Jump to content
Not connected, Your IP: 52.90.227.42

Search the Community

Showing results for 'china'.


Didn't find what you were looking for? Try searching for:


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 445 results

  1. I don't have an evidence for lobbying behind DANE, but there certainly has been power interest in DNS censorship. There is nothing wrong with suspecting such lobbying could have happened. I didn't say it certainly happened. That would be factually wrong without further research. It is already dystopian in regions like north korea, china, and pakistan. But, things can either improve or degrade. Nothing is set in stone at this stage. Being put in prison for just publishing political contents on the internet is certainly dystopian. If you don't think it's dystopian, you can present your own arguments. And, my belief is that people already live in varying degrees of dystopian nightmares in different regions. In some regions, it's not nearly as dystopian, but it's still pretty bad. If you think I'm wrong, I challenge you to methodically present your own arguments against my specific points instead of suddenly telling me I'm toxic and unhealthy. Truth can look horrifying, assuming I'm right about my points. Is it toxic to look at horrible truths? I'm inviting you to a real discussion here. If you methodically point out where and how I am wrong, I would be happy to discuss.
  2. By censorship, I indirectly mean how blindly people obey authority. Regions where people obey authority less are better for bittorrents. For example, if you use a VPN server in china, you may get DMCA letters for using bittorrent. Censorship is anything that blocks free flow of information. Censorship is not a (good) way to address evil behaviors. Another example is using a japan VPN server for downloading japanese contents on bittorrent network. That's not going to fly very well because japanese government claims ownership on people who come in contact with japanese contents. I don't want to burden my VPN provider with additional pressure. At some point, the VPN provider may give up resistance. I don't know which regions are free enough, so I tend to pick a region where people are least likely to obey authority blindly. Censorship index is one measure of how blindly people obey authority. The current server I'm using has enough throughput. I don't need maximum throughput because, most of the time, the bottleneck is not VPN server throughput. Something that works at all is a lot faster than something that doesn't exist. If VPN gives up resistance, there is no point in throughput.
  3. Using the VPN from china is either not connecting or super slow. What’s the preferred settings at the moment?
  4. @itsmeprivately Hello! Please try the following settings (usually they are strictly necessary to bypass China blocks): switch to OpenVPN (if you haven't already done so) by tapping the icon "VPN Type" on the main view. Each tap switches between WireGuard and OpenVPN. force connection over TCP to port 443 in the following way: open "Settings" and expand "AirVPN" by tapping on it tap "Default OpenVPN protocol", select "TCP" and tap "OK" tap "Default OpenVPN port", select "443" and tap "OK" tap "Quick connection mode", select "Use default options only" and tap "OK" Finally test again connections to various servers in various locations. Kind regards
  5. As an addition to the above: When connecting to Eddie on the Huawei mobile phone in China, everything *looks* fine, too. It says in Eddie that it *is* connected (to a server in Singapore). However, when Eddie is connected, the internet of the phone sudenly does not work at all anymore. (No websites or social media apps, no internet at all.). Sending the Log to Air Support also does not succeed for the same reason, because there is no internet on the phone anymore when Eddie is connected. On the other hand, when Air is NOT connected, the internet on the phone works fine (but of course only Chinese-approved websites).
  6. On a Huawei Honor mobile phone, AirVPN does not seem to work in China. I have installed the Android Client (Eddie - Air VPNGUI) without problems, and it also worked in other countries without problems. But in China it does not work. The only different setting I made to the standard settings is that I set the "Current local country" from the drop-down list to "People's Republic of China". Are there any other special settings one must use on a mobile phone when in China?
  7. Hello! OpenVPN over UDP and WireGuard are blocked on most (if not all) China residential lines. You need the following connection mode: OpenVPN protocol TCP port 443 entry-IP address 3 (three) When you run Eddie you can change connection mode on the "Preferences" > "Protocols" window. Uncheck "Automatic", select the proper line (the selection is confirmed by highlighted line) and click "Save". Kind regards
  8. Gross. Selling out to an American company is a quick way to throw away your entire reputation. I considered subscribing with them at one point, glad I didn't. Clearly David Wibergh is willing to put money before the privacy and security of his users. Aura owns Hotspot Shield too. I've never heard of VPN360 or UltraVPN. Apparently Hotspot Shield has servers in Russia and China? What??? Thanks for the heads up.
  9. My flight was postponed and as a lone stranger in a strange land when the evening starts on a Sunday I have now plenty of available time. I'm posting what I promised, let me know where you agree and where you disagree and why. I provide my own reasons to explain each score modification from the original table. At the end I determine the new average score after the changes. One score modification is pejorative, I provide good reasons in my opinion in that case too. The source table is the one linked originally when this thread was created. After a discussion I would like to publish the fixes wherever I can, especially in /r/vpnreviews (but the message could be deleted there) but first I would like to gather opinions, corrections and comments (or insults! ). In brackets the scoring given by the table's author, followed by my reasons. SPEED 5 (4) For my job I spend my years in Spain, Italy, Germany, China and Japan and AirVPN is the fastest in each of these countries with plenty of different providers. Since Mullvad and NordVPN get "5" but are significantly slower than AirVPN for me, I assign to AirVPN a 5 too.In China AirVPN is slow but at least it bypasses the blocks, while all the other VPN I tested don't, except in luxury hotels in Shanghai and other major cities, where the blocks are lifted for tourists and businessmen. PROTOCOLS 5 (1) Because AirVPN offers a huge variety of protocols on a great variety of ports. While it lacks obfsproxy, it offers a combo over Tor/SSL/TLS/SSH, WireGuard with pre-shared keys, connectable to low and high ports unavailable on other VPN services rated "5". So a "5" is due to AirVPN as well. RAM SERVERS 5 (0) Because I trust AirVPN staff claiming this. "Running on" RAM disks is trivial and easy, I see no reason to doubt about this claim on such an obvious and easy to implement feature. TRANSPARENCY BUG BOUNTY 5 (3) Because the Vulnerability Disclosure Policy and Bug Bounty Program are clearly written, have their own page linked by the FAQ, provide clear and easy instructions to report, and publish transparently a vulnerability found by Fortinet labs. PRICING 5 (3) Because AirVPN offers by far the best price on long plans. It is even cheaper during promotions, it offers free access and trials very liberally. BYPASSING RESTRICTIVE NETWORKS 5 (2) Because it's the only VPN I can still access from various China cities. ETHICS 5 (3) Because AirVPN - does not pay for reviews (verified through baits, sorry staff ) - does not pay ransoms to cancel a fabricated negative review - had the guts and the intellectual honesty to support WikiLeaks and Assange during the outrageous smear campaign and character assassination plotted by USA, UK and Sweden. No other VPN spent a word at those times and not even by far they donated the tens of thousand bucks donated by AirVPN - runs directly or indirectly many Tor nodes - is an early supporter of Mastodon and PeerTube - is a major monetary supporter of Xnet open source project to free European schools from nefarious Google and Microsoft online tools - releases only free and open source software - supported economically Chelsea Manning when she heavily needed money. AirVPN did so in defiance of all the pressures and the threats I and you all could read (in this forum too, do you remember?) against anyone who "dared" to support monetarily her - offers a tracker free Android software CUSTOMER SUPPORT 5 (3) Because it is the only support service that was able to explain to me how to run an FTP server behind a VPN server and how to load balance from a single BSD / pfSense system two or more simultaneous connections to different VPN servers. AD-BLOCKER 5 (0) Because the AirVPN ad blocker is the most flexible and configurable tool I have seen in any VPN service with custom exceptions, additions, multiple public list choices and API support. LEAK PROTECTION 5 (4) Because the leak protection is well written firewall rules and more effective than NordVPN leak protection. Since Nord has 5, then AirVPN must have 5 too. OTHER ADDITIONAL FEATURES 5 (2) Because it's the only VPN offering: - a tool to find contiguous remote ports to forward - a good API to interact with several tools avoiding the web site manual interfacing - multiple DDNS services which really work - the cooolest configuration generator, accessible both from web and API - a valuable and unique feature to decide which ports must be forwarded to which devices - OpenVPN3 development which wiped out multi-year bugs in the original OpenVPN3 library - OpenVPN over Tor "natively" (with this I mean that the user just need to run Tor and then the Eddie software does all the required adjustments and setup to connect OpenVPN through Tor) on Eddie for Windows, Linux, Mac AVAILABILITY 1 (3) Two points less, this is the only pejorative score in my opinion. Because: - the AirVPN Suite for Linux, which on the other hand is impeccably documented, still does not offer WireGuard after 1 year that WireGuard is available on VPN servers, hinting to a dangerously slow development activity - the AirVPN Suite for Linux does not even offer the most basic traffic splitting abilities, forcing the Linux users to custom solutions and unnecessary work, or to switch to Eddie with Mono - Eddie for Windows, Linux and Mac documentation is shabby and lazy. Some interesting features of the GUI are completely undocumented. - Eddie for Linux still needs the Mono framework for the GUI, hindering usage on embedded and low specs systems. With the above corrections, the total score goes from 47 to 75 (+28), and the average score goes to 75/18 = 4.17. Pretty impressive. Let me know what you think, if you find errors and anything else you want. Did I forget some fancy AirVPN feature? Did I forget some important flaw? After the discussion to improve me and fix errors, I will publish this as a review around, in Reddit, including r/vpnreviews (where it could be deleted, we'll see). Greetings from somewhere in Japan. Hope to read you all when I am back to Europe.
  10. Currently lifted for the time being, nothing to see here.
  11. Not only TikTok. For example the Bitcoin network can not be controlled so a transaction from an American citizen could potentially go to a citizen of a country that's "a menace" for the USA (definition of enemy and menace is discretionary, the used language seems fine tuned to allow scope enlargement at will without judiciary supervision). Since that's not controllable, we find it potentially possible that operators might be required to block "the Bitcoin network". What's worse, according to a preliminary interpretation of the text, if in some way (difficult but personal and house search, pre-selected through the usual monitoring performed by USA ISPs, can help...) it can be proved that a USA citizen has used some tool like Tor or VPN to access any of the blocked network / services etc., that citizen will be prosecuted: civil liability up to a million of dollars, and criminal behavior subjected to up to 20 years in jail - which, if we're not mistaken, is worse than in China, Russia, and various countries controlled by human rights hostile regimes. Kind regards
  12. Travelling to China soon, is the bootstrap and app working there?
  13. Hi, Sorry to bump up this old thread. I've got an issue with DNS leak here and would like some help. This is the most relevant thread I found. I'm based in China and using ASUS Merlin with OpenVPN. The China Great Firewall blocks us from accessing google/youtube/twitter etc. AirVPN has been a tremendous help for us to access the internet freely. However, sometimes I found myself losing access to these websites. When I try ipleak.net, it usually shows my local ISPs. So I suspect that's the reason. What would be the best practice to avoid this? If I specify an open DNS server, it usually massively reduce my internet speed accessing local websites. I tried to change the OpenVPN DNS config to "Exclusive" and sometimes it works, but I'd love to know what's the best solution here. Thanks in advance!
  14. Hi! Please, somebody can confirm that AirVPN is working in China (2022)? Thanks, M
  15. You can find decent number of servers in europe which are not blocked yet (no, be & others which can't say completely to prevent them from being blocked) Generally, openvpn/wireguard fingerprint is easy to detect and block by dpi firewalls (which has been bought from china) ... solid solutions are naïveproxy, trojan & vmess/vless ... I don't know airvpn team has any plan to deploy them or not. @Staff
  16. This 2 list not are my own, i just use few theyr list (Pi-hole and Ublock origin example). But is here any sense add this couple list ? Energized Protection - block Website : https://energized.pro/ Github : https://github.com/EnergizedProtection/block 2 Different blocklist : Energized Ultimate list & Energized IP Extension, there is many other lists, but i like this 2 list. Energized Ultimate List : # Title: Energized Ultimate Protection # Description: Flagship Protection Pack from Energized Protection. # Format: domain list # Version: 22.05.127 # Release: 127 # Entries: 435,142 # Pack Code: EUL71M473-P # License: MIT, https://energized.pro/license # Updated: Sat, 07 May 22 00:16:32 +06 # RAW: https://block.energized.pro/ultimate/formats/domains.txt Core List + Basic + 1Hosts (Pro), BarbBlock, Bjornstar's Hosts, Cybercrime, Disconnect Malvertising & Tracking Filter List, EasyPrivacy Specific, Thirdparty & Tracking Servers, Matomo Referrer Spam Blacklist, Openphish, Phishing Bad Sites, Phishing Hosts, Prigent's Malware & Phishing, Quidsup NoTrack and StopForumSpam Second list... Energized Regional Extension # Title: Energized Regional Extension # Description: An Extension to Block Regional Annoyances. # Format: domain list # Version: 22.05.127 # Release: 127 # Entries: 39,442 # Pack Code: EXR3G1094L-P # License: MIT, https://energized.pro/license # Updated: Sat, 07 May 22 00:17:00 +06 # RAW: https://block.energized.pro/extensions/regional/formats/domains.txt ABPindo, AdBlockID, Adblock Estonian & Iran, Adguard Dutch, English, French, German, Japanese, Russian, Turkish & Spanish - Portuguese Filter, Dandelion Sprout's Nordic Filters, Easylist Brasil, China, Czech & Slovak, Dutch, French, Germany, Italy, India, Korea, Polish, Russian, Spanish and Thailand, Fanboy's Indian & Vietnamese, HostsVN, hufilter, Liste AR, Polish Adblock & Privacy Filters, RUAdList and Thai Ads Filter What you feel with this lists ? It is already included someone else list ? I think ultimate list can break part of websites, but i dont care myself. This group wrote example github, they update list every 24h. But i dont know what is real update time. Is this Custom answers section on dns page here this where i can itself block websites ? How it works ? Just write www.google.com, put mode "domain" and klick Deny and then google is blocked ? Can i block all googles address just write google and add wildcard + deny and then all google domain and subdomain is blocked ? Can i use RegEx rule to block something ? I need to ask becouse i dont understand what is "custom answer" in here dns page. Edit: I forgot. Is here already added some list what blocks all microsoft spying address ? I have pi-hole and there is list what blocks microsoft. List breaks some stuff on windows but i dont care, much better blocked and not let them spy on you. I didnt even know how much microsoft sending data out before i get installed pi-hole and i see whats really happend about every klick on windows. Im lucky becouse i found then Linux world and all stress disappear Keep it simple but more is much powerful !
  17. As someone who has worked internationally, I get my news from multiple sources: DW(Germany), The National(UAE), Global Times (China), Citizens Free Press (US), along with several others. THEY ALL HAVE PROPAGANDA. So what's important to me is to "triangulate" on the truth as much as possible. It's pretty easy to detect most of the bulls$^&t, but there is some sneaky stuff out there that no one will know unless you're on the inside. Anyway, the point is that there's no single source of "truth". It's best to gather as many of what appears to be the facts, and make your own mind up. All of that said, I had rt.com as one of my news sources too, so I'm bummed I can't see it now.
  18. Please keep to your original post:If you don't get answers, it's not because people don't read it, it's because no one can answer you. In such a case, trying professional support via ticket is your best bet – they know which configuration works best in China based on user feedback. I will lock this thread due to it being a duplicate.
  19. I live in China. Recently the download speed has about 5Mbps after 1pm utc time(night in China) with VPN, but the upload speed is fine, about 100Mbps. Without AirVPN, the speed test is normal. The download speed in the daytime is fine, about 400Mbps. Any idea how to troubleshooting this?
  20. Here it is: Eddie System/Environment Report - 2021/11/17 - 9:48 UTC Eddie version: 2.21.2beta Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Home China OS version: Microsoft Windows NT 10.0.19042.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN drivers: 0901: 9.21.2 OpenVPN: 2.5.3 - OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: Not available WireGuard: 0.3.11 SSH: plink 0.73 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\xxxx\AppData\Local\Eddie\default.profile Data path: C:\Users\xxxx\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (0 args) Network Lock Active: No Connected to VPN: No Detected DNS: 192.168.31.1 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 227 ms Test Ping IPv6: Failed Test HTTP IPv4: Error: Fetch url error:Timeout was reached Test HTTP IPv6: Error: Fetch url error:Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True mode.type: openvpn mode.protocol: TCP mode.alt: 2 ---------------------------- Logs: . 2021.11.17 17:46:31 - Eddie version: 2.21.2beta / windows_x64, System: Windows, Name: Windows 10 Home xxxx, Version: Microsoft Windows NT 10.0.19042.0, Mono/.Net: v4.0.30319 . 2021.11.17 17:46:33 - Reading options from C:\Users\xxxx\AppData\Local\Eddie\default.profile . 2021.11.17 17:46:37 - OpenVPN - Version: 2.5.3 - OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2021.11.17 17:46:37 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2021.11.17 17:46:37 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2021.11.17 17:46:38 - Ready . 2021.11.17 17:46:40 - Collect information about AirVPN completed I 2021.11.17 17:46:44 - Session starting. I 2021.11.17 17:46:45 - Checking authorization ... ! 2021.11.17 17:46:46 - Logged out. I 2021.11.17 17:46:46 - Checking login ... ! 2021.11.17 17:46:47 - Logged in. ! 2021.11.17 17:46:47 - Connecting to Iskandar (Japan, Tokyo) . 2021.11.17 17:46:50 - Routes, add 82.102.28.109/32 for interface "WLAN (Qualcomm Atheros QCA9377 Wireless Network Adapter)". . 2021.11.17 17:46:51 - Routes, add 82.102.28.109/32 for interface "WLAN (Qualcomm Atheros QCA9377 Wireless Network Adapter)", already exists. . 2021.11.17 17:46:51 - OpenVPN > OpenVPN 2.5.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 17 2021 . 2021.11.17 17:46:51 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.11.17 17:46:51 - OpenVPN > library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 . 2021.11.17 17:46:51 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.11.17 17:46:51 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.11.17 17:46:51 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.11.17 17:46:51 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.11.17 17:46:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]82.102.28.109:443 . 2021.11.17 17:46:51 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.11.17 17:46:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET]82.102.28.109:443 [nonblock] . 2021.11.17 17:46:51 - OpenVPN > TCP connection established with [AF_INET]82.102.28.109:443 . 2021.11.17 17:46:51 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.11.17 17:46:51 - OpenVPN > TCP_CLIENT link remote: [AF_INET]82.102.28.109:443 . 2021.11.17 17:46:51 - OpenVPN > TLS: Initial packet from [AF_INET]82.102.28.109:443, sid=95ab4964 6ea9befb . 2021.11.17 17:46:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.11.17 17:46:52 - OpenVPN > VERIFY KU OK . 2021.11.17 17:46:52 - OpenVPN > Validating certificate extended key usage . 2021.11.17 17:46:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.11.17 17:46:52 - OpenVPN > VERIFY EKU OK . 2021.11.17 17:46:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Iskandar, emailAddress=info@airvpn.org . 2021.11.17 17:46:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2021.11.17 17:46:52 - OpenVPN > [Iskandar] Peer Connection Initiated with [AF_INET]82.102.28.109:443 . 2021.11.17 17:46:53 - OpenVPN > SENT CONTROL [Iskandar]: 'PUSH_REQUEST' (status=1) . 2021.11.17 17:46:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.171.1,dhcp-option DNS6 fde6:7a:7d20:fab::1,tun-ipv6,route-gateway 10.19.171.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:fab::1003/64 fde6:7a:7d20:fab::1,ifconfig 10.19.171.5 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2021.11.17 17:46:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.11.17 17:46:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.171.1' . 2021.11.17 17:46:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:fab::1' . 2021.11.17 17:46:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.11.17 17:46:53 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.11.17 17:46:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.11.17 17:46:53 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.11.17 17:46:53 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.11.17 17:46:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2021.11.17 17:46:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.11.17 17:46:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.11.17 17:46:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.11.17 17:46:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.11.17 17:46:53 - OpenVPN > interactive service msg_channel=0 . 2021.11.17 17:46:53 - OpenVPN > open_tun . 2021.11.17 17:46:53 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2021.11.17 17:46:53 - OpenVPN > Exiting due to fatal error ! 2021.11.17 17:46:53 - Disconnecting . 2021.11.17 17:46:56 - Routes, delete 82.102.28.109/32 for interface "WLAN (Qualcomm Atheros QCA9377 Wireless Network Adapter)". . 2021.11.17 17:46:57 - Routes, delete 82.102.28.109/32 for interface "WLAN (Qualcomm Atheros QCA9377 Wireless Network Adapter)", not exists. . 2021.11.17 17:46:57 - Connection terminated. I 2021.11.17 17:47:00 - Checking authorization ... ! 2021.11.17 17:47:01 - Logged out. I 2021.11.17 17:47:02 - Checking login ... ! 2021.11.17 17:47:02 - Logged in. ! 2021.11.17 17:47:03 - Connecting to Xuange (Switzerland, Zurich) . 2021.11.17 17:47:05 - Routes, add 79.142.69.162/32 for interface "WLAN (Qualcomm Atheros QCA9377 Wireless Network Adapter)". . 2021.11.17 17:47:07 - Routes, add 79.142.69.162/32 for interface "WLAN (Qualcomm Atheros QCA9377 Wireless Network Adapter)", already exists. . 2021.11.17 17:47:07 - OpenVPN > OpenVPN 2.5.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 17 2021 . 2021.11.17 17:47:07 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.11.17 17:47:07 - OpenVPN > library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 . 2021.11.17 17:47:07 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.11.17 17:47:07 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.11.17 17:47:07 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.11.17 17:47:07 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.11.17 17:47:07 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]79.142.69.162:443 . 2021.11.17 17:47:07 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.11.17 17:47:07 - OpenVPN > Attempting to establish TCP connection with [AF_INET]79.142.69.162:443 [nonblock] ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "destination": "0.0.0.0\/0", "gateway": "192.168.31.1", "interface_index": 20, "metric": 0, "interface": "{BD53868C-B0D4-4D32-BB49-57C8362D2C04}" }, { "destination": "79.142.69.162\/32", "gateway": "192.168.31.1", "interface_index": 20, "metric": 0, "interface": "{BD53868C-B0D4-4D32-BB49-57C8362D2C04}" }, { "destination": "127.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{28B080A4-41FE-11E8-A2F9-806E6F6E6963}" }, { "destination": "127.0.0.1\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{28B080A4-41FE-11E8-A2F9-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{28B080A4-41FE-11E8-A2F9-806E6F6E6963}" }, { "destination": "192.168.31.0\/24", "gateway": "0.0.0.0", "interface_index": 20, "metric": 256, "interface": "{BD53868C-B0D4-4D32-BB49-57C8362D2C04}" }, { "destination": "192.168.31.148\/32", "gateway": "0.0.0.0", "interface_index": 20, "metric": 256, "interface": "{BD53868C-B0D4-4D32-BB49-57C8362D2C04}" }, { "destination": "192.168.31.255\/32", "gateway": "0.0.0.0", "interface_index": 20, "metric": 256, "interface": "{BD53868C-B0D4-4D32-BB49-57C8362D2C04}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{28B080A4-41FE-11E8-A2F9-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 13, "metric": 256, "interface": "{6AD0D3F6-9398-4B74-91D3-227FE2A5F871}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 21, "metric": 256, "interface": "{C47C0FEB-D997-4C2E-B693-00BCA72B927C}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 20, "metric": 256, "interface": "{BD53868C-B0D4-4D32-BB49-57C8362D2C04}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{10859E6D-991E-4AEA-966B-53140B29DF05}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 12, "metric": 256, "interface": "{5D7C2CD5-9A75-1AC5-6245-118F1C411193}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 19, "metric": 256, "interface": "{AB9C3F02-2FE7-4C50-9C28-90803A060C64}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 11, "metric": 256, "interface": "{56A81F3C-0E9F-43AB-A5AD-AA71545932D6}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 10, "metric": 256, "interface": "{5077FD42-4AD1-4B44-A95A-841BD8C221C3}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{28B080A4-41FE-11E8-A2F9-806E6F6E6963}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 13, "metric": 256, "interface": "{6AD0D3F6-9398-4B74-91D3-227FE2A5F871}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 21, "metric": 256, "interface": "{C47C0FEB-D997-4C2E-B693-00BCA72B927C}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 20, "metric": 256, "interface": "{BD53868C-B0D4-4D32-BB49-57C8362D2C04}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{10859E6D-991E-4AEA-966B-53140B29DF05}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 12, "metric": 256, "interface": "{5D7C2CD5-9A75-1AC5-6245-118F1C411193}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 19, "metric": 256, "interface": "{AB9C3F02-2FE7-4C50-9C28-90803A060C64}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 11, "metric": 256, "interface": "{56A81F3C-0E9F-43AB-A5AD-AA71545932D6}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 10, "metric": 256, "interface": "{5077FD42-4AD1-4B44-A95A-841BD8C221C3}" }, { "destination": "::1\/128", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{28B080A4-41FE-11E8-A2F9-806E6F6E6963}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 11, "metric": 256, "interface": "{56A81F3C-0E9F-43AB-A5AD-AA71545932D6}" }, { "destination": "fe80::1996:2e6:8334:6bc3\/128", "gateway": "::", "interface_index": 11, "metric": 256, "interface": "{56A81F3C-0E9F-43AB-A5AD-AA71545932D6}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{28B080A4-41FE-11E8-A2F9-806E6F6E6963}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 11, "metric": 256, "interface": "{56A81F3C-0E9F-43AB-A5AD-AA71545932D6}" } ], "ipv4-default-gateway": "192.168.31.1", "ipv4-default-interface": "{BD53868C-B0D4-4D32-BB49-57C8362D2C04}", "interfaces": [ { "friendly": "\u4ee5\u592a\u7f51", "id": "{C47C0FEB-D997-4C2E-B693-00BCA72B927C}", "name": "\u4ee5\u592a\u7f51", "description": "Realtek PCIe GbE Family Controller", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.114.161" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "NordLynx", "id": "{5D7C2CD5-9A75-1AC5-6245-118F1C411193}", "name": "NordLynx", "description": "NordLynx Tunnel", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.57.70" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "\u672c\u5730\u8fde\u63a5", "id": "{6AD0D3F6-9398-4B74-91D3-227FE2A5F871}", "name": "\u672c\u5730\u8fde\u63a5", "description": "ExpressVPN Wintun Driver", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.8.3" ], "bind": true, "dns4": "10.137.0.1", "dns6": null }, { "friendly": "\u4ee5\u592a\u7f51 2", "id": "{56A81F3C-0E9F-43AB-A5AD-AA71545932D6}", "name": "\u4ee5\u592a\u7f51 2", "description": "TAP-Windows Adapter V9", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::1996:2e6:8334:6bc3", "169.254.107.195" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "\u4ee5\u592a\u7f51 6", "id": "{5077FD42-4AD1-4B44-A95A-841BD8C221C3}", "name": "\u4ee5\u592a\u7f51 6", "description": "TAP-NordVPN Windows Adapter V9", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.112.33" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "\u672c\u5730\u8fde\u63a5* 3", "id": "{AB9C3F02-2FE7-4C50-9C28-90803A060C64}", "name": "\u672c\u5730\u8fde\u63a5* 3", "description": "Microsoft Wi-Fi Direct Virtual Adapter #2", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.212.100" ], "bind": true, "dns4": "54.93.169.181,212.71.249.225", "dns6": null }, { "friendly": "\u672c\u5730\u8fde\u63a5* 1", "id": "{10859E6D-991E-4AEA-966B-53140B29DF05}", "name": "\u672c\u5730\u8fde\u63a5* 1", "description": "Microsoft Wi-Fi Direct Virtual Adapter #4", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.66.177" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "WLAN", "id": "{BD53868C-B0D4-4D32-BB49-57C8362D2C04}", "name": "WLAN", "description": "Qualcomm Atheros QCA9377 Wireless Network Adapter", "type": "Wireless80211", "status": "Up", "bytes_received": "321947021", "bytes_sent": "41646426", "support_ipv4": true, "support_ipv6": false, "ips": [ "192.168.31.148" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{28B080A4-41FE-11E8-A2F9-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "bind": true, "dns4": "", "dns6": null } ] } ---------------------------- ipconfig /all: Windows IP 配置 主机名 . . . . . . . . . . . . . : DESKTOP-XXXX 主 DNS 后缀 . . . . . . . . . . . : 节点类型 . . . . . . . . . . . . : 混合 IP 路由已启用 . . . . . . . . . . : 否 WINS 代理已启用 . . . . . . . . . : 否 以太网适配器 以太网: 媒体状态 . . . . . . . . . . . . : 媒体已断开连接 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : Realtek PCIe GbE Family Controller 物理地址. . . . . . . . . . . . . : 98-29-A6-5D-BD-1E DHCP 已启用 . . . . . . . . . . . : 是 自动配置已启用. . . . . . . . . . : 是 未知适配器 NordLynx: 媒体状态 . . . . . . . . . . . . : 媒体已断开连接 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : NordLynx Tunnel 物理地址. . . . . . . . . . . . . : DHCP 已启用 . . . . . . . . . . . : 否 自动配置已启用. . . . . . . . . . : 是 未知适配器 本地连接: 媒体状态 . . . . . . . . . . . . : 媒体已断开连接 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : ExpressVPN Wintun Driver 物理地址. . . . . . . . . . . . . : DHCP 已启用 . . . . . . . . . . . : 是 自动配置已启用. . . . . . . . . . : 是 以太网适配器 以太网 2: 媒体状态 . . . . . . . . . . . . : 媒体已断开连接 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : TAP-Windows Adapter V9 物理地址. . . . . . . . . . . . . : 00-FF-56-A8-1F-3C DHCP 已启用 . . . . . . . . . . . : 是 自动配置已启用. . . . . . . . . . : 是 以太网适配器 以太网 6: 媒体状态 . . . . . . . . . . . . : 媒体已断开连接 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : TAP-NordVPN Windows Adapter V9 物理地址. . . . . . . . . . . . . : 00-FF-50-77-FD-42 DHCP 已启用 . . . . . . . . . . . : 是 自动配置已启用. . . . . . . . . . : 是 无线局域网适配器 本地连接* 3: 媒体状态 . . . . . . . . . . . . : 媒体已断开连接 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2 物理地址. . . . . . . . . . . . . : 62-5B-C2-FC-75-03 DHCP 已启用 . . . . . . . . . . . : 否 自动配置已启用. . . . . . . . . . : 是 无线局域网适配器 本地连接* 1: 媒体状态 . . . . . . . . . . . . : 媒体已断开连接 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #4 物理地址. . . . . . . . . . . . . : 52-5B-C2-FC-75-03 DHCP 已启用 . . . . . . . . . . . : 是 自动配置已启用. . . . . . . . . . : 是 无线局域网适配器 WLAN: 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : Qualcomm Atheros QCA9377 Wireless Network Adapter 物理地址. . . . . . . . . . . . . : 50-5B-C2-FC-75-03 DHCP 已启用 . . . . . . . . . . . : 是 自动配置已启用. . . . . . . . . . : 是 IPv4 地址 . . . . . . . . . . . . : 192.168.31.148(首选) 子网掩码 . . . . . . . . . . . . : 255.255.255.0 获得租约的时间 . . . . . . . . . : 2021年11月17日 17:42:33 租约过期的时间 . . . . . . . . . : 2021年11月18日 5:42:44 默认网关. . . . . . . . . . . . . : 192.168.31.1 DHCP 服务器 . . . . . . . . . . . : 192.168.31.1 DNS 服务器 . . . . . . . . . . . : 192.168.31.1 TCPIP 上的 NetBIOS . . . . . . . : 已启用
  21. Sorry for being late. I have two VPN servers: 1. VPN server #1 (tls-crypt): I setup a VPN server on my Asus router with tls-crypt enabled. 2. VPN server #2 (no tls-crypt): This is a VPN server the company gave me for teleworking. I can connect to those two from many places. I want to check whether they can be connected from China. It was difficult for me to have an IP in China to test this. Luckily, Astrill VPN has one China IP. My PC connect to it and share a Wifi hotspot to a mobile device. The "OpenVPN Connect" app on the device can establish a connection to #1, but not #2. I am not 100% certain that whether being no tls-crypt is the cause. I think I would edit the #1 to "no tls-crypt" and try it again. If #1 cannot be connected after then tls-crypt would is crucial. However I don't dare to make the Great Firewall know the IP of #1 serves as a VPN server.
  22. If you accuse Russia, Belarus, Kazakhstan and/or China of widespread internet censorship, you act against one of UN's best interests: Preventing hostilities. If you know that almost all sovereign states in the world are members, you may realize how very difficult it gets to release such a paper with clear and directed accusations of naughty things, knowing full well that some of those naughty countries possess the means to cripple the world, either by means of economy or warfare. So you keep a low profile when addressing countries directly. It's simply in no one's interest to do that, it's better to "suffer" the fact a naughty country does not particularly adhere to UN chartas than to chastise a member for it and risking god knows what. You also cannot expect the UN to have a clear opinion on internet censorship. Access to the internet is not a human right, let alone free-as-in-freedom access to it. Your measurement of how many times a country is mentioned is the same bogus as when some manager rates the quality of your code by how many lines you wrote. What it especially doesn't say is that UN endorses or even supports censorship, that's an entirely subjective, malicious interpretation.
  23. I finished reading https://jigsaw.google.com/the-current/shutdown/ the other day, this beautiful presentation highlights mostly the spectrum of political 'lights out' events when entire regions are denied access to the Internet, for example during elections. I commend them for including a lot of references there, the kind of action modern journalists don't need to do apparently. One of these references linked this UN document: https://undocs.org/A/HRC/47/24/Add.2 One of the most flagrant attacks on the Internet that had an immediate impact on me personally were commited in Belarus and Russia in the recent years. In the past 7 or 8 years Russia had been tightening their control over the Internet and that included banning websites (like EVE Online and their wiki article about an in-game drug LOL) or bloggers/apps that did not agree with the mandatory "registry" registration, e.g. Telegram. In their attempt to ban Telegram, the government has had over 2 million IPs of Google and Amazon blocked which led to massive and unrelated service failures. Some of the international traffic in and out of Belarus is routed through big russian transit providers and as a result some of these blocks have unlawfully hit belarussian citizens. And of course these laws were used to block political websites. How often does Russia appear in this report? Answer: ONCE. As a footnote 78 on page 12. This doesn't reference law changes from 2012-2014 and later that lead to current blocks! Belarus' internet censorship. I don't think I have to explain much because this was so recent during the last "election". At least the report acknowledges it fully, five times no less: I can confirm there were disruptions, but I'm still here thanks to AirVPN : ) Thanks for non-standard connection options. I don't know who exactly they're talking about, but this reminds me of Cisco helping to build the Great Firewall of China! The UN welcomes internet censorship How often does China appear in this report? Occurrences: 0. What's legal today can quickly become illegal tomorrow, no matter justified or not, morally correct or not. The UN completely agrees with such laws: just please don't block the entire internet, ok? Basically totalitarian governments can do whatever if they take 2 months time to write it as law. Maybe the new law was put together by a lobby group, doesn't matter. You are allowed to censor then. American services banning Iranian users if connected without VPN? Totally cool with that! Russia banning 2 million IPs? Haha at least you didn't ban 4 milliard IPs, you get a free pass! Ukraine blocks access to all russian social networks due to war in the east? Ukraine, occurrences = 0. The UN loves "lawful" internet censorship.
  24. Hello, Since yesterday, I have been unable to access Air on my home network. On bluetit, the AirVPN manifest can be loaded but there is a timeout when logging on with my username. I'm based in China. The problem is only with the username and password stage, as when I use Eddie to log on, the username and password have already been inputted and I can can begin to connect to servers, although the checking authorisation stage can take a few minutes before it will start to connect properly. All of the bootstrap servers available in bluetit are affected and show the same behaviour. It is a problem with my home network, as when I connect on a mobile network, there are no problems. Is there anything I can do to rectify this or am I SOL? Thanks for whatever support you can offer!
  25. Define censorship. As long as you can find what once happened on Tiananmen Square in China, who Snowden is and footage from LiveLeak, nothing is censored. You may even find explicit pornography and scenes of murder on Google and Bing nowadays. What you won't find is child porn, but I'd be very careful in calling this an act of censorship. It's in the nature of the deep/hidden web to not have been indexed. That's why it's called hidden. No amount of "uncensored" search engines will help you here since they all work in a similar way. Some info simply can't be indexed for search engines, like databases. But it is true, DuckDuckGo won't ever find info on .onion hosts. It may find mentions of .onion addresses in the clearnet, though.
×
×
  • Create New...