Search the Community
Showing results for tags 'AirVPN'.
Found 198 results
-
XMPP/Jitsi problems on Linux Mint with AirVPN
Gaechka posted a topic in Troubleshooting and Problems
Hello, I have a strange problem: I'm using Linux Mint 17 (Cinnamon, 64-bit), no firewall settings applied. After connecting to AirVPN through the network-manager (using .ovpn config file imported) or using "Eddie 2.1 (Portable)" I cannot connect to my Jabber/XMPP profiles (i have two different profiles on two different jabber-servers, including Jitsi). I have tried Pidgin, Gajim and Jitsi. Pidgin cannot login into my accout, Gajim is seems to be connected but no one can see me logged in and I don't see any contacts online, and I cannot send/receive any messages - so I'm accually offline. When I am connected to Jitsi/XMPP account I can see other contacts and they can see me, but I cannot send messages only receive them and I cannot make/receive any calls. In all cases, when I use "Net Activity Viewer" application I see that there is a connection established from local address 10.4.x.x to a jabber-server on a remote port 5222 but still I cannot communicate. I have also tried to flush iptables settings just to be sure - it didn't help. // Just to be clear - I try to connect to XMPP after I have established AirVPN connection. Everything else working but XMPP. When I'm disconnected from AirVPN everything works just fine. // I was using AirVPN under Windows 7 and everything was working (with Comodo anti-leaking Global Rules applied). To be 100% sure, I have tried a clean install of Linux Mint 16 and 17 (both Cinnamon, 64-bit) on a flash drive. The problem repeated. There is more: I have tried to boot from Linux Mint Debian Edition (from a flash drive with installation iso image written on it) - there was NO problem connecting to XMPP accounts under AirVPN connection (using Eddie 2.1 Portable! I just don't know what to think about all of this... some kind of a mystery. -
Hi, Yesterday i subscribed for a 3 day AIRVPN plan. I installed "openvpn-install-2.3.4-I002-x86_64.exe" and generated config files with USA and UK servers having ports TCP 443 alone. Everytime i try connecting it gives a TLS handshake error. My PC is connected to our organisation's firewall, Fortiguard which filters our Internet connection. It has only port 80(TCP) and 443(TCP) opened [ checked it through Nmap tool ]. All other ports are closed. OS- windows 7 64 bit. Here is my log, Fri Oct 03 13:13:10 2014 Warning: cannot open --log file: C:\Program Files\OpenVPN\log\AirVPN_United-States_TCP-443.log: Access is denied. (errno=5) Fri Oct 03 13:13:10 2014 OpenVPN 2.3.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Jun 5 2014 Fri Oct 03 13:13:10 2014 library versions: OpenSSL 1.0.1h 5 Jun 2014, LZO 2.05 Fri Oct 03 13:13:10 2014 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25343 Fri Oct 03 13:13:10 2014 Need hold release from management interface, waiting... Fri Oct 03 13:13:10 2014 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25343 Fri Oct 03 13:13:10 2014 MANAGEMENT: CMD 'state on' Fri Oct 03 13:13:10 2014 MANAGEMENT: CMD 'log all on' Fri Oct 03 13:13:10 2014 MANAGEMENT: CMD 'hold off' Fri Oct 03 13:13:10 2014 MANAGEMENT: CMD 'hold release' Fri Oct 03 13:13:10 2014 Control Channel Authentication: tls-auth using INLINE static key file Fri Oct 03 13:13:10 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Oct 03 13:13:10 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Oct 03 13:13:10 2014 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Oct 03 13:13:10 2014 MANAGEMENT: >STATE:1412322190,RESOLVE,,, Fri Oct 03 13:13:11 2014 Attempting to establish TCP connection with [AF_INET]149.255.33.154:443 Fri Oct 03 13:13:11 2014 MANAGEMENT: >STATE:1412322191,TCP_CONNECT,,, Fri Oct 03 13:13:11 2014 TCP connection established with [AF_INET]149.255.33.154:443 Fri Oct 03 13:13:11 2014 TCPv4_CLIENT link local: [undef] Fri Oct 03 13:13:11 2014 TCPv4_CLIENT link remote: [AF_INET]149.255.33.154:443 Fri Oct 03 13:13:11 2014 MANAGEMENT: >STATE:1412322191,WAIT,,, Fri Oct 03 13:14:11 2014 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Fri Oct 03 13:14:11 2014 TLS Error: TLS handshake failed Fri Oct 03 13:14:11 2014 Fatal TLS error (check_tls_errors_co), restarting Fri Oct 03 13:14:11 2014 SIGUSR1[soft,tls-error] received, process restarting Fri Oct 03 13:14:11 2014 MANAGEMENT: >STATE:1412322251,RECONNECTING,tls-error,, Fri Oct 03 13:14:11 2014 Restart pause, 5 second(s) Fri Oct 03 13:14:16 2014 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Oct 03 13:14:16 2014 MANAGEMENT: >STATE:1412322256,RESOLVE,,, Fri Oct 03 13:14:16 2014 Attempting to establish TCP connection with [AF_INET]149.255.33.154:443 Fri Oct 03 13:14:16 2014 MANAGEMENT: >STATE:1412322256,TCP_CONNECT,,, Fri Oct 03 13:14:16 2014 TCP connection established with [AF_INET]149.255.33.154:443 Fri Oct 03 13:14:16 2014 TCPv4_CLIENT link local: [undef] Fri Oct 03 13:14:16 2014 TCPv4_CLIENT link remote: [AF_INET]149.255.33.154:443 Fri Oct 03 13:14:16 2014 MANAGEMENT: >STATE:1412322256,WAIT,,, and this repeats.. What i found out is, i opened Ultrasurf Proxy [which is the only proxy software that works bypassing Fortiguard in my organisation] and connected to its proxy and then tried connecting AirVPN and voila, it got connected without an problem to an USA server. After i disconnected Ultrasurf, AirVPN couldn't connect back. !!! I also installed Eddie 2.6 and tried connecting with "protocol TCP 443" selected from preferences, but couldn't connect. I even tried SSL 443 but couldn't connect here is my log, Sat Oct 04 13:04:27 2014 OpenVPN 2.3.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Jun 5 2014 Sat Oct 04 13:04:27 2014 library versions: OpenSSL 1.0.1h 5 Jun 2014, LZO 2.05 Enter Management Password: Sat Oct 04 13:04:27 2014 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340 Sat Oct 04 13:04:27 2014 Need hold release from management interface, waiting... Sat Oct 04 13:04:28 2014 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340 Sat Oct 04 13:04:28 2014 MANAGEMENT: CMD 'state on' Sat Oct 04 13:04:28 2014 MANAGEMENT: CMD 'log all on' Sat Oct 04 13:04:28 2014 MANAGEMENT: CMD 'hold off' Sat Oct 04 13:04:28 2014 MANAGEMENT: CMD 'hold release' Sat Oct 04 13:04:28 2014 MANAGEMENT: CMD 'proxy NONE ' Sat Oct 04 13:04:29 2014 Control Channel Authentication: tls-auth using INLINE static key file Sat Oct 04 13:04:29 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Sat Oct 04 13:04:29 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Sat Oct 04 13:04:29 2014 Socket Buffers: R=[8192->8192] S=[8192->8192] Sat Oct 04 13:04:29 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 Sat Oct 04 13:04:29 2014 MANAGEMENT: >STATE:1412408069,TCP_CONNECT,,, Sat Oct 04 13:04:30 2014 TCP: connect to [AF_INET]127.0.0.1:1413 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sat Oct 04 13:04:30 2014 SIGUSR1[soft,init_instance] received, process restarting Sat Oct 04 13:04:30 2014 MANAGEMENT: >STATE:1412408070,RECONNECTING,init_instance,, Sat Oct 04 13:04:30 2014 Restart pause, 5 second(s) Sat Oct 04 13:04:35 2014 MANAGEMENT: CMD 'proxy NONE ' Sat Oct 04 13:04:36 2014 Socket Buffers: R=[8192->8192] S=[8192->8192] Sat Oct 04 13:04:36 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 Sat Oct 04 13:04:36 2014 MANAGEMENT: >STATE:1412408076,TCP_CONNECT,,, Sat Oct 04 13:04:37 2014 TCP: connect to [AF_INET]127.0.0.1:1413 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sat Oct 04 13:04:37 2014 SIGUSR1[soft,init_instance] received, process restarting Sat Oct 04 13:04:37 2014 MANAGEMENT: >STATE:1412408077,RECONNECTING,init_instance,, Sat Oct 04 13:04:37 2014 Restart pause, 5 second(s) I did raise a support ticket and their reply was, There is no communication between your node and the VPN servers. You are maybe behind a proxy. If so, OpenVPN can connect over a proxy. You need to know proxy type, proxy listening port and IP address (or reachable host name), authentication type (if any), authentication credentials (if any). Then you can generate a configuration file with such parameters (tick "Advanced Mode" in the Configuration Generator and fill in the proxy parameters). If you think you are not behind a proxy, try a connection of OpenVPN over SSL. In our client Eddie you can quickly test OpenVPN over SSL by clicking "AirVPN" button, selecting "Preferences", clicking "Protocols" tab, selecting "SSL Tunnel - Port 443" and clicking "Save". Eddie supports OpenVPN connections over a proxy as well (they can be configured in the "Proxy" tab). Kind regards AirVPN Support Team But i would like to point out that, i could communicate with AirVPN servers when using Ultrasurf and my internet connection dowsn't go through a proxy. Kindly can anyone help me out.
-
This tutorial is about blocking ALL traffic outside of the VPN connection which reveal your real IP address and also work as DNS Leak Fix. This works ONLY for Viscosity users and ONLY if you have ANY firewall (in my case I'm using GData Internet Security 2015). Why only for Viscosity? Because Viscosity makes it very easy for us by creating network adapters and I had trouble applying the Comodo guide to GData Firewall. In short: We simply block ALL traffic on our others network adapters and just allow Viscosity (and the network adapters of viscosity). Step by step: 1. Create a new rule set called AirVPN or whatever else. 2. We need a to create only a few custom rules in our rule set 3. We need to allow the Openvpn.exe inside of the Viscosity folder. I recommend using the assistant of GData. 3a) We need to allow in/out connections to our homework by allowing connections from 192.168.0.0 to 192.168.255.255 3b) We need to allow in/out connections to AirVPN in general, because GData has no kind of collection we must create for every IP a rule. We allow in/out connections to 95.211.138.143 and to 212.117.180.25 3c) Next we allow connections to the AIRVPN server(s) in this case I'm allowing connections to the AirVPN Switzerland server //Edit: This doesn't seem to be necessary at all. 3d) At the end we block ALL other traffic 4. As previously told Viscosity creates network adapters. So we just need to apply this rule set to our local network adapter only. As soon as Viscosity has lost the connection, we are no longer be able to connect to the internet because our local network has been blocked. But we can reconnect with Viscosity to our AirVPN servers. So we made sure that all traffic is going through our VPN tunnel. This works with all firewalls that support these steps and its very easy to set up. Feedback is appreciated.
-
I tried as a last resort the airvpn client which did not work on snow leopard , but now in Mavericks it works fine. The problem is that since I cannot import the configuration file I cannot restrain the server to one continent. Is there a way to do that? To select continent USA, Europe, Asia ?
-
I just upgraded to version 2.4 and now things just don't work out anymore. OS: Windows 7 Ultimate x64 logs: I 2014.09.06 16:35:00 - AirVPN client version: 2.4, System: Windows, Architecture: x64 . 2014.09.06 16:35:00 - Reading options from C:\Program Files\AirVPN\AirVPN.xml . 2014.09.06 16:35:00 - Data Path: C:\Program Files\AirVPN . 2014.09.06 16:35:00 - App Path: C:\Program Files\AirVPN . 2014.09.06 16:35:00 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe . 2014.09.06 16:35:00 - Command line arguments: . 2014.09.06 16:35:00 - Operating System: Microsoft Windows NT 6.1.7601 Service Pack 1 I 2014.09.06 16:35:00 - OpenVPN Driver - TAP-Windows Adapter V9 #2 I 2014.09.06 16:35:00 - OpenVPN - Version: OpenVPN 2.3.4 (C:\Program Files\AirVPN\openvpn.exe) I 2014.09.06 16:35:00 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe) I 2014.09.06 16:35:00 - SSL - Version: stunnel 4.56 (C:\Program Files\AirVPN\stunnel.exe) I 2014.09.06 16:35:00 - IPV6: Available I 2014.09.06 16:35:00 - Session starting. ! 2014.09.06 16:35:00 - Checking environment ! 2014.09.06 16:35:00 - Retrieving manifest ! 2014.09.06 16:35:01 - Waiting for latency tests ! 2014.09.06 16:35:06 - Checking authorization ! 2014.09.06 16:35:07 - Connecting to Propus (Netherlands, Amsterdam) . 2014.09.06 16:35:07 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 18 2014 . 2014.09.06 16:35:07 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.06 16:35:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.06 16:35:07 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.06 16:35:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:07 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.09.06 16:35:07 - OpenVPN > UDPv4 link local: [undef] . 2014.09.06 16:35:07 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.8:443 . 2014.09.06 16:35:07 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.8:443, sid=339c0b80 52ec2ac9 . 2014.09.06 16:35:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.06 16:35:07 - OpenVPN > Validating certificate key usage . 2014.09.06 16:35:07 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.06 16:35:07 - OpenVPN > VERIFY KU OK . 2014.09.06 16:35:07 - OpenVPN > Validating certificate extended key usage . 2014.09.06 16:35:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.06 16:35:07 - OpenVPN > VERIFY EKU OK . 2014.09.06 16:35:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.06 16:35:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.06 16:35:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.06 16:35:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:10 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.09.06 16:35:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.8:443 . 2014.09.06 16:35:13 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.06 16:35:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.87.230 10.4.87.229' . 2014.09.06 16:35:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2014.09.06 16:35:13 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2014.09.06 16:35:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2014.09.06 16:35:13 - OpenVPN > OPTIONS IMPORT: route options modified . 2014.09.06 16:35:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2014.09.06 16:35:13 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2014.09.06 16:35:13 - OpenVPN > open_tun, tt->ipv6=0 . 2014.09.06 16:35:13 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{4A9AC0C5-A408-402A-B9D1-0E60DB301C23}.tap . 2014.09.06 16:35:13 - OpenVPN > TAP-Windows Driver Version 9.9 . 2014.09.06 16:35:13 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.87.230/255.255.255.252 on interface {4A9AC0C5-A408-402A-B9D1-0E60DB301C23} [DHCP-serv: 10.4.87.229, lease-time: 31536000] . 2014.09.06 16:35:13 - OpenVPN > Successful ARP Flush on interface [23] {4A9AC0C5-A408-402A-B9D1-0E60DB301C23} . 2014.09.06 16:35:18 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2014.09.06 16:35:18 - OpenVPN > C:\Windows\system32\route.exe ADD 37.48.81.8 MASK 255.255.255.255 192.168.178.1 . 2014.09.06 16:35:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2014.09.06 16:35:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:18 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.09.06 16:35:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:18 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.09.06 16:35:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:18 - OpenVPN > C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.87.229 . 2014.09.06 16:35:18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.09.06 16:35:18 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:18 - Starting Management Interface . 2014.09.06 16:35:18 - OpenVPN > Initialization Sequence Completed ! 2014.09.06 16:35:18 - Flushing DNS W 2014.09.06 16:35:19 - Tunnel not ready, interface status: Down . 2014.09.06 16:35:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2014.09.06 16:35:19 - Disconnecting . 2014.09.06 16:35:19 - Management - Send 'signal SIGTERM' . 2014.09.06 16:35:19 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2014.09.06 16:35:19 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.09.06 16:35:19 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2014.09.06 16:35:19 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2014.09.06 16:35:24 - OpenVPN > C:\Windows\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.87.229 . 2014.09.06 16:35:24 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.09.06 16:35:24 - OpenVPN > C:\Windows\system32\route.exe DELETE 37.48.81.8 MASK 255.255.255.255 192.168.178.1 . 2014.09.06 16:35:24 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.09.06 16:35:24 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:24 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.09.06 16:35:24 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:24 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.09.06 16:35:24 - OpenVPN > Closing TUN/TAP interface . 2014.09.06 16:35:24 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2014.09.06 16:35:24 - Connection terminated. ! 2014.09.06 16:35:27 - Checking authorization ! 2014.09.06 16:35:27 - Connecting to Propus (Netherlands, Amsterdam) . 2014.09.06 16:35:27 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 18 2014 . 2014.09.06 16:35:27 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.06 16:35:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.06 16:35:28 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.06 16:35:28 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:28 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:28 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.09.06 16:35:28 - OpenVPN > UDPv4 link local: [undef] . 2014.09.06 16:35:28 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.8:443 . 2014.09.06 16:35:28 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.8:443, sid=0c8fae14 64e29f84 . 2014.09.06 16:35:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.06 16:35:28 - OpenVPN > Validating certificate key usage . 2014.09.06 16:35:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.06 16:35:28 - OpenVPN > VERIFY KU OK . 2014.09.06 16:35:28 - OpenVPN > Validating certificate extended key usage . 2014.09.06 16:35:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.06 16:35:28 - OpenVPN > VERIFY EKU OK . 2014.09.06 16:35:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.06 16:35:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.06 16:35:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.06 16:35:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:30 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.09.06 16:35:30 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.8:443 . 2014.09.06 16:35:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.06 16:35:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.87.230 10.4.87.229' . 2014.09.06 16:35:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2014.09.06 16:35:32 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2014.09.06 16:35:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2014.09.06 16:35:32 - OpenVPN > OPTIONS IMPORT: route options modified . 2014.09.06 16:35:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2014.09.06 16:35:32 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2014.09.06 16:35:32 - OpenVPN > open_tun, tt->ipv6=0 . 2014.09.06 16:35:33 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{4A9AC0C5-A408-402A-B9D1-0E60DB301C23}.tap . 2014.09.06 16:35:33 - OpenVPN > TAP-Windows Driver Version 9.9 . 2014.09.06 16:35:33 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.87.230/255.255.255.252 on interface {4A9AC0C5-A408-402A-B9D1-0E60DB301C23} [DHCP-serv: 10.4.87.229, lease-time: 31536000] . 2014.09.06 16:35:33 - OpenVPN > Successful ARP Flush on interface [23] {4A9AC0C5-A408-402A-B9D1-0E60DB301C23} . 2014.09.06 16:35:37 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2014.09.06 16:35:37 - OpenVPN > C:\Windows\system32\route.exe ADD 37.48.81.8 MASK 255.255.255.255 192.168.178.1 . 2014.09.06 16:35:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2014.09.06 16:35:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:37 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.09.06 16:35:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:37 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.09.06 16:35:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:37 - OpenVPN > C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.87.229 . 2014.09.06 16:35:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.09.06 16:35:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:37 - Starting Management Interface . 2014.09.06 16:35:37 - OpenVPN > Initialization Sequence Completed ! 2014.09.06 16:35:37 - Flushing DNS W 2014.09.06 16:35:38 - Tunnel not ready, interface status: Down . 2014.09.06 16:35:38 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2014.09.06 16:35:38 - Disconnecting . 2014.09.06 16:35:38 - Management - Send 'signal SIGTERM' . 2014.09.06 16:35:38 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2014.09.06 16:35:38 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2014.09.06 16:35:38 - OpenVPN > SIGTERM received, sending exit notification to peer . 2014.09.06 16:35:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.87.229 . 2014.09.06 16:35:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.09.06 16:35:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 37.48.81.8 MASK 255.255.255.255 192.168.178.1 . 2014.09.06 16:35:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.09.06 16:35:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.09.06 16:35:43 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:43 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2014.09.06 16:35:43 - OpenVPN > Closing TUN/TAP interface . 2014.09.06 16:35:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2014.09.06 16:35:43 - Connection terminated. ! 2014.09.06 16:35:46 - Checking authorization ! 2014.09.06 16:35:46 - Connecting to Propus (Netherlands, Amsterdam) . 2014.09.06 16:35:46 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 18 2014 . 2014.09.06 16:35:46 - OpenVPN > library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05 . 2014.09.06 16:35:46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2014.09.06 16:35:46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2014.09.06 16:35:46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:46 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192] . 2014.09.06 16:35:46 - OpenVPN > UDPv4 link local: [undef] . 2014.09.06 16:35:46 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.8:443 . 2014.09.06 16:35:47 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.8:443, sid=fde3ab80 da7478b1 . 2014.09.06 16:35:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2014.09.06 16:35:47 - OpenVPN > Validating certificate key usage . 2014.09.06 16:35:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2014.09.06 16:35:47 - OpenVPN > VERIFY KU OK . 2014.09.06 16:35:47 - OpenVPN > Validating certificate extended key usage . 2014.09.06 16:35:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2014.09.06 16:35:47 - OpenVPN > VERIFY EKU OK . 2014.09.06 16:35:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2014.09.06 16:35:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.06 16:35:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2014.09.06 16:35:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2014.09.06 16:35:50 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2014.09.06 16:35:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.8:443 . 2014.09.06 16:35:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2014.09.06 16:35:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.87.230 10.4.87.229' . 2014.09.06 16:35:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2014.09.06 16:35:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2014.09.06 16:35:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2014.09.06 16:35:52 - OpenVPN > OPTIONS IMPORT: route options modified . 2014.09.06 16:35:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2014.09.06 16:35:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2014.09.06 16:35:52 - OpenVPN > open_tun, tt->ipv6=0 . 2014.09.06 16:35:52 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{4A9AC0C5-A408-402A-B9D1-0E60DB301C23}.tap . 2014.09.06 16:35:52 - OpenVPN > TAP-Windows Driver Version 9.9 . 2014.09.06 16:35:52 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.87.230/255.255.255.252 on interface {4A9AC0C5-A408-402A-B9D1-0E60DB301C23} [DHCP-serv: 10.4.87.229, lease-time: 31536000] . 2014.09.06 16:35:52 - OpenVPN > Successful ARP Flush on interface [23] {4A9AC0C5-A408-402A-B9D1-0E60DB301C23} . 2014.09.06 16:35:57 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up . 2014.09.06 16:35:57 - OpenVPN > C:\Windows\system32\route.exe ADD 37.48.81.8 MASK 255.255.255.255 192.168.178.1 . 2014.09.06 16:35:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 . 2014.09.06 16:35:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:57 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.09.06 16:35:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:57 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.87.229 . 2014.09.06 16:35:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.09.06 16:35:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:57 - OpenVPN > C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.87.229 . 2014.09.06 16:35:57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 . 2014.09.06 16:35:57 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2014.09.06 16:35:57 - Starting Management Interface . 2014.09.06 16:35:57 - OpenVPN > Initialization Sequence Completed ! 2014.09.06 16:35:57 - Flushing DNS W 2014.09.06 16:35:59 - Tunnel not ready, interface status: Down . 2014.09.06 16:35:59 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2014.09.06 16:35:59 - Disconnecting . 2014.09.06 16:35:59 - Management - Send 'signal SIGTERM' . 2014.09.06 16:35:59 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2014.09.06 16:35:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2014.09.06 16:35:59 - OpenVPN > SIGTERM received, sending exit notification to peer EDIT: I tried both Propus and Lyncus(Lyncis?), both with the same result EDIT2: Tried an additional German server -> same result
-
I had a strange thing happen. The AirVPN client, version 2.4, kept crashing. OpenVpn was still running so I had to kill the process before restarting the AirVPN client. After seeing a strange warning that a certificate was invalid due to the date range, and seeing that is should be valid, I noticed that my system date had been changed to 12/31/1899. I changed the date back but wonder if malicious software could invalidate encryption by intentionally changing the system date to one outside of all certificate valid date ranges. My only warning came from my connection to runbox.com not from anywhere else. I'd expect to see warnings on every web site using https but that didn't happen for some reason. Would a system date in 1899 invalidate AirVPN's encryption and expose my network activity?
-
"Some events happen whether we want them to or not." This is a quote taken from a sign in the game Antichamber. It will appear on the wall of signs in the starting room after visiting 20 rooms in total. And if you think of it, it's an event you cannot circumvent, you cannot visit the 19th room and then suddenly proceed to the 21st. This principle is valid for a variety of things, birthdays for example. One of those events that happen whether we want them to or not is an annual subscription coming to an end. Because of that I would like to publish my own opinion on AirVPN, my story, my thoughts, my experiences. -- The beginnings -- It all began in 2012. The whole year I was downloading and seeding things using BitTorrent. I used a private russian tracker which wasn't as known to german companies as Rutor, a public russian tracker. Because of the fact that my tracker is private I believed I wouldn't get caught using BitTorrent as fast as other people get caught for using public trackers. And in fact, since my registration in 2008 I never got any letters. A few days before New Year's Eve I finally got caught seeding a movie. In February 2013 we got a letter from a law office with information about torrent name and hash, date and time, client, IP. The consequences: No more torrents for now. And I made my first research on how to continue torrenting without a fuss. I heard about VPNs, read about how they work and which companies usually stand behind them. Didn't do anything else but making plans for the future. -- Snowden! -- The second stage began shortly after Snowden's leaks. I was concerned about what the NSA knew about me and my surroundings and I think I wasn't all alone with that. I even forgot my torrents for a moment because of this. The idea of subscribing to a VPN provider suddenly was of importance. At the same time I was still struggling with replacing movie torrents by searching for a good movie streaming service in Germany but no one was able to match my needs. I tried Watchever as the most interesting provider (cheap, easy to use, good streaming quality) but many movies just weren't there. Lovefilm (now Amazon Prime Instant Video) was even worse, and Maxdome's pricing was a catastrophe. -- The final decision -- It was August 2013 by now. I started gathering information about VPN providers and access software and tried out a few of them, including faceless.me and ipredator. That's when I discovered TorrentFreak and their article "Which are the best anonymous VPN providers?" - first contact with AirVPN though it didn't receive much attention for now. It was after I read the updated "Review: Is your VPN service really anonymous?" I noticed AirVPN. I did some research on their reputation on the internet and finally registered. A few days later (I still didn't have a client so I spent those days with gathering information on that) I asked for a trial period to see if things would work for me and received a reply two days later.. ... I was concerned about whether my client really worked because I didn't notice any change in speed after connecting. There is no better first impression, really. I subscribed to AirVPN on September 5, 2013. -- First impressions and the forums -- Many things surprised me a lot, especially the status page with status information on bandwidth usage and connected clients, and the forums. I figured: If there's a forum, then you're not just a client, you're getting invited to be part of a community. So I wanted to integrate myself into that community, too, and started writing regularly, trying to help people with their connection problems. I also published some guides about how I use AirVPN. Most of the community is still anonymous and that's okay. I personally didn't like being anonymous all the time, so I opened myself a bit. That way people don't get a feeling as if they would talk to someone with a question mark head (reference to Anonymous hacker's sign ). I made my profile publicly aviable and published my birthday, my location and some of my interests there. Staff is reading the forums, too. They help where they can, though it sometimes can take some time to get a reply from them. This too applies to the Support Desk. But I always keep in mind that day by day more and more people register and become a customer. The more customers, the more time you'd need to reply to all of them. Antichamer sign quote: "Patience has it's own rewards." -- The servers-- Server's aviability and stability depends on the data center. Some servers are really good, able to be called 100% aviable such as the german servers I was using, in 2013 it mainly was Tauri, others sometimes had high packet loss issues and line problems. I occasionally used servers in America and the Netherlands for a few hours and didn't have problems, either. I find it nice to have many connection modes aviable though I never used any other than UDP port 443. But there were users who reported poor performance with it. Switching to another port solved the problem for most of them - an excellent example why this is a nice feature. Additionally, every server accepts specially secured connections - OpenVPN over SSL and SSH. The goal is an encrypted OpenVPN tunnel inside the encrypted SSH/SSL tunnel in order to prevent Deep Packet Inspection currently used by China for example. This way it's easier to connect from inside China and circumvent their Great Firewall. I never needed that feature, that's why I cannot write anything but descriptive terms about it. -- The client -- AirVPN has an own open source client which I never used. I'm using another open source client, Securepoint OpenVPN, and posted an introduction to it. As far as I remember, when I registered AirVPN's client was in a very bad condition. Earlier this year it has been changed, now people are getting more and more satisfied with it. -- Additional features -- Initially I wrote about the status page and the forums being two extremely useful additional features. Also notable is the remote port forwarding feature similar to the port forwarding feature on a router. Working good despite some seldomly occuring flaws.the speed test feature able to calculate how fast your AirVPN connection ("In-Tunnel speed") is in comparison to your real internet connection ("Out-Tunnel speed"). Works as good as the port forwarding feature.-- So, is AirVPN really the "air to breathe the real internet"? -- Yes, it is. And no, it isn't. Really nice slogan, by the way. Yes, because you really circumvent geolocation blocks (Netflix, YouTube) and censorship (China's Great Firewall) using AirVPN. Yes, because you prevent eavesdroppers from seeing what you do (encryption feature). And from manipulating your traffic (integrity feature). No, because your real internet connection wouldn't face extra blocking that apply to VPN providers. Just look into the Blocked websites forum. No, because using a VPN provider is based on trust. You trust the provider not to track your usage and not to betray you. -- So, what now? -- Most of the Netflix users might have heard that Netflix will start it's services in Germany next month. After all, I heard so much good things about Netflix that I really want to give it a try. I'm looking forward to subscribe to Netflix like I did with Spotify years ago. Since then I never downloaded a single music torrent again. I'm planning to stop downloading movie torrents, too, but only if Netflix really has everything, in a quality that matches my current internet speed. It that's the case, OpenVPN will be superfluous. But I won't just leave. I'll stay here and try helping people out. After all, I might need AirVPN again if I ever happen to be on vacation. I wouldn't expose my data to a public WiFi hotspot where a nerdy-looking guy with a self-made super laptop is sitting in some dark corner, attempting to grab emails and credentials from the hotel guests' devices.. or if I just want to use Netflix if it's not aviable in the country. "But didn't you write that Snowden was the guy who inspired you to subscribe to AirVPN?" - He was part of the inspiration. But to be honest, it never was my complete intention to hide myself from the NSA or other entities. I subscribed because I nearly was sued for doing what I love and I needed someone to stand in front of me, effectively protecting me from being nearly sued again for doing what I love. Anyway, one month of my subscription is left. And even if it's not the end, I'd like to thank AirVPN for a great service so far and the community for being a great one. 8)
-
What are the dependencies to get the AirVPN Linux client to work? I was apparently able to install the client with the .deb, but nothing happens when I try to execute it, so I figure that probably means some dependencies are missing.
-
Hey @all, I'm running AirVPN on my dd-wrt router through server x in location y, and want to change locations/servers for certain websites by running openvpn on windows with a different server/location. I can establish a connection, but the final server/connection remains the one I set on dd-wrt. Any suggestions? Thanks in advance Kind regards
-
Hello, I would like to know whether it is possible to restrict AirVPN to a single specific application (such as uTorrent) while keeping your original connection for other things (such as gaming). Greetz, - Mercury
-
I would like to set up my router's firewall to deny all inbound and outbound traffic unless it is coming from or going to the airvpn servers. Is there a group of static IP addresses I can use to define this? Thank you.
-
Hey, I'm running Airvpn via the terminal, I get my .ovpn from the generator and it works just fine. But how do I terminate the vpn and drop back to my normal IP? Thanks.
-
Hello, I have a DD-WRT router which had its WiFi functionality quit, so I'm looking to replace it with a PFSense device. I've got about $70 to buy a PFSense device (used is fine), so I've got a few questions. I have speed of ~40mbps up and ~4mbps down on my network connection. What specs would you suggest to run an always-on connection to Air with 3-5 computers behind the PFSense device (the computers wouldn't be running 24/7)? How much RAM, CPU, etc.? I'd like to buy something that can handle the load of OpenVPN without spending too much or significantly slowing down (ie not <50% of current speed) my web access. Here are the devices I'm considering: http://www.ebay.com/itm/Pfsense-2-1-Instagate-EX2-Firewall-VPN-Router-/301114026875?pt=US_Firewall_VPN_Devices&hash=item461bcb6b7b http://www.ebay.com/itm/Router-Firewall-VPN-QOS-appliance-running-pfSense-LAN-and-WAN-ports-/181379828147?pt=US_Wired_Routers&hash=item2a3b1489b3 http://www.ebay.com/itm/pfSense-2-1-2-Router-Firewall-VPN-QOS-appliance-LAN-and-WAN-ports-/181385843068?pt=US_Wired_Routers&hash=item2a3b70517c http://www.ebay.com/itm/pfSense-2-1-2-ROUTER-FIREWALL-1GHz-SSD-Flash-VPN-DMZ-DUAL-GIGABIT-WAN-GUI-3-port-/360909880045?pt=US_Thin_Clients&hash=item5407e7baed Please let me know which you think is best. I look forward to hearing from you soon. Best regards, anonym
-
Hi! After AirVPN Major System Update of April 2014 user can use three alternative connections simultaneously on three different devices with only one bought account. I would like to use my laptop (with Windows 8.1 Pro 64-bit and Comodo Firewall configured to prevent ip leaks) as a hotspot. When Comodo Firewall is turned off, everything works perfectly. I can connect my netbook to internet via my laptop and, of course, use AirVPN clients on both machines. However, when Comodo Firewall is turned on, it blocks device, which is connected to hotspot providing computer, from obtaining the internet data transmission. My Comodo Firewall on host is set to prevent leakage according to to the description given here (https://airvpn.org/t...-prevent-leaks/). To let device (connected to host) be connected to internet, I have to disable the main firewall rule (Block And Log IP In/Out From MAC Any To MAC Any Where Protocol Is Any) by changing the command "Block and Log" into "Allow and Log". After the moment when device was just connected and AirVPN client started the encryption of all the communication with the network, the rule can be restored. Is there a possibility to modify configuration of Comodo Firewall to let devices be connected to network through hotspot providing computer without any manual operations within the firewall of the latter? If yes, tell me how, please. I would like to be still protected against ip leakage of course. Thank you for your responses.
-
Hi, I got a problem when connecting the AirVPN clinet through the Tor Browser Bundle 3.5.4 (Windows). First, I got the following error message: Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 TCP connection established with [AF_INET]127.0.0.1:9150 socks_handshake: server asked for username/login auth but we were not provided any credentials SIGTERM[soft,init_instance] received, process exiting Failed to start. So I have replaced the port setting in the torrc-defaults file to: SOCKSPort 127.0.0.1:9150 PreferSOCKSNoAuth Now the error message looks like this: Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 TCP connection established with [AF_INET]127.0.0.1:9150 recv_socks_reply: Socks proxy returned bad reply SIGTERM[soft,init_instance] received, process exiting Failed to start. What should I do now?
-
Hi! I have a strange problem. I have been using AirVPN since year and a half. Everything was ok until I updated my Windows 8.1 64-bit a day ago. Since then my real IP has been revealed and there is no trace, according to ipleak.net, of AirVPN connection. I don't know where the shoe pinches indeed. I have reinstalled TAP-Windows Adapter V 9. Windows shows AirVPN is connected. AirVPN connection manager itself displays network access. In Control Panel\Network and Internet\Network Connections I can see that OpenVPN adapter is linked. Furthermore, Online Armor (firewall which I use) identifies AirVPN linkage. So, VPNCheck does. I have to add that my internet operates through 3G+ modem. Except for AirVPN on Windows 8 64-bit, I use the same OS on VMware Player. It is actually the copy of my physical computer with drivers removed and Comodo Free Firewall set as it should be to avoid IP leaks. This virtualized enviroment was updated as well a day ago. The same 3G+ modem is in use. Everything proceeds ok. After update IP Address (Windows Metro App) shows my ISP connection with masked IP, except for AirVPN as it used to be. But, may it be, it doesn't matter. I have not experienced any problems yet using Ubuntu 13.10 Saucy Salamander Live CD, identical OS or Linux Mint 16 Petra on virtual machines. I would like to emphasize that I want not to install Comodo Firewall on my "hardware version" of Windows 8.1. It lowered performance of my computer obviously. Even if task manager presented a lot of free resources. I enclosed AirVPN connection manager's log and ipconfig /all below. Please help me with described problem. Best regards Log AirVPN.pdf IPCONFIG.pdf
-
Hi! Why I should use AirVPN over the other VPNs that are out there? I've been thinking about getting AirVPN or Viking VPN I'm currently Using PIA and I'm happy with it but everyone seems to be telling something bad about each provider so I don't know is there any real difference do I use PIA or Air or Viking?
-
I've readed almost every post in this forum about it and outside too but didn't managed to resolve. The problem is, i select Socks at config on AirVpn; Host : 127.0.0.1; Port 9150, then i start Tor, select the socks5 put the host and port and connect. But when i try to connect the AirVpn (Using TCP) it gives me this error everytime. 20/12/2013 - x:21 Login... 20/12/2013 - x:21 Login success. 20/12/2013 - x:21 Contacting service... 20/12/2013 - x:21 Connecting... 20/12/2013 - x:21 OpenVPN 2.3.2 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [iPv6] built on Aug 22 2013 20/12/2013 - x:21 Socket Buffers: R=[8192->8192] S=[8192->8192] 20/12/2013 - x:21 Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 20/12/2013 - x:21 TCP connection established with [AF_INET]127.0.0.1:9150 20/12/2013 - x:21 socks_handshake: server asked for username/login auth but we were not provided any credentials 20/12/2013 - x:21 SIGTERM[soft,init_instance] received, process exiting 20/12/2013 - x:21 Failed to start.
-
Hi all, So recently I've started having issues running qBittorrent and remaining connected to AiVPN. If I connect to AirVPN (through the OpenVPN GUI) and just browse then there is no problem, speeds are good and the connection remains constant. If however I launch qBittorrent and download anything, within 3-4 minutes AirVPN drops. I can think of no explanation as to why this is happening - hence this post. I'm running Windows 8, tunneling through a Uni firewall on TCP 443, I've tried routing qBittorrent over a port explicitly opened in the Forward Ports section of AirVPN and through a randomly generated one, in both cases the results are the same. The only other thing to note is that I have modified the connection script slightly to change my DNS server to 10.5.0.1 (AirVPN's DNS) to prevent DNS leaks however like I say when I'm not running qBittorrent the connection doesn't drop, so I don't think this is the problem. It has only appeared in the last 2 weeks or so, prior to that there were no problems at all and I would quite like to get this fixed. Cheers, H. Log Below: Sat Nov 09 13:12:24 2013 OpenVPN 2.3.2 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [iPv6] built on Aug 22 2013Sat Nov 09 13:12:24 2013 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25342Sat Nov 09 13:12:24 2013 Need hold release from management interface, waiting...Sat Nov 09 13:12:25 2013 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25342Sat Nov 09 13:12:25 2013 MANAGEMENT: CMD 'state on'Sat Nov 09 13:12:25 2013 MANAGEMENT: CMD 'log all on'Sat Nov 09 13:12:25 2013 MANAGEMENT: CMD 'hold off'Sat Nov 09 13:12:25 2013 MANAGEMENT: CMD 'hold release'Sat Nov 09 13:12:25 2013 NOTE: the current --script-security setting may allow this configuration to call user-defined scriptsSat Nov 09 13:12:25 2013 Socket Buffers: R=[65536->65536] S=[65536->65536]Sat Nov 09 13:12:25 2013 Attempting to establish TCP connection with [AF_INET]119.81.1.126:443Sat Nov 09 13:12:25 2013 MANAGEMENT: >STATE:1383973945,TCP_CONNECT,,,Sat Nov 09 13:12:25 2013 TCP connection established with [AF_INET]119.81.1.126:443Sat Nov 09 13:12:25 2013 TCPv4_CLIENT link local: [undef]Sat Nov 09 13:12:25 2013 TCPv4_CLIENT link remote: [AF_INET]119.81.1.126:443Sat Nov 09 13:12:25 2013 MANAGEMENT: >STATE:1383973945,WAIT,,,Sat Nov 09 13:12:25 2013 MANAGEMENT: >STATE:1383973945,AUTH,,,Sat Nov 09 13:12:25 2013 TLS: Initial packet from [AF_INET]119.81.1.126:443, sid=01bab8df 8c0287c2Sat Nov 09 13:12:25 2013 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.orgSat Nov 09 13:12:25 2013 VERIFY OK: nsCertType=SERVERSat Nov 09 13:12:25 2013 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.orgSat Nov 09 13:12:26 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit keySat Nov 09 13:12:26 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationSat Nov 09 13:12:26 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit keySat Nov 09 13:12:26 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationSat Nov 09 13:12:26 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSASat Nov 09 13:12:26 2013 [server] Peer Connection Initiated with [AF_INET]119.81.1.126:443Sat Nov 09 13:12:27 2013 MANAGEMENT: >STATE:1383973947,GET_CONFIG,,,Sat Nov 09 13:12:28 2013 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)Sat Nov 09 13:12:28 2013 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.5.0.1,comp-lzo no,route 10.5.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.5.0.230 10.5.0.229'Sat Nov 09 13:12:28 2013 OPTIONS IMPORT: timers and/or timeouts modifiedSat Nov 09 13:12:28 2013 OPTIONS IMPORT: LZO parms modifiedSat Nov 09 13:12:28 2013 OPTIONS IMPORT: --ifconfig/up options modifiedSat Nov 09 13:12:28 2013 OPTIONS IMPORT: route options modifiedSat Nov 09 13:12:28 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modifiedSat Nov 09 13:12:28 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0Sat Nov 09 13:12:28 2013 MANAGEMENT: >STATE:1383973948,ASSIGN_IP,,10.5.0.230,Sat Nov 09 13:12:28 2013 open_tun, tt->ipv6=0Sat Nov 09 13:12:28 2013 TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{2F2AC670-1C48-46EF-84D6-58E32F7205FC}.tapSat Nov 09 13:12:28 2013 TAP-Windows Driver Version 9.9 Sat Nov 09 13:12:28 2013 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.0.230/255.255.255.252 on interface {2F2AC670-1C48-46EF-84D6-58E32F7205FC} [DHCP-serv: 10.5.0.229, lease-time: 31536000]Sat Nov 09 13:12:28 2013 Successful ARP Flush on interface [16] {2F2AC670-1C48-46EF-84D6-58E32F7205FC}Sat Nov 09 13:12:28 2013 _up.bat Local Area Connection 1500 1560 10.5.0.230 10.5.0.229 initSat Nov 09 13:12:28 2013 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\WbemSat Nov 09 13:12:45 2013 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=upSat Nov 09 13:12:45 2013 C:\Windows\system32\route.exe ADD 119.81.1.126 MASK 255.255.255.255 172.20.167.250Sat Nov 09 13:12:45 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4Sat Nov 09 13:12:45 2013 Route addition via IPAPI succeeded [adaptive]Sat Nov 09 13:12:45 2013 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.229Sat Nov 09 13:12:45 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4Sat Nov 09 13:12:45 2013 Route addition via IPAPI succeeded [adaptive]Sat Nov 09 13:12:45 2013 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.229Sat Nov 09 13:12:45 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4Sat Nov 09 13:12:45 2013 Route addition via IPAPI succeeded [adaptive]Sat Nov 09 13:12:45 2013 MANAGEMENT: >STATE:1383973965,ADD_ROUTES,,,Sat Nov 09 13:12:45 2013 C:\Windows\system32\route.exe ADD 10.5.0.1 MASK 255.255.255.255 10.5.0.229Sat Nov 09 13:12:45 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4Sat Nov 09 13:12:45 2013 Route addition via IPAPI succeeded [adaptive]Sat Nov 09 13:12:45 2013 Initialization Sequence CompletedSat Nov 09 13:12:45 2013 MANAGEMENT: >STATE:1383973965,CONNECTED,SUCCESS,10.5.0.230,119.81.1.126 Here is where I turn on qBittorrent (about 13:13:00)Then as you can see at 13:16:52 the connection is reset... Sat Nov 09 13:16:52 2013 Connection reset, restarting [-1]Sat Nov 09 13:16:52 2013 C:\Windows\system32\route.exe DELETE 10.5.0.1 MASK 255.255.255.255 10.5.0.229Sat Nov 09 13:16:52 2013 Route deletion via IPAPI succeeded [adaptive]Sat Nov 09 13:16:52 2013 C:\Windows\system32\route.exe DELETE 119.81.1.126 MASK 255.255.255.255 172.20.167.250Sat Nov 09 13:16:52 2013 Route deletion via IPAPI succeeded [adaptive]Sat Nov 09 13:16:52 2013 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.229Sat Nov 09 13:16:52 2013 Route deletion via IPAPI succeeded [adaptive]Sat Nov 09 13:16:52 2013 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.229Sat Nov 09 13:16:52 2013 Route deletion via IPAPI succeeded [adaptive]Sat Nov 09 13:16:52 2013 Closing TUN/TAP interfaceSat Nov 09 13:16:52 2013 _down.bat Local Area Connection 1500 1560 10.5.0.230 10.5.0.229 initSat Nov 09 13:16:52 2013 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\WbemSat Nov 09 13:16:57 2013 SIGUSR1[soft,connection-reset] received, process restartingSat Nov 09 13:16:57 2013 MANAGEMENT: >STATE:1383974217,RECONNECTING,connection-reset,,Sat Nov 09 13:16:57 2013 Restart pause, 5 second(s)Sat Nov 09 13:17:02 2013 NOTE: the current --script-security setting may allow this configuration to call user-defined scriptsSat Nov 09 13:17:02 2013 Socket Buffers: R=[65536->65536] S=[65536->65536]Sat Nov 09 13:17:02 2013 Attempting to establish TCP connection with [AF_INET]119.81.1.126:443Sat Nov 09 13:17:02 2013 MANAGEMENT: >STATE:1383974222,TCP_CONNECT,,,Sat Nov 09 13:17:02 2013 TCP connection established with [AF_INET]119.81.1.126:443Sat Nov 09 13:17:02 2013 TCPv4_CLIENT link local: [undef]Sat Nov 09 13:17:02 2013 TCPv4_CLIENT link remote: [AF_INET]119.81.1.126:443Sat Nov 09 13:17:02 2013 MANAGEMENT: >STATE:1383974222,WAIT,,,Sat Nov 09 13:17:02 2013 MANAGEMENT: >STATE:1383974222,AUTH,,,Sat Nov 09 13:17:02 2013 TLS: Initial packet from [AF_INET]119.81.1.126:443, sid=397dc156 e530db5fSat Nov 09 13:17:02 2013 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.orgSat Nov 09 13:17:02 2013 VERIFY OK: nsCertType=SERVERSat Nov 09 13:17:02 2013 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.orgSat Nov 09 13:17:02 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit keySat Nov 09 13:17:02 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationSat Nov 09 13:17:02 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit keySat Nov 09 13:17:02 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationSat Nov 09 13:17:02 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSASat Nov 09 13:17:02 2013 [server] Peer Connection Initiated with [AF_INET]119.81.1.126:443Sat Nov 09 13:17:04 2013 MANAGEMENT: >STATE:1383974224,GET_CONFIG,,,Sat Nov 09 13:17:05 2013 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)Sat Nov 09 13:17:05 2013 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.5.0.1,comp-lzo no,route 10.5.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.5.0.230 10.5.0.229'Sat Nov 09 13:17:05 2013 OPTIONS IMPORT: timers and/or timeouts modifiedSat Nov 09 13:17:05 2013 OPTIONS IMPORT: LZO parms modifiedSat Nov 09 13:17:05 2013 OPTIONS IMPORT: --ifconfig/up options modifiedSat Nov 09 13:17:05 2013 OPTIONS IMPORT: route options modifiedSat Nov 09 13:17:05 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modifiedSat Nov 09 13:17:05 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0Sat Nov 09 13:17:05 2013 MANAGEMENT: >STATE:1383974225,ASSIGN_IP,,10.5.0.230,Sat Nov 09 13:17:05 2013 open_tun, tt->ipv6=0Sat Nov 09 13:17:05 2013 TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{2F2AC670-1C48-46EF-84D6-58E32F7205FC}.tapSat Nov 09 13:17:05 2013 TAP-Windows Driver Version 9.9 Sat Nov 09 13:17:05 2013 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.0.230/255.255.255.252 on interface {2F2AC670-1C48-46EF-84D6-58E32F7205FC} [DHCP-serv: 10.5.0.229, lease-time: 31536000]Sat Nov 09 13:17:05 2013 Successful ARP Flush on interface [16] {2F2AC670-1C48-46EF-84D6-58E32F7205FC}Sat Nov 09 13:17:05 2013 _up.bat Local Area Connection 1500 1560 10.5.0.230 10.5.0.229 initSat Nov 09 13:17:05 2013 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\WbemSat Nov 09 13:17:17 2013 MANAGEMENT: CMD 'signal SIGHUP'Sat Nov 09 13:17:17 2013 Closing TUN/TAP interfaceSat Nov 09 13:17:17 2013 _down.bat Local Area Connection 1500 1560 10.5.0.230 10.5.0.229 initSat Nov 09 13:17:17 2013 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\WbemSat Nov 09 13:17:21 2013 SIGHUP[hard,] received, process restartingSat Nov 09 13:17:21 2013 MANAGEMENT: >STATE:1383974241,RECONNECTING,SIGHUP,,Sat Nov 09 13:17:21 2013 OpenVPN 2.3.2 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [iPv6] built on Aug 22 2013Sat Nov 09 13:17:21 2013 Restart pause, 5 second(s)Sat Nov 09 13:17:26 2013 NOTE: the current --script-security setting may allow this configuration to call user-defined scriptsSat Nov 09 13:17:26 2013 Socket Buffers: R=[65536->65536] S=[65536->65536]Sat Nov 09 13:17:26 2013 Attempting to establish TCP connection with [AF_INET]119.81.1.126:443Sat Nov 09 13:17:26 2013 MANAGEMENT: >STATE:1383974246,TCP_CONNECT,,,Sat Nov 09 13:17:26 2013 TCP connection established with [AF_INET]119.81.1.126:443Sat Nov 09 13:17:26 2013 TCPv4_CLIENT link local: [undef]Sat Nov 09 13:17:26 2013 TCPv4_CLIENT link remote: [AF_INET]119.81.1.126:443Sat Nov 09 13:17:26 2013 MANAGEMENT: >STATE:1383974246,WAIT,,,Sat Nov 09 13:17:26 2013 MANAGEMENT: >STATE:1383974246,AUTH,,,Sat Nov 09 13:17:26 2013 TLS: Initial packet from [AF_INET]119.81.1.126:443, sid=b7f11659 f2c55d2dSat Nov 09 13:17:26 2013 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.orgSat Nov 09 13:17:26 2013 VERIFY OK: nsCertType=SERVERSat Nov 09 13:17:26 2013 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.orgSat Nov 09 13:17:27 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit keySat Nov 09 13:17:27 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationSat Nov 09 13:17:27 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit keySat Nov 09 13:17:27 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationSat Nov 09 13:17:27 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSASat Nov 09 13:17:27 2013 [server] Peer Connection Initiated with [AF_INET]119.81.1.126:443Sat Nov 09 13:17:28 2013 MANAGEMENT: >STATE:1383974248,GET_CONFIG,,,Sat Nov 09 13:17:29 2013 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)Sat Nov 09 13:17:29 2013 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.5.0.1,comp-lzo no,route 10.5.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.5.0.230 10.5.0.229'Sat Nov 09 13:17:29 2013 OPTIONS IMPORT: timers and/or timeouts modifiedSat Nov 09 13:17:29 2013 OPTIONS IMPORT: LZO parms modifiedSat Nov 09 13:17:29 2013 OPTIONS IMPORT: --ifconfig/up options modifiedSat Nov 09 13:17:29 2013 OPTIONS IMPORT: route options modifiedSat Nov 09 13:17:29 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modifiedSat Nov 09 13:17:29 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0Sat Nov 09 13:17:29 2013 MANAGEMENT: >STATE:1383974249,ASSIGN_IP,,10.5.0.230,Sat Nov 09 13:17:29 2013 open_tun, tt->ipv6=0Sat Nov 09 13:17:29 2013 TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{2F2AC670-1C48-46EF-84D6-58E32F7205FC}.tapSat Nov 09 13:17:29 2013 TAP-Windows Driver Version 9.9 Sat Nov 09 13:17:29 2013 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.0.230/255.255.255.252 on interface {2F2AC670-1C48-46EF-84D6-58E32F7205FC} [DHCP-serv: 10.5.0.229, lease-time: 31536000]Sat Nov 09 13:17:29 2013 Successful ARP Flush on interface [16] {2F2AC670-1C48-46EF-84D6-58E32F7205FC}Sat Nov 09 13:17:29 2013 _up.bat Local Area Connection 1500 1560 10.5.0.230 10.5.0.229 initSat Nov 09 13:17:29 2013 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\WbemSat Nov 09 13:17:46 2013 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=upSat Nov 09 13:17:46 2013 C:\Windows\system32\route.exe ADD 119.81.1.126 MASK 255.255.255.255 172.20.167.250Sat Nov 09 13:17:46 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4Sat Nov 09 13:17:46 2013 Route addition via IPAPI succeeded [adaptive]Sat Nov 09 13:17:46 2013 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.229Sat Nov 09 13:17:46 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4Sat Nov 09 13:17:46 2013 Route addition via IPAPI succeeded [adaptive]Sat Nov 09 13:17:46 2013 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.229Sat Nov 09 13:17:46 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4Sat Nov 09 13:17:46 2013 Route addition via IPAPI succeeded [adaptive]Sat Nov 09 13:17:46 2013 MANAGEMENT: >STATE:1383974266,ADD_ROUTES,,,Sat Nov 09 13:17:46 2013 C:\Windows\system32\route.exe ADD 10.5.0.1 MASK 255.255.255.255 10.5.0.229Sat Nov 09 13:17:46 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4Sat Nov 09 13:17:46 2013 Route addition via IPAPI succeeded [adaptive]Sat Nov 09 13:17:46 2013 Initialization Sequence CompletedSat Nov 09 13:17:46 2013 MANAGEMENT: >STATE:1383974266,CONNECTED,SUCCESS,10.5.0.230,119.81.1.126
-
Hello! I am using COMODO but the posts on the forum about its configuration lock too many connections for my needs. I only want to prevent two programs from communicating when I am not connected to AirVPN, i.e. utorrent and jdownloader. To do that, I set the configuration shown in the picture below: Can you confirm that I do not have any kind of leaks for the two programs when I disconnect from the VPN? Am I safe even if the connection to you stops working? I made some tests and the configuration seems to be effective (when I disconnect from you the downloads and uploads just stop), but I'd like to have a confirmation. Kind regards, Pr1nc1p1
-
Hello, i've been using airvpn for over a year now and up until a few days/weeks ago I never had any complaints about the speed. i have a 100mbps connection (speedtest.net is usually showing around 70-80mbps via wifi connection) and when i used to connect to NL Leporis/Lyra servers i would get around 20mbps which was fine for me. lately, i would say since the new NL servers were added, i barely get over 5mbps on any NL servers. which is not really enough to watch HD sports streams... any idea what it could be? let me know if you need anything from my end to better analyze what the problem might be. thanks in advance
-
Hi AirVPN Forums, Love The Service!. Ok, Well this is my Enquiry, is there a way to Exclude an IP Address on the router, & put it outside the VPN Connection. for example, My laptop is 192.168.1.8 & Thats happily running within VPN. BUT i want 192.168.1.200 To be Outside of this zone & be able to access the internet with 0 VPN Connection.. So it will show the ISP's Provided IP Address.. Sorry if this question is somewhat vague & Badly Formatted. Thanks. Stan464. More INFO Router: Netgear WNR834B DD/FW: DD-WRT OpenVPN Build. GWIP: 192.168.1.1 ISPGW:192.168.0.1
-
I have just purchased this for port forwarding as i have 2 different computer that I want to use for webhosting and cannot port forward to 2 separate computers. I have installed network-manager-openvpn-gnome on the computer with Ubuntu. I do not have a GUI so the instructions to follow here https://airvpn.org/linux/ do not work. I have created openvpn in my home directory and uploaded the 4 files made in airvpn to here. i restarted openvpn and get the following NO VPN is running. What do I need to do next. I have not set up the port forwarding as yet. Thanks for any help.