Jump to content
Not connected, Your IP: 3.145.65.134

Search the Community

Showing results for tags 'AirVPN'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 194 results

  1. Hi all new here and newish to VPN's (used Hide my Ass many moons ago, mistake I know lol) Anyways just looking for some help/advice on the best way to use Airvpn. I'm currently running the AirVPN client with network lock enabled (on 1 laptop 1 pc using SSH on port 22) and was considering using OpenVPN client instead. I have a few questions i would like answered before hand however such as. how easy it is to set up? pro and cons? will I need to download comodo and implement the firewall blocks that are mentioned in the how to? also regarding the use of SSH is there any advantages to it over using UDP or TCP security wise? As my ISP does no traffic management or shaping to these. what do you think is the best or most secure way thanks in advance for any help or insight you may have
  2. Edit: The more i played around with it, the worse it got. I was using the latest build of WIndows 10 so....Just went back to WIndows 8.1 and all is well Delete this thread mod.ty I upgraded to WIndows 10 and have been having issues even connecting to a server at all. Is anyone else having these problems? Im gonna try to reinstall the program and see what happens.
  3. i have eddie and open vpn installed. when i connect to server my pc freezes at dns network adaptor forced everytime nomatter what i do. i was able to connect with open vpn a few times but eventually froze in like 20 seconds. this is day 2 of my trial purchase and this is rediculous i created a ticket and looked online its like im the only one with this problem. i have also tried with and without network lock and it still freezes during connection with dns forcing and i cant do anything(not even move my mouse) i have to reboot and its very annoying and time consuming. i made a copy of the log when i was able to connect with openvpn using the config file openvpn log.txt
  4. I recently bought an Asus router RT-AC68U to flash Tomato firmware as AirVPN offers a config generation for this. I had a few issues with that and noticed that Asus supports OpenVPN from scratch. I've tried it and it works flawless, no tomato is needed. Difficulty: Very low Time: 2 Minutes Prerequisite: - Asus Router (in my case it's a RT-AC68U but it should work for all asus routers that have OpenVPN support) Steps: 1. Browse to https://airvpn.org/generator/ and select 'Router or others' and choose a server you like. Tick on 'Direct, protocol UDP, port 443' and click on 'Generate'. Save this openvpn config file anywhere on your computer. 2. Open the asus router webinterface and click on 'VPN'. Click on 'Add profile', choose OpenVPN. Enter a description, leave username and password EMPTY. Click on 'Browse' and select the downloaded openvpn config file. Click on upload. Click on OK. That's it now you can click on connect. 3. Visit https://ipleak.net and check if it works. By default I have no dns leak. But in case you have you can setup the AirVPN DNS this way: 3b. Click on WAN tab. Turn DNS server off and enter either google's DNS 8.8.8.8 or AirVPN's DNS 10.4.0.1 or both as in the screenshot. That's it. Every client which is connected to the router now is secured by VPN.
  5. Hi, I started experimenting with AirVpn om my Android smartphone. The setup is the first I start Orbot, second AirVpn (UDP-443) and last but not least Orweb. Everything seems to be working and IP Chicken shows me a nice Ip adress. I want to apologize for my ignorance, but is this a good anonymous setup and how can I check that the VPN is going through Orbot? Kind regards,
  6. Using Ubuntu MATE 15.04 Trying to add Airvpn to my connection. I followed the instructions and have tried UDP and TCP and get this error:
  7. Hi. I have recently commenced using AirVPN, and I must commend you for having one of the most accessible pieces of software I've ever seen for users who are fully blind or vision impaired. One issue I've encountered is that I'm not able to access the button or icon that I need to click in order to get to the advanced settings area. It would be great if this could be addressed, as it's proving frustrating to get to the advanced features of this fabulous software package. Otherwise, I'm very happy with your speeds from Australia and it's great that you offer the ability for users to be able to download the files necessary to use your service with Viscosity or any other open VPN client. Cheers.
  8. Hello, I am using a Blackberry Passport and would like to connect to AirVPN using an SSH tunnel. The options look like the picture below. Where can I find the information to fill this in? If it's not possible with the BB options, does anyone know of reliable open-source software for the Blackberry Passport that support the VPN SSH tunnel. My knowledge is still limited with all this, but learning. Thanks!
  9. I tried from different AirVPN servers (some NL, Sweden, FR and others) to visit wiki.debian.org but it says: ForbiddenYou are not allowed to access this! ---- It opens when I try it without AirVPN... also it opens via TOR...
  10. Hello, I just bought a subscription and loaded up the software to find I can't log in! So I am getting an error that says "Cannot receive systems & server data. Please retry later or contact us for help. (The remote server returned an error: (403) Forbidden.) I just want to get this ironed out. Any help?
  11. Hello everyone, I have AirVPN installed on a second desktop of mine, and I'm having an odd problem with it. I can connect to AirVPN servers fine and get acceptable speeds, however, when I shut down the VPN, I can no longer connect to the internet. So, I need to be connected to some VPN server to be able to connect to the internet. I suspect this is due to a bug with the Network Lock feature, which I'm using on both desktops (one of which is not having any problems). Both desktops are connected to the save network via Ethernet cable. I tried disabling network lock on the afflicted desktop, but had no results. I also tried uninstalling AirVPN (and restarting the PC), which also did not help. Is this a known bug, or perhaps something entirely different? I tried searching online for a solution, but all I get are threads about people not being able to connect with a VPN, not without. Thanks in advance!
  12. Good day, First of all I am running Ubuntu 14.04 on my laptop. What I want to achiev is to connect to tor via Airvpn. (That's the safest setup way, am I right?). Problems that I occure: To connect to Tor, I need to setup proxy in Airvpn client. Ant then use data in Tor configuration and achieve connection. Airvpn client without proxy setting works flawless. After I turn on proxy (socks5), I cant connect to server, I get reconnect loop, log: I 2015.03.09 11:03:54 - AirVPN client version: 2.8.8, System: Linux, Name: Ubuntu 14.10 \n \l, Architecture: x86 . 2015.03.09 11:03:54 - Reading options from /home/vibe/.airvpn/AirVPN.xml . 2015.03.09 11:03:56 - Data Path: /home/vibe/.airvpn . 2015.03.09 11:03:56 - App Path: /usr/lib/AirVPN . 2015.03.09 11:03:56 - Executable Path: /usr/lib/AirVPN/AirVPN.exe . 2015.03.09 11:03:56 - Command line arguments (1): path="/home/vibe/.airvpn" . 2015.03.09 11:03:57 - Operating System: Unix 3.16.0.23 - Linux Q 3.16.0-23-generic #31-Ubuntu SMP Tue Oct 21 18:00:35 UTC 2014 i686 i686 i686 GNU/Linux . 2015.03.09 11:03:57 - Updating systems & servers data ... I 2015.03.09 11:03:57 - OpenVPN Driver - Found I 2015.03.09 11:03:57 - OpenVPN - Version: OpenVPN 2.3.2 (/usr/sbin/openvpn) I 2015.03.09 11:03:57 - SSH - Version: OpenSSH_6.6.1p1 Ubuntu-8, OpenSSL 1.0.1f 6 Jan 2014 (/usr/bin/ssh) I 2015.03.09 11:03:57 - SSL - Version: stunnel 5.02 (/usr/bin/stunnel4) I 2015.03.09 11:03:57 - IPV6: Available ! 2015.03.09 11:03:57 - Ready . 2015.03.09 11:03:57 - Updating systems & servers data ..., 1° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:57 - Updating systems & servers data ..., 2° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:57 - Updating systems & servers data ..., 3° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:57 - Updating systems & servers data ..., 4° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:57 - Updating systems & servers data ..., 5° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:58 - Updating systems & servers data ..., 6° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:58 - Updating systems & servers data ..., 7° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:58 - Updating systems & servers data ..., 8° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) W 2015.03.09 11:03:58 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (CUrl is not installed on this system, and it's required for SOCKS proxy.) I 2015.03.09 11:04:49 - Session starting. I 2015.03.09 11:04:49 - Installing tunnel driver F 2015.03.09 11:04:50 - Only TCP protocol is allowed with a proxy. . 2015.03.09 11:04:58 - Updating systems & servers data ... . 2015.03.09 11:04:58 - Updating systems & servers data ..., 1° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 2° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 3° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 4° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 5° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 6° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 7° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 8° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) W 2015.03.09 11:04:58 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (CUrl is not installed on this system, and it's required for SOCKS proxy.) I 2015.03.09 11:05:12 - Session starting. I 2015.03.09 11:05:12 - Installing tunnel driver I 2015.03.09 11:05:12 - Retrieving manifest W 2015.03.09 11:05:12 - Unable to retrieve systems & servers data. Continue anyway with the old data. . 2015.03.09 11:05:12 - Updating systems & servers data ... I 2015.03.09 11:05:12 - Checking authorization ... . 2015.03.09 11:05:12 - Updating systems & servers data ..., 1° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:12 - Updating systems & servers data ..., 2° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:12 - Checking authorization ..., 1° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:12 - Updating systems & servers data ..., 3° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:12 - Checking authorization ..., 2° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:12 - Updating systems & servers data ..., 4° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Checking authorization ..., 3° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Updating systems & servers data ..., 5° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Checking authorization ..., 4° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Updating systems & servers data ..., 6° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Checking authorization ..., 5° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Updating systems & servers data ..., 7° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Checking authorization ..., 6° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Updating systems & servers data ..., 8° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) W 2015.03.09 11:05:13 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (CUrl is not installed on this system, and it's required for SOCKS proxy.) . 2015.03.09 11:05:13 - Checking authorization ..., 7° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Checking authorization ..., 8° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) W 2015.03.09 11:05:13 - Authorization check failed, continue anyway ({1]) ! 2015.03.09 11:05:13 - Connecting to Grafias (Netherlands, Amsterdam) I 2015.03.09 11:05:13 - DNS of the system will be updated to VPN DNS (ResolvConf method) . 2015.03.09 11:05:13 - OpenVPN > OpenVPN 2.3.2 i686-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014 . 2015.03.09 11:05:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2015.03.09 11:05:13 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts . 2015.03.09 11:05:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2015.03.09 11:05:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.03.09 11:05:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.03.09 11:05:13 - OpenVPN > Socket Buffers: R=[87380->131072] S=[16384->131072] . 2015.03.09 11:05:13 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 [nonblock] . 2015.03.09 11:05:13 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:9150 . 2015.03.09 11:05:13 - OpenVPN > socks_handshake: server asked for username/login auth but we were not provided any credentials . 2015.03.09 11:05:13 - OpenVPN > SIGTERM[soft,init_instance] received, process exiting ! 2015.03.09 11:05:13 - Disconnecting . 2015.03.09 11:05:13 - Connection terminated. I 2015.03.09 11:05:16 - Checking authorization ... . 2015.03.09 11:05:16 - Checking authorization ..., 1° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 2° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 3° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 4° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 5° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 6° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 7° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 8° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) W 2015.03.09 11:05:16 - Authorization check failed, continue anyway ({1]) I 2015.03.09 11:05:16 - Cancel requested. ! 2015.03.09 11:05:16 - Session terminated. By the way how to access Tor line in Airvpn->Preferences->Protocols? Off problem topic question - would openvpn increase security or solve problem? (Sorry newbie) Have a nice day, amen1337 P.S.: Sorry for poor English
  13. Hello, i just opened now a IRC Channel #AirVPN on the irc network irc.freenode.org this channel can be usefull for new users to get in touch with AirVPN services and just to talk about Anonimyzers in general. if any administrator of AirVPN want to come, i will be glad to offer them the Operator status. i hope that you will like it & have a nice day.
  14. Hi everyone JC here, I havn't found anything useful on the fourms so far but everytime I connect to the severs any host I keep getting a short fragment network attack and the whole connection gets cut and forced to another server where it will ontinue the same loop. This is mainly while torrenting and has happended on servers in a few countries. Is there a way to fix this because the native firewall in my AV/IS is useless and I have used outpost before I started using torrents. If there is anymore information I can go into great detail but it's 4:47AM now after I've tried for about 3hrs to confiq it right. Any help or suggestions would be much appreciated.
  15. Quick question: How would i decrease the perfect forward secrecy value from 60 minutes (Default) to 30 minutes. Please include step by step instructions Thank you, DaChiefzz
  16. Hi, Every time I start up the AirVPN client on OS X, it prompts for admin credentials ("AirVPN wants to make changes. Type your password to allow this."). My situation is such, that I need to launch AirVPN automatically and unintrusively on computer startup - without this dialog popping up every time. I've tried changing the owner of the app to root, and I've also tried an AppleScript as such: do shell script "sudo open -a /Applications/AirVPN.app" user name "User" password "PW" with administrator privileges but still no go, keeps asking for privileges. Is there a certain file that AirVPN is trying to modify that should perhaps be writable? Or how do I otherwise get around this? I've seen several similar threads on this forum, but so far no answer. This is crucial for me to keep using AirVPN service. If it is not possible, please let me know as well so I can look for a different solution. Thank you for your time!
  17. In the last release the network lock worked just fine but now when I look at iptables there's nothing there. Also the client does a bit of crashing from time to time.
  18. Hi, Yesterday i subscribed for a 3 day AIRVPN plan. I installed "openvpn-install-2.3.4-I002-x86_64.exe" and generated config files with USA and UK servers having ports TCP 443 alone. Everytime i try connecting it gives a TLS handshake error. My PC is connected to our organisation's firewall, Fortiguard which filters our Internet connection. It has only port 80(TCP) and 443(TCP) opened [ checked it through Nmap tool ]. All other ports are closed. OS- windows 7 64 bit. Here is my log, Fri Oct 03 13:13:10 2014 Warning: cannot open --log file: C:\Program Files\OpenVPN\log\AirVPN_United-States_TCP-443.log: Access is denied. (errno=5) Fri Oct 03 13:13:10 2014 OpenVPN 2.3.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Jun 5 2014 Fri Oct 03 13:13:10 2014 library versions: OpenSSL 1.0.1h 5 Jun 2014, LZO 2.05 Fri Oct 03 13:13:10 2014 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25343 Fri Oct 03 13:13:10 2014 Need hold release from management interface, waiting... Fri Oct 03 13:13:10 2014 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25343 Fri Oct 03 13:13:10 2014 MANAGEMENT: CMD 'state on' Fri Oct 03 13:13:10 2014 MANAGEMENT: CMD 'log all on' Fri Oct 03 13:13:10 2014 MANAGEMENT: CMD 'hold off' Fri Oct 03 13:13:10 2014 MANAGEMENT: CMD 'hold release' Fri Oct 03 13:13:10 2014 Control Channel Authentication: tls-auth using INLINE static key file Fri Oct 03 13:13:10 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Oct 03 13:13:10 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Oct 03 13:13:10 2014 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Oct 03 13:13:10 2014 MANAGEMENT: >STATE:1412322190,RESOLVE,,, Fri Oct 03 13:13:11 2014 Attempting to establish TCP connection with [AF_INET]149.255.33.154:443 Fri Oct 03 13:13:11 2014 MANAGEMENT: >STATE:1412322191,TCP_CONNECT,,, Fri Oct 03 13:13:11 2014 TCP connection established with [AF_INET]149.255.33.154:443 Fri Oct 03 13:13:11 2014 TCPv4_CLIENT link local: [undef] Fri Oct 03 13:13:11 2014 TCPv4_CLIENT link remote: [AF_INET]149.255.33.154:443 Fri Oct 03 13:13:11 2014 MANAGEMENT: >STATE:1412322191,WAIT,,, Fri Oct 03 13:14:11 2014 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Fri Oct 03 13:14:11 2014 TLS Error: TLS handshake failed Fri Oct 03 13:14:11 2014 Fatal TLS error (check_tls_errors_co), restarting Fri Oct 03 13:14:11 2014 SIGUSR1[soft,tls-error] received, process restarting Fri Oct 03 13:14:11 2014 MANAGEMENT: >STATE:1412322251,RECONNECTING,tls-error,, Fri Oct 03 13:14:11 2014 Restart pause, 5 second(s) Fri Oct 03 13:14:16 2014 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Oct 03 13:14:16 2014 MANAGEMENT: >STATE:1412322256,RESOLVE,,, Fri Oct 03 13:14:16 2014 Attempting to establish TCP connection with [AF_INET]149.255.33.154:443 Fri Oct 03 13:14:16 2014 MANAGEMENT: >STATE:1412322256,TCP_CONNECT,,, Fri Oct 03 13:14:16 2014 TCP connection established with [AF_INET]149.255.33.154:443 Fri Oct 03 13:14:16 2014 TCPv4_CLIENT link local: [undef] Fri Oct 03 13:14:16 2014 TCPv4_CLIENT link remote: [AF_INET]149.255.33.154:443 Fri Oct 03 13:14:16 2014 MANAGEMENT: >STATE:1412322256,WAIT,,, and this repeats.. What i found out is, i opened Ultrasurf Proxy [which is the only proxy software that works bypassing Fortiguard in my organisation] and connected to its proxy and then tried connecting AirVPN and voila, it got connected without an problem to an USA server. After i disconnected Ultrasurf, AirVPN couldn't connect back. !!! I also installed Eddie 2.6 and tried connecting with "protocol TCP 443" selected from preferences, but couldn't connect. I even tried SSL 443 but couldn't connect here is my log, Sat Oct 04 13:04:27 2014 OpenVPN 2.3.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Jun 5 2014 Sat Oct 04 13:04:27 2014 library versions: OpenSSL 1.0.1h 5 Jun 2014, LZO 2.05 Enter Management Password: Sat Oct 04 13:04:27 2014 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340 Sat Oct 04 13:04:27 2014 Need hold release from management interface, waiting... Sat Oct 04 13:04:28 2014 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340 Sat Oct 04 13:04:28 2014 MANAGEMENT: CMD 'state on' Sat Oct 04 13:04:28 2014 MANAGEMENT: CMD 'log all on' Sat Oct 04 13:04:28 2014 MANAGEMENT: CMD 'hold off' Sat Oct 04 13:04:28 2014 MANAGEMENT: CMD 'hold release' Sat Oct 04 13:04:28 2014 MANAGEMENT: CMD 'proxy NONE ' Sat Oct 04 13:04:29 2014 Control Channel Authentication: tls-auth using INLINE static key file Sat Oct 04 13:04:29 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Sat Oct 04 13:04:29 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Sat Oct 04 13:04:29 2014 Socket Buffers: R=[8192->8192] S=[8192->8192] Sat Oct 04 13:04:29 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 Sat Oct 04 13:04:29 2014 MANAGEMENT: >STATE:1412408069,TCP_CONNECT,,, Sat Oct 04 13:04:30 2014 TCP: connect to [AF_INET]127.0.0.1:1413 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sat Oct 04 13:04:30 2014 SIGUSR1[soft,init_instance] received, process restarting Sat Oct 04 13:04:30 2014 MANAGEMENT: >STATE:1412408070,RECONNECTING,init_instance,, Sat Oct 04 13:04:30 2014 Restart pause, 5 second(s) Sat Oct 04 13:04:35 2014 MANAGEMENT: CMD 'proxy NONE ' Sat Oct 04 13:04:36 2014 Socket Buffers: R=[8192->8192] S=[8192->8192] Sat Oct 04 13:04:36 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 Sat Oct 04 13:04:36 2014 MANAGEMENT: >STATE:1412408076,TCP_CONNECT,,, Sat Oct 04 13:04:37 2014 TCP: connect to [AF_INET]127.0.0.1:1413 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sat Oct 04 13:04:37 2014 SIGUSR1[soft,init_instance] received, process restarting Sat Oct 04 13:04:37 2014 MANAGEMENT: >STATE:1412408077,RECONNECTING,init_instance,, Sat Oct 04 13:04:37 2014 Restart pause, 5 second(s) I did raise a support ticket and their reply was, There is no communication between your node and the VPN servers. You are maybe behind a proxy. If so, OpenVPN can connect over a proxy. You need to know proxy type, proxy listening port and IP address (or reachable host name), authentication type (if any), authentication credentials (if any). Then you can generate a configuration file with such parameters (tick "Advanced Mode" in the Configuration Generator and fill in the proxy parameters). If you think you are not behind a proxy, try a connection of OpenVPN over SSL. In our client Eddie you can quickly test OpenVPN over SSL by clicking "AirVPN" button, selecting "Preferences", clicking "Protocols" tab, selecting "SSL Tunnel - Port 443" and clicking "Save". Eddie supports OpenVPN connections over a proxy as well (they can be configured in the "Proxy" tab). Kind regards AirVPN Support Team But i would like to point out that, i could communicate with AirVPN servers when using Ultrasurf and my internet connection dowsn't go through a proxy. Kindly can anyone help me out.
  19. Hi everyone, I would like to have my digital ocean VM use a VPN for its outgoing http requests. I am using openVPN on Ubuntu 14.04.1 LTS (GNU/Linux 3.5.0-48-generic x86_64). Got the files AirVPN_Europe_TCP-53.ovpn ca.crt ta.key user.crt user.key in one directory. VPN is using TCP protocol on port 53. Also tried with UDP, same problem also copied the files to /etc/openvpn/ to try to run it via openvpn start. If I do that, I get the output: root@tr:/home# sudo service openvpn start * Starting virtual private network daemon(s)... ..but nothing happens. curl http://www.ipchicken.com still reveals the servers ip If I directly run root@tr:/etc/openvpn# sudo openvpn AirVPN_Europe_TCP-53.ovpn Thu Sep 18 09:42:35 2014 OpenVPN 2.3.2 i686-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Feb 4 2014 Thu Sep 18 09:42:35 2014 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file Thu Sep 18 09:42:35 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Sep 18 09:42:35 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Sep 18 09:42:35 2014 Socket Buffers: R=[87380->131072] S=[87380->131072] Thu Sep 18 09:42:35 2014 Attempting to establish TCP connection with [AF_INET]95.211.186.65:53 [nonblock] Thu Sep 18 09:42:36 2014 TCP connection established with [AF_INET]95.211.186.65:53 Thu Sep 18 09:42:36 2014 TCPv4_CLIENT link local: [undef] Thu Sep 18 09:42:36 2014 TCPv4_CLIENT link remote: [AF_INET]95.211.186.65:53 Thu Sep 18 09:42:36 2014 TLS: Initial packet from [AF_INET]95.211.186.65:53, sid=d5ee74c0 46f1dcfd Thu Sep 18 09:42:36 2014 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Thu Sep 18 09:42:36 2014 Validating certificate key usage Thu Sep 18 09:42:36 2014 ++ Certificate has key usage 00a0, expects 00a0 Thu Sep 18 09:42:36 2014 VERIFY KU OK Thu Sep 18 09:42:36 2014 Validating certificate extended key usage Thu Sep 18 09:42:36 2014 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Thu Sep 18 09:42:36 2014 VERIFY EKU OK Thu Sep 18 09:42:36 2014 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org Thu Sep 18 09:42:37 2014 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Thu Sep 18 09:42:37 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Sep 18 09:42:37 2014 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Thu Sep 18 09:42:37 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Sep 18 09:42:37 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA Thu Sep 18 09:42:37 2014 [server] Peer Connection Initiated with [AF_INET]95.211.186.65:53 Thu Sep 18 09:42:39 2014 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Thu Sep 18 09:42:40 2014 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.9.0.1,comp-lzo no,route 10.9.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.9.0.254 10.9.0.253' Thu Sep 18 09:42:40 2014 OPTIONS IMPORT: timers and/or timeouts modified Thu Sep 18 09:42:40 2014 OPTIONS IMPORT: LZO parms modified Thu Sep 18 09:42:40 2014 OPTIONS IMPORT: --ifconfig/up options modified Thu Sep 18 09:42:40 2014 OPTIONS IMPORT: route options modified Thu Sep 18 09:42:40 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Thu Sep 18 09:42:40 2014 ROUTE_GATEWAY 178.62.192.1/255.255.192.0 IFACE=eth0 HWADDR=04:01:28:70:e1:01 Thu Sep 18 09:42:40 2014 TUN/TAP device tun0 opened Thu Sep 18 09:42:40 2014 TUN/TAP TX queue length set to 100 Thu Sep 18 09:42:40 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Thu Sep 18 09:42:40 2014 /sbin/ip link set dev tun0 up mtu 1500 Thu Sep 18 09:42:40 2014 /sbin/ip addr add dev tun0 local 10.9.0.254 peer 10.9.0.253 Thu Sep 18 09:42:40 2014 /sbin/ip route add 95.211.186.65/32 via 178.62.192.1 Thu Sep 18 09:42:40 2014 /sbin/ip route add 0.0.0.0/1 via 10.9.0.253 Thu Sep 18 09:42:40 2014 /sbin/ip route add 128.0.0.0/1 via 10.9.0.253 Write failed: Broken pipe After that the VM is just completely down / frozen and I need to restart it. Really no clue on whats going wrong here and have been on this for hours. Any idea?
  20. This tutorial is about blocking ALL traffic outside of the VPN connection which reveal your real IP address and also work as DNS Leak Fix. This works ONLY for Viscosity users and ONLY if you have ANY firewall (in my case I'm using GData Internet Security 2015). Why only for Viscosity? Because Viscosity makes it very easy for us by creating network adapters and I had trouble applying the Comodo guide to GData Firewall. In short: We simply block ALL traffic on our others network adapters and just allow Viscosity (and the network adapters of viscosity). Step by step: 1. Create a new rule set called AirVPN or whatever else. 2. We need a to create only a few custom rules in our rule set 3. We need to allow the Openvpn.exe inside of the Viscosity folder. I recommend using the assistant of GData. 3a) We need to allow in/out connections to our homework by allowing connections from 192.168.0.0 to 192.168.255.255 3b) We need to allow in/out connections to AirVPN in general, because GData has no kind of collection we must create for every IP a rule. We allow in/out connections to 95.211.138.143 and to 212.117.180.25 3c) Next we allow connections to the AIRVPN server(s) in this case I'm allowing connections to the AirVPN Switzerland server //Edit: This doesn't seem to be necessary at all. 3d) At the end we block ALL other traffic 4. As previously told Viscosity creates network adapters. So we just need to apply this rule set to our local network adapter only. As soon as Viscosity has lost the connection, we are no longer be able to connect to the internet because our local network has been blocked. But we can reconnect with Viscosity to our AirVPN servers. So we made sure that all traffic is going through our VPN tunnel. This works with all firewalls that support these steps and its very easy to set up. Feedback is appreciated.
  21. I tried as a last resort the airvpn client which did not work on snow leopard , but now in Mavericks it works fine. The problem is that since I cannot import the configuration file I cannot restrain the server to one continent. Is there a way to do that? To select continent USA, Europe, Asia ?
  22. I just upgraded to version 2.4 and now things just don't work out anymore. OS: Windows 7 Ultimate x64 logs: I 2014.09.06 16:35:00 - AirVPN client version: 2.4, System: Windows, Architecture: x64 . 2014.09.06 16:35:00 - Reading options from C:\Program Files\AirVPN\AirVPN.xml . 2014.09.06 16:35:00 - Data Path: C:\Program Files\AirVPN . 2014.09.06 16:35:00 - App Path: C:\Program Files\AirVPN . 2014.09.06 16:35:00 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe . 2014.09.06 16:35:00 - Command line arguments: . 2014.09.06 16:35:00 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1 I 2014.09.06 16:35:00 - OpenVPN Driver - TAP-Windows Adapter V9 #2 I 2014.09.06 16:35:00 - OpenVPN - Version: OpenVPN 2.3.4 (C:\Program Files\AirVPN\openvpn.exe) I 2014.09.06 16:35:00 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe) I 2014.09.06 16:35:00 - SSL - Version: stunnel 4.56 (C:\Program Files\AirVPN\stunnel.exe) I 2014.09.06 16:35:00 - IPV6: Available I 2014.09.06 16:35:00 - Session starting. ! 2014.09.06 16:35:00 - Checking environment ! 2014.09.06 16:35:00 - Retrieving manifest ! 2014.09.06 16:35:01 - Waiting for latency tests ! 2014.09.06 16:35:06 - Checking authorization ! 2014.09.06 16:35:07 - Connecting to Propus (Netherlands, Amsterdam) . 2014.09.06 16:35:07 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 18 2014 . 2014.09.06 16:35:07 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.06 16:35:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.06 16:35:07 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.06 16:35:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:07 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.09.06 16:35:07 - OpenVPN > UDPv4 link local: [undef] . 2014.09.06 16:35:07 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.8:443 . 2014.09.06 16:35:07 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.8:443, sid=339c0b80 52ec2ac9 . 2014.09.06 16:35:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.06 16:35:07 - OpenVPN > Validating certificate key usage . 2014.09.06 16:35:07 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.06 16:35:07 - OpenVPN > VERIFY KU OK . 2014.09.06 16:35:07 - OpenVPN > Validating certificate extended key usage . 2014.09.06 16:35:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.06 16:35:07 - OpenVPN > VERIFY EKU OK . 2014.09.06 16:35:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.06 16:35:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.06 16:35:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.06 16:35:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:10 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.09.06 16:35:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.8:443 . 2014.09.06 16:35:13 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.06 16:35:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.87.230 10.4.87.229' . 2014.09.06 16:35:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2014.09.06 16:35:13 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2014.09.06 16:35:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2014.09.06 16:35:13 - OpenVPN > OPTIONS IMPORT: route options modified . 2014.09.06 16:35:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2014.09.06 16:35:13 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2014.09.06 16:35:13 - OpenVPN > open_tun, tt->ipv6=0 . 2014.09.06 16:35:13 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{4A9AC0C5-A408-402A-B9D1-0E60DB301C23}.tap . 2014.09.06 16:35:13 - OpenVPN > TAP-Windows Driver Version 9.9 . 2014.09.06 16:35:13 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.87.230/255.255.255.252 on interface {4A9AC0C5-A408-402A-B9D1-0E60DB301C23} [DHCP-serv: 10.4.87.229, lease-time: 31536000] . 2014.09.06 16:35:13 - OpenVPN > Successful ARP Flush on interface [23] {4A9AC0C5-A408-402A-B9D1-0E60DB301C23} . 2014.09.06 16:35:18 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2014.09.06 16:35:18 - OpenVPN > C:\Windows\system32\route.exe ADD 37.48.81.8 MASK 255.255.255.255 192.168.178.1 . 2014.09.06 16:35:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2014.09.06 16:35:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:18 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.09.06 16:35:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:18 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.09.06 16:35:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:18 - OpenVPN > C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.87.229 . 2014.09.06 16:35:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.09.06 16:35:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:18 - Starting Management Interface . 2014.09.06 16:35:18 - OpenVPN > Initialization Sequence Completed ! 2014.09.06 16:35:18 - Flushing DNS W 2014.09.06 16:35:19 - Tunnel not ready, interface status: Down . 2014.09.06 16:35:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2014.09.06 16:35:19 - Disconnecting . 2014.09.06 16:35:19 - Management - Send 'signal SIGTERM' . 2014.09.06 16:35:19 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2014.09.06 16:35:19 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.09.06 16:35:19 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2014.09.06 16:35:19 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2014.09.06 16:35:24 - OpenVPN > C:\Windows\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.87.229 . 2014.09.06 16:35:24 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.09.06 16:35:24 - OpenVPN > C:\Windows\system32\route.exe DELETE 37.48.81.8 MASK 255.255.255.255 192.168.178.1 . 2014.09.06 16:35:24 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.09.06 16:35:24 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:24 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.09.06 16:35:24 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:24 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.09.06 16:35:24 - OpenVPN > Closing TUN/TAP interface . 2014.09.06 16:35:24 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2014.09.06 16:35:24 - Connection terminated. ! 2014.09.06 16:35:27 - Checking authorization ! 2014.09.06 16:35:27 - Connecting to Propus (Netherlands, Amsterdam) . 2014.09.06 16:35:27 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 18 2014 . 2014.09.06 16:35:27 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.06 16:35:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.06 16:35:28 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.06 16:35:28 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:28 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:28 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.09.06 16:35:28 - OpenVPN > UDPv4 link local: [undef] . 2014.09.06 16:35:28 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.8:443 . 2014.09.06 16:35:28 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.8:443, sid=0c8fae14 64e29f84 . 2014.09.06 16:35:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.06 16:35:28 - OpenVPN > Validating certificate key usage . 2014.09.06 16:35:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.06 16:35:28 - OpenVPN > VERIFY KU OK . 2014.09.06 16:35:28 - OpenVPN > Validating certificate extended key usage . 2014.09.06 16:35:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.06 16:35:28 - OpenVPN > VERIFY EKU OK . 2014.09.06 16:35:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.06 16:35:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.06 16:35:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.06 16:35:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:30 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.09.06 16:35:30 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.8:443 . 2014.09.06 16:35:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.06 16:35:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.87.230 10.4.87.229' . 2014.09.06 16:35:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2014.09.06 16:35:32 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2014.09.06 16:35:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2014.09.06 16:35:32 - OpenVPN > OPTIONS IMPORT: route options modified . 2014.09.06 16:35:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2014.09.06 16:35:32 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2014.09.06 16:35:32 - OpenVPN > open_tun, tt->ipv6=0 . 2014.09.06 16:35:33 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{4A9AC0C5-A408-402A-B9D1-0E60DB301C23}.tap . 2014.09.06 16:35:33 - OpenVPN > TAP-Windows Driver Version 9.9 . 2014.09.06 16:35:33 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.87.230/255.255.255.252 on interface {4A9AC0C5-A408-402A-B9D1-0E60DB301C23} [DHCP-serv: 10.4.87.229, lease-time: 31536000] . 2014.09.06 16:35:33 - OpenVPN > Successful ARP Flush on interface [23] {4A9AC0C5-A408-402A-B9D1-0E60DB301C23} . 2014.09.06 16:35:37 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2014.09.06 16:35:37 - OpenVPN > C:\Windows\system32\route.exe ADD 37.48.81.8 MASK 255.255.255.255 192.168.178.1 . 2014.09.06 16:35:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2014.09.06 16:35:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:37 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.09.06 16:35:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:37 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.09.06 16:35:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:37 - OpenVPN > C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.87.229 . 2014.09.06 16:35:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.09.06 16:35:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:37 - Starting Management Interface . 2014.09.06 16:35:37 - OpenVPN > Initialization Sequence Completed ! 2014.09.06 16:35:37 - Flushing DNS W 2014.09.06 16:35:38 - Tunnel not ready, interface status: Down . 2014.09.06 16:35:38 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2014.09.06 16:35:38 - Disconnecting . 2014.09.06 16:35:38 - Management - Send 'signal SIGTERM' . 2014.09.06 16:35:38 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2014.09.06 16:35:38 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2014.09.06 16:35:38 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.09.06 16:35:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.87.229 . 2014.09.06 16:35:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.09.06 16:35:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 37.48.81.8 MASK 255.255.255.255 192.168.178.1 . 2014.09.06 16:35:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.09.06 16:35:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.09.06 16:35:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.09.06 16:35:43 - OpenVPN > Closing TUN/TAP interface . 2014.09.06 16:35:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2014.09.06 16:35:43 - Connection terminated. ! 2014.09.06 16:35:46 - Checking authorization ! 2014.09.06 16:35:46 - Connecting to Propus (Netherlands, Amsterdam) . 2014.09.06 16:35:46 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 18 2014 . 2014.09.06 16:35:46 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.06 16:35:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.06 16:35:46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.06 16:35:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:46 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.09.06 16:35:46 - OpenVPN > UDPv4 link local: [undef] . 2014.09.06 16:35:46 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.8:443 . 2014.09.06 16:35:47 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.8:443, sid=fde3ab80 da7478b1 . 2014.09.06 16:35:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.06 16:35:47 - OpenVPN > Validating certificate key usage . 2014.09.06 16:35:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.06 16:35:47 - OpenVPN > VERIFY KU OK . 2014.09.06 16:35:47 - OpenVPN > Validating certificate extended key usage . 2014.09.06 16:35:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.06 16:35:47 - OpenVPN > VERIFY EKU OK . 2014.09.06 16:35:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.06 16:35:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.06 16:35:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.06 16:35:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:50 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.09.06 16:35:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.8:443 . 2014.09.06 16:35:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.06 16:35:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.87.230 10.4.87.229' . 2014.09.06 16:35:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2014.09.06 16:35:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2014.09.06 16:35:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2014.09.06 16:35:52 - OpenVPN > OPTIONS IMPORT: route options modified . 2014.09.06 16:35:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2014.09.06 16:35:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2014.09.06 16:35:52 - OpenVPN > open_tun, tt->ipv6=0 . 2014.09.06 16:35:52 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{4A9AC0C5-A408-402A-B9D1-0E60DB301C23}.tap . 2014.09.06 16:35:52 - OpenVPN > TAP-Windows Driver Version 9.9 . 2014.09.06 16:35:52 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.87.230/255.255.255.252 on interface {4A9AC0C5-A408-402A-B9D1-0E60DB301C23} [DHCP-serv: 10.4.87.229, lease-time: 31536000] . 2014.09.06 16:35:52 - OpenVPN > Successful ARP Flush on interface [23] {4A9AC0C5-A408-402A-B9D1-0E60DB301C23} . 2014.09.06 16:35:57 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2014.09.06 16:35:57 - OpenVPN > C:\Windows\system32\route.exe ADD 37.48.81.8 MASK 255.255.255.255 192.168.178.1 . 2014.09.06 16:35:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2014.09.06 16:35:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:57 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.09.06 16:35:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:57 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.09.06 16:35:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:57 - OpenVPN > C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.87.229 . 2014.09.06 16:35:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.09.06 16:35:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:57 - Starting Management Interface . 2014.09.06 16:35:57 - OpenVPN > Initialization Sequence Completed ! 2014.09.06 16:35:57 - Flushing DNS W 2014.09.06 16:35:59 - Tunnel not ready, interface status: Down . 2014.09.06 16:35:59 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2014.09.06 16:35:59 - Disconnecting . 2014.09.06 16:35:59 - Management - Send 'signal SIGTERM' . 2014.09.06 16:35:59 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2014.09.06 16:35:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2014.09.06 16:35:59 - OpenVPN > SIGTERM received, sending exit notification to peer EDIT: I tried both Propus and Lyncus(Lyncis?), both with the same result EDIT2: Tried an additional German server -> same result
  23. I had a strange thing happen. The AirVPN client, version 2.4, kept crashing. OpenVpn was still running so I had to kill the process before restarting the AirVPN client. After seeing a strange warning that a certificate was invalid due to the date range, and seeing that is should be valid, I noticed that my system date had been changed to 12/31/1899. I changed the date back but wonder if malicious software could invalidate encryption by intentionally changing the system date to one outside of all certificate valid date ranges. My only warning came from my connection to runbox.com not from anywhere else. I'd expect to see warnings on every web site using https but that didn't happen for some reason. Would a system date in 1899 invalidate AirVPN's encryption and expose my network activity?
  24. "Some events happen whether we want them to or not." This is a quote taken from a sign in the game Antichamber. It will appear on the wall of signs in the starting room after visiting 20 rooms in total. And if you think of it, it's an event you cannot circumvent, you cannot visit the 19th room and then suddenly proceed to the 21st. This principle is valid for a variety of things, birthdays for example. One of those events that happen whether we want them to or not is an annual subscription coming to an end. Because of that I would like to publish my own opinion on AirVPN, my story, my thoughts, my experiences. -- The beginnings -- It all began in 2012. The whole year I was downloading and seeding things using BitTorrent. I used a private russian tracker which wasn't as known to german companies as Rutor, a public russian tracker. Because of the fact that my tracker is private I believed I wouldn't get caught using BitTorrent as fast as other people get caught for using public trackers. And in fact, since my registration in 2008 I never got any letters. A few days before New Year's Eve I finally got caught seeding a movie. In February 2013 we got a letter from a law office with information about torrent name and hash, date and time, client, IP. The consequences: No more torrents for now. And I made my first research on how to continue torrenting without a fuss. I heard about VPNs, read about how they work and which companies usually stand behind them. Didn't do anything else but making plans for the future. -- Snowden! -- The second stage began shortly after Snowden's leaks. I was concerned about what the NSA knew about me and my surroundings and I think I wasn't all alone with that. I even forgot my torrents for a moment because of this. The idea of subscribing to a VPN provider suddenly was of importance. At the same time I was still struggling with replacing movie torrents by searching for a good movie streaming service in Germany but no one was able to match my needs. I tried Watchever as the most interesting provider (cheap, easy to use, good streaming quality) but many movies just weren't there. Lovefilm (now Amazon Prime Instant Video) was even worse, and Maxdome's pricing was a catastrophe. -- The final decision -- It was August 2013 by now. I started gathering information about VPN providers and access software and tried out a few of them, including faceless.me and ipredator. That's when I discovered TorrentFreak and their article "Which are the best anonymous VPN providers?" - first contact with AirVPN though it didn't receive much attention for now. It was after I read the updated "Review: Is your VPN service really anonymous?" I noticed AirVPN. I did some research on their reputation on the internet and finally registered. A few days later (I still didn't have a client so I spent those days with gathering information on that) I asked for a trial period to see if things would work for me and received a reply two days later.. ... I was concerned about whether my client really worked because I didn't notice any change in speed after connecting. There is no better first impression, really. I subscribed to AirVPN on September 5, 2013. -- First impressions and the forums -- Many things surprised me a lot, especially the status page with status information on bandwidth usage and connected clients, and the forums. I figured: If there's a forum, then you're not just a client, you're getting invited to be part of a community. So I wanted to integrate myself into that community, too, and started writing regularly, trying to help people with their connection problems. I also published some guides about how I use AirVPN. Most of the community is still anonymous and that's okay. I personally didn't like being anonymous all the time, so I opened myself a bit. That way people don't get a feeling as if they would talk to someone with a question mark head (reference to Anonymous hacker's sign ). I made my profile publicly aviable and published my birthday, my location and some of my interests there. Staff is reading the forums, too. They help where they can, though it sometimes can take some time to get a reply from them. This too applies to the Support Desk. But I always keep in mind that day by day more and more people register and become a customer. The more customers, the more time you'd need to reply to all of them. Antichamer sign quote: "Patience has it's own rewards." -- The servers-- Server's aviability and stability depends on the data center. Some servers are really good, able to be called 100% aviable such as the german servers I was using, in 2013 it mainly was Tauri, others sometimes had high packet loss issues and line problems. I occasionally used servers in America and the Netherlands for a few hours and didn't have problems, either. I find it nice to have many connection modes aviable though I never used any other than UDP port 443. But there were users who reported poor performance with it. Switching to another port solved the problem for most of them - an excellent example why this is a nice feature. Additionally, every server accepts specially secured connections - OpenVPN over SSL and SSH. The goal is an encrypted OpenVPN tunnel inside the encrypted SSH/SSL tunnel in order to prevent Deep Packet Inspection currently used by China for example. This way it's easier to connect from inside China and circumvent their Great Firewall. I never needed that feature, that's why I cannot write anything but descriptive terms about it. -- The client -- AirVPN has an own open source client which I never used. I'm using another open source client, Securepoint OpenVPN, and posted an introduction to it. As far as I remember, when I registered AirVPN's client was in a very bad condition. Earlier this year it has been changed, now people are getting more and more satisfied with it. -- Additional features -- Initially I wrote about the status page and the forums being two extremely useful additional features. Also notable is the remote port forwarding feature similar to the port forwarding feature on a router. Working good despite some seldomly occuring flaws.the speed test feature able to calculate how fast your AirVPN connection ("In-Tunnel speed") is in comparison to your real internet connection ("Out-Tunnel speed"). Works as good as the port forwarding feature.-- So, is AirVPN really the "air to breathe the real internet"? -- Yes, it is. And no, it isn't. Really nice slogan, by the way. Yes, because you really circumvent geolocation blocks (Netflix, YouTube) and censorship (China's Great Firewall) using AirVPN. Yes, because you prevent eavesdroppers from seeing what you do (encryption feature). And from manipulating your traffic (integrity feature). No, because your real internet connection wouldn't face extra blocking that apply to VPN providers. Just look into the Blocked websites forum. No, because using a VPN provider is based on trust. You trust the provider not to track your usage and not to betray you. -- So, what now? -- Most of the Netflix users might have heard that Netflix will start it's services in Germany next month. After all, I heard so much good things about Netflix that I really want to give it a try. I'm looking forward to subscribe to Netflix like I did with Spotify years ago. Since then I never downloaded a single music torrent again. I'm planning to stop downloading movie torrents, too, but only if Netflix really has everything, in a quality that matches my current internet speed. It that's the case, OpenVPN will be superfluous. But I won't just leave. I'll stay here and try helping people out. After all, I might need AirVPN again if I ever happen to be on vacation. I wouldn't expose my data to a public WiFi hotspot where a nerdy-looking guy with a self-made super laptop is sitting in some dark corner, attempting to grab emails and credentials from the hotel guests' devices.. or if I just want to use Netflix if it's not aviable in the country. "But didn't you write that Snowden was the guy who inspired you to subscribe to AirVPN?" - He was part of the inspiration. But to be honest, it never was my complete intention to hide myself from the NSA or other entities. I subscribed because I nearly was sued for doing what I love and I needed someone to stand in front of me, effectively protecting me from being nearly sued again for doing what I love. Anyway, one month of my subscription is left. And even if it's not the end, I'd like to thank AirVPN for a great service so far and the community for being a great one. 8)
  25. What are the dependencies to get the AirVPN Linux client to work? I was apparently able to install the client with the .deb, but nothing happens when I try to execute it, so I figure that probably means some dependencies are missing.
×
×
  • Create New...