPN > OPTIONS IMPORT: route-related options modified
    . 2016.12.30 15:12:30 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    . 2016.12.30 15:12:30 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    . 2016.12.30 15:12:30 - OpenVPN > open_tun, tt->ipv6=0
    . 2016.12.30 15:12:30 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{A99031A8-74C9-4244-B27A-BF61E775143F}.tap
    . 2016.12.30 15:12:30 - OpenVPN > TAP-Windows Driver Version 9.9
    . 2016.12.30 15:12:30 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.28.161/255.255.0.0 [sUCCEEDED]
    . 2016.12.30 15:12:30 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.28.161/255.255.0.0 on interface {A99031A8-74C9-4244-B27A-BF61E775143F} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
    . 2016.12.30 15:12:30 - OpenVPN > Successful ARP Flush on interface [29] {A99031A8-74C9-4244-B27A-BF61E775143F}
    . 2016.12.30 15:12:35 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
    . 2016.12.30 15:12:35 - OpenVPN > C:\Windows\system32\route.exe ADD 185.103.96.132 MASK 255.255.255.255 192.168.1.254
    . 2016.12.30 15:12:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
    . 2016.12.30 15:12:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
    . 2016.12.30 15:12:35 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 22
    . 2016.12.30 15:12:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
    . 2016.12.30 15:12:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
    . 2016.12.30 15:12:35 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
    . 2016.12.30 15:12:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    . 2016.12.30 15:12:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
    . 2016.12.30 15:12:35 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
    . 2016.12.30 15:12:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    . 2016.12.30 15:12:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
    . 2016.12.30 15:12:35 - Starting Management Interface
    . 2016.12.30 15:12:35 - OpenVPN > Initialization Sequence Completed
    I 2016.12.30 15:12:35 - DNS of a network adapter forced (TAP-Windows Adapter V9)
    I 2016.12.30 15:12:35 - DNS of a network adapter forced (ASUS USB-N53_B1 USB Wireless Adapter)
    I 2016.12.30 15:12:35 - Flushing DNS
    I 2016.12.30 15:12:35 - Checking route
    I 2016.12.30 15:12:35 - Checking DNS
    ! 2016.12.30 15:12:35 - Connected.
    . 2016.12.30 15:12:35 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
    . 2016.12.30 15:12:35 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
    ! 2016.12.30 15:15:27 - Disconnecting
    . 2016.12.30 15:15:27 - Management - Send 'signal SIGTERM'
    . 2016.12.30 15:15:27 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
    . 2016.12.30 15:15:27 - OpenVPN > SIGTERM received, sending exit notification to peer
    . 2016.12.30 15:15:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.103.96.132 MASK 255.255.255.255 192.168.1.254
    . 2016.12.30 15:15:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
    . 2016.12.30 15:15:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
    . 2016.12.30 15:15:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
    . 2016.12.30 15:15:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
    . 2016.12.30 15:15:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
    . 2016.12.30 15:15:32 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
    . 2016.12.30 15:15:32 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
    . 2016.12.30 15:15:32 - OpenVPN > Closing TUN/TAP interface
    . 2016.12.30 15:15:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
    . 2016.12.30 15:15:32 - Connection terminated.
    I 2016.12.30 15:15:32 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
    I 2016.12.30 15:15:32 - DNS of a network adapter restored to original settings (ASUS USB-N53_B1 USB Wireless Adapter)
    ! 2016.12.30 15:15:32 - Session terminated.
    ! 2016.12.30 15:15:33 - Deactivation of Network Lock
    ! 2016.12.30 15:18:43 - Activation of Network Lock - Windows Firewall
    I 2016.12.30 15:18:57 - Session starting.
    I 2016.12.30 15:18:57 - Checking authorization ...
    ! 2016.12.30 15:18:58 - Connecting to Alshain (United Kingdom, London)
    . 2016.12.30 15:18:58 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
    . 2016.12.30 15:18:58 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
    . 2016.12.30 15:18:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
    . 2016.12.30 15:18:58 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
    . 2016.12.30 15:18:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2016.12.30 15:18:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2016.12.30 15:18:58 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
    . 2016.12.30 15:18:58 - OpenVPN > UDPv4 link local: [undef]
    . 2016.12.30 15:18:58 - OpenVPN > UDPv4 link remote: [AF_INET]217.151.98.162:443
    . 2016.12.30 15:18:58 - OpenVPN > TLS: Initial packet from [AF_INET]217.151.98.162:443, sid=b0c6ab85 a97c2907
    . 2016.12.30 15:18:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    . 2016.12.30 15:18:58 - OpenVPN > Validating certificate key usage
    . 2016.12.30 15:18:58 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
    . 2016.12.30 15:18:58 - OpenVPN > VERIFY KU OK
    . 2016.12.30 15:18:58 - OpenVPN > Validating certificate extended key usage
    . 2016.12.30 15:18:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    . 2016.12.30 15:18:58 - OpenVPN > VERIFY EKU OK
    . 2016.12.30 15:18:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
    . 2016.12.30 15:19:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2016.12.30 15:19:03 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2016.12.30 15:19:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2016.12.30 15:19:03 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2016.12.30 15:19:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
    . 2016.12.30 15:19:03 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]217.151.98.162:443
    . 2016.12.30 15:19:05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
    . 2016.12.30 15:19:05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.159 255.255.0.0'
    . 2016.12.30 15:19:05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
    . 2016.12.30 15:19:05 - OpenVPN > OPTIONS IMPORT: LZO parms modified
    . 2016.12.30 15:19:05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
    . 2016.12.30 15:19:05 - OpenVPN > OPTIONS IMPORT: route options modified
    . 2016.12.30 15:19:05 - OpenVPN > OPTIONS IMPORT: route-related options modified
    . 2016.12.30 15:19:05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    . 2016.12.30 15:19:05 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    . 2016.12.30 15:19:05 - OpenVPN > open_tun, tt->ipv6=0
    . 2016.12.30 15:19:05 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{A99031A8-74C9-4244-B27A-BF61E775143F}.tap
    . 2016.12.30 15:19:05 - OpenVPN > TAP-Windows Driver Version 9.9
    . 2016.12.30 15:19:05 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.159/255.255.0.0 [sUCCEEDED]
    . 2016.12.30 15:19:05 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.159/255.255.0.0 on interface {A99031A8-74C9-4244-B27A-BF61E775143F} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
    . 2016.12.30 15:19:05 - OpenVPN > Successful ARP Flush on interface [29] {A99031A8-74C9-4244-B27A-BF61E775143F}
    . 2016.12.30 15:19:10 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
    . 2016.12.30 15:19:10 - OpenVPN > C:\Windows\system32\route.exe ADD 217.151.98.162 MASK 255.255.255.255 192.168.1.254
    . 2016.12.30 15:19:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
    . 2016.12.30 15:19:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
    . 2016.12.30 15:19:10 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 22
    . 2016.12.30 15:19:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
    . 2016.12.30 15:19:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
    . 2016.12.30 15:19:10 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
    . 2016.12.30 15:19:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    . 2016.12.30 15:19:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
    . 2016.12.30 15:19:10 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
    . 2016.12.30 15:19:10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    . 2016.12.30 15:19:10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
    . 2016.12.30 15:19:10 - Starting Management Interface
    . 2016.12.30 15:19:10 - OpenVPN > Initialization Sequence Completed
    I 2016.12.30 15:19:10 - DNS of a network adapter forced (TAP-Windows Adapter V9)
    I 2016.12.30 15:19:10 - DNS of a network adapter forced (ASUS USB-N53_B1 USB Wireless Adapter)
    I 2016.12.30 15:19:10 - Flushing DNS
    I 2016.12.30 15:19:10 - Checking route
    I 2016.12.30 15:19:10 - Checking DNS
    ! 2016.12.30 15:19:10 - Connected.
    . 2016.12.30 15:19:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
    . 2016.12.30 15:19:10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
    ! 2016.12.30 15:22:04 - Disconnecting
    . 2016.12.30 15:22:04 - Management - Send 'signal SIGTERM'
    . 2016.12.30 15:22:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
    . 2016.12.30 15:22:04 - OpenVPN > SIGTERM received, sending exit notification to peer
    . 2016.12.30 15:22:07 - Updating systems & servers data ...
    . 2016.12.30 15:22:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 217.151.98.162 MASK 255.255.255.255 192.168.1.254
    . 2016.12.30 15:22:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
    . 2016.12.30 15:22:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.254 MASK 255.255.255.255 192.168.1.254
    . 2016.12.30 15:22:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
    . 2016.12.30 15:22:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
    . 2016.12.30 15:22:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
    . 2016.12.30 15:22:09 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
    . 2016.12.30 15:22:09 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
    . 2016.12.30 15:22:09 - OpenVPN > Closing TUN/TAP interface
    . 2016.12.30 15:22:09 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
    . 2016.12.30 15:22:09 - Connection terminated.
    I 2016.12.30 15:22:09 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
    I 2016.12.30 15:22:09 - DNS of a network adapter restored to original settings (ASUS USB-N53_B1 USB Wireless Adapter)
    ! 2016.12.30 15:22:09 - Session terminated.
    ! 2016.12.30 15:22:11 - Deactivation of Network Lock
    . 2016.12.30 15:22:18 - Systems & servers data update completed
    ! 2016.12.30 15:26:46 - Activation of Network Lock - Windows Firewall
    I 2016.12.30 15:26:50 - Session starting.
    I 2016.12.30 15:26:50 - Checking authorization ...
    ! 2016.12.30 15:26:51 - Connecting to Alshain (United Kingdom, London)
    . 2016.12.30 15:26:51 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
    . 2016.12.30 15:26:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
    . 2016.12.30 15:26:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
    . 2016.12.30 15:26:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
    . 2016.12.30 15:26:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2016.12.30 15:26:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2016.12.30 15:26:51 - OpenVPN > Socket Buffers: R=[8192->131072] S=[8192->131072]
    . 2016.12.30 15:26:51 - OpenVPN > UDPv4 link local: [undef]
    . 2016.12.30 15:26:51 - OpenVPN > UDPv4 link remote: [AF_INET]217.151.98.162:443
    . 2016.12.30 15:26:51 - OpenVPN > TLS: Initial packet from [AF_INET]217.151.98.162:443, sid=a9a0f136 cc917eca
    . 2016.12.30 15:26:51 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    . 2016.12.30 15:26:51 - OpenVPN > Validating certificate key usage
    . 2016.12.30 15:26:51 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0
    . 2016.12.30 15:26:51 - OpenVPN > VERIFY KU OK
    . 2016.12.30 15:26:51 - OpenVPN > Validating certificate extended key usage
    . 2016.12.30 15:26:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    . 2016.12.30 15:26:51 - OpenVPN > VERIFY EKU OK
    . 2016.12.30 15:26:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
    . 2016.12.30 15:26:51 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2016.12.30 15:26:51 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2016.12.30 15:26:51 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2016.12.30 15:26:51 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2016.12.30 15:26:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
    . 2016.12.30 15:26:51 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]217.151.98.162:443
    . 2016.12.30 15:26:53 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
    . 2016.12.30 15:26:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.159 255.255.0.0'
    . 2016.12.30 15:26:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
    . 2016.12.30 15:26:54 - OpenVPN > OPTIONS IMPORT: LZO parms modified
    . 2016.12.30 15:26:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
    . 2016.12.30 15:26:54 - OpenVPN > OPTIONS IMPORT: route options modified
    . 2016.12.30 15:26:54 - OpenVPN > OPTIONS IMPORT: route-related options modified
    . 2016.12.30 15:26:54 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    . 2016.12.30 15:26:54 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
    . 2016.12.30 15:26:54 - OpenVPN > open_tun, tt->ipv6=0
    . 2016.12.30 15:26:54 - OpenVPN > TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{A99031A8-74C9-4244-B27A-BF61E775143F}.tap
    . 2016.12.30 15:26:54 - OpenVPN > TAP-Windows Driver Version 9.9
    . 2016.12.30 15:26:54 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.159/255.255.0.0 [sUCCEEDED]
    . 2016.12.30 15:26:54 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.159/255.255.0.0 on interface {A99031A8-74C9-4244-B27A-BF61E775143F} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
    . 2016.12.30 15:26:54 - OpenVPN > Successful ARP Flush on interface [29] {A99031A8-74C9-4244-B27A-BF61E775143F}
    . 2016.12.30 15:26:59 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
    . 2016.12.30 15:26:59 - OpenVPN > C:\Windows\system32\route.exe ADD 217.151.98.162 MASK 255.255.255.255 192.168.1.254
    . 2016.12.30 15:26:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
    . 2016.12.30 15:26:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
    . 2016.12.30 15:26:59 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.254 MASK 255.255.255.255 192.168.1.254 IF 22
    . 2016.12.30 15:26:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
    . 2016.12.30 15:26:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
    . 2016.12.30 15:26:59 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
    . 2016.12.30 15:26:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    . 2016.12.30 15:26:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
    . 2016.12.30 15:26:59 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
    . 2016.12.30 15:26:59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    . 2016.12.30 15:26:59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
    . 2016.12.30 15:26:59 - Starting Management Interface
    . 2016.12.30 15:26:59 - OpenVPN > Initialization Sequence Completed
    I 2016.12.30 15:26:59 - DNS of a network adapter forced (TAP-Windows Adapter V9)
    I 2016.12.30 15:26:59 - DNS of a network adapter forced (ASUS USB-N53_B1 USB Wireless Adapter)
    I 2016.12.30 15:26:59 - Flushing DNS
    I 2016.12.30 15:26:59 - Checking route
    I 2016.12.30 15:26:59 - Checking DNS
    ! 2016.12.30 15:26:59 - Connected.
    . 2016.12.30 15:26:59 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
    . 2016.12.30 15:26:59 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

  18. Like
    LZ1 got a reaction from amazeballs in PIA does something else good   ...
    Hello!
     
    Makes you wish they'd invest the same into their own client firstly lol. What's the point in having the latest security review of X, Y, Z, when your own software is classed as malware. While I certainly think it looks cool to do this, it's just marketing. It seems they're always trying to "show up" everyone else, by talking about how good they are, what they're doing and so forth. But in a sense, I feel that talk is cheap. If they would actually back it up and "get the basics" down first, then I'd see more value in that move. Thank you for sharing of course . I do wish AirVPN would be *just a little* more like PIA in terms of announcing though.
  19. Like
    LZ1 got a reaction from amazeballs in EFF & FSF Support?   ...
    Hello !
     
    Would AirVPN be interested in supporting the Electronic Frontier Foundation and/or the Free Software Foundation? No specific project or technology as such.
     
    It seems a bit remiss of AirVPN to not support these, in my view .
     

    About The EFF

    The Electronic Frontier Foundation is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. We work to ensure that rights and freedoms are enhanced and protected as our use of technology grows.

    Even in the fledgling days of the Internet, EFF understood that protecting access to developing technology was central to advancing freedom for all. In the years that followed, EFF used our fiercely independent voice to clear the way for open source software, encryption, security research, file sharing tools, and a world of emerging technologies.

    Today, EFF uses the unique expertise of leading technologists, activists, and attorneys in our efforts to defend free speech online, fight illegal surveillance, advocate for users and innovators, and support freedom-enhancing technologies.

    Together, we forged a vast network of concerned members and partner organizations spanning the globe. EFF advises policymakers and educates the press and the public through comprehensive analysis, educational guides, activist workshops, and more. EFF empowers hundreds of thousands of individuals through our Action Center and has become a leading voice in online rights debates.

    EFF is a donor-funded US 501©(3) nonprofit organization that depends on your support to continue fighting for users. 

    About The FSF

    The Free Software Foundation (FSF) is a nonprofit with a worldwide mission to promote computer user freedom. We defend the rights of all software users.

    As our society grows more dependent on computers, the software we run is of critical importance to securing the future of a free society. Free software is about having control over the technology we use in our homes, schools and businesses, where computers work for our individual and communal benefit, not for proprietary software companies or governments who might seek to restrict and monitor us. The Free Software Foundation exclusively uses free software to perform its work.

    The Free Software Foundation is working to secure freedom for computer users by promoting the development and use of free (as in freedom) software and documentation—particularly the GNU operating system—and by campaigning against threats to computer user freedom like Digital Restrictions Management (DRM) and software patents. 
    Why should AirVPN do it? Because:
    Both organisations routinely make new technologies available which help to enhance peoples freedoms. Not just software-wise either, but hardware too. Both organisations comply with AirVPNs mission on multiple levels. Many kinds of freedom form the basis of free societies. Free speech, freedom of assembly, etc. So what about free software/privacy? The EFF fights the required legal battles that come before or after new technology or laws that limit, constrict and/or endanger us all in more ways than one. The FSF provides a completely different philosophy/approach to hardware and software; namely that it should be completely free. Not proprietary & closed. Eddie being open helps us all. Support will also mean even more support for software like HTTPS Everywhere, which both the EFF & The Tor Project made. AirVPN already supports The Tor Project, so why not add the EFF? Because the FSF is a hardcore supporter of free software & freedom of software provides a range of benefits for everyone:
    As a software developer, free software lets you build and improve on the work of others, as part of a social community — built on the principles of sharing.
    As an artist, you can do things with free software that proprietary software does not allow. All free software allows you to use it for any purpose.
    As a user, free software removes you from the power struggle of proprietary software, where you are able to help yourself and are not dependent on a single developer or company to help you.
    As a student, you can study and modify the software you use, learning from and enhancing the tools that you use for education.

    I think it's one thing to support various technical means of opposing state & company control, closedness and censorship, but quite another thing to oppose these things through legal means.
    Because while technical tools are great, one could argue that we shouldn't, in an ideal world, even need them. But we do, because various laws force us to, if we want to maintain
    a shred of privacy and security. But whether or not these organisations do battle legally, they both still provide a wealth of different tools and technologies which help advance
    AirVPNs mission. So in a sense, it's like a package deal !
     
    Even the best VPN in the galaxy won't have much to say in the face of running on a compromised system.
    Even the best combination of security practices, software & hardware can come under attack when governments give themselves permission to do things that are illegal & immoral for everyone else to do.
     
    In addition, supporting organisations which fight the necessary legal battles, could perhaps have direct implications for AirVPNs server locations, as Air writes:


    Of course there's many parameters to take into account when it comes to server locations; not least cost & infrastructure availability. But I'm sure we can agree that it's easier to set up a server in a
    country that doesn't have laws or systems hostile to AirVPNs mission statement; perhaps one of the major reasons we haven't had many Iranian and Mainland Chinese servers, hmm?
    For a primer on what the FSF is really about, you can watch this.
     
    Thank you :]
  20. Like
    LZ1 reacted to chemist80 in Routing an IP address not through VPN   ...
    for those having this problem I think I've sorted it by using Policy Based Routing, the thread below has more info 
     
    http://download1.dd-wrt.de/phpBB2/viewtopic.php?t=288386&sid=b4ce5a4157d808613d8ffcba0d9a58ce
  21. Like
    LZ1 reacted to dr_kristau in AirVPN_Europe_SSH-22-AltEntry.sh   ...
    Final one on this (I hope). The cut out in under 250 seconds only seems to occur when opening a tunnel (SSH or SSL) at boot-up time using scripts in the /etc/network/if-up.d - if I let the system boot up without modifying network features and then apply the tunnel and VPN, I don't get this limit.
     
    So I created a series of shell scripts on my desktop to compare various protocols all using the Ancha server (NL). I got (% of download speed):
    UDP-443:  39%
    TCP-443:  81%
    SSH-22:    78%
    SSL-443:   96%
     
    I post this hoping somebody in the future may find it useful.
  22. Like
    LZ1 reacted to Keksjdjdke in VPN on Demand iOS   ...
    I managed to get openvpn connect on iOS to stay connected to the airvpn servers. Here are my ovpn settings I use. 
    Added "remote-random" thank you giganerd.

    clientdev tunproto udpremote-randomremote 173.234.159.194 443 udpremote 199.241.146.178 443 udpremote 104.129.24.154 443 udpremote 199.241.147.34 443 udpremote 46.21.151.106 443 udpremote 107.183.238.178 443 udpremote 23.88.114.42 443 udpremote 23.88.114.50 443 udpremote 173.44.55.178 443 udpremote 149.255.33.154 443 udpremote 198.98.113.154 443 udpremote 64.120.44.138 443 udpremote 104.129.24.178 443 udpremote 96.47.229.58 443 udpremote 173.44.55.154 443 udpremote 198.203.28.42 443 udpremote 23.88.99.194 443 udpremote 104.243.24.235 443 udpremote 199.241.146.162 443 udpremote 94.100.23.162 443 udpremote 104.129.24.186 443 udpremote 107.183.238.194 443 udpremote 107.183.238.186 443 udpremote 46.21.154.82 443 udpremote 71.19.252.31 443 udpremote 71.19.252.26 443 udpremote 71.19.252.21 443 udpremote 71.19.249.195 443 udpremote 199.19.94.132 443 udpremote 184.75.221.2 443 udpremote 199.19.94.61 443 udpremote 199.19.95.187 443 udpremote 104.254.90.250 443 udpremote 104.254.90.242 443 udpremote 199.21.149.44 443 udpremote 104.254.90.234 443 udpremote 184.75.214.162 443 udpremote 184.75.223.234 443 udpremote 184.75.221.210 443 udpremote 184.75.221.162 443 udpremote 184.75.221.170 443 udpremote 104.254.90.202 443 udpremote 199.19.94.12 443 udpremote 184.75.221.202 443 udpremote 162.219.176.2 443 udpremote 184.75.223.210 443 udp  resolv-retry 1ping-restart 10nobindpersist-keypersist-tunremote-cert-tls servercipher AES-256-CBCcomp-lzo noverb 3explicit-exit-notify 5ping-restart 5 key-direction 1And here is a photo of the openvpn settings I use. "these are located under iOS settings" try to copy theses settings to your iOS device to see if it fixes your problem.
  23. Like
    LZ1 reacted to dr_kristau in AirVPN_Europe_SSH-22-AltEntry.sh   ...
    Have now got this working. These are the steps (NB using AirVPN_Europe_SSH-22.sh instead of AirVPN_Europe_SSH-22-AltEntry.sh):
    1) modify the AirVPN_Europe_SSH-22.sh so that the path to sshtunnel.key is correct
    2) run the file (e.g. sudo /etc/openvpn/AirVPN_Europe_SSH-22.sh)
    3) the SSH tunnel is now working - we can now open a new terminal window and run the ovpn file (e.g. sudo openvpn /etc/openvpn/AirVPN_Europe_SSH-22.ovpn)
     
    this will give you AirVPN working through an SSH tunnel. To have this work automatically at start up:
    1) move the AirVPN_Europe_SSH-22.sh and sshtunnel.key to /etc/network/if-up.d
    2) again, modify the path to sshtunnel.key in the AirVPN_Europe_SSH-22.sh
    3) rename AirVPN_Europe_SSH-22.ovpn to AirVPN_Europe_SSH-22.conf and put it in the /etc/openvpn/ directory
    4) modify /etc/default/openvpn to use the conf file (e.g. AUTOSTART="AirVPN_Europe_SSH-22")
    5) reboot
     
    this works fine (apart from the fact that the xrdp connection no longer works), but my ISP seems to block this configuration - in under 250 seconds the connection is cut (the line is still open from another machine (without a VPN or SSH tunnel) connected to the same router). Using a plain VPN connection (e.g. AirVPN_Netherlands_UDP-2018.ovpn) works without a problem. I'll check if this is true for all possible Air SSH connections.
  24. Like
    LZ1 got a reaction from M_O_Z_G in Alternative contacts and Billing Info?   ...
    Hello!
     
    "Alternative contacts allow other users to contact support and pay invoices on your behalf."
     
    You don't have to use these areas though. You simply make an account and pay for a plan through a given method. I imagine the billing information section is just a feature of IPboard and not actually used by many ^^. But it could be handy during checkout. Welcome to AirVPN by the way!
  25. Like
    LZ1 reacted to betacat in Air VPN Connects on Mac but Doesn't Change IP   ...
    Thanks to AirVPN support, I found a solution...

    I needed to disable the IPv6 protocol for my tower's Ethernet card. To do this in Mac OS X 10.5 & later:

    1. Go to Apple menu > System Preferences > Internet & Wireless > Network
    2. Click the active (green dot) connection (mine was Ethernet 1), then click Advanced.
    3. Click the TCP/IP tab. From the pull-down menu next to "Configure IPv6:", choose Off. Click OK, then Apply.

    Alternately I understand that you can disable IPv6 on your router, or block it with firewall rules (ipfw), but the method above worked for me.
×
×
  • Create New...