Jump to content
Not connected, Your IP: 216.73.216.33

Search the Community

Showing results for tags 'Linux'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 237 results

  1. Hi. I use AirVPN in Ubuntu's network manager and would like to use it as tap0, as opposed to tun0, so that I can bridge my connection via ethernet cable to another device (one which is not as easy to configure) and have it connect to the Internet the same way a virtual machine would (i. e. connecting through AirVPN the way my PC would). Unfortunately, I have found no way to bridge (or otherwise sharee) the connection besides using a TAP device. However, upon changing the .ovpn files from 'dev tun' and 'persist-tun' to 'dev tap' and 'persist-tap', I have found that I am unable to access the Internet. There doesn't seem to be a whole lot out there on sharing a VPN connection via Ubuntu, so I'd appreciate any suggestions that you might have for me. Oh, and if this is possible, I wonder why AirVPN files pick TUN over TAP. Is it in any way safer? Would I be compromising security in this case to get a little more functionality?
  2. Hi all, I encountered a rather annoying bug. I wrote a shell script that I want to execute every time the VPN tunnel is up. My test script (which does nothing more than echoing text to a test text file) works fine when I set it up under Advanced -> Events -> App Start, App End, Session Start, Session End, VPN Pre, VPN Down but not VPN Up! When I choose to run a script on VPN Up (tested with and without waiting for the script to end) the following happens: Latency tests Checking authorization Restart in 3 seconds Connecting to server Checking route (request timed out) And this goes on and on, the VPN never actually connects. I assume there is a little bug in the VPN Up event. Hopefully this can be fixed in the next version. Best regards
  3. Hi! I'm using Ubuntu Linux, when connecting via Network Manager GUI everything works ok. With airvpn_linux I'm unable to connect, here is the corresponding log, the relevant entry is "DNS checking failed" 10:40:39-valter@banana:~$ airvpn I 2015.02.18 10:40:55 - AirVPN client version: 2.8.8, System: Linux, Name: Ubuntu Vivid Vervet (development branch) \n \l, Architecture: x64 . 2015.02.18 10:40:55 - Reading options from /home/valter/.airvpn/AirVPN.xml . 2015.02.18 10:40:55 - Profile options not found, using defaults. . 2015.02.18 10:40:55 - Restarting with admin privileges 10:40:55-valter@banana:~$ I 2015.02.18 10:41:00 - AirVPN client version: 2.8.8, System: Linux, Name: Ubuntu Vivid Vervet (development branch) \n \l, Architecture: x64 . 2015.02.18 10:41:00 - Reading options from /home/valter/.airvpn/AirVPN.xml . 2015.02.18 10:41:00 - Profile options not found, using defaults. . 2015.02.18 10:41:00 - Data Path: /home/valter/.airvpn . 2015.02.18 10:41:00 - App Path: /usr/lib/AirVPN . 2015.02.18 10:41:00 - Executable Path: /usr/lib/AirVPN/AirVPN.exe . 2015.02.18 10:41:00 - Command line arguments (1): path="/home/valter/.airvpn" . 2015.02.18 10:41:00 - Updating systems & servers data ... . 2015.02.18 10:41:00 - Operating System: Unix 3.18.0.13 - Linux banana 3.18.0-13-generic #14-Ubuntu SMP Fri Feb 6 09:55:14 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux I 2015.02.18 10:41:00 - OpenVPN Driver - Found I 2015.02.18 10:41:00 - OpenVPN - Version: OpenVPN 2.3.2 (/usr/sbin/openvpn) I 2015.02.18 10:41:00 - SSH - Version: OpenSSH_6.7p1 Ubuntu-3, OpenSSL 1.0.1f 6 Jan 2014 (/usr/bin/ssh) I 2015.02.18 10:41:00 - SSL - Version: stunnel 5.06 (/usr/bin/stunnel4) I 2015.02.18 10:41:00 - IPV6: Available ! 2015.02.18 10:41:00 - Ready . 2015.02.18 10:41:01 - Systems & servers data update completed I 2015.02.18 10:41:30 - Checking login ... ! 2015.02.18 10:41:31 - Logged in. I 2015.02.18 10:41:39 - Session starting. I 2015.02.18 10:41:39 - Installing tunnel driver I 2015.02.18 10:41:39 - Checking authorization ... ! 2015.02.18 10:41:40 - Connecting to Taygeta (Netherlands, Amsterdam) I 2015.02.18 10:41:40 - DNS of the system will be updated to VPN DNS (ResolvConf method) . 2015.02.18 10:41:40 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014 . 2015.02.18 10:41:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2015.02.18 10:41:40 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts . 2015.02.18 10:41:40 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2015.02.18 10:41:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:41:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:41:40 - OpenVPN > Socket Buffers: R=[212992->131072] S=[212992->131072] . 2015.02.18 10:41:40 - OpenVPN > UDPv4 link local: [undef] . 2015.02.18 10:41:40 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.6:443 . 2015.02.18 10:41:40 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.6:443, sid=bf8d143c 9b723275 . 2015.02.18 10:41:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2015.02.18 10:41:45 - OpenVPN > Validating certificate key usage . 2015.02.18 10:41:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2015.02.18 10:41:45 - OpenVPN > VERIFY KU OK . 2015.02.18 10:41:45 - OpenVPN > Validating certificate extended key usage . 2015.02.18 10:41:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2015.02.18 10:41:45 - OpenVPN > VERIFY EKU OK . 2015.02.18 10:41:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2015.02.18 10:41:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.02.18 10:41:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:41:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.02.18 10:41:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:41:48 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2015.02.18 10:41:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.6:443 . 2015.02.18 10:41:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2015.02.18 10:41:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.155.170 10.4.155.169' . 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: route options modified . 2015.02.18 10:41:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2015.02.18 10:41:50 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=d4:3d:7e:31:e3:5d . 2015.02.18 10:41:50 - OpenVPN > TUN/TAP device tun0 opened . 2015.02.18 10:41:50 - OpenVPN > TUN/TAP TX queue length set to 100 . 2015.02.18 10:41:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2015.02.18 10:41:50 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2015.02.18 10:41:50 - OpenVPN > /sbin/ip addr add dev tun0 local 10.4.155.170 peer 10.4.155.169 . 2015.02.18 10:41:50 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init . 2015.02.18 10:41:50 - OpenVPN > dhcp-option DNS 10.4.0.1 . 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 37.48.81.6/32 via 192.168.1.1 . 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.155.169 . 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.155.169 . 2015.02.18 10:41:56 - OpenVPN > /sbin/ip route add 10.4.0.1/32 via 10.4.155.169 . 2015.02.18 10:41:56 - Starting Management Interface . 2015.02.18 10:41:56 - OpenVPN > Initialization Sequence Completed I 2015.02.18 10:41:56 - Flushing DNS I 2015.02.18 10:41:56 - Checking route I 2015.02.18 10:41:57 - Checking DNS E 2015.02.18 10:41:57 - DNS checking failed. . 2015.02.18 10:41:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2015.02.18 10:41:57 - Disconnecting . 2015.02.18 10:41:57 - Management - Send 'signal SIGTERM' . 2015.02.18 10:41:57 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2015.02.18 10:41:57 - OpenVPN > SIGTERM received, sending exit notification to peer . 2015.02.18 10:41:57 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2015.02.18 10:41:57 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 10.4.0.1/32 . 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 37.48.81.6/32 . 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2015.02.18 10:42:02 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2015.02.18 10:42:02 - OpenVPN > Closing TUN/TAP interface . 2015.02.18 10:42:02 - OpenVPN > /sbin/ip addr del dev tun0 local 10.4.155.170 peer 10.4.155.169 . 2015.02.18 10:42:02 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init . 2015.02.18 10:42:02 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2015.02.18 10:42:02 - Connection terminated. I 2015.02.18 10:42:05 - Checking authorization ... ! 2015.02.18 10:42:05 - Connecting to Taygeta (Netherlands, Amsterdam) I 2015.02.18 10:42:05 - DNS of the system will be updated to VPN DNS (ResolvConf method) . 2015.02.18 10:42:05 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014 . 2015.02.18 10:42:05 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2015.02.18 10:42:05 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts . 2015.02.18 10:42:05 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2015.02.18 10:42:05 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:05 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:05 - OpenVPN > Socket Buffers: R=[212992->131072] S=[212992->131072] . 2015.02.18 10:42:05 - OpenVPN > UDPv4 link local: [undef] . 2015.02.18 10:42:05 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.6:443 . 2015.02.18 10:42:05 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.6:443, sid=0f3fe417 8570eca2 . 2015.02.18 10:42:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2015.02.18 10:42:06 - OpenVPN > Validating certificate key usage . 2015.02.18 10:42:06 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2015.02.18 10:42:06 - OpenVPN > VERIFY KU OK . 2015.02.18 10:42:06 - OpenVPN > Validating certificate extended key usage . 2015.02.18 10:42:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2015.02.18 10:42:06 - OpenVPN > VERIFY EKU OK . 2015.02.18 10:42:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2015.02.18 10:42:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.02.18 10:42:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.02.18 10:42:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:06 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2015.02.18 10:42:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.6:443 . 2015.02.18 10:42:09 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2015.02.18 10:42:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.155.170 10.4.155.169' . 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: route options modified . 2015.02.18 10:42:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2015.02.18 10:42:09 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=d4:3d:7e:31:e3:5d . 2015.02.18 10:42:09 - OpenVPN > TUN/TAP device tun0 opened . 2015.02.18 10:42:09 - OpenVPN > TUN/TAP TX queue length set to 100 . 2015.02.18 10:42:09 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2015.02.18 10:42:09 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2015.02.18 10:42:09 - OpenVPN > /sbin/ip addr add dev tun0 local 10.4.155.170 peer 10.4.155.169 . 2015.02.18 10:42:09 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init . 2015.02.18 10:42:09 - OpenVPN > dhcp-option DNS 10.4.0.1 . 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 37.48.81.6/32 via 192.168.1.1 . 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.155.169 . 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.155.169 . 2015.02.18 10:42:15 - OpenVPN > /sbin/ip route add 10.4.0.1/32 via 10.4.155.169 . 2015.02.18 10:42:15 - Starting Management Interface . 2015.02.18 10:42:15 - OpenVPN > Initialization Sequence Completed I 2015.02.18 10:42:15 - Flushing DNS I 2015.02.18 10:42:15 - Checking route I 2015.02.18 10:42:15 - Checking DNS E 2015.02.18 10:42:15 - DNS checking failed. . 2015.02.18 10:42:15 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2015.02.18 10:42:15 - Disconnecting . 2015.02.18 10:42:15 - Management - Send 'signal SIGTERM' . 2015.02.18 10:42:15 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2015.02.18 10:42:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2015.02.18 10:42:15 - OpenVPN > SIGTERM received, sending exit notification to peer . 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 10.4.0.1/32 . 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 37.48.81.6/32 . 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2015.02.18 10:42:20 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2015.02.18 10:42:20 - OpenVPN > Closing TUN/TAP interface . 2015.02.18 10:42:20 - OpenVPN > /sbin/ip addr del dev tun0 local 10.4.155.170 peer 10.4.155.169 . 2015.02.18 10:42:20 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init . 2015.02.18 10:42:20 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2015.02.18 10:42:20 - Connection terminated. I 2015.02.18 10:42:23 - Checking authorization ... ! 2015.02.18 10:42:23 - Connecting to Taygeta (Netherlands, Amsterdam) I 2015.02.18 10:42:23 - DNS of the system will be updated to VPN DNS (ResolvConf method) . 2015.02.18 10:42:23 - OpenVPN > OpenVPN 2.3.2 x86_64-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014 . 2015.02.18 10:42:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2015.02.18 10:42:23 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts . 2015.02.18 10:42:23 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2015.02.18 10:42:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:23 - OpenVPN > Socket Buffers: R=[212992->131072] S=[212992->131072] . 2015.02.18 10:42:23 - OpenVPN > UDPv4 link local: [undef] . 2015.02.18 10:42:23 - OpenVPN > UDPv4 link remote: [AF_INET]37.48.81.6:443 . 2015.02.18 10:42:23 - OpenVPN > TLS: Initial packet from [AF_INET]37.48.81.6:443, sid=9899d800 5a8b10e6 . 2015.02.18 10:42:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2015.02.18 10:42:24 - OpenVPN > Validating certificate key usage . 2015.02.18 10:42:24 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2015.02.18 10:42:24 - OpenVPN > VERIFY KU OK . 2015.02.18 10:42:24 - OpenVPN > Validating certificate extended key usage . 2015.02.18 10:42:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2015.02.18 10:42:24 - OpenVPN > VERIFY EKU OK . 2015.02.18 10:42:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2015.02.18 10:42:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.02.18 10:42:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.02.18 10:42:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.02.18 10:42:27 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA . 2015.02.18 10:42:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]37.48.81.6:443 . 2015.02.18 10:42:29 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2015.02.18 10:42:29 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.155.170 10.4.155.169' . 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: route options modified . 2015.02.18 10:42:29 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2015.02.18 10:42:29 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=d4:3d:7e:31:e3:5d . 2015.02.18 10:42:29 - OpenVPN > TUN/TAP device tun0 opened . 2015.02.18 10:42:29 - OpenVPN > TUN/TAP TX queue length set to 100 . 2015.02.18 10:42:29 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2015.02.18 10:42:29 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2015.02.18 10:42:29 - OpenVPN > /sbin/ip addr add dev tun0 local 10.4.155.170 peer 10.4.155.169 . 2015.02.18 10:42:29 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init . 2015.02.18 10:42:29 - OpenVPN > dhcp-option DNS 10.4.0.1 . 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 37.48.81.6/32 via 192.168.1.1 . 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.4.155.169 . 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.4.155.169 . 2015.02.18 10:42:35 - OpenVPN > /sbin/ip route add 10.4.0.1/32 via 10.4.155.169 . 2015.02.18 10:42:35 - Starting Management Interface . 2015.02.18 10:42:35 - OpenVPN > Initialization Sequence Completed I 2015.02.18 10:42:35 - Flushing DNS I 2015.02.18 10:42:35 - Checking route I 2015.02.18 10:42:35 - Checking DNS E 2015.02.18 10:42:35 - DNS checking failed. . 2015.02.18 10:42:35 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 ! 2015.02.18 10:42:35 - Disconnecting . 2015.02.18 10:42:35 - Management - Send 'signal SIGTERM' . 2015.02.18 10:42:35 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2015.02.18 10:42:35 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2015.02.18 10:42:35 - OpenVPN > SIGTERM received, sending exit notification to peer . 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 10.4.0.1/32 . 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 37.48.81.6/32 . 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 0.0.0.0/1 . 2015.02.18 10:42:40 - OpenVPN > /sbin/ip route del 128.0.0.0/1 . 2015.02.18 10:42:40 - OpenVPN > Closing TUN/TAP interface . 2015.02.18 10:42:40 - OpenVPN > /sbin/ip addr del dev tun0 local 10.4.155.170 peer 10.4.155.169 . 2015.02.18 10:42:40 - OpenVPN > /usr/lib/AirVPN/update-resolv-conf tun0 1500 1558 10.4.155.170 10.4.155.169 init . 2015.02.18 10:42:40 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2015.02.18 10:42:40 - Connection terminated. I 2015.02.18 10:42:40 - Cancel requested. ! 2015.02.18 10:42:40 - Session terminated. ^C Please help.... TIA
  4. Hi all, I have the Linux AirVPN Eddie Client 2.8.8 running on Lubuntu. When I try to "Save As" the log files from the GUI it defaults to a "Desktop" directory. As you can see on the attached screenshot, I saved a log file called AirVPN_log.txt. However, it seems that this is not really my desktop. The saved file doesn't show up on my desktop and other files that are on my desktop don't show up in the "Save As" Desktop folder... From the "Save As" dialog I can not navigate to any folder that is familiar to me. There is also no way to open, delete or move files already saved (like the AirVPN_log.txt file). My question is: where does AirVPN save these log files? I can not find the AirVPN_log.txt anywhere on my system, still the Eddie Client seems to have saved it somewhere. Thanks in advance
  5. I'm trying to connect to AirVPN under Arch Linux via NetworkManager/OpenVPN. It connects successfully (it shows a padlock), but if I go to http://ipleak.net/ I can still see both my ISP public IP and my ISP DNS server. I followed this guide (even if it's for Ubuntu). You can find the relevant logs from the "journalctl" command in the attachment.
  6. Eddie 2.7 and 2.8; Linux Mint 17.1: From /user/bin, I invoked ./airvpn, which produced the following output: Unhandled Exception: System.UnauthorizedAccessException: Access to the path "/home/*/.airvpn/logs/airvpn_2015-01-07.log" is denied. I fixed the problem by taking ownership of the logs directory (chown) and removing the logs. Quick fix, but could be troublesome for a novice user. Thanks for the service! All the best
  7. I connect to AirVPN using the network-manager applet on Fedora 20 x64. I have a couple of ports forwarded, which are manually allowed in Fedora's firewall and entered into qBittorrent (latest v3.1.9-2). I have just noticed that while the connection never leaks DNS when used normally, as soon as qBittorrent is running my DNS leaks almost every time I test. Here is what happens once qBittorrent is open: Once qBittorrent is closed, the leaks stop. Does anyone have any ideas? As far as I knew DNS leaks were basically a Windows problem. Currently qBittorrent is set to use the tun0 interface only, and my network-manager settings are as follows: Ethernet: Connect automatically, IPv4 only, connect to AirVPN as soon as interface is up. AirVPN: Port 443 over UDP, no special settings after importing config files from Air's generator. The whole machine connects through an IPFire (Linux hardware firewall/router distro) box. Can anyone help shed some light on this please? Thanks in advance.
  8. Hi There, I just realized im still running 2.4. When I try to donwload from airvpn.org/linux selecting .deb 32bit, the downloaded version is still 2.4. I'm not sure if the code is actually 2.7, but at least the debian package states version 2.4. Cheers, Martin
  9. So I have the AirVPN client on Ubuntu. I've been reading the posts on the forums but no post about leaks and AirVPN client by itself. Is this good enough to prevent leaks on linux or do I need to follow those other guides to prevent leaks? Does the AirVPN client modify IPTABLES? Is that still necessary?
  10. Arch x86_64 Linux 3.17 LXDE Openbox Xorg Running the Eddie client results in a graphical error. The window frame and embedded text are fine but user fields are ~1px-3px. This makes it difficult to read any menu, log or text input (such as log in and password.) Not sure if it is just me but it is definitely just this software on my machine. Not sure if anyone else has had this issue but I thought I would post a thread for feedback. Thanks
  11. I would like to be able to use VPN only with Hexchat. I'm using eddie 2.7. I'm on elementary OS. Is there a way to do this so the VPN only gets used through Hexchat?
  12. Hello, I have a strange problem: I'm using Linux Mint 17 (Cinnamon, 64-bit), no firewall settings applied. After connecting to AirVPN through the network-manager (using .ovpn config file imported) or using "Eddie 2.1 (Portable)" I cannot connect to my Jabber/XMPP profiles (i have two different profiles on two different jabber-servers, including Jitsi). I have tried Pidgin, Gajim and Jitsi. Pidgin cannot login into my accout, Gajim is seems to be connected but no one can see me logged in and I don't see any contacts online, and I cannot send/receive any messages - so I'm accually offline. When I am connected to Jitsi/XMPP account I can see other contacts and they can see me, but I cannot send messages only receive them and I cannot make/receive any calls. In all cases, when I use "Net Activity Viewer" application I see that there is a connection established from local address 10.4.x.x to a jabber-server on a remote port 5222 but still I cannot communicate. I have also tried to flush iptables settings just to be sure - it didn't help. // Just to be clear - I try to connect to XMPP after I have established AirVPN connection. Everything else working but XMPP. When I'm disconnected from AirVPN everything works just fine. // I was using AirVPN under Windows 7 and everything was working (with Comodo anti-leaking Global Rules applied). To be 100% sure, I have tried a clean install of Linux Mint 16 and 17 (both Cinnamon, 64-bit) on a flash drive. The problem repeated. There is more: I have tried to boot from Linux Mint Debian Edition (from a flash drive with installation iso image written on it) - there was NO problem connecting to XMPP accounts under AirVPN connection (using Eddie 2.1 Portable! I just don't know what to think about all of this... some kind of a mystery.
  13. Hi guys! So I am attempting to setup my Transmission bittorrent client with Transdrone (Transdroid) app on Android. I want to be able to use this android remote app to connect to my desktop (where Transmission is running) while I am connected to this VPN. So I: 1) Connected to a server (say Server A). 2) Configured port forwarding on AirVPN's site (AirVPN > Client Area > Forwarded ports). Let's say I forwarded port 7712 and 7713. 3) Logged into Transmission and set port 7712 as the Incoming port (Transmission > Preferences > Network) and made sure 'Pick a random port at startup' was unchecked. 4) Allowed remote access (HTTP) from port 7713 and configured username/password authentication. Made sure 'Only allow these IP addresses' was unchecked. 5) Then set my firewall to allow incoming connections from port 7712 and 7713 (TCP). * I DID NOT log into my router and configure port forwarding for these ports (or any for that matter). When I hit the 'Test Port' button (Transmission > Network) to test port 7712, it says 'Port is OPEN'. Cool. ----- So what is my post about? Well there are some instructions on this page that confuse the heck outta me: https://airvpn.org/faq/p2p/ I do not understand what is being communicated here... "If you forward a port for a p2p torrent client, do NOT remap it to a different local port and make sure that the torrent client port matches the remotely forwarded port number" - What is meant by "do not remap it to a different local port"? Am I supposed to log into my router and setup port forwarding for port 7712 & 7713? "do NOT forward on your router the same ports you use on your Bittorrent or eMule client (or any other listening service) while connected to the VPN" - Doesn't this contradict the previous instruction? What is the correct way to configure port forwarding so that my P2P client will work with my android remote app? (and seed)
  14. What are the dependencies to get the AirVPN Linux client to work? I was apparently able to install the client with the .deb, but nothing happens when I try to execute it, so I figure that probably means some dependencies are missing.
  15. Hey, I'm running Airvpn via the terminal, I get my .ovpn from the generator and it works just fine. But how do I terminate the vpn and drop back to my normal IP? Thanks.
  16. I read in the how to section that there is a security flaw in Debian's current implementation of OpenVPN Network Manager where it doesn't check the server's certificate. From what I've tried, I really like Debian, so this is a shame. However, I recently found out about Debian Testing and Debian Sid. Is the flaw fixed in these releases? I ask because I've not found Eddie to be very good in Debian for a number of reasons: it needs to be a window rather than something accessed from the taskbar; my DNS leaks; the built-in fix for DNS leaks makes it unable to connect; it frequently crashes when I try to exit; the speeds aren't anywhere near as good as when run through network manager. So this is not a good solution to the problem. I find running plain OpenVPN is too technical. Suggestions?
  17. UPDATE Due to multiple, critical problems in network-manager-openvpn which after years have not been solved we recommend to NOT use it. Please understand that we will not provide support to network-manager-openvpn. In GNU/Linux we recommend that you run our free and open source software "Eddie", or our free and open source software "Hummingbird", or OpenVPN directly 21/04/2014: network-manager-openvpn runs OpenVPN so that OpenVPN does not check the server certificate. Therefore we DO NOT RECOMMEND usage of network-manager for security reasons. This issue is already fixed in newest version not yet available in Debian 7 Wheezy Download your configuration file from the page Config Generator Select "Advanced Mode" Tick "Separate certs/keys from .ovpn files" Save the downloaded zip-file somewhere, say in ~/.airvpn. Unzip it. Five files should be extracted. Try to make sure nobody but you can read the file user.key, because that one is secret. Erase the zip-file. Or at least, make sure only you can read it (since it contains the secret user.key file inside) Install the package named network-manager-openvpn-gnome, which is a plugin to NetworkManager handling OpenVPN connections. The install will automatically include all needed packages, like openvpn etc. Perhaps you'll have to log out and log in again, or even restart the computer or something. To check that openvpn plugin was properly installed in NetworkManager, click on the nm-applet (the NetworkManager icon) => VPN Connections => Configure VPN. In the little window that comes up, click the Add button. Is there an OpenVPN option in the menu? Good. But don't click on it. Just close the windows. This was just a check. Click on the nm-applet (the NetworkManager icon) => VPN Connections => Configure VPN In the little window that comes up, click the Import button. In the file chooser that comes up, find the previously downloaded file air.ovpn (perhaps you stored it in the ~/.airvpn directory?) A new little window comes up. It is pre-filled with the necessary airvpn-configuration stuff. Click the NetworkManager applet. Under VPN-connections, you should now be able to select the VPN-connection named air. After a little while, the applet icon should be decorated with a little padlock. For any comment or feedback, you can find the discussion here. Thanks to HugeHedon for this article.
  18. UPDATE 01-SEP-17 Due to multiple, critical problems in network-manager-openvpn which after years have not been solved we recommend to NOT use it. Please understand that we will not provide support to network-manager-openvpn. In GNU/Linux we recommend that you run our free and open source software "AirVPN Suite", "Eddie" or OpenVPN directly Warning: Ubuntu 14.04 has an issue on configuration files import. At 25/04/2014 there's still no fix. Bug Report Go to Config Generator page, choose Linux and choose your preferred options. Select Advanced Mode Tick Separate certs/keys from .ovpn files Click on any archive format. Save the downloaded archive file somewhere, say in ~/.airvpn. Extract it. Five files should be extracted. Try to make sure nobody but you can read the file user.key, because that one is secret. Install the package named network-manager-openvpn-gnome, which is a plugin to NetworkManager handling OpenVPN connections. The install will automatically include all needed packages, like openvpn etc. Click on NetworkManager icon in top-right bar, and choose Edit Connections... Click Add, choose Import a saved VPN configuration, click Create... and choose a .ovpn file extracted from files generated by our Config Generator. The imported information is displayed. Click Save... and close the NetworkManager Connections editor. From now on, the imported connections are showed under VPN Connections menu. Click it to connect.
  19. Download your configuration file from the page Config Generator. If you don't already have the OpenVPN package installed in your system, you can tick Advanced Mode and tick Bundle executable (only for x86/amd64 based systems). Have a look here to take care of DNS push (OpenVPN will not do that for you by default): https://airvpn.org/topic/9608-how-to-accept-dns-push-on-linux-systems-with-resolvconf/Open a terminal console, reach the directory where you stored the files generated by the Configuration Generator and launchsudo openvpn foo.ovpnif you already have installed the OpenVPN package, orsudo ./openvpn foo.ovpnif you have downloaded our bundled executable. foo.ovpn is any *.ovpn files generated by the Config Generator. In the example we report "sudo" to run OpenVPN with root privileges. In some systems you might not have "sudo" available, or your account might be not included in the "sudo-ers". In these cases, you just need to run a terminal as root, or become root with "su" command.
  20. I just downloaded a new configuration from the config generator. I created one for Asia and one of USA. I used the generator to make the generator create separate files for the keys, certs. The ovpn is set to use port 443. This has worked before. Now it seems to time out. Tue Apr 15 18:23:52 2014 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Tue Apr 15 18:23:52 2014 TLS Error: TLS handshake failed Tue Apr 15 18:23:52 2014 SIGUSR1[soft,tls-error] received, process restarting Here is everything: openvpn Asia443.ovpn Tue Apr 15 18:20:48 2014 OpenVPN 2.3.2 x86_64-redhat-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Sep 12 2013 Tue Apr 15 18:20:48 2014 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file Tue Apr 15 18:20:48 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Apr 15 18:20:48 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Apr 15 18:20:48 2014 Socket Buffers: R=[212992->131072] S=[212992->131072] Tue Apr 15 18:20:48 2014 UDPv4 link local: [undef] Tue Apr 15 18:20:48 2014 UDPv4 link remote: [AF_INET]119.81.1.123:443 Tue Apr 15 18:21:48 2014 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Tue Apr 15 18:21:48 2014 TLS Error: TLS handshake failed Tue Apr 15 18:21:48 2014 SIGUSR1[soft,tls-error] received, process restarting Tue Apr 15 18:21:48 2014 Restart pause, 2 second(s) Tue Apr 15 18:21:50 2014 Socket Buffers: R=[212992->131072] S=[212992->131072] Tue Apr 15 18:21:50 2014 UDPv4 link local: [undef] Tue Apr 15 18:21:50 2014 UDPv4 link remote: [AF_INET]119.81.1.123:443
  21. Hello!, When connecting on linux via the command 'sudo openvpn AirVPN_America_UDP-443.ovpn' I get the error in the subject line. It appears that I'm connected without problems but just wanted to check. I'm running the latest versions of Arch linux, openvpn, openssl, and have seperated keys/certs from ovpn files. The files are all in my home directory with permissions -rw-r--r-- Thank you for your help
  22. I've read the instructions on adding a VPN via the GUI NetworkManager in Linux. I cannot get these options to save. I'm attaching a screen shot as this explains it much better than I can. All fields are populated, yet I cannot apply/save these settings. VPN via the command line does work, but I cannot create this connection via NetworkManager. Please help, it's driving me crazy!!
  23. Hi all, first post here, site looks like a fantastic resource. I have installed the Europeian and Asian server files and several individual server files on to my openUSE Gnome 13.10.02 box as per the Gnome Network Manager tutorial. Everything went fine until I checked for DNS leaks using GRC'S https://www.grc.com/dns/dns.htm I was still querying my ISP's DNS. I manually set each VPN to use OpenNIC's non logging DNS http://www.opennicproject.org/, I have sucssesfully done this with Mint and Ubuntu using Gnome Network Manager. However I seem to be having an issue with OpenSUSE, I can only connect reliably to the Swedish server and occasionally to the Netherlands, non of the others ie Europe/Asia/Romania/Luxumberg/Singapore even though they are all configured identically. I have obviously broken something by manually setting the DNS. I also don't know and cannot find the openSUSE command to open the openvpn logs which isn't helping. Any help much appreciated.
  24. OK, I posted a support query on shutting down OpenVPN. As it turned out OpenVPN is set to automatically restart if the connection is dropped. Shutting down via Ctrl C is (as a Linux user at least) apparently the way to do it if you have started OpenVPN in a Terminal. My shutting down using Ctrl C was causing the /usr/share/openvpn/update-resolv-conf script to become confused as it was out of sync with itself & threw an error whenever I tried to start OpenVPN after it had been closed via Ctrl C. (Which is why this thread & the support ticket started.) The start.VPN.sh script was born: It requires that you make the following two files; /etc/resolv.conf_VPN /etc/resolv.conf_VPN.bak These two identical files carry the following: # For use when OpenVPN is running: domain home nameserver 10.4.0.1 # AirVPN DNS nameserver 8.8.8.8 # Backup DNS (Google DNS) Following is what the script does, in order: * The script calls IPTables at its beginning, & shows the user that it is running via output to the Terminal. (See link to how-to at the bottom of the page.) * It then checks that /etc/resolv.conf & /etc/resolv.conf_VPN exist. * Then it checks to see if they are the same size, (which is to protect from the resolv.conf_VPN having not been swapped back to having the AirVPN DNS on the last OpenVPN shutdown. * If the files are the same size, then the script copies the /etc/resolv.conf_VPN.bak file to /etc/resolv.conf_VPN . * Now the contents of the /etc/resolv.conf & the /etc/resolv.conf_VPN files are swapped. Meaning /etc/resolv.conf now has the AirVPN DNS followed by the Google DNS in it. * Now is the time to call OpenVPN & your chosen server, my current call follows: openvpn --config /etc/openvpn/AirVPN_NL-Dorsum_UDP-443.ovpnAirVPN using its own DNS should now be running. * When OpenVPN is closed via Ctlr C or via the Disconnect Now button, or however else you can close it. The first thing that happens (providing that you have IPTables setup correctly) is all internet connections are terminated. This is all in the hands of the IPTables that was started at the beginning of the script (IPTables must be setup by you before hand). * Then /etc/resolv.conf & the /etc/resolv.conf_VPN files swap their contents again. Meaning that the /etc/resolv.conf now has the DNS or your routers IP address, that it had in it before this script was started. That is it for what the script does. The start.VPN.sh script: #!/bin/bash ## Starts IPTables & shows that it is running. ## Then: ## Function to swap 2 files holding DNS addresses, /etc/resolv.conf ## & /etc/resolv.conf_VPN. ## To protect from the possibility of the resolv.conf with non-VPN ## DNS address overwriting your resolv.conf_VPN & causing you to use ## the wrong DNS, this script now checks whether resolv.conf & ## resolv.conf_VPN are the same, & if they are, then resolv.conf_VPN ## is replaced by its backup, ie, /etc/resolv.conf_VPN.bak. ## ## After the above is done, then OpenVPN with AirVPN server is ## called. When OpenVPN closes, the resolv.conf files are swapped ## back again, so the original, non VPN file (DNS) is restored to ## /etc/resolv.conf . ## You need to create the /etc/resolv.conf_VPN & the ## /etc/resolv.conf.VPN.bak files with the AirVPN DNS & a backup ## DNS that is NOT your ISP's DNS. ## ## I use the following 4 lines of text for those two previously ## mentioned files: ## ## # AirVPN DNS followed by Google's DNS: ## domain home ## nameserver 10.4.0.1 ## nameserver 8.8.8.8 ## ########################################### # Turn on iptables - which protects my IP by allowing only VPN DNS # if I lose VPN all internet connections are imediately stopped. systemctl start iptables.service systemctl status iptables.service iptables -nvL --line-numbers #Check entered arguments if [ ! $1 ] || [ ! $2 ] then echo "Using inbuilt defaults" file1="/etc/resolv.conf" file2="/etc/resolv.conf_VPN" else file1=$1 file2=$2 fi #Check if the files exist if [ ! -f $file1 ] || [ ! -f $file2 ] then echo "File(s) doesnt exist" exit 1 fi #Check whether the files are same if [[ ! `cmp $file1 $file2` ]] then echo "Files $file1 $file2 same" echo "Replacing $file2 with $file2.bak" if [ ! -f "$file2.bak" ] then echo "File $file2.bak doesnt exist" echo "Exiting.." exit 1 else cp "$file2.bak" "$file2" fi fi #The swap function swap() { cp $file2 file.bak mv $file1 $file2 mv file.bak $file1 } #Swap the files swap $file1 $file2 echo "Files $file1 and $file2 swapped" #Do openVPN stuff openvpn --config /etc/openvpn/AirVPN_NL-Dorsum_UDP-443.ovpn #Again swap the files, ie, go back to the original state swap $file2 $file1 echo "Files $file2 and $file1 swapped" # Turn off iptables - this allows usage of NON-VPN internet & DNS # this is here for certain circumstances when it may be useful. # Just uncomment the following two lines if needed. Doing so # renders the identity protection that may be offered by your # IPTables setup useless. #systemctl stop iptables.service #echo "Turned off iptables - normal internet is now accessible BEWARE!" #Done exit 0 Calling the script via a ~/.bashrc alias: By adding the (see below) following alias to your ~/.bashrc you can call the start.VPN.sh script by just entering vpn at the Terminal prompt. (You need to change the path to the start.VPN.sh script to suit where you have it stored on your system. alias vpn="sudo su -c ~/.config/openvpn/start.VPN.sh" After having entered any alias (or making any other edits) in your ~/.bashrc you need to reinitialize the Terminal to activate any changes to your ~/.bashrc. You can do this by closing & restarting your Teminal, or you can enter the following in the Terminal: source .bashrc I actually have an alias for the above command in my ~/.bashrc too, as follows: alias src="/external_image/?url=source+.bashrc" Using the above alias src in the Terminal, runs the source .bashrc command. I've not yet tried running the start.VPN.sh script from inside of the /etc/openvpn/AirVPN .ovpn file. I'll post my results when I have some. Associated Links: I haven't yet tried calling the script from inside of the /etc/openvnp/AirVPN .ovnp file. I'll post & hopefully edit the page when I've tried that. This is the how-to that I used to get IPTables setup: https://airvpn.org/topic/9139-prevent-leaks-with-linux-iptables/?hl=%2Biptables+%2Bleaks+%2Blinux Here is the solution to my silly error when setting up IPTables: https://airvpn.org/topic/10598-linux-set-up-firewall-as-per-how-to-from-staff-member/ This is the link to the update-resolv-conf page: https://airvpn.org/topic/9608-how-to-accept-dns-push-on-linux-systems-with-resolvconf/
  25. I'm not sure if anyone else would find this useful, but I threw together a simple script the other day for speeding up the process of configuring and managing my VPN connections on my desktop (Linux Mint). Note that this is far from comprehensive--I made it with my use cases in mind. https://github.com/mindcruzer/airvpn-cli ex. ~$ airvpn setup pavonis --connect Would prompt you for your username and password, generate the configuration, save it and set the appropriate permissions, then start the openvpn daemon. There are a few other useful commands as well.
×
×
  • Create New...