Jump to content
Not connected, Your IP: 3.143.4.181

Search the Community

Showing results for 'china'.


Didn't find what you were looking for? Try searching for:


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 446 results

  1. Suddenly, last week here in Shanghai, I could not connect to ANY server with Automatic protocols selected. I could only get a connection using an SSH tunnel. This option seems to also be slow. Chinese TV sucks and I want to download via torrent my shows...Torrents also generally make the connection crash in several ways (my wifi, the hotels AP, time outs...)
  2. With news like this: https://torrentfreak.com/vpn-provider-pia-exits-russia-server-seizures-160712/ "...the passing of a new law last year which requires Internet providers to hold logs of Internet traffic for up to a year" "This means that international companies could be forced to have a physical local presence, to which Russian authorities potentially have access." How is AirVPN able to operate in countries with such strict anti-privacy laws? I would really like to hear from the Air admins on this. It's been a while since they've made comments on the forums.
  3. Hi, I've tried using SSL tunnel port 443 in preferences. Also tried various servers including Singapore, but no luck, it won't connect, it just gets stuck in cycles of retrying. Thanks
  4. Hello All, Do you have any suggestions for somewhat-reliable connection to AirVPN servers using iOS devices in China? I ask this because OpenVPN connections over land-based ISPs barely work here without an SSL tunnel. Connection to servers using SSL tunneling through Eddie works great... but that's only for Linux/MacOS/Windows. Here are the ideas I have so far; can you please add if you have any suggestions? 1. Connections over cell service are much more reliable than land-based ISPs. The downside here is that I have to use my data plan, and doesn't work with my Wifi-only iPad. 2. I could hardwire a laptop to my router then try to share my connection through wifi with my iOS devices once the SSL tunnel is established. Has anyone tried this? This of course would only work when I'm at home. That's all I can think of. Any ideas? Thanks!
  5. Hello, I bought AirVPN to mainly use it in China and well... it doesn't work :/ I'm gonna travel for 6 months in China and i'm currently in Guilin (south of China). I'm using AirVPN client on MacOSX 10.9.4 and sometimes it works but mainly it don't. This is the logs : I 2014.09.14 12:21:54 - Session starting. ! 2014.09.14 12:21:54 - Checking environment ! 2014.09.14 12:21:54 - Checking authorization . 2014.09.14 12:21:55 - Error getting response stream (ReadDone1): ReceiveFailure . 2014.09.14 12:21:55 - Error getting response stream (ReadDone1): ReceiveFailure . 2014.09.14 12:22:05 - The request timed out ! 2014.09.14 12:22:06 - Connecting to Electra (United States, Manassas, Virginia) . 2014.09.14 12:22:06 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014 . 2014.09.14 12:22:06 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.14 12:22:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.14 12:22:06 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.14 12:22:06 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 12:22:06 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 12:22:06 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 12:22:06 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 12:22:06 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.225:443 . 2014.09.14 12:22:06 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.225:443, sid=96fcccd4 c989704f . 2014.09.14 12:22:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.14 12:22:08 - OpenVPN > Validating certificate key usage . 2014.09.14 12:22:08 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.14 12:22:08 - OpenVPN > VERIFY KU OK . 2014.09.14 12:22:08 - OpenVPN > Validating certificate extended key usage . 2014.09.14 12:22:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.14 12:22:08 - OpenVPN > VERIFY EKU OK . 2014.09.14 12:22:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.14 12:22:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.14 12:22:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 12:22:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.14 12:22:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 12:22:15 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.09.14 12:22:15 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.115.117.225:443 . 2014.09.14 12:22:17 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 12:22:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.65.250 10.4.65.249' . 2014.09.14 12:22:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2014.09.14 12:22:17 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2014.09.14 12:22:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2014.09.14 12:22:17 - OpenVPN > OPTIONS IMPORT: route options modified . 2014.09.14 12:22:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2014.09.14 12:22:17 - OpenVPN > Opened utun device utun0 . 2014.09.14 12:22:17 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2014.09.14 12:22:17 - OpenVPN > /sbin/ifconfig utun0 delete . 2014.09.14 12:22:17 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2014.09.14 12:22:17 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2014.09.14 12:22:17 - OpenVPN > /sbin/ifconfig utun0 10.4.65.250 10.4.65.249 mtu 1500 netmask 255.255.255.255 up . 2014.09.14 12:22:17 - OpenVPN > /sbin/route add -net 199.115.117.225 192.168.1.1 255.255.255.255 . 2014.09.14 12:22:17 - OpenVPN > add net 199.115.117.225: gateway 192.168.1.1 . 2014.09.14 12:22:17 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.65.249 128.0.0.0 . 2014.09.14 12:22:17 - OpenVPN > add net 0.0.0.0: gateway 10.4.65.249 . 2014.09.14 12:22:17 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.65.249 128.0.0.0 . 2014.09.14 12:22:17 - OpenVPN > add net 128.0.0.0: gateway 10.4.65.249 . 2014.09.14 12:22:17 - OpenVPN > /sbin/route add -net 10.4.0.1 10.4.65.249 255.255.255.255 . 2014.09.14 12:22:17 - OpenVPN > add net 10.4.0.1: gateway 10.4.65.249 . 2014.09.14 12:22:17 - Starting Management Interface . 2014.09.14 12:22:17 - OpenVPN > Initialization Sequence Completed I 2014.09.14 12:22:18 - DNS of a network adapter forced (SAMSUNG_Android) I 2014.09.14 12:22:18 - DNS of a network adapter forced (Wi-Fi) I 2014.09.14 12:22:18 - DNS of a network adapter forced (Bluetooth PAN) I 2014.09.14 12:22:18 - DNS of a network adapter forced (Thunderbolt Bridge) ! 2014.09.14 12:22:18 - Flushing DNS ! 2014.09.14 12:22:18 - Checking route ! 2014.09.14 12:22:23 - Connected. . 2014.09.14 12:22:23 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2014.09.14 12:22:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2014.09.14 12:51:38 - OpenVPN > write UDPv4: Network is down (code=50) . 2014.09.14 13:01:10 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2014.09.14 13:01:10 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2014.09.14 13:01:10 - OpenVPN > Restart pause, 2 second(s) ! 2014.09.14 13:01:10 - Disconnecting . 2014.09.14 13:01:10 - Management - Send 'signal SIGTERM' . 2014.09.14 13:01:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2014.09.14 13:01:10 - OpenVPN > MANAGEMENT: Client disconnected . 2014.09.14 13:01:10 - OpenVPN > Assertion failed at misc.c:785 . 2014.09.14 13:01:10 - OpenVPN > Exiting due to fatal error . 2014.09.14 13:01:10 - Connection terminated. I 2014.09.14 13:01:10 - DNS of a network adapter restored to original settings (SAMSUNG_Android) I 2014.09.14 13:01:10 - DNS of a network adapter restored to original settings (Wi-Fi) I 2014.09.14 13:01:10 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2014.09.14 13:01:10 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) ! 2014.09.14 13:01:14 - Waiting for latency tests ! 2014.09.14 13:01:14 - Checking authorization . 2014.09.14 13:01:14 - Error: ConnectFailure (Network is unreachable) . 2014.09.14 13:01:14 - Error: ConnectFailure (Network is unreachable) . 2014.09.14 13:01:14 - Error: ConnectFailure (Network is unreachable) . 2014.09.14 13:01:14 - Error: ConnectFailure (Network is unreachable) . 2014.09.14 13:01:14 - Error: ConnectFailure (Network is unreachable) . 2014.09.14 13:01:14 - Error: NameResolutionFailure . 2014.09.14 13:01:14 - Error: NameResolutionFailure . 2014.09.14 13:01:14 - Error: NameResolutionFailure W 2014.09.14 13:01:14 - Error: ConnectFailure (Network is unreachable) ! 2014.09.14 13:01:17 - Checking authorization . 2014.09.14 13:01:18 - Error getting response stream (ReadDone1): ReceiveFailure . 2014.09.14 13:01:18 - Error getting response stream (ReadDone1): ReceiveFailure . 2014.09.14 13:01:28 - The request timed out ! 2014.09.14 13:01:29 - Connecting to Kuma (United States, Manassas, Virginia) . 2014.09.14 13:01:29 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014 . 2014.09.14 13:01:29 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.14 13:01:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.14 13:01:29 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.14 13:01:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 13:01:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 13:01:29 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 13:01:29 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 13:01:29 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443 . 2014.09.14 13:01:29 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=4b058068 adbfd6e5 . 2014.09.14 13:01:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.14 13:01:30 - OpenVPN > Validating certificate key usage . 2014.09.14 13:01:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.14 13:01:30 - OpenVPN > VERIFY KU OK . 2014.09.14 13:01:30 - OpenVPN > Validating certificate extended key usage . 2014.09.14 13:01:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.14 13:01:30 - OpenVPN > VERIFY EKU OK . 2014.09.14 13:01:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.14 13:01:59 - Error getting response stream (ReadDone1): ReceiveFailure . 2014.09.14 13:01:59 - Error: SendFailure (Error writing headers) . 2014.09.14 13:02:05 - OpenVPN > [server] Inactivity timeout (--ping-exit), exiting . 2014.09.14 13:02:05 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.09.14 13:02:09 - The request timed out . 2014.09.14 13:02:10 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2014.09.14 13:02:10 - Disconnecting . 2014.09.14 13:02:10 - Connection terminated. ! 2014.09.14 13:02:13 - Checking authorization . 2014.09.14 13:02:13 - Error getting response stream (ReadDone1): ReceiveFailure . 2014.09.14 13:02:23 - The request timed out . 2014.09.14 13:02:33 - The request timed out ! 2014.09.14 13:02:34 - Connecting to Kuma (United States, Manassas, Virginia) . 2014.09.14 13:02:34 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014 . 2014.09.14 13:02:34 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.14 13:02:34 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.14 13:02:34 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.14 13:02:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 13:02:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 13:02:34 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 13:02:34 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 13:02:34 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443 . 2014.09.14 13:02:34 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=4fa4de69 82f0a521 . 2014.09.14 13:02:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.14 13:02:35 - OpenVPN > Validating certificate key usage . 2014.09.14 13:02:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.14 13:02:35 - OpenVPN > VERIFY KU OK . 2014.09.14 13:02:35 - OpenVPN > Validating certificate extended key usage . 2014.09.14 13:02:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.14 13:02:35 - OpenVPN > VERIFY EKU OK . 2014.09.14 13:02:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.14 13:03:34 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) . 2014.09.14 13:03:34 - OpenVPN > TLS Error: TLS handshake failed . 2014.09.14 13:03:34 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2014.09.14 13:03:34 - OpenVPN > Restart pause, 2 second(s) ! 2014.09.14 13:03:34 - Disconnecting . 2014.09.14 13:03:34 - Connection terminated. ! 2014.09.14 13:03:37 - Checking authorization . 2014.09.14 13:03:38 - Error getting response stream (ReadDone1): ReceiveFailure . 2014.09.14 13:03:48 - The request timed out . 2014.09.14 13:03:58 - The request timed out ! 2014.09.14 13:03:59 - Connecting to Kuma (United States, Manassas, Virginia) . 2014.09.14 13:03:59 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014 . 2014.09.14 13:03:59 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.14 13:03:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.14 13:03:59 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.14 13:03:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 13:03:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 13:03:59 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 13:03:59 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 13:03:59 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443 . 2014.09.14 13:03:59 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=12e18f82 107b3b50 . 2014.09.14 13:04:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.14 13:04:01 - OpenVPN > Validating certificate key usage . 2014.09.14 13:04:01 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.14 13:04:01 - OpenVPN > VERIFY KU OK . 2014.09.14 13:04:01 - OpenVPN > Validating certificate extended key usage . 2014.09.14 13:04:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.14 13:04:01 - OpenVPN > VERIFY EKU OK . 2014.09.14 13:04:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.14 13:04:36 - OpenVPN > [server] Inactivity timeout (--ping-exit), exiting . 2014.09.14 13:04:36 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.09.14 14:03:36 - OpenVPN > [server] Inactivity timeout (--ping-exit), exiting . 2014.09.14 14:03:36 - OpenVPN > SIGTERM[soft,ping-exit] received, process exiting ! 2014.09.14 14:03:36 - Disconnecting . 2014.09.14 14:03:36 - Connection terminated. I 2014.09.14 14:03:36 - Session terminated. . 2014.09.14 14:04:09 - Error getting response stream (ReadDone1): ReceiveFailure . 2014.09.14 14:04:19 - The request timed out . 2014.09.14 14:04:29 - The request timed out . 2014.09.14 14:04:39 - The request timed out I 2014.09.14 14:06:18 - Session starting. ! 2014.09.14 14:06:18 - Checking environment ! 2014.09.14 14:06:18 - Checking authorization . 2014.09.14 14:06:18 - Error getting response stream (ReadDone1): ReceiveFailure . 2014.09.14 14:06:28 - The request timed out . 2014.09.14 14:06:38 - The request timed out ! 2014.09.14 14:06:39 - Connecting to Kuma (United States, Manassas, Virginia) . 2014.09.14 14:06:39 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014 . 2014.09.14 14:06:39 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.14 14:06:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.14 14:06:39 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.14 14:06:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:06:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:06:39 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 14:06:39 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 14:06:39 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443 . 2014.09.14 14:06:40 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=f685cd52 e1cfa20b . 2014.09.14 14:06:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.14 14:06:41 - OpenVPN > Validating certificate key usage . 2014.09.14 14:06:41 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.14 14:06:41 - OpenVPN > VERIFY KU OK . 2014.09.14 14:06:41 - OpenVPN > Validating certificate extended key usage . 2014.09.14 14:06:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.14 14:06:41 - OpenVPN > VERIFY EKU OK . 2014.09.14 14:06:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.14 14:07:17 - OpenVPN > [server] Inactivity timeout (--ping-exit), exiting . 2014.09.14 14:07:17 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.09.14 14:07:23 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2014.09.14 14:07:23 - Disconnecting . 2014.09.14 14:07:23 - Connection terminated. ! 2014.09.14 14:07:26 - Checking authorization . 2014.09.14 14:07:26 - Error: SendFailure (Error writing headers) . 2014.09.14 14:07:36 - The request timed out . 2014.09.14 14:07:46 - The request timed out ! 2014.09.14 14:07:47 - Connecting to Kuma (United States, Manassas, Virginia) . 2014.09.14 14:07:47 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014 . 2014.09.14 14:07:47 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.14 14:07:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.14 14:07:47 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.14 14:07:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:07:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:07:47 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 14:07:47 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 14:07:47 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443 . 2014.09.14 14:07:48 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=c8379507 0d5926a1 . 2014.09.14 14:07:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.14 14:07:49 - OpenVPN > Validating certificate key usage . 2014.09.14 14:07:49 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.14 14:07:49 - OpenVPN > VERIFY KU OK . 2014.09.14 14:07:49 - OpenVPN > Validating certificate extended key usage . 2014.09.14 14:07:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.14 14:07:49 - OpenVPN > VERIFY EKU OK . 2014.09.14 14:07:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.14 14:08:24 - OpenVPN > [server] Inactivity timeout (--ping-exit), exiting . 2014.09.14 14:08:24 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.09.14 14:08:29 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2014.09.14 14:08:29 - Disconnecting . 2014.09.14 14:08:29 - Connection terminated. ! 2014.09.14 14:08:32 - Checking authorization . 2014.09.14 14:08:42 - The request timed out . 2014.09.14 14:08:52 - The request timed out . 2014.09.14 14:09:02 - The request timed out ! 2014.09.14 14:09:03 - Connecting to Kuma (United States, Manassas, Virginia) . 2014.09.14 14:09:03 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014 . 2014.09.14 14:09:03 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.14 14:09:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.14 14:09:03 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.14 14:09:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:09:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:09:03 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 14:09:03 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 14:09:03 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443 . 2014.09.14 14:09:04 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=4626bcab 57fd1f75 . 2014.09.14 14:09:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.14 14:09:05 - OpenVPN > Validating certificate key usage . 2014.09.14 14:09:05 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.14 14:09:05 - OpenVPN > VERIFY KU OK . 2014.09.14 14:09:05 - OpenVPN > Validating certificate extended key usage . 2014.09.14 14:09:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.14 14:09:05 - OpenVPN > VERIFY EKU OK . 2014.09.14 14:09:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.14 14:09:40 - OpenVPN > [server] Inactivity timeout (--ping-exit), exiting . 2014.09.14 14:09:40 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.09.14 14:09:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2014.09.14 14:09:45 - Disconnecting . 2014.09.14 14:09:45 - Connection terminated. I 2014.09.14 14:09:45 - Cancel requested. I 2014.09.14 14:09:45 - Session terminated. I 2014.09.14 14:10:49 - Session starting. ! 2014.09.14 14:10:49 - Checking environment ! 2014.09.14 14:10:49 - Checking authorization . 2014.09.14 14:10:59 - The request timed out . 2014.09.14 14:11:09 - The request timed out . 2014.09.14 14:11:19 - The request timed out ! 2014.09.14 14:11:20 - Connecting to Hadar (Hong Kong, Hong Kong) . 2014.09.14 14:11:20 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014 . 2014.09.14 14:11:20 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.14 14:11:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.14 14:11:20 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.14 14:11:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:11:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:11:20 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 14:11:20 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 14:11:20 - OpenVPN > UDPv4 link remote: [AF_INET]103.10.197.186:443 . 2014.09.14 14:11:20 - OpenVPN > TLS: Initial packet from [AF_INET]103.10.197.186:443, sid=c6944af9 f68af350 . 2014.09.14 14:12:20 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) . 2014.09.14 14:12:20 - OpenVPN > TLS Error: TLS handshake failed . 2014.09.14 14:12:20 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2014.09.14 14:12:20 - OpenVPN > Restart pause, 2 second(s) ! 2014.09.14 14:12:20 - Disconnecting . 2014.09.14 14:12:20 - Connection terminated. ! 2014.09.14 14:12:23 - Checking authorization . 2014.09.14 14:12:33 - The request timed out . 2014.09.14 14:12:43 - The request timed out . 2014.09.14 14:12:53 - The request timed out ! 2014.09.14 14:12:54 - Connecting to Kuma (United States, Manassas, Virginia) . 2014.09.14 14:12:54 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.2.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 18 2014 . 2014.09.14 14:12:54 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.14 14:12:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.14 14:12:54 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.14 14:12:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:12:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:12:54 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 14:12:54 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 14:12:54 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443 . 2014.09.14 14:12:55 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=c7c6f319 0d40277c . 2014.09.14 14:12:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.14 14:12:56 - OpenVPN > Validating certificate key usage . 2014.09.14 14:12:56 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.14 14:12:56 - OpenVPN > VERIFY KU OK . 2014.09.14 14:12:56 - OpenVPN > Validating certificate extended key usage . 2014.09.14 14:12:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.14 14:12:56 - OpenVPN > VERIFY EKU OK . 2014.09.14 14:12:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.14 14:12:59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.14 14:12:59 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:12:59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.14 14:12:59 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.14 14:12:59 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.09.14 14:12:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.115.117.213:443 . 2014.09.14 14:13:02 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:12 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:17 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:27 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:37 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:47 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:13:57 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.14 14:14:02 - OpenVPN > No reply from server after sending 12 push requests . 2014.09.14 14:14:02 - OpenVPN > SIGUSR1[soft,no-push-reply] received, process restarting . 2014.09.14 14:14:02 - OpenVPN > Restart pause, 2 second(s) . 2014.09.14 14:14:04 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536] . 2014.09.14 14:14:04 - OpenVPN > UDPv4 link local: [undef] . 2014.09.14 14:14:04 - OpenVPN > UDPv4 link remote: [AF_INET]199.115.117.213:443 . 2014.09.14 14:14:05 - OpenVPN > TLS: Initial packet from [AF_INET]199.115.117.213:443, sid=04fe4f86 f46d7934 ! 2014.09.14 14:14:07 - Disconnecting . 2014.09.14 14:14:07 - Connection terminated. I 2014.09.14 14:14:07 - Cancel requested. I 2014.09.14 14:14:07 - Session terminated. . 2014.09.14 14:15:05 - The request timed out . 2014.09.14 14:15:15 - The request timed out . 2014.09.14 14:15:25 - The request timed out BTW your site is completly blocked from China. [parts removed to protect competing services, see answer to this message] So what can i do now ? Thanks !
  6. Thank you for the clarification. They're usually always nice ^^. Don't you think you're exaggerating just a little bit, regarding a Democratic future being in jeopardy? Trump was elected on democratic grounds - or as democratic as it is in the us. I think you're biased towards Democracy and living on the assumption that Democracy is automatically the best or most desirable form of government. This is a big mistake in my view, but it's not unexpected. It's a little funny really, in that it seems that people who hold views similar to yours (respectfully), desire open-mindedness (no sexism, bigotry, racism, anti-abortion, etc.), yet instantly turn away anyone with a different mindset or approach. Say someone votes for Trump (or even that Brexit thing), it seems there's a tendency to reduce them to being racists and bigots (of course, some are). Similarly, those who don't subscribe to your notion of Democracy, are repressive fascist regimes. I wonder if you think this is wrong or not. Because the fact remains that both Russia and China have been doing pretty well for themselves. Especially China, in virtually all metrics besides internet-freedom and pollution(although this is improving). Yet you apparently don't care about this, as long as they're not Democratic. I think that's strange, respectfully. Because if you go to China, you may find that China is arguably more Capitalist and free in many ways, compared to the US. The Great Firewall does have some positive effects though: Since there's often a greater convenience in not bypassing the wall, Chinese consumers will often favor local companies. Which in turn means more jobs, as these companies then grow. This can then positively impact the economy and then later, the rest of the world, as giants like Alibaba and Tencent expand. Likewise, more Chinese people learn how to use VPNs (hehe). But in terms of being in an opinion bubble, how is that much different from being on Facebook or Google? The Chinese people I've met, have no illusions about their government. I think it's very easy to compare the us with China and/or Russia. I think you're sadly very very mistaken about the us. Again, respectfully speaking . Just because the us may be Democratic, it doesn't mean it's not capable of being an evil or bad country - yes, evil "on par" with whatever evil you can ascribe to China/Russia. There's plenty evidence that shows that the US actually hates any form of "Democracy"; especially outside its own borders. So perhaps you're right that the US can't be compared to China/Russia, except that the equation is reversed. You may think China is being aggressive with its territorial grabs in Asia, but did you consider why China is doing what it's doing? I think it would be too simplistic to resort to saying something along the lines of "well, because it's a fascist dictatorship". Even if it were a fascist dictatorship, that wouldn't help your Democracy argument, seeing as said dictatorship is currently outpacing the US very quickly in a number of ways. Perhaps especially with Trump at the helm now. Us Democracy is also quite questionable in many ways after all: Extremely low voter turn out, all manner of electoral quirks as each state votes differently, counts differently, has different rules and different methodologies. Through to things such as the Electoral College and the notion that a candidate can lose a vote, like HIllary did, despite getting most votes, to campaigns being funded through SuperPACS by rich companies and the list goes on. Not to mention that while there's technically multiple parties in play, in practice there's only 2 - which speaks to the illusion of choice that you also alluded to. To speak nothing of how us politics is dominated and how americans continually don't get what they want. So to call it a Democracy may in fact be a little insulting in the eyes of those countries whom arguably may have more robust systems . I can't see how you can justify calling China's "slave labor" system out, when it has clearly proven to have worked very well for the country and is thus increasingly being rolled back now; hence why China isn't the cheapest place to manufacture in anymore, Chinese tourists are some of the biggest spenders and the Chinese economy is the 2nd biggest in the world (number 1, if you go by PPP). Thus it's estimated around 600 million people have been taken out of extreme poverty. That's double the us population. It seems like you're not willing to accept that things cannot be *ideal* from the start. That you can't have humane working conditions instantly for example. They made sacrifices and it worked. It's the same story in the West - just look at coal miners for example. As for Russia, you should keep in mind which country often creates the problem to begin with. During days past, it was promised that the West wouldn't "take one step to the East" in the form of NATO. Yet what happened? Yep, steps right towards Russia. Hopefully you can also appreciate the Russian security point of view. I think HC would've exacerbated this situation tremendously. I can agree to jail for GW and co though . But since HC has so much free time now, perhaps we shouldn't forget our manners: Ladies first!
  7. Staff

    China

    "airvpn.org" blocked (DNS poisoning) Solution: hosts file edit OpenVPN connections are frequently disrupted (reported in Shangai and Beijing) Solution: OpenVPN over SSL works just fine UNCONFIRMED: momentary blocks of Internet domestic lines if a high percentage of encrypted traffic is detected
  8. I am just curious if this has become problematic for our Air members in China? I will link the article below. Since the forum is not "lit up" I am sort of thinking Air is still OK in China. Feedback from users?? http://www.theregister.co.uk/2015/01/24/china_beefs_up_great_firewall_snips_off_vpn_access
  9. You can find decent number of servers in europe which are not blocked yet (no, be & others which can't say completely to prevent them from being blocked) Generally, openvpn/wireguard fingerprint is easy to detect and block by dpi firewalls (which has been bought from china) ... solid solutions are naïveproxy, trojan & vmess/vless ... I don't know airvpn team has any plan to deploy them or not. @Staff
  10. I finished reading https://jigsaw.google.com/the-current/shutdown/ the other day, this beautiful presentation highlights mostly the spectrum of political 'lights out' events when entire regions are denied access to the Internet, for example during elections. I commend them for including a lot of references there, the kind of action modern journalists don't need to do apparently. One of these references linked this UN document: https://undocs.org/A/HRC/47/24/Add.2 One of the most flagrant attacks on the Internet that had an immediate impact on me personally were commited in Belarus and Russia in the recent years. In the past 7 or 8 years Russia had been tightening their control over the Internet and that included banning websites (like EVE Online and their wiki article about an in-game drug LOL) or bloggers/apps that did not agree with the mandatory "registry" registration, e.g. Telegram. In their attempt to ban Telegram, the government has had over 2 million IPs of Google and Amazon blocked which led to massive and unrelated service failures. Some of the international traffic in and out of Belarus is routed through big russian transit providers and as a result some of these blocks have unlawfully hit belarussian citizens. And of course these laws were used to block political websites. How often does Russia appear in this report? Answer: ONCE. As a footnote 78 on page 12. This doesn't reference law changes from 2012-2014 and later that lead to current blocks! Belarus' internet censorship. I don't think I have to explain much because this was so recent during the last "election". At least the report acknowledges it fully, five times no less: I can confirm there were disruptions, but I'm still here thanks to AirVPN : ) Thanks for non-standard connection options. I don't know who exactly they're talking about, but this reminds me of Cisco helping to build the Great Firewall of China! The UN welcomes internet censorship How often does China appear in this report? Occurrences: 0. What's legal today can quickly become illegal tomorrow, no matter justified or not, morally correct or not. The UN completely agrees with such laws: just please don't block the entire internet, ok? Basically totalitarian governments can do whatever if they take 2 months time to write it as law. Maybe the new law was put together by a lobby group, doesn't matter. You are allowed to censor then. American services banning Iranian users if connected without VPN? Totally cool with that! Russia banning 2 million IPs? Haha at least you didn't ban 4 milliard IPs, you get a free pass! Ukraine blocks access to all russian social networks due to war in the east? Ukraine, occurrences = 0. The UN loves "lawful" internet censorship.
  11. Hi on my rhel 6.6 system I can't install mono for corporate compliance. I have installed openvpn and was trying to use it from the console or via NetworkManager. at the moment, I am connected from China via the corporate VPN but was looking at some independent solution. when I disconnect the corporate VPN, and triy to connect using openvpn udp 443 fails to connect (timeout) ssh tunnel port 22 and ssl tunnel on 443 both connect I get a tun0 device with a 10.... IP. note that I had the openvpn config files imported in NetworkManager else resolv.conf did not get updated. however if I try to ping the 10.* dns server that appears in resolv.conf I never get a reply. I can't even ping google's own DNS servers so after I connect via openvpn I am effectively isolated although with a 10.* IP address. I even tried flushing my iptables but no change (and anyway the tun0 device created by my corporate VPN dialler works fine) suggestions welcome
  12. http://www.reuters.com/article/2015/06/14/us-britain-security-idUSKBN0OT0XF20150614 What do you guys think. Is it possible that they cracked it or have they got the information from Snowden?
  13. I know that it is easy to use airvpn from china with an ssl tunnel works fine with Eddie. But there is still one problem: Lets say you are in wuhan, the next available server is Hongkong. The distance is very far, wouldn't it be possible to get nearer server locations in this reigion (japan / south korea / taiwan)?
  14. I believe AirVPN is blocked in china by several ISPs. It will be a nice subtle retaliation if we get a china server set up!!!
  15. I can see why you would like to be biased like so and I can respect that. But I don't think you should be decidedly "proud" of it, seeing as it's exactly those kinds of bias which lead to misunderstanding and a clouding of judgement. Judgement being pretty important, if you're at all interested in approaching any sort of truthful view towards reality. After all, isn't that one of the major reasons the Democrats lost? They assumed that as long as they kept talking about women's, LGBTQ, black and minorities rights, everything would be okay, because "who wouldn't support X, Y, Z principles like these?" They even went as far as assuming that because Hillary was a white woman and supported women's rights, white women in the US would also automatically support for her. They held onto this belief in a sort of "duhhh" no-brainer way. Yet apparently some 50% of white women voted for Trump. So this pride you have, is the same sort of pride that blinded people similar to you to reality: that you can't predict what people will vote on, just based on their demographics and your principles and that while those principles are important, they probably take a back seat anyhow, compared to the prospect of losing one's job. So as the saying goes "Pride goeth before a fall". Fall the Democrats did. Also, China for one isn't totalitarian. Your view is wrong - again, respectfully . It's authoritarian and you shouldn't mix these up. North Korea is what you'd call totalitarian, as the NK government has complete control over everything apparently. The Chinese does not. Chinese people are free to talk about whatever they want; especially in private. The Chinese government has created economic zones that enjoy special freedoms; such as Shanghai. Thus they're not controlled by the government. They're called Free Trade Zones. It's also possible for Chinese professors at universities to discuss various otherwise taboo social issues. Not to mention Chinese people can travel whenever they want, quit their jobs whenever they want, marry who they want and so forth. Your aforementioned bias comes back to bite you here, as I alluded to previously. You even go so far as to say that everyone living in China and Russia are unfortunate. Thus what started as an innocent bias, has then grown into a full-on misconception and that is dangerous in itself. But it's even more dangerous when politicians like HC give force to such biases, because you'll thus be more likely to believe in her. Ultimately, this could then lead to you feeling a war is justified, if one broke out. Because you'd think "well, China IS evil, so it makes sense we're fighting them". So I urge you to re-asses. I think Democracy is fine. But it has to be *real* and not fake. I like to use Switzerland as an example. They have a pretty sweet system of Direct Democracy. They even have guns. Yet without the murder rates of the US. All I'm saying is that you shouldn't assume Democracy, in any form, is automatically better than other forms of governance, such as the Chinese form. I doubt Democracy would've been suitable for China for instance, because when your country lay in virtual ruins, as China did in 1978, it would be quite problematic for government (and thus plans) to change every 4 or 8 years, like in the US. Instead, China enjoys a massive advantage: it can plan decades ahead and follow that plan stringently. If those plans are prudent and smart, the country will rapidly improve. Which is exactly what it has done. Also, I don't think China calls itself Communist. It's just they haven't changed the name of the Communist Party haha. I think the hypocrisy, with all due respect of course, is palpable. You actively "worry" about a militarily strong China and how it'll "seize the territory" of its neighbors, when that's exactly what the US has been doing for decades: Iraq, Afghanistan, Syria, Libya and slices of many countries around the world, in the form of military bases. Yet as previously stated, China hasn't been in a war for 30 years and yet, for some reason, you automatically think you know what the Chinese will do - presumably just because they're not Democratic. You say the Chinese will just kill anyone disagrees - that may be so. Yet that's also exactly what the US government has been doing abroad; didn't you notice the drone campaigns? I didn't mean to assign you to any camp. I meant to make a comparison of how it's possible, on both sides of the Atlantic, to assume that people who vote a certain way (such as Leave), are also automatically a certain kind of person (racist, bigot, etc.). You also conveniently ignored my last paragraph with the links to US crimes. Maybe you couldn't be bothered to say anything about it or maybe it left you speechless, I don't know. But I can't help but feel that you're really representing the Democrats very well: ignoring the real issues, in favor of talking about high-minded ideals such as Democracy and Women's rights. Which, while definitely important, cannot make up 90% of the argument, by neglecting practical realities . I think this is very important actually. Since if you think about it, what reasons does the US government traditionally use to justify war? "Freedom", "Democracy", "Human-rights". Then people who are less intelligent and aware than yourself, instantly do a volte-face from being against war and conflict to being fine with them. Because hey, it's for "freedom" and "women's rights" in those Middle-Eastern dictatorships, right? Yet the practical reality is completely ignored and brushed aside, because it's presumed that these "higher ideals" justify the means; even when they don't. It's the sort of mindset that makes people think that the destruction of civil society, like in Iraq, is acceptable, because now the women are "free" from the male patriarchy and state oppression. Even when it really just means starvation and even more severe kinds of abuse, such as those by all the crazies like ISIS or the Taliban now being let loose. So I urge you to consider both the practical realities and realities that the other side face too; whilst not forgetting your cherished beliefs in freedom, democracy and so on, of course. Just don't be fooled .
  16. @FromTheWalls, I'm a developer and tech supporter who commutes in and out of China. If i'm not in China, i'm in Australia. You might say I'm an Australian who commutes to work in Tianjin. Ever since I found I had to spend a significant part of my working life in China, I've been using various VPN offerings. I believe I could write a competitive evaluation of the major ones in use in China quite easily. I've watched the Darwinian struggle between the Great Firewall and VPN providers with interest. I have come to realise that the issues with VPN-use in China are considerably more nuanced than most people (and VPN solution providers) often understand. It depends very much on your ISP and their compliance with Chinese policies and software. Especially if you are using mobile cellular or mobile wifi, it will be easier to get at the outside world than if you are on a large corporate, academic or government network. Also your geographic area influences things a lot. It is different using the net in Shenzhen or Shanghai than in many other areas. The GFW uses deep packet inspection, out of a desire for maximum control and minimum disruption. For instance, the way that OpenVPN connections are generally blocked is through a DPI detection of OpenVPN starting a TLS authentication negotiation. The problem is, the other favourite method of blocking VPNs is through protocol / port / ip address specific blocks. If you look, HADAR, the HongKong-based natural choice for AirVPN users in China, is usually very lightly loaded. This is because it is generally impossible to open an SSH session to either the primary or alternate IP addresses associated with HADAR. Same with the Singapore-based Antares. AirVPN will quite happily try over and over to open a session, taking ages to time out of the SSH set-up, but never moving down the list. You have to manually block the ones that don't work, hence the low load on HADAR. So AirVPN currently has a major competitive advantage. To the best of my knowledge, nobody else automates the use of OpenVPN inside an SSH or SSL tunnel. In the Chinese context, it has a major disadvantage. Because of it's policy of minimal, very high quality POPs, it effectively keeps very, very still. That makes it an easy target for China's GFW deep packet inspection tools. Making HADAR and ANTARES useless. This is why DSIBAN in South Korea was important. There is enormous bandwidth between mainland China and South Korea. So DSIBAN performed beautifully for users coming from inside China. Now it is gone, and so we have to look for other solutions. I wish that AirVPN would find a way of having a much more dynamic and extensive set of alternate entry IPs for its POPs. That would make it much more resilient and useful in China. Many of the competitors say they are developing "stealth mode" for their OpenVPN offerings. So AirVPN's overwhelming advantage may evaporate quite soon. Which is good for users, but bad news for the best VPN offering currently available for use from China.
  17. The day before yesterday i registered at private tunnel and try its OpenVPN connection. The funny thing is that i can never connect after installation. I know that great firewall is malicious and very strong. I want to buy a fast vpn for the whole family and it's harder than setting up a free vpn:)
  18. I'm having problems keeping a steady connection over AirVpn to any servers. It seems to go great for about 30 seconds and i get great speed however, it then slows down and basically disconnects. IT's making it nearly impossible to use my internet here. Is anyone else having this issue and is there any way to fix this?
  19. Hi, i'd like to know why this is happening.. Is this server really located in China? Thanks in advance!
  20. This 2 list not are my own, i just use few theyr list (Pi-hole and Ublock origin example). But is here any sense add this couple list ? Energized Protection - block Website : https://energized.pro/ Github : https://github.com/EnergizedProtection/block 2 Different blocklist : Energized Ultimate list & Energized IP Extension, there is many other lists, but i like this 2 list. Energized Ultimate List : # Title: Energized Ultimate Protection # Description: Flagship Protection Pack from Energized Protection. # Format: domain list # Version: 22.05.127 # Release: 127 # Entries: 435,142 # Pack Code: EUL71M473-P # License: MIT, https://energized.pro/license # Updated: Sat, 07 May 22 00:16:32 +06 # RAW: https://block.energized.pro/ultimate/formats/domains.txt Core List + Basic + 1Hosts (Pro), BarbBlock, Bjornstar's Hosts, Cybercrime, Disconnect Malvertising & Tracking Filter List, EasyPrivacy Specific, Thirdparty & Tracking Servers, Matomo Referrer Spam Blacklist, Openphish, Phishing Bad Sites, Phishing Hosts, Prigent's Malware & Phishing, Quidsup NoTrack and StopForumSpam Second list... Energized Regional Extension # Title: Energized Regional Extension # Description: An Extension to Block Regional Annoyances. # Format: domain list # Version: 22.05.127 # Release: 127 # Entries: 39,442 # Pack Code: EXR3G1094L-P # License: MIT, https://energized.pro/license # Updated: Sat, 07 May 22 00:17:00 +06 # RAW: https://block.energized.pro/extensions/regional/formats/domains.txt ABPindo, AdBlockID, Adblock Estonian & Iran, Adguard Dutch, English, French, German, Japanese, Russian, Turkish & Spanish - Portuguese Filter, Dandelion Sprout's Nordic Filters, Easylist Brasil, China, Czech & Slovak, Dutch, French, Germany, Italy, India, Korea, Polish, Russian, Spanish and Thailand, Fanboy's Indian & Vietnamese, HostsVN, hufilter, Liste AR, Polish Adblock & Privacy Filters, RUAdList and Thai Ads Filter What you feel with this lists ? It is already included someone else list ? I think ultimate list can break part of websites, but i dont care myself. This group wrote example github, they update list every 24h. But i dont know what is real update time. Is this Custom answers section on dns page here this where i can itself block websites ? How it works ? Just write www.google.com, put mode "domain" and klick Deny and then google is blocked ? Can i block all googles address just write google and add wildcard + deny and then all google domain and subdomain is blocked ? Can i use RegEx rule to block something ? I need to ask becouse i dont understand what is "custom answer" in here dns page. Edit: I forgot. Is here already added some list what blocks all microsoft spying address ? I have pi-hole and there is list what blocks microsoft. List breaks some stuff on windows but i dont care, much better blocked and not let them spy on you. I didnt even know how much microsoft sending data out before i get installed pi-hole and i see whats really happend about every klick on windows. Im lucky becouse i found then Linux world and all stress disappear Keep it simple but more is much powerful !
  21. yeah network mangler does that i never got used to it, at all just set your local to static and get a opensource router or flash an old one ya got layen around shut off yer dhcp server on that this does a couple of things for ya: first, you now have full control over your local, meaning your isp STOPS at the router that right there gives me a warm fuzzy feeling second you can do this for all the things conneting to your local, meaning ya don't have boxes and phones running junk they don't need that hey, lets face it, first thing they tell ya at bandcamp: don't talk about bandcamp well i mean they say things too like 'don't lead with your chin' or sumthin like that the less junk i got purren and runnen the less for me to break is my point before i have had 30 cups of coffee ok that iptalbes example: i'm not a guru at this so if ya see sumthin wrong or can be improved on etc yeah lemme know please.... this script is a server config comment out what ya don't want mod block ipz or botz with your stuff # 051317_edit geo blocking/spam filter ge0z/country codez # ----- # server config # # to reconnect... # iptables -F # iptables -X # iptables -P INPUT ACCEPT # iptables -P OUTPUT ACCEPT # test firewall with nmap... # nmap -v -f/-sX/-sN ip_addy # check status # iptables -L -n -v # for arch: pacman -S ipset/modprobe -v ip_set | ipset -n list # if non-vpn comment out '# -->' section # to start scratch w/geo, -X,-F tables, ipset destroy geoz, accpet traffic # check with ipset list, rm the wget file also # ipset save > /your/directory/blacklist.save | ipset restore < /your/directory/blacklist.save echo "-> waking wald0 up..." # echo "-> remove rules from chains..." iptables -F iptables -t nat -F iptables -t mangle -F # echo "-> remove user definez..." iptables -X iptables -t nat -X iptables -t mangle -X # echo "-> droppen shit..." iptables -P INPUT DROP iptables -P FORWARD DROP iptables -P OUTPUT ACCEPT # # input/output/vpn echo "-> setten up the flow..." iptables -A INPUT -i lo -j ACCEPT iptables -A OUTPUT -o lo -j ACCEPT #allow loopback access iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT # connectionz # --> # comment out if not vpn iptables -A OUTPUT -d 255.255.255.255 -j ACCEPT #communicate with any DHCP server/router iptables -A INPUT -s 255.255.255.255 -j ACCEPT #communicate with any DHCP server/router iptables -A INPUT -s 192.168.0.0/16 -d 192.168.0.0/16 -j ACCEPT #communicate within lan iptables -A OUTPUT -s 192.168.0.0/16 -d 192.168.0.0/16 -j ACCEPT iptables -A FORWARD -i enp2s1 -o tun0 -j ACCEPT iptables -A FORWARD -i tun0 -o enp2s1 -j ACCEPT # make sure enp2s2/tun0 can communicate iptables -t nat -A PREROUTING -s 0/0 -p udp --dport 53 -j DNAT --to 10.5.0.1 #use vpn dns iptables -t nat -A PREROUTING -s 0/0 -p tcp --dport 53 -j DNAT --to 10.5.0.1 # use vpn dns iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE # map tun0 outgoing IP addy, iptables -A OUTPUT -o enp2s1 ! -d 127.0.0.1 -p tcp --dport 1413 -j DROP # if traffic isn't vpn # --> # iptables -A INPUT -p tcp -m state --state NEW -m multiport --dports 22,80,443 -j ACCEPT # ssh, net, ssl # # blocking spam... sleep 2 ipset -N blacklist hash:net sleep 2 # change directory listing here for server IP_TMP=/yourdirectory/ip.tmp IP_BLACKLIST=/yourdirectory/ip-blacklist.conf IP_BLACKLIST_TMP=/yourdirectory/ip-blacklist.tmp list="chinese nigerian russian lacnic exploited-servers" BLACKLISTS=( "http://check.torproject.org/cgi-bin/TorBulkExitList.py?ip=1.1.1.1" # TOR Exit Nodes "http://www.maxmind.com/en/anonymous_proxies" # MaxMind GeoIP Anonymous Proxies "http://danger.rulez.sk/projects/bruteforceblocker/blist.php" # BruteForceBlocker IP List "http://blocklist.greensnow.co/greensnow.txt" # greenz ETz rbn-ips replacement "http://www.spamhaus.org/drop/drop.lasso" # Spamhaus Don't Route Or Peer List (DROP) "http://cinsscore.com/list/ci-badguys.txt" # C.I. Army Malicious IP List "http://www.autoshun.org/files/shunlist.csv" # Autoshun Shun List "http://rules.emergingthreats.net/blockrules/compromised-ips.txt" # bad ipz by emergingz "https://zeustracker.abuse.ch/blocklist.php?download=badips" # mohrr bad ipz "https://palevotracker.abuse.ch/blocklists.php?download=ipblocklist" # mohrrz ipz "http://malc0de.com/bl/IP_Blacklist.txt" # malc0dz recentz 2016 "http://lists.blocklist.de/lists/all.txt" # blocklist.de attackers ) for i in "${BLACKLISTS[@]}" do curl "$i" > $IP_TMP grep -Po '(?:\d{1,3}\.){3}\d{1,3}(?:/\d{1,2})?' $IP_TMP >> $IP_BLACKLIST_TMP done for i in `echo $list`; do # Download if needed change directory for server wget --quiet /yourdirectory/ http://www.wizcrafts.net/$i-iptables-blocklist.html # Grep out all but ip blocks cat $i-iptables-blocklist.html | grep -v \< | grep -v \: | grep -v \; | grep -v \# | grep [0-9] > $i.txt # Consolidate blocks into master list cat $i.txt >> $IP_BLACKLIST_TMP done # sort $IP_BLACKLIST_TMP -n | uniq > $IP_BLACKLIST rm $IP_BLACKLIST_TMP wc -l $IP_BLACKLIST # ipset flush blacklist grep -E -v "^#|^$" $IP_BLACKLIST | while IFS= read -r ip do ipset add blacklist $ip done # sleep 2 # iptables -A INPUT -m set --match-set blacklist src -j DROP sleep 2 # # snag sum zonez... sleep 2 ipset -N geoz1 hash:net sleep 2 wget -O /yourdirectory/spamz1/1.txt http://www.ipdeny.com/ipblocks/data/countries/{sa,so,sv,sy,ua,mn,bo,cz,pl}.zone sleep 1 wget -O /yourdirectory/spamz1/2.txt http://www.ipdeny.com/ipblocks/data/countries/{va,za,tw,zm,zw,is,jp,ru,uz}.zone sleep 1 wget -O /yourdirectory/spamz1/3.txt http://www.ipdeny.com/ipblocks/data/countries/{se,au,ge,pe,ug,md,ca,by,fr}.zone sleep 1 # add each IP address from the downloaded list into the ipset-db'geoz1' for i in $(cat /yourdirectory/spamz1/*.txt); do ipset -A geoz1 $i; done # for server sleep 2 # ipset -N geoz2 hash:net sleep 2 wget -O /yourdirectory/spamz2/4.txt http://www.ipdeny.com/ipblocks/data/countries/{bg,ba,cn,iq,ir,it,cf,es,il}.zone sleep 1 wget -O /yourdirectory/spamz2/5.txt http://www.ipdeny.com/ipblocks/data/countries/{hk,kr,kp,kw,kz,in,br,dz,be}.zone sleep 1 wget -O /yourdirectory/spamz2/6.txt http://www.ipdeny.com/ipblocks/data/countries/{ly,mx,pk,ps,rw,ar,az,de,dm}.zone # add each IP address from the downloaded list into the ipset-db'geoz2' for i in $(cat /yourdirectory/spamz2/*.txt); do ipset -A geoz2 $i; done # for server sleep 2 # blocking geoz... echo "-> blocking country codz..." iptables -I INPUT -m set --match-set geoz1 src -j DROP iptables -I INPUT -m set --match-set geoz2 src -j DROP iptables -I OUTPUT -m set --match-set geoz1 dst -j DROP iptables -I OUTPUT -m set --match-set geoz2 dst -j DROP # # blocking botz... echo "-> droppen sum botz/scanz..." iptables -A INPUT -p tcp -m tcp -m multiport --dports 80,443 -m string --string "NetcraftSurveyAgent" --algo bm --to 1000 -j DROP iptables -A INPUT -p tcp -m tcp -m multiport --dports 80,443 -m string --string "w3af.sourceforge.net" --algo bm --to 1000 -j DROP iptables -A INPUT -p tcp -m tcp -m multiport --dports 80,443 -m string --string "nikto" --algo bm --to 1000 -j DROP iptables -A INPUT -p tcp -m tcp -m multiport --dports 80,443 -m string --string "sqlmap" --algo bm --to 1000 -j DROP iptables -A INPUT -p tcp -m tcp -m multiport --dports 80,443 -m string --string "Openvas" --algo bm --to 1000 -j DROP iptables -A INPUT -p tcp -m tcp -m multiport --dports 80,443 -m string --string "Nmap" --algo bm --to 1000 -j DROP iptables -A INPUT -p tcp -m tcp -m multiport --dports 80,443 -m string --string "ZmEu" --algo bm --to 1000 -j DROP # # blocking mohr spam... echo "-> droppen sum spam..." iptables -A INPUT -p tcp -s 116.0.0.0/8 -j DROP # asia spam'ish' iptables -A INPUT -p tcp -s 58.17.30.0/23 -j DROP # China -ShangHai Shelian commpany iptables -A INPUT -p tcp -s 59.69.128.0/19 -j DROP # China -Nanyang Institute Tech. iptables -A INPUT -p tcp -s 61.164.145.0/24 -j DROP # China -Wenzhou Telecom iptables -A INPUT -p tcp -s 81.196.20.0/23 -j DROP # Romania -RCS & RDS S.A. iptables -A INPUT -p tcp -s 82.213.64.0/19 -j DROP # Italy -MIPIACE.COM SPA iptables -A INPUT -p tcp -s 111.0.0.0/10 -j DROP # China -Mobile Comm Corp iptables -A INPUT -p tcp -s 125.23.218.0/24 -j DROP # India -Bharti Tele-Ventures iptables -A INPUT -p tcp -s 183.129.128.0/17 -j DROP # China -Zhejiang Telecom iptables -A INPUT -p tcp -s 200.105.224.0/20 -j DROP # Ecquadore -PUNTONET S.A. iptables -A INPUT -p tcp -s 203.99.130.0/23 -j DROP # Indonisia -PT Varnion Tech Semesta iptables -A INPUT -p tcp -s 210.83.84.64/26 -j DROP # China -China Unicom CncNet iptables -A INPUT -p tcp -s 222.96.0.0/19 -j DROP # Korea -Korea Telcom iptables -A INPUT -p tcp -s 131.178.0.0/16 -j DROP # Mexico spam'ish' # echo "-> droppen spoofz..." iptables -A INPUT -s 10.0.0.0/8 -j DROP iptables -A INPUT -s 169.254.0.0/16 -j DROP iptables -A INPUT -s 172.16.0.0/12 -j DROP iptables -A INPUT -s 127.0.0.0/8 -j DROP iptables -A INPUT -s 224.0.0.0/4 -j DROP iptables -A INPUT -d 224.0.0.0/4 -j DROP iptables -A INPUT -s 240.0.0.0/5 -j DROP iptables -A INPUT -d 240.0.0.0/5 -j DROP iptables -A INPUT -s 0.0.0.0/8 -j DROP iptables -A INPUT -d 0.0.0.0/8 -j DROP iptables -A INPUT -d 239.255.255.0/24 -j DROP iptables -A INPUT -d 255.255.255.255 -j DROP # echo "-> blocken icbmzzz..." iptables -A INPUT -p icmp -m icmp --icmp-type address-mask-request -j DROP iptables -A INPUT -p icmp -m icmp --icmp-type timestamp-request -j DROP iptables -A INPUT -p icmp -m icmp --icmp-type 8 -m limit --limit 1/second -j ACCEPT iptables -A INPUT -p icmp --icmp-type echo-request -j DROP # echo "-> drop off the invaldz..." iptables -A INPUT -m state --state INVALID -j DROP iptables -A FORWARD -m state --state INVALID -j DROP iptables -A OUTPUT -m state --state INVALID -j DROP # echo "-> limit the rst flow..." iptables -A INPUT -p tcp -m tcp --tcp-flags RST RST -m limit --limit 2/second --limit-burst 2 -j ACCEPT # echo "-> bypass the scanners..." iptables -A INPUT -m recent --name portscan --rcheck --seconds 86400 -j DROP iptables -A FORWARD -m recent --name portscan --rcheck --seconds 86400 -j DROP # echo "-> block some brutez..." iptables -N BRUTEFORCE iptables -A INPUT -p tcp --dport 443 -m conntrack --ctstate NEW -j BRUTEFORCE iptables -A BRUTEFORCE -m recent --set iptables -A BRUTEFORCE -m recent --update --seconds 3600 --hitcount 6 -j DROP # echo "-> avoid broadcasts..." iptables -A INPUT -i $EXTERNAL_INTERFACE -d $BROADCAST_NET -j DROP # echo "-> drop the fragging..." iptables -A INPUT -f -j DROP iptables -A INPUT -p tcp --dport 113 -m state --state NEW -j REJECT --reject-with tcp-reset iptables -A INPUT -p tcp --dport 22 -m recent --update --seconds 60 --hitcount 4 --name SSH -j DROP # echo "-> not into X-Mas..." iptables -A INPUT -p tcp --tcp-flags ALL ALL -j DROP # echo "-> null-la-bye..." iptables -A INPUT -p tcp --tcp-flags ALL NONE -j DROP # echo "-> dropn sum fellaz..." # uncomment to block ipz: iptables -A INPUT -s 239.192.152.143,181.228.206.138,51.254.213.15,82.221.105.7,106.219.59.202 -j DROP iptables -A INPUT -s 122.162.123.217,43.246.249.217,177.83.170.134,37.214.90.130,82.221.105.7 -j DROP iptables -A INPUT -s 208.52.154.240,213.230.72.206,107.20.135.43,197.221.129.138,123.243.167.240 -j DROP iptables -A INPUT -s 5.133.161.202,77.81.6.234,37.153.173.10,190.117.116.177,197.221.129.138 -j DROP iptables -A INPUT -s 217.19.216.243,212.56.214.203,155.94.254.143,67.21.104.221,50.194.147.69 -j DROP iptables -A INPUT -s 87.252.229.9,5.135.151.181,213.230.73.71,104.238.111.88,185.25.151.159 -j DROP iptables -A INPUT -s 141.212.122.129,91.196.50.33,146.185.239.100,198.20.87.98,185.106.92.113 -j DROP iptables -A INPUT -s 109.205.249.84,98.190.250.74,5.141.215.112,193.242.203.131,87.66.122.232 -j DROP iptables -A INPUT -s 104.1.209.192,62.183.125.123,178.218.202.119,207.232.21.133 -j DROP # sleep 2 # echo "-> ignore bad errerz..." # Ignore bad error messages for f in /proc/sys/net/ipv4/icmp_ignore_bogus_error_responses; do echo 1 > $f done # echo "-> disable response to broadkastz..." # Disable response to broadcasts for f in /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts; do echo 1 > $f done # echo "-> downen source routed paketz..." # Disable Source Routed Packets for f in /proc/sys/net/ipv4/conf/*/accept_source_route; do echo 0 > $f done # echo "-> enabling syn cookie protekshun..." # Enable TCP SYN Cookie Protection for f in /proc/sys/net/ipv4/tcp_syncookies; do echo 1 > $f done # echo "-> disabling redirekz..." # Disable ICMP Redirect Acceptance for f in /proc/sys/net/ipv4/conf/*/accept_redirects; do echo 0 > $f done # echo "-> not sending redirekz messuhguz..." # Don't send Redirect Messages for f in /proc/sys/net/ipv4/conf/*/send_redirects; do echo 0 > $f done # echo "-> droppen spoof pakz..." # Drop Spoofed Packets coming in for f in /proc/sys/net/ipv4/conf/*/rp_filter; do echo 1 > $f done # echo "-> saven the setz Chewy..." iptables-save # # now that is waaaayyyyy over kill so take out the stuff ya don't want cheerz
  22. I'm new to vpn's... I'm going to china soon, soi need to beat the great firewall, and still see the websites i see in the uk..is this possible? sites like the bbc (bbc iplayer), also can i view hulu if i conenct to an american server? Finally can I still use torrent sites? OR P2P ?
  23. As someone who has worked internationally, I get my news from multiple sources: DW(Germany), The National(UAE), Global Times (China), Citizens Free Press (US), along with several others. THEY ALL HAVE PROPAGANDA. So what's important to me is to "triangulate" on the truth as much as possible. It's pretty easy to detect most of the bulls$^&t, but there is some sneaky stuff out there that no one will know unless you're on the inside. Anyway, the point is that there's no single source of "truth". It's best to gather as many of what appears to be the facts, and make your own mind up. All of that said, I had rt.com as one of my news sources too, so I'm bummed I can't see it now.
  24. Please keep to your original post:If you don't get answers, it's not because people don't read it, it's because no one can answer you. In such a case, trying professional support via ticket is your best bet – they know which configuration works best in China based on user feedback. I will lock this thread due to it being a duplicate.
  25. Yes, in fact only method of entries '3' and '4' work well and consistently within China. The simple fact is that most servers are based geographically far away from China, so latency is something of an issue for China users. The solution would be more Japan-based servers. The Japan server is pretty damn quick due to the distance, but is the only one which is (in my experience) - I'm only talking about latency here though, not overall connection speed. Purely the latency of the connection. The point is - that It would be nice to have more than one good-latency server for those connecting from China. To get something below 100ms on a consistent basis, the only and sole Japan server is the only way of doing this (AirVPN).
×
×
  • Create New...