Jump to content
Not connected, Your IP: 44.213.63.130

Search the Community

Showing results for 'china'.


Didn't find what you were looking for? Try searching for:


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 410 results

  1. Hi, Sorry to bump up this old thread. I've got an issue with DNS leak here and would like some help. This is the most relevant thread I found. I'm based in China and using ASUS Merlin with OpenVPN. The China Great Firewall blocks us from accessing google/youtube/twitter etc. AirVPN has been a tremendous help for us to access the internet freely. However, sometimes I found myself losing access to these websites. When I try ipleak.net, it usually shows my local ISPs. So I suspect that's the reason. What would be the best practice to avoid this? If I specify an open DNS server, it usually massively reduce my internet speed accessing local websites. I tried to change the OpenVPN DNS config to "Exclusive" and sometimes it works, but I'd love to know what's the best solution here. Thanks in advance!
  2. Hello! Our commitment against censorship is enshrined in our mission statement https://airvpn.org/mission. All the aims enshrined in the mission statement have the same dignity, and each one is limited only by the staff technical abilities and, as far as it pertains to the support to other organizations or individuals, by economic readiness (funds availability). Currently we especially rely on Tor nodes and obfuscated bridges, even (but not only) by supporting organizations and individuals who are very active in setting up obfuscated bridges (sometimes ephemeral for the usual cat and mouse game caused by bridge hunting, address blocks etc.). List of addresses, not even of Tor bridges set up by AirVPN staff members, will not be advertised in this forum because their block would be trivially sped up (hello censors!). Tor and obfuscated bridges are not strictly necessary in China, where you can currently bypass the block with OpenVPN in tls-crypt or over TLS (only to some specific ports), but they have become necessary in Iran, according to the latest reports we have received. OpenVPN over SSL and over SSH are ineffective in Iran, at the moment. We have found that tls-crypt (the default connection mode by Eddie Android edition for example, with auto-switch to TCP when UDP fails) is just as effective as OpenVPN over TLS to bypass blocks, and when tls-crypt doesn't work, usually even OpenVPN over TLS doesn't work (remember that for special cases, it's easier for the lunatic censors to just block ranges of IP addresses instead of trying to detect specific fingerprints). Therefore implementing OpenVPN over SSL/TLS in Android doesn't seem an effective idea. It remains to be seen whether implementing OpenVPN over SSH would be useful, but then again Orbot with obsf4 bridges is easy to configure and in most cases more effective than OpenVPN over SSH to bypass blocks: Tor bridges offer a flexibility in IP addresses which is unthinkable with a consumers' VPN service, where we are slowed down by contractual agreements, by the risk to have all the servers in a datacenter suspended for an alleged infringement in one of them, by the transparency of the IP addresses which must be readily available to all customers (and therefore to all censors) and so on and so forth. Therefore, providing and financing tools and machines to bypass censorship outside the VPN infrastructure is usually more effective. We have no reports from Kazakhstan, unfortunately. You might test Tor obsf bridges, maybe there's a chance they can bypass the block. Please feel free to give us information, if you live there, preferably in private (if necessary, gpg for easy mail encryption is available for info@airvpn.org ). Kind regards
  3. Kazakh's govs, for example, been buying israeli systems for blocking like in China. Or for surveillance of citizens.
  4. Hi! Please, somebody can confirm that AirVPN is working in China (2022)? Thanks, M
  5. You can find decent number of servers in europe which are not blocked yet (no, be & others which can't say completely to prevent them from being blocked) Generally, openvpn/wireguard fingerprint is easy to detect and block by dpi firewalls (which has been bought from china) ... solid solutions are naïveproxy, trojan & vmess/vless ... I don't know airvpn team has any plan to deploy them or not. @Staff
  6. This 2 list not are my own, i just use few theyr list (Pi-hole and Ublock origin example). But is here any sense add this couple list ? Energized Protection - block Website : https://energized.pro/ Github : https://github.com/EnergizedProtection/block 2 Different blocklist : Energized Ultimate list & Energized IP Extension, there is many other lists, but i like this 2 list. Energized Ultimate List : # Title: Energized Ultimate Protection # Description: Flagship Protection Pack from Energized Protection. # Format: domain list # Version: 22.05.127 # Release: 127 # Entries: 435,142 # Pack Code: EUL71M473-P # License: MIT, https://energized.pro/license # Updated: Sat, 07 May 22 00:16:32 +06 # RAW: https://block.energized.pro/ultimate/formats/domains.txt Core List + Basic + 1Hosts (Pro), BarbBlock, Bjornstar's Hosts, Cybercrime, Disconnect Malvertising & Tracking Filter List, EasyPrivacy Specific, Thirdparty & Tracking Servers, Matomo Referrer Spam Blacklist, Openphish, Phishing Bad Sites, Phishing Hosts, Prigent's Malware & Phishing, Quidsup NoTrack and StopForumSpam Second list... Energized Regional Extension # Title: Energized Regional Extension # Description: An Extension to Block Regional Annoyances. # Format: domain list # Version: 22.05.127 # Release: 127 # Entries: 39,442 # Pack Code: EXR3G1094L-P # License: MIT, https://energized.pro/license # Updated: Sat, 07 May 22 00:17:00 +06 # RAW: https://block.energized.pro/extensions/regional/formats/domains.txt ABPindo, AdBlockID, Adblock Estonian & Iran, Adguard Dutch, English, French, German, Japanese, Russian, Turkish & Spanish - Portuguese Filter, Dandelion Sprout's Nordic Filters, Easylist Brasil, China, Czech & Slovak, Dutch, French, Germany, Italy, India, Korea, Polish, Russian, Spanish and Thailand, Fanboy's Indian & Vietnamese, HostsVN, hufilter, Liste AR, Polish Adblock & Privacy Filters, RUAdList and Thai Ads Filter What you feel with this lists ? It is already included someone else list ? I think ultimate list can break part of websites, but i dont care myself. This group wrote example github, they update list every 24h. But i dont know what is real update time. Is this Custom answers section on dns page here this where i can itself block websites ? How it works ? Just write www.google.com, put mode "domain" and klick Deny and then google is blocked ? Can i block all googles address just write google and add wildcard + deny and then all google domain and subdomain is blocked ? Can i use RegEx rule to block something ? I need to ask becouse i dont understand what is "custom answer" in here dns page. Edit: I forgot. Is here already added some list what blocks all microsoft spying address ? I have pi-hole and there is list what blocks microsoft. List breaks some stuff on windows but i dont care, much better blocked and not let them spy on you. I didnt even know how much microsoft sending data out before i get installed pi-hole and i see whats really happend about every klick on windows. Im lucky becouse i found then Linux world and all stress disappear Keep it simple but more is much powerful !
  7. As someone who has worked internationally, I get my news from multiple sources: DW(Germany), The National(UAE), Global Times (China), Citizens Free Press (US), along with several others. THEY ALL HAVE PROPAGANDA. So what's important to me is to "triangulate" on the truth as much as possible. It's pretty easy to detect most of the bulls$^&t, but there is some sneaky stuff out there that no one will know unless you're on the inside. Anyway, the point is that there's no single source of "truth". It's best to gather as many of what appears to be the facts, and make your own mind up. All of that said, I had rt.com as one of my news sources too, so I'm bummed I can't see it now.
  8. Please keep to your original post:If you don't get answers, it's not because people don't read it, it's because no one can answer you. In such a case, trying professional support via ticket is your best bet – they know which configuration works best in China based on user feedback. I will lock this thread due to it being a duplicate.
  9. I live in China. Recently the download speed has about 5Mbps after 1pm utc time(night in China) with VPN, but the upload speed is fine, about 100Mbps. Without AirVPN, the speed test is normal. The download speed in the daytime is fine, about 400Mbps. Any idea how to troubleshooting this?
  10. Here it is: Eddie System/Environment Report - 2021/11/17 - 9:48 UTC Eddie version: 2.21.2beta Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Home China OS version: Microsoft Windows NT 10.0.19042.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN drivers: 0901: 9.21.2 OpenVPN: 2.5.3 - OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: Not available WireGuard: 0.3.11 SSH: plink 0.73 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\xxxx\AppData\Local\Eddie\default.profile Data path: C:\Users\xxxx\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (0 args) Network Lock Active: No Connected to VPN: No Detected DNS: 192.168.31.1 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 227 ms Test Ping IPv6: Failed Test HTTP IPv4: Error: Fetch url error:Timeout was reached Test HTTP IPv6: Error: Fetch url error:Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True mode.type: openvpn mode.protocol: TCP mode.alt: 2 ---------------------------- Logs: . 2021.11.17 17:46:31 - Eddie version: 2.21.2beta / windows_x64, System: Windows, Name: Windows 10 Home xxxx, Version: Microsoft Windows NT 10.0.19042.0, Mono/.Net: v4.0.30319 . 2021.11.17 17:46:33 - Reading options from C:\Users\xxxx\AppData\Local\Eddie\default.profile . 2021.11.17 17:46:37 - OpenVPN - Version: 2.5.3 - OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2021.11.17 17:46:37 - SSH - Version: plink 0.73 (C:\Program Files\AirVPN\plink.exe) . 2021.11.17 17:46:37 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) I 2021.11.17 17:46:38 - Ready . 2021.11.17 17:46:40 - Collect information about AirVPN completed I 2021.11.17 17:46:44 - Session starting. I 2021.11.17 17:46:45 - Checking authorization ... ! 2021.11.17 17:46:46 - Logged out. I 2021.11.17 17:46:46 - Checking login ... ! 2021.11.17 17:46:47 - Logged in. ! 2021.11.17 17:46:47 - Connecting to Iskandar (Japan, Tokyo) . 2021.11.17 17:46:50 - Routes, add 82.102.28.109/32 for interface "WLAN (Qualcomm Atheros QCA9377 Wireless Network Adapter)". . 2021.11.17 17:46:51 - Routes, add 82.102.28.109/32 for interface "WLAN (Qualcomm Atheros QCA9377 Wireless Network Adapter)", already exists. . 2021.11.17 17:46:51 - OpenVPN > OpenVPN 2.5.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 17 2021 . 2021.11.17 17:46:51 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.11.17 17:46:51 - OpenVPN > library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 . 2021.11.17 17:46:51 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.11.17 17:46:51 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.11.17 17:46:51 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.11.17 17:46:51 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.11.17 17:46:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]82.102.28.109:443 . 2021.11.17 17:46:51 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.11.17 17:46:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET]82.102.28.109:443 [nonblock] . 2021.11.17 17:46:51 - OpenVPN > TCP connection established with [AF_INET]82.102.28.109:443 . 2021.11.17 17:46:51 - OpenVPN > TCP_CLIENT link local: (not bound) . 2021.11.17 17:46:51 - OpenVPN > TCP_CLIENT link remote: [AF_INET]82.102.28.109:443 . 2021.11.17 17:46:51 - OpenVPN > TLS: Initial packet from [AF_INET]82.102.28.109:443, sid=95ab4964 6ea9befb . 2021.11.17 17:46:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.11.17 17:46:52 - OpenVPN > VERIFY KU OK . 2021.11.17 17:46:52 - OpenVPN > Validating certificate extended key usage . 2021.11.17 17:46:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.11.17 17:46:52 - OpenVPN > VERIFY EKU OK . 2021.11.17 17:46:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Iskandar, emailAddress=info@airvpn.org . 2021.11.17 17:46:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2021.11.17 17:46:52 - OpenVPN > [Iskandar] Peer Connection Initiated with [AF_INET]82.102.28.109:443 . 2021.11.17 17:46:53 - OpenVPN > SENT CONTROL [Iskandar]: 'PUSH_REQUEST' (status=1) . 2021.11.17 17:46:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.171.1,dhcp-option DNS6 fde6:7a:7d20:fab::1,tun-ipv6,route-gateway 10.19.171.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:fab::1003/64 fde6:7a:7d20:fab::1,ifconfig 10.19.171.5 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2021.11.17 17:46:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.11.17 17:46:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.171.1' . 2021.11.17 17:46:53 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:fab::1' . 2021.11.17 17:46:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.11.17 17:46:53 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.11.17 17:46:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.11.17 17:46:53 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.11.17 17:46:53 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.11.17 17:46:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627 . 2021.11.17 17:46:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.11.17 17:46:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.11.17 17:46:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.11.17 17:46:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.11.17 17:46:53 - OpenVPN > interactive service msg_channel=0 . 2021.11.17 17:46:53 - OpenVPN > open_tun . 2021.11.17 17:46:53 - OpenVPN > All wintun adapters on this system are currently in use or disabled. . 2021.11.17 17:46:53 - OpenVPN > Exiting due to fatal error ! 2021.11.17 17:46:53 - Disconnecting . 2021.11.17 17:46:56 - Routes, delete 82.102.28.109/32 for interface "WLAN (Qualcomm Atheros QCA9377 Wireless Network Adapter)". . 2021.11.17 17:46:57 - Routes, delete 82.102.28.109/32 for interface "WLAN (Qualcomm Atheros QCA9377 Wireless Network Adapter)", not exists. . 2021.11.17 17:46:57 - Connection terminated. I 2021.11.17 17:47:00 - Checking authorization ... ! 2021.11.17 17:47:01 - Logged out. I 2021.11.17 17:47:02 - Checking login ... ! 2021.11.17 17:47:02 - Logged in. ! 2021.11.17 17:47:03 - Connecting to Xuange (Switzerland, Zurich) . 2021.11.17 17:47:05 - Routes, add 79.142.69.162/32 for interface "WLAN (Qualcomm Atheros QCA9377 Wireless Network Adapter)". . 2021.11.17 17:47:07 - Routes, add 79.142.69.162/32 for interface "WLAN (Qualcomm Atheros QCA9377 Wireless Network Adapter)", already exists. . 2021.11.17 17:47:07 - OpenVPN > OpenVPN 2.5.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 17 2021 . 2021.11.17 17:47:07 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.11.17 17:47:07 - OpenVPN > library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 . 2021.11.17 17:47:07 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.11.17 17:47:07 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.11.17 17:47:07 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.11.17 17:47:07 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.11.17 17:47:07 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]79.142.69.162:443 . 2021.11.17 17:47:07 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.11.17 17:47:07 - OpenVPN > Attempting to establish TCP connection with [AF_INET]79.142.69.162:443 [nonblock] ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "destination": "0.0.0.0\/0", "gateway": "192.168.31.1", "interface_index": 20, "metric": 0, "interface": "{BD53868C-B0D4-4D32-BB49-57C8362D2C04}" }, { "destination": "79.142.69.162\/32", "gateway": "192.168.31.1", "interface_index": 20, "metric": 0, "interface": "{BD53868C-B0D4-4D32-BB49-57C8362D2C04}" }, { "destination": "127.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{28B080A4-41FE-11E8-A2F9-806E6F6E6963}" }, { "destination": "127.0.0.1\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{28B080A4-41FE-11E8-A2F9-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{28B080A4-41FE-11E8-A2F9-806E6F6E6963}" }, { "destination": "192.168.31.0\/24", "gateway": "0.0.0.0", "interface_index": 20, "metric": 256, "interface": "{BD53868C-B0D4-4D32-BB49-57C8362D2C04}" }, { "destination": "192.168.31.148\/32", "gateway": "0.0.0.0", "interface_index": 20, "metric": 256, "interface": "{BD53868C-B0D4-4D32-BB49-57C8362D2C04}" }, { "destination": "192.168.31.255\/32", "gateway": "0.0.0.0", "interface_index": 20, "metric": 256, "interface": "{BD53868C-B0D4-4D32-BB49-57C8362D2C04}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{28B080A4-41FE-11E8-A2F9-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 13, "metric": 256, "interface": "{6AD0D3F6-9398-4B74-91D3-227FE2A5F871}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 21, "metric": 256, "interface": "{C47C0FEB-D997-4C2E-B693-00BCA72B927C}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 20, "metric": 256, "interface": "{BD53868C-B0D4-4D32-BB49-57C8362D2C04}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{10859E6D-991E-4AEA-966B-53140B29DF05}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 12, "metric": 256, "interface": "{5D7C2CD5-9A75-1AC5-6245-118F1C411193}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 19, "metric": 256, "interface": "{AB9C3F02-2FE7-4C50-9C28-90803A060C64}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 11, "metric": 256, "interface": "{56A81F3C-0E9F-43AB-A5AD-AA71545932D6}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 10, "metric": 256, "interface": "{5077FD42-4AD1-4B44-A95A-841BD8C221C3}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{28B080A4-41FE-11E8-A2F9-806E6F6E6963}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 13, "metric": 256, "interface": "{6AD0D3F6-9398-4B74-91D3-227FE2A5F871}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 21, "metric": 256, "interface": "{C47C0FEB-D997-4C2E-B693-00BCA72B927C}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 20, "metric": 256, "interface": "{BD53868C-B0D4-4D32-BB49-57C8362D2C04}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 4, "metric": 256, "interface": "{10859E6D-991E-4AEA-966B-53140B29DF05}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 12, "metric": 256, "interface": "{5D7C2CD5-9A75-1AC5-6245-118F1C411193}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 19, "metric": 256, "interface": "{AB9C3F02-2FE7-4C50-9C28-90803A060C64}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 11, "metric": 256, "interface": "{56A81F3C-0E9F-43AB-A5AD-AA71545932D6}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 10, "metric": 256, "interface": "{5077FD42-4AD1-4B44-A95A-841BD8C221C3}" }, { "destination": "::1\/128", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{28B080A4-41FE-11E8-A2F9-806E6F6E6963}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 11, "metric": 256, "interface": "{56A81F3C-0E9F-43AB-A5AD-AA71545932D6}" }, { "destination": "fe80::1996:2e6:8334:6bc3\/128", "gateway": "::", "interface_index": 11, "metric": 256, "interface": "{56A81F3C-0E9F-43AB-A5AD-AA71545932D6}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{28B080A4-41FE-11E8-A2F9-806E6F6E6963}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 11, "metric": 256, "interface": "{56A81F3C-0E9F-43AB-A5AD-AA71545932D6}" } ], "ipv4-default-gateway": "192.168.31.1", "ipv4-default-interface": "{BD53868C-B0D4-4D32-BB49-57C8362D2C04}", "interfaces": [ { "friendly": "\u4ee5\u592a\u7f51", "id": "{C47C0FEB-D997-4C2E-B693-00BCA72B927C}", "name": "\u4ee5\u592a\u7f51", "description": "Realtek PCIe GbE Family Controller", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.114.161" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "NordLynx", "id": "{5D7C2CD5-9A75-1AC5-6245-118F1C411193}", "name": "NordLynx", "description": "NordLynx Tunnel", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.57.70" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "\u672c\u5730\u8fde\u63a5", "id": "{6AD0D3F6-9398-4B74-91D3-227FE2A5F871}", "name": "\u672c\u5730\u8fde\u63a5", "description": "ExpressVPN Wintun Driver", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.8.3" ], "bind": true, "dns4": "10.137.0.1", "dns6": null }, { "friendly": "\u4ee5\u592a\u7f51 2", "id": "{56A81F3C-0E9F-43AB-A5AD-AA71545932D6}", "name": "\u4ee5\u592a\u7f51 2", "description": "TAP-Windows Adapter V9", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::1996:2e6:8334:6bc3", "169.254.107.195" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "\u4ee5\u592a\u7f51 6", "id": "{5077FD42-4AD1-4B44-A95A-841BD8C221C3}", "name": "\u4ee5\u592a\u7f51 6", "description": "TAP-NordVPN Windows Adapter V9", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.112.33" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "\u672c\u5730\u8fde\u63a5* 3", "id": "{AB9C3F02-2FE7-4C50-9C28-90803A060C64}", "name": "\u672c\u5730\u8fde\u63a5* 3", "description": "Microsoft Wi-Fi Direct Virtual Adapter #2", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.212.100" ], "bind": true, "dns4": "54.93.169.181,212.71.249.225", "dns6": null }, { "friendly": "\u672c\u5730\u8fde\u63a5* 1", "id": "{10859E6D-991E-4AEA-966B-53140B29DF05}", "name": "\u672c\u5730\u8fde\u63a5* 1", "description": "Microsoft Wi-Fi Direct Virtual Adapter #4", "type": "Wireless80211", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "169.254.66.177" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "WLAN", "id": "{BD53868C-B0D4-4D32-BB49-57C8362D2C04}", "name": "WLAN", "description": "Qualcomm Atheros QCA9377 Wireless Network Adapter", "type": "Wireless80211", "status": "Up", "bytes_received": "321947021", "bytes_sent": "41646426", "support_ipv4": true, "support_ipv6": false, "ips": [ "192.168.31.148" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{28B080A4-41FE-11E8-A2F9-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "bind": true, "dns4": "", "dns6": null } ] } ---------------------------- ipconfig /all: Windows IP 配置 主机名 . . . . . . . . . . . . . : DESKTOP-XXXX 主 DNS 后缀 . . . . . . . . . . . : 节点类型 . . . . . . . . . . . . : 混合 IP 路由已启用 . . . . . . . . . . : 否 WINS 代理已启用 . . . . . . . . . : 否 以太网适配器 以太网: 媒体状态 . . . . . . . . . . . . : 媒体已断开连接 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : Realtek PCIe GbE Family Controller 物理地址. . . . . . . . . . . . . : 98-29-A6-5D-BD-1E DHCP 已启用 . . . . . . . . . . . : 是 自动配置已启用. . . . . . . . . . : 是 未知适配器 NordLynx: 媒体状态 . . . . . . . . . . . . : 媒体已断开连接 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : NordLynx Tunnel 物理地址. . . . . . . . . . . . . : DHCP 已启用 . . . . . . . . . . . : 否 自动配置已启用. . . . . . . . . . : 是 未知适配器 本地连接: 媒体状态 . . . . . . . . . . . . : 媒体已断开连接 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : ExpressVPN Wintun Driver 物理地址. . . . . . . . . . . . . : DHCP 已启用 . . . . . . . . . . . : 是 自动配置已启用. . . . . . . . . . : 是 以太网适配器 以太网 2: 媒体状态 . . . . . . . . . . . . : 媒体已断开连接 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : TAP-Windows Adapter V9 物理地址. . . . . . . . . . . . . : 00-FF-56-A8-1F-3C DHCP 已启用 . . . . . . . . . . . : 是 自动配置已启用. . . . . . . . . . : 是 以太网适配器 以太网 6: 媒体状态 . . . . . . . . . . . . : 媒体已断开连接 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : TAP-NordVPN Windows Adapter V9 物理地址. . . . . . . . . . . . . : 00-FF-50-77-FD-42 DHCP 已启用 . . . . . . . . . . . : 是 自动配置已启用. . . . . . . . . . : 是 无线局域网适配器 本地连接* 3: 媒体状态 . . . . . . . . . . . . : 媒体已断开连接 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2 物理地址. . . . . . . . . . . . . : 62-5B-C2-FC-75-03 DHCP 已启用 . . . . . . . . . . . : 否 自动配置已启用. . . . . . . . . . : 是 无线局域网适配器 本地连接* 1: 媒体状态 . . . . . . . . . . . . : 媒体已断开连接 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #4 物理地址. . . . . . . . . . . . . : 52-5B-C2-FC-75-03 DHCP 已启用 . . . . . . . . . . . : 是 自动配置已启用. . . . . . . . . . : 是 无线局域网适配器 WLAN: 连接特定的 DNS 后缀 . . . . . . . : 描述. . . . . . . . . . . . . . . : Qualcomm Atheros QCA9377 Wireless Network Adapter 物理地址. . . . . . . . . . . . . : 50-5B-C2-FC-75-03 DHCP 已启用 . . . . . . . . . . . : 是 自动配置已启用. . . . . . . . . . : 是 IPv4 地址 . . . . . . . . . . . . : 192.168.31.148(首选) 子网掩码 . . . . . . . . . . . . : 255.255.255.0 获得租约的时间 . . . . . . . . . : 2021年11月17日 17:42:33 租约过期的时间 . . . . . . . . . : 2021年11月18日 5:42:44 默认网关. . . . . . . . . . . . . : 192.168.31.1 DHCP 服务器 . . . . . . . . . . . : 192.168.31.1 DNS 服务器 . . . . . . . . . . . : 192.168.31.1 TCPIP 上的 NetBIOS . . . . . . . : 已启用
  11. Sorry for being late. I have two VPN servers: 1. VPN server #1 (tls-crypt): I setup a VPN server on my Asus router with tls-crypt enabled. 2. VPN server #2 (no tls-crypt): This is a VPN server the company gave me for teleworking. I can connect to those two from many places. I want to check whether they can be connected from China. It was difficult for me to have an IP in China to test this. Luckily, Astrill VPN has one China IP. My PC connect to it and share a Wifi hotspot to a mobile device. The "OpenVPN Connect" app on the device can establish a connection to #1, but not #2. I am not 100% certain that whether being no tls-crypt is the cause. I think I would edit the #1 to "no tls-crypt" and try it again. If #1 cannot be connected after then tls-crypt would is crucial. However I don't dare to make the Great Firewall know the IP of #1 serves as a VPN server.
  12. If you accuse Russia, Belarus, Kazakhstan and/or China of widespread internet censorship, you act against one of UN's best interests: Preventing hostilities. If you know that almost all sovereign states in the world are members, you may realize how very difficult it gets to release such a paper with clear and directed accusations of naughty things, knowing full well that some of those naughty countries possess the means to cripple the world, either by means of economy or warfare. So you keep a low profile when addressing countries directly. It's simply in no one's interest to do that, it's better to "suffer" the fact a naughty country does not particularly adhere to UN chartas than to chastise a member for it and risking god knows what. You also cannot expect the UN to have a clear opinion on internet censorship. Access to the internet is not a human right, let alone free-as-in-freedom access to it. Your measurement of how many times a country is mentioned is the same bogus as when some manager rates the quality of your code by how many lines you wrote. What it especially doesn't say is that UN endorses or even supports censorship, that's an entirely subjective, malicious interpretation.
  13. I finished reading https://jigsaw.google.com/the-current/shutdown/ the other day, this beautiful presentation highlights mostly the spectrum of political 'lights out' events when entire regions are denied access to the Internet, for example during elections. I commend them for including a lot of references there, the kind of action modern journalists don't need to do apparently. One of these references linked this UN document: https://undocs.org/A/HRC/47/24/Add.2 One of the most flagrant attacks on the Internet that had an immediate impact on me personally were commited in Belarus and Russia in the recent years. In the past 7 or 8 years Russia had been tightening their control over the Internet and that included banning websites (like EVE Online and their wiki article about an in-game drug LOL) or bloggers/apps that did not agree with the mandatory "registry" registration, e.g. Telegram. In their attempt to ban Telegram, the government has had over 2 million IPs of Google and Amazon blocked which led to massive and unrelated service failures. Some of the international traffic in and out of Belarus is routed through big russian transit providers and as a result some of these blocks have unlawfully hit belarussian citizens. And of course these laws were used to block political websites. How often does Russia appear in this report? Answer: ONCE. As a footnote 78 on page 12. This doesn't reference law changes from 2012-2014 and later that lead to current blocks! Belarus' internet censorship. I don't think I have to explain much because this was so recent during the last "election". At least the report acknowledges it fully, five times no less: I can confirm there were disruptions, but I'm still here thanks to AirVPN : ) Thanks for non-standard connection options. I don't know who exactly they're talking about, but this reminds me of Cisco helping to build the Great Firewall of China! The UN welcomes internet censorship How often does China appear in this report? Occurrences: 0. What's legal today can quickly become illegal tomorrow, no matter justified or not, morally correct or not. The UN completely agrees with such laws: just please don't block the entire internet, ok? Basically totalitarian governments can do whatever if they take 2 months time to write it as law. Maybe the new law was put together by a lobby group, doesn't matter. You are allowed to censor then. American services banning Iranian users if connected without VPN? Totally cool with that! Russia banning 2 million IPs? Haha at least you didn't ban 4 milliard IPs, you get a free pass! Ukraine blocks access to all russian social networks due to war in the east? Ukraine, occurrences = 0. The UN loves "lawful" internet censorship.
  14. Hello, Since yesterday, I have been unable to access Air on my home network. On bluetit, the AirVPN manifest can be loaded but there is a timeout when logging on with my username. I'm based in China. The problem is only with the username and password stage, as when I use Eddie to log on, the username and password have already been inputted and I can can begin to connect to servers, although the checking authorisation stage can take a few minutes before it will start to connect properly. All of the bootstrap servers available in bluetit are affected and show the same behaviour. It is a problem with my home network, as when I connect on a mobile network, there are no problems. Is there anything I can do to rectify this or am I SOL? Thanks for whatever support you can offer!
  15. Define censorship. As long as you can find what once happened on Tiananmen Square in China, who Snowden is and footage from LiveLeak, nothing is censored. You may even find explicit pornography and scenes of murder on Google and Bing nowadays. What you won't find is child porn, but I'd be very careful in calling this an act of censorship. It's in the nature of the deep/hidden web to not have been indexed. That's why it's called hidden. No amount of "uncensored" search engines will help you here since they all work in a similar way. Some info simply can't be indexed for search engines, like databases. But it is true, DuckDuckGo won't ever find info on .onion hosts. It may find mentions of .onion addresses in the clearnet, though.
  16. I don't know what to write about... Everything's fine and I love AirVPN. Sounds cheesy but it is what it is. I've been using AirVPN for half a year. Many servers to choose from, very transparent from the user's point of view - something I value. Transparency about server status and an API (admittedly I haven't used it much). From reading the forums I grasped that AirVPN has very strict (legal) criteria for choosing server locations (countries), an approach that is unique across all providers I've seen so far. Yea placing servers in China wouldn't be the best idea or many other more "democratic" as a matter of fact which were ruled out. The config generator is awesome if you're not using their open source client Eddie (bonus points again!) - plenty of flexibility. Configs? Afaik there're some providers out there who still have user/password prompt on each connection, laughable. AirVPN not only properly makes use of certificates (that's how the server knows you are you without asking for credentials) and on top of that allows you to properly distribute different access keys across your devices (in case of theft etc). Lost a device? Revoke access to that single one and done! Port-forwarding support ALONG WITH Dynamic DNS is unparalleled. Sure an advanced user probably could create an ad-hoc DDNS solution for themself, but offering it along the VPN is ingenius. The servers are very stable, the stats currently show a user has been connected since January. I've read comments where other VPNs often force reconnects etc, that just sounds wild to me. Before AirVPN I've been on a private VPN server with 24/7 uptime and that's the quality of service I got used to and wouldn't want to downgrade from (looking at those other VPN providers) The AirVPN forums are a great source of information. The staff cannot be commended enough for responding to concerns and generally being here for discussion. @OpenSourcerer is a damn community hero, this place is unimaginable without him! I myself have contributed in one form or another and will continue to. As a side note to forums: AirVPN appears to have customized the forum software for privacy. I can't assess how far it goes (hopefully "enough"), and it's a far better choice than those completely relying on Reddit - undoubtedly a useful puppet of/for the certain government. The only problem I've had was with initial payment. I bought the 1 month plan and found no clear indications it was still active (because it is a PayPal recurring payment), so before the month expired I bought the 1 year plan. I was quite surprised to see a few days later my access days to have been extended by +31d - the automatic Paypal payment kicked in and I paid a single month extra. Though I like the service so much I decided not to bother with a refund (consider it a donation hehe). You need to login in Paypal to cancel those, I wish this was made clear/er. What's unclear to me was whether/how much info is retained on payment after all the transactions... but to grossly paraphrase an official response: use crypto. Just make sure your mug shot (photo) isn't connected to the coin wallet Roses are red, AirVPN's great.
  17. I have noticed that when using the Dutch VPNs sometimes for what I think is an inexplicable reason, my traffic is routed through an OVH server in France (I have also noticed traffic to China is routed through America, but that's unrelated). My questions are: Why does this happen? Why are users not informed about this? My best guess is that it could be to bypass blocks, but the places where it happens (Akamai and Amazon) don't block VPNs to my knowledge, and mysteriously it only seems to happen for a short amount of time as refreshing the page often results in traffic no longer being routed through France. Image of this happening: https://i.imgur.com/b8qdBnC.png (The same image is attached)
  18. typical double-speech from Apple, I remember when the Taiwan flag crashed iOS to appease China.. But I'm more interested in the method itself. It's sounds like using two Proxy-Providers, but somehow independent to provide anonymity?
  19. So: iPhone -----> Apple ("strip" IP, definitely a proxy) -----> mysterious 3rd party (proxy/VPN) -----> destination? Only on Safari. Well. What the article doesn't tell is that this won't be available in China, Kazachstan, Saudi Arabia and a few other countries. What's the point if the countries in which you need such a feature the most are not included?
  20. Hello, after reading the pinned post about blocking VPN in China I feel a little embarrassed by the relative importance of my issue, which has been occurring more frequently over the past ~6 months. I wouldn't normally complain, I've been using Airvpn for years, but it's getting a bit worrisome. I usually connect to Airvpn's Canada BC servers, but they seem to be having serious load balancing issues. The screenshot depicts a typical situation, the Los Angeles, Fremont CA, Vancouver, even the Chicago and Phoenix servers are not listing. I find that I am often kicked from a server and reconnected to another one *very* far away. For example, I'll be on Sham in BC and a couple hours later find that I'm suddenly connected to Atlanta Georgia or Toronto 2,000 miles away.... Is this due to excessive traffic on the west coast, and are there any plans to increase service coverage for this region?
  21. I am from China.the Chinese ISPs have blocked a lot of websites, it lead to many people have to use vpn and proxy. I have used Express vpn before. To be honest, Express vpn is very fast most of the time, and I can also use it to unlock netflix. However, because Express is so famous, it is often blocked by GFW, which makes it very unstable. Airvpn does not have this problem. Its speed is not slow in China Mobile and China Unicom, and it is rarely affected by GFW. However, Airvpn still cannot meet all my needs. Its speed terribly slow in China Telecom. And it can't unlock netflix. So I have to buy another vpn to supplement the weakness of Airvpn.
  22. Hello, I'm looking for servers that will provide optimum download and upload for users physically located in China. I used to have good performance with the Japan servers although that was a long time ago. Certain Netherlands servers (Alpheratz, in particular) were very strong for a period, although the routing appears to change a lot, taking the high download speeds with them If anyone as any suggestions for servers to try or if the admins can suggest any techniques I can use to determine the best servers myself, I'd appreciate it!
  23. Elaborate, with some sources, please. I remember VyprVPN being listed as a logging VPN provider in TorrentFreak's VPN provider questionnaires, so it is sufficient if you want to watch Netflix in Uganda or pretty much anything decent on the internet if you're in China. Not sure about today or if TF still does those questionnaires, but you really shouldn't torrent over it – or hope for a pseudonym in the face of prosecution.
  24. This is the reason i trust in you guys. I've been searching like every one says one thing "no logging". But in the end such as NordVPN, HidemyassVPN has been caught data leakage or selling private info. Not many VPN offers TOR or investing for free speech. They have VPN server in China how cool is that.
  25. Up until last week, I was able to ping the Japanese servers and return around 80ms. Now the ping is around 240 - 50ms. I suspect it must be to do with changes on the ISP side but I'm curious if anyone else has noticed any similar performance hits within China? Is there anything I can do to improve things? Thanks!
×
×
  • Create New...