Jump to content
Not connected, Your IP: 3.147.89.85

Search the Community

Showing results for 'china'.


Didn't find what you were looking for? Try searching for:


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 446 results

  1. I love this server! is the better from Ningbo, china
  2. I'm having a similar problem. I connect, but as soon as I get my browser (Chrome) to load a website I get blocked. After a while I tried pinging "baidu.com" in a terminal. Eddie would connect and I saw that my pings were returning slower (as expected). As long as I left things like that I had no problem. As soon as I tried to bring up a website in a browser the pings stopped returning and the page refused to load. If I waited long enough Eddie would break the connection and try a different server. However, I noticed several times Eddie couldn't even reload the server list. Right now I'm browsing via SSH through a VPS I set up in the States. I've tried SSL, SSH, and even tried setting up my own Socks proxy with Eddie doing the rest. Same result every time. Now part of the problem could be I'm at a coffee shop and not at home, but this place often has blazing speeds. As a side issue not directly related, my VPS has a L2TP/IPSec VPN running on it. That connection gets stopped cold. Oddly enough this SSH tunnel seems to be ok, though I've heard/read rumors that SSH encryption has been broken by China. As for my setup, I'm running Mint Linux 17.2 (based on Ubuntu 14.04), kernel 3.16.0-38-generic. BlockAfterConnect-June-1AirVPN_20160601_144521.txt
  3. Hi, I've tried using SSL tunnel port 443 in preferences. Also tried various servers including Singapore, but no luck, it won't connect, it just gets stuck in cycles of retrying. Thanks
  4. Hong Kong is an autonomous region of China. Basically it can run itself apart from China but, China doesn't want it to and wants it back within Chinese borders. It's a complicated situation and there is plenty of literature on the matter. Google it! Or as Zhang would say DuckDuckGo it!
  5. Just a silly question, if China is so heavily censored how does Hong Kong get away with it.
  6. Yes, your location does make a difference and the AirVPN client doesn't always choose the best server connection. Eddie may say Sweden has the best connection, but that may not be the reality in your part of the world. Apparent proximity (geographically speaking) doesn't always provide logical solutions either. I'm in China so you'd think a server in Singapore or Hong Kong would be much better than one in, say, Canada. Not always so, especially depending on what's going on here in China.
  7. Hello, What do you think about this: http://www.opera.com/blogs/desktop/2016/04/free-vpn-integrated-opera-for-windows-mac/ I have been using Opera for a long time. I have to change it when they switch to chromium engine. Unfortunately the newest version of chrome crash more and more times so I have back to Opera again. The newest version is very low resources consumption. In my opinion free VPN is not a good idea, nobody now if they keep logs especially that Opera is going to be sold to China. http://www.bloomberg.com/news/articles/2016-02-10/opera-software-gets-agreed-takeover-offer-valued-at-1-2-billion
  8. Is it possible for AirVPN to purchase a server in South Korea?, i have read that their average internet speeds are even faster than Europe. Is there unsuitable laws for them to operate there? I personally do not live in China or Australia, but i do wonder if a VPN endpoint there could provide more bandwidth that is faster. http://tinyurl.com/ptc6s5y
  9. Hello ! Wow, I guess AirVPN gets a lot of Canadian users or something? Haha. Personally, I'd love more Asian servers. I guess there will never be AirVPN servers in China, ahah. HK doesn't count as China .
  10. Running Fedora 21, KDE I'm in china Trying to connect via SSH. I tried all 4 port options listed. Same error. I know SSH works (I'm using it right now). In the AirVPN client, I authorize, it gets to local forwarding, and then kills. Is this a setting in the client or is something happening with Fedora that's blocking it? I 2016.04.13 15:59:41 - AirVPN client version: 2.10.3 / x64, System: Linux, Name: Fedora release 21 (Twenty One)Kernel \r on an \m (\l) / x64. 2016.04.13 15:59:41 - Reading options from /home/blaze/.airvpn/AirVPN.xml. 2016.04.13 15:59:41 - Data Path: /home/blaze/.airvpn. 2016.04.13 15:59:41 - App Path: /usr/lib64/AirVPN. 2016.04.13 15:59:41 - Executable Path: /usr/lib64/AirVPN/AirVPN.exe. 2016.04.13 15:59:41 - Command line arguments (1): path="/home/blaze/.airvpn". 2016.04.13 15:59:41 - Updating systems & servers data .... 2016.04.13 15:59:41 - Operating System: Unix 4.1.13.100 - Linux localhost.localdomain 4.1.13-100.fc21.x86_64 #1 SMP Tue Nov 10 13:13:20 UTC 2015 x86_64 x86_64 x86_64 GNU/LinuxI 2016.04.13 15:59:41 - OpenVPN Driver - Found, /dev/net/tunI 2016.04.13 15:59:41 - OpenVPN - Version: OpenVPN 2.3.8 (/usr/sbin/openvpn)I 2016.04.13 15:59:41 - SSH - Version: OpenSSH_6.6.1p1, OpenSSL 1.0.1k-fips 8 Jan 2015 (/usr/bin/ssh)I 2016.04.13 15:59:41 - SSL - Version: stunnel 5.06 (/usr/lib64/AirVPN/stunnel)! 2016.04.13 15:59:41 - Ready. 2016.04.13 15:59:55 - Systems & servers data update completedI 2016.04.13 15:59:55 - Session starting.I 2016.04.13 15:59:59 - Checking authorization ...! 2016.04.13 16:00:00 - Connecting to Cynosura (Canada, Vancouver). 2016.04.13 16:00:00 - SSH > OpenSSH_6.6.1, OpenSSL 1.0.1k-fips 8 Jan 2015. 2016.04.13 16:00:00 - SSH > debug1: Reading configuration data /etc/ssh/ssh_config. 2016.04.13 16:00:00 - SSH > debug1: /etc/ssh/ssh_config line 56: Applying options for *. 2016.04.13 16:00:00 - SSH > debug1: Connecting to 71.19.252.23 [71.19.252.23] port 53.. 2016.04.13 16:00:00 - SSH > debug1: Connection established.. 2016.04.13 16:00:00 - SSH > debug1: permanently_set_uid: 0/0. 2016.04.13 16:00:00 - SSH > debug1: identity file /home/blaze/.airvpn/189e8ed5e7f10a9ac107404f1e5579080d0bbc5c0c91387a7f624295a65dfb4f.tmp.key type -1. 2016.04.13 16:00:00 - SSH > debug1: identity file /home/blaze/.airvpn/189e8ed5e7f10a9ac107404f1e5579080d0bbc5c0c91387a7f624295a65dfb4f.tmp.key-cert type -1. 2016.04.13 16:00:00 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.13 16:00:00 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.6.1. 2016.04.13 16:00:02 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.13 16:00:02 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH* compat 0x04000000. 2016.04.13 16:00:02 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.13 16:00:02 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.13 16:00:02 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.13 16:00:02 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.13 16:00:02 - SSH > debug1: kex: curve25519-sha256@libssh.org need=20 dh_need=20. 2016.04.13 16:00:02 - SSH > debug1: sending SSH2_MSG_KEX_ECDH_INIT. 2016.04.13 16:00:02 - SSH > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY. 2016.04.13 16:00:02 - SSH > debug1: Server host key: ECDSA be:eb:33:ee:f6:ee:81:82:bb:46:76:ce:34:af:4b:20. 2016.04.13 16:00:02 - SSH > debug1: checking without port identifier. 2016.04.13 16:00:02 - SSH > Warning: Permanently added '[71.19.252.23]:53' (ECDSA) to the list of known hosts.. 2016.04.13 16:00:02 - SSH > debug1: ssh_ecdsa_verify: signature correct. 2016.04.13 16:00:02 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.13 16:00:02 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.13 16:00:02 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.13 16:00:02 - SSH > debug1: Roaming not allowed by server. 2016.04.13 16:00:02 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.13 16:00:03 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.13 16:00:03 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.13 16:00:03 - SSH > debug1: Next authentication method: publickey. 2016.04.13 16:00:03 - SSH > debug1: Trying private key: /home/blaze/.airvpn/189e8ed5e7f10a9ac107404f1e5579080d0bbc5c0c91387a7f624295a65dfb4f.tmp.key. 2016.04.13 16:00:03 - SSH > debug1: key_parse_private2: missing begin marker. 2016.04.13 16:00:03 - SSH > debug1: read PEM private key done: type RSA. 2016.04.13 16:00:03 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.13 16:00:03 - SSH > Authenticated to 71.19.252.23 ([71.19.252.23]:53).. 2016.04.13 16:00:03 - SSH > debug1: Local connections to LOCALHOST:25316 forwarded to remote address 127.0.0.1:2018. 2016.04.13 16:00:03 - SSH > debug1: Local forwarding listening on ::1 port 25316.. 2016.04.13 16:00:03 - SSH > debug1: channel 0: new [port listener]. 2016.04.13 16:00:03 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 25316.. 2016.04.13 16:00:03 - SSH > debug1: channel 1: new [port listener]. 2016.04.13 16:00:03 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.13 16:00:03 - SSH > debug1: Entering interactive session.. 2016.04.13 16:00:03 - OpenVPN > OpenVPN 2.3.8 x86_64-redhat-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Aug 4 2015. 2016.04.13 16:00:03 - OpenVPN > library versions: OpenSSL 1.0.1k-fips 8 Jan 2015, LZO 2.08. 2016.04.13 16:00:03 - Auto retry with another port.. 2016.04.13 16:00:03 - OpenVPN > MANAGEMENT: Socket bind failed on local address [AF_INET]7.0.0.1:3203: Cannot assign requested address. 2016.04.13 16:00:03 - OpenVPN > Exiting due to fatal error! 2016.04.13 16:00:04 - Disconnecting. 2016.04.13 16:00:04 - Connection terminated.I 2016.04.13 16:00:07 - Checking authorization ...! 2016.04.13 16:00:08 - Connecting to Cynosura (Canada, Vancouver). 2016.04.13 16:00:08 - SSH > OpenSSH_6.6.1, OpenSSL 1.0.1k-fips 8 Jan 2015. 2016.04.13 16:00:08 - SSH > debug1: Reading configuration data /etc/ssh/ssh_config. 2016.04.13 16:00:08 - SSH > debug1: /etc/ssh/ssh_config line 56: Applying options for *. 2016.04.13 16:00:08 - SSH > debug1: Connecting to 71.19.252.23 [71.19.252.23] port 53.. 2016.04.13 16:00:08 - SSH > debug1: Connection established.. 2016.04.13 16:00:08 - SSH > debug1: permanently_set_uid: 0/0. 2016.04.13 16:00:08 - SSH > debug1: identity file /home/blaze/.airvpn/a4efbef29b08d78051b928fdfcca999aa03a9d699b425841ab069cdce4a06957.tmp.key type -1. 2016.04.13 16:00:08 - SSH > debug1: identity file /home/blaze/.airvpn/a4efbef29b08d78051b928fdfcca999aa03a9d699b425841ab069cdce4a06957.tmp.key-cert type -1. 2016.04.13 16:00:08 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.13 16:00:08 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.6.1. 2016.04.13 16:00:08 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.13 16:00:08 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH* compat 0x04000000. 2016.04.13 16:00:08 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.13 16:00:08 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.13 16:00:08 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.13 16:00:08 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.13 16:00:08 - SSH > debug1: kex: curve25519-sha256@libssh.org need=20 dh_need=20. 2016.04.13 16:00:08 - SSH > debug1: sending SSH2_MSG_KEX_ECDH_INIT. 2016.04.13 16:00:08 - SSH > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY. 2016.04.13 16:00:09 - SSH > debug1: Server host key: ECDSA be:eb:33:ee:f6:ee:81:82:bb:46:76:ce:34:af:4b:20. 2016.04.13 16:00:09 - SSH > debug1: checking without port identifier. 2016.04.13 16:00:09 - SSH > Warning: Permanently added '[71.19.252.23]:53' (ECDSA) to the list of known hosts.. 2016.04.13 16:00:09 - SSH > debug1: ssh_ecdsa_verify: signature correct. 2016.04.13 16:00:09 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.13 16:00:09 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.13 16:00:09 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.13 16:00:09 - SSH > debug1: Roaming not allowed by server. 2016.04.13 16:00:09 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.13 16:00:09 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.13 16:00:09 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.13 16:00:09 - SSH > debug1: Next authentication method: publickey. 2016.04.13 16:00:09 - SSH > debug1: Trying private key: /home/blaze/.airvpn/a4efbef29b08d78051b928fdfcca999aa03a9d699b425841ab069cdce4a06957.tmp.key. 2016.04.13 16:00:09 - SSH > debug1: key_parse_private2: missing begin marker. 2016.04.13 16:00:09 - SSH > debug1: read PEM private key done: type RSA. 2016.04.13 16:00:10 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.13 16:00:10 - SSH > Authenticated to 71.19.252.23 ([71.19.252.23]:53).. 2016.04.13 16:00:10 - SSH > debug1: Local connections to LOCALHOST:38586 forwarded to remote address 127.0.0.1:2018. 2016.04.13 16:00:10 - SSH > debug1: Local forwarding listening on ::1 port 38586.. 2016.04.13 16:00:10 - SSH > debug1: channel 0: new [port listener]. 2016.04.13 16:00:10 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 38586.. 2016.04.13 16:00:10 - SSH > debug1: channel 1: new [port listener]. 2016.04.13 16:00:10 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.13 16:00:10 - SSH > debug1: Entering interactive session.. 2016.04.13 16:00:10 - OpenVPN > OpenVPN 2.3.8 x86_64-redhat-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [iPv6] built on Aug 4 2015. 2016.04.13 16:00:10 - OpenVPN > library versions: OpenSSL 1.0.1k-fips 8 Jan 2015, LZO 2.08. 2016.04.13 16:00:10 - Auto retry with another port.. 2016.04.13 16:00:10 - OpenVPN > MANAGEMENT: Socket bind failed on local address [AF_INET]7.0.0.1:3204: Cannot assign requested address. 2016.04.13 16:00:10 - OpenVPN > Exiting due to fatal error! 2016.04.13 16:00:10 - Disconnecting. 2016.04.13 16:00:10 - Connection terminated.I 2016.04.13 16:00:13 - Checking authorization ...I 2016.04.13 16:00:14 - Cancel requested.! 2016.04.13 16:00:14 - Session terminated.
  11. Hello all I was a long time user of perfect privacy until I found out that they were neo-Nazis in 2012please see this article for more informationhttps://linksunten.indymedia.org/en/node/61004 now with that being said when I use their service from 2009 to 2012 that a very diverse number of servers includingcyberjaya.perfect-privacy.com (Malaysia)shanghai.perfect-privacy.com (China)hongkong.perfect-privacy.com (China)teheran.perfect-privacy.com (Iran)telaviv.perfect-privacy.com (Israel)moscow.perfect-privacy.com (Russia) [3 servers]kiev.perfect-privacy.com (Ukraine)stockholm.perfect-privacy.com (Sweden)bucharest.perfect-privacy.com (Romania)erfurt.perfect-privacy.com (Germany) [5 servers]zurich.perfect-privacy.com (Switzerland) [2 servers]steinsel.perfect-privacy.com (Luxembourg) [8 servers]amsterdam.perfect-privacy.com (The Netherlands) [4 servers]rotterdam.perfect-privacy.com (The Netherlands) [4 servers]lyon.perfect-privacy.com (France)london.perfect-privacy.com (United Kingdom) [3 servers]southampton.perfect-privacy.com (United Kingdom)montreal.perfect-privacy.com (Canada) [5 servers]chicago.perfect-privacy.com (Illinois, USA)sandiego.perfect-privacy.com (California, USA)losangeles.perfect-privacy.com (California, USA)plaza.perfect-privacy.com (Panama)buenosaires.perfect-privacy.com (Argentina)list for my last gathered from my last account extension emailencryption was extremely high for my apologies for not being able to provide the details regarding the encryption used at the time in addition to that they didn't keep any loss to the best of my knowledge taking their word for it they provided standard open VPN based configuration files with the standard open source open VPN client in addition to that they also offered ssh tunnelling I'm curious as to whether anybody else was a customer of theirs but them jump ship because of the Nazi tiesplease note I am disabled and use speech recognition software which is not always 100% accurate so I do apologise for any spelling or grammar issues (note to moderators feel free to clean this up so it is more legible
  12. Mind if I ask which country you're located in? I'm in mid-west China and something like this happens regularly. Eventually the software disconnects and reconnects. Before you ask, yes, I'm using OpenVPN wrapped in an SSL layer. Seems to be getting more frequent. I can attach logs if you want.
  13. garmiste

    Discount ?

    There are certainly good reasons for having VPN service in these countries. If you want to watch Youku videos from the US you'll need VPN service to China (great way to maintain your Chinese while visiting the US). I would also imagine there are some services in Russia you can't get w/o a Russian IP address. If you're not interested in security there are several popular services that provide access in these countries and you can pay with your American credit card. I'll be nice and not post the names of those other services, though you can easily find them. As for AirVPN, I'm quite happy they DON'T have servers in several countries.
  14. You answered your own question on why there are no AirVPN servers in Russia. Why have servers in Russia and mainland China if the hackers there are going to try and hack the servers and destroy them. That would increase AirVPN costs and raise the fees they charge their clients. Maybe AirVPN should put a server in Russia and YOU can pay all the costs that are incurred plus the tobacco for your PIPE.
  15. I'd definitely say it couldn't hurt to check out that site I don't know if it's relevant, but anyways: http://www.bestvpn-china.com/blog/31750/a-complete-guide-to-ip-leaks/
  16. I've also noticed that if I use an SSH connection my speed slows to a crawl. When I only run a SSH connection to browse (I have a few VPS servers in the States) I find latency increases to the point the connection is pretty much useless. For now the AirVPN client seems to deal with this ok, but it's still a bit slower than SSL. I'm in China, BTW.
  17. jplun585

    China

    I am experiencing DNS redirection to China Telecom when I try to contact a bad url either through a browser or through ping even while connected to AirVPN with SSL, after a DNS flush, and using google DNS servers. My hosts files are clean. Wireshark captures show TCP connections to Chinese IP addresses directly after 8.8.8.8 or 8.8.4.4 DNS Standard query response ... No such name... then I get redirected to malware containing sites. Any suggestions?
  18. As I understand OpenVPN over SSL/SSH, these modes are supposed to encapsulate the packets to hide from ISP fingerprinting identifying the OpenVPN protocol in countries like China that block or throttle traffic. ​However, according to https://www.browserleaks.com/whois TCP/IP stack OS Fingerprinting is still showing the OpenVPN protocol for the connection.
  19. I'm not sure how related this is. I'm finding that my speed when getting video from Netflix is significantly different from getting video from other sites - news sites, Youtube, etc. My guess is it's somewhat software related, too. Whatever the actual problem is, I can get a full HD video from Youtube with download speeds between 50 - 200+ KB/S, but video from the Netflix site comes through at 15 - 75 KB/s with peaks at 100 - 150 KB/s. Now I'm judging this by what the app is telling me, but the end result is I can easily watch video from Youtube in HD, but even low quality video from Netflix requires frequent buffering. Is there much I can do on my end? Better server choice? I'm running Mint Linux 17.2 and using Chrome 48.0.2564 and getting in from the middle of China.
  20. Hello! From China you need (not always, but very frequently) to use an OpenVPN over SSL conection, called "SSL Tunnel - Port 443" in the Air client. You can change connection modes in the Air client by selecting "AirVPN" -> "Preferences" -> "Protocols". Kind regards Interesting results. I was out earlier today and tried with the SSL box marked and afterwards with the SSH box checked. Same problem. It starts off and connects, but then suddenly I couldn't send anything through. Then the software realized nothing was going through and tried another server with the same result. At the moment I'm home and for now this seems to be working. I can upload the log files since there were a couple of errors I noted. AirVPN_20160304_165036.txt AirVPN_20160304_165853-SSH.txt
  21. Hello! From China you need (not always, but very frequently) to use an OpenVPN over SSL conection, called "SSL Tunnel - Port 443" in the Air client. You can change connection modes in the Air client by selecting "AirVPN" -> "Preferences" -> "Protocols". Kind regards
  22. I'm having a similar problem, though the login process is not as smooth. It usually takes several tries on several servers. Once I connect, things appear fine and I have enough time to load about one page. Then... nothing. Here's an overview of what I've got running: Mint 17.2 (based on Ubuntu 14.04) 64-bit AirVPN Client 2.10.3 (latest available for Linux that I saw) Firefox 44.0.2 Chrome Version 48.0.2564.116 Located in central China This happens whether I'm at home or on public wi-fi. Shortly after connecting (30 - 60 seconds) the client shows I'm sending data, but not receiving anything. Sometimes I'll open a terminal and ping some random site that's not blocked like "yahoo.com". I'll get 24 - 75 pings and then the connection goes dead. Now, the client may realize nothing is happening, but it just disconnects, looks for the fastest connection, and usually ends up trying the same server it was having problems with. This happens with several servers and I haven't figured out a pattern yet or if it's specific servers. Oh, I do have the protocol on the client set to automatic. Any suggestions?
  23. A question: can states block access to AirVPN? OK, I know states like Iran and China do just this, but I am referring to other states - I ask because I recently travelled overseas, happily anticipating I would be able to secure my connections in hotels, airports, etc via the VPN, as I had successfully done on other occasions. However, in this case, weird stuff happened. Firstly, I would try to connect to an AirVPN server, but no connection would be established. Nothing would happen. I then tried changing servers, then also went to different protocols, and different ports. I tried all sorts of different variations on these. Occasionally, randomly, one would work (for example, reading the threads here, I noticed someone recommending TCP port 80 for iOS connection problems - I tried it and it worked). However, after shutting the iPad, the connection would usually be lost, and I would be unable to connect to that self same server, with the self same protocol and port, even though it had worked only hours before! This was very frustrating. I thought perhaps there was some issue in Spain, blocking access to VPNs generally or to AirVPN (although the behaviour on the iPad did not suggest some kind of blanket ban). But later on, I experienced the same issue in Singapore's Changi airport. I was able to establish VPN connections while overseas only with great difficulty, and it drove me nuts. Now I am back home, and the VPN is functioning beautifully, as usual. So I am completely at a loss as to what could have been happening when I was overseas. What could be the cause of this? Any thoughts would be appreciated. I should probably add that in Spain, VPN connection in hotels seemed to work better, but I definitely experienced trouble when trying to operate the iPad in state run internet cafes (these are run by the local government in very rural areas where internet access is difficult -they are a state run service designed to help rural people to have internet access). I can imagine that there might have been some kind of block being imposed by the state in this case, and I'm wondering, if that's the case, whether there is any way around it. I don't welcome any state authority snooping on my affairs, boring as these are. I hope all this makes sense! Any comments appreciated.
  24. China Mainland user here, the following result tested with BGP link in Shanghai. The Cebalrai has a much better latency than Hadar, while bandwidth still not good. The ping is about 70ms compare to 370ms in Hadar, but I only get around 50KiB/s speed with 100Mb local bandwith (SSL and SSH tunnel). For Chinese users, CN2 link is still the best...
  25. Well done! Thank you. I'm in mainland China and Hadar is pretty much useless from here. Bandwidth is poor and the GFW blocks IPs and some ports. I'm going to check out Cebalrai and see how it compares.
×
×
  • Create New...