Jump to content
Not connected, Your IP: 216.73.216.33

Search the Community

Showing results for tags 'VPN'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 209 results

  1. Hello and thank you in advance for any help with this. I have never ran a Tor relay before, but I would like to try to enable a "middle-man" relay through my VPN connection if it is possible. I am trying to configure the Tor "middle-man" relay using my /etc/tor/torrc file and iptables.rules file. (I have not edited the TBB torrc) My torrc is configured like this below: AutomapHostsOnResolve 1 AutomapHostsSuffixes .exit,.onion SocksPort 9050 TransPort 9040 DNSPort 9053 ##Tor-middleman Nickname ************(my secert name) ORPort 9001 DirPort 9030 BandwidthRate 256 KB # Throttle traffic to 20KB/s BandwidthBurst 4096 KB # But allow bursts up to 50KB/s ExitPolicy reject *:* and my current iptables.rules that work with AirVPN and TBB/Tor/Privoxy are: $ iptables -L -n --line-numbers Chain INPUT (policy DROP) num target prot opt source destination 1 icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 recent: SET name: ping_limiter side: source mask: 255.255.255.255 2 DROP icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 recent: UPDATE seconds: 4 hit_count: 6 name: ping_limiter side: source mask: 255.255.255.255 3 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 4 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED 5 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 6 DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID 7 UDP udp -- 0.0.0.0/0 0.0.0.0/0 ctstate NEW 8 TCP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 ctstate NEW 9 REJECT udp -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable 10 REJECT tcp -- 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset 11 REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-proto-unreachable Chain FORWARD (policy DROP) num target prot opt source destination Chain OUTPUT (policy ACCEPT) num target prot opt source destination Chain TCP (1 references) num target prot opt source destination Chain UDP (1 references) num target prot opt source destination ----------------------------------------------------------------------------- $ iptables -t nat -L -n --line-numbers Chain PREROUTING (policy ACCEPT) num target prot opt source destination Chain INPUT (policy ACCEPT) num target prot opt source destination Chain OUTPUT (policy ACCEPT) num target prot opt source destination Chain POSTROUTING (policy ACCEPT) num target prot opt source destination If there is an easy way to do this then please let me know what I should do with ports-forward, iptables.rules, and torrc. thanks. ------------------------------------------------------------------- EDITED: I decided to edit this cause I added too much confusing info. So to keep things simple, I don't know if I need ports forwarded or if I just need some new iptables rules to make things work. (or both) Currently my Tor Browser Bundle (TBB) works on port 9150 and 9151 over my VPN connection and so does my Tor/Privoxy connection using Socks4a for port 9050 and 8118. When running both tor instances I have 6 EntryGuards to start. When I configure the "middle-man" relay in my linux /etc/tor/torrc file I get about 20-80 more ESTABLISHED connection with the original 6 ESTABLISHED EntryGuards. But after a few minutes I only have the original 6 EntryGuards as ESTABLISHED connections when using the netstat command.
  2. I have used AirVPN quite a long time, but recently I noticed something which, in my opinion, need further explanation. When I am disconnected from AirVPN, my firewall is able to pass all the tests on Gibson Research Corporation's site. When I am connected to one of AirVPN servers (it doesn't matter which precisely - my test was proceeded on Linux Ubuntu 13.10 and Windows 8.1), Gibson's report reveals holes in firewall. They are related actually, as I presume, to AirVPN server's firewall, not mine. However, port 88 (Kerberos) is open. Furthermore, system replies to ping. Could you explain, is it deliberate action? Is it safe? Is my security copromised? Can someone obtain unauthorized access to my computer through port 88? I would like to emphasize in the end that my firewall works properly. I use Online Armor and I have tested AirVPN connection with Comodo Firewall as well. Thank you. Please respond. Screenshots are below.
  3. Hello AirVPN community, I've been lurking a few months, recently subscribed to the service here and am still learning/experimenting with different configurations. This forum btw, is one of the big reasons I decided to go with AirVPN, so kudos to the community and staff for developing a great knowledge base here. On to my question: I'm trying to route traffic from my Virtual box VM out the VPN interface without having to force ALL host traffic out the VPN. My setup: I followed Nadre's wonderful Traffic splitting guide in order to setup utorrent traffic to go out the VPN interface while the rest of my host(windows 7) traffic goes out the regular LAN interface and it's working marvously. My next goal is to run tails in virtual box and route all traffic from that VM out the VPN. The solution i'm looking for has the following goals: Host traffic goes out the non-vpn interface (check)uTorrent traffic goes out the VPN interface (check)Tails VM traffic goes out the VPN interface while maintaing the two above requirements.I've pondered over some way to use the host routing table to accomplish this, but haven't com up with anything. Virtual Box has a NAT bind option, but it is not currently working from what i gathered from the virtual box forums. I did find another post that claims that what i'm looking to do isn't possible but someone did detail a way to do it with a secondary vm acting as a router. While I could do this, i'd rather not put the extra strain on my host for just day to day stuff unless it's absolutely neccessary. Does anyone around here have a better way to accomplish this without the secondary VM? Thanks!
  4. Hello I got a small request for a VPN connection in Taiwan, i hope AirVPN could grand this request soon Best regards Morten
  5. Hi, I'm having trouble with download speeds through utorrent. without vpn (using the same file as a test) i get approx. 500kB/s with vpn active im getting approx.03 - 3.0kB/s, I've tried all available UK servers, some of which i get no download at all. I'd really appreciate any advise. Thank you.
  6. Hi All, Sorry for my splurge of posts over the past couple of days, just trying to get my head round all of this! Anyway, I am having some issues when trying to change my IP on Tor. What I have done so far: Generated the config for OpenVPN with my selected country of choice, and have set it to use "Socks" and Port 9150. Successfully loaded that config file into the correct part of the OpenVPN folder. Launch Tor and then navigate to IPChicken to see the IP of the exit node (I think). Connect to the VPN using OpenVPN. Reload the IPChicken page. It shows the same IP address.​What have I missed out? Have I done something wrong? Thanks for any help!
  7. Hi AirVPN Forums, Love The Service!. Ok, Well this is my Enquiry, is there a way to Exclude an IP Address on the router, & put it outside the VPN Connection. for example, My laptop is 192.168.1.8 & Thats happily running within VPN. BUT i want 192.168.1.200 To be Outside of this zone & be able to access the internet with 0 VPN Connection.. So it will show the ISP's Provided IP Address.. Sorry if this question is somewhat vague & Badly Formatted. Thanks. Stan464. More INFO Router: Netgear WNR834B DD/FW: DD-WRT OpenVPN Build. GWIP: 192.168.1.1 ISPGW:192.168.0.1
  8. Hi I'm trying to use transparent proxying Tor over VPN on Debian latest x64 and standard OpenVPN client with port 2018 configuration file generated from Air client area. My problem is that I will either be reduced to an intermittent connection or no connection after a few (simultaneous?) requests. I can connect to the VPN, and get a page in the terminal with "wget" or "curl" without problems. If I then open my browser (latest Firefox) and try to load a page, it may load without issues, it may take over a minute to load, or it may not load at all. During this time, the previously working wget and curl, don't work. I also can't resolve hostnames (using Tor's DNSPort). It may start working again a while later, and then I will try to load a site that has a lot of content, and it will stop working again. Maybe it will stop working entirely. The solution is to disconnect from the VPN and reconnect. Nothing is shown in Tor log, VPN log (connecting is normal), or system logs. Another problem is that UDP traffic will still go through. I can connect to a UDP service and the VPN IP is shown, but I want it blocked entirely. My iptables rules, which may be incorrect, I'm not experienced with them: #!/bin/sh iptables -F iptables -t nat -F iptables -t nat -A OUTPUT -m owner --uid-owner 110 -j RETURN iptables -t nat -A OUTPUT -p udp --dport 53 -j REDIRECT --to-ports 53 iptables -t nat -A OUTPUT -d 192.168.0.0/24 -j RETURN iptables -t nat -A OUTPUT ! -o lo -p tcp -m tcp -m owner ! --uid-owner 110 -j REDIRECT --to-ports 9040 iptables -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT iptables -A OUTPUT -m owner --uid-owner 110 -j ACCEPT iptables -A OUTPUT -p icmp -j DROP iptables -A INPUT -p icmp -j DROP iptables -A INPUT -i tun0 -p udp -j RETURN iptables -A OUTPUT -o tun0 -p udp -j RETURN iptables -A INPUT -i lo -p udp -j RETURN iptables -A OUTPUT -o lo -p udp -j RETURN iptables -A INPUT -p udp -s 192.168.0.0/24 -j RETURN iptables -A OUTPUT -p udp -d 192.168.0.0/24 -j RETURN iptables -A INPUT -p udp ! --source-port 2018 -j DROP iptables -A OUTPUT -p udp ! --destination-port 2018 -j DROP ip6tables -F ip6tables -t nat -F ip6tables -A INPUT -j DROP ip6tables -A OUTPUT -j DROP Thanks in advance.
  9. Hello all, I am currently connected to Air vpn, then running a virtual machine. I am also running tor on the vm, but I am not sure if the traffic from tor is being routed through my vpn...any input is so very much appreciated..I am at a loss for tech skills here. Thank you all.
×
×
  • Create New...